SlideShare a Scribd company logo
SmartRetracker™
Relieving a large IPS’s network of redundant BitTorrent traffic
What is BitTorrent
• BitTorrent is the most popular file sharing protocol in the world today.
• In 2013, BitTorrent contributed for 15 to 40 per cent of ISP’s uplink
bandwidth load, depending on the country.
• BitTorrent ignores ISP’s network topology.
• The only way to make BitTorrent more ISP-friendly is by using so called
retrackers. They tell BitTorrent software where to find local peers.
• A peer is a piece of software used to download files, a member of
BitTorrent file exchange network.
BitTorrent running without retracker
Our example subscriber’s pool of peers

“Downloading from anyone
available”. Network topology
isn’t taken into account.
Redundant use of bandwidth.

Peers from
other
networks

A subscriber
using
BitTorrent

A large, multi-regional
Internet Service Provider.
Example network branches
are shown in color.

Other
subscribers
using
BitTorrent
BitTorrent running with a local retracker*
Local peers

All other peers

“Preferred downloading from local
peers”.
Partial localization of
BitTorrent traffic.

A subscriber
using
BitTorrent

A large, multi-regional
Internet Service Provider.
Example network branches
are shown in color.

Peers from
other
networks

* This is a standard feature of BitTorrent protocol and infrastructure.
The software is free. Any ISP can install and use it. The effect is not so good, however.
BitTorrent running with SmartRetracker™
Local peers

Neighbouring peers

“Peers from the same network go
first, neighbors next, all others
only as a matter of last resort.

Optimal!

Others
A subscriber
using
BitTorrent

A large, multi-regional
Internet Service Provider.
Example network branches
are shown in color.
SmartRetracker™
• Knows the network topology of an ISP.
• Updates this knowledge daily using BGP.
• Upon request, gives out the optimal set of peers: first local, then
neighbors from the same ISP network. Only if that is not enough, some
external peers.
• Transparent to BitTorrent users, doesn’t require any action on their part
in order to operate. The effect is immediate.
• Designed and programmed to handle millions of users simultaneously.
SmartRetracker™
• One SmartRetracker™ serving the whole ISP network means one source of stats and
analytics, one object for monitoring.
• In case of SmartRetracker™ failure, the ISP network continues to operate.
Subscribers don’t notice anything at all.
• SmartRetracker™ supplies data for our TorrentCache™, enabling proactive caching
of torrents. “It’s there when they want it”
• When bundled with our TorrentDPI™, SmartRetracker™ is capable of completely
suppressing data exchange with “foreign” peers.
This reduces BitTorrent’s share in provider’s links to a minimum.
• When bundled with TorrentDPI™, it is also capable of taking down any illegitimate
torrents in order to enforce copyright.
Contact
Ilya Mikov
+7-912-0610015
ilyamikov@gmail.com
Skype: bkmzbkmz

More Related Content

Viewers also liked

Filmoscope
FilmoscopeFilmoscope
Filmoscope
Ilya Mikov
 
SKOROVOZ
SKOROVOZSKOROVOZ
SKOROVOZ
Ilya Mikov
 
國陷臨界點
國陷臨界點國陷臨界點
國陷臨界點hkyeung
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Source Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Source Conference
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buyVlad Styran
 
ZeroNights - SmartTV
ZeroNights - SmartTV ZeroNights - SmartTV
ZeroNights - SmartTV
Sergey Belov
 
Умная Теплица
Умная ТеплицаУмная Теплица
Умная Теплица
Ilya Mikov
 
СКОРОВОЗ
СКОРОВОЗСКОРОВОЗ
СКОРОВОЗ
Ilya Mikov
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
Source Conference
 
Berezha Security
Berezha SecurityBerezha Security
Berezha Security
Vlad Styran
 
The DNS Tunneling Blindspot
The DNS Tunneling BlindspotThe DNS Tunneling Blindspot
The DNS Tunneling Blindspot
Brian A. McHenry
 
Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016
Vlad Styran
 
Attacking thru HTTP Host header
Attacking thru HTTP Host headerAttacking thru HTTP Host header
Attacking thru HTTP Host header
Sergey Belov
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
 
