Peer To Peer (P2P) And Torrenting James Jenkinson.

Slides:



Advertisements
Similar presentations
Jump to Contents Instructor Tutorial essignments.com Paperless assignment submission system.
Advertisements

Legal Meetings: Extended Instructions on Movica and Screencast.
Its more than a game, its your life…. What do you do online?
ROWAN COUNTY PUBLIC LIBRARY Using iTunes. Objectives Today you will learn how to: Navigate the iTunes interface Add music to the iTunes library Navigate.
Office Clipart Just copy and paste the images you need into your presentation, place them in layers and scale them to suit your needs.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
S2 – COMMUNICATIONS UNIT
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Images By Tara Frieszell By Tara Frieszell. Adding images to your website will make it more interesting and add to the design. However, some viewers aren’t.
The Hidden World of torrents Its all about sharing files with each other. Because sharing is caring Presented by Naveed Farooq Naveed Farooq Admin Nidokidos.
Welcome To. Improving Remote File Transfer Speeds By The Solution For: %
Digital Citizenship My definition of digital citizenship: To be kind online, not abusing anyone or anything on the internet and using the internet appropriately.
March 14, Microsoft Microsoft officially announced the date and time that Internet Explorer 9 (IE9) will move away from a release candidate and.
Getting Started Setting a Theme Setting up Pages Making a Menu Adding Video to your Page Setting Up Your Contact Page Extra Website Content.
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
Josh Probert – Yankee A Prototype based on Sierra’s SRS.
Microsoft Windows LEARNING HOW USE AN OPERATING SYSTEM 1.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Level 2 IT Users Qualification – Unit 1 Improving Productivity
MULTIMEDIA What is Multimedia? The word MULTIMEDIA is made up from two words, MULTI meaning more than one and MEDIA meaning a way of displaying or passing.
By Frank Perez 9D Qatar Academy Quite simply, the problem is that people have been given the ability to download files such as music and software for.
The ePortfolio and Student Evaluation A training presentation by: Amy Cannady Robin Drewry Bonnie Hicks.
P2P For More Showcase Presentation Jessie Gardiner John Lasa Travis Sheppard April 29, 2010.
E-Manual Training Guide Electronic Manuals, called E-Manuals are easy to use and much easier to keep current than their paper counterparts. This presentation.
Playing Music in Alice By David Yan Under the direction of Professor Susan Rodger July 2015.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
A Quick Guide To Using iTunes Thi Nguyen Ruth Limberg Colin Smith.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. Android Boot Camp.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Chris.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
UNIT 14 1 Websites. Introduction 2 A website is a set of related webpages stored on a web server. Webmaster: is a person who sets up and maintains a.
Copyright Research By: Ben Renton BTEC Level 3 ICT.
Your Page Name – Internet Web Browser Your Tab Name Giggle Search Search Your search text here Search Engine Template.
Downloading and Installing Autodesk Revit 2016
How To Download Music Legally and Free By Mahmud Fagge.
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
“A mobile market researcher wants a smartphone capable of shooting quality video, playing their music, browsing the web and running a range of applications”.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
4. How did you use media technologies in the construction, research, planning and evaluation stages?
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
It’s more than a game, it’s your life… What do you do online?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Your Page Name – Internet Web Browser Your Tab Name Search Web Browser Template Your Name.
Website Design, Development and Maintenance ONLY TAKE DOWN NOTES ON INDICATED SLIDES.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
By Frank Perez 9D Qatar Academy Quite simply, the problem is that people have been given the ability to download files such as music and software for.
ITab Template. iTab Template Bullet Slide Bullet Point 1 Bullet Point 2 Bullet Point 3.
4. How did you use media technologies in the construction, research, planning and evaluation stages?
ANIMATED SLIDE VECTOR TRAFFIC LIGHTS. ON CLICK ANIMATION.
The types of computers and their functionalities.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
E-Safety Parent Talk Helping to keep your children safe online.
Your Page Name – Jurassic File Edit View History Bookmark Window Help Search Jurassic Browser Template Your Name Insert.
Installing a Moodle Test Site The painless and easy way.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Music Downloads By: Demetria Norman And Jacquelyn Menner.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
  Computer Fundamentals Training   Windows 8 Intermediate.
Creative ICT – Year 8 Lesson 10 Uploading Work.
Copyright law The law is in place to stop members of the pubic to make illegal copies of anyone else work. You wouldn’t able to get a version of software.
Technology Vocabulary Words
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
VECTOR TRAFFIC LIGHTS ANIMATED SLIDE.
VECTOR TRAFFIC LIGHTS ANIMATED SLIDE.
Presentation transcript:

Peer To Peer (P2P) And Torrenting James Jenkinson

What is P2P? P2P or peer to peer sharing is just as the name suggests, but maybe not noticeable. P2P runs by connected to another computer and simply taking files like applications, photos, videos and music from one computer and putting it on your own.

