SlideShare una empresa de Scribd logo
1 de 40
Seminar on :




               A Peer-to-peer Network System



                           Presented By :
                               Chirodeep Das.
                               BCSE-IV.
                               Roll-000810501008.
                               Jadavpur University.
   Introduction
   Why “BitTorrent”?
   Traditional Client-server System
   Peer to peer network system
   What is “ BitTorrent ”?
   BitTorrent components
   How BitTorrent works?
   Pictorial explanation on the Working
   Piece Selection Mechanisms
   Advantages
   Some Facts
   Conclusion
   References
   BitTorrent is a peer to peer (P2P) file transferring system

    and was designed in April 2001 by Brahm Cohen

    and then maintained by Cohen’s company BitTorrent, Inc.

     Unlike other traditional download methods, BitTorrent
    maximizes transfer speed by locating the pieces of the file you
    want and downloading these pieces simultaneously from
    people who already have them.

     This process makes popular and very large files download
    much faster .

     This is more popular and efficient file transferring system
    than the traditional client – server system.
   Client-server computing or networking is an
    application architecture that partitions the work loads between
    service providers (servers) and service requesters, called clients.
   Millions want to download the same popular huge files
    1. Softwares
    2. Media (the real example!)
   You open a Web page and click a link to download a file to your
    computer.
   The Web browser software on your computer (the client) tells
    the server (a central computer that holds the Web page and the
    file you want to download) to transfer a copy of the file to your
    computer.
    The transfer is handled by a protocol (a set of rules), such as
    FTP (File Transfer Protocol) or HTTP (Hypertext Transfer
    Protocol).
Overloaded!




Source

Router

“Interested”
  End-host
   Client-server model fails if
       Single server fails or
       Can’t afford to deploy enough servers


   Another issue is huge Traffic Overload in the
    server(s) which is the central point of failure.
   BitTorrent is a peer-to-peer file sharing
    protocol allowing users to distribute large
    amounts of data without putting the level of
    strain on their computers that would have
    been needed for standard Internet hosting.
   Peer-to-peer file sharing is different from
    traditional file downloading. In peer-to-peer
    sharing, you use a software program (rather
    than your Web browser) to locate computers
    that have the file you want to download.
    Because these are ordinary computers like
    yours, as opposed to servers;they are
    called peers.
tracker
                                                         Peer




     Each peer is directly connected to other peer.
     The file to be transferred is divided into equal size of pieces.
     Peer uploads the pieces it has while downloads any piece it
    can get from other peers.
     These pieces are downloaded from different peers
    parallely.
    It is used for large file transfer.
   No central point of failure
    ✓E.g. the internet & the web do not have a central point of
     failure.
    ✓Most internet & web services use the client-server model
     (e.g. HTTP) so a specific service does have a central point of
     failure.
Scalability
    ✓Since every peer is alike, it is possible to add more peers to
       the system and scale to larger networks.
Like most Internet phenomena, Bit Torrent
has its own jargon. Some of the most common terms
related to BitTorrent include:
 BitTorrent Client Software
 .torrent file or METAinfo file
 Leechers
 Peers
 Seeds
 Swarm
 Tracker
 Piece (of a file)
 Torrent index server
 Client S/W – program which resides on a peers’ computer and
  implements the BitTorrent protocol.




 It controls all operations such as :
 reads information present in the .torrent file.
 After reading .torrent file it sends message to tracker to send
 the list of peers and then it connects to peers.
 It keeps all record of the file which is receiving.
   It has extension as .torrent and downloaded
    from torrent index server.
   Contains the information that points to the
    actual file and the people who are sharing it.
   The main contents of the .torrent file are -
              Name/size/date for each .torrent file.
              # no. of pieces of each files.
              SHA-1 hash of each file for
               maintaining the data integrity.
              Trackers associated with that
               torrent.
   These are the clients who have entire file.
       They upload pieces of the file to other peers.


       These are the clients who do not have the
        entire file.
       They upload the parts of file they have at the
        same time when they download other parts.

   These are the clients who are responsible for
    the file transfer.
   Peers = leechers + seeds.
   Downloading speed of any file using torrent
    depends on number of peers.
1   2    3    4    5    6    7    8


   The file which is to be downloaded is divided
    into similar size of pieces.
   Several pieces are downloaded parallelly.
   Each piece is downloaded from different peers.
   Tracker is the server that manages the BitTorrent
     file transfer process.
   It provides all list of peers which are associated
    with a particular torrent.
   These trackers are mentioned in the Metafile.
   Client S/W sends request to the tracker to send the
    list of peers and after getting the complete list of
    peers client s/w connects to the peers.