Purple View
Purple ViewPurple View
Purple View
Haydn Johnson
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue Teams
AlienVault
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyIxia
 
Death of WAF - GoSec '15
Death of WAF - GoSec '15Death of WAF - GoSec '15
Death of WAF - GoSec '15
Brian A. McHenry
 
Death of Web App Firewall
Death of Web App FirewallDeath of Web App Firewall
Death of Web App Firewall
Brian A. McHenry
 

Viewers also liked (20)

Filmoscope
FilmoscopeFilmoscope
Filmoscope
 
SKOROVOZ
SKOROVOZSKOROVOZ
SKOROVOZ
 
國陷臨界點
國陷臨界點國陷臨界點
國陷臨界點
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buy
 
ZeroNights - SmartTV
ZeroNights - SmartTV ZeroNights - SmartTV
ZeroNights - SmartTV
 
Умная Теплица
Умная ТеплицаУмная Теплица
Умная Теплица
 
СКОРОВОЗ
СКОРОВОЗСКОРОВОЗ
СКОРОВОЗ
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
Berezha Security
Berezha SecurityBerezha Security
Berezha Security
 
The DNS Tunneling Blindspot
The DNS Tunneling BlindspotThe DNS Tunneling Blindspot
The DNS Tunneling Blindspot
 
Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016Recon-Fu @BsidesKyiv 2016
Recon-Fu @BsidesKyiv 2016
 
Attacking thru HTTP Host header
Attacking thru HTTP Host headerAttacking thru HTTP Host header
Attacking thru HTTP Host header
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
Purple View
Purple ViewPurple View
Purple View
 
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue TeamsSecurity by Collaboration: Rethinking Red Teams versus Blue Teams
Security by Collaboration: Rethinking Red Teams versus Blue Teams
 
Measuring Private Cloud Resiliency
Measuring Private Cloud ResiliencyMeasuring Private Cloud Resiliency
Measuring Private Cloud Resiliency
 
Death of WAF - GoSec '15
Death of WAF - GoSec '15Death of WAF - GoSec '15
Death of WAF - GoSec '15
 
Death of Web App Firewall
Death of Web App FirewallDeath of Web App Firewall
Death of Web App Firewall
 

Similar to SmartRetracker

P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
WasiqMehraj2
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
Mukesh Pilaniya
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
ArunKumar7374
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
Nishan Shetty
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
dhananjaypardeshi13
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
Manish Sharma
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
Harsh Malpani
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
raeshu
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
abhipesit
 
Qs.pptx
Qs.pptxQs.pptx
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
dhananjaypardeshi13
 
Router and types
Router and types Router and types
Router and types
Qazafie Mehrzad
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
Milan Varia
 
P2 p
P2 pP2 p
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
Rick Wanner
 
Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)
Banu Prakash
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentationAvula Jagadeesh
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
Sudhansu Dash
 

Similar to SmartRetracker (20)

P2P networking.pptx
P2P networking.pptxP2P networking.pptx
P2P networking.pptx
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Router and types
Router and types Router and types
Router and types
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
P2 p
P2 pP2 p
P2 p
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)Bittorrent Protocol(Interactive)
Bittorrent Protocol(Interactive)
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Part1
Part1Part1
Part1
 

More from Ilya Mikov

Lordmancer II ICO deck
Lordmancer II ICO deckLordmancer II ICO deck
Lordmancer II ICO deck
Ilya Mikov
 
RCML, Robot Control Meta Langugage
RCML, Robot Control Meta LangugageRCML, Robot Control Meta Langugage
RCML, Robot Control Meta Langugage
Ilya Mikov
 
Ванга
ВангаВанга
Ванга
Ilya Mikov
 
Как привести нужных клиентов из интернета
Как привести нужных клиентов из интернетаКак привести нужных клиентов из интернета
Как привести нужных клиентов из интернета
Ilya Mikov
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv enIlya Mikov
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv enIlya Mikov
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv enIlya Mikov
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv enIlya Mikov
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
Ilya Mikov
 
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеровDPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
Ilya Mikov
 
