+ All Categories
Home > Documents > BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha...

BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha...

Date post: 11-Jan-2016
Category:
Upload: muriel-mccarthy
View: 216 times
Download: 0 times
Share this document with a friend
17
BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi
Transcript
Page 1: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

BitTorrent

Presentation by: NANO

Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi

Page 2: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Introduction

BitTorrent is the latest form of Internet Peer-to-Peer file sharing which provides a very efficient and time-saving way of downloading large files.

The main idea behind BitTorrent is to download bits of a file from multiple sources owning the file instead of downloading the entire file from a single source.

This concept was developed in 2001 by a Python programmer Bram Cohen.

Page 3: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Terminologies

Torrent: A small metadata file which contains information about the data you want to download, not the data itself.

Tracker: It is a server on the Internet that coordinates the action of BitTorrent clients.

Swarm: A swarm is a group of users that are collectively connected for a particular file.

Peer: A peer is another computer on the internet that is sharing the file you wish to download.

Seed: A seed is a peer that has a complete copy of the specific torrent to download. The more seeds there are, the better the chances are for completion of the file downloading.

Leech: A leech is a peer that wishes to download files but not share the files on its computer.

Page 4: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Terminologies continued….

Page 5: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Working:

To share a file using BitTorrent: a user creates a .torrent file distributes the torrent file This BitTorrent client is started as a “seed node”, allowing

other clients to download: These clients do not download the entire file from a single client. The bitTorrent protocol breaks the file down into smaller pieces. These pieces are downloaded/uploaded among peers.

Page 6: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

the bittorrent clients

request from their peers the pieces that are most rare.

avoids bottleneck

To increase the overall efficiency of the swarm:

Special case: If all the seeds are offline?

Page 7: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

The BitTorrent program follows two rules : The user sends data to only those peers that

have sent data to it previously The peer limits the number of uploads to 4

and will look for the best 4 peers.

This is implemented by “choke/unchoke

policy.

Page 8: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Protocol implementation details

File sharing using BitTorrent is accomplished

by means of two protocols namely: Tracker HTTP Protocol Peer Wire Protocol

Page 9: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Implementation details contd..

Bencoding

simple, efficient, and extensible format of encoding used in Metainfo file and tracker response

Bencoding is done as follows : Integers: ‘i10e’ Strings: ‘4:spam’ Lists: ‘l1:a1:be’ Dictionaries: ‘d5:monthi2e4:name5:aprile’

Page 10: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Implementation details contd..

Tracker HTTP Protocol: provides methods for introducing the peers

to others in the swarm consists of

Request

Response

Page 11: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Implementation details contd..

Peer Wire Protocol: facilitates the communication between the peers

in order to exchange the files they have. Steps involved in PWP Peer wire guidelines Handshaking Message communication End game Piece selection strategy Peer selection strategy

Page 12: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Advantages

Simple: Downloading software is simple, and small in size. Fast: The ability to download and upload large files in a shorter

amount of time is the key advantage to using BitTorrent. Integrity: Torrent files include a hash system, which prevents

tampered or broken files from being shared. Free Uploading and Downloading: Uploading files is just as

easy as downloading, and it’s all-free. Fast Download of New Files: BitTorrent is best suited for new

and popular files which many people have interest in.

Page 13: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Disadvantages

If the seeder leaves the swarm too early, no one will be able to use the file.

Sites hosting .torrent files are often flaky and bogged down due to excessive popularity.

A seeder can only seed one or two files at a time unless they have massive upload bandwidth available.

Computer performance may drop drastically. Old or unpopular files will be difficult to find and there

will be few users to download from.

Page 14: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Security Considerations

Tracker HTTP Protocol Issues: The use of the HTTP protocol for communication between the tracker and the client makes BitTorrent vulnerable to the HTTP security attacks.

Denial of Service (DoS) Attacks on Trackers: Multiple trackers should be serving BT clients to balance the load and to minimize the effect of Dos attacks on trackers.

Peer Identity Issues: The tracker should consider strong authentication of the peer failing which, one BT client can shut down another client on the same host.

DNS Spoofing: BT clients should rely on their name resolver for confirmation of an IP number/DNS name association, rather than caching the result of previous host name lookups otherwise it is vulnerable to attacks when the domain name/IP mapping changes.

D

Page 15: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Security Considerations Cont…..

Validating the Integrity of Data Exchanged Between Peers: All content served to the client from other peers should be considered tainted and the client should validate the integrity of the data before accepting it.

Transfer of Sensitive Information: Some clients include information about themselves when generating the peer ID string. Clients should be aware that this information could potentially be used to determine whether a specific client has an exploitable security hole.

Page 16: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Enhancements 

BitTorrent search / Trackerless Web seeding (unofficial feature) Bulk traffic marking Encryption Peer exchange

Page 17: BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

The Future of BitTorrent

BitTorrent still has the potential to change the way of broadcast media and file distribution.

The internet can become the world’s largest source for Video-on-Demand.

BitTorrent can also reduce the costs of distributing shows and movies, making broadcasting possible for almost every Internet user.


Recommended