SlideShare a Scribd company logo
Peer to Peer file transfer protocol Transfer of large files Files are shared by many users Active participation of all users Huge success in the file sharing domain 35% of internet traffic Introduction
Striking Characteristics Not dependent on a single source A central server is not needed No single point of failure More the number of users, greater will be the transfer rate Data available in pieces, not as a single large file Tit for tat strategy
Terminology Torrent Peer Seed Leecher Swarm Reseed Tracker Share Ratio
Architecture of BitTorrent
HTTP  Peer – Tracker TCP  Peer – Peer Components of BitTorrent System Metainfo File Data Tracker Peers Client
Metainfo File Contains all information about a torrent File with a .torrent extension It has the following keys  info announce creation date comment created by Keys are encoded before they are sent
Encoding scheme used by BitTorrent is called as Bencoding Hash of all the pieces are present in info field of metainfo file File Distribution Files are uploaded in public sites by seeds Users download this file via HTTP and can participate in the torrent transfer
Data Data can be a single file or multiple files contained in a directory Data is split into many pieces of equal size Each piece is further divided into many blocks A piece will have a hash, needed for data integrity check Common piece sizes are 256kb, 512kb and 1mb
Tracker Manages users participating in a torrent Helps peers find each other It is a HTTP service that works on port 6969 Peers request tracker for other peers having the required pieces Tracker responds with a list of peers that have the requested piece A tracker can manage many torrents
 
HTTP GET message from a peer to a tracker has the following parameters info_hash peer_id uploaded downloaded left port Response message from tracker has the following keys interval tracker_id peers
Scraping Querying the state of a given torrent Tracker responds with a scrape page Announce URL :  http://example.com/announce Scrape URL : http://example.com/scrape Scrape page has the following keys complete incomplete downloaded
Peers Ports 6881 – 6889 are used by peers Peers speak TCP Following are the key strategies used by peers while sharing files Random First Piece Rarest First Endgame Mode Peer Distribution Choking Optimistic Unchoking
Peers perform a handshake to start the communication Handshaking involves these messages Character 19 followed by ‘BitTorrent Protocol’ 20 bytes hash of the info field from metainfo file 20 bytes peer id Peers start talking to each other They pass a number of messages between them to send data and control the interactions
Client Executable program running on user’s machine Co ordinates with OS to perform read write operations A .torrent file must be opened by the client Peers with same client perform better
Sub Protocols Tracker HTTP Protocol (THP) Client sends GET request to tracker URL Tracker responds with a dictionary having all the information Client sends requests at regular intervals Peer Wire Protocol (PWP) Peers keep track of each others state A state has two values, interested and choking
Working of BitTorrent 1. Seeder generates a torrent file and uploads torrent to a web server. 2. The seeder notifies the tracker that it is sharing the file described in the torrent file.
3.  A leecher downloads the torrent file from the web server.  4.  The leecher connects to the tracker specified in the torrent file.
5. The leecher connects to its peers to retrieve pieces of the files.
Attacks on BitTorrent Pollution Attack The peers receive the peer list from the tracker. One peer contacts the attacker for a chunk of the file. The attacker sends back a false chunk.  Attacker requests all chunks from swarm and wastes their upload bandwidth.
 
DDOS Attack The attacker downloads a large number of torrent files from a web server. Attacker spoofs IP address and port with that of victim and notifies the tracker Tracker directs peers towards victim Victim will be flooded with requests from other peers
 
Bandwidth Shaping This is done by user’s ISP Unencrypted BitTorrent packets are easily identified and filtered.  Sophisticated filtering software can detect BitTorrent like behavior. Comcast has recently admitted to filtering BitTorrent traffic.
Current Solutions Pollution Attack Blacklisting Achieved using software such as Peer Guardian or moBlock. Blocks connections from blacklisted IPs which are downloaded from an online database.
DDOS Attack Spoofing needs to be avoided in the first place This can be done by using filters Make the tracker validate a peer whether it has the torrent or not
Bandwidth Shaping Encryption Most BitTorrent clients can encrypt the packets they send. Simple filters which simply look at the contents of the packet can easily be traversed Tunneling Using VPN software to connect to an unfiltered network. Such tunnels which are free from filters provide easy path to BitTorrent packets
Other File Transfer Methods Typical HTTP file transfer Download Accelerator Plus (DAP) Other Peer to Peer systems Kazaa, eDonkey, Direct Connect ….
Conclusion BitTorrent is a popular P2P technology deployed across the Internet.  The protocol has found a niche as a preferred method for the decentralized distribution of large files.  It provides data integrity which ensures that the data will always be genuine and free from flaws. BitTorrent uses tit for tat exchange to increase cooperation among peers and has developed a reputation for being efficient, scalable, and robust.

