SlideShare a Scribd company logo
BitTorrent
January
25, 2015
1
By
Bhoomit Belani
MCA sem-I
Contents
January
25, 2015
2
•Introduction
•Types Of Data Sharing
•Traditional Client-Server Downloading
•Peer-Peer Downloading
•Why BitTorrent?
•What actually a BitTorrent is?
•BitTorrent Terminology
•How BitTorrent works?
•Downloading Files Using BitTorrent
•Seeding Torrent
•How to create a dot torrent file
•Conclusion
•References
Introduction
January
25, 2015
3
• Humans tend to share things.
• As electronic data plays a vital role these days, they acquire
the “sharing” attribute.
• Sharing electronic data(emails, ebooks, multimedia files) is the
need of the hour.
• Data sharing must be fast enough as we are now moving to 3G
and 4G technologies, users expect data sharing at high speeds.
Types Of Data Sharing
 Manual Sharing Using Removable Media: Such as USB
drives, External Hard disks.
 Centralized Servers of Computer Networks: Network
of
computers interconnected for sharing resources and
information via a central server.
 Distributed Peer-to-Peer networking: Is a Computer network
where each system in the network acts as client or server
allowing shared access of resources without the need of
central server.
January
25, 2015
4
Traditional Client-Server
Downloading
January
25, 2015
5
•You open a Webpage and click a link to download a file to your
computer.
•The Web browser software on your computer (the client) tells
the server (a central computer that holds the Web page and the file
you want to download) to transfer a copy of the file to your computer.
•The transfer is handled by a protocol (a set of rules), such as FTP
(File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
Peer-Peer Downloading
January
25, 2015
6
•In peer-to-peer sharing, a software program is used instead a Web
Browser to locate computers that have the file user want.
•These are ordinary computers like the users, they are called PEERS.
• The process works like this:
You run peer-to-peer file-sharing software (for example,
a Napster program or Gnutella) on your computer and send out
a request for the file you want to download.
•To locate the file, the software queries other computers that are
connected to the Internet and running the file-sharing software.
Contd.
January
25, 2015
7
•When the software finds a computer that has the file you want on
its hard drive , the download begins.
•Others using the file-sharing software can obtain files they want
from your computer's hard drive.
•The file-transfer load is distributed between the computers
exchanging files, but file searches and transfers from your
computer to others can cause bottlenecks.
Contd.
January
25, 2015
8
•Some people download files and immediately disconnect without
allowing others to obtain files from their system, which is
called leeching.
• This limits the number of computers the software can search for the
requested file .
Why BitTorrent?
January
25, 2015
9
•Unlike some other peer-to-peer downloading methods,
BitTorrent is a protocol that offloads some of the file tracking
work to a central server called a Tracker.
•Another difference is that it uses a principal called tit-for-tat.
•This means that in order to receive files, you have to give
them. This solves the problem of leeching -- one of developer
Bram Cohen's primary goal.
What Is BitTorrent?
January
25, 2015
10
•BitTorrent is a protocol that enables fast downloading of large files
using minimum Internet bandwidth.
•It costs nothing to use and includes no spyware or pop-up
advertising.
•The most popular video, audio or software files can be transferred
faster and cheaper by using BitTorrent.
BitTorrent Terminology
January
25, 2015
11
Leeches - People who download files but do not share files
on their own computer with others.
Seed or seeder - A computer with a complete copy of a
BitTorrent file (At least one seed computer is necessary for a
BitTorrent download to operate).
Swarm - A group of computers simultaneously sending
(uploading) or receiving (downloading) the same file.
.torrent - A pointer file that directs your computer to the file
you want to download.
Tracker - A server that manages the BitTorrent file-transfer
process.
How BitTorrent Works?
January
25, 2015
12
•You open a Web page and click on a link for the file you want.
•BitTorrent client software communicates with a tracker to find
other computers running BitTorrent that have the complete file
(seed computers) and those with a portion of the file (peers that are
usually in the process of downloading the file).
•The tracker identifies the swarm, which are connected computers
that have all or a portion of the file and are in the process of sending
or receiving it.
•The tracker helps the client software to trade pieces of the file we
want with other computers in the swarm. Your computer receives
multiple pieces of the file simultaneously.
Contd.
January
25, 2015
13
If you continue to run the BitTorrent client software after your
download is complete, others can receive .torrent files from your
computer; your future download rates improve because you are ranked
higher in the "tit-for-tat" system.
Downloading Files Using
BitTorrent
January
25, 2015
14
•Just like you need a URL: www.google.com to go to that site
and download content.We need a ‘torrent file’ that tells
BitTorrent the necessary information to download the content.
•Websites like legaltorrents.com offer all kinds of torrents.
•Once you have obtained torrent file, you need to import it to
BitTorrent:
•Click File->Add Torrent or Press CTRL+O.
•Double click on Torrent file.
January
25, 2015
15
Seeding Torrent
January
25, 2015
16
•Seeding is where you leave your BitTorrent client
after you finish download to help distribute it.
•BitTorrent will continue seeding until you remove it
(Right click the torrent and hit Remove) .
How to create a .torrent File
January
25, 2015
17
Contd.
January
25, 2015
18
Creating a torrent file
January
25, 2015
19
Conclusion
 News of increased adoption of this revolutionary protocol
continues to emerge, and this seems to be a rich area for
continued research in computer networking, with significant
potential benefits to society.
 If BitTorrent and similar protocols do find a legal place in the
internet, it will certainly help to pave the way for distributing
rich media on the internet, and provide the impetus for new
innovations.
January
25, 2015
20
Thank You...!
January
25, 2015
21

