SlideShare uma empresa Scribd logo
1 de 27
BITTORRENT
May22,2013
1
By
K Ravi Teja Varma
09131A1272
B. Tech, 8th Sem
CONTENTS
May22,2013
2
•Introduction
•Types Of Data Sharing
•Traditional Client-Server Downloading
•Peer-Peer Downloading
•Gnutella Network
•Why BitTorrent?
•What actually a BitTorrent is?
•BitTorrent Terminology
•How BitTorrent works?
•Downloading Files Using BitTorrent
•Seeding Torrent
•How to create a dot torrent file
•Conclusion
•References
INTRODUCTION
May22,2013
3
• Humans tend to share things.
• As electronic data plays a vital role these days, they acquire
the “sharing” attribute.
• Sharing electronic data(emails, ebooks, multimedia files) is the
need of the hour.
• Data sharing must be fast enough as we are now moving to 3G
and 4G technologies, users expect data sharing at high speeds.
TYPES OF DATA SHARING
 Manual Sharing Using Removable Media: Such as USB
drives, External Hard disks.
 Centralized Servers of Computer Networks: Network of
computers interconnected for sharing resources and
information via a central server.
 Distributed Peer-to-Peer networking: Is a Computer network
where each system in the network acts as client or server
allowing shared access of resources without the need of
central server.
May22,2013
4
TRADITIONAL CLIENT-SERVER DOWNLOADING
May22,2013
5
•You open a Webpage and click a link to download a file to your
computer.
•The Web browser software on your computer (the client) tells
the server (a central computer that holds the Web page and the file
you want to download) to transfer a copy of the file to your computer.
•The transfer is handled by a protocol (a set of rules), such as FTP
(File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
CONTD.
May22,2013
6
•The transfer speed is affected by a number of variables, including the
type of protocol, the amount of traffic on the server and the number of
other computers that are downloading the file.
•If the file is both large and popular, the demands on the server are great,
and the download will be slow.
PEER-PEER DOWNLOADING
May22,2013
7
•In peer-to-peer sharing, a software program is used instead a Web
Browser to locate computers that have the file user want.
•These are ordinary computers like the users, they are called PEERS.
• The process works like this:
• You run peer-to-peer file-sharing software (for example,
a Napster program or Gnutella) on your computer and send out a
request for the file you want to download.
•To locate the file, the software queries other computers that are
connected to the Internet and running the file-sharing software.
CONTD.
May22,2013
8
•When the software finds a computer that has the file you want on
its hard drive , the download begins.
•Others using the file-sharing software can obtain files they want
from your computer's hard drive.
•The file-transfer load is distributed between the computers
exchanging files, but file searches and transfers from your
computer to others can cause bottlenecks.
CONTD.
May22,2013
9
•Some people download files and immediately disconnect without
allowing others to obtain files from their system, which is
called leeching.
• This limits the number of computers the software can search for the
requested file .
GNUTELLA NETWORK
May22,2013
10
How a Gnutella client finds a song
Given that there is no central server to store the names and locations of
all the available files, how does the Gnutella software on your machine
find a song on someone else's machine?
The process goes like this:
• Type the name of the song or file we want to find.
• Your machine knows of at least one other Gnutella machine
somewhere on the network.
CONTD.
May22,2013
11
•Your machine sends the song name you typed in to the Gnutella
machine(s) .
•These machines search to see if the requested file is on the local hard
disk. If so, they send back the file name (and machine IP address) to the
requester.
•At the same time, all of these machines send out the same request to
the machines they are connected to, and the process repeats.
•A request has a TTL (time to live) limit placed on it.
CONTD.
May22,2013
12
 A request might go out six or
seven levels deep before it
stops propagating. If each
machine on the Gnutella
network knows of just four
others, that means that your
request might reach 8,000 or so
other machines on the Gnutella
network if it propagates seven
levels deep.
CONTD.
May22,2013
13
•It is an extremely simple and clever way of distributing a query to
thousands of machines very quickly.
•This approach has one big advantage -- Gnutella works all the
time , as long as you can get to at least one other machine running
Gnutella software, you are able to query the network.
•No court order is going to shut this system down, because there is
no one machine that controls everything.
WHY BITTORRENT?
May22,2013
14
•Unlike some other peer-to-peer downloading
methods, BitTorrent is a protocol that offloads some of the file
tracking work to a central server called a Tracker.
•Another difference is that it uses a principal called tit-for-tat.
•This means that in order to receive files, you have to give
them. This solves the problem of leeching -- one of developer
Bram Cohen's primary goal.
WHAT IS BITTORRENT?
May22,2013
15
•BitTorrent is a protocol that enables fast downloading of large files
using minimum Internet bandwidth.
•It costs nothing to use and includes no spyware or pop-up
advertising.
•The most popular video, audio or software files can be transferred
faster and cheaper by using BitTorrent.
BITTORRENT TERMINOLOGY
May22,2013
16
Leeches - People who download files but do not share files
on their own computer with others.
Seed or seeder - A computer with a complete copy of a
BitTorrent file (At least one seed computer is necessary for a
BitTorrent download to operate).
Swarm - A group of computers simultaneously sending
(uploading) or receiving (downloading) the same file.
.torrent - A pointer file that directs your computer to the file
you want to download.
Tracker - A server that manages the BitTorrent file-transfer
process.
HOW BITTORRENT WORKS?
May22,2013
17
•You open a Web page and click on a link for the file you want.
•BitTorrent client software communicates with a tracker to find
other computers running BitTorrent that have the complete file
(seed computers) and those with a portion of the file (peers that are
usually in the process of downloading the file).
•The tracker identifies the swarm, which are connected computers
that have all or a portion of the file and are in the process of sending
or receiving it.
•The tracker helps the client software to trade pieces of the file we
want with other computers in the swarm. Your computer receives
multiple pieces of the file simultaneously.
CONTD.
May22,2013
18
If you continue to run the BitTorrent client software after your
download is complete, others can receive .torrent files from your
computer; your future download rates improve because you are ranked
higher in the "tit-for-tat" system.
DOWNLOADING FILES USING BITTORRENT
May22,2013
19
•Just like you need a URL: www.google.com to go to that site
and download content.We need a „torrent file‟ that tells
BitTorrent the necessary information to download the content.
•Websites like legaltorrents.com offer all kinds of torrents.
•Once you have obtained torrent file, you need to import it to
BitTorrent:
•Click File->Add Torrent or Press CTRL+O.
•Double click on Torrent file.
May22,2013
20
SEEDING TORRENT
May22,2013
21
•Seeding is where you leave your BitTorrent client
after you finish download to help distribute it.
•BitTorrent will continue seeding until you remove it
(Right click the torrent and hit Remove) .
HOW TO CREATE A .TORRENT FILE
May22,2013
22
CONTD.
May22,2013
23
May22,2013
24
Creating a torrent file
CONCLUSION
 News of increased adoption of this revolutionary protocol
continues to emerge, and this seems to be a rich area for
continued research in computer networking, with significant
potential benefits to society.
 If BitTorrent and similar protocols do find a legal place in the
internet, it will certainly help to pave the way for distributing
rich media on the internet, and provide the impetus for new
innovations.
May22,2013
25
REFERENCES
May22,2013
26
1. http://computer.howstuffworks.com/bittorrent.htm
2. http://en.wikipedia.org/wiki/BitTorrent
3. http://computer.howstuffworks.com/file-sharing.htm
4. http://en.wikipedia.org/wiki/World_Wide_Web
5. http://en.wikipedia.org/wiki/Computer_network
6. http://www.bittorrent.com/help/guides/beginners-guide
THANK YOU...!
May22,2013
27

