SlideShare a Scribd company logo
BitTorrent Protocol
Arun Kumar (ENG18CS0047)
Computer Networks Seminar
2
Peer-to-Peer Network
●
Many computers come together and pool their resources to
form a content distribution system.
●
These computers don't need to be machines in data centers,
they can be home computers.
●
They are called peers because each can act as a client and a
server.
●
There is often no central point of control.
●
If a P2P network has an average of N users, each with
broadband connectivity at 1 Mbps, then the aggregate upload
capacity is N Mbps.
●
The aggregate download capacity is also the same because
users has a 1-Mbps link in each direction.
3
Peer-to-Peer Network
●
Skype uses P2P.
●
The two paths that P2P technology has followed are BitTorrent
protocol and Distributed hash table (DHT).
4
BitTorrent Protocol
●
Developed by Bram Cohen in 2001.
●
Quick and easy file-sharing among a set of peers.
●
There are many freely available client softwares. Eg:
BitTorrent, uTorrent, Deluge
●
Applications of BitTorrent
➔Distribution of games, TV shows, podcasts and music albums.
➔Sharing datasets.
➔Facebook uses BitTorrent to distribute updates to Facebook
servers.
➔The British government used BitTorrent to distribute details
about how the tax money of British citizens was spent.
5
How does a peer find other peers that have
the content it wants to download?
●
Not all peers will have all of the content.
●
Every content provider creates a torrent.
●
A torrent is used by a peer to verify the integrity of the data
that it downloads.
●
The content is divided into equal-sized chunks (64 KB to 512
KB).
●
Torrent contains 160-bit SHA1 hashes of all chunks.
●
Tracker is a server that leads peers to the content. It maintains
a list of peers (swarm) that are actively downloading and
uploading the content.
●
Peers contact tracker regularly to report that they are still
active and when they leave the swarm.
6
BitTorrent Protocol
7
How is content replicated by peers to provide
high-speed downloads for everyone?
●
Seeders: Peers that have all of the chunks.
●
A peer simulataneously downloads chunks that it is missing and
uploads chunks that it has.
●
A peer can leave the swarm and return at any time.
●
Each chunk must be available at many peers.
●
If everyone were to get the chunks in the same order, many
peers will depend on the seeders only. This is a bottleneck.
●
Instead, peers exchange lists of chunks that they have with each
other.
●
They select and download rare chunks because downloading
creates a copy and the rarity of the chunk reduces.
●
After a short while, all chunks will be widely available.
8
BitTorrent Protocol
9
How do peers encourage each other to upload
content to others as well as download content for
themselves?
●
Leechers are peers that download content but do not want to upload
and contribute.
●
Solution: Reward peers that show good behaviour.
●
Each peer randomly samples the other peers, retrieving chunks from
them while it uploads chunks to them.
●
The peer prefers to trade chunks with a small group that give high
download performance.
●
The peer will randomly try newcomer peers too. This allows
newcomer peers to obtain initial chunks so that they can trade with
other peers.
●
This algorithm will match peers with comparable upload and
download rates overtime.
●
If a peer is not uploading chunks or is doing so slowly, it will be cut off
/ choked sooner or later.
10
DHT
●
Tracker is centralized for each swarm.
●
Each peer keeping its own index of who has what is not worth the
effort.
●
DHTs impose a regular structure on the communication between
nodes. So they are called structured P2P networks.
●
Properties of DHT
 Each node keeps only a small amount of information about other
nodes.
 Each node can look up entries in the index quickly.
 Each node can use the index at the same time, even as other nodes
come and go.
●
The first proposed DHT was Chord in 2001.
●
Some BitTorrent clients use DHTs to provide a fully distributed tracker.
11
DHT

More Related Content

Similar to BitTorrent Protocol

Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
balu0503
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
Harsh Malpani
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
Nishan Shetty
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
abhipesit
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
Ali Habeeb
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
Milan Varia
 
Bittorrent in a P2P social network
Bittorrent in a P2P social networkBittorrent in a P2P social network
Bittorrent in a P2P social network
Kailaash Balachandran
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
Ashish Kumar
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
Harsht2888
 
SmartRetracker
SmartRetrackerSmartRetracker
SmartRetracker
Ilya Mikov
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
Dikshant Patodia
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
Sanjay Ravishankar
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
Santosh Kumar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
guestc67adeb
 