More Related Content

What's hot

Bittorrent
BittorrentBittorrent
Bittorrent
sonangrai
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
Akshay K Sajan
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
Ashish Kumar
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
Chirodeep Das
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
abhipesit
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
D bipul lomga
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
Mayur Kathale
 
Bittorrent
BittorrentBittorrent
Bittorrent
Vatsal Gajera
 
Torrents
TorrentsTorrents
Torrents
Ahmad0Muhammad
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
Harsh Malpani
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
Karwan Jacksi
 
Bit torrent
Bit torrentBit torrent
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
ssanda3
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
Dikshant Patodia
 
Bittorrent
BittorrentBittorrent
Bit torrent explained
Bit torrent explainedBit torrent explained
Bit torrent explained
Dan Miller
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
dhananjaypardeshi13
 
Bittorrent
BittorrentBittorrent
Bittorrent
suman2010
 
P2p cdn
P2p cdnP2p cdn
P2p cdn
Anand Babu
 
P2P Forensics
P2P ForensicsP2P Forensics
P2P Forensics
Brian Baskin
 

What's hot (20)

Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent Technology ppt
Bit torrent Technology pptBit torrent Technology ppt
Bit torrent Technology ppt
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Torrents
TorrentsTorrents
Torrents
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent explained
Bit torrent explainedBit torrent explained
Bit torrent explained
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
P2p cdn
P2p cdnP2p cdn
P2p cdn
 
P2P Forensics
P2P ForensicsP2P Forensics
P2P Forensics
 

Similar to Bittorrent Basics

BitTorrent
BitTorrent BitTorrent
BitTorrent
Manish Sharma
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
Harsht2888
 
Bit torrent
Bit torrentBit torrent
Bit torrent
Sonja Kristiansen
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
Bittorrent
BittorrentBittorrent
Bittorrent
Anush Shenoy
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 
Bittorrent
BittorrentBittorrent
Bittorrent
Utsav Dholakia
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
Mukesh Pilaniya
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
Sudhansu Dash
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
Mihir Jyoti Chakrabarti
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
Milan Varia
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
raeshu
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
Sanjay Ravishankar
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
Masood Alam Shaikh
 
Torrent
TorrentTorrent
BitTorrent.pdf
BitTorrent.pdfBitTorrent.pdf
BitTorrent.pdf
IshanKathpal
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
SridharBR
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
Avula Jagadeesh
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
gkmv
 
Bittorrent
BittorrentBittorrent
Bittorrent
Renuka Raj
 

Similar to Bittorrent Basics (20)

BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Torrent
TorrentTorrent
Torrent
 
BitTorrent.pdf
BitTorrent.pdfBitTorrent.pdf
BitTorrent.pdf
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Alec Kassir cozmozone
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 

Recently uploaded (14)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
Integrating Physical and Cybersecurity to Lower Risks in Healthcare!
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 