Mais conteúdo relacionado

Mais procurados

Linux Server vs Windows Server
Linux Server vs Windows ServerLinux Server vs Windows Server
Linux Server vs Windows ServerKongChunLeong1
 
03 network services
03 network services03 network services
03 network servicesJadavsejal
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux pptOmi Vichare
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocolVipin Rai
 

Mais procurados (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Linux Server vs Windows Server
Linux Server vs Windows ServerLinux Server vs Windows Server
Linux Server vs Windows Server
 
Mail server
Mail serverMail server
Mail server
 
03 network services
03 network services03 network services
03 network services
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux ppt
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Software as a service
Software as a serviceSoftware as a service
Software as a service
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Linux commands
Linux commandsLinux commands
Linux commands
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 

Destaque

Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierMohd253
 
Introduction to BitTorrent Bundle
Introduction to BitTorrent BundleIntroduction to BitTorrent Bundle
Introduction to BitTorrent Bundlebittorrentinc
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocoltmont
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentationAvula Jagadeesh
 
El Aprendizaje Virtual
El Aprendizaje VirtualEl Aprendizaje Virtual
El Aprendizaje VirtualJosé D Landa
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit torrent techtalks_dht
Bit torrent techtalks_dhtBit torrent techtalks_dht
Bit torrent techtalks_dhtbittorrentinc
 
Bittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_VanamaBittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_VanamaSrikanth Vanama
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenecEugene Cheng
 
The Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingThe Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingVelocity Partners
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 
The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...Lukas Koster
 

Destaque (20)

Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Torrent
TorrentTorrent
Torrent
 
Introduction to BitTorrent Bundle
Introduction to BitTorrent BundleIntroduction to BitTorrent Bundle
Introduction to BitTorrent Bundle
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
El Aprendizaje Virtual
El Aprendizaje VirtualEl Aprendizaje Virtual
El Aprendizaje Virtual
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Magnet links
Magnet linksMagnet links
Magnet links
 
Bit torrent techtalks_dht
Bit torrent techtalks_dhtBit torrent techtalks_dht
Bit torrent techtalks_dht
 
DHT and NAT
DHT and NATDHT and NAT
DHT and NAT
 
Bittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_VanamaBittorrent_project_Srikanth_Vanama
Bittorrent_project_Srikanth_Vanama
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec7 Tips to Beautiful PowerPoint by @itseugenec
7 Tips to Beautiful PowerPoint by @itseugenec
 
The Search for Meaning in B2B Marketing
The Search for Meaning in B2B MarketingThe Search for Meaning in B2B Marketing
The Search for Meaning in B2B Marketing
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...The drawbridge to knowledge - Linking scholarly publications and research inf...
The drawbridge to knowledge - Linking scholarly publications and research inf...
 

Semelhante a Bit torrent ppt

Semelhante a Bit torrent ppt (20)

Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
BitTorrent Seminar Report
BitTorrent Seminar ReportBitTorrent Seminar Report
BitTorrent Seminar Report
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
P2p networks slides for show
P2p networks slides for showP2p networks slides for show
P2p networks slides for show
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 
P2p networks
P2p networksP2p networks
P2p networks
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 

Mais de Santosh Kumar

human computer interface
human computer interfacehuman computer interface
human computer interfaceSantosh Kumar
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence pptSantosh Kumar
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systemsSantosh Kumar
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technologySantosh Kumar
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 

Mais de Santosh Kumar (8)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence ppt
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systems
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

