SlideShare a Scribd company logo
1 of 15
TORRENTS
TORRENTS
   What is Torrent

   The pyramid theory

   How Torrenting Works

   Trackers

   Peers

   Ratio and the Fair Share Policy

   Torrent Culture

   Controversy
THE PYRAMID THEORY


1   TEAM WORK
THE PYRAMID THEORY


2   SINGLE MAN
HOW TORRENTING WORKS

   All torrenting takes place using a torrent program. Examples of torrenting
    programs include uTorrent, Azureus and the original Bit Torrent. These
    programs allow your computer to send and receive files on a specific port and
    interpret the data from .TORRENT files. .TORRENT files contain all of the
    information on a specific torrent--who started it, what the torrent contains, and
    how to download and upload information corresponding to that torrent. When
    the .TORRENT file is opened by a torrent program, the torrent program
    connects to other users who have portions of the torrent and downloads the
    torrent from them. Upon receiving portions of the torrent, your computer
    becomes able to upload (or "seed") the file to other users. Once the torrent
    program has received all portions of the torrent, it assembles them into a file
    using the directions found in the .TORRENT file.
TRACKERS

   Torrenting begins and ends at large networking servers known as
    trackers. Your torrent program (or "client") connects to these servers
    using a list found in the original .TORRENT file. Trackers have a list of all
    users connected to it and which files they're able to seed. Your client
    picks from these users and downloads data from them accordingly. Upon
    connecting to the tracker, it registers your computer and the files that you
    yourself are able to seed. Trackers also keep logs of one's ratio--how
    much your computer uploads, measured against how much your
    computer downloads--and determines the amount of bandwidth you
    receive.
TRACKERS
             TRACKER SERVER




           CLIENTS
RATIO AND THE FAIR SHARE POLICY

   All torrent trackers incorporate a "fair share" policy, which restricts or
    grants access to bonus torrent bandwidth accordingly. Fair share policies
    basically say that if you're not seeding as much as you are downloading
    ("leeching"), you will receive less bandwidth from the torrent. Conversely,
    if your seed-leech ratio is high, you will download files from the torrent
    much quicker than someone with a low ratio. Priority on the tracker is also
    given to those with higher ratios. This means they will connect to other
    users on the server ("peers") more quickly.
PEERS
   Peers are clients that have high speed internet connection ,
    Or clients that Upload more they download, Or when the
    seed-leech is high


                      PEERS SERVER                 NORMAL SERVER




      PEERS CLIENTS


                                                     NORMAL CLIENTS
TORRENT CULTURE
   A large culture has sprung up around torrenting. Found in websites all
    over the Internet, these cultures generally promote fair share policies and
    file-sharing honesty, and discourage copyright infringement or file theft.
    Generally, these communities are invite-only. Open membership is only
    granted at specific times, generally once a month. Anyone wishing to join
    who doesn't want to wait until membership becomes open must secure an
    invite from someone else who's already part of the community. Other
    torrent sites are completely private. For example, the torrent site known
    as "What.CD" requires potential users to solve several puzzles to gain
    membership, and then undergo an interview and a speed test (to
    determine whether or not a user can upload efficiently) before
    acceptance.
TORRENT CULTURE



 PUZZLE           What.CD website
CONTROVERSY ABOUT TORRENTS
   Unfortunately, since its inception, peer-to-peer torrenting has been highly
    controversial. Because trackers cannot and do not keep track of what
    information can be found in their torrents, the potential for copyright
    infringement, file theft and even child pornography exists. Organizations
    pursue legal activity against torrent trackers and users every day under
    claims of copyright infringement. However, despite all of the controversy,
    torrenting remains a very popular way to transfer large amounts of data
    from and to users at a very quick speed. Many computer companies, such
    as Blizzard Entertainment, even use torrenting to allow users to download
    their software.
TORRENT CLIENTS




  µTORRENT
QUESTIONS


        FFFF
   FIRST FIVE FOR FREE
THANKS




   E-mail: e.ahmedhag@gmail.com

More Related Content

What's hot

BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent ProtocolSridharBR
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminarbalu0503
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentationAvula Jagadeesh
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminarChirodeep Das
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology Parth Akbari
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshidhananjaypardeshi13
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technologyabhipesit
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierMohd253
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan variaMilan Varia
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol ReportSridharBR
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTSudhansu Dash
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentationAvula Jagadeesh
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent ProtocolHarsht2888
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocoltmont
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocolKarwan Jacksi
 

What's hot (20)

BitTorrent Protocol
BitTorrent ProtocolBitTorrent Protocol
BitTorrent Protocol
 
Bit torrent seminar
Bit torrent seminarBit torrent seminar
Bit torrent seminar
 
Bit Torrent presentation
Bit Torrent presentationBit Torrent presentation
Bit Torrent presentation
 
