SlideShare a Scribd company logo
1 of 21
Download to read offline
S ‘O’ A UNIVERSITY BHUBANESWAR
Decentralizing Servers:
Torrents
23:28 DEPARTMENTOF CA: ITER 1
Submitted By:
Biswas Prasana Swain
2261020289
3rd Sem, MCA
Guided By:
Mr. Prasanta Ku. Sahoo
Sr. Professor
Dept. Of CA
S ‘O’ A UNIVERSITY BHUBANESWAR
What we will learn?
What is
Decentralization?
What is Torrenting?
How Does Torrenting
Work?
What Are the
Benefits of
Torrenting?
What Are the
Challenges of
Torrenting?
How Can You Torrent
Safely and
Responsibly?
Conclusion References
23:28 DEPARTMENTOF CA: ITER 2
S ‘O’ A UNIVERSITY BHUBANESWAR
Decentralization means the transfer of power, authority, control, and decision-making away
from a central, authoritative location or group and given to smaller factions within it.
For example, in a centralized system, one person or organization makes all the rules and
decisions for everyone else. In a decentralized system, different people or groups can make
their own rules and decisions based on their needs and preferences.
Decentralization can happen in different areas, such as politics, administration, economy,
and technology.
23:28 DEPARTMENTOF CA: ITER 3
What is Decentralization?
S ‘O’ A UNIVERSITY BHUBANESWAR
Torrenting is a way of sharing files
over the internet using a technology
called BitTorrent.
BitTorrent is a peer-to-peer (P2P) file-
sharing protocol, which means that it
allows users to transfer data and files
directly to each other without using a
central server.
A torrentis a small file that contains
information about the files that you
wantto download, such as their
names, sizes, locations, and
cryptographic hashes. You need a
special programcalled a torrentclient
to open and usetorrents.
23:28 DEPARTMENTOF CA: ITER 4
What is Torrenting?
S ‘O’ A UNIVERSITY BHUBANESWAR
When you want to download a file using torrenting, you first need to find and download a torrent
file that matches what you are looking for. You can use websites called torrent sites to search for
torrents.
Then, you open the torrent file with your torrent client. The torrent client will contact a server
called a tracker, which will tell it how to connect to other users who have the same or parts of the
same file. These users are called peers or seeders.
The torrent client will then download smallpieces of the file from different peers or seeders until it
has the complete file. At the same time, it will also upload the pieces that it has to other peers who
need them. This way, everyone helps each other to share the file faster and more efficiently.
23:28 DEPARTMENTOF CA: ITER 5
How does Torrenting work?
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 6
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 7
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENT OF CA: ITER 8
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 9
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 10
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 11
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 12
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 13
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 14
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 15
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 16
What Are the Benefits of Torrenting?
Itcan reducethe costand burden
on the original sourceof the file,
since it does not haveto provide
the file to every user who requests
it.
Itcan increasethe speed and
availability of the file, sinceit does
not depend on a single server or
connection. As long as there are
enough peers or seeders in the
network, the file can be
downloaded by anyone.
Itcan allow users to access and
distributeany type of file, including
large or rarefiles that may not be
easily found or hosted elsewhere.
S ‘O’ A UNIVERSITY BHUBANESWAR
Itcan exposeyou to legal issues if you
download or sharefiles that are
protected by copyrightlaws or
contain illegal content. You may face
fines, lawsuits, or even criminal
charges if you arecaught by
authorities or rights holders.
Itcan exposeyou to security issues if
you download or sharefiles that are
infected with malwareor contain
harmfulcontent. You may damage
your device, compromiseyour data,
or lose your privacy if you arenot
carefulabout whatyou download or
who you trust.
Itcan exposeyou to performance
issues if you download or sharetoo
many files at once or use an
unreliable torrentclient. You may
experience slow speeds, connection
problems, or device crashes if you do
not manage your bandwidth or
resources properly.
23:28 DEPARTMENTOF CA: ITER 17
What Are the Challenges of Torrenting?
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 18
How Can You Torrent Safely and
Responsibly??
Onlydownloadtorrentsfrom
reputable websites,confirmingthe
legitimacyof the torrentsyou’re
using,usingagood P2P client,
avoidingcopyrighted material,and
gettinga VPN.
A VPN isa service thatencryptsyour
internettrafficandhidesyourIP
addressfromothers.Thiscan help
youprotect youridentityandactivity
fromyour internetserviceprovider
(ISP),authorities,rightsholders,
hackers,andother maliciousactors.
A VPN can alsohelpyouaccess
blockedorrestrictedtorrentsites
and contentinyourregionby
changingyourvirtual locationto
anothercountrywhere theyare
available.
S ‘O’ A UNIVERSITY BHUBANESWAR
In this presentation, we
learned about
decentralisation and
torrenting.
We learned what they
are, how they work,
what are their benefits
and challenges, and how
to use them safely and
responsibly.
23:28 DEPARTMENTOF CA: ITER 19
Conclusion
S ‘O’ A UNIVERSITY BHUBANESWAR
Cohen, B. (2003). Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer systems (Vol. 6, pp. 68-72).
Pouwelse, J., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., ... & Sips, H. (2005). Tribler: A social-based peer-to-peer system. In 5th
InternationalWorkshop on Peer-to-Peer Systems(IPTPS) (Vol. 2006).
Cohen, B. (2008). TheBitTorrentprotocolspecification.
Cohen, B., & Loewenstein, J. (2010). BitTorrentlive: A low-latency live P2P video streaming system. In Proceedings of the2010 ACMworkshop
on Peer-to-peer streaming and IP-TV (pp. 127-132).
Cohen, B., & Shen, R. (2012). Torrents of tweets: A study of the twitter backbone. In Proceedings of the 2012 ACMworkshop on Workshop on
online socialnetworks (pp. 41-46).
Cohen, B., & Shen, R. (2013). Academic torrents: Scalabledata distribution for research. In Proceedings of the2013 IEEE/ACM International
Conferenceon Advances in Social Networks Analysis and Mining (pp. 1449-1450).
https://torrentfreak.com/academics-launch-torrent-site-to-share-papers-and-datasets-140131/.
23:28 DEPARTMENTOF CA: ITER 20
References
S ‘O’ A UNIVERSITY BHUBANESWAR
23:28 DEPARTMENTOF CA: ITER 21
Thank You!
Any Questions?

