• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Bittorrent
 

Bittorrent

on

  • 1,196 views

it contains 20 slides full of pics n related information about bittorrent,its implementation,vulnerabilities and remedies and importance in practical life..Moreover,the facilities for small software ...

it contains 20 slides full of pics n related information about bittorrent,its implementation,vulnerabilities and remedies and importance in practical life..Moreover,the facilities for small software developers..

Statistics

Views

Total Views
1,196
Views on SlideShare
1,183
Embed Views
13

Actions

Likes
0
Downloads
112
Comments
0

2 Embeds 13

http://contentbuilder.merlot.org 11
http://www.slideshare.net 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Good morning everybody..i am abc of CSE3rd YR n I am here to give a seminar on a protocol named bittorrent along with my friends deba,..,…
  • Discuss the history n the reasons behind the invention of bittorrent including the faults in other protocols and DAP..dnt discuss d way bittorrent works..
  • Discuss about the usage of this protocol over other protocols
  • Mention about the popularity of P2P file transfer mode over other protocols..page(1-5)
  • Consider a HTTP server and explain the client-server paradign of it with respect to the above snapshot
  • First define webserver,seed,leecher,tracker,.torrent file and then only go ahead to explain the mechanism behind file transfer..skip d content of .torrent file.. Discuss about the various terms and their significance..how the connection is established b/w seed and client
  • Stress upon packetisation and sequencing of packets from different peers,seeds and leechers
  • Discuss the mechanism in detail by assuming a data is divided into 4-5 packets..data can be a software package
  • Discuss about piece,block,sub-pieces and error checking mechanism with hash in detail and show the hash in next slide..
  • Discuss about piece,block,sub-pieces and error checking mechanism with hash in detail

Bittorrent Bittorrent Presentation Transcript

  • Presented by ABHISHEK ROY DEBASISH MUKHERJEE SUMAN HALDER BHANU PRATAP JHA
  • PROTOCOLS For data transfer over the network, protocols are used( to ensure interoperability) .Some of them are HTTP,FTP,SMTP etc..BitTorrent is also a kind of protocol..designed by Bram Cohen in 2001
  • BitTorrent P2P
    • By the end of 2004, BitTorrent (BT) was accounting for as much as 30% of all Internet traffic.
      • P2P traffic is 60% of all Internet traffic
  • P2P traffic is rising
  • Server Distributing a Large File d 1 F bits d 2 d 3 d 4 upload rate u s Download rates d i Internet
  • BitTorrent Approach
  • File transfer 1 2 3 4 5 6 7 8
  • Peers Help Distributing a Large File d 1 F bits d 2 d 3 d 4 upload rate u s Download rates d i Internet u 1 u 2 u 3 u 4 Upload rates u i {1,2,3,4,5} {1,2,3,4,5,6,7,8} {1,2,3,4} C1 C2 {1,2,3} {1,2} C3 C4 Clients c i
  • Piece Selection and Bencoding
    • Random First Piece
    • Rarest First Piece
    • Endgame
  • Error detection mechanism .torrent file contains hash which works as checksum.After downloading a file it is checked against the hash given within .torrent file,if mismatch occurs,then the downloaded file is corrupted ..
  • Chocking When a peer receives a request for a piece from another peer, it can refuse to transmit that piece. If this happens, the peer is said to be choked
  • BT: publishing a file Web Server Initial seeder Tracker Downloader: A Seeder: B Downloader: C Harry Potter.torrent
  • Sub protocols
    • 1 . HTTP Protocol
    • 2. PWP: Peer Wire Protocol
  • Operation
  • Why is it Important?
    • It is used by millions of file sharers across the globe .
    • Corporations and open source companies use it to save bandwidth .
  • Bandwidth Shaping BitTorrent is usually used to transfer large sized files due to which the traffic over the ISPs increase to a large extent. To avoid such exploding traffic on their servers many ISPs have started to avoid the traffic caused by BitTorrent
  • Pollution Attack
    • Attacker requests all chunks from swarm and wastes their upload bandwidth.
    1>The peers receive the peer list from the tracker. 2>One peer contacts the attacker for a chunk of the file. 3>The attacker sends back a false chunk. 4>Attacker requests all chunks from swarm and wastes their upload bandwidth.
  • DDOS Attack
  • Solutions
    • Encrypt the packets so that the filters that sniff packets will not be able to detect such packets belonging to BitTorrent
    • The peers which perform pollution attacks are identified by tracing their Ips
    • Solution to DDOS attack is to have clients parse the response from the tracker
  • Conclusion
    • BitTorrent pioneered mesh-based file distribution that effectively utilizes all the uplinks of participating nodes.
    • BitTorrent’s application in this information sharing age is almost priceless.
    • BitTorrent can serve as an effective media streaming tool as well.