Multi-Client Multi-Instance Secured Distributed File Server
|
|
|
- Stuart Walters
- 9 years ago
- Views:
Transcription
1 Multi-Client Multi-Instance Secured Distributed File Server Arun Singh, Ajay K Sharma, Ashish Kumar Dr. B.R Ambedkar NIT Jalandhar, India ABSTRACT This paper describes a Distributed File Server, implemented in Java Sockets, based on TCP protocol. The server responds file request of multiple formats like txt, doc, pdf, jpeg, mp3, mp4, flv etc to multiple clients at a time. The requested server first checks the requested file, with it. If file search is not successful then it turns toward other servers connected to it. The Dedicated Server performs client authentication based on Ipaddress of connecting client and maintains list of files present with other servers connected with it. The clients at it end perform check on user requests, for better server performance. The system proposed is well tested in our laboratory with 0, 2, 4, and 8 clients connecting in distributed environment. Results of heap memory utilization and relative server utilization time in serving varying number of clients is drawn and analyzed. General Terms Distributed System and Computer Networks. Keywords Java Server, File Server, Java Socket, TCP Server. 1. INTRODUCTION TCP and UDP are two main networking protocols that can be employed in distributed applications. TCP guarantees that once a connection has been established between two parties, data sent from one side to another will be in proper order without any loss; this is because of acknowledgment and ordering of each data packet. While UDP does not guarantee this, because data is divided into data packets called datagram s, whose delivery is not acknowledged, also at other end ordering of datagram s is not performed [1]. In this paper we proposed and implemented Distributed Server using TCP protocol, called MMSDFS (MultiClient MultiInstance Secured Distributed File Server). The proposed system is used to transfer multi format files from server to client including text, document and pdf files etc, and the data loss in which could not be tolerated. Integrity of data received in TCP protocol is achieved at a cost efficiency and performance. 2. RELATED WORK Java Sockets, RMI (Remote Method Invocation) of Sun Microsystems or CORBA (Common Object Requests Broker Architecture) of OMG (Object Management Group), are well known used for distributed system development. RMI, one of the core Java APIs since version 1.1., is a way that Java programmers can write object-oriented programs in which objects on different computers can interact with each other. A client can call a remote object in a server, and the server can also be a client of other remote objects. CORBA is well suited for Distributed system working on different platforms with varying specifications and environment [2, 3]. But the implementation of RMI and CORBA are very complex and specialized task. Hence, Java Socket is better choice for easy implementation. A P2P network is a network of computers or nodes where there is a concept of equality that is anyone could act like a client if required a data and the one who serves act like a server, it is different from traditional client/server architecture where only dedicated system could act like a server and requesting computers would acts like client to it. If one of the client have the data required by other client, in any case it could not serve him, this become a major drawback in traditional client/server architecture. Since all the nodes are equal in a P2P network, there is no requirement of dedicated server, as each node can act like both client/server and free to add or leave the network any time, without disturbing others peers. The P2P network architecture is mainly grouped into two categories: centralized systems (Napster, BitTorrent etc.) and decentralized systems (Gnutella, FreeNet etc.)[4]. It is found that P2P file sharing accounts for much more traffic than any other application on the Internet, since transport of data take place on Internet hence unsecure without encryption and vulnerable for Intruders attack [5]. 3. DESIGN AND IMPLEMENTATION OF MMSDFS Distributed client/server architecture, with single server connected to other servers listed in its connecting data file, by default it s three. Figure 1 shows the architecture view of MMSDFS. The server composed of functionality of creating multiple instances for each client, as public class ts implements Runnable Socket S; ts(socket S) this.s=s; public static void main(string aa[]) ServerSocket SS = new ServerSocket(8000); While(true) Socket S1 = SS.accept(); new Thread(new ts(s1)).start();... After accepting the client connection [6], the server accesses the client Ipaddress and checks it with the list of authenticated clients with it. If the client Ipaddress present in its list then it allows authenticated client to access the data file otherwise close the connection at the same time without any transfer. The required code is as 25
