SlideShare a Scribd company logo
BIT TORRENT
THE REVOLUTION IN THE FIELD OF FILE SHARING
TALK FLOW
 WHAT IS BIT TORRENT ?
 LANGUAGE OF BIT TORRENT
 TRADITIONAL CLIENT-SERVER DOWNLOADING
 PEER TO PEER FILE SHARING
 WHAT BIT TORRENT DOES ?
 COMPLETE WORKING OF BIT TORRENT
 INSTALLING AND CONFIGURING BIT TORRENT
 DOWNLOAD THE BITTORRENT CLIENT
SOFTWARE
 CONCLUSION
WHAT ACTUALLY BITTORRENT IS?
 BitTorrent is a protocol that enables fast
downloading of large files using minimum Internet
bandwidth. It costs nothing to use and includes no
spyware or pop-up advertising.
 Unlike other download methods, BitTorrent
maximizes transfer speed by gathering pieces of the
file you want and downloading these pieces
simultaneously from people who already have them.
This process makes popular and very large files,
such as videos and television programs, download
much faster than is possible with other protocols.
Language Of Bit Torrent
Like most Internet phenomena, Bit Torrent
has its own jargon. Some of the more
common terms related to BitTorrent
include:
 Leeches - People who download files but do not
share files on their own computer with others
 Seed or seeder - A computer with a complete
copy of a BitTorrent file (At least one seed computer is
necessary for a BitTorrent download to operate.)
 Swarm - A group of computers simultaneously
sending (uploading) or receiving (downloading)
the same file.
 .torrent - A pointer file that directs your
computer to the file you want to download.
 Tracker - A server that manages the BitTorrent
file-transfer process.
Language Of Bit Torrent….
PIECES
PEERS
SPEED
coloured bars beneath all of the clients represent individual pieces
of the file.
Traditional Client-Server
Downloading
 To understand how BitTorrent works and why it is different from
other file-serving methods, let's examine what happens when you
download a file from a Web site. It works something like this:
 You open a webpage and click a link to download a file to your
computer.
 The Web browser software on your computer (the client) tells the
server(a central computer that holds the Web page and the file you
want to download) to transfer a copy of the file to your computer.
 The transfer is handled by a protocol (a set of rules), such as FTP
(File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
T
R
A
D
I
T
I
O
N
A
L
D
O
W
N
L
O
A
D
I
N
G
Peer-to-peer File Sharing
Peer-to-peer file sharing is different from traditional file
downloading. In peer-to-peer sharing, you use a software
program (rather than your Web browser) to locate
computers that have the file you want. Because these are
ordinary computers like yours, as opposed to servers, they
are called peers. The process works like this:
 You run peer-to-peer file-sharing software (for example, a
Gnutella program) on your computer and send out a
request for the file you want to download.
 To locate the file, the software queries other computers
that are connected to the Internet and running the file-
sharing software.
 When the software finds a computer that has the file you
want on its hard drive, the download begins.
Peer-to-peer File Sharing
 Others using the file-sharing software can obtain files
they want from your computer's hard drive.
 The file-transfer load is distributed between the
computers exchanging files, but file searches and
transfers from your computer to others can cause
bottlenecks.
 Some people download files and immediately disconnect
without allowing others to obtain files from their
system, which is called leeching. This limits the number
of computers the software can search for the
F
I
L
E
S
H
A
R
I
N
G
What BitTorrent Does
Unlike some other peer-to-peer downloading methods,
Bit Torrent is a protocol that offloads some of the file
tracking work to a central server (called a tracker).
Another difference is that it uses a principal called tit-
for-tat. This means that in order to receive files, you
have to give them. This solves the problem of leeching –
one of developer Bram Cohen's primary goals. With
Bit Torrent, the more files you share with others, the
faster your downloads are.
Finally, to make better use of available Internet bandwidth
(the pipeline for data transmission), BitTorrent downloads
different pieces of the file you want simultaneously from
multiple computers.
Torrent Tracker
Complete Working Of BitTorrent
 You open a Web page and click on a link for the file you
want.
 Bit Torrent client software communicates with a tracker
to find other computers running BitTorrent that have the
complete file (seed computers) and those with a portion
of the file (peers that are usually in the process of
downloading the file).
 The tracker identifies the swarm, which is the connected
computers that have all of or a portion of the file and are
in the process of sending or receiving it.
 The tracker helps the client software trade pieces of the
file you want with other computers in the swarm. Your
computer receives multiple pieces of the file
simultaneously.
Working Of BitTorrent(cont.)
 If you continue to run the Bit Torrent client software
after your download is complete, others can receive
.torrent files from your computer; your future download
rates improve because you are ranked higher in the "tit-
for-tat" system.
 Downloading pieces of the file at the same time helps
solve a common problem with other peer-to-peer
download methods: Peers upload at a much slower rate
than they download. By downloading multiple pieces at
the same time, the overall speed is greatly improved. The
more computers involved in the swarm, the faster the file
transfer occurs because there are more sources of each
piece of the file. For this reason, Bit Torrent is especially
useful for large, popular files.
Installing And Configuring Bit
Torrent
To use BitTorrent for file downloads, you need to install
the BitTorrent client software. You may also need to
tweak your firewall and network router (if you use these)
to accept BitTorrent files. We'll give you all the details to
get started. But first, here's a synopsis of the steps:
 Download and install the BitTorrent client software.
 Check and configure firewall and/or router for
BitTorrent (if applicable).
 Find files to download.
 Download and open the .torrent pointer file.
 Let BitTorrent give and receive pieces of the file.
 Stay connected after the download completes to share
your .torrent files with others.
Download the BitTorrent Client
Software
 BitTorrent is open-source software, which means the
program is available to you and to software developers
for free. Therefore, some developers have created their
own versions of BitTorrent software, and you can choose
from a number of client programs. (Note: This article
assumes you are using the official version.
 To start off, go to BitTorrent.com and click the link for
the client software that matches your operating system.
After you download the client software, double-click on
the desktop icon to install it. The installation program is
quick, and it displays this window when it is complete:
You'll also see Bram Cohen's Web page, where you can
send donations to support development of BitTorrent.
Mr. Cohen develops and distributes BitTorrent as open-
source software at no cost to users or other developers.
Conclusion
So we have studied all details regarding Bit
Torrent protocol, client and softwares.
Torrents have become the best method of
Downloading large files like complete movies
and games.
But the problem is that all the illegal stuffs
like unlicensed movies softwares games etc
so piracy is increased and this is the only
Problems.
Thank You
Queries??

