SlideShare a Scribd company logo
Bit Torrent Protocol
CONTENTS
 INTRODUCTION
 OTHER FILE TRANSFOR METHODS
 STRIKING CHARACTERISTICS
 TERMINOLOGY
 ARCHITECTURE OF BITORRENT
 COMPONENTS OF BITTORRENT SYSTEM
 WORKING OF BITTORRENT
 CONCLUSION
 Bit torrent is created by bram cohen
 Transfer of large files using the minimum
internet bandwidth
 Peer-to-peer file transfer protocol
 Files are shared by many users
 Active participation of all users
 Huge success in the file sharing domain
 35% of internet traffic
Introduction
Other File Transfer Methods
 Typical HTTP file transfer
 Download Accelerator Plus (DAP)
 Other Peer to Peer systems
• Kazaa, eDonkey, Direct Connect ….
Striking Characteristics
 A central server is not needed
 No single point of failure
 More the number of users, greater will be the
transfer rate
 Data available in pieces, not as a single large
file
Terminology
 Torrent
 Peer
 Seed
 Leecher
 Swarm
 Reseed
 Tracker
 Share Ratio
Architecture of BitTorrent
HTTP Peer – Tracker
TCP Peer – Peer
Components of BitTorrent System
 Metainfo File
 Data
 Tracker
 Peers
 Client
Metainfo file
 Containes all information about a
torrent
 File with a .torrent extension
 Encoding scheme used by bittorrent is
called bencoding
 Hash of all the pieces are present in
info field of metainfo file
Data
 Data can be a single file or multiple files
contained in a directory
 Data is split into many pieces of equal size
 Each piece is further divided into many
blocks
 A piece will have a hash, needed for data
integrity check
 Common piece sizes are 256kb, 512kb and
1mb
Tracker
 Manages users participating in a torrent
 Helps peers find each other
 It is a HTTP service that works on port 6969
 Peers request tracker for other peers having
the required pieces
 Tracker responds with a list of peers that
have the requested piece
 A tracker can manage many torrents
Bit Torrent Protocol
Scraping
 Querying the state of a given torrent
 Tracker responds with a scrape page
Announce URL : http://example.com/announce
Scrape URL : http://example.com/scrape
 Scrape page has the following keys
• complete
• incomplete
• downloaded
Peers
 Ports 6881 – 6889 are used by peers
 Peers speak TCP
 Following are the key strategies used by
peers while sharing files
• Random First Piece
• Rarest First
• Endgame Mode
• Peer Distribution
• Choking
• Optimistic Unchoking
 Peers perform a handshake to start the
communication
 Handshaking involves these messages
• Character 19 followed by ‘BitTorrent Protocol’
• 20 bytes hash of the info field from metainfo file
• 20 bytes peer id
 Peers start talking to each other
 They pass a number of messages between
them to send data and control the interactions
Client
 Executable program running on user’s
machine
 Co ordinates with OS to perform read write
operations
 A .torrent file must be opened by the client
 Peers with same client perform better
Working of BitTorrent
1. Seeder generates a
torrent file and
uploads torrent to a
web server.
2. The seeder notifies
the tracker that it is
sharing the file
described in the
torrent file.
3. A leecher
downloads the
torrent file from the
web server.
4. The leecher
connects to the
tracker specified in
the torrent file.
5. The leecher
connects to its
peers to retrieve
pieces of the files.
Conclusion
 BitTorrent is a popular P2P technology deployed
across the Internet.
 The protocol has found a niche as a preferred
method for the decentralized distribution of large
files.
 It provides data integrity which ensures that the
data will always be genuine and free from flaws.
 BitTorrent uses tit for tat exchange to increase
cooperation among peers and has developed a
reputation for being efficient, scalable, and robust.
References:
 Cohen, Bram. “Incentives Build Robustness
in BitTorrent. 2003.
http://www.bittorrent.com/bittorrentecon.pdf
 BitTorrent Protocol.
http://www.bittorrent.org/protocol.html
THANK YOU

More Related Content

PPT
Set model and page fault.44
PPTX
The medium access sublayer
PPT
X Window System
PPTX
Multi version Concurrency Control and its applications in Advanced database s...
PPTX
Context switching
PPTX
Leaky bucket A
PPT
Network hardware
PPT
Server Side Technologies
Set model and page fault.44
The medium access sublayer
X Window System
Multi version Concurrency Control and its applications in Advanced database s...
Context switching
Leaky bucket A
Network hardware
Server Side Technologies

What's hot (20)