2 DataInputStream dis0=new DataInputStream (new FileInputStream ("auth.txt")); //S1 Socket Object while((str0=dis0.readline())!=null) if(str0.equals((s1.getinetaddress()).tostring())) new Thread(new ts(s1)).start(); flag0=true; break; if(!flag0) S1.close(); //Close connection for unauthorized user Figure 1. The Architecture view of MMSDFS The server Administrator is provided the functionality of looking the file present at server repository as DataOutputStream dos0=new DataOutputStream(new FileOutputStream("d:\\filename.txt")); File folder=new File("d:\\shared"); /* shared folder content is shared in distributed environment*/ File[] lof=folder.listfiles(); for(int i=0;i<lof.length;i++) if(lof[i].isfile()) System.out.println("File : "+lof[i].getname()); dos0.writebytes((lof[i].getname())+"\r\n"); dos0.close(); Each server along with maintaining list of clients, who can connect with it, maintains list of files present with its adjacent servers. This list of files got updated each time server in the neighborhood got startup. If the file requested by client is not present with the dedicated server then instead of connecting to all other servers in neighborhood, the dedicated server looks for file name in its file list. If file is not present with adjacent servers also then client will be responded with message no. If file is founded with any of the adjacent server, the dedicated server sends file request to it and copy file on it, for future use and send copy of file to client [7, 8]. The waiting distributed servers looks like as in Figure 2. The server connecting to other servers is handled by Java sockets [9] as, DataInputStream DataInputStream(S.getInputStream()); dis=new DataOutputStream dos = new DataOutputStream(S.getOutputStream()); boolean flag=false; name=dis.readutf(); File folder=new File("d:\\b"); File[] lof=folder.listfiles(); for(int i=0;i<lof.length;i++) if(lof[i].isfile()) if(name.equals(lof[i].getname())) filename=name; dos.writeutf(filename); flag=true; break; if(flag==false) Socket S1 =new Socket(" ",8001); DataOutputStream dos1=new DataOutputStream(S1.getOutputStream()); dos1.writeutf(name); DataInputStream dis1 = new DataInputStream(S1.getInputStream()); filename=dis1.readutf(); if((name.equals(filename))) boolean b=false; Figure 2. The Distributed Servers in Waiting State The client is provided with the functionality of authenticating user input at its end, by checking the connecting server Ipaddress at specified port. The client filter is shown in Figure 3. The client is dynamically connected to default server [9], if required Ipaddress and port are not correct or does not exist. At a time client could connect to only one server, but fetch data from multiple servers, as shown in Figure 4. Each intermediatory server will make a copy of requested data with 26
3 it, as shown in Figure 5. There is an additional functionality of requesting file efficiently, by categorizing the request on the basis of type of file required by user. This categorization is much more efficient for video files and support multiple video formats, the code for such categorized file transfer is given below Client code for requesting txt, doc, pdf, jpeg, mp3 etc. is as, BufferedOutputStream bos = new BufferedOutputStream(fos); try num_bytes_read = in.read(buf,0,buf.length); current=num_bytes_read; do num_bytes_read = in.read(buf, current,(buf.length - current)); if(num_bytes_read>=0)current += num_bytes_read; while(num_bytes_read>-1); bos.write(buf, 0,current); bos.flush(); bos.close(); Figure 4. The Client Instance in Requesting State catch (IOException e) e.printstacktrace(); Client code for requesting video file such as mp4, flv etc. is as, BufferedOutputStream bos = new BufferedOutputStream(fos); try num_bytes_read=64; do num_bytes_read=in.read(buf,current,num_bytes_read); bos.write(buf, current, num_bytes_read); current=current + num_bytes_read; while(num_bytes_read!=0); bos.flush(); bos.close(); catch (IOException e) e.printstacktrace(); Figure 3. The Client filtering process Figure 5. Client Request manipulation in MMSDFS 4. PERFORMANCE EVALUATION The implemented server is tested on Systems with Intel(R) Pentium Processor(R) D CPU 2.80 GHz 2.79 GHz, 1.25 GB Ram, Windows 7 (32 bit) Operating System. The distributed servers composed of multiple files in multiple formats meant for sharing over network. Each server composed of dedicated folder which is shared between all servers. Each server is provided with permission of only reading a file from other server. The data files used for testing is mentioned in Table1. Table 1. The Server Repository File Extension File size Txt 822 Bytes Java 1.99 KB Docx 13.0 KB PDF 52.0 KB HTM 19.4 KB MP MB MP MB FLV 39.6 MB Server is tested for 0, 2, 4, and 8 numbers of clients, with multiple requests in mixed format. The Heap memory utilized by CPU running the dedicated server for responding to different number of clients for different period of time is shown in Figure 6, 7, 8 and 9. 27