More Related Content

What's hot

UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
Sudhansu Dash
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentationAvula Jagadeesh
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
maheshmohanmu
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
Akshay K Sajan
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
dhananjaypardeshi13
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
Parth Akbari
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierMohd253
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
Bhoomit Belani
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
SridharBR
 
Bittorrent
BittorrentBittorrent
Bittorrent
sonangrai
 
Torrent
TorrentTorrent
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
Mayur Kathale
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
Chirodeep Das
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
D bipul lomga
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
Karwan Jacksi
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
Manish Sharma
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
Harsh Malpani
 

What's hot (20)

UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Torrent
TorrentTorrent
Torrent
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 

Similar to Bit torrent

Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
Dikshant Patodia
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
raeshu
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrentgkmv
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
Masood Alam Shaikh
 
Bittorrent
BittorrentBittorrent
Bittorrent
Anush Shenoy
 
Bittorrent
BittorrentBittorrent
Bittorrent
Renuka Raj
 
Bittorrent
BittorrentBittorrent
Bittorrent
Renuka Raj
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
gueste9b89f
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
Mihir Jyoti Chakrabarti
 
Bittorrent
BittorrentBittorrent
Bittorrent
suman2010
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Waqas Tariq
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
Rick Wanner
 
BitThief Report
BitThief ReportBitThief Report
BitThief Report
Vishrant Vasavada
 

Similar to Bit torrent (15)

Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Adaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent SystemsAdaptive Sliding Piece Selection Window for BitTorrent Systems
Adaptive Sliding Piece Selection Window for BitTorrent Systems
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
BitThief Report
BitThief ReportBitThief Report
BitThief Report
 

