Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Introduction
BitTorrent is a free speech tool. You have something terrific to publish a large
music or video file, software, a game or anything else that many people would like to
have. But the more popular your file becomes, the more you are punished by soaring
bandwidth costs. If your file becomes phenomenally successful and a flash crowd of
hundreds or thousands try to get it at once, your server simply crashes and no one gets
it. With BitTorrent, those who get your file tap into their upload capacity to give the
file to others at the same time. Those that provide the most to others get the best
treatment in return.
1
The Problem with Publishing:
2
The BitTorrent Solution:
Users cooperate in the distribution
3
File swapping systems have been architected in different ways as outlined in the
following illustrations:
4
BitTorrent is a peer-to-peer (P2P) file distribution tool. The reference
implementation is written in Python. With BitTorrent, files are broken into smaller
fragments, typically a quarter of a megabyte each. As the fragments get distributed to
the peers, they can be reassembled on a requesting machine in a random order. Each
peer takes advantage of the best connections to the missing pieces while providing an
upload connection to the pieces it already has. This scheme has proven particularly
adept in trading large files such as videos and software source code. In conventional
downloading, high demand leads to
BitTorrent greatly reduces the load on the server, because the users generally
download the file from each other, not the server. As the colored bars below each
client show, the file is downloaded in random order, instead of sequential order.
5
To share a file using BitTorrent, a user creates a .torrent file, a small "pointer" file
which contains:
• the filename, size, and the hash of each block in the file (which allows users to
make sure they are downloading the real thing)
• the address of a "tracker" server (which is discussed below)
• And some other data.
The torrent file can then be distributed to other users, often via email or placed
on a website. The BitTorrent client is then started as a "seed node", allowing other
users to connect and commence downloading. When other users finish downloading
the entire file, they can optionally "reseed" it--becoming an additional source for the
file. One outcome of this approach is that if all seeds get taken offline, the file may no
longer be available for download, even if the torrent file is possessed. Downloading
with Bit Torrent is straightforward. Each person who wants to download the file first
downloads the torrent and opens it in the BitTorrent client software. The torrent file
tells the client the address of the tracker, which, in turn, maintains a log of which
users are downloading the file and where the file and its fragments reside. For each
available source, the client considers which blocks of the file are available, and then
requests the rarest block it does not yet have. This makes it more likely that peers will
6
have blocks to exchange. As soon as the client finishes importing a block, it hashes it
to make sure that the block matches what the torrent file said it should be. Then it
begins looking for someone to upload the block to.
One of the most popular uses of the Internet is file downloading. This method
was restricted by the number of people attempting to download files from the server.
P2P file-sharing is a more efficient way of downloading high-bandwidth material like
music and video.
7
In order for a P2P application to be successful the system should adhere to
several criteria
8
the desired file from other users. The chunks are not downloaded sequentially, but are
based on the rarity of the chunk at that time. This method of splitting a file into many
pieces greatly facilitates the sharing of large files such as MPEGs and software
applications.
The .torrent file is not stored on the website itself but is distributed among a
number of tracker servers. These servers store a global registry of all the
downloader’s and seeds of the corresponding file. When a user wishes to start
downloading, they click on a link from the website to a .torrent file. The tracker server
9
responds to the users request by sending back a list of other users that have (part of)
the file.
The above graph deals with another aspect of BitTorrent. Here the horizontal
axis represents the number of seeds for a file after its injection into mainstream traffic.
The vertical axis shows how long the file needs to stay available so that a given
number users can download it.
As the number of seeds increases, the lifetime of the file dramatically declines.
The attraction to becoming a seed is low because all upload capacity is used for
distribution of one file. Obviously, as the number of seeds increases, not only are you
a seed for a shorter time, but the bandwidth used for uploading this file is reduced.
Even though, as time goes by the number of seeds for a particular file decreases, the
file is available so long as there is at least one seed available.
When no seeds are available, a user with the complete file must come in and act as the
newseed. This is known as reseeding. A Swarm is a term given to a group of
computers, potentially including both seeds and Peers that are connected for a
particular file.
10
Choked is a term from the BitTorrent protocol which indicates a state an up
loader is in if it refuses to send anything on that link. It is used when the choked flag
is in use, to let it be known that whenever possible, a connection is wanted.
Snubbed is term from the protocol that indicates that a client has not received
anything for a substantial period of time. It is used to improve download speeds
The above graph displays measurements taken during a study on the tolerance
of BitTorrent to the "Flash Crowd Effect". The blue line shows the number of
downloads of the tracker for "Lord of the rings 3" from "FutureZone.TV". The red
line signifies the number of seeds for the file.
For the first five days, "FutureZone.TV" was the only seed, causing the
sustained high download rates. As the number of seeds increases, the download rate
dropped for the website. Notice that a small increase in the number of seeds
dramatically decreases the load on the provider. From these results, it can be
concluded that bit torrent is well capable of handling large, sudden crowds.