More Related Content

PDF
Web3 Fundamentals
PPTX
Bit Torrent
PPTX
Bittorrent
PPTX
Introduction to IPFS & Filecoin
PDF
BitTorrent Seminar Report
PPTX
PPT steganography
PPTX
Multimedia Networking
Web3 Fundamentals
Bit Torrent
Bittorrent
Introduction to IPFS & Filecoin
BitTorrent Seminar Report
PPT steganography
Multimedia Networking

What's hot (20)

PPTX
Presentation web 3.0(part 1)
PPT
Bit Torrent presentation
PPTX
Steganography
PPTX
P2P Network in Blockchain
PDF
Metasploit
PPTX
Internet of Things Forensics
PDF
Steganography
PPTX
Internet of things
PPT
Basic Software Tools for multi-media
PDF
Web 3.0 - A Detailed Guide
PPT
Ssl https
PDF
06 Computer Image Verification and Authentication - Notes
PDF
Introduction to Web 3 - Tony Aube at WAQ19
PPTX
Introduction to Mobile Internet
PPTX
Steganography
PPTX
Consensus Algorithms.pptx
PPTX
01 IoT Development History and Overview.pptx
PDF
Media streaming
PDF
ERC20 Step-by-Step - Creating Your First Ethereum Token
PPTX
File Transfer Protocol(FTP)
Presentation web 3.0(part 1)
Bit Torrent presentation
Steganography
P2P Network in Blockchain
Metasploit
Internet of Things Forensics
Steganography
Internet of things
Basic Software Tools for multi-media
Web 3.0 - A Detailed Guide
Ssl https
06 Computer Image Verification and Authentication - Notes
Introduction to Web 3 - Tony Aube at WAQ19
Introduction to Mobile Internet
Steganography
Consensus Algorithms.pptx
01 IoT Development History and Overview.pptx
Media streaming
ERC20 Step-by-Step - Creating Your First Ethereum Token
File Transfer Protocol(FTP)
Ad

Viewers also liked (20)

PPTX
Bit torrent ppt
PPTX
Bit torrent Technology ppt
PDF
BitTorrent
PPT
Bit torrent-technology
PPSX
Bittorrent Seminar by dhananjay pardeshi
PPT
BitTorrent - sharing files has never been easier
PDF
Introduction to BitTorrent Bundle
PPTX
Introduction to the Bittorrent Protocol
PPTX
Bittorrent final seminar
PPTX
PDF
El Aprendizaje Virtual
PPT
Bittorrent_project_Srikanth_Vanama
PPTX
Bit Torrent Technology
PPT
Bit torrent by SANDA SOLUTIONS
PPTX
UNRAVEILING BIT-TORRENT
PDF
(130316) #fitalk bit torrent protocol
PPTX
Bit torrent
PPT
P2P in 2020 - The Push for Supplier Self-Service
PPT
Bit Torrent Protocol
PPT
The eMule application of the eDonkey protocol
Bit torrent ppt
Bit torrent Technology ppt
BitTorrent
Bit torrent-technology
Bittorrent Seminar by dhananjay pardeshi
BitTorrent - sharing files has never been easier
Introduction to BitTorrent Bundle
Introduction to the Bittorrent Protocol
Bittorrent final seminar
El Aprendizaje Virtual
Bittorrent_project_Srikanth_Vanama
Bit Torrent Technology
Bit torrent by SANDA SOLUTIONS
UNRAVEILING BIT-TORRENT
(130316) #fitalk bit torrent protocol
Bit torrent
P2P in 2020 - The Push for Supplier Self-Service
Bit Torrent Protocol
The eMule application of the eDonkey protocol
Ad

Similar to BitTorrent Protocol (20)

PPTX
Bit Torrent technology
PPTX
Bit torrent protocol seminar by Sanjay R
PPT
P2P Forensics
PPT
P2P: Grid-oriented Distribution Systems
PPT
Bittorrent
PPT
Bittorrent
PPTX
Bit torrent a revolution in p2p
PPTX
Bittorrent
PDF
Pac sec2011 ruoando-nict-2011-11-09-01-eng
PDF
Pac sec2011 ruoando-nict-2011-11-09-01-eng
PPTX
Bit torrent seminar
PDF
Project_report_BitTorrent
PPT
Bittorrent
PPTX
Evolution and working of Torrents
PPT
Peerto Peer Networks
PPT
Bittorrent
PPTX
Bit torrent protocol by milan varia
PDF
BitTorrent.pdf
PPTX
Bittorrent
Bit Torrent technology
Bit torrent protocol seminar by Sanjay R
P2P Forensics
P2P: Grid-oriented Distribution Systems
Bittorrent
Bittorrent
Bit torrent a revolution in p2p
Bittorrent
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Pac sec2011 ruoando-nict-2011-11-09-01-eng
Bit torrent seminar
Project_report_BitTorrent
Bittorrent
Evolution and working of Torrents
Peerto Peer Networks
Bittorrent
Bit torrent protocol by milan varia
BitTorrent.pdf
Bittorrent

Recently uploaded (20)

PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharma ospi slides which help in ospi learning
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Cell Structure & Organelles in detailed.
VCE English Exam - Section C Student Revision Booklet
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
O5-L3 Freight Transport Ops (International) V1.pdf
Anesthesia in Laparoscopic Surgery in India
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Basic Mud Logging Guide for educational purpose
Pharma ospi slides which help in ospi learning
TR - Agricultural Crops Production NC III.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O7-L3 Supply Chain Operations - ICLT Program
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Cell Structure & Organelles in detailed.

