Bittorrent

20
Presented by ABHISHEK ROY DEBASISH MUKHERJEE SUMAN HALDER BHANU PRATAP JHA

description

it contains 20 slides full of pics n related information about bittorrent,its implementation,vulnerabilities and remedies and importance in practical life..Moreover,the facilities for small software developers..

Transcript of Bittorrent

Page 1: Bittorrent

Presented by

ABHISHEK ROYDEBASISH

MUKHERJEESUMAN HALDERBHANU PRATAP

JHA

Page 2: Bittorrent

PROTOCOLS

For data transfer over the network, protocols are used( to

ensure interoperability) .Some of them are HTTP,FTP,SMTP

etc..BitTorrent is also a kind of protocol..designed by Bram

Cohen in 2001

Page 3: Bittorrent

BitTorrent P2P

By the end of 2004, BitTorrent (BT) was accounting for as much as 30% of all Internet traffic.

– P2P traffic is 60% of all Internet traffic

Page 4: Bittorrent

P2P traffic is rising

Page 5: Bittorrent

5

Server Distributing a Large File

d1

F bits

d2

d3

d4

upload rate us

Download rates di

Internet

Page 6: Bittorrent

BitTorrent Approach

Page 7: Bittorrent

File transfer

1 2 3 4 5 6 7 8

Page 8: Bittorrent

8

Peers Help Distributing a Large File

d1

F bits

d2

d3

d4

upload rate us

Download rates di

Internet

u1u2

u3

u4

Upload rates ui

{1,2,3,4,5}

{1,2,3,4,5,6,7,8}

{1,2,3,4}

C1

C2

{1,2,3}

{1,2}

C3

C4

Clients ci

Page 9: Bittorrent

Piece Selection and Bencoding

Random First PieceRarest First Piece

Endgame

Page 10: Bittorrent

Error detection mechanism.torrent file contains hash which

works as checksum.After downloading a file it is checked

against the hash given within .torrent file,if mismatch

occurs,then the downloaded file is corrupted..

Page 11: Bittorrent

Chocking

When a peer receives a request for a piece from

another peer, it can refuse to transmit that piece. If this happens, the peer is said to

be choked

Page 12: Bittorrent

BT: publishing a fileBT: publishing a file

Web Server

Initialseeder

Tracker

Downloader:

ASeeder:

BDownloader:

C

Harry Potter.torrent

Page 13: Bittorrent

13

Sub protocols

1 . HTTP Protocol 2. PWP: Peer Wire Protocol

Page 14: Bittorrent

Operation

Page 15: Bittorrent

Why is it Important?

• It is used by millions of file sharers across the globe.

• Corporations and open source companies use it to save bandwidth.

Page 16: Bittorrent

Bandwidth Shaping

BitTorrent is usually used to transfer large sized files due to which the traffic over the ISPs increase to a large extent. To avoid such exploding traffic on their servers many ISPs have started to avoid the traffic caused by BitTorrent

Page 17: Bittorrent

Pollution Attack

Attacker requests all chunks from swarm and wastes their upload bandwidth.

1>The peers receive the peer list from the tracker.2>One peer contacts the attacker for a chunk of the file.

3>The attacker sends back a false chunk.

4>Attacker requests all chunks from swarm and wastes their upload bandwidth.

Page 18: Bittorrent

DDOS Attack

Page 19: Bittorrent

Solutions

Encrypt the packets so that the filters that sniff packets will not be able to

detect such packets belonging to BitTorrent

The peers which perform pollution attacks are identified by tracing their

Ips

Solution to DDOS attack is to have clients parse the response from the

tracker

Page 20: Bittorrent

Conclusion

• BitTorrent pioneered mesh-based file distribution that effectively utilizes all the uplinks of participating nodes.

• BitTorrent’s application in this information sharing age is almost priceless.

• BitTorrent can serve as an effective media streaming tool as well.