P2P On A Global Scale Of course P2P can manipulate the internet to do the same thing but on particular networks available around the world. You connect to a network with other users and share all your files with each other.

Applications That Use P2P There are hundreds of P2P applications that can be downloaded for free off the internet. The most popular being applications such as Limewire, Frostwire, Bearshare etc. These work by installing on your computing and connecting to a server with millions of files uploaded onto them that can be accessed and downloaded by anyone with the software related to them.

I In Depth Look At Limewire is a standard P2P search engine application and is the most popular choice for downloading music. It is comprised of three sections, the search tab, the monitor tab and the library tab. Limewire is extremely easy to use making it extremely easy to break the law

Search Tab This is the layout of the search tab, you can search all files on the network or choose to search for specific file types like music or video or applications. You basically do a search for the particular file you are looking for and double click it to download it. You must be careful of what you download, people have lots of viruses shared across the network, it is easy to simply download one thinking it is a song or video

Monitor Tab This is the layout of the monitor tab, it monitors your downloads and all the searches you have made since opening Limewire. It also monitors uploads to the network and what people are taking from your computer. Limewire can also be used as a torrenting application, but it is not recommended as it takes more resources than a normal torrenting application because of its P2P application embedded

Library Tab This is the layout of the library tab, it displays all the files you have downloaded and sorts them into their particular file type. It also shows a playlist creater located in the bottom half of the window so you can play your downloaded media in Limewire itself. Downloading media and software from Limewire is illegal if you do not own the media that you are downloading

Torrenting (What Is It?) It is a method of downloading that is very popular these days due to its ability to achieve a high speed of downloading. Although they can reach high speeds it is not always the case, torrents are built up on things called seeders and leechers, the next few slides will go into detail about seeders and leechers.

Benefits of Torrenting There are many benefits to torrenting than to original p2p sharing, the main one being the ability to search the internet for extra trackers in order to increase the speed of the torrent. This is always useful for people with a large bandwidth and want to use it. Torrenting speed is only restricted by the bandwidth of the internet connection being used

Seeders Seeding occurs when a file is being downloaded, while you are downloading the file from another computer, people are also downloading the same file from your computer. This is the key to torrentings high speeds, because without it there could be a huge amount of people downloading from the same source seriously killing the speed of your download. The keeps the network traffic to a single server to a minimum and helps it run very smoothly as to say your download speed will be consistent.

Leechers Leeching essentially is just downloading a file, you are leeching it from someone else.

Torrenting Applications Again there are hundreds of torrenting applications on the internet available for download, three examples of these are Utorrent, Bit Tornado and bit torrent. They are generally light weight applications due to their small task that they are created for, downloading files with the directions that they are given.

In depth look at Utorrent is the most lightweight of all torrenting applications because it is only built to take torrent files and download the files that are in the torrent, there are no search features or extra settings of that nature, and in my opinion is the most effective torrenting application. It is comprised of only one screen and is very easy to navigate

Utorrent Layout This is the one and only screen in utorrent it is comprised of the main window which lists what torrents are queued to be downloading, the percentage completed of each download, and the download and upload speed of each Torrent. There is also a small window on the left which shows which torrents are being downloaded and which ones are active inactive and completed, clicking on these toggles the main window. The bottom is compiled of tabs for different properties of the torrent selected such as a speed graph, tracker list, peer list and file pieces currently being downloaded

Getting a Torrent File.Torrent files can be found all over the internet, in fact there are many websites that are dedicated to supplying torrent files for any video, music or application files in the world. There are also search engines on the internet that search all torrent dedicated sites for particular files that you request. An example of a torrent site is An example of a torrent site search engine is

Legal Issues Just like P2P sharing, torrenting itself is not illegal because it is a form of P2P sharing, but the content that is downloaded is most probably illegal, generally the only time it isn't illegal is if it is free software or if you own a licensed copy of the software. Currently there is alot of issues surrounding ISPs and torrenting, in Australia ISPs refuse to contact the police when there is torrenting happening within their network, however in America and the UK ISPs are known as internet police and will contact the police whenever torrents are being downloaded on their network.

Conclusion Millions of people do it and because of this many more people start to do it because they do not believe they will be caught if someone is downloading more than they are, however police are beginning to crack down on home users who like to torrent and P2P across the internet. This hopes to achieve a halt to downloading because people will realise that they can be caught. I wouldn't recommend downloading anything that you do not legally own.