4 The figure 6, 7, 8 and 9 shows that for mixed format file transfer, the heap memory utilization does not exceed 4M in any case and after the file transfer the memory consumption becomes almost constant. The figure 10, 11, 12 and 13 specially shows the interaction time of clients with the server for file transfer that is serving time versus time utilized for garbage collection. Figure 6. Server Connected to 0 Clients Figure 10. Server Connected to 0 Clients Figure 7. Server Connected to 2 Clients Figure 11. Server Connected to 2 Clients Figure 8. Server Connected to 4 Clients Figure 12. Server Connected to 4 Clients Figure 9. Server Connected to 8 Clients 28
5 Figure 13. Server Connected to 8 Clients 5. CONCLUSION AND FUTURE WORK This article puts forward a kind of MultiClient MultiInstance Distributed Java Socket Server, design and implemented for limited number of users. The client/server system proposed is effectively deployed in our laboratory, with three distributed servers connecting with each other only at a time of file transfer. The system is tested for selected multimedia files, so Heap Memory utilization does not go beyond 4M but Server Utilization time decreases with increase in number of clients, due to type of request made by client and response is given by single server or multiple servers. Transfer of data is implemented for authenticated users identified by server administrator prior to connection with the server in personal network so system is well secured but static. The work is going on to increase server performance by distributing file request filtration at client level and increasing data security during transmission. 6. REFERENCES [1] Eitan Farchi, Yoel Krasny, Yarden Nir, Automatic Simulation of Network Problems in UDP-Based Java Programs, proceedings of the 18 th International Parallel and Distributed Processing Symposium, 2004 IEEE. [2] Delin Hou and Huosong Xia, Design of Distributed Architecture based on Java Remote Method Invocation Technology, pp. 618, 2009 International Conference on Environmental Science and Information Application Technology (IEEE Computer Society 2009). [3] V.Getov, G. von Laszewski, M. Philippsen, I. Foster, Multi-paradigm Communications in Java for Grid Computing, Communications of the ACM, Vol. 44, No. 10, pp , [4] Amol Vasudeva, Sandeepan, Nitin Kumar, PASE: P2P Network Based Academic Search and File Sharing Application, First International Conference on Computational Intelligence, Communication Systems and Networks in [5] Yao-Nan Lien and Hong-Qi Xu, A UDP Based Protocol for Distributed P2P File Sharing, Eight International Symposium on Autonomous Decentralized System in [6] Ming Xue and Changiun Zhu, The Socket Programming and Software Design for Communication Based on Client/Server, Pacific-Asia Conference on Circuits, Communications and System in [7] What is peer-to-peer? Peer-to-Peer working group [8] J2SE API Specification, available at [9] Java Socket Tutorial, available at Sockets.html. 29
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Java Network. Slides prepared by : Farzana Rahman
Java Network Programming 1 Important Java Packages java.net java.io java.rmi java.security java.lang TCP/IP networking I/O streams & utilities Remote Method Invocation Security policies Threading classes
Network/Socket Programming in Java. Rajkumar Buyya
Network/Socket Programming in Java Rajkumar Buyya Elements of C-S Computing a client, a server, and network Client Request Result Network Server Client machine Server machine java.net Used to manage: URL
Application Development with TCP/IP. Brian S. Mitchell Drexel University
Application Development with TCP/IP Brian S. Mitchell Drexel University Agenda TCP/IP Application Development Environment Client/Server Computing with TCP/IP Sockets Port Numbers The TCP/IP Application
Agenda. Network Programming and Java Sockets. Introduction. Internet Applications Serving Local and Remote Users
Programming and Rajkumar Buyya Grid Computing and Distributed Systems (GRIDS) Laboratory Dept. of Computer Science and Software Engineering University of Melbourne, Australia http://www.cs.mu.oz.au/~raj
Intranet, Extranet, Firewall
Indian Institute of Technology Kharagpur Intranet, Extranet, Firewall Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 31: Intranet, Extranet, Firewall On completion,
Java Network Programming. The java.net package contains the Socket class. This class speaks TCP (connection-oriented protocol).
