Preview

Bittorrent Protocol

Powerful Essays
Open Document
Open Document
7770 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bittorrent Protocol
Index

Introduction 1

BitTorrent and Other approaches 2

Working of BitTorrent 7

Terminology 10

Architecture of BitTorrent 11

Vulnerabilities of BitTorrent 21

Conclusion 24

1. Introduction

2.1 Overview

BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. BitTorrent is one of the most common protocols for transferring large files. Its main usage is for the transfer of large sized files. It makes transfer of such files easier by implementing a different approach. A user can obtain multiple files simultaneously without any considerable loss of the transfer rate. It is said to be a lot better than the conventional file transfer methods because of a different principle that is followed by this protocol. It also evens out the way a file is shared by allowing a user not just to obtain it but also to share it with others. This is what has made a big difference between this and the conventional file transfer methods. It makes a user to share the file he is obtaining so that the other users who are trying to obtain the same file would find it easier and also in turn making these users to involve themselves in the file sharing process. Thus the larger the number of users the more is the demand and more easily a file can be transferred between them.
BitTorrent protocol has been built on a technology which makes it possible to distribute large amounts of data without the need of a high capacity server, and expensive bandwidth. This is the most striking feature of this file transfer protocol. The transferring of files will never depend on a single source which is supposed the original copy of the file but instead the load will be distributed across a number of such sources. Here not just the sources are responsible for file transfer but also the clients or users who want to obtain the file are involved in this process. This makes the load get distributed

You May Also Find These Documents Helpful

  • Best Essays

    Nt1310 Unit 4 Exercise 1

    • 1486 Words
    • 6 Pages

    Phase 5: File caching strategy: The caching strategy is used to cache local index file and correlated files. Based on the strategy, communications with HDFS are drastically reduced thus to improve the access efficiency, when downloading files. When a requested file misses in cache, the client needs to query NameNode for file metadata. According to the metadata, the client connects with appropriate DataNodes where blocks locate. When the local index file is firstly read, based on the offset and length, the requested file is split from the block, and is returned to the client.…

    • 1486 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Why would you use http or ftp instead of bit torrent for downloading large files? == you would use ftp because it does not have client authorization needed, and you would use http because it connects directly to a server to download when with bit torrent uses more TCP connections which can be blocked by firewalls..…

    • 1850 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Thank you for providing the California Department of Transportation (Department) the opportunity to review and comment on the Draft Initial Study for the City’s San Antonio Water Company’s Proposed Cucamonga Crosswalls Maintenance Project (Project). The Project facility is located in the Cucamonga Creek Wash in an unincorporated area of the County (San Antonio Heights) and in the City of Rancho Cucamonga, immediately north of the City of Upland’s corporate boundary.…

    • 661 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    appendix b

    • 569 Words
    • 2 Pages

    The peer to peer network is unique because it has no central hub for any of the computers that is on the network. The computers are connected to each other and each computer hold a piece of the network capability, each computer handles part of the processing power, the memory requirements, and the communication processes. The components in this network are computers that are connected to each other and the cables that they are connected to. This type of network does not allow many additions to the…

    • 569 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In a peer-to-peer network, all of the devices connected to the network share each other’s resources. This is common in a LAN network that does not have a server.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Concept |Application of Concept to the Issue of Downloading |Reference to Concept in Reading |…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The Kazaa Overlay

    • 8801 Words
    • 36 Pages

    [19] J. Liang, R. Kumar, Y. Xi, K.W. Ross, Pollution in P2P File Sharing Systems,"…

    • 8801 Words
    • 36 Pages
    Powerful Essays
  • Better Essays

    Antebellum Era Slavery

    • 1198 Words
    • 5 Pages

    Slavery has tremendously influenced the pathway of American history. During the Antebellum period, slavery provided a firm basis for the economy of the United States, governed politics, and eventually led to the war between the North and South. People in bondage were forced to work and live in unsanitary conditions, made to feel like livestock as they were bought and sold in the infamous slave market, and were scrutinized and ridiculed for their heritage. Slavery was implemented by the men and women of American colonization to take over the harvesting process of crops in the South, but caused the majority of American citizens to refocus their moral compass and choose whether or not to support this peculiar institution. Tension regarding the…

    • 1198 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The internet has allowed a proliferation of other forms of file sharing. People can share digital files either in an open system, where anyone can access them, or in a restricted was that allows access only to certain people. This technology also poses great risks to copyright. When a person makes a product that is subject to copyright; that is, another person cannot copy it without permission from the original producer.…

    • 2970 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    4. Transparency of location: The server can reside on the same machine as the client or on a different machine across a network. Client/server software usually masks the location of…

    • 3507 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    The Napster Debate

    • 2873 Words
    • 12 Pages

    <br>Unlike similar file-sharing applications (Gnutella, Freenet), Napster limits users to uploading/downloading of MP3 files only. These files are compressed wave (.wav) files. The advantage of MP3 files is that they are approximately one-tenth the size of the corresponding .wav file and can be close-to-CD-quality. It is for this reason that many artists, record labels and other music industry stakeholders are concerned by the MP3 file format and applications like Napster that simplify the sharing of copyrighted material.…

    • 2873 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Martin Luther King Jr once encouraged, “ We must develop and maintain the capacity to forgive. He who is devoid of the power to forgive is devoid of the power to love. There is some good in the worst of us and some evil in the best of us. When we discover this, we are less prone to hate our enemies.” This proves that we must expand and preserve the amount of forgiveness in our hearts to help others. In the short story, “Thank You, M’am” by Langston Hughes, One night, Rodger, a homeless fourteen year old boy, seized a large woman’s pocketbook, but before he could escape with the handbag, Mrs. Luella Bates Washington Jones captured Roger and dragged him to her household. Mrs. Luella Bates Washington Jones a compassionate antagonist of the short story,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    References: Hurwicz, Michael (2002, February 01). Peer pressure: Securing P2P networking. Network Magazine, (2), 60, Retrieved from http://elibrary.bigchalk.com…

    • 3909 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    The company proposed a new way to distribute content over the Internet. The reason why this technology is invented is a real problem related to the Internet. The main problem is that existing routing systems on the Internet are not able to serve new needs of consumers. Consumers moved to more sophisticated multi-media applications and routing system became overloaded. It resulted with delays in the system and slowness of the web in peak periods.…

    • 1796 Words
    • 8 Pages
    Satisfactory Essays

Related Topics