Bit torrent
Bit torrentBit torrent
Bit torrent
Sonja Kristiansen
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
raeshu
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
Chirodeep Das
 
Bittorrent
BittorrentBittorrent
Bittorrent
Anush Shenoy
 
Bittorrent
BittorrentBittorrent
Bittorrent
Utsav Dholakia
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
gkmv
 

Similar to BitTorrent Protocol (20)

Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bittorrent in a P2P social network
Bittorrent in a P2P social networkBittorrent in a P2P social network
Bittorrent in a P2P social network
 
Bit Torrent
Bit Torrent Bit Torrent
Bit Torrent
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
SmartRetracker
SmartRetrackerSmartRetracker
SmartRetracker
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 

Recently uploaded

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 

Recently uploaded (12)

快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 

BitTorrent Protocol

  • 1. BitTorrent Protocol Arun Kumar (ENG18CS0047) Computer Networks Seminar
  • 2. 2 Peer-to-Peer Network ● Many computers come together and pool their resources to form a content distribution system. ● These computers don't need to be machines in data centers, they can be home computers. ● They are called peers because each can act as a client and a server. ● There is often no central point of control. ● If a P2P network has an average of N users, each with broadband connectivity at 1 Mbps, then the aggregate upload capacity is N Mbps. ● The aggregate download capacity is also the same because users has a 1-Mbps link in each direction.
  • 3. 3 Peer-to-Peer Network ● Skype uses P2P. ● The two paths that P2P technology has followed are BitTorrent protocol and Distributed hash table (DHT).
  • 4. 4 BitTorrent Protocol ● Developed by Bram Cohen in 2001. ● Quick and easy file-sharing among a set of peers. ● There are many freely available client softwares. Eg: BitTorrent, uTorrent, Deluge ● Applications of BitTorrent ➔Distribution of games, TV shows, podcasts and music albums. ➔Sharing datasets. ➔Facebook uses BitTorrent to distribute updates to Facebook servers. ➔The British government used BitTorrent to distribute details about how the tax money of British citizens was spent.
  • 5. 5 How does a peer find other peers that have the content it wants to download? ● Not all peers will have all of the content. ● Every content provider creates a torrent. ● A torrent is used by a peer to verify the integrity of the data that it downloads. ● The content is divided into equal-sized chunks (64 KB to 512 KB). ● Torrent contains 160-bit SHA1 hashes of all chunks. ● Tracker is a server that leads peers to the content. It maintains a list of peers (swarm) that are actively downloading and uploading the content. ● Peers contact tracker regularly to report that they are still active and when they leave the swarm.
  • 7. 7 How is content replicated by peers to provide high-speed downloads for everyone? ● Seeders: Peers that have all of the chunks. ● A peer simulataneously downloads chunks that it is missing and uploads chunks that it has. ● A peer can leave the swarm and return at any time. ● Each chunk must be available at many peers. ● If everyone were to get the chunks in the same order, many peers will depend on the seeders only. This is a bottleneck. ● Instead, peers exchange lists of chunks that they have with each other. ● They select and download rare chunks because downloading creates a copy and the rarity of the chunk reduces. ● After a short while, all chunks will be widely available.
  • 9. 9 How do peers encourage each other to upload content to others as well as download content for themselves? ● Leechers are peers that download content but do not want to upload and contribute. ● Solution: Reward peers that show good behaviour. ● Each peer randomly samples the other peers, retrieving chunks from them while it uploads chunks to them. ● The peer prefers to trade chunks with a small group that give high download performance. ● The peer will randomly try newcomer peers too. This allows newcomer peers to obtain initial chunks so that they can trade with other peers. ● This algorithm will match peers with comparable upload and download rates overtime. ● If a peer is not uploading chunks or is doing so slowly, it will be cut off / choked sooner or later.
  • 10. 10 DHT ● Tracker is centralized for each swarm. ● Each peer keeping its own index of who has what is not worth the effort. ● DHTs impose a regular structure on the communication between nodes. So they are called structured P2P networks. ● Properties of DHT  Each node keeps only a small amount of information about other nodes.  Each node can look up entries in the index quickly.  Each node can use the index at the same time, even as other nodes come and go. ● The first proposed DHT was Chord in 2001. ● Some BitTorrent clients use DHTs to provide a fully distributed tracker.