Bit torrent ppt

  • 1. BITTORRENT May22,2013 1 By K Ravi Teja Varma 09131A1272 B. Tech, 8th Sem
  • 2. CONTENTS May22,2013 2 •Introduction •Types Of Data Sharing •Traditional Client-Server Downloading •Peer-Peer Downloading •Gnutella Network •Why BitTorrent? •What actually a BitTorrent is? •BitTorrent Terminology •How BitTorrent works? •Downloading Files Using BitTorrent •Seeding Torrent •How to create a dot torrent file •Conclusion •References
  • 3. INTRODUCTION May22,2013 3 • Humans tend to share things. • As electronic data plays a vital role these days, they acquire the “sharing” attribute. • Sharing electronic data(emails, ebooks, multimedia files) is the need of the hour. • Data sharing must be fast enough as we are now moving to 3G and 4G technologies, users expect data sharing at high speeds.
  • 4. TYPES OF DATA SHARING  Manual Sharing Using Removable Media: Such as USB drives, External Hard disks.  Centralized Servers of Computer Networks: Network of computers interconnected for sharing resources and information via a central server.  Distributed Peer-to-Peer networking: Is a Computer network where each system in the network acts as client or server allowing shared access of resources without the need of central server. May22,2013 4
  • 5. TRADITIONAL CLIENT-SERVER DOWNLOADING May22,2013 5 •You open a Webpage and click a link to download a file to your computer. •The Web browser software on your computer (the client) tells the server (a central computer that holds the Web page and the file you want to download) to transfer a copy of the file to your computer. •The transfer is handled by a protocol (a set of rules), such as FTP (File Transfer Protocol) or HTTP (HyperText Transfer Protocol).
  • 6. CONTD. May22,2013 6 •The transfer speed is affected by a number of variables, including the type of protocol, the amount of traffic on the server and the number of other computers that are downloading the file. •If the file is both large and popular, the demands on the server are great, and the download will be slow.
  • 7. PEER-PEER DOWNLOADING May22,2013 7 •In peer-to-peer sharing, a software program is used instead a Web Browser to locate computers that have the file user want. •These are ordinary computers like the users, they are called PEERS. • The process works like this: • You run peer-to-peer file-sharing software (for example, a Napster program or Gnutella) on your computer and send out a request for the file you want to download. •To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.
  • 8. CONTD. May22,2013 8 •When the software finds a computer that has the file you want on its hard drive , the download begins. •Others using the file-sharing software can obtain files they want from your computer's hard drive. •The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks.
  • 9. CONTD. May22,2013 9 •Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching. • This limits the number of computers the software can search for the requested file .
  • 10. GNUTELLA NETWORK May22,2013 10 How a Gnutella client finds a song Given that there is no central server to store the names and locations of all the available files, how does the Gnutella software on your machine find a song on someone else's machine? The process goes like this: • Type the name of the song or file we want to find. • Your machine knows of at least one other Gnutella machine somewhere on the network.
  • 11. CONTD. May22,2013 11 •Your machine sends the song name you typed in to the Gnutella machine(s) . •These machines search to see if the requested file is on the local hard disk. If so, they send back the file name (and machine IP address) to the requester. •At the same time, all of these machines send out the same request to the machines they are connected to, and the process repeats. •A request has a TTL (time to live) limit placed on it.
  • 12. CONTD. May22,2013 12  A request might go out six or seven levels deep before it stops propagating. If each machine on the Gnutella network knows of just four others, that means that your request might reach 8,000 or so other machines on the Gnutella network if it propagates seven levels deep.
  • 13. CONTD. May22,2013 13 •It is an extremely simple and clever way of distributing a query to thousands of machines very quickly. •This approach has one big advantage -- Gnutella works all the time , as long as you can get to at least one other machine running Gnutella software, you are able to query the network. •No court order is going to shut this system down, because there is no one machine that controls everything.
  • 14. WHY BITTORRENT? May22,2013 14 •Unlike some other peer-to-peer downloading methods, BitTorrent is a protocol that offloads some of the file tracking work to a central server called a Tracker. •Another difference is that it uses a principal called tit-for-tat. •This means that in order to receive files, you have to give them. This solves the problem of leeching -- one of developer Bram Cohen's primary goal.
  • 15. WHAT IS BITTORRENT? May22,2013 15 •BitTorrent is a protocol that enables fast downloading of large files using minimum Internet bandwidth. •It costs nothing to use and includes no spyware or pop-up advertising. •The most popular video, audio or software files can be transferred faster and cheaper by using BitTorrent.
  • 16. BITTORRENT TERMINOLOGY May22,2013 16 Leeches - People who download files but do not share files on their own computer with others. Seed or seeder - A computer with a complete copy of a BitTorrent file (At least one seed computer is necessary for a BitTorrent download to operate). Swarm - A group of computers simultaneously sending (uploading) or receiving (downloading) the same file. .torrent - A pointer file that directs your computer to the file you want to download. Tracker - A server that manages the BitTorrent file-transfer process.
  • 17. HOW BITTORRENT WORKS? May22,2013 17 •You open a Web page and click on a link for the file you want. •BitTorrent client software communicates with a tracker to find other computers running BitTorrent that have the complete file (seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file). •The tracker identifies the swarm, which are connected computers that have all or a portion of the file and are in the process of sending or receiving it. •The tracker helps the client software to trade pieces of the file we want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.
  • 18. CONTD. May22,2013 18 If you continue to run the BitTorrent client software after your download is complete, others can receive .torrent files from your computer; your future download rates improve because you are ranked higher in the "tit-for-tat" system.
  • 19. DOWNLOADING FILES USING BITTORRENT May22,2013 19 •Just like you need a URL: www.google.com to go to that site and download content.We need a „torrent file‟ that tells BitTorrent the necessary information to download the content. •Websites like legaltorrents.com offer all kinds of torrents. •Once you have obtained torrent file, you need to import it to BitTorrent: •Click File->Add Torrent or Press CTRL+O. •Double click on Torrent file.
  • 21. SEEDING TORRENT May22,2013 21 •Seeding is where you leave your BitTorrent client after you finish download to help distribute it. •BitTorrent will continue seeding until you remove it (Right click the torrent and hit Remove) .
  • 22. HOW TO CREATE A .TORRENT FILE May22,2013 22
  • 25. CONCLUSION  News of increased adoption of this revolutionary protocol continues to emerge, and this seems to be a rich area for continued research in computer networking, with significant potential benefits to society.  If BitTorrent and similar protocols do find a legal place in the internet, it will certainly help to pave the way for distributing rich media on the internet, and provide the impetus for new innovations. May22,2013 25
  • 26. REFERENCES May22,2013 26 1. http://computer.howstuffworks.com/bittorrent.htm 2. http://en.wikipedia.org/wiki/BitTorrent 3. http://computer.howstuffworks.com/file-sharing.htm 4. http://en.wikipedia.org/wiki/World_Wide_Web 5. http://en.wikipedia.org/wiki/Computer_network 6. http://www.bittorrent.com/help/guides/beginners-guide