More Related Content

Similar to Dencentralizing Servers - Torrents.pdf

Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageProQSys
 
2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)geeksec80
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrentSrikanth Vanama
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdfSamuel Medeludo
 
What are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdfWhat are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdfMark Tencaten
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Securityijceronline
 
Net Neutrality by Suhail Attar
Net Neutrality by Suhail AttarNet Neutrality by Suhail Attar
Net Neutrality by Suhail AttarSuhail Attar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technologyguestc67adeb
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using SnortRick Wanner
 
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...eby
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsMayur Kathale
 

Similar to Dencentralizing Servers - Torrents.pdf (20)

Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
 
Bit torrent a revolution in p2p
Bit torrent a revolution in p2pBit torrent a revolution in p2p
Bit torrent a revolution in p2p
 
2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)2012 04-16-ultrasurf-analysis (2)
2012 04-16-ultrasurf-analysis (2)
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Project_report_BitTorrent
Project_report_BitTorrentProject_report_BitTorrent
Project_report_BitTorrent
 
U torrent as a P2P application.pdf
U torrent as a P2P application.pdfU torrent as a P2P application.pdf
U torrent as a P2P application.pdf
 
What are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdfWhat are Peer-to-peer Networks.pdf
What are Peer-to-peer Networks.pdf
 
Anonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and SecurityAnonymous Communication for Providing More Privacy and Security
Anonymous Communication for Providing More Privacy and Security
 
Net neutrality
Net neutrality Net neutrality
Net neutrality
 
Net Neutrality by Suhail Attar
Net Neutrality by Suhail AttarNet Neutrality by Suhail Attar
Net Neutrality by Suhail Attar
 
Bit Torrent Technology
Bit Torrent TechnologyBit Torrent Technology
Bit Torrent Technology
 
BitTorrent
BitTorrentBitTorrent
BitTorrent
 
Torrent technology
Torrent technologyTorrent technology
Torrent technology
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Detecting BitTorrents Using Snort
Detecting BitTorrents Using SnortDetecting BitTorrents Using Snort
Detecting BitTorrents Using Snort
 
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
 
Illegal File Sharing
Illegal File SharingIllegal File Sharing
Illegal File Sharing
 
Illegal file sharing4
Illegal file sharing4Illegal file sharing4
Illegal file sharing4
 
Torrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, detailsTorrent Seminar inc.- working, terms, details
Torrent Seminar inc.- working, terms, details
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Dencentralizing Servers - Torrents.pdf

