Technologies Built on BitTorrent

Since the popularity of the bit torrent protocol is constantly increasing, so is the number of various technologies that have and will be built on the bit torrent protocol. One of the biggest improvement is the torrent tracker. Originally, when the bit torrent protocol was invented, one had to utilize a bit torrent tracker file. This has led to many attempts by various copyright authorities to take legal actions against the various tracker indexing websites, even though they do not actually contain any copyrighted material on them. In order to over come this, a new technology was built.

This new technology was the ability to have trackerless torrents. In order to accomplish this, the DHT was created. This DHT creates a unique hash key for each and every bit torrent file. This then got rid of the need for the torrent files except for the fact that some torrent software, use a different plug-in to make the hash keys. The keys then may be different and make it unable to be shared to anyone that does not use their particular bit torrent client software.

Another big change is the use of a virtual torrent in which your software sends an instant message to any other computer using the same software to tell them what files you are sharing. All of this of course had made the crack down on software, movie and music piracy much harder, but they can still find out who is stealing their intellectual data.

There was then the capability of sharing bits of data without the need of HTTP protocols. Utilizing an RSS feed, your bit torrent or P2P software announces the file that you have and who you are currently sharing with to the other users in the network. This eventually creates basically a full-mesh network with redundant paths between multiple file sources. Even if you cannot connect directly to that other computer, you can push USD to another computer that is connected with it and basically request that the other computer connect with you instead of vice versa.

Due to the simple fact that the bit torrent protocol and its traffic take up a substantial amount of an ISP’s traffic, there have been attempts to shut it down, so in response, you can now encrypt both incoming and outgoing connections. The ISP may inject TCP RST packets into the data stream if it suspects the transfers to be a bit torrent protocol and therefore slowing the connections down.

Then came the multitracker. The capabilities for a bit torrent client software to monitor multiple trackers of the same file in order to allow not just more connections, but also a sort of back-up incase one tracker gets lost, or worse, taken down by the force of the various copyright authorities.

As of right now, there are already many different technologies that have been built on as well as in conjunction with the bit torrent protocol. As times change and as there are more attempts to shut down the file sharing networks around the world, many more types of technology will be introduced in order to counter any attempts to shut the networks down.

Leave a Reply

You must be logged in to post a comment.

© 2008 TECHNOLOGY REVIEW BLOG “TECHNOLOGY SUCCESS ONE DROP AT A TIME…”. Powered by Wordpress. Designed by Woo Themes