BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.

Slides:



Advertisements
Similar presentations
The BitTorrent Protocol
Advertisements

The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Incentives Build Robustness in BitTorrent Author: Bram Cohen Presenter: Brian Liao.
The BitTorrent protocol A peer-to-peer file sharing protocol.
Incentives Build Robustness in BitTorrent Bram Cohen.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Ln -s /usr/timtimmah /usr/kevinstanonik. TORRENT BASICS  You want to get a file to other people.  BUT you don’t have the bandwidth to have everyone.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
BitTorrent Join the swarm! BY: Joe Petruska. What is BitTorrent? a peer-to-peer file sharing protocol used for distributing large amounts of data.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
DDoS Vulnerability Analysis of BitTorrent Protocol CS239 project Spring 2006.
Improving ISP Locality in BitTorrent Traffic via Biased Neighbor Selection Ruchir Bindal, Pei Cao, William Chan Stanford University Jan Medved, George.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Part 1: Overview of Web Systems Part 2: Peer-to-Peer Systems Internet Computing Workshop Tom Chothia.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
The Bittorrent Protocol
The Internet, World Wide Web, and Computer Communication.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
University of Bologna, Italy How to cheat BitTorrent and why nobody does Simon Patarin and David Hales University of Bologna ECCS 2006,
1 V1-Filename.ppt / yyyy-mm-dd / Initials P2P content distribution T Applications and Services in Internet, Fall 2008 Jukka K. Nurminen.
BitTorrent Internet Technologies and Applications.

P2P Investigation PEDRO GALLEGOS. Topics  Overview of P2P  Direct vs Hearsay  Investigation Steps  Analysis Gnutella Protocol  RoundUp.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
Peer-to-Peer Networks University of Jordan. Server/Client Model What?
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Presentation to France Telecom Ashwin Navin Co-Founder, Chief Operating Officer bittorrent.com.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
PEAR TO PEAR PROTOCOL. Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
An example of peer-to-peer application
Review session For DS final exam.
Introduction to BitTorrent
BitTorrent Vs Gnutella.
Decentralized peer discovery performance in swarm-protocols
I know what you are Sharing
Torrent-based software distribution
nTorrent: Peer-to-Peer File Sharing in Named Data Networking
OneSwarm: Privacy Preserving P2P
SCHOOL OF ELECTRICAL ENGINEERING AND TELECOMMUNICATIONS
Angelo Sapello University of Delaware
The BitTorrent Protocol
Content Distribution Networks + P2P File Sharing
PEER-TO-PEER SYSTEMS.
#02 Peer to Peer Networking
Content Distribution Networks + P2P File Sharing
Presentation transcript:

BitTorrent How it applies to networking

What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing a heavy burden on their computer Similar to packets, it breaks a file into small chunks, usually 512 K. Done over TCP/IP, but several small requests are sent to different machines (the packets)

How it works Seed- the provider of the file Publish it to the network- creates a torrent file Contains metadata about files to be shared with tracker -tracker- the computer that coordinates the communication between peers with the bit torrent protocol. Can be public or private Each client is required to communicate with the tracker to initiate downloads, and those that have already begun downloading communicate periodically to negotiate with newer peers and provide statistics

How it Works Continued Peers- those that connect and download the seed file. The initial peer will connect directly to the seed and request chunks, then as more peers are added, chunks are requested from different peers Once multiple peers have multiple pieces of the seed, they also become “seeds” of the file. Health of the file Downloads in random or “rarest first approach” The purpose of bit Torrent is to “swarm” so that the download has a good chance of success.

*.Torrent File Contents Similar to GET/POST method Contains URL of tracker as well as info of files SHA-1 hash code- verify integrity -In trackerless systems - every peer becomes its own tracker, done through DHT. Each chunk becomes a key and a value similar to a hash table. Requests are sent to receive each file chunk using the keys

Bit Torrent Public vs Private Public- anyone can download- sometimes filled with viruses. Private- only certain users are allowed to connect. Usually have tons of illegal files Both offer Protocol Header Encryption ISP cant tell what kind of traffic it is Both expose IP addresses in the tracker even when done downloading

Torrent In Action

Problems with Bit Torrent Bandwidth Hog

Problems Leeches Hard to get files if not popular Easy to track, risk of getting sued and attacked

How to Setup your own Torrent System Your own private peer to peer torrent system OneSwarm- developed at University of Washington rview.mp4

One swarm in practice First I linked two gmail accounts as friends

OneSwarm

Other alternatives to Torrent Pure Private Peer to Peer, over VPN Gbridge from google

Other