SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
BitTorrent, Inc.
Sync IT
Sync IT is a high performance, scalable, cost
effective solution for managing file transfers
Any size to any location over any type of network
3
Table of Contents
1. Market overview: Managed File-Transfer (MFT)
2. BitTorrent Sync IT product
a. Features
b. Platform support
c. Architecture
d. Network protocols (WAN optimization & Peer discovery)
e. Security Implementation
3. Example use cases
a. Managing file transfers
b. Replicating 1-to-many
c. Synchronizing multiple locations
d. Overcoming limited/poor connectivity in remote locations
Market Overview
Managing File-Transfer
4
5
Market overview: Managing File-Transfer
IT departments are facing numerous challenges today:
- Large number of devices and number/size of data to transfer
- Data movement lacks transparency and traceability
- Compliance laws and privacy regulations
- Insecure traditional methods of sending data (i.e. FTP)
- Sluggish legacy processes that don’t adapt to changing network conditions
- Slow speed of file transfers over the WAN to multiple locations/geo’s
- Lack of integration of MFT solutions into existing workflows and process management
- High total cost of ownership (TCO) for the needed tools
6
Market overview: Managing File-Transfer
Existing MFT solutions are complicated and costly
- All are centralized, which makes them less reliable (single point of failure), and more
costly (require clustering, fat pipes to serve large number of nodes)
- Complex UI requires advanced skill sets to configure
- Inefficient 1:1 data replication consumes time and bandwidth
- Bidirectional/multi-site replication require additional software add-ons
- Hardware dependencies challenge scalability
- Lack of WAN optimized file transfers
- Limited platform support
- Expensive TCO = hundreds of thousands over 3-5 years
BitTorrent Sync IT solves all of these challenges and more…
BitTorrent Sync IT Product
7
8
BitTorrent Sync IT Product
Built on proven technology used by hundreds of
millions worldwide
- P2P protocol used by enterprise companies like Twitter,
Blizzard and Facebook
- Designed using the same distributed architecture as
BitTorrent Sync (getsync.com):
- Widely deployed in consumer and workgroup
environments
- 15M+ installs & over 200 PB of data moved
- Distributed by Globalscape, Western Digital, Seagate,
Netgear, Overland, Synology, FreeNAS, QNAP
Onehub and more!
9
BitTorrent Sync IT Product
Managed file transfer solution that saves cost, time, and bandwidth
- Replaces inefficient, outdated, and insecure file transfer and data management systems
- Provides automation, performance, and management control
- Allows shared access to files without a central server
- Scales to thousands of nodes and handles millions of individual files to the largest datasets using centrally
managed automated workflows (BitTorrent P2P Protocol)
- Enables file data deduplication decreasing transfer time and storage needs
- Utilizes our unique Micro Transport Protocol (uTP)
- Overcomes the bottlenecks of conventional synchronization tools like rsync
- Saturates network connections up to 1Gb/s over the LAN & WAN
- Encrypts data with AES-128 bit for secure transfers
10
Features
Centrally managed and controlled:
- Browser-based control of each deployed instance
from a management server central console
- Controllable via UI, APIs or Command Line
- Dashboard of reporting events, audits & status for
each client with logging and email notification
- Policy based events: scheduling, speed throttling,
prioritizations and on demand replication
- Bidirectional transfers to client machines initiated
without the client intervention
- Headless engine runs as a service on clients
- Runs entirely on private infrastructure (network and
storage)
Platform Support
11
Desktop Clients Management Server
- Mac OS X 10.8 Lion or later
- Windows XP or later (32/64-bit)
- Linux i386 & i386 (glibc 2.3)
- Linux x64 & x64 (glibc 2.3)
- Linux ARM
- FreeBSD 8.4 and 9.1
- Windows 7 or later (32/64-bit)
- Linux
12
Architecture
A lightweight application built-on highly
optimized C++ code
- Designed for low CPU and memory usage
- Scalable to handle more than 1M+ files
- Ability to replicate data to thousands of peers
- Incremental data transfers
- Block level (4k) P2P bi-directional file transmissions
- Data deduplication and file versioning
- Network, CPU and OS agnostic
13
Network Protocols
Networking Capabilities
- Upgraded uTP protocol optimized for LAN/WAN (can saturate 1Gb/s connections)
- Transfer performance scales with bandwidth independent of transfer distance
and is resilient to packet loss
- MTP mitigates poor latency and congestion control issues
