Table of Content:

Task 1: 2
Task 3: 4
(refer to PPT) 4
References 5

Task 1:

  1. What is the software architectural style of system of Bit torrent?


BitTorrent is used to communicate protocol that is off peer to Peer file sharing.  The data of Big torrent are used to distribute files over the internet. Though the protocol that BitTorrent generally seeds are under development as there are many areas to improve and enhance other services. The service on which Bit Torrent works is described below:

Figure: System Architecture


(Source:carlsen, 2016)

BitTorrent is focused on the file transfer protocol, a standard Network protocol is used for transferring the files from one host to the other host over the TCP layer. It is built on a client and server architecture and it can fail if there is Overload, and the server is down for any reason [1].

The components of BitTorrent system are:

Metainfo file





The metainfo file holds all the information about the torrent, it is joined with a .torrent extension.

There are Metainfo, announce, data creation, comment keys in metadata info. This Encoding scheme is mostly used by Bancoding. The tracker is responsible for managing the participation of Torrent, this is basically a HTTP service based on the port 6969, and the peer requests the tracker to join it with other peers that has the required pieces.

The working principle:

The HTTP GET message from a peer to peer tracker and it contains the info_hash, peer_id, uploaded, downloaded, left, port parameter. The response message from the tracker includes interval, tracker_id, peer etc. Data querying takes place from the scraping and then the tracker responds to the scrape page. Peer performs a handshake function in order to start the communication, in the next step handshaking using the BitTorrent Protocol, the peer’s starts delivering message to one another [2]. Once the complete file is downloaded the executable program runs on the user’s machine there is coordination in between OS platforms for reading and writing operations. If the peers are in between the same client, perform the operation can faster.

The seeder generates a torrent and uploads the .torrent file to the server. Then the seeder notifies the tracker, in the next step a leecher downloads the torrent from the web server. The leecher the n connects tracker that is specified in the .torrent file[3] then the leecher connects the peers in order to retrieve the pieces of the files. Whenever there is joining in the BitTorrent network and it is to begin downloading files the tracker computer starts working. The tracker computer is a server and it maintains the list of nodes that are participating in the system. After a computer has established a connection to one of the node, the data downloading starts automatically, the trackers are basically the servers those who are known as active, these are collaborative nodes that are responsible for providing requested chunks. Each of the node may not have a complete copy of the data these are known as leechers, though these leechers will share portion’ that are in the system. Each of the node is based on the equal peer it is a requirement that the nodes upload data with the part of the network. A BitTorrent system must be based on at least one seeder [4]. This must hold a complete copy of the data that are being shared. It may happen that the seeder may leave the system, but it is necessary to have a complete copy that is available for the system.

Web seeding technology is the main ability of BitTorrent clients to download the Torrent pieces from the HTTP sources. The advantage of this feature is that a website can use the distributed torrent for a batch of file or for a particular file.

BitTorrent is a Hybrid network, it is developed for building the client-server architecture and peer to peer architecture. BitTorrent is a half and half system utilizing both the customer server design and the peer to peer design. The brought together server is known as the tracker. The tracker’s obligation is to help peers find different companions. A tracker comprises of numerous deluge sessions with every session it keeps track of the majority of the companions taking part in the specific downpour. The companion contacts the tracker and the tracker reacts with a rundown of associates it might interface with. The tracker is not in charge of the genuine circulation of the substance by any stretch of the imagination. The transmission capacity of the tracker is low since it is a straightforward convention, which peers just associate with when they start up and at characterized time interims of  typically 30 minutes.

Task 3:

(refer to PPT)


[1]G. Fedak, H. He and F. Cappello, “BitDew: A data management and distribution service with multi-protocol file transfer and metadata abstraction”, Journal of Network and Computer Applications, vol. 32, no. 5, pp. 961-975, 2009.

[2]J. Ju and K. Baker, “Implementing a file transfer protocol between PDP11 and prime 550 computers”, Softw: Pract. Exper., vol. 14, no. 11, pp. 1009-1019, 1984.

[3]M. Krishna, P. Jamwal, K. Chaitanya and B. Kumar, “Secure File Multi Transfer Protocol Design”,JSEA, vol. 04, no. 05, pp. 311-315, 2011.

[4]J. Zhang, Z. Zhao and H. Jiang, “The Design of File Transfer Protocol Based on R<sup>2</sup>UDP in Digital Radio Narrowband System”, AMR, vol. 926-930, pp. 2598-2601, 2014.

[5]S. Dittmeier, N. Berger, A. Schöning, H. Soltveit and D. Wiedner, “60 GHz wireless data transfer for tracker readout systems—first studies and results”, J. Inst., vol. 9, no. 11, pp. C11002-C11002, 2014.

[6]L. Carlsen, 2016. [Online]. Available: [Accessed: 08- Aug- 2016].

Add Your Review

eighteen − ten =