Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Servers

    A More Business-Friendly BitTorrent

    By
    Steven J. Vaughan-Nichols
    -
    March 10, 2005
    Share
    Facebook
    Twitter
    Linkedin

      Open-source programmer Bram Cohen on Monday released version 4.0 of his popular BitTorrent client for Windows and Linux.

      BitTorrent is an ad hoc, P2P (peer-to-peer) protocol.

      Cohen created it to address the problem of transferring popular, large files over the Internet.

      Instead of using the client-server model of traditional Internet file distribution systems, such as FTP or the Webs HTTP or older P2P systems such as Kazaa, wherein files are shared directly among individual users, BitTorrent took a new approach.

      BitTorrent works by using a central server, or tracker, to coordinate all the peers sharing a particular file.

      The tracker, however, may or may not have a master copy of the file.

      Its job is to simply coordinate the connections—nothing more, nothing less.

      Instead, systems with a complete copy of the file, also known as seeders, start sharing it with systems that request it.

      Then, unlike other P2P systems, those systems that have only part of the file begin sharing it with other users requesting the file.

      The end result is that with multiple users both sending and receiving the file, download speeds tend to be fast without requiring high-bandwidth connections or multiple servers by the files owner.

      Technically, BitTorrent works by connecting over TCP ports 6881-6999.

      A smaller subset of ports can be used. Ten, one per each transfer session, such as 6881-6891, is a typical configuration.

      However, a BitTorrent client must have outbound access to port 6969 to connect with most trackers.

      It all sounds more complicated then it really is, as far as end-users are concerned.

      For a user, all thats required is that the systems firewall or NAT (Network Address Translation) be set to allow BitTorrent access to its TCP ports.

      Some anti-worm programs, like the one in Norton SystemWorks 2005, must also be set to allow BitTorrent inbound connections.

      With those factors taken care of, all you need to do is to click on a BitTorrent link, and the download will begin.

      With BitTorrent, data transfer rates can be achieved that make the downloading of hundreds of megabytes of data, or even gigabytes of data, practical over even slow broadband connections.

      So, for the end user, BitTorrent is easy. Its another story for network administrators.

      British P2P analysis firm CacheLogic claims that BitTorrent protocol traffic accounts for an amazing 35 percent of all Internet traffic.

      According to CacheLogics studies, BitTorrent traffic accounts for more Internet traffic than any other single protocol, such as http, or e-mails POP (Post Office Protocol) and SMTP.

      That same popularity makes BitTorrent a major problem for network administrators.

      Even though an individual BitTorrent client doesnt use much bandwidth, dozens, hundreds, or even thousands of them are enough to bring strong LANs to their knees.

      Another problem with BitTorrent is, like other P2P services before it, its often used to copy and share copyrighted materials.

      Unlike Napster of old, though, which only transferred songs of a few megabytes, BitTorrent is often used to move the hundreds of megabytes of movies.

      /zimages/1/28571.gifRead more here about Linux distributor Lindows.com taking commercial advantage of BitTorrent.

      Together, these problems are bad enough that many institutions, like the University of Florida, ban the use of BitTorrent and other P2P clients.

      Next Page: Expanding to business use.

      Expanding to business use

      BitTorrent is much more, though, than just the latest craze for hijacking movies and TV shows. It is also proving useful for delivering the large ISO images of operating systems, applications and major patches.

      For example, the Linux Mirror Project makes it possible to use BitTorrent to download most popular Linux distributions, including Mandrake, Red Hats Fedora and Novell/SUSE, at rates that are usually speedier than those provided by FTP or HTTP.

      This new edition makes it much more attractive for business use. While it now boasts an improved interface and more granular control for the client, by far the most important new feature for administrators is that BitTorrent packets are marked as bulk data.

      This last feature makes managing BitTorrent traffic a snap.

      In the past, service providers would need special appliances, like Sandvine Inc.s Peer to Peer Element 8200 or Allot Communications enterprise line for network administrators, to manage it.

      General-purpose traffic management tools, such as Lightspeed Systems Inc.s Total Traffic Control, can be used to manage BitTorrent traffic.

      No matter what was used for traffic management, short of stopping BitTorrent entirely by blocking its TCP ports with a firewall, management was necessary.

      Otherwise, its sheer volume of traffic was likely to slow down networks and make such latency-sensitive applications as VOIP (voice over IP) unusable.

      /zimages/1/28571.gifClick here to read more about BitTorrent and RSS straining the boundaries of their infrastructure.

      By marking its traffic as bulk, as does newer versions of FTP, almost any network traffic tool can easily be used to manage BitTorrents traffic.

      Its possible to successfully control BitTorrent traffic with the common iproute2 tools, which are available on almost all modern versions of Linux.

      The new version also performs better on local networks.

      With earlier versions, network congestion was possible even when BitTorrent traffic was only moving at single-digit Kbps rates. With 4.0, that problem has gone away.

      Other programs, such as Azureus, a Java-based P2P client, and BitTornado also use the BitTorrent protocol.

      These tend to have more features than Cohens original BitTorrent, but this new versions ease of traffic manageability both for the end-user and the network administrator make it the P2P client of choice for professional environments.

      /zimages/1/28571.gifCheck out eWEEK.coms for the latest open-source news, reviews and analysis.

      Avatar
      Steven J. Vaughan-Nichols
      I'm editor-at-large for Ziff Davis Enterprise. That's a fancy title that means I write about whatever topic strikes my fancy or needs written about across the Ziff Davis Enterprise family of publications. You'll find most of my stories in Linux-Watch, DesktopLinux and eWEEK. Prior to becoming a technology journalist, I worked at NASA and the Department of Defense on numerous major technological projects.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×