In today's computing world when peer to peer content distribution is at an all time high, the significant role played by Bit torrent protocol can't be overlooked. The introduction of this protocol revolutionized the way people downloaded different types of content and the speed at which they downloaded it. In this paper we have explained the three most important algorithms or strategies used by bit torrent protocol to achieve efficiency and fairness. We have listed the step by step execution of the three algorithms with tabular example for better analysis. We have also prepared pseudocode for implementing these algorithms.
Choking, Leecher, Pseudo code, Random first, Rarest first, Seeder, Torrent, Trackers