   The group of computers that are simultaneously
    sending (uploading) or receiving (downloading)
    the same file is called Swarm.
   Source of .torrent files
   Torrent search engine
PIECES
PEERS
   Initial seeder chops file into many pieces.
   Leecher first locates the .torrent file that directs it to a
    tracker, which tells which other peers are downloading
    that file. As soon as a leecher downloads pieces of the
    file, replicas of the pieces are created. More downloads
    mean more replicas are available.
   As soon as a leecher has a complete piece, it can
    potentially share it with other downloaders. Eventually
    each leecher becomes a seeder by obtaining all the
    pieces, and assembles the file. Finally it verifies the
    checksum using SHA-1.
   1. Seeder
    generates a
    torrent file
   Uploads torrent
    to a web server.
   Seeder – A client
    sharing 100% of
    the shared file.
   2. The seeder
    notifies the
    tracker that it is
    sharing the file
    described in the
    torrent file.
   3. A leecher
    downloads the
    torrent file from
    some torrent index
    server.
   Leecher – client
    which has some
    parts and
    downloads the
    other parts of the
    shared file from
    the seeder.
   4.The leecher
    (client) connects
    to the tracker(s)
    specified in the
    torrent metafile.
   The tracker
    returns a list of
    other peers who
    are sharing the
    file.
   5. The leecher
    connects to its
    peers to retrieve
    pieces of the files.
A machine with
                                      a complete
                                      copy (the seed)
                                      can distribute
                                      incomplete
                                      pieces to
                           Seed       multiple peers




Peers exchange
different pieces of   As soon as the user has
the file with one     a piece of the file on his
another until they    machine, he can
assemble a whole      become a source of that
                      piece to other peers,
                      helping speed download
Torrent Tracker
torrent: group of
tracker: tracks peers
                                          peers exchanging
in torrent; provides
                                          chunks of a file
tracker list




                                trading
                                chunks




torrent index server:    peer
search for torrents;
provides .torrent file
   The order in which pieces are selected by
    different peers is critical for good performance.
   If an inefficient policy is used, then peers may
    end up in a situation where each has all
    identical set of easily available pieces, and none
    of the missing ones.
   If the original seed is prematurely taken down,
    then the file cannot be completely downloaded!
    What are ―good policies?‖
   Some piece(chunk) selection mechanisms are-
   Rarest Piece First
       General rule
   Random First Piece
       Special case, at the beginning
   Endgame Mode
       Special case, at the end
   Initially, a peer has nothing to trade.
   So it is important to get a complete piece as
    early as possible.
   Policy is to select a random piece of the file and
    download it.
   Determine the pieces that are most rare among
    your peers, and download those first.
   This ensures that the most commonly available
    pieces are left till the end to download.
   It also ensures that a large variety of pieces are
    downloaded from the seed.
   Near the end, missing pieces are requested
    from every peer containing them. When the
    piece arrives, the pending requests for that
    piece are cancelled.
   This ensures that a download is not
    prevented from completion due to a single
    peer which has a slow transfer rate.
   Some bandwidth is wasted, but in practice,
    this is not too much.
   Once download is complete, a peer has no
    download rates to use for comparison nor
    has any need to use them. The question is,
    which nodes to upload to?

   Policy: Upload to those peers with the best
    upload rate. This ensures that pieces get
    replicated faster, and new seeders are
    created fast.
   BitTorrent is an open-source program that offers a
    spyware- and nuisance-free installation.
   Allows users to share large amounts of data in a
    short span of time.
   Discourages ―freeloading‖ or ―free riders‖ (those
    who only download but never upload) by
    rewarding the fastest uploaders.
   The more popular a file is — the more people want
    a copy of it — the faster it can be downloaded,
    because there are lots of replicas already present in
    the system.
    Bit torrent is responsible for roughly 27-55% of all
     internet traffic and 45-78% of P2P traffic.
    As of 2011 bitTorrent has more than 100 million users
     and grater share of bandwidth than Netflix and Hulu
     combined.