3.1 Decentralization
Traditionally, the bit torrent model has relied on a small number of centralized
servers to provide the trackers for specific files. There is an inherent problem with this
model. If any number of servers go down, this places an extra Burdon on the
remaining few. Although this has been shown that this is difficult to do, it is also a
common fact that a determined hacker usually finds a way. When a popular new file
is introduced by a seed there can be a large surge of simultaneous downloads from
this source. Since the infrastructure is not there to oversee the file sharing, this file
may well infect many machines. Another problem that may arise is obtaining the
torrent.
When a file is large it is better to divide it into separate chunks. One way of
doing this is using Overhaul. Overhaul changes the HTTP of an overloaded server so
it acts like a peer to peer network. It splits up the requested document into n chunks.
11
Each request results in a response that includes the itch chunk and the IP address of m
other clients accessing the document. A signature for each of the n chunks is also
provided in the header. A client supporting Overhaul connects to other clients to
retrieve the remaining chunks. This saves bandwidth utilized by a regular fetch. By
transferring only a small portion of the document, the Overhaul process frees up the
server to satisfy requests from other clients.
fig:3
An example is shown above; four client request for the same document off the
server. The server becomes overloaded and goes into Overhaul mode, where it splits
the document into chunks and distributes these amongst the clients. The client
collaborate to merge the chunks together so that each can form a coherent document.
This is different to BitTorrent which is a specialized tool for distributing large files
over existing peer to peer networks, (the Internet). Also BitTorrent requires a
12
dedicated tracker and meta-info file for each requested document, resulting in extra
traffic to the server.
4. peer-to-peer
A pure peer-to-peer file transfer network does not have the notion of clients or
servers, but only equal peer nodes that simultaneously function as both "clients" and
"servers" to the other nodes on the network. This model of network arrangement
differs from the client-server model where communication is usually to and from a
central server. A typical example for a non peer-to-peer file transfer is an FTP server.
One user uploads a file to the FTP server, then many others download it, with no need
for the up loader and downloader to be connected at the same time.
a) Pure P2P:
b) Hybrid P2P:
• Has a central server that keeps information on peers and responds to requests
for that information.
• Peers are responsible for hosting the information as the central server doesn't
store files, for letting the central server know what files they want to share and
for downloading its shareable resources to peers that request it.
13
• Route terminals are used addresses, which are referenced by a set of indices to
obtain an absolute address.
c) Mixed P2P:
Many peer-to-peer networks are under constant attack by people with a variety
of motives.
Examples include:
• poisoning attacks (providing files whose contents are different than the
description)
• denial of service attacks (attacks that may make the network run very slowly
or break completely)
• defection attacks (users or software that make use of the network without
contributing resources to it)
• insertion of viruses to carried data (e.g. downloaded or carried files may be
infected with viruses or other malware)
• filtering (network operators may attempt to prevent peer-to-peer network data
from being carried)
• identity attacks (e.g. tracking down the users of the network and harassing or
legally attacking them)
5. Functions:
14
The torrent system is based on small, easily exchanged Torrent files. These
file have a file name followed by .torrent and are usually only a few kilobytes in size
yet allow gigabytes of information to be downloaded. Increasingly used by Web sites
that do not have the capacity to handle massive downloads, BitTorrent is estimated by
some sources to make up between 50 and 85 percent of all Internet traffic.
BitTorrent connects to multiple other users who are downloading the same
file, speeding up the process for everyone. This type of interaction is called a multi-
source system growing popular in p2p where files begin sharing before fully
downloaded. Any file downloaded by BitTorrent is then checked against a hash file
contained in the torrent to confirm its integrity. This eliminates many of the problems
with false file exchanges, so long as one trusts a file's source.
Once you have downloaded and installed the client, for a variety of software,
music, and data distributed via BitTorrent. When you have found a ".torrent" file,
your browser should automatically start BitTorrent and begin downloading. If it does
not, save it somewhere on your computer and click twice on the file. A download box
should appear.
When your download has completed, wait to click "finish" for as long as
possible. This allows the file to continue uploading even after you have the entire file
and assist others in downloading as well.
BitTorrent is a solution for Web sites that cannot handle massive traffic but
must distribute an enormous amount of information.
15
As is common, downloaders have varying connection speeds of T1, DSL, and
dial-up but the server in this example can only upload 20 kilobytes per second to any
one outside computer. With hundreds of requests, either some will be denied or get 1
kilobyte per second. This will take weeks to distribute to hundreds of people.
Until file sharing systems, the only other option was shipping the music using
postal mail or moving to an expensive, high-end server, not possible for most users.
With BitTorrent, one person on a slow network can distribute the contents of a regular
compact disk (~700 megabytes) to hundreds or even thousands in a matter of hours -
not weeks - because everyone shares whatever they receive. A tiny amount of data
can be downloaded and then exchanged among all users because higher-bandwidth
users assist lower-bandwidth users and everyone hands back to everyone else; users
upload files while simultaneously downloading them.
