BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
The BitTorrent Protocol
The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
The BitTorrent protocol A peer-to-peer file sharing protocol.
Incentives Build Robustness in BitTorrent Bram Cohen.
Bit Torrent (Nick Feamster) February 25, BitTorrent Steps for publishing – Peer creates.torrent file and uploads to a web server: contains metadata.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
DDoS Vulnerability Analysis of BitTorrent Protocol CS239 project Spring 2006.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Computer Networks IGCSE ICT Section 4.
The Bittorrent Protocol
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Wireless and Security CSCI 5857: Encoding and Encryption.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
1 BitTorrent System Efrat Oune Bar-Ilan What is BitTorrent? BitTorrent is a peer-to-peer file distribution system (built for intensive daily use.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
A P2P file distribution system ——BitTorrent Pegasus Team CMPE 208.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
David A. Bryan, PPSP Workshop, Beijing, China, June 17th and 18th 2010 PPSP Protocol Considerations.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
BitTorrent Nathan Marz Raylene Yung. BitTorrent BitTorrent consists of two protocols – Tracker HTTP protocol (THP) How an agent joins a swarm How an agent.
Bittorrent Protocol Implementation. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It has.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
Othman Othman M.M., Koji Okamura Kyushu University 1.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Flashback: A Peer-to-Peer Web Server for Flash Crowds Presented by Tom Batkiewicz CS 587x Fall ‘07.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
End-to-end Publishing Using Bittorrent. Bittorrent Bittorrent is a widely used peer-to- peer network used to distribute files, especially large ones It.
Internet addresses By Toni Grey & Rashida Swan HTTP Stands for HyperText Transfer Protocol Is the underlying stateless protocol used by the World Wide.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Lecture # 1 By: Aftab Alam Department Of Computer Science University Of Peshawar Internet Programming.
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
An example of peer-to-peer application
Introduction to BitTorrent
BitTorrent Vs Gnutella.
Torrent-based software distribution
Venkatesh Kumar Auzumeedi
Torrent-based software distribution
Internet Networking recitation #12
PEER TO PEER BitTorrent.
SCHOOL OF ELECTRICAL ENGINEERING AND TELECOMMUNICATIONS
Angelo Sapello University of Delaware
The BitTorrent Protocol
Content Distribution Networks + P2P File Sharing
Content Distribution Networks + P2P File Sharing
Presentation transcript:

BitTorrent Presentation by: NANO Surmi Chatterjee Nagakalyani Padakanti Sajitha Iqbal Reetu Sinha Fatemeh Marashi

Introduction BitTorrent is the latest form of Internet Peer-to- Peer file sharing which provides a very efficient and time-saving way of downloading large files. The main idea behind BitTorrent is to download bits of a file from multiple sources owning the file instead of downloading the entire file from a single source. This concept was developed in 2001 by a Python programmer Bram Cohen.

Terminologies Torrent: A small metadata file which contains information about the data you want to download, not the data itself. Tracker: It is a server on the Internet that coordinates the action of BitTorrent clients. Swarm: A swarm is a group of users that are collectively connected for a particular file. Peer: A peer is another computer on the internet that is sharing the file you wish to download. Seed: A seed is a peer that has a complete copy of the specific torrent to download. The more seeds there are, the better the chances are for completion of the file downloading. Leech: A leech is a peer that wishes to download files but not share the files on its computer.

Terminologies continued….

Working: To share a file using BitTorrent: a user creates a.torrent file distributes the torrent file This BitTorrent client is started as a “seed node”, allowing other clients to download:  These clients do not download the entire file from a single client.  The bitTorrent protocol breaks the file down into smaller pieces.  These pieces are downloaded/uploaded among peers.

the bittorrent clients request from their peers the pieces that are most rare. avoids bottleneck To increase the overall efficiency of the swarm: Special case: If all the seeds are offline?

The BitTorrent program follows two rules : The user sends data to only those peers that have sent data to it previously The peer limits the number of uploads to 4 and will look for the best 4 peers.  This is implemented by “choke/unchoke policy.

Protocol implementation details File sharing using BitTorrent is accomplished by means of two protocols namely: Tracker HTTP Protocol Peer Wire Protocol

Implementation details contd.. Bencoding simple, efficient, and extensible format of encoding used in Metainfo file and tracker response Bencoding is done as follows : Integers: ‘i10e’ Strings: ‘4:spam’ Lists: ‘l1:a1:be’ Dictionaries: ‘d5:monthi2e4:name5:aprile’

Implementation details contd.. Tracker HTTP Protocol: provides methods for introducing the peers to others in the swarm consists of Request Response

Implementation details contd.. Peer Wire Protocol: facilitates the communication between the peers in order to exchange the files they have. Steps involved in PWP Peer wire guidelines Handshaking Message communication End game Piece selection strategy Peer selection strategy

Advantages Simple: Downloading software is simple, and small in size. Fast: The ability to download and upload large files in a shorter amount of time is the key advantage to using BitTorrent. Integrity: Torrent files include a hash system, which prevents tampered or broken files from being shared. Free Uploading and Downloading: Uploading files is just as easy as downloading, and it’s all-free. Fast Download of New Files: BitTorrent is best suited for new and popular files which many people have interest in.

Disadvantages  If the seeder leaves the swarm too early, no one will be able to use the file.  Sites hosting.torrent files are often flaky and bogged down due to excessive popularity.  A seeder can only seed one or two files at a time unless they have massive upload bandwidth available.  Computer performance may drop drastically.  Old or unpopular files will be difficult to find and there will be few users to download from.

Security Considerations Tracker HTTP Protocol Issues: The use of the HTTP protocol for communication between the tracker and the client makes BitTorrent vulnerable to the HTTP security attacks. Denial of Service (DoS) Attacks on Trackers: Multiple trackers should be serving BT clients to balance the load and to minimize the effect of Dos attacks on trackers. Peer Identity Issues: The tracker should consider strong authentication of the peer failing which, one BT client can shut down another client on the same host. DNS Spoofing: BT clients should rely on their name resolver for confirmation of an IP number/DNS name association, rather than caching the result of previous host name lookups otherwise it is vulnerable to attacks when the domain name/IP mapping changes. D

Security Considerations Cont….. Validating the Integrity of Data Exchanged Between Peers: All content served to the client from other peers should be considered tainted and the client should validate the integrity of the data before accepting it. Transfer of Sensitive Information: Some clients include information about themselves when generating the peer ID string. Clients should be aware that this information could potentially be used to determine whether a specific client has an exploitable security hole.

Enhancements BitTorrent search / Trackerless Web seeding (unofficial feature) Bulk traffic marking Encryption Peer exchange

The Future of BitTorrent BitTorrent still has the potential to change the way of broadcast media and file distribution. The internet can become the world’s largest source for Video-on-Demand. BitTorrent can also reduce the costs of distributing shows and movies, making broadcasting possible for almost every Internet user.