Preview

Bittorrent Protocol

Powerful Essays
Open Document
Open Document
7770 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bittorrent Protocol
Index

Introduction 1

BitTorrent and Other approaches 2

Working of BitTorrent 7

Terminology 10

Architecture of BitTorrent 11

Vulnerabilities of BitTorrent 21

Conclusion 24

1. Introduction

2.1 Overview

BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. BitTorrent is one of the most common protocols for transferring large files. Its main usage is for the transfer of large sized files. It makes transfer of such files easier by implementing a different approach. A user can obtain multiple files simultaneously without any considerable loss of the transfer rate. It is said to be a lot better than the conventional file transfer methods because of a different principle that is followed by this protocol. It also evens out the way a file is shared by allowing a user not just to obtain it but also to share it with others. This is what has made a big difference between this and the conventional file transfer methods. It makes a user to share the file he is obtaining so that the other users who are trying to obtain the same file would find it easier and also in turn making these users to involve themselves in the file sharing process. Thus the larger the number of users the more is the demand and more easily a file can be transferred between them.
BitTorrent protocol has been built on a technology which makes it possible to distribute large amounts of data without the need of a high capacity server, and expensive bandwidth. This is the most striking feature of this file transfer protocol. The transferring of files will never depend on a single source which is supposed the original copy of the file but instead the load will be distributed across a number of such sources. Here not just the sources are responsible for file transfer but also the clients or users who want to obtain the file are involved in this process. This makes the load get distributed

You May Also Find These Documents Helpful

  • Best Essays

    Nt1310 Unit 4 Exercise 1

    • 1486 Words
    • 6 Pages

    Phase 5: File caching strategy: The caching strategy is used to cache local index file and correlated files. Based on the strategy, communications with HDFS are drastically reduced thus to improve the access efficiency, when downloading files. When a requested file misses in cache, the client needs to query NameNode for file metadata. According to the metadata, the client connects with appropriate DataNodes where blocks locate. When the local index file is firstly read, based on the offset and length, the requested file is split from the block, and is returned to the client.…

    • 1486 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Why would you use http or ftp instead of bit torrent for downloading large files? == you would use ftp because it does not have client authorization needed, and you would use http because it connects directly to a server to download when with bit torrent uses more TCP connections which can be blocked by firewalls..…

    • 1850 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Concept |Application of Concept to the Issue of Downloading |Reference to Concept in Reading |…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    appendix b

    • 569 Words
    • 2 Pages

    The peer to peer network is unique because it has no central hub for any of the computers that is on the network. The computers are connected to each other and each computer hold a piece of the network capability, each computer handles part of the processing power, the memory requirements, and the communication processes. The components in this network are computers that are connected to each other and the cables that they are connected to. This type of network does not allow many additions to the…

    • 569 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In a peer-to-peer network, all of the devices connected to the network share each other’s resources. This is common in a LAN network that does not have a server.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Kazaa Overlay

    • 8801 Words
    • 36 Pages

    [19] J. Liang, R. Kumar, Y. Xi, K.W. Ross, Pollution in P2P File Sharing Systems,"…

    • 8801 Words
    • 36 Pages
    Powerful Essays
  • Powerful Essays

    4. Transparency of location: The server can reside on the same machine as the client or on a different machine across a network. Client/server software usually masks the location of…

    • 3507 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The internet has allowed a proliferation of other forms of file sharing. People can share digital files either in an open system, where anyone can access them, or in a restricted was that allows access only to certain people. This technology also poses great risks to copyright. When a person makes a product that is subject to copyright; that is, another person cannot copy it without permission from the original producer.…

    • 2970 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Packettracer

    • 574 Words
    • 3 Pages

    3. Intersite replication uses compressed traffic to reduce the impact to bandwidth on corporate WAN links.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    I INTRODUCTION The Torrens system was first introduced in South Australia in 1858, with other states soon adopting similar legislation. Thus, the Torrens system has come to underpin the transfer of land within Australia. The key feature of the this system is that it involves independent titles, as opposed to the dependent nature of old system title, which required a retrospective investigation of title each individual time the land was conveyed. Moreover, the recognition of equitable rights forms the basis of the caveat system in the Torrens system.…

    • 2003 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    The Napster Debate

    • 2873 Words
    • 12 Pages

    <br>Unlike similar file-sharing applications (Gnutella, Freenet), Napster limits users to uploading/downloading of MP3 files only. These files are compressed wave (.wav) files. The advantage of MP3 files is that they are approximately one-tenth the size of the corresponding .wav file and can be close-to-CD-quality. It is for this reason that many artists, record labels and other music industry stakeholders are concerned by the MP3 file format and applications like Napster that simplify the sharing of copyrighted material.…

    • 2873 Words
    • 12 Pages
    Better Essays
  • Best Essays

    Geol, Sanjay and Paul Meising and Uday Chandra. “The Impact of Illegal Peer-to-Peer File-Sharing on the Media Industry.” California Management Review. Vol.52.no.36-3. Web. 20 Mar. 2012…

    • 1553 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    References: Hurwicz, Michael (2002, February 01). Peer pressure: Securing P2P networking. Network Magazine, (2), 60, Retrieved from http://elibrary.bigchalk.com…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    The company proposed a new way to distribute content over the Internet. The reason why this technology is invented is a real problem related to the Internet. The main problem is that existing routing systems on the Internet are not able to serve new needs of consumers. Consumers moved to more sophisticated multi-media applications and routing system became overloaded. It resulted with delays in the system and slowness of the web in peak periods.…

    • 1796 Words
    • 8 Pages
    Satisfactory Essays

Related Topics