Preview

Bittorrent Protocol

Powerful Essays
Open Document
Open Document
7770 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bittorrent Protocol
Index

Introduction 1

BitTorrent and Other approaches 2

Working of BitTorrent 7

Terminology 10

Architecture of BitTorrent 11

Vulnerabilities of BitTorrent 21

Conclusion 24

1. Introduction

2.1 Overview

BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. BitTorrent is one of the most common protocols for transferring large files. Its main usage is for the transfer of large sized files. It makes transfer of such files easier by implementing a different approach. A user can obtain multiple files simultaneously without any considerable loss of the transfer rate. It is said to be a lot better than the conventional file transfer methods because of a different principle that is followed by this protocol. It also evens out the way a file is shared by allowing a user not just to obtain it but also to share it with others. This is what has made a big difference between this and the conventional file transfer methods. It makes a user to share the file he is obtaining so that the other users who are trying to obtain the same file would find it easier and also in turn making these users to involve themselves in the file sharing process. Thus the larger the number of users the more is the demand and more easily a file can be transferred between them.
BitTorrent protocol has been built on a technology which makes it possible to distribute large amounts of data without the need of a high capacity server, and expensive bandwidth. This is the most striking feature of this file transfer protocol. The transferring of files will never depend on a single source which is supposed the original copy of the file but instead the load will be distributed across a number of such sources. Here not just the sources are responsible for file transfer but also the clients or users who want to obtain the file are involved in this process. This makes the load get distributed

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Peer-to-Peer technology allows you to share of computer files by exchanging them with other systems. This kind of sharing became popular in the late 90’s with the first site by the name of NAPSTER. Napster changed file sharing because it was accessible for anyone that had an active internet connection. After Napster became so popular, a lot of individuals saw this as a gateway to open more sites to upload and share music files over the internet.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Why would you use http or ftp instead of bit torrent for downloading large files? == you would use ftp because it does not have client authorization needed, and you would use http because it connects directly to a server to download when with bit torrent uses more TCP connections which can be blocked by firewalls..…

    • 1850 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    The online gaming industry has increased dramatically since technology’s capabilities have increased. The current protocol for online gaming is UDP because of less latency. If it were an FTP protocol it would have more latency because FTP headers are larger in size and the retransferring of files would populate the bandwidth too much and it would make the online gaming experience less enjoyable.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It the most-frequently used file transfer tool, but it is vulnerable. You explored the protocol…

    • 381 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Case Study 1

    • 516 Words
    • 2 Pages

    Person-to-person or P2P networking, Sean Fanning, an 18-year-old student with the nickname ‘the Napster’, was intrigued by the challenge of being able to enable his friends to ‘see’ and share between their own personal record collections. Napster.com did not actually hold any music on its files – but every day millions of swaps were made by people around the world exchanging their music collections. Napster opened a door for many others to reinvent similar software’s or technologies successful iPod personal MP3 player they opened a site called iTunes which offered users a choice of thousands of tracks for download at 99c each. This allowed over 1 billion songs to legally be purchased and downloaded…

    • 516 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Nt1310 Unit 4 Exercise 1

    • 1486 Words
    • 6 Pages

    Phase 5: File caching strategy: The caching strategy is used to cache local index file and correlated files. Based on the strategy, communications with HDFS are drastically reduced thus to improve the access efficiency, when downloading files. When a requested file misses in cache, the client needs to query NameNode for file metadata. According to the metadata, the client connects with appropriate DataNodes where blocks locate. When the local index file is firstly read, based on the offset and length, the requested file is split from the block, and is returned to the client.…

    • 1486 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cis 324 Computer Ethics

    • 2262 Words
    • 10 Pages

    In the short time that computers and internet have existed in the modern era, the world has seen a complete 360 degree turn and in the various forms of electronic entertainment that people all over the world are now using. In the days before CD’s, DVD’s and the internet, not much was said if a vinyl album (remember these?), VHS cassette (or these?) or an audio cassette was loaned to a friend for their listening / viewing pleasure, but today with the availability of sending an email with three or four megabytes (mb) of information, one can enjoy a borrowed song but is assumed that it is piracy or stealing. Is this a fair assumption? This Author will not give his opinion but rather discuss both sides of the Peer to Peer (P2P) downloading and sharing issues and let the reader form their own opinions.…

    • 2262 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Music Piracy

    • 2100 Words
    • 9 Pages

    "File-Sharing: It 's Music to our Ears: Making P2P Legal." EFF. 28 Apr. 2006. Electronic Frontier Foundation. 1 May 2006 .…

    • 2100 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    In a peer-to-peer network, all of the devices connected to the network share each other’s resources. This is common in a LAN network that does not have a server.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Company V. Napster Case

    • 620 Words
    • 3 Pages

    Napster is a very popular web site that allowed many users to share music files. The way that Napster shared music files is through peer-to-peer sharing. These files that are called MP3’s (Motion Picture Expert Group 1, Audio Layer 3: an algorithm that compresses digital music files) were shared between registered users anonymously at no cost to the users. The format of MP3’s reduces the files allowing users to quickly and easily share these files. MP3’s can also be copied multiple times without damaging the quality of the file. Napster allows registered users to download a “Music Share” software that will allow peer-to-peer sharing of the MP3 files. There is a large hub that all registered users had access to through the music sharing software where Napster would manage the download process.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bittorrent

    • 1416 Words
    • 6 Pages

    BitTorrent is a means of distributing large amounts of data from one computer to another to many, many others. It differs from client-server downloads (the…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Going back to the 1970 's we see the first program created to exchange information between two or more users. The CBBS (Computerized Bulletin Board System) was created by Ward Christensen to be able to transfer computer files through an internet connection. Because of the primitive computer technology available at the time, the CBBS had its limitations but was still considered very useful. Next in line in the file sharing timeline is a program called File Transfer Protocol (FTP). Being created in 1985, it was a simple file-sharing program. The most important program throughout peer-to-peer programs history was the project that began in 1999 by a young 19-year old; it started what has turned into one of the biggest headaches for the US government. The infamous Napster was the first and the original peer-to-peer program. The way Napster worked is by searching other peers "shared" files. Let 's say that…

    • 2159 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    appendix b

    • 569 Words
    • 2 Pages

    The peer to peer network is unique because it has no central hub for any of the computers that is on the network. The computers are connected to each other and each computer hold a piece of the network capability, each computer handles part of the processing power, the memory requirements, and the communication processes. The components in this network are computers that are connected to each other and the cables that they are connected to. This type of network does not allow many additions to the…

    • 569 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The company proposed a new way to distribute content over the Internet. The reason why this technology is invented is a real problem related to the Internet. The main problem is that existing routing systems on the Internet are not able to serve new needs of consumers. Consumers moved to more sophisticated multi-media applications and routing system became overloaded. It resulted with delays in the system and slowness of the web in peak periods.…

    • 1796 Words
    • 8 Pages
    Satisfactory Essays

Related Topics