Peer To Peer File Transfer with Torrent
description
Transcript of Peer To Peer File Transfer with Torrent
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
InternationalResearch
Peer To Peer File Transfer
Student, Bharti Vidyapeeth Institute of Management and Information Technology CBD Belapur, Navi Mumbai
ABSTRACT Peer to peer data transfer received a lot of attention in recent years. A peer-to-peer network allows users to communicate or send data over a network server. A peer is any computer client or user. So that it called Peer-to-peer (P2P) networkingserver, all data transfer process is going between those peers only. Peer-to-peer file sharing means distribution of files over a network without participation of any server, in which the files are located on individual’s machine and distrother members of the network.
These type of networking softwares like Bitfounded as the piracy method of choice in the early years butthen Supreme Court announced decision[2]to the closure of many torrent sites as they encourages illegally sharing of copyrighted content like games, music, setup files and mostly movies.
INTRODUCTION An example of a p2pfile transfer that an efficient and time saving alternative to the server-client file transfer solution is torrenting. It is a distributed system, which has the ability to change the base of file distribution process. One can directly download data from other’s computer with the help of torrent files.centralized tracker is present over there to provide the different address list over available peers for appropriate file transfer. A torrent client is program that uses and applies the Torrent protocol. Each client can send as well asreceive any type of computer file
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal
Peer To Peer File Transfer with Torrent
Mr. Samir Ashok Mohite Bharti Vidyapeeth Institute of Management and Information Technology
CBD Belapur, Navi Mumbai, Maharashtra, India
Peer to peer data transfer received a lot of attention in peer network allows users to
communicate or send data over a network without any A peer is any computer client or user. So that
g as there is no server, all data transfer process is going between those
peer file sharing means distribution of files over a network without participation of any server, in which the files are located on individual’s machine and distributed with
softwares like Bit Torrent founded as the piracy method of choice in the early
butthen Supreme Court announced decision[2]to the closure of many torrent sites as they encourages
copyrighted content like games,
An example of a p2pfile transfer that an efficient and client file transfer
distributed system, which has the ability to change the base of file distribution
One can directly download data from other’s computer with the help of torrent files. The centralized tracker is present over there to provide the
ist over available peers for appropriate file transfer. A torrent client is program that uses and applies the Torrent protocol. Each client can send as well asreceive any type of computer file
over a network at the same time, using the protocol.this protocol there is no actual source for the files, people download those files which are uploaded by others peers. Participants:- Seeds: Peers or users who have already downloaded the files, and are uploading them for any other peer.Seeding is where you let your Torrent client open even after you've finished your download and helping to distribute that file to other peers which is requesting for that file.[1] Leeches: is any peer that does not have the entire file and is downloading the file withoutLeeches always haspoor share ratio, and itspecifies that there is downloading much more than their uploading, so they automatically decrease downloading speed of other peers.leave their Torrent client open to seed the file afterthey download the whole file. [1] Trackers: A tracker is like centralized server that keeps track of which seeds and peers are in the system or you can say “swarm”. Swarmsharing a file. The tracker only manages connections of one peer to another, it does not have any knowledge of the contents of the files being uploaded.
Jun 2018 Page: 2821
6470 | www.ijtsrd.com | Volume - 2 | Issue – 4
Scientific (IJTSRD)
International Open Access Journal
ith Torrent
Bharti Vidyapeeth Institute of Management and Information Technology
over a network at the same time, using the protocol. In his protocol there is no actual source for the files,
people download those files which are uploaded by
Peers or users who have already downloaded the files, and are uploading them for any other peer.
you let your Torrent client open even after you've finished your download and helping to distribute that file to other peers which is
is any peer that does not have the entire file and is downloading the file without uploading. Leeches always haspoor share ratio, and itspecifies that there is downloading much more than their uploading, so they automatically decrease downloading speed of other peers. Leeches do not leave their Torrent client open to seed the file after they download the whole file. [1]
is like centralized server that keeps track of which seeds and peers are in the system
Swarm is set of all peers sharing a file. The tracker only manages connections
to another, it does not have any knowledge of the contents of the files being uploaded.
