Sie sind auf Seite 1von 4

Torrents…..

Revolutionised Apportion
CHAPTER 5

TRACKERS

5.1 WHAT IS TRACKER?

A bittorrent tracker is a server that assists in the communication


between peers using the BitTorrent protocol. It is also, in the absence of extensions to the
original protocol, the only major critical point, as clients are required to communicate
with the tracker to initiate downloads. Clients that have already begun downloading also
communicate with the tracker periodically to negotiate with newer peers and provide
statistics; however, after the initial reception of peer data, peer communication can
continue without a tracker.A tracker should be differentiated from a BitTorrent index by
the fact that it does not necessarily list files that are being tracked. A BitTorrent index is a
list of .torrent files, usually including descriptions and other information. Trackers merely
coordinate communication between peers attempting to download the payload of the
torrents.Many BitTorrent websites act as both tracker and index. Sites such as these
publicize the tracker's URL and allow users to upload torrents to the index with the
tracker's URL embedded in them, providing all the features necessary to initiate a
download.

FIG 5.1 ROLE OF TRACKER

5.2 OPEN TRACKERS

Department of Computer Engg 14


AVCOE,Sangamner
Torrents…..Revolutionised Apportion
CHAPTER 5

Open trackers can be used by anyone by adding the tracker address to an existing
torrent, or they can be used by any newly created torrent.

Some of the most popular open trackers include OpenBitTorrent,The HiddenTracker,etc

5.3 PRIVATE TRACKERS

A private tracker is a BitTorrent tracker that restricts use, by requiring users to


register with the site. The method for controlling registration used amongst almost all
private trackers is an invitation system, in which active and contributing members are
given the ability to grant a new user permission to register at the site. Invitations,
typically sent via email or an invite code system, are normally granted to active users
who have uploaded a pre-determined amount or meet specific upload-to-download ratio
requirements. Trading invites for different sites is highly frowned upon in the private
BitTorrent community as it allows anti-piracy groups to infiltrate private trackers more
easily. Most private trackers monitor how much users upload or download, and in most
situations, enforce a minimum upload-to-download ratio.

Some of the allure of private tracker versus a public one are: higher speeds, a
tighter community, and safer downloads. Private trackers implement a strict set of rules,
so generally files containing malware are extremely uncommon. Many private trackers
keep in close contact with each other, so bad users (who trade invites or attempt to fake
their ratio) can be quickly blacklisted. Almost all private trackers implement a passkey
system, where each user is given a personalized announce URL so if there is
unauthorized distribution, it can be pinpointed to the user responsible. Some private
trackers have a higher level of security than others - many sites, such as, the late ScT,
only allow their users to refer to their site as an abbreviation, and never as the site's full
name or URL. Other trackers restrict invites to outstanding members, and many trackers,
to increase security, have gotten rid of the invite system altogether. An example of a
private tracker is pink, which was forcibly shut down in late 2007 by law enforcement
officials.

The downside is that some private trackers are little more than pyramid schemes
inviting donations to enable users to bypass the upload-to-download ratio. In a closed
community it can be mathematically impossible for all members to maintain the required
ratio. Competitions may be offered, with prizes of improved ratios, and forums may
suggest other complicated means of doing this. In the pyramid schemes, 'donations' turn

Department of Computer Engg 14


AVCOE,Sangamner
Torrents…..Revolutionised Apportion
CHAPTER 5

out to be the only way to continue downloading. Downloads can then be quite expensive.
On the other hand, if they are unobtainable elsewhere, they may be good value for
money. Some trackers use "free leech" systems to improve the users ratio. When
downloading a free leech torrent only the upload gets logged in, the download is ignored.
Usually popular (healthy) and large torrents are offered as free leech. Seeding to a ratio of
at least 1 is still recommended even for free leech torrents.

5.4 IMPROVING TORRENT RELIABILITY

Trackers are the primary reason for a damaged BitTorrent 'swarm'. (Other reasons
are mostly related damage or hacked clients uploading corrupt data.) The reliability of
trackers has been improved through two main innovations in the BitTorrent protocol.

Multi-tracker torrents

Multi-tracker torrents feature multiple trackers in a single torrent file. This provides
redundancy in the case that one tracker fails, the other trackers can continue to maintain
the swarm for the torrent. One disadvantage to this that it becomes possible to have
multiple unconnected swarms for a single torrent where some users can connect to one
specific tracker while being unable to connect to another. This can create a disjoint set
which can impede the efficiency of a torrent to transfer the files it describes.

Trackerless torrents
The original BitTorrent client was the first to offer decentralized,distributed tracking
using a distributed hash table (DHT), making torrents more independent from the tracker.
Later, Vuze, rTorrent, µTorrent, BitComet and KTorrent adopted this feature. Vuze's
"Distributed Database" feature uses its own form of DHT (Kademlia) which is
incompatible with the official BitTorrent client's implementation; however, support for
the official implementation can be added through the Mainline DHT plugin. Most other
clients support the official DHT implementation.

5.5 DISTRIBUTED HASH TABLE(DHT)

Department of Computer Engg 15


AVCOE,Sangamner
Torrents…..Revolutionised Apportion
CHAPTER 5

Distributed hash tables (DHTs) are a class of decentralized distributed


systems that provide a lookup service similar to a hash table: (key, value) pairs are stored
in the DHT, and any participating node can efficiently retrieve the value associated with a
given key. Responsibility for maintaining the mapping from keys to values is distributed
among the nodes, in such a way that a change in the set of participants causes a minimal
amount of disruption. This allows DHTs to scale to extremely large numbers of nodes
and to handle continual node arrivals, departures, and failures.

DHTs form an infrastructure that can be used to build more complex services, such
as distributed file systems, peer-to-peer file sharing and content distribution systems,co-
operative caching, multicast, anycast, domain name services, and instant messaging.
Notable distributed networks that use DHTs include BitTorrent's distributed tracker,
the Kad network, the Storm botnet, YaCy, and the Coral Content Distribution Network.

DHTs characteristically emphasize the following properties:

 Decentralization: the nodes collectively form the system without any central
coordination.
 Scalability: the system should function efficiently even with thousands or millions of
nodes.
 Fault tolerance: the system should be reliable (in some sense) even with nodes
continuously joining, leaving, and failing

Department of Computer Engg 15


AVCOE,Sangamner

Das könnte Ihnen auch gefallen