Bittorrent Basics

  • 2. Contents January 25, 2015 2 •Introduction •Types Of Data Sharing •Traditional Client-Server Downloading •Peer-Peer Downloading •Why BitTorrent? •What actually a BitTorrent is? •BitTorrent Terminology •How BitTorrent works? •Downloading Files Using BitTorrent •Seeding Torrent •How to create a dot torrent file •Conclusion •References
  • 3. Introduction January 25, 2015 3 • Humans tend to share things. • As electronic data plays a vital role these days, they acquire the “sharing” attribute. • Sharing electronic data(emails, ebooks, multimedia files) is the need of the hour. • Data sharing must be fast enough as we are now moving to 3G and 4G technologies, users expect data sharing at high speeds.
  • 4. Types Of Data Sharing  Manual Sharing Using Removable Media: Such as USB drives, External Hard disks.  Centralized Servers of Computer Networks: Network of computers interconnected for sharing resources and information via a central server.  Distributed Peer-to-Peer networking: Is a Computer network where each system in the network acts as client or server allowing shared access of resources without the need of central server. January 25, 2015 4
  • 5. Traditional Client-Server Downloading January 25, 2015 5 •You open a Webpage and click a link to download a file to your computer. •The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer. •The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
  • 6. Peer-Peer Downloading January 25, 2015 6 •In peer-to-peer sharing, a software program is used instead a Web Browser to locate computers that have the file user want. •These are ordinary computers like the users, they are called PEERS. • The process works like this: You run peer-to-peer file-sharing software (for example, a Napster program or Gnutella) on your computer and send out a request for the file you want to download. •To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.
  • 7. Contd. January 25, 2015 7 •When the software finds a computer that has the file you want on its hard drive , the download begins. •Others using the file-sharing software can obtain files they want from your computer's hard drive. •The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks.
  • 8. Contd. January 25, 2015 8 •Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching. • This limits the number of computers the software can search for the requested file .
  • 9. Why BitTorrent? January 25, 2015 9 •Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server called a Tracker. •Another difference is that it uses a principal called tit-for-tat. •This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goal.
  • 10. What Is BitTorrent? January 25, 2015 10 •BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. •It costs nothing to use and includes no spyware or pop-up advertising. •The most popular video, audio or software files can be transferred faster and cheaper by using BitTorrent.
  • 11. BitTorrent Terminology January 25, 2015 11 Leeches - People who download files but do not share files on their own computer with others. Seed or seeder - A computer with a complete copy of a BitTorrent file (At least one seed computer is necessary for a BitTorrent download to operate). Swarm - A group of computers simultaneously sending (uploading) or receiving (downloading) the same file. .torrent - A pointer file that directs your computer to the file you want to download. Tracker - A server that manages the BitTorrent file-transfer process.
  • 12. How BitTorrent Works? January 25, 2015 12 •You open a Web page and click on a link for the file you want. •BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file (seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file). •The tracker identifies the swarm, which are connected computers that have all or a portion of the file and are in the process of sending or receiving it. •The tracker helps the client software to trade pieces of the file we want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.
  • 13. Contd. January 25, 2015 13 If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system.
  • 14. Downloading Files Using BitTorrent January 25, 2015 14 •Just like you need a URL: www.google.com to go to that site and download content.We need a ‘torrent file’ that tells BitTorrent the necessary information to download the content. •Websites like legaltorrents.com offer all kinds of torrents. •Once you have obtained torrent file, you need to import it to BitTorrent: •Click File->Add Torrent or Press CTRL+O. •Double click on Torrent file.
  • 16. Seeding Torrent January 25, 2015 16 •Seeding is where you leave your BitTorrent client after you finish download to help distribute it. •BitTorrent will continue seeding until you remove it (Right click the torrent and hit Remove) .
  • 17. How to create a .torrent File January 25, 2015 17
  • 19. Creating a torrent file January 25, 2015 19
  • 20. Conclusion  News of increased adoption of this revolutionary protocol continues to emerge, and this seems to be a rich area for continued research in computer networking, with significant potential benefits to society.  If BitTorrent and similar protocols do find a legal place in the internet, it will certainly help to pave the way for distributing rich media on the internet, and provide the impetus for new innovations. January 25, 2015 20