Java Network Programming The java.net package contains the Socket class. This class speaks TCP (connection-oriented protocol). The DatagramSocket class uses UDP (connectionless protocol). The java.net.socket
ReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
Transport layer protocols. Message destination: Socket +Port. Asynchronous vs. Synchronous. Operations of Request-Reply. Sockets
Transport layer protocols Interprocess communication Synchronous and asynchronous comm. Message destination Reliability Ordering Client Server Lecture 15: Operating Systems and Networks Behzad Bordbar
Proposal of Dynamic Load Balancing Algorithm in Grid System
www.ijcsi.org 186 Proposal of Dynamic Load Balancing Algorithm in Grid System Sherihan Abu Elenin Faculty of Computers and Information Mansoura University, Egypt Abstract This paper proposed dynamic load
Socket Programming. Announcement. Lectures moved to
Announcement Lectures moved to 150 GSPP, public policy building, right opposite Cory Hall on Hearst. Effective Jan 31 i.e. next Tuesday Socket Programming Nikhil Shetty GSI, EECS122 Spring 2006 1 Outline
Socket programming. Complement for the programming assignment INFO-0010
Socket programming Complement for the programming assignment INFO-0010 Outline Socket definition Briefing on the Socket API A simple example in Java Multi-threading and Synchronization HTTP protocol Debugging
An Android-based Instant Message Application
An Android-based Instant Message Application Qi Lai, Mao Zheng and Tom Gendreau Department of Computer Science University of Wisconsin - La Crosse La Crosse, WI 54601 [email protected] Abstract One of the
Encryption and Decryption for Secure Communication
Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
Virtual machine interface. Operating system. Physical machine interface
Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that
Design and Implementation of an Intelligent Network Monitoring and Management Tool in Internet and Intranet
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 5, Number 2 (2012), pp. 83-89 International Research Publication House http://www.irphouse.com Design and Implementation
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
Distributed Systems. Distributed Systems
Distributed Systems Prof. Steve Wilbur Department of Computer Science University College London 1 Distributed Systems... use of more than one computer connected by communications links to carry out a computational
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
Skype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
Implementing Java Distributed Objects with JDBC
Implementing Java Distributed Objects with JDBC Pritisha 1, Aashima Arya 2 1,2 Department of Computer Science Bhagwan Mahaveer institute of engineering & technology (BMIET), Deenbandhu Chhotu Ram University
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
Distributed Systems. 2. Application Layer
Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social
Receptionist-Small Business Administrator guide
Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,
Detailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Socket-based Network Communication in J2SE and J2ME
Socket-based Network Communication in J2SE and J2ME 1 C/C++ BSD Sockets in POSIX POSIX functions allow to access network connection in the same way as regular files: There are special functions for opening
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC
High-Speed Thin Client Technology for Mobile Environment: Mobile RVEC Masahiro Matsuda Kazuki Matsui Yuichi Sato Hiroaki Kameyama Thin client systems on smart devices have been attracting interest from
NETWORK PROGRAMMING IN JAVA USING SOCKETS
NETWORK PROGRAMMING IN JAVA USING SOCKETS Prerna Malik, Poonam Rawat Student, Dronacharya College of Engineering, Gurgaon, India Abstract- Network programming refers to writing programs that could be processed
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Network Communication
Network Communication Outline Sockets Datagrams TCP/IP Client-Server model OSI Model Sockets Endpoint for bidirectional communication between two machines. To connect with each other, each of the client
Report of the case study in Sistemi Distribuiti A simple Java RMI application
Report of the case study in Sistemi Distribuiti A simple Java RMI application Academic year 2012/13 Vessio Gennaro Marzulli Giovanni Abstract In the ambit of distributed systems a key-role is played by
A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA
A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA Christos Bohoris, George Pavlou, Antonio Liotta Centre for Communication Systems Research, School of Electronics, Computing
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Enterprise Java. Where, How, When (and When Not) to Apply Java in Client/Server Business Environments. Jeffrey Savit Sean Wilcox Bhuvana Jayaraman
Enterprise Java Where, How, When (and When Not) to Apply Java in Client/Server Business Environments Jeffrey Savit Sean Wilcox Bhuvana Jayaraman McGraw-Hill j New York San Francisco Washington, D.C. Auckland
String sentence = new String(receivePacket.getData()); InetAddress IPAddress = receivepacket.getaddress(); int port = receivepacket.
