SlideShare una empresa de Scribd logo
1 de 37
P2P Networks and Piracy
P2P = Peer to Peer (“Peer” – Rhymes with “beer”) Peers = Equals/People belonging to the same 		category A peer-to-peer computer network is a network that relies on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively low number of servers. 							- Wikipedia
P2P is all about sharing resources like Your CPU Processing Time Your bandwidth Your disk space
	Grid computing […] performs higher throughput computing by taking advantage of many networked computers to model a virtual computer architecture.                                                                     - Wikipedia Grid computing is just sharing processing power across a network. P2P evolved from the concept of grid computing as a means to share files between friends.
Client – Server Model                   Grid Computing                    P2P: Client = Server
                                              Client Server                                              Download                             P2P
Peers: 	A peer is another computer on the internet that you connect to and transfer data. Torrent: 	Usually this refers to the small metadata file you receive from the web server or tracker you are downloading files from. Seeders/seeds: A computer that has a complete copy of a certain torrent. Once your client finishes downloading, it will remain open until you click the Finish/Stop button (or otherwise close it.) This is known as being a seed or seeding. Swarm: 	The group of machines that are collectively connected for a particular file. For example, if you start a BitTorrent client and it tells you that you're connected to 10 peers and 3 seeds, then the swarm consists of you and those 13 other people. Tracker: 	A server on the Internet that acts to coordinate the action of BitTorrent clients.
Ratio: 	In some torrent sites, you are expected to maintain a download to upload ratio. Client: 	The program that enables p2p file sharing via the BitTorrent protocol. Examples of clients include µTorrent and Vuze. Hash: 	The hash is a string of alphanumeric characters in the .torrent file that the client uses to verify the data that is being transferred. Scrape: 	This is when a client sends a request to the tracking server for information about the statistics of the torrent. Announce: A client announces that it wants to join the swarm and that server should add it to the peers in that swarm Piece: This refers to the torrented files being divided up into equal specific sized pieces
BASCAP Business Action to Stop Counterfeiting and Piracy  Established in 2005 by the International Chamber of Commerce (ICC). BASCAP claims European Union countries could lose €240 billion ($324.6 billion) in revenue and 1.2 million jobs by 2015.  It calculated a €10 billion in revenue losses and more than 185,000 jobs lost due to piracy in 2008. P2P file-sharing networks are now carrying 3.3 exabytes per month and will continue to grow at a moderate pace with a CAGR of 18 percent from 2008 to 2013. Source: http://arstechnica.com/tech-policy/news/2010/03/sailors-beware-p2p-piracy-will-sink-your-jobs-by-2015.ars
thepiratebay.org The Pirate Bay is a Swedish website that indexes BitTorrent (.torrent) files. The torrents are organized into categories: "Audio", "Video", "Applications", "Games", "Other" and "Porn" Ranked as world’s 99th most popular website. Was put on trial by the MPAA in 2009 for copyright infringement. Founders were sentenced to one year in prison and fined $3.5 million.                                                                                                                                                                       Source: Wikipedia
Popular P2P File sharing clients
P2P Client Marketshare as of 2008                                                                                                                                           Source: http://torrentfreak.com/p2p-statistics-080426/
Video on downloading songs using Limewire.
Video on downloading a movie using utorrent
Darknetfilesharing A darknet refers to any type of closed, private group of people communicating. These are usually private trackers such as Iptorrents.com, revolutiontt.net, bitme.org, etc. Private peer-to-peer systems are P2P systems that allow only mutually trusted peers to participate. There is a great emphasis on secrecy and privacy in such websites.
Piracy Support Groups
Video against piracy
Video supporting piracy
Thank You!

Más contenido relacionado

La actualidad más candente

Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RSanjay Ravishankar
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using SnortRick Wanner
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
Basics of Internet and WWW
Basics of Internet and WWWBasics of Internet and WWW
Basics of Internet and WWWSagar Rai
 
internet-130110022841-phpapp01
internet-130110022841-phpapp01internet-130110022841-phpapp01
internet-130110022841-phpapp01Abdul Musabbir
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 versionJohan Koren
 
The Internet Revolution
The Internet RevolutionThe Internet Revolution
The Internet Revolutionhperretta
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internetcoastalgraphics
 
ICT, Internet and WWW
ICT, Internet and WWWICT, Internet and WWW
ICT, Internet and WWWIndayManasseh
 

La actualidad más candente (20)

Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
(182482036) Zobyeda
(182482036) Zobyeda(182482036) Zobyeda
(182482036) Zobyeda
 
Basics of Internet and WWW
Basics of Internet and WWWBasics of Internet and WWW
Basics of Internet and WWW
 
internet-130110022841-phpapp01
internet-130110022841-phpapp01internet-130110022841-phpapp01
internet-130110022841-phpapp01
 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 version
 
The Internet Revolution
The Internet RevolutionThe Internet Revolution
The Internet Revolution
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
ICT, Internet and WWW
ICT, Internet and WWWICT, Internet and WWW
ICT, Internet and WWW
 

