SlideShare a Scribd company logo
1 of 15
TORRENTS
TORRENTS
   What is Torrent

   The pyramid theory

   How Torrenting Works

   Trackers

   Peers

   Ratio and the Fair Share Policy

   Torrent Culture

   Controversy
THE PYRAMID THEORY


1   TEAM WORK
THE PYRAMID THEORY


2   SINGLE MAN
HOW TORRENTING WORKS

   All torrenting takes place using a torrent program. Examples of torrenting
    programs include uTorrent, Azureus and the original Bit Torrent. These
    programs allow your computer to send and receive files on a specific port and
    interpret the data from .TORRENT files. .TORRENT files contain all of the
    information on a specific torrent--who started it, what the torrent contains, and
    how to download and upload information corresponding to that torrent. When
    the .TORRENT file is opened by a torrent program, the torrent program
    connects to other users who have portions of the torrent and downloads the
    torrent from them. Upon receiving portions of the torrent, your computer
    becomes able to upload (or "seed") the file to other users. Once the torrent
    program has received all portions of the torrent, it assembles them into a file
    using the directions found in the .TORRENT file.
TRACKERS

   Torrenting begins and ends at large networking servers known as
    trackers. Your torrent program (or "client") connects to these servers
    using a list found in the original .TORRENT file. Trackers have a list of all
    users connected to it and which files they're able to seed. Your client
    picks from these users and downloads data from them accordingly. Upon
    connecting to the tracker, it registers your computer and the files that you
    yourself are able to seed. Trackers also keep logs of one's ratio--how
    much your computer uploads, measured against how much your
    computer downloads--and determines the amount of bandwidth you
    receive.
TRACKERS
             TRACKER SERVER




           CLIENTS
RATIO AND THE FAIR SHARE POLICY

   All torrent trackers incorporate a "fair share" policy, which restricts or
    grants access to bonus torrent bandwidth accordingly. Fair share policies
    basically say that if you're not seeding as much as you are downloading
    ("leeching"), you will receive less bandwidth from the torrent. Conversely,
    if your seed-leech ratio is high, you will download files from the torrent
    much quicker than someone with a low ratio. Priority on the tracker is also
    given to those with higher ratios. This means they will connect to other
    users on the server ("peers") more quickly.
PEERS
   Peers are clients that have high speed internet connection ,
    Or clients that Upload more they download, Or when the
    seed-leech is high


                      PEERS SERVER                 NORMAL SERVER




      PEERS CLIENTS


                                                     NORMAL CLIENTS
TORRENT CULTURE
   A large culture has sprung up around torrenting. Found in websites all
    over the Internet, these cultures generally promote fair share policies and
    file-sharing honesty, and discourage copyright infringement or file theft.
    Generally, these communities are invite-only. Open membership is only
    granted at specific times, generally once a month. Anyone wishing to join
    who doesn't want to wait until membership becomes open must secure an
    invite from someone else who's already part of the community. Other
    torrent sites are completely private. For example, the torrent site known
    as "What.CD" requires potential users to solve several puzzles to gain
    membership, and then undergo an interview and a speed test (to
    determine whether or not a user can upload efficiently) before
    acceptance.
TORRENT CULTURE



 PUZZLE           What.CD website
CONTROVERSY ABOUT TORRENTS
   Unfortunately, since its inception, peer-to-peer torrenting has been highly
    controversial. Because trackers cannot and do not keep track of what
    information can be found in their torrents, the potential for copyright
    infringement, file theft and even child pornography exists. Organizations
    pursue legal activity against torrent trackers and users every day under
    claims of copyright infringement. However, despite all of the controversy,
    torrenting remains a very popular way to transfer large amounts of data
    from and to users at a very quick speed. Many computer companies, such
    as Blizzard Entertainment, even use torrenting to allow users to download
    their software.
TORRENT CLIENTS




  µTORRENT
QUESTIONS


        FFFF
   FIRST FIVE FOR FREE
THANKS




   E-mail: e.ahmedhag@gmail.com

More Related Content

What's hot

Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
Avula Jagadeesh
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
Mohd253
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
Avula Jagadeesh
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
Harsht2888
 

What's hot (20)

BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Torrent
TorrentTorrent
Torrent
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 

Viewers also liked

Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]
hem
 
Report of PILL CAMERA
Report of PILL CAMERAReport of PILL CAMERA
Report of PILL CAMERA
razaemohammed
 

Viewers also liked (18)

From Meme To Social Fabric
From Meme To Social FabricFrom Meme To Social Fabric
From Meme To Social Fabric
 
Debugging and Profiling PHP Applications
Debugging and Profiling PHP ApplicationsDebugging and Profiling PHP Applications
Debugging and Profiling PHP Applications
 
Iridium
IridiumIridium
Iridium
 
Artificial Vision Using System No Blinds In The World
Artificial Vision Using System No Blinds In The WorldArtificial Vision Using System No Blinds In The World
Artificial Vision Using System No Blinds In The World
 
Rice puller pdf home page ready to paste
Rice puller pdf home page ready to pasteRice puller pdf home page ready to paste
Rice puller pdf home page ready to paste
 
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL ...
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL     ...RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL     ...
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL ...
 
Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]
 
Basic overview of an artificial eye
Basic overview of an artificial eyeBasic overview of an artificial eye
Basic overview of an artificial eye
 
Artificial eye
Artificial eyeArtificial eye
Artificial eye
 
Pill camera ppt
Pill camera pptPill camera ppt
Pill camera ppt
 
artificial eye
artificial eyeartificial eye
artificial eye
 
Report of PILL CAMERA
Report of PILL CAMERAReport of PILL CAMERA
Report of PILL CAMERA
 
10 myths about psychology
10 myths about psychology10 myths about psychology
10 myths about psychology
 
I'm a smartphone addict
I'm a smartphone addictI'm a smartphone addict
I'm a smartphone addict
 
Iridium satellite system
Iridium satellite systemIridium satellite system
Iridium satellite system
 
12 Time Management Techniques
12 Time Management Techniques12 Time Management Techniques
12 Time Management Techniques
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Can We Assess Creativity?
Can We Assess Creativity?Can We Assess Creativity?
Can We Assess Creativity?
 

Similar to Torrents

Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
Sanjay Ravishankar
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
Altacit Global
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
ssanda3
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
Srikanth Vanama
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
gkmv
 

Similar to Torrents (20)

Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachers
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Torrents

  • 2. TORRENTS  What is Torrent  The pyramid theory  How Torrenting Works  Trackers  Peers  Ratio and the Fair Share Policy  Torrent Culture  Controversy
  • 4. THE PYRAMID THEORY 2 SINGLE MAN
  • 5. HOW TORRENTING WORKS  All torrenting takes place using a torrent program. Examples of torrenting programs include uTorrent, Azureus and the original Bit Torrent. These programs allow your computer to send and receive files on a specific port and interpret the data from .TORRENT files. .TORRENT files contain all of the information on a specific torrent--who started it, what the torrent contains, and how to download and upload information corresponding to that torrent. When the .TORRENT file is opened by a torrent program, the torrent program connects to other users who have portions of the torrent and downloads the torrent from them. Upon receiving portions of the torrent, your computer becomes able to upload (or "seed") the file to other users. Once the torrent program has received all portions of the torrent, it assembles them into a file using the directions found in the .TORRENT file.
  • 6. TRACKERS  Torrenting begins and ends at large networking servers known as trackers. Your torrent program (or "client") connects to these servers using a list found in the original .TORRENT file. Trackers have a list of all users connected to it and which files they're able to seed. Your client picks from these users and downloads data from them accordingly. Upon connecting to the tracker, it registers your computer and the files that you yourself are able to seed. Trackers also keep logs of one's ratio--how much your computer uploads, measured against how much your computer downloads--and determines the amount of bandwidth you receive.
  • 7. TRACKERS TRACKER SERVER CLIENTS
  • 8. RATIO AND THE FAIR SHARE POLICY  All torrent trackers incorporate a "fair share" policy, which restricts or grants access to bonus torrent bandwidth accordingly. Fair share policies basically say that if you're not seeding as much as you are downloading ("leeching"), you will receive less bandwidth from the torrent. Conversely, if your seed-leech ratio is high, you will download files from the torrent much quicker than someone with a low ratio. Priority on the tracker is also given to those with higher ratios. This means they will connect to other users on the server ("peers") more quickly.
  • 9. PEERS  Peers are clients that have high speed internet connection , Or clients that Upload more they download, Or when the seed-leech is high PEERS SERVER NORMAL SERVER PEERS CLIENTS NORMAL CLIENTS
  • 10. TORRENT CULTURE  A large culture has sprung up around torrenting. Found in websites all over the Internet, these cultures generally promote fair share policies and file-sharing honesty, and discourage copyright infringement or file theft. Generally, these communities are invite-only. Open membership is only granted at specific times, generally once a month. Anyone wishing to join who doesn't want to wait until membership becomes open must secure an invite from someone else who's already part of the community. Other torrent sites are completely private. For example, the torrent site known as "What.CD" requires potential users to solve several puzzles to gain membership, and then undergo an interview and a speed test (to determine whether or not a user can upload efficiently) before acceptance.
  • 11. TORRENT CULTURE PUZZLE What.CD website
  • 12. CONTROVERSY ABOUT TORRENTS  Unfortunately, since its inception, peer-to-peer torrenting has been highly controversial. Because trackers cannot and do not keep track of what information can be found in their torrents, the potential for copyright infringement, file theft and even child pornography exists. Organizations pursue legal activity against torrent trackers and users every day under claims of copyright infringement. However, despite all of the controversy, torrenting remains a very popular way to transfer large amounts of data from and to users at a very quick speed. Many computer companies, such as Blizzard Entertainment, even use torrenting to allow users to download their software.
  • 13. TORRENT CLIENTS µTORRENT
  • 14. QUESTIONS FFFF FIRST FIVE FOR FREE
  • 15. THANKS  E-mail: e.ahmedhag@gmail.com