    THE PIRATE BAY:
    Who in september 2008 had 69,12,029 visits and
    21,40,325 unique visitors making it 109th most popular
    website
    Another popular torrent tracker isoHunt claims to have
     9857 TB of data
 BitTorrent is a great protocol with its huge potential
  to distribute large files very easily.

 Bit Torrent is conceived as a way of distributing large
  and popular file more quickly, efficiently, and reliably.

 As a P2P file sharing system BitTorrent is
  quickly becoming the method of choice for publishing
   and sharing large files across the internet.
   http://in.tech.yahoo.com
   http://www.bittorrent.com
   http://www.wikipedia.org/bittorrent
   http://computer.howstuffworks.com/bittorrent.htm
    http://www.bittorrent.org/protocol.html
   http://www.ccs.neu.edu/home/als/termpaper.pdf
   http://www.bittorrent.org/beps/bep_0003.html
   http://radar.oreilly.com/archives/2005/10/hbo_attac
    king_bittorrent.html
   http://www.ccs.neu.edu
   http://www.bittorrent.org
   http://radar.oreilly.com
   http://in.tech.yahoo.com/041103/137/2ho4i.html
Thank you!!

Más contenido relacionado

La actualidad más candente

Google File System
Google File SystemGoogle File System
Google File System
nadikari123
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating system
Ron McGary
 
Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...
Anu Garg
 

La actualidad más candente (20)

Comparison of Amoeba, Mach & Chorus: DOS
Comparison of Amoeba, Mach & Chorus: DOSComparison of Amoeba, Mach & Chorus: DOS
Comparison of Amoeba, Mach & Chorus: DOS
 
file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada
 
Enterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerEnterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual Controller
 
Ntfs and computer forensics
Ntfs and computer forensicsNtfs and computer forensics
Ntfs and computer forensics
 
Distributed Database
Distributed DatabaseDistributed Database
Distributed Database
 
Logic programming a ruby perspective
Logic programming a ruby perspectiveLogic programming a ruby perspective
Logic programming a ruby perspective
 
Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]Chorus - Distributed Operating System [ case study ]
Chorus - Distributed Operating System [ case study ]
 
Google File System
Google File SystemGoogle File System
Google File System
 
Retrospective with multiple teams or with a large audience
Retrospective with multiple teams or with a large audienceRetrospective with multiple teams or with a large audience
Retrospective with multiple teams or with a large audience
 
Đề tài: Tìm hiểu và triển khai quản trị mạng trên Ubuntu Server, 9đ - Gửi miễ...
Đề tài: Tìm hiểu và triển khai quản trị mạng trên Ubuntu Server, 9đ - Gửi miễ...Đề tài: Tìm hiểu và triển khai quản trị mạng trên Ubuntu Server, 9đ - Gửi miễ...
Đề tài: Tìm hiểu và triển khai quản trị mạng trên Ubuntu Server, 9đ - Gửi miễ...
 
Memory Management | Computer Science
Memory Management | Computer ScienceMemory Management | Computer Science
Memory Management | Computer Science
 
kernels
 kernels kernels
kernels
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating system
 
Bai 7
Bai 7Bai 7
Bai 7
 
Présentation ubuntu 12.10 PDF
Présentation ubuntu  12.10 PDFPrésentation ubuntu  12.10 PDF
Présentation ubuntu 12.10 PDF
 
Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...Difference between various operating systems on the basis of single user ,mul...
Difference between various operating systems on the basis of single user ,mul...
 
Multi processor scheduling
Multi  processor schedulingMulti  processor scheduling
Multi processor scheduling
 
Operating Systems 1 (7/12) - Threads
Operating Systems 1 (7/12) - ThreadsOperating Systems 1 (7/12) - Threads
Operating Systems 1 (7/12) - Threads
 
Google File System
Google File SystemGoogle File System
Google File System
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 

Destacado

BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
Mohd253
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
Avula Jagadeesh
 

Destacado (14)

BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Introduction to BitTorrent Bundle
Introduction to BitTorrent BundleIntroduction to BitTorrent Bundle
Introduction to BitTorrent Bundle
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
El Aprendizaje Virtual
El Aprendizaje VirtualEl Aprendizaje Virtual
El Aprendizaje Virtual
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Torrent
TorrentTorrent
Torrent
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Rain technology
Rain technologyRain technology
Rain technology
 

Similar a Bittorrent final seminar

Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
Sanjay Ravishankar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
Srikanth Vanama
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
ssanda3
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution Systems
Lorin Olsen
 

