Sunteți pe pagina 1din 35

m 

Md Zeeshan Ahmed
(07K31A0535)
CSE
Ê 
R dhat is BitTorrent Protocol?
R Terminologies
R How it works?
R How to download files using Torrent?
R Torrent search sites
R Torrent clients
R Strengths and Drawbacks
R Technologies based on Bit Torrent
R Legal Issues
d  m 
R Created by Brahm Cohen in 2001
R A peer-to-peer file transfer protocol
R Extremely popular today
] ]  

R Client-Server Model
R Central server store the files
R Large traffic to the server will lead to slow
downloads
R Shortcomings of FTP makes people to
think over traditional FTP
] ]  

d   
R P2P(Peer To Peer) file transfer protocol
R Transfer of large files
R Files are shared by many users
R Active participation of all users
R Huge success in file sharing domain since
2003
R Download speed increases as number of
persons downloading increases
×
R To share the data using BitTorrent we must
R Have Tracker server, a file with .'torrent'
extension, complete copy of the file being
shared
R .torrent file contains data which is essential for
the protocol to function- file length, file name,
information about the tracker
R dhen we open .'torrent' file in client, it will
connect to the tracker and start downloading
  
 

R Torrent
R Peer
R Seed
R Leecher
R Tracker
R Swarm

R This refers to the small metadata file you
receive from the web server (the one that
ends in .torrent.)
R Metadata here means that the
filecontains information about the data
you want to download, not the data itself.

RA peer is another computer on the
internet that you connect to and transfer
data.
R Generally a peer does not have the
complete file.
2
RA computer that has a complete copy of
a certain torrent.
R Once a client downloads a file
completely, he can continue to upload
the file which is called as seeding. This is a
good practice in the BitTorrent world since
it allows other users to have the file easily.
a 
R They are similar to peers in that they won·t
have the complete file.
R But the main difference between the two
is that a leech will not upload once the
file is downloaded.

RA server on the Internet that acts to
coordinate the action of BitTorrent clients.
R The clients are in constant touch with this
server to know about the peers in the
swarm.
2
R The group of machines that are
collectively connected for a particular
file.
×  d

R Files are broken into pieces.
R Users each download different pieces from
the original uploader (seed).
R Users exchange the pieces with their peers
to obtain the ones they are missing.
R Thisprocess is organized by a centralized
server called the Tracker.
Ô  
deb Track
Server er

C
A
Peer
Peer B [Seed]
[Leech]
Peer
[Leech]
  
deb Track
Server er

C
A
Peer
Peer
B [Seed]
[Leech]
Peer
[Leech]
  
deb Tracker
Server

C
A
Peer
Peer
B [Seed]
[Leech]
Peer
[Leech]
ë 
deb Tracker
Server

C
A
Peer
Peer B [Seed]
[Leech]
Peer
[Leech]
 
deb Tracker
Server

C
A
Peer
Peer
B [Seed]
[Leech]
Peer
[Leech]
ÿ  
  
deb Tracker
Server

C
A
Peer
Peer
B [Seed]
[Leech]
Peer
[Leech]
÷   

deb Tracker
Server

C
A
Peer
Peer B [Seed]
[Leech]
Peer
[Leech]
  

 

R IRTUALISATION
 
  
R Firstdownload a Torrent client to do us the
job of downloading the files
R Then, go to a good Torrent search engine
R Download the file with '.torrent' extension
R Open it in your client
R If the download starts with the progress
bar moving, take a deep breath!
 
R uze (www.vuze.com)

R uTorrent (www.utorrent.com)

R BitTorrent (www.bittorrent.com)
@  
Ê 
 
R http://www.torrentz.com/

R http://www.piratebay.org/

R http://www.mininova.com/
2  
R Better bandwidth utilization
R Never before speeds.
R Up to 7 MB/s from the Internet.
R Limit free riding ² tit-for-tat
R Limit leech attack ² coupling upload &
download
R Spurious files not propagated
R Ability to resume a download
3 

R Smallfiles ² latency, overhead
R Random list of peers - naive
R Scalability
R Millions of peers ² Tracker behavior (uses
1/1000 of bandwidth)
R Single point of failure
R Robustness
R System progress dependent on altruistic
nature of seeds (and peers)
R Malicious attacks and leeches
 
 
 
R Distributed trackers
R deb seeding
R RSS feeds
R Throttling and encryption
R Multitracker
R Decentralized keyword search
a
 
R Publishers of BitTorrent metafiles violate
copyrights by linking to copyrighted material
without the authorization of copyright holder
R arious jurisdictions have pursued legal action
against websites that host BitTorrent trackers.
R High-profile examples include the closing of
Suprnova.org, Torrentspy, LokiTorrent,
Mininova and OiNK.cd.
× 
D
R Osama Anjum ´Master Downloaderµ CSE
R dikipedia
R Rajnikaant

S-ar putea să vă placă și