You are on page 1of 3

Info Hash Torrent Searching Technique

Surajit Karmakar
1
, Pooja Mehta
2
, Vaibhavi Shah

, Har!ik Somai"a
#
Department of Computer Technology
1
K. J. Somaiya Institute of Engineering and Information Technology, Sion, Mumai.
!
Shah and "nchor Kutchhi Engineering College, Chemur, Mumai.
#, $
K. J. Somaiya College of Engineering, %idya&ihar, Mumai.
1
surajit.karmakar03051994@yahoo.in
2
poojamehta.20893@gmail.com
3
vaibhavishah93@gmail.com
4
hardik.somaiya101093@yahoo.in
Abstract In this paper, we look closely at the
BitTorrent P2P protocol. We extract problems that have
already been studied from the protocol and discuss
those problems. We propose a system for efficient
searchin which indexes torrents from multiple sources
so that the users can have access to a lare number of
torrents from a sinle source.
Keywords Peer!to!Peer, BitTorrent, "#$!%, hash,
database, cachin.
I$ I%T&'()*TI'%
'eer(to(peer net+orking, often referre! to as P2P,
is ,erha,s one of the most usefu- an! "et misun!erstoo!
techno-ogies emerging in recent "ears$ .hen ,eo,-e think
of P2P the" usua--" think of one thing/ sharing music 0-es,
often i--ega--"$ This is because 0-e1sharing a,,-ications
such as 2itTorrent have risen in ,o,u-arit" at a staggering
rate an! these a,,-ications use P2P techno-og" to +ork$
3-though P2P is use! in 0-e1sharing a,,-ications, that
!oesn4t mean it !oesn4t have other a,,-ications$ In!ee!, as
"ou see in this ,a,er, P2P can be use! for a vast arra" of
a,,-ications, an! is becoming more an! more im,ortant in
the interconnecte! +or-! in +hich +e -ive$ The t+o
,rotoco-s of P2P net+orks are/
1$ (irect *onnect Protoco-
2$ 2itTorrent ,rotoco-
(irect connect c-ients connect to a centra- hub an!
can !o+n-oa! fi-es !irect-" from one another$ Hubs feature
a -ist of c-ients or users connecte! to them$ )sers can
search for fi-es an! !o+n-oa! them from other c-ients, as
+e-- as chat +ith other users$ It is a te5t1base! com,uter
,rotoco-, in +hich comman!s an! their information are
sent in c-ear te5t$ 3s c-ients connect to a centra- source of
!istribution 6the hub7 of information, the hub is require! to
have a substantia- amount of u,-oa! ban!+i!th avai-ab-e$
The biggest !isa!vantage is that +hi-e !o+n-oa!ing from
,ub-ic hubs, a-though the receiver might have a
higher ban!+i!th connection the" +i-- be -imite! to a
-o+er ban!+i!th because of the -o+er ban!+i!th of the
sen!er -ea!ing to +aste of time an! ban!+i!th$ To share
an" fi-e the sen!er must be on-ine an! +hi-e in off-ine
,hase, transmission of fi-es in not ,ossib-e +ith (irect
*onnect 6(*7$
The 2itTorrent ,rotoco- is ,eer1to1,eer in nature,
its innovative a,,roach in the beginning, +as !ue to not be
centere! about the creation a rea- !istribute! net+ork but
aroun! the s,ecific share! resources, in this case fi-es,
,referab-" -arge fi-es, as users connect to each other
!irect-" to sen! an! receive ,ortions of a -arge fi-e from
other ,eers +ho have a-so !o+n-oa!e! either the fi-e or
,arts of the it$ These ,ieces are then reassemb-e! into the
fu-- fi-e$ 8ach !o+n-oa!er re,orts to a-- of its ,eers +hat
,ieces it has$ To verif" !ata integrit", the S)"1 hashes of
a-- the ,ieces are inc-u!e! in the $torrent 0-e, an! ,eers
!on4t re,ort that the" have a ,iece unti- the"4ve checke!
the hash$ Since the users are !o+n-oa!ing from each other
an! not from one centra- server, the ban!+i!th -oa! of
!o+n-oa!ing -arge fi-es is !ivi!e! bet+een the man"
sources that the user is !o+n-oa!ing from$ This !ecreases
the ban!+i!th cost for ,eo,-e hosting -arge fi-es, an!
increases the !o+n-oa! s,ee!s for the ,eo,-e !o+n-oa!ing
-arge fi-es, because the ,rotoco- makes use of the u,stream
ban!+i!th of ever" !o+n-oa!er to increase the
effectiveness of the !istribution as a +ho-e, an! to gain
a!vantage on the ,art of the !o+n-oa!er$ Ho+ever, there is
a centra- server 6ca--e! a trac*er7 +hich coor!inates the
action of a-- such ,eers$ The tracker on-" manages
connections, it !oes not have an" kno+-e!ge of the
contents of the fi-es being !istribute!, an! therefore a -arge
number of users can be su,,orte! +ith re-ative-" -imite!