BitTorrent Protocol

  • 1. Peer to Peer file transfer protocol Transfer of large files Files are shared by many users Active participation of all users Huge success in the file sharing domain 35% of internet traffic Introduction
  • 2. Striking Characteristics Not dependent on a single source A central server is not needed No single point of failure More the number of users, greater will be the transfer rate Data available in pieces, not as a single large file Tit for tat strategy
  • 3. Terminology Torrent Peer Seed Leecher Swarm Reseed Tracker Share Ratio
  • 5. HTTP Peer – Tracker TCP Peer – Peer Components of BitTorrent System Metainfo File Data Tracker Peers Client
  • 6. Metainfo File Contains all information about a torrent File with a .torrent extension It has the following keys info announce creation date comment created by Keys are encoded before they are sent
  • 7. Encoding scheme used by BitTorrent is called as Bencoding Hash of all the pieces are present in info field of metainfo file File Distribution Files are uploaded in public sites by seeds Users download this file via HTTP and can participate in the torrent transfer
  • 8. Data Data can be a single file or multiple files contained in a directory Data is split into many pieces of equal size Each piece is further divided into many blocks A piece will have a hash, needed for data integrity check Common piece sizes are 256kb, 512kb and 1mb
  • 9. Tracker Manages users participating in a torrent Helps peers find each other It is a HTTP service that works on port 6969 Peers request tracker for other peers having the required pieces Tracker responds with a list of peers that have the requested piece A tracker can manage many torrents
  • 10.  
  • 11. HTTP GET message from a peer to a tracker has the following parameters info_hash peer_id uploaded downloaded left port Response message from tracker has the following keys interval tracker_id peers
  • 12. Scraping Querying the state of a given torrent Tracker responds with a scrape page Announce URL : http://example.com/announce Scrape URL : http://example.com/scrape Scrape page has the following keys complete incomplete downloaded
  • 13. Peers Ports 6881 – 6889 are used by peers Peers speak TCP Following are the key strategies used by peers while sharing files Random First Piece Rarest First Endgame Mode Peer Distribution Choking Optimistic Unchoking
  • 14. Peers perform a handshake to start the communication Handshaking involves these messages Character 19 followed by ‘BitTorrent Protocol’ 20 bytes hash of the info field from metainfo file 20 bytes peer id Peers start talking to each other They pass a number of messages between them to send data and control the interactions
  • 15. Client Executable program running on user’s machine Co ordinates with OS to perform read write operations A .torrent file must be opened by the client Peers with same client perform better
  • 16. Sub Protocols Tracker HTTP Protocol (THP) Client sends GET request to tracker URL Tracker responds with a dictionary having all the information Client sends requests at regular intervals Peer Wire Protocol (PWP) Peers keep track of each others state A state has two values, interested and choking
  • 17. Working of BitTorrent 1. Seeder generates a torrent file and uploads torrent to a web server. 2. The seeder notifies the tracker that it is sharing the file described in the torrent file.
  • 18. 3. A leecher downloads the torrent file from the web server. 4. The leecher connects to the tracker specified in the torrent file.
  • 19. 5. The leecher connects to its peers to retrieve pieces of the files.
  • 20. Attacks on BitTorrent Pollution Attack The peers receive the peer list from the tracker. One peer contacts the attacker for a chunk of the file. The attacker sends back a false chunk. Attacker requests all chunks from swarm and wastes their upload bandwidth.
  • 21.  
  • 22. DDOS Attack The attacker downloads a large number of torrent files from a web server. Attacker spoofs IP address and port with that of victim and notifies the tracker Tracker directs peers towards victim Victim will be flooded with requests from other peers
  • 23.  
  • 24. Bandwidth Shaping This is done by user’s ISP Unencrypted BitTorrent packets are easily identified and filtered. Sophisticated filtering software can detect BitTorrent like behavior. Comcast has recently admitted to filtering BitTorrent traffic.
  • 25. Current Solutions Pollution Attack Blacklisting Achieved using software such as Peer Guardian or moBlock. Blocks connections from blacklisted IPs which are downloaded from an online database.
  • 26. DDOS Attack Spoofing needs to be avoided in the first place This can be done by using filters Make the tracker validate a peer whether it has the torrent or not
  • 27. Bandwidth Shaping Encryption Most BitTorrent clients can encrypt the packets they send. Simple filters which simply look at the contents of the packet can easily be traversed Tunneling Using VPN software to connect to an unfiltered network. Such tunnels which are free from filters provide easy path to BitTorrent packets
  • 28. Other File Transfer Methods Typical HTTP file transfer Download Accelerator Plus (DAP) Other Peer to Peer systems Kazaa, eDonkey, Direct Connect ….
  • 29. Conclusion BitTorrent is a popular P2P technology deployed across the Internet. The protocol has found a niche as a preferred method for the decentralized distribution of large files. It provides data integrity which ensures that the data will always be genuine and free from flaws. BitTorrent uses tit for tat exchange to increase cooperation among peers and has developed a reputation for being efficient, scalable, and robust.