- Optimal end-to-end throughput efficiency
- Ability to establish direct connections between peers
- NAT traversal, UPnP, known host, local peer discovery
- Support for TCP in environments that require it
14
WAN Optimization
Data transferring over WAN with high RTT
(retransmission time) and packet loss
- BitTorrent Sync has developed a new protocol based on uTP
that is optimized for high latency/packet loss networks such as
WAN and mobile networks (3G/4G LTE) which provides the
following benefits:
- Effective data transfer speed can match the speed of
the network up to 1 Gbps
- Reliable error correction and detection
- Software based, does not require hardware to achieve
performance
- CPU and memory optimized; no need to deploy high
end servers
- Uses existing network infrastructure (public or private)
with zero configuration
Peer-Discovery Diagram
15
Peer Connection Diagram
16
Security Implementation
17
Cryptographic based security
- Successfully audited and reviewed by iSEC Partners
- Direct device-to-device transfers of data residing on 100% private infrastructure
- No cloud or dependencies on 3rd party hosted storage as an intermediary staging
point between devices
- Access control configurable on a peer-by-peer basis
- Read/write: full access
- Read only: one-way sync
- Encrypted nodes
- Modify permissions and ACL of files as needed
- Can deploy behind corporate network with a private Tracker and Relay
Security Diagram
18
Use Case Examples
19
20
IT administrators have full control of where data is being transfered
- File transfers initiated using a central management console and full set of robust API’s
- Enables individual/ group policy based events including: scheduling, prioritization, event monitoring, and
secure transfer of files no matter the file type, size or how far the distance
- Works seamlessly across networks, VPNs, and firewalls
- Permits a portion of resources (i.e. processing power, disk storage or network bandwidth) directly available
to other peers, without the need for central coordination by servers or stable hosts
- Increases robustness by using the decentralized nature of P2P networks that removes the single point of
failure inherent in a client-server based system
- Features detailed reporting designed for real time visibility across all managed file transfers and nodes
Managed File Transfers
21
Replicating 1-to-Many
Air Gap wireless network with 4G radios on hundreds of fire trucks for first responders
to receive vital information from headquarters
Data is synchronized remotely and optimized for unreliable wireless network conditions, utilizing P2P to
reduce server loads/outages:
- Bidirectional synchronization between central servers and fire trucks when deployed in the field
- Closed network, does not require the public internet for replication (imperative in a disaster scenario)
- Ability to recover when network connection is dropped or interrupted
- P2P uses network channels between trucks to reduce server loads
- Sync API integrate with existing dashboard systems
- Cross-platform, runs on Linux and Windows
Replicating 1-to-Many
22
23
Synchronizing Multiple Locations
Training materials replicated to thousands of remote workstations across Germany
Data is replicated over the WAN to training facilities, then across each LAN. Our P2P protocol significantly
reduces the replication time across the multiple locations when new material arrives:
- Central servers stage media files on dozens of local branch office servers (over the WAN)
- Media files replicated inside training facilities to hundreds of workstations (over the LAN)
- 4K block level incremental copying of files provide immediate access on local PC’s of updated material
- WAN synchronizations occur on non-peak hours (night)
- API integration into existing IT platforms for headless workstations
- Cross-platform, runs on Mac, Linux and Windows
Synchronizing Multiple Locations
24
25
Overcoming limited/poor connectivity in remote locations
Team Live Longer uses mobile technologies to diagnose and detect early cases of
cervical cancer in Haiti using BitTorrent Sync to transfer data from remote sites
Patient’s screening data synchronized from Haiti to medical offices in US for expert medical analysis:
- Private infrastructure is secure for encrypted transmission of confidential medical data
- Easy setup and management for remote testing facilities on laptops with limited technology
- P2P and uTP protocols allow file transmissions over disrupted and unreliable WAN networks
- P2P transmissions allow doctors in multiple locations to simultaneously receive data
- Significant time reduction for data synchronization over long WAN distances
Overcoming limited/poor connectivity in remote locations
26