PPTX
Virtual machines and their architecture
PPTX
Cloud computing
PPTX
Clusters
PPTX
Dead Lock in operating system
PPTX
Isolation of vm
PDF
Inter Process Communication
PPTX
Network
PPT
HDLC, PPP and SLIP
PPTX
Common Layer 2 Threats, Attacks & Mitigation
PPT
Cloud Security
PPTX
Parallel computing
PPTX
6.distributed shared memory
PPTX
Microkernel architecture
PPTX
Distributed Operating Systems
PPTX
Middleware Technologies ppt
DOCX
Operating System Process Synchronization
PPTX
Network virtualization
PPTX
Input output files in java
PPT
csma ca
Virtual machines and their architecture
Cloud computing
Clusters
Dead Lock in operating system
Isolation of vm
Inter Process Communication
Network
HDLC, PPP and SLIP
Common Layer 2 Threats, Attacks & Mitigation
Cloud Security
Parallel computing
6.distributed shared memory
Microkernel architecture
Distributed Operating Systems
Middleware Technologies ppt
Operating System Process Synchronization
Network virtualization
Input output files in java
csma ca
Ad

Viewers also liked (20)

PPTX
Bittorrent
PPT
The eMule application of the eDonkey protocol
PPT
P2P in 2020 - The Push for Supplier Self-Service
PPTX
Bit torrent protocol seminar by Sanjay R
PDF
Magnet links
PPT
Bittorrent_project_Srikanth_Vanama
PDF
Bit torrent techtalks_dht
PPT
BitTorrent - sharing files has never been easier
KEY
DHT and NAT
PPTX
Bit Torrent
PDF
BitTorrent
PPSX
Bittorrent Seminar by dhananjay pardeshi
PPTX
PPTX
Bit torrent Technology ppt
PPT
Bit torrent-technology
PPT
Bit Torrent presentation
PPTX
Bit torrent ppt
PPT
Introduction to Peer-to-Peer Networks
PPT
BitTorrent Protocol
PPT
P2PFile
Bittorrent
The eMule application of the eDonkey protocol
P2P in 2020 - The Push for Supplier Self-Service
Bit torrent protocol seminar by Sanjay R
Magnet links
Bittorrent_project_Srikanth_Vanama
Bit torrent techtalks_dht
BitTorrent - sharing files has never been easier
DHT and NAT
Bit Torrent
BitTorrent
Bittorrent Seminar by dhananjay pardeshi
Bit torrent Technology ppt
Bit torrent-technology
Bit Torrent presentation
Bit torrent ppt
Introduction to Peer-to-Peer Networks
BitTorrent Protocol
P2PFile
Ad

Similar to Bit Torrent Protocol (20)

PPTX
Filesharing using bittorrent protocol
PPT
Torrent Seminar inc.- working, terms, details
PPT
Bit torrent protocol
PPT
Bittorrent
PPTX
Bit torrent protocol by milan varia
PPTX
Bittorrent final seminar
PPT
Bittorrent
PPTX
Bit Torrent technology
DOC
Copy Of Part 4
PPTX
Bit Torrent Technology
PDF
Torrent technology
PPTX
Bit torrent seminar
PPTX
UNRAVEILING BIT-TORRENT
PDF
Bit torrent and tracker
PDF
(130316) #fitalk bit torrent protocol
PDF
Project_report_BitTorrent
PDF
Bit sync personal_cloud
PPT
Torrent Protocol
PPTX
BitTorrent
Filesharing using bittorrent protocol
Torrent Seminar inc.- working, terms, details
Bit torrent protocol
Bittorrent
Bit torrent protocol by milan varia
Bittorrent final seminar
Bittorrent
Bit Torrent technology
Copy Of Part 4
Bit Torrent Technology
Torrent technology
Bit torrent seminar
UNRAVEILING BIT-TORRENT
Bit torrent and tracker
(130316) #fitalk bit torrent protocol
Project_report_BitTorrent
Bit sync personal_cloud
Torrent Protocol
BitTorrent

More from Ali Habeeb (20)

PPT
Anonymous Connections And Onion Routing
PPT
Opinion Mining
PPT
PPT
USB 3.0
PPTX
Blue Eyes
PPT
Cloud Security
PDF
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
PPTX
Web Security
PPTX
Secure erasure code based distributed storage system with secure data forwarding
PPT
Organizing User Search Histories
PPTX
Detecting and Resolving Firewall Policy Anomalies
PPTX
A study of Data Quality and Analytics
PPT
Adhoc and Sensor Networks - Chapter 10
PPT
Adhoc and Sensor Networks - Chapter 09
PPT
Adhoc and Sensor Networks - Chapter 08
PPT
Adhoc and Sensor Networks - Chapter 07
PPT
Adhoc and Sensor Networks - Chapter 06
PPT
Adhoc and Sensor Networks - Chapter 05
PPT
Adhoc and Sensor Networks - Chapter 04
PPT
Adhoc and Sensor Networks - Chapter 03
Anonymous Connections And Onion Routing
Opinion Mining
USB 3.0
Blue Eyes
Cloud Security
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Web Security
Secure erasure code based distributed storage system with secure data forwarding
Organizing User Search Histories
Detecting and Resolving Firewall Policy Anomalies
A study of Data Quality and Analytics
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 03