tracker ban!+i!th$ 2" re!ucing !e,en!enc" on a
centra-i9e! tracker, 'E+ increases the s,ee!, efficienc",
an! robustness of the 2itTorrent ,rotoco-$
.ithin 2itTorrent, a torrent file is a com,uter fi-e that
contains meta!ata about the fi-es to be share! an! about
the tracker, the com,uter that coor!inates the fi-e
!istribution$ 3 seeder is a c-ient that has a com,-ete co,"
of the torrent an! sti-- offers it for u,-oa!$ The
more see!ers there are, the better the chances of getting a
higher !o+n-oa! s,ee!$ 3 do,nloader-leecher is an" ,eer
that !oes not have the entire fi-e an! is !o+n-oa!ing the
fi-e$ 2ram chose the term !o+n-oa!er over -eech because
2itTorrent:s tit1for1tat ensures !o+n-oa!ers a-so u,-oa! an!
thus !o not unfair-" qua-if" as -eeches$ .ith the a!o,tion
of D)T .Distriuted )ash Tales/ the 2itTorrent ,rotoco-
starts to become more that a semi1centra-i9e! !istribution
net+ork aroun! a sing-e resource, it becomes more
!ecentra-i9e! an! removes the static ,oint of contro-, the
tracker, this is !one b" re-"ing in (HTs an! the use of the
'E+ e5tension$ 8nab-ing the vo-ati-e Peer to o,erate a-so
as a tracker, but even if this a!!resse! the nee! for static
tracker servers, there is sti-- a centra-i9ation of the net+ork
aroun! the content$ Peers !on:t have an" !efau-t abi-it" to
contact each other outsi!e of that conte5t$
II$ *H3&3*T8&ISTI*S '; 2ITT'&&8%T
'ermanent D)T trac*ing0
.ith the P8< im,-ementation an! re-iance on the
!istribute! hash tab-e 6(HT7, the evo-ution into creating a
rea- P2P over-a" net+ork that is com,-ete-" server-ess +as
the ne5t -ogica- ste,$ The (HT +i-- take information not
on-" from o-! trackers but a-so from the P8<
im,-ementation, creating something -ike a !istribute!
(atabase of share! torrents acting as backu, tracker +hen
a-- other trackers are !o+n or can:t !e-iver enough ,eers, as
+e-- as enab-ing tracker-ess torrents$ The (HT acts an! is
a!!e! to torrents as a ,seu!o1tracker if the c-ient has the
o,tion enab-e! an! (HT trackers can be enab-e! an!
!isab-e! ,er torrent just -ike regu-ar trackers$ *-ients using
this ,ermanent (HT tracking are no+ a fu--" connecte!
!ecentra-i9e! P2P net+ork, the" enter the (HT as a ne+
no!e, this of course makes it necessar" for ,rivate trackers
6or non1,ub-ic !istributions7 to e5c-u!e themse-ves from
the ,artici,ating$
Magnet lin*s0
The &anet '(I scheme refers to resources
avai-ab-e for !o+n-oa! via ,eer1to1,eer net+orks$ Such a
-ink t",ica--" i!entifies a fi-e not b" -ocation, but b"
content more ,recise-", b" the content4s cr",togra,hic hash
va-ue$ 3-though it cou-! be use! for other a,,-ications, it is
,articu-ar-" usefu- in a ,eer1to1,eer conte5t, because it
a--o+s resources to be referre! to +ithout the nee! for a
continuous-" avai-ab-e host$ Tra!itiona--", $torrent fi-es are
!o+n-oa!e! from torrent sites$ 2ut severa- c-ients a-so
su,,ort the Magnet )&I scheme$ 3 magnet -ink can
,rovi!e not on-" the torrent hash nee!e! to seek the nee!e!
no!es sharing the fi-e in the (HT, but ma" inc-u!e a
tracker for the fi-e$
The attributes of 2itTorrent are .eb see!s, P8< ,
=-oba- an! -oca- connections, Tracker )&>, Piece hash
va-ues, Info hash, ;i-e -ength, Piece -ength, 2enco!e +here
1encode is the enco!ing use! b" the P2P fi-e
sharing s"stem 2itTorrent for storing an! transmitting
-oose-" structure! !ata$ It su,,orts four !ifferent t",es of
va-ues/ b"te strings, integers, -ists an! !ictionaries
6associative arra"s7$ 2enco!ing is most common-" use! in
torrent fi-es$ These meta!ata fi-es are sim,-" benco!e!
!ictionaries$
Message digest0
3 Message (igest is a !igita--" create! hash
6finger,rint7 create! from a ,-ainte5t b-ock$ 3-- the
information of the message is use! to construct the
Message (igest hash, but the message cannot be recovere!
