SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
BitTorrent

       Mahesh Mohan M.U, CS4
Outline


   What is BitTorrent Protocol?, How it works?
   Terminologies
   How to download files using Torrent?
          Torrent search sites
          Torrent clients
FTP(File Transfer protocol)
   Client-Server Model
   Central server store the files
   Large traffic to the server will lead to download
    failure
   Shortcomings of FTP makes people to think
    over traditional FTP
What is BitTorrent?


   P2P(Peer To Peer) file transfer protocol
   Transfer of large files
   Files are shared by many users
   Active participation of all users
   Huge success in file sharing domain since 2003
How it works?

   To share the data using BitTorrent we must
    have:-
   Tracker server, a file with .'torrent' extension,
    complete copy of the file being shared
   .torrent file conatins data which is essential for
    the protocol to function- file length, file name,
    information about the tracker
   When we open .'torrent' file in client, it will
    connect to the client and start downloading
BitTorrent Network
Terminology

   Torrent
   Peer
   Seed
   Tracker
   Leecher
   Swarm
Torrent


   This refers to the small metadata file you
    receive from the web server (the one that ends
    in .torrent.) Metadata here means that the file
    contains information about the data you want to
    download, not the data itself.
Peer

   A peer is another computer on the internet that
    you connect to and transfer data. Generally a
    peer does not have the complete file.
Leecher

   They are similar to peers in that they won’t
    have the complete file. But the main difference
    between the two is that a leech will not upload
    once the file is downloaded.
Seed

   A computer that has a complete copy of a
    certain torrent. Once a client downloads a file
    completely, he can continue to upload the file
    which is called as seeding. This is a good
    practice in the BitTorrent world since it allows
    other users to have the file easily.
Tracker

   A server on the Internet that acts to coordinate
    the action of BitTorrent clients. The clients are
    in constant touch with this server to know about
    the peers in the swarm.
Swarm

   The group of machines that are collectively
    connected for a particular file.
1. Download the torrent file
2. Contact the tracker
3. Tracker response
4. Peer connection
5. Peer 'A' downloads a piece
from the network
6. Piece exchange starts
7. Peers periodically contact
tracker
Visualization of the working of
BitTorrent




          Visualization
Download files using BitTorrent

   First download a Torrent client to do us the job
    of downloading the files
   Then, go to a good Torrent search engine
   Download the file with '.torrent' extension
   Open it in your client
   If the download starts with the progress bar
    moving, take a deep breath!
BitTorrent Clients


   Deluge(http://deluge-torrent.org)
   Transmission(http://transmissionbt.com)
   KTorrent(http://ktorrent.org)
   Vuze(http://azureus.sourceforge.net/)
   qBittorrent(http://www.qbittorrent.org/)
Deluge in action
Torrent search sites

   Legal Torrents
   Legit Torrents
   http://torrentz.com
   http://piratebay.org
   http://mininova.com
Thanks for hearing me patiently!
Credits


Slides created using

Powered by GNU/Linux
Operating System

Thanks Google
Picasa for pictures
Questions?

Más contenido relacionado

La actualidad más candente

Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Exposé si (enregistré automatiquement)
Exposé si (enregistré automatiquement)Exposé si (enregistré automatiquement)
Exposé si (enregistré automatiquement)Marcus Imbonghon
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Cardsourabh4u07
 
Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network ServicesMuhammadRizaHilmi
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocolsAayushi Pareek
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsAnuj Parajuli
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)Cort1026
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 

La actualidad más candente (20)

Ftp server
Ftp serverFtp server
Ftp server
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Exposé si (enregistré automatiquement)
Exposé si (enregistré automatiquement)Exposé si (enregistré automatiquement)
Exposé si (enregistré automatiquement)
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
P2P-Network.ppt
P2P-Network.pptP2P-Network.ppt
P2P-Network.ppt
 
Application layer
Application layerApplication layer
Application layer
 
Introduction to Network Applications & Network Services
Introduction to  Network Applications &  Network ServicesIntroduction to  Network Applications &  Network Services
Introduction to Network Applications & Network Services
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocols
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
File transfer protocol (ftp)
File transfer protocol (ftp)File transfer protocol (ftp)
File transfer protocol (ftp)
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
FTP
FTPFTP
FTP
 

Similar a BitTorrent

Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent ProtocolHarsht2888
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan variaMilan Varia
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RSanjay Ravishankar
 
Bit torrent explained
Bit torrent explainedBit torrent explained
Bit torrent explainedDan Miller
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSssanda3
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent ProtocolAli Habeeb
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4raeshu
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachersAbdealiVankanerwala
 

Similar a BitTorrent (20)

Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit torrent explained
Bit torrent explainedBit torrent explained
Bit torrent explained
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachers
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 

Último

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Último (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

BitTorrent

  • 1. BitTorrent Mahesh Mohan M.U, CS4
  • 2. Outline  What is BitTorrent Protocol?, How it works?  Terminologies  How to download files using Torrent? Torrent search sites Torrent clients
  • 3. FTP(File Transfer protocol)  Client-Server Model  Central server store the files  Large traffic to the server will lead to download failure  Shortcomings of FTP makes people to think over traditional FTP
  • 4. What is BitTorrent?  P2P(Peer To Peer) file transfer protocol  Transfer of large files  Files are shared by many users  Active participation of all users  Huge success in file sharing domain since 2003
  • 5. How it works?  To share the data using BitTorrent we must have:-  Tracker server, a file with .'torrent' extension, complete copy of the file being shared  .torrent file conatins data which is essential for the protocol to function- file length, file name, information about the tracker  When we open .'torrent' file in client, it will connect to the client and start downloading
  • 7. Terminology  Torrent  Peer  Seed  Tracker  Leecher  Swarm
  • 8. Torrent  This refers to the small metadata file you receive from the web server (the one that ends in .torrent.) Metadata here means that the file contains information about the data you want to download, not the data itself.
  • 9. Peer  A peer is another computer on the internet that you connect to and transfer data. Generally a peer does not have the complete file.
  • 10. Leecher  They are similar to peers in that they won’t have the complete file. But the main difference between the two is that a leech will not upload once the file is downloaded.
  • 11. Seed  A computer that has a complete copy of a certain torrent. Once a client downloads a file completely, he can continue to upload the file which is called as seeding. This is a good practice in the BitTorrent world since it allows other users to have the file easily.
  • 12. Tracker  A server on the Internet that acts to coordinate the action of BitTorrent clients. The clients are in constant touch with this server to know about the peers in the swarm.
  • 13. Swarm  The group of machines that are collectively connected for a particular file.
  • 14. 1. Download the torrent file
  • 15. 2. Contact the tracker
  • 18. 5. Peer 'A' downloads a piece from the network
  • 20. 7. Peers periodically contact tracker
  • 21. Visualization of the working of BitTorrent Visualization
  • 22. Download files using BitTorrent  First download a Torrent client to do us the job of downloading the files  Then, go to a good Torrent search engine  Download the file with '.torrent' extension  Open it in your client  If the download starts with the progress bar moving, take a deep breath!
  • 23. BitTorrent Clients  Deluge(http://deluge-torrent.org)  Transmission(http://transmissionbt.com)  KTorrent(http://ktorrent.org)  Vuze(http://azureus.sourceforge.net/)  qBittorrent(http://www.qbittorrent.org/)
  • 25. Torrent search sites  Legal Torrents  Legit Torrents  http://torrentz.com  http://piratebay.org  http://mininova.com
  • 26. Thanks for hearing me patiently!
  • 27. Credits Slides created using Powered by GNU/Linux Operating System Thanks Google Picasa for pictures