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PPTX
Big Data Technologies - Introduction.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
sap open course for s4hana steps from ECC to s4
Programs and apps: productivity, graphics, security and other tools
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Digital-Transformation-Roadmap-for-Companies.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding

Bit Torrent Protocol

  • 2. CONTENTS  INTRODUCTION  OTHER FILE TRANSFOR METHODS  STRIKING CHARACTERISTICS  TERMINOLOGY  ARCHITECTURE OF BITORRENT  COMPONENTS OF BITTORRENT SYSTEM  WORKING OF BITTORRENT  CONCLUSION
  • 3.  Bit torrent is created by bram cohen  Transfer of large files using the minimum internet bandwidth  Peer-to-peer file transfer protocol  Files are shared by many users  Active participation of all users  Huge success in the file sharing domain  35% of internet traffic Introduction
  • 4. Other File Transfer Methods  Typical HTTP file transfer  Download Accelerator Plus (DAP)  Other Peer to Peer systems • Kazaa, eDonkey, Direct Connect ….
  • 5. Striking Characteristics  A central server is not needed  No single point of failure  More the number of users, greater will be the transfer rate  Data available in pieces, not as a single large file
  • 6. Terminology  Torrent  Peer  Seed  Leecher  Swarm  Reseed  Tracker  Share Ratio
  • 8. HTTP Peer – Tracker TCP Peer – Peer Components of BitTorrent System  Metainfo File  Data  Tracker  Peers  Client
  • 9. Metainfo file  Containes all information about a torrent  File with a .torrent extension  Encoding scheme used by bittorrent is called bencoding  Hash of all the pieces are present in info field of metainfo file
  • 10. Data  Data can be a single file or multiple files contained in a directory  Data is split into many pieces of equal size  Each piece is further divided into many blocks  A piece will have a hash, needed for data integrity check  Common piece sizes are 256kb, 512kb and 1mb
  • 11. Tracker  Manages users participating in a torrent  Helps peers find each other  It is a HTTP service that works on port 6969  Peers request tracker for other peers having the required pieces  Tracker responds with a list of peers that have the requested piece  A tracker can manage many torrents
  • 13. Scraping  Querying the state of a given torrent  Tracker responds with a scrape page Announce URL : http://example.com/announce Scrape URL : http://example.com/scrape  Scrape page has the following keys • complete • incomplete • downloaded
  • 14. Peers  Ports 6881 – 6889 are used by peers  Peers speak TCP  Following are the key strategies used by peers while sharing files • Random First Piece • Rarest First • Endgame Mode • Peer Distribution • Choking • Optimistic Unchoking
  • 15.  Peers perform a handshake to start the communication  Handshaking involves these messages • Character 19 followed by ‘BitTorrent Protocol’ • 20 bytes hash of the info field from metainfo file • 20 bytes peer id  Peers start talking to each other  They pass a number of messages between them to send data and control the interactions
  • 16. Client  Executable program running on user’s machine  Co ordinates with OS to perform read write operations  A .torrent file must be opened by the client  Peers with same client perform better
  • 17. Working of BitTorrent 1. Seeder generates a torrent file and uploads torrent to a web server. 2. The seeder notifies the tracker that it is sharing the file described in the torrent file.
  • 18. 3. A leecher downloads the torrent file from the web server. 4. The leecher connects to the tracker specified in the torrent file.
  • 19. 5. The leecher connects to its peers to retrieve pieces of the files.
  • 20. Conclusion  BitTorrent is a popular P2P technology deployed across the Internet.  The protocol has found a niche as a preferred method for the decentralized distribution of large files.  It provides data integrity which ensures that the data will always be genuine and free from flaws.  BitTorrent uses tit for tat exchange to increase cooperation among peers and has developed a reputation for being efficient, scalable, and robust.
  • 21. References:  Cohen, Bram. “Incentives Build Robustness in BitTorrent. 2003. http://www.bittorrent.com/bittorrentecon.pdf  BitTorrent Protocol. http://www.bittorrent.org/protocol.html