Similar a P2P Networks and the Piracy Debate

Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentAltacit Global
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4raeshu
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrentgkmv
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology Parth Akbari
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSssanda3
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptxHananShk
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrentSrikanth Vanama
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsLorin Olsen
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolD bipul lomga
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networkssanjoysanyal
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 

Similar a P2P Networks and the Piracy Debate (20)

Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Peer To Peer.pptx
Peer To Peer.pptxPeer To Peer.pptx
Peer To Peer.pptx
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
P2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution SystemsP2P: Grid-oriented Distribution Systems
P2P: Grid-oriented Distribution Systems
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Peerto Peer Networks
Peerto Peer NetworksPeerto Peer Networks
Peerto Peer Networks
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

P2P Networks and the Piracy Debate

  • 2. P2P = Peer to Peer (“Peer” – Rhymes with “beer”) Peers = Equals/People belonging to the same category A peer-to-peer computer network is a network that relies on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively low number of servers. - Wikipedia
  • 3. P2P is all about sharing resources like Your CPU Processing Time Your bandwidth Your disk space
  • 4.
  • 5.
  • 6. Grid computing […] performs higher throughput computing by taking advantage of many networked computers to model a virtual computer architecture. - Wikipedia Grid computing is just sharing processing power across a network. P2P evolved from the concept of grid computing as a means to share files between friends.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Client – Server Model Grid Computing P2P: Client = Server
  • 12.
  • 13. Client Server Download P2P
  • 14. Peers: A peer is another computer on the internet that you connect to and transfer data. Torrent: Usually this refers to the small metadata file you receive from the web server or tracker you are downloading files from. Seeders/seeds: A computer that has a complete copy of a certain torrent. Once your client finishes downloading, it will remain open until you click the Finish/Stop button (or otherwise close it.) This is known as being a seed or seeding. Swarm: The group of machines that are collectively connected for a particular file. For example, if you start a BitTorrent client and it tells you that you're connected to 10 peers and 3 seeds, then the swarm consists of you and those 13 other people. Tracker: A server on the Internet that acts to coordinate the action of BitTorrent clients.
  • 15. Ratio: In some torrent sites, you are expected to maintain a download to upload ratio. Client: The program that enables p2p file sharing via the BitTorrent protocol. Examples of clients include µTorrent and Vuze. Hash: The hash is a string of alphanumeric characters in the .torrent file that the client uses to verify the data that is being transferred. Scrape: This is when a client sends a request to the tracking server for information about the statistics of the torrent. Announce: A client announces that it wants to join the swarm and that server should add it to the peers in that swarm Piece: This refers to the torrented files being divided up into equal specific sized pieces
  • 16. BASCAP Business Action to Stop Counterfeiting and Piracy  Established in 2005 by the International Chamber of Commerce (ICC). BASCAP claims European Union countries could lose €240 billion ($324.6 billion) in revenue and 1.2 million jobs by 2015.  It calculated a €10 billion in revenue losses and more than 185,000 jobs lost due to piracy in 2008. P2P file-sharing networks are now carrying 3.3 exabytes per month and will continue to grow at a moderate pace with a CAGR of 18 percent from 2008 to 2013. Source: http://arstechnica.com/tech-policy/news/2010/03/sailors-beware-p2p-piracy-will-sink-your-jobs-by-2015.ars
  • 17. thepiratebay.org The Pirate Bay is a Swedish website that indexes BitTorrent (.torrent) files. The torrents are organized into categories: "Audio", "Video", "Applications", "Games", "Other" and "Porn" Ranked as world’s 99th most popular website. Was put on trial by the MPAA in 2009 for copyright infringement. Founders were sentenced to one year in prison and fined $3.5 million. Source: Wikipedia
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Popular P2P File sharing clients
  • 24. P2P Client Marketshare as of 2008 Source: http://torrentfreak.com/p2p-statistics-080426/
  • 25. Video on downloading songs using Limewire.
  • 26.
  • 27. Video on downloading a movie using utorrent
  • 28.
  • 29. Darknetfilesharing A darknet refers to any type of closed, private group of people communicating. These are usually private trackers such as Iptorrents.com, revolutiontt.net, bitme.org, etc. Private peer-to-peer systems are P2P systems that allow only mutually trusted peers to participate. There is a great emphasis on secrecy and privacy in such websites.
  • 30.
  • 31.
  • 34.
  • 36.

Notas del editor

  1. A file transfer protocol based on a connection of equals
  2. When a user wishes to download a file from a website, the submit a HTTP GET request. This request for the file uses a single TCP socket, and communicates with a single server which transfers the entire file. By contrast, a P2P protocol creates TCP connections with multiple hosts and makes many small data requests to each. The P2P client then combines the chunks to recreate the file. A single file host will usually have limited upload capacity, but connecting to many servers simultaneously allows for higher file transfers, and disperses the costs associated with data transfers amongst many peers. 
  3. Client downloads some files. Processes it in ur system and then uploads it back to the wcgsercer. They give u points for the amount of processing time u’ve contributed.
  4. There are no rules. Everything is random, almost chaotic.
  5. Compounded Annual Growth Rate
  6. SSL = secure sockets layer, private trackers, can’t download unless u register which u cant unless ur invited.Transfer layer protocol