Más contenido relacionado

La actualidad más candente

Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
Travis Leong Ping
 
Support formobility
Support formobilitySupport formobility
Support formobility
Rahul Hada
 
Training presentation
Training presentationTraining presentation
Training presentation
Sagnik Saha
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 

La actualidad más candente (20)

Net Access Corporate Overview - Fall 2015
Net Access Corporate Overview - Fall 2015Net Access Corporate Overview - Fall 2015
Net Access Corporate Overview - Fall 2015
 
Network servers
Network serversNetwork servers
Network servers
 
Chapter06
Chapter06Chapter06
Chapter06
 
Hp a5500
Hp a5500Hp a5500
Hp a5500
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
Support formobility
Support formobilitySupport formobility
Support formobility
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
 
Chapter05
Chapter05Chapter05
Chapter05
 
Training presentation
Training presentationTraining presentation
Training presentation
 
Chapter03
Chapter03Chapter03
Chapter03
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Software defined networks and openflow protocol
Software defined networks and openflow protocolSoftware defined networks and openflow protocol
Software defined networks and openflow protocol
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 
One of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB DistributedOne of the Ways How to Make RIB Distributed
One of the Ways How to Make RIB Distributed
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
 

Similar a BitTorrent Sync IT Overview

Sync IT Presentation 3.16
Sync IT Presentation 3.16Sync IT Presentation 3.16
Sync IT Presentation 3.16
Marcus Grimaldo
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
Herson Franz Ugale
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
Piero Fraternali
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
Vikrant Arya
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
ImXaib
 
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdfInter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdf
aesalem06
 
Microx - A Unix like kernel for Embedded Systems written from scratch.
Microx - A Unix like kernel for Embedded Systems written from scratch.Microx - A Unix like kernel for Embedded Systems written from scratch.
Microx - A Unix like kernel for Embedded Systems written from scratch.
Waqar Sheikh
 
SesaNV_Group_FEB2015_KMS2Cloud v03
SesaNV_Group_FEB2015_KMS2Cloud v03SesaNV_Group_FEB2015_KMS2Cloud v03
SesaNV_Group_FEB2015_KMS2Cloud v03
RiccardoPelliccioli
 

Similar a BitTorrent Sync IT Overview (20)

Sync IT Presentation 3.16
Sync IT Presentation 3.16Sync IT Presentation 3.16
Sync IT Presentation 3.16
 
Upper layer protocol
Upper layer protocolUpper layer protocol
Upper layer protocol
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Forward unisys
Forward unisysForward unisys
Forward unisys
 
Nobody Uses Files Any More Do They? New Technologies for Old Technology, File...
Nobody Uses Files Any More Do They? New Technologies for Old Technology, File...Nobody Uses Files Any More Do They? New Technologies for Old Technology, File...
Nobody Uses Files Any More Do They? New Technologies for Old Technology, File...
 
Fast and secure protocol FASP
Fast and secure protocol FASPFast and secure protocol FASP
Fast and secure protocol FASP
 
lec3_10.ppt
lec3_10.pptlec3_10.ppt
lec3_10.ppt
 
Large-Scale System Integration with DDS for SCADA, C2, and Finance
Large-Scale System Integration with DDS for SCADA, C2, and FinanceLarge-Scale System Integration with DDS for SCADA, C2, and Finance
Large-Scale System Integration with DDS for SCADA, C2, and Finance
 
IBM Aspera overview
IBM Aspera overview IBM Aspera overview
IBM Aspera overview
 
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdfInter-Process-Communication (or IPC for short) are mechanisms provid.pdf
Inter-Process-Communication (or IPC for short) are mechanisms provid.pdf
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
Microx - A Unix like kernel for Embedded Systems written from scratch.
Microx - A Unix like kernel for Embedded Systems written from scratch.Microx - A Unix like kernel for Embedded Systems written from scratch.
Microx - A Unix like kernel for Embedded Systems written from scratch.
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
SesaNV_Group_FEB2015_KMS2Cloud v03
SesaNV_Group_FEB2015_KMS2Cloud v03SesaNV_Group_FEB2015_KMS2Cloud v03
SesaNV_Group_FEB2015_KMS2Cloud v03
 

