Pseudo code and Examples Demonstrating Implementation of Bit Torrent Protocol

Title: Pseudo code and Examples Demonstrating Implementation of Bit Torrent Protocol
Publisher: Guru Nanak Publications
ISSN: 2278-0947
Series: Volume 4 Issue 1
Authors: Netrawati Sawale, Anand Jha, Amit Dichwalkar, Aniket Salvi


Abstract

In today’s computing world when peer to peer content distribution is at an all time high, the significant role played by Bit torrent protocol can’t be overlooked. The introduction of this protocol revolutionized the way people downloaded different types of content and the speed at which they downloaded it. In this paper we have explained the three most important algorithms or strategies used by bit torrent protocol to achieve efficiency and fairness. We have listed the step by step execution of the three algorithms with tabular example for better analysis .We have also prepared pseudocode for implementing these algorithms.

Keywords

Choking, Leecher, Pseudo code, Random first, Rarest first, Seeder, Torrent, Trackers.

Download Full Text

(For complimentary copy, please contact Chief_editor@innovationjournals.com)