![]() This ensures that any modification of the piece can be reliably detected, and thus prevents both accidental and malicious modifications of any of the pieces received at other nodes. It does that by making sure that a single file is divided into segments called pieces that could be downloaded from multiple locations (sources) at once.Įach piece is protected by a cryptographic hash contained in the torrent descriptor. The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. BitTorrent trackers provide a list of files available for transfer and allow the client to find peer users, known as “seeds”, who may transfer the files. Popular clients include μTorrent, Xunlei Thunder, Transmission, qBittorrent, Vuze, Deluge, BitComet and Tixati. In order to send or receive files, a person uses a BitTorrent client which is a computer program that implements the BitTorrent protocol. In 2019, BitTorrent was a dominant file-sharing protocol and one of the applications that generate greater traffic on the Internet, with 2.46% of downstream, and 27.58% of upstream traffic. In February 2013, BitTorrent was responsible for 3.35% of all worldwide bandwidth - more than half of the 6% of total bandwidth dedicated to file sharing. Programmer Bram Cohen, a University at Buffalo alumni, designed the protocol in April 2001, and released the first version on July 2, 2001.Īs of February 2009, P2P networks have been estimated to, collectively, account for approximately 43% to 70% of all Internet traffic (depending on location). ![]() As such, BitTorrent is one of the most common protocols for transferring large files - such as digital video or audio files. BitTorrent (abbreviated to BT) is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data over the Internet in a decentralized manner.
0 Comments
Leave a Reply. |