Similar a Bittorrent final seminar (20)

Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachers
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution Systems
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Bittorrent final seminar

  • 1. Seminar on : A Peer-to-peer Network System Presented By : Chirodeep Das. BCSE-IV. Roll-000810501008. Jadavpur University.
  • 2. Introduction  Why “BitTorrent”?  Traditional Client-server System  Peer to peer network system  What is “ BitTorrent ”?  BitTorrent components  How BitTorrent works?  Pictorial explanation on the Working  Piece Selection Mechanisms  Advantages  Some Facts  Conclusion  References
  • 3. BitTorrent is a peer to peer (P2P) file transferring system and was designed in April 2001 by Brahm Cohen and then maintained by Cohen’s company BitTorrent, Inc.  Unlike other traditional download methods, BitTorrent maximizes transfer speed by locating the pieces of the file you want and downloading these pieces simultaneously from people who already have them.  This process makes popular and very large files download much faster .  This is more popular and efficient file transferring system than the traditional client – server system.
  • 4.
  • 5. Client-server computing or networking is an application architecture that partitions the work loads between service providers (servers) and service requesters, called clients.  Millions want to download the same popular huge files 1. Softwares 2. Media (the real example!)  You open a Web page and click a link to download a file to your computer.  The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer.  The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (Hypertext Transfer Protocol).
  • 7. Client-server model fails if  Single server fails or  Can’t afford to deploy enough servers  Another issue is huge Traffic Overload in the server(s) which is the central point of failure.
  • 8. BitTorrent is a peer-to-peer file sharing protocol allowing users to distribute large amounts of data without putting the level of strain on their computers that would have been needed for standard Internet hosting.  Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want to download. Because these are ordinary computers like yours, as opposed to servers;they are called peers.
  • 9. tracker Peer  Each peer is directly connected to other peer.  The file to be transferred is divided into equal size of pieces.  Peer uploads the pieces it has while downloads any piece it can get from other peers.  These pieces are downloaded from different peers parallely.  It is used for large file transfer.
  • 10. No central point of failure ✓E.g. the internet & the web do not have a central point of failure. ✓Most internet & web services use the client-server model (e.g. HTTP) so a specific service does have a central point of failure. Scalability ✓Since every peer is alike, it is possible to add more peers to the system and scale to larger networks.
  • 11. Like most Internet phenomena, Bit Torrent has its own jargon. Some of the most common terms related to BitTorrent include:  BitTorrent Client Software  .torrent file or METAinfo file  Leechers  Peers  Seeds  Swarm  Tracker  Piece (of a file)  Torrent index server
  • 12.  Client S/W – program which resides on a peers’ computer and implements the BitTorrent protocol.  It controls all operations such as : reads information present in the .torrent file.  After reading .torrent file it sends message to tracker to send the list of peers and then it connects to peers.  It keeps all record of the file which is receiving.
  • 13. It has extension as .torrent and downloaded from torrent index server.  Contains the information that points to the actual file and the people who are sharing it.  The main contents of the .torrent file are -  Name/size/date for each .torrent file.  # no. of pieces of each files.  SHA-1 hash of each file for maintaining the data integrity.  Trackers associated with that torrent.
  • 14. These are the clients who have entire file.  They upload pieces of the file to other peers.  These are the clients who do not have the entire file.  They upload the parts of file they have at the same time when they download other parts.  These are the clients who are responsible for the file transfer.  Peers = leechers + seeds.  Downloading speed of any file using torrent depends on number of peers.
  • 15. 1 2 3 4 5 6 7 8  The file which is to be downloaded is divided into similar size of pieces.  Several pieces are downloaded parallelly.  Each piece is downloaded from different peers.
  • 16. Tracker is the server that manages the BitTorrent file transfer process.  It provides all list of peers which are associated with a particular torrent.  These trackers are mentioned in the Metafile.  Client S/W sends request to the tracker to send the list of peers and after getting the complete list of peers client s/w connects to the peers.  The group of computers that are simultaneously sending (uploading) or receiving (downloading) the same file is called Swarm.
  • 17. Source of .torrent files  Torrent search engine