BitTorrent Sync IT Overview

  • 2. Sync IT is a high performance, scalable, cost effective solution for managing file transfers Any size to any location over any type of network
  • 3. 3 Table of Contents 1. Market overview: Managed File-Transfer (MFT) 2. BitTorrent Sync IT product a. Features b. Platform support c. Architecture d. Network protocols (WAN optimization & Peer discovery) e. Security Implementation 3. Example use cases a. Managing file transfers b. Replicating 1-to-many c. Synchronizing multiple locations d. Overcoming limited/poor connectivity in remote locations
  • 5. 5 Market overview: Managing File-Transfer IT departments are facing numerous challenges today: - Large number of devices and number/size of data to transfer - Data movement lacks transparency and traceability - Compliance laws and privacy regulations - Insecure traditional methods of sending data (i.e. FTP) - Sluggish legacy processes that don’t adapt to changing network conditions - Slow speed of file transfers over the WAN to multiple locations/geo’s - Lack of integration of MFT solutions into existing workflows and process management - High total cost of ownership (TCO) for the needed tools
  • 6. 6 Market overview: Managing File-Transfer Existing MFT solutions are complicated and costly - All are centralized, which makes them less reliable (single point of failure), and more costly (require clustering, fat pipes to serve large number of nodes) - Complex UI requires advanced skill sets to configure - Inefficient 1:1 data replication consumes time and bandwidth - Bidirectional/multi-site replication require additional software add-ons - Hardware dependencies challenge scalability - Lack of WAN optimized file transfers - Limited platform support - Expensive TCO = hundreds of thousands over 3-5 years BitTorrent Sync IT solves all of these challenges and more…
  • 7. BitTorrent Sync IT Product 7
  • 8. 8 BitTorrent Sync IT Product Built on proven technology used by hundreds of millions worldwide - P2P protocol used by enterprise companies like Twitter, Blizzard and Facebook - Designed using the same distributed architecture as BitTorrent Sync (getsync.com): - Widely deployed in consumer and workgroup environments - 15M+ installs & over 200 PB of data moved - Distributed by Globalscape, Western Digital, Seagate, Netgear, Overland, Synology, FreeNAS, QNAP Onehub and more!
  • 9. 9 BitTorrent Sync IT Product Managed file transfer solution that saves cost, time, and bandwidth - Replaces inefficient, outdated, and insecure file transfer and data management systems - Provides automation, performance, and management control - Allows shared access to files without a central server - Scales to thousands of nodes and handles millions of individual files to the largest datasets using centrally managed automated workflows (BitTorrent P2P Protocol) - Enables file data deduplication decreasing transfer time and storage needs - Utilizes our unique Micro Transport Protocol (uTP) - Overcomes the bottlenecks of conventional synchronization tools like rsync - Saturates network connections up to 1Gb/s over the LAN & WAN - Encrypts data with AES-128 bit for secure transfers
  • 10. 10 Features Centrally managed and controlled: - Browser-based control of each deployed instance from a management server central console - Controllable via UI, APIs or Command Line - Dashboard of reporting events, audits & status for each client with logging and email notification - Policy based events: scheduling, speed throttling, prioritizations and on demand replication - Bidirectional transfers to client machines initiated without the client intervention - Headless engine runs as a service on clients - Runs entirely on private infrastructure (network and storage)
  • 11. Platform Support 11 Desktop Clients Management Server - Mac OS X 10.8 Lion or later - Windows XP or later (32/64-bit) - Linux i386 & i386 (glibc 2.3) - Linux x64 & x64 (glibc 2.3) - Linux ARM - FreeBSD 8.4 and 9.1 - Windows 7 or later (32/64-bit) - Linux
  • 12. 12 Architecture A lightweight application built-on highly optimized C++ code - Designed for low CPU and memory usage - Scalable to handle more than 1M+ files - Ability to replicate data to thousands of peers - Incremental data transfers - Block level (4k) P2P bi-directional file transmissions - Data deduplication and file versioning - Network, CPU and OS agnostic
  • 13. 13 Network Protocols Networking Capabilities - Upgraded uTP protocol optimized for LAN/WAN (can saturate 1Gb/s connections) - Transfer performance scales with bandwidth independent of transfer distance and is resilient to packet loss - MTP mitigates poor latency and congestion control issues - Optimal end-to-end throughput efficiency - Ability to establish direct connections between peers - NAT traversal, UPnP, known host, local peer discovery - Support for TCP in environments that require it