Bittorrent final seminar
Bittorrent final seminarBittorrent final seminar
Bittorrent final seminar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
Bit Torrent technology
Bit Torrent technology Bit Torrent technology
Bit Torrent technology
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bit torrent-technology
Bit torrent-technologyBit torrent-technology
Bit torrent-technology
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
BitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easierBitTorrent - sharing files has never been easier
BitTorrent - sharing files has never been easier
 
Bit torrent protocol by milan varia
Bit torrent protocol by milan variaBit torrent protocol by milan varia
Bit torrent protocol by milan varia
 
Bit Torrent Protocol Report
Bit Torrent Protocol ReportBit Torrent Protocol Report
Bit Torrent Protocol Report
 
UNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENTUNRAVEILING BIT-TORRENT
UNRAVEILING BIT-TORRENT
 
Bit torrent documentation
Bit torrent documentationBit torrent documentation
Bit torrent documentation
 
Bittorrent Basics
Bittorrent BasicsBittorrent Basics
Bittorrent Basics
 
Torrent
TorrentTorrent
Torrent
 
Torrent Protocol
Torrent ProtocolTorrent Protocol
Torrent Protocol
 
Introduction to the Bittorrent Protocol
Introduction to the Bittorrent ProtocolIntroduction to the Bittorrent Protocol
Introduction to the Bittorrent Protocol
 
Bit torrent protocol
Bit torrent protocolBit torrent protocol
Bit torrent protocol
 

Viewers also liked

From Meme To Social Fabric
From Meme To Social FabricFrom Meme To Social Fabric
From Meme To Social FabricIsaac Mao
 
Debugging and Profiling PHP Applications
Debugging and Profiling PHP ApplicationsDebugging and Profiling PHP Applications
Debugging and Profiling PHP ApplicationsLogan Lindquist
 
Artificial Vision Using System No Blinds In The World
Artificial Vision Using System No Blinds In The WorldArtificial Vision Using System No Blinds In The World
Artificial Vision Using System No Blinds In The WorldR.PRABHU R.RAJENDRAN
 
Rice puller pdf home page ready to paste
Rice puller pdf home page ready to pasteRice puller pdf home page ready to paste
Rice puller pdf home page ready to pasteRice Puller
 
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL ...
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL     ...RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL     ...
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL ...Rice Puller
 
Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]hem
 
Basic overview of an artificial eye
Basic overview of an artificial eyeBasic overview of an artificial eye
Basic overview of an artificial eyeTabish Ansar
 
Report of PILL CAMERA
Report of PILL CAMERAReport of PILL CAMERA
Report of PILL CAMERArazaemohammed
 
10 myths about psychology
10 myths about psychology10 myths about psychology
10 myths about psychologyTED Talks
 
I'm a smartphone addict
I'm a smartphone addictI'm a smartphone addict
I'm a smartphone addictLior Frenkel
 
12 Time Management Techniques
12 Time Management Techniques12 Time Management Techniques
12 Time Management TechniquesWeekdone.com
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Can We Assess Creativity?
Can We Assess Creativity?Can We Assess Creativity?
Can We Assess Creativity?John Spencer
 

Viewers also liked (18)

From Meme To Social Fabric
From Meme To Social FabricFrom Meme To Social Fabric
From Meme To Social Fabric
 
Debugging and Profiling PHP Applications
Debugging and Profiling PHP ApplicationsDebugging and Profiling PHP Applications
Debugging and Profiling PHP Applications
 
Iridium
IridiumIridium
Iridium
 
Artificial Vision Using System No Blinds In The World
Artificial Vision Using System No Blinds In The WorldArtificial Vision Using System No Blinds In The World
Artificial Vision Using System No Blinds In The World
 
Rice puller pdf home page ready to paste
Rice puller pdf home page ready to pasteRice puller pdf home page ready to paste
Rice puller pdf home page ready to paste
 
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL ...
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL     ...RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL     ...
RICE PULLER NAHI HOTA HE 09425636422 + 09981011455 CLICK HERE FOR DETAIL ...
 
Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]Iridium.Ppt [Recovered]
Iridium.Ppt [Recovered]
 
Basic overview of an artificial eye
Basic overview of an artificial eyeBasic overview of an artificial eye
Basic overview of an artificial eye
 
Artificial eye
Artificial eyeArtificial eye
Artificial eye
 
Pill camera ppt
Pill camera pptPill camera ppt
Pill camera ppt
 
artificial eye
artificial eyeartificial eye
artificial eye
 
Report of PILL CAMERA
Report of PILL CAMERAReport of PILL CAMERA
Report of PILL CAMERA
 
10 myths about psychology
10 myths about psychology10 myths about psychology
10 myths about psychology
 
I'm a smartphone addict
I'm a smartphone addictI'm a smartphone addict
I'm a smartphone addict
 
Iridium satellite system
Iridium satellite systemIridium satellite system
Iridium satellite system
 
12 Time Management Techniques
12 Time Management Techniques12 Time Management Techniques
12 Time Management Techniques
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Can We Assess Creativity?
Can We Assess Creativity?Can We Assess Creativity?
Can We Assess Creativity?
 