Рекламные возможности Мобильного Актива
Рекламные возможности Мобильного АктиваРекламные возможности Мобильного Актива
Рекламные возможности Мобильного Актива
Ilya Mikov
 
Фильмоскоп
ФильмоскопФильмоскоп
Фильмоскоп
Ilya Mikov
 

More from Ilya Mikov (12)

Lordmancer II ICO deck
Lordmancer II ICO deckLordmancer II ICO deck
Lordmancer II ICO deck
 
RCML, Robot Control Meta Langugage
RCML, Robot Control Meta LangugageRCML, Robot Control Meta Langugage
RCML, Robot Control Meta Langugage
 
Ванга
ВангаВанга
Ванга
 
Как привести нужных клиентов из интернета
Как привести нужных клиентов из интернетаКак привести нужных клиентов из интернета
Как привести нужных клиентов из интернета
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
Skorovoz iptv en
Skorovoz iptv enSkorovoz iptv en
Skorovoz iptv en
 
DPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic managementDPI BOX: deep packet inspection for ISP traffic management
DPI BOX: deep packet inspection for ISP traffic management
 
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеровDPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
DPI BOX: deep packet inspection решение по управлению трафиком для провайдеров
 
Рекламные возможности Мобильного Актива
Рекламные возможности Мобильного АктиваРекламные возможности Мобильного Актива
Рекламные возможности Мобильного Актива
 
Фильмоскоп
ФильмоскопФильмоскоп
Фильмоскоп
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

SmartRetracker

  • 1. SmartRetracker™ Relieving a large IPS’s network of redundant BitTorrent traffic
  • 2. What is BitTorrent • BitTorrent is the most popular file sharing protocol in the world today. • In 2013, BitTorrent contributed for 15 to 40 per cent of ISP’s uplink bandwidth load, depending on the country. • BitTorrent ignores ISP’s network topology. • The only way to make BitTorrent more ISP-friendly is by using so called retrackers. They tell BitTorrent software where to find local peers. • A peer is a piece of software used to download files, a member of BitTorrent file exchange network.
  • 3. BitTorrent running without retracker Our example subscriber’s pool of peers “Downloading from anyone available”. Network topology isn’t taken into account. Redundant use of bandwidth. Peers from other networks A subscriber using BitTorrent A large, multi-regional Internet Service Provider. Example network branches are shown in color. Other subscribers using BitTorrent
  • 4. BitTorrent running with a local retracker* Local peers All other peers “Preferred downloading from local peers”. Partial localization of BitTorrent traffic. A subscriber using BitTorrent A large, multi-regional Internet Service Provider. Example network branches are shown in color. Peers from other networks * This is a standard feature of BitTorrent protocol and infrastructure. The software is free. Any ISP can install and use it. The effect is not so good, however.
  • 5. BitTorrent running with SmartRetracker™ Local peers Neighbouring peers “Peers from the same network go first, neighbors next, all others only as a matter of last resort. Optimal! Others A subscriber using BitTorrent A large, multi-regional Internet Service Provider. Example network branches are shown in color.
  • 6. SmartRetracker™ • Knows the network topology of an ISP. • Updates this knowledge daily using BGP. • Upon request, gives out the optimal set of peers: first local, then neighbors from the same ISP network. Only if that is not enough, some external peers. • Transparent to BitTorrent users, doesn’t require any action on their part in order to operate. The effect is immediate. • Designed and programmed to handle millions of users simultaneously.
  • 7. SmartRetracker™ • One SmartRetracker™ serving the whole ISP network means one source of stats and analytics, one object for monitoring. • In case of SmartRetracker™ failure, the ISP network continues to operate. Subscribers don’t notice anything at all. • SmartRetracker™ supplies data for our TorrentCache™, enabling proactive caching of torrents. “It’s there when they want it” • When bundled with our TorrentDPI™, SmartRetracker™ is capable of completely suppressing data exchange with “foreign” peers. This reduces BitTorrent’s share in provider’s links to a minimum. • When bundled with TorrentDPI™, it is also capable of taking down any illegitimate torrents in order to enforce copyright.