More from Saumya Ranjan Behura

Gsm
GsmGsm
Quadcopters
QuadcoptersQuadcopters
Nano technology
Nano technologyNano technology
Nano technology
Saumya Ranjan Behura
 
Miling machine
Miling machineMiling machine
Miling machine
Saumya Ranjan Behura
 
Manglev train
Manglev trainManglev train
Manglev train
Saumya Ranjan Behura
 
E nose
E noseE nose
Clockless chips
Clockless chipsClockless chips
Clockless chips
Saumya Ranjan Behura
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
Saumya Ranjan Behura
 
Blu ray disk
Blu ray diskBlu ray disk
Blu ray disk
Saumya Ranjan Behura
 
Bio chemical senors
Bio chemical senorsBio chemical senors
Bio chemical senors
Saumya Ranjan Behura
 
Analog to digital converters, adc
Analog to digital converters, adcAnalog to digital converters, adc
Analog to digital converters, adc
Saumya Ranjan Behura
 
Seminar on nanorobotics
Seminar on nanoroboticsSeminar on nanorobotics
Seminar on nanorobotics
Saumya Ranjan Behura
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
Saumya Ranjan Behura
 
Oscilloscopes basics
Oscilloscopes basicsOscilloscopes basics
Oscilloscopes basics
Saumya Ranjan Behura
 
Oscilloscope tutorial
Oscilloscope tutorialOscilloscope tutorial
Oscilloscope tutorial
Saumya Ranjan Behura
 
Optical sensors and their applications
Optical sensors and their applicationsOptical sensors and their applications
Optical sensors and their applications
Saumya Ranjan Behura
 
Night vision
Night visionNight vision
Night vision
Saumya Ranjan Behura
 
Sensors and transducer
Sensors and transducerSensors and transducer
Sensors and transducer
Saumya Ranjan Behura
 
Sensors
SensorsSensors
Smart card
Smart cardSmart card

More from Saumya Ranjan Behura (20)

Gsm
GsmGsm
Gsm
 
Quadcopters
QuadcoptersQuadcopters
Quadcopters
 
Nano technology
Nano technologyNano technology
Nano technology
 
Miling machine
Miling machineMiling machine
Miling machine
 
Manglev train
Manglev trainManglev train
Manglev train
 
E nose
E noseE nose
E nose
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
Blu ray disk
Blu ray diskBlu ray disk
Blu ray disk
 
Bio chemical senors
Bio chemical senorsBio chemical senors
Bio chemical senors
 
Analog to digital converters, adc
Analog to digital converters, adcAnalog to digital converters, adc
Analog to digital converters, adc
 
Seminar on nanorobotics
Seminar on nanoroboticsSeminar on nanorobotics
Seminar on nanorobotics
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Oscilloscopes basics
Oscilloscopes basicsOscilloscopes basics
Oscilloscopes basics
 
Oscilloscope tutorial
Oscilloscope tutorialOscilloscope tutorial
Oscilloscope tutorial
 
Optical sensors and their applications
Optical sensors and their applicationsOptical sensors and their applications
Optical sensors and their applications
 
Night vision
Night visionNight vision
Night vision
 
Sensors and transducer
Sensors and transducerSensors and transducer
Sensors and transducer
 
Sensors
SensorsSensors
Sensors
 
Smart card
Smart cardSmart card
Smart card
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Bit torrent