Similar to Torrents (20)

Bit torrent and tracker
Bit torrent and trackerBit torrent and tracker
Bit torrent and tracker
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Copy Of Part 4
Copy Of Part 4Copy Of Part 4
Copy Of Part 4
 
torrent technology ppt for students and teachers
torrent technology ppt for students and teacherstorrent technology ppt for students and teachers
torrent technology ppt for students and teachers
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Bit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay RBit torrent protocol seminar by Sanjay R
Bit torrent protocol seminar by Sanjay R
 
Peer to Peer networks and piracy
Peer to Peer networks and piracyPeer to Peer networks and piracy
Peer to Peer networks and piracy
 
BitTorrent
BitTorrent BitTorrent
BitTorrent
 
Legal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorentLegal issues in p2 p sharing and bittorent
Legal issues in p2 p sharing and bittorent
 
Bit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONSBit torrent by SANDA SOLUTIONS
Bit torrent by SANDA SOLUTIONS
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
The big book of bit torrent
The big book of bit torrentThe big book of bit torrent
The big book of bit torrent
 
Bittorrent
BittorrentBittorrent
Bittorrent
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
Bittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshiBittorrent Seminar by dhananjay pardeshi
Bittorrent Seminar by dhananjay pardeshi
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
Bittorrent
BittorrentBittorrent
Bittorrent
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Torrents

  • 2. TORRENTS  What is Torrent  The pyramid theory  How Torrenting Works  Trackers  Peers  Ratio and the Fair Share Policy  Torrent Culture  Controversy
  • 4. THE PYRAMID THEORY 2 SINGLE MAN
  • 5. HOW TORRENTING WORKS  All torrenting takes place using a torrent program. Examples of torrenting programs include uTorrent, Azureus and the original Bit Torrent. These programs allow your computer to send and receive files on a specific port and interpret the data from .TORRENT files. .TORRENT files contain all of the information on a specific torrent--who started it, what the torrent contains, and how to download and upload information corresponding to that torrent. When the .TORRENT file is opened by a torrent program, the torrent program connects to other users who have portions of the torrent and downloads the torrent from them. Upon receiving portions of the torrent, your computer becomes able to upload (or "seed") the file to other users. Once the torrent program has received all portions of the torrent, it assembles them into a file using the directions found in the .TORRENT file.
  • 6. TRACKERS  Torrenting begins and ends at large networking servers known as trackers. Your torrent program (or "client") connects to these servers using a list found in the original .TORRENT file. Trackers have a list of all users connected to it and which files they're able to seed. Your client picks from these users and downloads data from them accordingly. Upon connecting to the tracker, it registers your computer and the files that you yourself are able to seed. Trackers also keep logs of one's ratio--how much your computer uploads, measured against how much your computer downloads--and determines the amount of bandwidth you receive.
  • 7. TRACKERS TRACKER SERVER CLIENTS
  • 8. RATIO AND THE FAIR SHARE POLICY  All torrent trackers incorporate a "fair share" policy, which restricts or grants access to bonus torrent bandwidth accordingly. Fair share policies basically say that if you're not seeding as much as you are downloading ("leeching"), you will receive less bandwidth from the torrent. Conversely, if your seed-leech ratio is high, you will download files from the torrent much quicker than someone with a low ratio. Priority on the tracker is also given to those with higher ratios. This means they will connect to other users on the server ("peers") more quickly.
  • 9. PEERS  Peers are clients that have high speed internet connection , Or clients that Upload more they download, Or when the seed-leech is high PEERS SERVER NORMAL SERVER PEERS CLIENTS NORMAL CLIENTS
  • 10. TORRENT CULTURE  A large culture has sprung up around torrenting. Found in websites all over the Internet, these cultures generally promote fair share policies and file-sharing honesty, and discourage copyright infringement or file theft. Generally, these communities are invite-only. Open membership is only granted at specific times, generally once a month. Anyone wishing to join who doesn't want to wait until membership becomes open must secure an invite from someone else who's already part of the community. Other torrent sites are completely private. For example, the torrent site known as "What.CD" requires potential users to solve several puzzles to gain membership, and then undergo an interview and a speed test (to determine whether or not a user can upload efficiently) before acceptance.
  • 11. TORRENT CULTURE PUZZLE What.CD website
  • 12. CONTROVERSY ABOUT TORRENTS  Unfortunately, since its inception, peer-to-peer torrenting has been highly controversial. Because trackers cannot and do not keep track of what information can be found in their torrents, the potential for copyright infringement, file theft and even child pornography exists. Organizations pursue legal activity against torrent trackers and users every day under claims of copyright infringement. However, despite all of the controversy, torrenting remains a very popular way to transfer large amounts of data from and to users at a very quick speed. Many computer companies, such as Blizzard Entertainment, even use torrenting to allow users to download their software.
  • 13. TORRENT CLIENTS µTORRENT
  • 14. QUESTIONS FFFF FIRST FIVE FOR FREE
  • 15. THANKS  E-mail: e.ahmedhag@gmail.com