  • 18.
  • 20. PEERS
  • 21.
  • 22. Initial seeder chops file into many pieces.  Leecher first locates the .torrent file that directs it to a tracker, which tells which other peers are downloading that file. As soon as a leecher downloads pieces of the file, replicas of the pieces are created. More downloads mean more replicas are available.  As soon as a leecher has a complete piece, it can potentially share it with other downloaders. Eventually each leecher becomes a seeder by obtaining all the pieces, and assembles the file. Finally it verifies the checksum using SHA-1.
  • 23. 1. Seeder generates a torrent file  Uploads torrent to a web server.  Seeder – A client sharing 100% of the shared file.
  • 24. 2. The seeder notifies the tracker that it is sharing the file described in the torrent file.
  • 25. 3. A leecher downloads the torrent file from some torrent index server.  Leecher – client which has some parts and downloads the other parts of the shared file from the seeder.
  • 26. 4.The leecher (client) connects to the tracker(s) specified in the torrent metafile.  The tracker returns a list of other peers who are sharing the file.
  • 27. 5. The leecher connects to its peers to retrieve pieces of the files.
  • 28. A machine with a complete copy (the seed) can distribute incomplete pieces to Seed multiple peers Peers exchange different pieces of As soon as the user has the file with one a piece of the file on his another until they machine, he can assemble a whole become a source of that piece to other peers, helping speed download
  • 30. torrent: group of tracker: tracks peers peers exchanging in torrent; provides chunks of a file tracker list trading chunks torrent index server: peer search for torrents; provides .torrent file
  • 31. The order in which pieces are selected by different peers is critical for good performance.  If an inefficient policy is used, then peers may end up in a situation where each has all identical set of easily available pieces, and none of the missing ones.  If the original seed is prematurely taken down, then the file cannot be completely downloaded! What are ―good policies?‖  Some piece(chunk) selection mechanisms are-  Rarest Piece First  General rule  Random First Piece  Special case, at the beginning  Endgame Mode  Special case, at the end
  • 32. Initially, a peer has nothing to trade.  So it is important to get a complete piece as early as possible.  Policy is to select a random piece of the file and download it.
  • 33. Determine the pieces that are most rare among your peers, and download those first.  This ensures that the most commonly available pieces are left till the end to download.  It also ensures that a large variety of pieces are downloaded from the seed.
  • 34. Near the end, missing pieces are requested from every peer containing them. When the piece arrives, the pending requests for that piece are cancelled.  This ensures that a download is not prevented from completion due to a single peer which has a slow transfer rate.  Some bandwidth is wasted, but in practice, this is not too much.
  • 35. Once download is complete, a peer has no download rates to use for comparison nor has any need to use them. The question is, which nodes to upload to?  Policy: Upload to those peers with the best upload rate. This ensures that pieces get replicated faster, and new seeders are created fast.
  • 36. BitTorrent is an open-source program that offers a spyware- and nuisance-free installation.  Allows users to share large amounts of data in a short span of time.  Discourages ―freeloading‖ or ―free riders‖ (those who only download but never upload) by rewarding the fastest uploaders.  The more popular a file is — the more people want a copy of it — the faster it can be downloaded, because there are lots of replicas already present in the system.
  • 37. Bit torrent is responsible for roughly 27-55% of all internet traffic and 45-78% of P2P traffic.  As of 2011 bitTorrent has more than 100 million users and grater share of bandwidth than Netflix and Hulu combined.  THE PIRATE BAY: Who in september 2008 had 69,12,029 visits and 21,40,325 unique visitors making it 109th most popular website  Another popular torrent tracker isoHunt claims to have 9857 TB of data
  • 38.  BitTorrent is a great protocol with its huge potential to distribute large files very easily.  Bit Torrent is conceived as a way of distributing large and popular file more quickly, efficiently, and reliably.  As a P2P file sharing system BitTorrent is quickly becoming the method of choice for publishing and sharing large files across the internet.
  • 39. http://in.tech.yahoo.com  http://www.bittorrent.com  http://www.wikipedia.org/bittorrent  http://computer.howstuffworks.com/bittorrent.htm http://www.bittorrent.org/protocol.html  http://www.ccs.neu.edu/home/als/termpaper.pdf  http://www.bittorrent.org/beps/bep_0003.html  http://radar.oreilly.com/archives/2005/10/hbo_attac king_bittorrent.html  http://www.ccs.neu.edu  http://www.bittorrent.org  http://radar.oreilly.com  http://in.tech.yahoo.com/041103/137/2ho4i.html