  • 14. 14 WAN Optimization Data transferring over WAN with high RTT (retransmission time) and packet loss - BitTorrent Sync has developed a new protocol based on uTP that is optimized for high latency/packet loss networks such as WAN and mobile networks (3G/4G LTE) which provides the following benefits: - Effective data transfer speed can match the speed of the network up to 1 Gbps - Reliable error correction and detection - Software based, does not require hardware to achieve performance - CPU and memory optimized; no need to deploy high end servers - Uses existing network infrastructure (public or private) with zero configuration
  • 17. Security Implementation 17 Cryptographic based security - Successfully audited and reviewed by iSEC Partners - Direct device-to-device transfers of data residing on 100% private infrastructure - No cloud or dependencies on 3rd party hosted storage as an intermediary staging point between devices - Access control configurable on a peer-by-peer basis - Read/write: full access - Read only: one-way sync - Encrypted nodes - Modify permissions and ACL of files as needed - Can deploy behind corporate network with a private Tracker and Relay
  • 20. 20 IT administrators have full control of where data is being transfered - File transfers initiated using a central management console and full set of robust API’s - Enables individual/ group policy based events including: scheduling, prioritization, event monitoring, and secure transfer of files no matter the file type, size or how far the distance - Works seamlessly across networks, VPNs, and firewalls - Permits a portion of resources (i.e. processing power, disk storage or network bandwidth) directly available to other peers, without the need for central coordination by servers or stable hosts - Increases robustness by using the decentralized nature of P2P networks that removes the single point of failure inherent in a client-server based system - Features detailed reporting designed for real time visibility across all managed file transfers and nodes Managed File Transfers
  • 21. 21 Replicating 1-to-Many Air Gap wireless network with 4G radios on hundreds of fire trucks for first responders to receive vital information from headquarters Data is synchronized remotely and optimized for unreliable wireless network conditions, utilizing P2P to reduce server loads/outages: - Bidirectional synchronization between central servers and fire trucks when deployed in the field - Closed network, does not require the public internet for replication (imperative in a disaster scenario) - Ability to recover when network connection is dropped or interrupted - P2P uses network channels between trucks to reduce server loads - Sync API integrate with existing dashboard systems - Cross-platform, runs on Linux and Windows
  • 23. 23 Synchronizing Multiple Locations Training materials replicated to thousands of remote workstations across Germany Data is replicated over the WAN to training facilities, then across each LAN. Our P2P protocol significantly reduces the replication time across the multiple locations when new material arrives: - Central servers stage media files on dozens of local branch office servers (over the WAN) - Media files replicated inside training facilities to hundreds of workstations (over the LAN) - 4K block level incremental copying of files provide immediate access on local PC’s of updated material - WAN synchronizations occur on non-peak hours (night) - API integration into existing IT platforms for headless workstations - Cross-platform, runs on Mac, Linux and Windows
  • 25. 25 Overcoming limited/poor connectivity in remote locations Team Live Longer uses mobile technologies to diagnose and detect early cases of cervical cancer in Haiti using BitTorrent Sync to transfer data from remote sites Patient’s screening data synchronized from Haiti to medical offices in US for expert medical analysis: - Private infrastructure is secure for encrypted transmission of confidential medical data - Easy setup and management for remote testing facilities on laptops with limited technology - P2P and uTP protocols allow file transmissions over disrupted and unreliable WAN networks - P2P transmissions allow doctors in multiple locations to simultaneously receive data - Significant time reduction for data synchronization over long WAN distances
  • 26. Overcoming limited/poor connectivity in remote locations 26