  • 1. BIT TORRENT THE REVOLUTION IN THE FIELD OF FILE SHARING
  • 2. TALK FLOW  WHAT IS BIT TORRENT ?  LANGUAGE OF BIT TORRENT  TRADITIONAL CLIENT-SERVER DOWNLOADING  PEER TO PEER FILE SHARING  WHAT BIT TORRENT DOES ?  COMPLETE WORKING OF BIT TORRENT  INSTALLING AND CONFIGURING BIT TORRENT  DOWNLOAD THE BITTORRENT CLIENT SOFTWARE  CONCLUSION
  • 3. WHAT ACTUALLY BITTORRENT IS?  BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. It costs nothing to use and includes no spyware or pop-up advertising.  Unlike other download methods, BitTorrent maximizes transfer speed by gathering pieces of the file you want and downloading these pieces simultaneously from people who already have them. This process makes popular and very large files, such as videos and television programs, download much faster than is possible with other protocols.
  • 4. Language Of Bit Torrent Like most Internet phenomena, Bit Torrent has its own jargon. Some of the more common terms related to BitTorrent include:  Leeches - People who download files but do not share files on their own computer with others  Seed or seeder - A computer with a complete copy of a BitTorrent file (At least one seed computer is necessary for a BitTorrent download to operate.)
  • 5.  Swarm - A group of computers simultaneously sending (uploading) or receiving (downloading) the same file.  .torrent - A pointer file that directs your computer to the file you want to download.  Tracker - A server that manages the BitTorrent file-transfer process. Language Of Bit Torrent….
  • 6.
  • 10. coloured bars beneath all of the clients represent individual pieces of the file.
  • 11. Traditional Client-Server Downloading  To understand how BitTorrent works and why it is different from other file-serving methods, let's examine what happens when you download a file from a Web site. It works something like this:  You open a webpage and click a link to download a file to your computer.  The Web browser software on your computer (the client) tells the server(a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer.  The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
  • 13. Peer-to-peer File Sharing Peer-to-peer file sharing is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. The process works like this:  You run peer-to-peer file-sharing software (for example, a Gnutella program) on your computer and send out a request for the file you want to download.  To locate the file, the software queries other computers that are connected to the Internet and running the file- sharing software.  When the software finds a computer that has the file you want on its hard drive, the download begins.
  • 14. Peer-to-peer File Sharing  Others using the file-sharing software can obtain files they want from your computer's hard drive.  The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks.  Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching. This limits the number of computers the software can search for the
  • 16. What BitTorrent Does Unlike some other peer-to-peer downloading methods, Bit Torrent is a protocol that offloads some of the file tracking work to a central server (called a tracker). Another difference is that it uses a principal called tit- for-tat. This means that in order to receive files, you have to give them. This solves the problem of leeching – one of developer Bram Cohen's primary goals. With Bit Torrent, the more files you share with others, the faster your downloads are. Finally, to make better use of available Internet bandwidth (the pipeline for data transmission), BitTorrent downloads different pieces of the file you want simultaneously from multiple computers.
  • 18. Complete Working Of BitTorrent  You open a Web page and click on a link for the file you want.  Bit Torrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file (seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file).  The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.  The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.
  • 19. Working Of BitTorrent(cont.)  If you continue to run the Bit Torrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit- for-tat" system.  Downloading pieces of the file at the same time helps solve a common problem with other peer-to-peer download methods: Peers upload at a much slower rate than they download. By downloading multiple pieces at the same time, the overall speed is greatly improved. The more computers involved in the swarm, the faster the file transfer occurs because there are more sources of each piece of the file. For this reason, Bit Torrent is especially useful for large, popular files.
  • 20. Installing And Configuring Bit Torrent To use BitTorrent for file downloads, you need to install the BitTorrent client software. You may also need to tweak your firewall and network router (if you use these) to accept BitTorrent files. We'll give you all the details to get started. But first, here's a synopsis of the steps:  Download and install the BitTorrent client software.  Check and configure firewall and/or router for BitTorrent (if applicable).  Find files to download.  Download and open the .torrent pointer file.  Let BitTorrent give and receive pieces of the file.  Stay connected after the download completes to share your .torrent files with others.
  • 21. Download the BitTorrent Client Software  BitTorrent is open-source software, which means the program is available to you and to software developers for free. Therefore, some developers have created their own versions of BitTorrent software, and you can choose from a number of client programs. (Note: This article assumes you are using the official version.  To start off, go to BitTorrent.com and click the link for the client software that matches your operating system. After you download the client software, double-click on the desktop icon to install it. The installation program is quick, and it displays this window when it is complete: You'll also see Bram Cohen's Web page, where you can send donations to support development of BitTorrent. Mr. Cohen develops and distributes BitTorrent as open- source software at no cost to users or other developers.
  • 22. Conclusion So we have studied all details regarding Bit Torrent protocol, client and softwares. Torrents have become the best method of Downloading large files like complete movies and games. But the problem is that all the illegal stuffs like unlicensed movies softwares games etc so piracy is increased and this is the only Problems.