Peer discovery is an essential part of the BitTorrent protocol. It’s how its downloads happen so quickly: You connect to multiple people, and each of them upload a little piece of the file to you. This phenomenon has created a very popular way to download and share information on the internet, both legitimate and illegitimate. Regardless of the effects it has had on intellectual property, I’m here to describe one thing: How the whole BitTorrent DHT peer discovery process really works. You may know a little bit (or a lot) about this mechanism, but surely enough you’re curious to know what the term DHT means and how the peers listed under it found you in the first place.

What Does DHT Mean?

DHT is short for “distributed hash table,” and it represents a medium by which you find peers, also known as “bootstrapping.” I’ll explain that in a bit. Just keep in mind the fact that you can find peers through the DHT.

 BitTorrent DHT location

While many people say it’s decentralized, it’s actually very difficult to do this, given the unicast nature of the Internet. When you connect to the web, you don’t announce your presence to the billions of computers already connected. This would just waste enormous amounts of bandwidth. Instead, your local internet service provider’s router, as well as the destinations you connect to, are the only ones aware you’re even online. That’s what “unicast” means, in layman’s terms. Multicast is what happens when your computer gets into a local network. Its presence is made known to every other computer in the same subnet, and they’re now aware of your presence. Since this doesn’t happen in the external Internet, there’s really no way to actually compose a completely decentralized structure, given the limitations of the BitTorrent protocol itself.

As a result, there tends to be two main DHTs that you connect to when you start downloading a torrent file: router.bittorrent.com and router.utorrent.com. In case you’re curious, you connect to them on port 6881. It’s not absolutely necessary to memorize this information. Sometimes peer data is embedded in the torrent file to make the process of finding peers easier.

Bootstrapping

bitdht-discovery

To start gathering peers, one must first bootstrap into the torrent network. Bootstrapping is just a fancy way of describing the process of connecting to the DHT and finding peers. Once connected, the DHT server will send out a handful of peer IP addresses that you’ll also connect to. They’ll give you the addresses of peers connected to them, and so on, and so forth, until your peer list shows all the peers downloading (or seeding) the file you’re trying to get. It’s like following a tree from the roots to the branches.

Theoretically speaking, you only really need one single peer address to get all the other peers, since it will share the rest of the addresses with you. This saves trackers and the DHT a ton of bandwidth which would otherwise be wasted in sending lists of peers to every new peer connected and notifying each person when one of them disconnects. The hassle is minimized by making peers relay information to each other.

After you’ve found all your peers, your download begins!

If DHTs Are Out There, Why Do Most People Still Use Trackers?

DHT can be fun, but most people still use trackers to download their data. This is because of the inherent nature of the DHT. Let’s say I have a site where I upload a bunch of my open-source creations as torrents. To fully control what happens to those torrents, and protect the privacy of the individuals downloading them, it’s more lucrative for me to host my own tracker. Sites that post illicit downloading material use trackers as their medium of preference to maintain an underground aspect and control what gets published on them and what gets removed.

That said, not all torrent downloads are illegal. There’s a massive repository of open-source projects and public domain works by individuals who just want to share what they have without wasting the bandwidth of their web hosts.

Confused?

If you’re still puzzled by the information shared here, leave a comment below and we can discuss!

Image credit: DHT en.svg

How to Add Links to Your WordPress Widget Titles

Do you use numerous widgets on your WordPress blog? Have you ever wished that you could add WordPress Widget Titles? If so, you’re in luck thanks to a WordPress plugin called Widget Title Links.

Turn Multi-Page Articles Into a Continuously Scrolling Single Page

Have you ever clicked on an article that was broken up into numerous pages? Those multi-page articles can be really annoying and time-consuming. If you’re tired of clicking “next” over and over again, here’s how to turn those multi-page articles into a single page.

Analyze Writing Errors with SlickWrite for Firefox and Chrome

Most spelling and grammar checkers in word processors spot obvious writing errors, but not the less obvious ones. Slick Write is a web service that analyzes writing errors as well as performs the usual spelling and grammar check.

Edit Google Drive Videos Inside Chrome With WeVideo

What if you left your laptop at home and there is an urgent need to edit a video that you saved in Google Drive? Thankfully you can make use of WeVideo to edit the video directly in Google Drive.

Get a Better Extension Manager In Chrome With SimpleExtManager

The extension manager in Chrome has always given users the bare minimum to work with when dealing with extensions, themes and apps. The SimpleExtManager for Chrome gives users the functionality they deserve.

Secure Your Yahoo Account With Second Sign-in and App Password

Yahoo has added a feature called Second Sign-in that allows you to secure Yahoo account with two factor authentication. Here’s how you can enable it.

Quickly Access Your History in Mobile Firefox For Android

If you are using mobile Firefox in your Android devices, here is one neat trick that you can use to quickly access your browsing history.

Understanding the Various Copyright Licenses

Copyright licenses are complicated. If you want to distribute your work, you will want to find out more about copyright licenses and which one you should use.

How To Play Flappy Bird on Any Phone, Tablet or Computer

Flappy Bird is no longer around in the App store, but if you just want your old game back, there’s also a HTML5-based clone edition of Flappy Bird.

Import Email From Other Services to Outlook.com Using IMAP

With Outlook.com, it seems that Microsoft has hit the jackpot with an email service that competes with Gmail. Read on to find how to import IMAP messages.

Reader vs iReader: The Battle of the Readability Extensions

Reader and iReader for Firefox are two great extensions to implement a “Reader mode” in Firefox, but which is better? Let’s find out.

Can People Really Spy on Your Webcam?

There were news that the FBI was able to spy on people’s webcams without them knowing. How is this possible? Let find out how this hack was done.