When choosing between the download of a file directly from its Web site or an
available BitTorrent link you should choose depending on time of day .
BitTorrent - more effective during peak Internet usage times - usually 6-9
P.M. weekdays - as the program scales inversely to the demand, making download
speeds quite high.
1. Files gained over other file sharing systems can be checked using BitTorrent for
integrity.
2. share files gathered over direct-download are often identical to those gained over
BitTorrent and can then be shared.
16
3. BitTorrent checksums can be included on a CD to later test archives for an accurate
burn
5.5.1 Positive
BitTorrent software and ".TORRENT" files are very small and easy to download and
host.
Files have an included hash system to make sure they're fully downloaded and all
portions of the file are accurate.
It forces you to share and go faster at the same time, so the community
benefits from it.
5.5.2 Negative
An intense focus on simplicity that also means lack of features, for instance no
built-in search capability. After a file downloads, the network continues to share it as
part of those users' "shared" folders.
BitTorrent is a file sharing system that minimizes the role of the central server,
thereby enabling many more users to share or acquire large files. Distributed file
sharing thus avoids the problems often encountered when popular files are
downloaded through FTP or HTTP protocols, namely that the servers become
overloaded, slow down, and refuse connections. BitTorrent clients are available for
Linux, Windows, and OS X.
17
5.6.1 Multi-Source
6. Files
6.1 Peer-To-Peer File sharing
Another file-transfer method that you may have heard about is called peer-to-
peer file sharing. In this process, you use a software program to locate computers that
have the file you want. Because these are ordinary computers like yours, as opposed
to servers, they are called peers. The process works like this:
• You run peer-to-peer file-sharing software on your computer and send out a
request for the file you want to download.
• To locate the file, the software queries other computers that are connected to
the Internet and running the file-sharing software.
• When the software finds a computer that has the file you want on its hard
drive, the download begins.
• Others using the file-sharing software can obtain files they want from your
computer's hard drive.
18
Gnutella's peer-to-peer downloads process
• You open a Web page and click on a link for the file you want.
19
• Bit Torrent client software communicates with a tracker to find other
computers running Bit Torrent that have the complete file and those with a
portion of the file
• The tracker identifies the swarm, which is the connected computers that have
all of or a portion of the file and are in the process of sending or receiving it.
• The tracker helps the client software trade pieces of the file you want with
other computers in the swarm. Your computer receives multiple pieces of the
file simultaneously.
20
If you continue to run the BitTorrent client software after your download is
complete, others can receive .torrent files from your computer.
Downloading pieces of the file at the same time helps solve a common
problem with other peer-to-peer download methods: Peers upload at a much slower
rate than they download. By downloading multiple pieces at the same time, the
overall speed is greatly improved. The more computers involved in the swarm, the
faster the file transfer occurs because there are more sources of each piece of the file.
For this reason, BitTorrent is especially useful for large, popular files.
BitTorrent also uses specific port numbers, normally ports 6881 through 6889.
Because firewalls block these ports by default, you'll need to configure your firewall
to accept this incoming traffic in order to receive .torrent files. You may also have to
21
enable port forwarding of your computer's IP address for ports 6881 through 6889 so
that other Bit Torrent computers can find you.
• You open a Web page and click a link to download a file to your computer.
• The Web browser software on your computer (the client) tells the server to
transfer a copy of the file to your computer.
• The transfer is handled by a protocol , such as FTP (File Transfer Protocol) or
HTTP (Hypertext Transfer Protocol).
22
are downloading the file. If the file is both large and popular, the demands on the
server are great, and the download will be slow.
7. Conclusion
Bit Torrent was conceived as a way of distributing large file more quickly,
efficiently, and reliably. The download of large file has become more feasible, and
people have become accustomed to acquiring video through the net. At this point it is
virtually impossible for anyone to bring an end to illegal downloads.
BitTorrent is a peer –to-peer file sharing system that is quickly becoming the
method of choice for publishing and sharing large files across the internet. It is
distinct from other p2p programs, such as lime wire and Kazak, in that break down
files into smaller packets of information, generally 256KB, and uses a protocol.
As it can be seen Bit Torrent may be ushering in a new paradigm in
downloading. At the moment it’s the cheapest and one of the fastest ways to share
large files in the mainstream medium - the internet
Even if this application of protocol (Free downloads) were to come to an end,
through a business agreement only cause BitTorrent to have an even greater overall
social impact. Illegal distribution of films online has already affected the film
industry, affecting box-office ticket and home video sales. However, if movie studios
were to actually transition to online distribution,it could completely transform the
business of cinema.
References
1. www.bittorrent.com.
2. http://www.bittorrent.com/
3. www.en.wikipedia.org/wiki/BitTorrent
4. http://www.infoanarchy.org/wiki/index.php/Multi-Source
5. www.wordspy.com.
Magazines
23
IT Magazines
CSI Magazines
Enadu News Paper (Thursday)
24