  • 1. S ‘O’ A UNIVERSITY BHUBANESWAR Decentralizing Servers: Torrents 23:28 DEPARTMENTOF CA: ITER 1 Submitted By: Biswas Prasana Swain 2261020289 3rd Sem, MCA Guided By: Mr. Prasanta Ku. Sahoo Sr. Professor Dept. Of CA
  • 2. S ‘O’ A UNIVERSITY BHUBANESWAR What we will learn? What is Decentralization? What is Torrenting? How Does Torrenting Work? What Are the Benefits of Torrenting? What Are the Challenges of Torrenting? How Can You Torrent Safely and Responsibly? Conclusion References 23:28 DEPARTMENTOF CA: ITER 2
  • 3. S ‘O’ A UNIVERSITY BHUBANESWAR Decentralization means the transfer of power, authority, control, and decision-making away from a central, authoritative location or group and given to smaller factions within it. For example, in a centralized system, one person or organization makes all the rules and decisions for everyone else. In a decentralized system, different people or groups can make their own rules and decisions based on their needs and preferences. Decentralization can happen in different areas, such as politics, administration, economy, and technology. 23:28 DEPARTMENTOF CA: ITER 3 What is Decentralization?
  • 4. S ‘O’ A UNIVERSITY BHUBANESWAR Torrenting is a way of sharing files over the internet using a technology called BitTorrent. BitTorrent is a peer-to-peer (P2P) file- sharing protocol, which means that it allows users to transfer data and files directly to each other without using a central server. A torrentis a small file that contains information about the files that you wantto download, such as their names, sizes, locations, and cryptographic hashes. You need a special programcalled a torrentclient to open and usetorrents. 23:28 DEPARTMENTOF CA: ITER 4 What is Torrenting?
  • 5. S ‘O’ A UNIVERSITY BHUBANESWAR When you want to download a file using torrenting, you first need to find and download a torrent file that matches what you are looking for. You can use websites called torrent sites to search for torrents. Then, you open the torrent file with your torrent client. The torrent client will contact a server called a tracker, which will tell it how to connect to other users who have the same or parts of the same file. These users are called peers or seeders. The torrent client will then download smallpieces of the file from different peers or seeders until it has the complete file. At the same time, it will also upload the pieces that it has to other peers who need them. This way, everyone helps each other to share the file faster and more efficiently. 23:28 DEPARTMENTOF CA: ITER 5 How does Torrenting work?
  • 6. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 6
  • 7. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 7
  • 8. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENT OF CA: ITER 8
  • 9. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 9
  • 10. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 10
  • 11. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 11
  • 12. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 12
  • 13. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 13
  • 14. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 14
  • 15. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 15
  • 16. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 16 What Are the Benefits of Torrenting? Itcan reducethe costand burden on the original sourceof the file, since it does not haveto provide the file to every user who requests it. Itcan increasethe speed and availability of the file, sinceit does not depend on a single server or connection. As long as there are enough peers or seeders in the network, the file can be downloaded by anyone. Itcan allow users to access and distributeany type of file, including large or rarefiles that may not be easily found or hosted elsewhere.
  • 17. S ‘O’ A UNIVERSITY BHUBANESWAR Itcan exposeyou to legal issues if you download or sharefiles that are protected by copyrightlaws or contain illegal content. You may face fines, lawsuits, or even criminal charges if you arecaught by authorities or rights holders. Itcan exposeyou to security issues if you download or sharefiles that are infected with malwareor contain harmfulcontent. You may damage your device, compromiseyour data, or lose your privacy if you arenot carefulabout whatyou download or who you trust. Itcan exposeyou to performance issues if you download or sharetoo many files at once or use an unreliable torrentclient. You may experience slow speeds, connection problems, or device crashes if you do not manage your bandwidth or resources properly. 23:28 DEPARTMENTOF CA: ITER 17 What Are the Challenges of Torrenting?
  • 18. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 18 How Can You Torrent Safely and Responsibly?? Onlydownloadtorrentsfrom reputable websites,confirmingthe legitimacyof the torrentsyou’re using,usingagood P2P client, avoidingcopyrighted material,and gettinga VPN. A VPN isa service thatencryptsyour internettrafficandhidesyourIP addressfromothers.Thiscan help youprotect youridentityandactivity fromyour internetserviceprovider (ISP),authorities,rightsholders, hackers,andother maliciousactors. A VPN can alsohelpyouaccess blockedorrestrictedtorrentsites and contentinyourregionby changingyourvirtual locationto anothercountrywhere theyare available.
  • 19. S ‘O’ A UNIVERSITY BHUBANESWAR In this presentation, we learned about decentralisation and torrenting. We learned what they are, how they work, what are their benefits and challenges, and how to use them safely and responsibly. 23:28 DEPARTMENTOF CA: ITER 19 Conclusion
  • 20. S ‘O’ A UNIVERSITY BHUBANESWAR Cohen, B. (2003). Incentives build robustness in BitTorrent. In Workshop on Economics of Peer-to-Peer systems (Vol. 6, pp. 68-72). Pouwelse, J., Garbacki, P., Wang, J., Bakker, A., Yang, J., Iosup, A., ... & Sips, H. (2005). Tribler: A social-based peer-to-peer system. In 5th InternationalWorkshop on Peer-to-Peer Systems(IPTPS) (Vol. 2006). Cohen, B. (2008). TheBitTorrentprotocolspecification. Cohen, B., & Loewenstein, J. (2010). BitTorrentlive: A low-latency live P2P video streaming system. In Proceedings of the2010 ACMworkshop on Peer-to-peer streaming and IP-TV (pp. 127-132). Cohen, B., & Shen, R. (2012). Torrents of tweets: A study of the twitter backbone. In Proceedings of the 2012 ACMworkshop on Workshop on online socialnetworks (pp. 41-46). Cohen, B., & Shen, R. (2013). Academic torrents: Scalabledata distribution for research. In Proceedings of the2013 IEEE/ACM International Conferenceon Advances in Social Networks Analysis and Mining (pp. 1449-1450). https://torrentfreak.com/academics-launch-torrent-site-to-share-papers-and-datasets-140131/. 23:28 DEPARTMENTOF CA: ITER 20 References
  • 21. S ‘O’ A UNIVERSITY BHUBANESWAR 23:28 DEPARTMENTOF CA: ITER 21 Thank You! Any Questions?