from the hash$ ;or this reason, Message (igests are a-so
kno+n as one +a" hash functions$
S)"(10
SH311 is the most +i!e-" use! of the e5isting
SH3 hash functions, an! is em,-o"e! in severa- +i!e-"
use! a,,-ications an! ,rotoco-s$ SH311 ,ro!uces a 1?@1
bit message !igest$ SH311 an! SH312 are the secure hash
a-gorithms require! b" -a+ for use in certain )$S$
=overnment a,,-ications, inc-u!ing use +ithin other
cr",togra,hic a-gorithms an! ,rotoco-s, for the ,rotection
of sensitive unc-assifie! information$
Disad&antages0
The main !isa!vantage of the 2itTorrent net+ork
is that man" of the torrents are not accessib-e to the users
,artici,ating in the fi-e sharing ,rocess$ There is no sing-e
,-ace to have access to a-- the torrents in the s"stem$ The
+ebsites that host or cache the torrent fi-es have some
restriction or there is some inefficienc" to in!e5 a-- fi-es$
III$ P&'P'S8( SAST8M
The major !isa!vantage in the +ho-e 2itTorrent
s"stem is that there is no access to a-- of the torrents
avai-ab-e an! thus there is not much sharing among the
,eers$ 3-though there are some hamstersB bots that co--ect
the torrent information from a consi!erab-e number of
+ebsites +hich host the torrent fi-es, there is a -imitation to
this$ 3nother +a" is the use of torrent caching sites +hich
cache the torrent fi-es on their servers an! are accessib-e
on-" through their hash$ There e5ists man" torrent sites that
,rovi!e torrent cache, but one cannot search through them
unti- the" have the hash for the torrent the" +ant$ This
becomes ver" much inconvenient for a naive user to search
through these sites$ 'ne +a" is to ma, info hash va-ues of
each torrent +ith the name of the torrent b" ,arsing the
torrent fi-e$ The hash +ou-! be ma,,e! +ith the torrent
names a-ong +ith a set of )&>s an! magnet -inks from
+here the torrent fi-es can be !o+n-oa!e! an! store them
in a !atabase from +here the user +ou-! be ab-e to search
for torrents using the name of the torrent$ This can be
im,-emente! in c-ient soft+are +here it +i-- interact +ith
the !atabase on the server or a +eb base! search$
The ,re1requisite for such a s"stem +ou-! be a
strong !atabase ca,ab-e of han!-ing a -arge number of
recor!s at a given ,oint of time, higher ban!+i!th internet
connection 6,ossib-" the ban!+i!th of a server7, an! a -itt-e
bit kno+-e!ge of the 2itTorrent ,rotoco-$
The !atabase can first be ,o,u-ate! b" ma,,ing
the hash va-ue of the torrents an! their other ke" ,ro,erties
an! inserting these recor!s into the !atabase$ 3fter this
ste,, a search function nee!s to be im,-emente! that can
search the !atabase re-ate! to the ke"+or!s s,ecifie! b" the
user returning the -inks +here the torrent fi-e can be
!o+n-oa!e! b" the user$ If im,-ementing this s"stem as a
stan!a-one a,,-ication soft+are, the soft+are ma" acce,t a
search string from the user, quer" the !atabase on the
server an! return resu-ts that are re-ate! to the search string
s,ecifie! to the user$ If im,-ementing as a +eb base!
s"stem, the s"stem can acce,t a search string from the
c-ient an! return the resu-ts to the c-ient bro+ser$
Through this s"stem, the users are e5,ose! an!
ma!e accessib-e to a -arge number of torrents on the
net+ork through +hich the" can share more !ata an! it is
accessib-e to a -arge number of users in the 2itTorrent
net+ork$
"d&antages0
This ,ro,ose! s"stem +i-- a--o+ a user to access
an" torrent u,-oa!e! on a +ebsite not fami-iar +ith the
user, making its major a!vantage of accessing an" remote
torrent an! this +i-- create an efficient s"stem for the
require! search$
3-so, a torrent u,-oa!e! on mu-ti,-e sites +i-- be
sho+n as a sing-e resu-t in our ,ro,ose! s"stem, un-ike
other search engines, +hich ,rovi!e mu-ti,-e resu-ts for a
sing-e torrent$
IV$ *'%*>)SI'%
In this ,a,er, +e have c-ear-" ,resente! the terms
an! characteristics a-- of the 2itTorrent ,rotoco-$ The
!isa!vantages of the !irect connect ,rotoco- are covere! in
the 2itTorrent ,rotoco-, sti-- as ever" coin has t+o si!es,
the 2itTorrent ,rotoco- a-so must be having its
!isa!vantages$ 3s +e can see above in this ,a,er, our
,ro,ose! s"stem gives access to -arge number of torrents
that might not be accessib-e from fami-iar +ebsites, thus
a--o+ing an efficient torrent searching for ever"one
inc-u!ing the naive users too$
&8;8&8%*8S
C1D htt,/BB+++$bittorrent$orgBbe,sBbe,E@@@$htm-
C2D htt,/BB+iki$theor"$orgB2itTorrentS,ecificationF2enco
!ing
CD htt,/BBen$+iki,e!ia$orgB+ikiB=-ossar"EofE2itTorrent
Eterms
C#D htt,/BB+++$bittorrent$orgBbe,sBbe,E@@@$htm-
CGD htt,/BB+++$bittorrent$orgBbe,sBbe,E@@1H$htm-
C?D htt,/BBen$+iki,e!ia$orgB+ikiB*om,arisonEofE2itTorr
entEsites
CHD htt,/BB+++$cs$unibo$itBbabaog-uBcoursesBcas@#1
@GB,a,ersBbittorrent$,!f

You might also like