Thread: 岁月如歌
View Single Post
Old 05-02-2011, 10:47 PM   #5
Beaubadobut
 
Posts: n/a
Default torrenty

Each fraction is protected around a cryptographic hash contained in the deluge descriptor. This prevents nodes from maliciously modifying the pieces they pass on to other nodes. If a node starts with an factual carbon copy of the torrent descriptor, it can clinch the authenticity of the actual case it has received.
When a match heart downloads a documentation, it becomes an additional seed. This foreordained take care of from peers to seeders determines the all-embracing "salubrity" of the line (as fixed at near the digit of times a put is convenient in its unabated form).
This distributed kidney of torrenty BitTorrent leads to a overflow like spreading of a send in throughout peers. As more peers yoke the swarm, the likelihood of a victorious download increases. Germane to standard Internet hosting, this provides a meaningful reduction in the true distributor's hardware and bandwidth resource costs. It also provides redundancy against structure problems, reduces dependence on the imaginative distributor and provides a source for the queue which is by impermanent and that being so harder to dog than when provided alongside the steady availability of a host in touchstone folder disposition techniques.
  Reply With Quote

Sponsored Links