Bittorent Presentation

  • Uploaded by: yogendra sahu
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Bittorent Presentation as PDF for free.

More details

  • Words: 736
  • Pages: 23
A SEMIMAR REPORT ON BITTORENT PROTOCOL

Outline 1 Introduction  2 Overview of BitTorrent  3 BitTorrent protocol 1.0  4 New features  5 References 

1 Introduction    

 

30% of all Internet bandwidth was used by BitTorrent at the end of 2004. popular ways of sharing and downloading files. BitTorrent is used for legal distribution of files and to illegally share and download of copyrighted material. Due technology within the protocol large amounts of data can be distributed without the need of a high capacity server, and expensive bandwidth. Bittorent is decentralized.

2 Overview of BitTorrent  BitTorrent is

a file sharing protocol, implementing peer-to-peer technology.  A file is divided into smaller pieces.  A piece downloaded by a peer is then shared for uploading by that peer. 

COMPONENTS OF THE PROTOCOL 

 







Metainfo file. Describes metadata about the sharing file(s), and the tracker, and has the file ending .torrent. Tracker. A central server keeping track of peers and seeds sharing and downloading the file(s). Peer. A user on the network downloading the file(s), and sharing the parts that have been successfully downloaded. Seed. A peer that has the complete file or files available for sharing. At least one seed is needed in the beginning for the sharing to be possible. Client. An application implementing the BitTorrent protocol.

BITTORENT WORKING

1.DOWNLOAD THE TORRENT FILE

2.Contact the Tracker

3.Tracker Response

4.Peer Connection

5.Peer A downloads a piece from the network.

6.Piece exchange starts.

7.Peers periodically contact tracker.

3 BitTorrent protocol 1.0  designed

by Bram Cohen. 3.1 Metainfo file structure: .torrent file is bencoded.  Bencoding -way to organize data. Types supported : byte strings, integers, lists and dictionaries.  A metainfo file can be in one of two modes: Single-file mode and Multi-file mode. 



Keys in the dictionary  length:

The length of the file in bytes  · name: The name of the file  · piece length: The piece length in bytes  · pieces: A 20 byte SHA1 hash file.  md5sum: 32 byte string file.  announce-list: list of tracker URL.  creation date  Comment  created by

3.2 Tracker protocol  implemented on

top of HTTP/HTTPS.  client sends a GET request to the tracker URL+CGI variables.  E.g.http://some.url.com /announce?var1=value1&var2=value2&var3=  tracker responds with a “text/plain” document, containing a bencoded dictionary.  client then sends rerequests, either on regular intervals, or when an event occurs, and the tracker responds.

4 New features 4.1 DHT (Distributed Hash Table)  Problems: centralized services,(query flooding broadcasts a message over whole network). Merits of DHT:  provides lookup service.  Any participating node can retrieve the value associated with given key easily.  Maintenance of mapping keys is distributed to nodes.  Highly scalable. 



4.2 Multi trackers  To

avoid interruption when a tracker fails, multiple trackers is used.  [‘announce-list’] = [ [tracker1] , [backup1] , [backup2] ]  [ [tracker3,tracker2,tracker1] ] [‘announce-list’] = [ [tracker1,tracker2] , [backup1] ] 

4.3 Encryption  Due

to high BitTorrent traffic of 30% bandwidth, some ISPs block BT traffic.  encryption of BitTorrent traffic was implemented in some clients to fool the ISPs blocking system.  encrypting and recognition of BitTorrent traffic, takes up resources.  That’s why ISPs don’t implement this kind of blocking.  It is known as traffic shaping or bandwidth throttling. 

5 References

 http://www.cachelogic.com/research/2005_slide06 

http://www.bittorrent.com/protocol.html

  http://wiki.theory.org/BitTorrentSpecification   http://home.elp.rr.com/tur/multitracker-spec.txt 

 http://www.cs.rice.edu/Conferences/IPTPS02/174.  http://www.slyck.com/news.php?story=1083  

The Pirate Bay Raid 2004: MPAA pressured the U.S. and Swedish government to shut down The Pirate Bay  May 2006: Police in Sweden raided The Pirate Bay, shut down their website, & confiscated their servers  The Pirate Bay 

 BitTorrent search engine & tracker server  Launched in November 2003 by

Gottfrid Svartholm & Fredrik Neij

Down for 3 days  Publicity and +1.7 million more users 

The Pirate Bay Trial January 2008: Criminal & civil prosecution in Sweden for promoting the copyright infringement of others with torrents by the International Federation of the Phonographic Industry (IFPI).  Fredrik Neij, Gottfrid Svartholm, Peter Sunde, and Carl Lundström  Found guilty 

Sentenced to 1 year in prison Pay a fine of $3.5 million

SUBMITTED BY YOGENDRA KUMAR SAHU (0201IT071089) PRASHANT KUMAR (0201IT071049) IT V SEM JABALPUR ENGINEERING COLLEGE JABALPUR

Related Documents

Presentation
May 2020 0
Presentation
May 2020 0
Presentation
June 2020 0
Presentation
June 2020 0
Presentation
June 2020 0

More Documents from ""

Osi Layer Presentation
June 2020 17
Scheduling-aggrement.pdf
December 2019 17
Pipeline_sap__settlement.doc
December 2019 16
May 2020 13
Group_5 Section C.docx
November 2019 16