@ IJTSRD | Available Online @ www.ijtsrd.com
So as we can see in above figure, in the middle there is seeder present and he’s uploading file for other users. After completion of download one peer, he becomes seeder and start uploading that file for newly entered user in network. Working Overview:- To distribute the content of file or group of files, a peer first creates a file called a "torrent" e.g. Interstaller. torrent, with extension (.torrent). This file contains metadata about the actual file to be distributed and about the tracker, the computer manages the file distribution. Peers or client that wants to download the file must first obtain that specific torrent file for it. Because of that torrent file has metadata about trackers so it is easy to connect to the specified tracker, which tellthem from which other peers to download the file. There are pieces of every file, it refers to the torrented files being divided up into equal specific sized pieces e.g. 512kB, 1MB, 2MB or 4MB. It get easy to share in divided file format and automaticalltime. Though both transfer content of file over a network, so this type of downloading is differs from a classical client-server download as with HTTP requests Bit Torrent makes many small data requests (like in pieces) over different IP connections to different machines which leads to achieve efficiency, in otherwords it saves more efforts and time to download such files
Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018
we can see in above figure, in the middle there is seeder present and he’s uploading file for other users. After completion of download one peer, he becomes seeder and start uploading that file for newly
distribute the content of file or group of files, a peer first creates a file called a "torrent" e.g.
torrent, with extension (.torrent). This file contains metadata about the actual file to be distributed and about the tracker, the computer that
Peers or client that wants to download the file must first obtain that specific torrent file for it. Because of that torrent file has metadata about trackers so it is easy to connect to the specified tracker, which tells them from which other peers to download the file. There are pieces of every file, it refers to the torrented
into equal specific sized pieces 512kB, 1MB, 2MB or 4MB. It get easy to share
in divided file format and automatically saves more Though both transfer content of file over a
network, so this type of downloading is differs from a server download as with HTTP
Torrent makes many small data requests (like in ections to different
machines which leads to achieve efficiency, in other words it saves more efforts and time to download
Safe or unsafe? Every user who use torrent application has their own mindset due to which the answer for the question could be different. There arechances of cybercrime or attack means hacking through torrenting is possible, because this torrent client share your IP address with other users who are downloading the same file or content over a network. Now if your IP addresbeen tracked by any other person or a hacker then they can hack your whole system and you may lose your important content. You can safely use any torrent client by hiding online identity means by hiding your IP address. This could be done with the help of VPN services. VPN stand for Virtual Private Network which place important role here to hide your original online identity and provides you a fake identity of your choice (fake IP address). This has been done by changing the IP address of your system and internet temporary.no one can tracks you including the hackers because they see a wrong or fake IP address that you has changed. Torrent sites are banned: There is nothing inherently illegal about Torrent, rather it has proven that it is a good option for file transferring by maintaining efficiency.legal or illegal is directly depends on what you are downloading. Downloading copyrighted (‘©’)material that you don't have a license is definitely consider as crime.
Jun 2018 Page: 2822
Every user who use torrent application has their own mindset due to which the answer for the question
chances of cybercrime or attack means hacking through torrenting is possible, because this torrent client share your IP address with other users who are downloading the same file or content over a network. Now if your IP address has been tracked by any other person or a hacker then they can hack your whole system and you may lose
You can safely use any torrent client by hiding online identity means by hiding your IP address. This could
help of VPN services. VPN stand for Virtual Private Network which place important role here to hide your original online identity and provides you a fake identity of your choice (fake IP address). This has been done by changing the IP address of
m and internet temporary. By using VPN, no one can tracks you including the hackers because
see a wrong or fake IP address that you has
There is nothing inherently illegal about Torrent, is a good option for file
transferring by maintaining efficiency. Torrenting is legal or illegal is directly depends on what you are
Downloading copyrighted (‘©’)material that you don't have a license is definitely consider as
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2823
Indian IT Act 2000 announced by Government and directly mentions that anything from downloading copyrighted content is illegal in India. So, technically, you can be jailed for using such Torrent sites in India, if you're not careful about your downloading content. [2]
References:- 1. https://www.quora.com/
2. http://www.cyberlawsindia.net/