164 CHAPTER 2 APPLICATION LAYER connection requests, as done in TCPServer.java. If multiple clients access this application, they will all send their packets into this single door, serversocket. String
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
Classic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
Network Applications
Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing
Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
Computer Networks. Examples of network applica3ons. Applica3on Layer
Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice
Distributed Systems Lecture 1 1
Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg [email protected]. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
Design and Implementation of Client Server Network Management System for Ethernet LAN
Design and Implementation of Client Server Network Management System for Ethernet LAN Ms. MAY PAING PAING ZAW and Ms. SU MYAT MARLAR SOE Abstract Network Management Systems have played a great important
The Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
Interoperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Firewall and VPN Investigation on Cloud Computing Performance
Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation
A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network
A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania [email protected]
Design Issues in a Bare PC Web Server
Design Issues in a Bare PC Web Server Long He, Ramesh K. Karne, Alexander L. Wijesinha, Sandeep Girumala, and Gholam H. Khaksari Department of Computer & Information Sciences, Towson University, 78 York
Communicating with a Barco projector over network. Technical note
Communicating with a Barco projector over network Technical note MED20080612/00 12/06/2008 Barco nv Media & Entertainment Division Noordlaan 5, B-8520 Kuurne Phone: +32 56.36.89.70 Fax: +32 56.36.883.86
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Chapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications
Chapter 6. CORBA-based Architecture 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications 1 Chapter 6. CORBA-based Architecture Part 6.1 Introduction to
Creating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
Principles of Network Applications. Dr. Philip Cannata
Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).
A Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. [email protected] Ms. Smita Dange Lecturer,
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
CQG Trader Technical Specifications. December 1, 2014 Version 2014-05
CQG Trader Technical Specifications December 1, 2014 Version 2014-05 Copyright 2014 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows Vista, Windows,
Division of Informatics, University of Edinburgh
CS1Bh Lecture Note 20 Client/server computing A modern computing environment consists of not just one computer, but several. When designing such an arrangement of computers it might at first seem that
Requirements. System Requirements. System Requirements, page 1 Port Requirements, page 4 Supported Codecs, page 5
System, page 1 Port, page 4 Supported Codecs, page 5 System Each of the components listed in the following table must meet the requirements. Use of unsupported components can result in a nonfunctional
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
Receptionist Small Business
Receptionist Small Business Administrator Guide Revision 1.0 GCI Ltd Global House 2 Crofton Close Lincoln Lincolnshire LN3 4NT www.gcicom.net Copyright GCI 2012 GCI Receptionist Small Business - Administrator
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
System Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
An Efficient Hybrid P2P MMOG Cloud Architecture for Dynamic Load Management. Ginhung Wang, Kuochen Wang
1 An Efficient Hybrid MMOG Cloud Architecture for Dynamic Load Management Ginhung Wang, Kuochen Wang Abstract- In recent years, massively multiplayer online games (MMOGs) become more and more popular.
Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming
Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment
Performance Comparison of SCTP and TCP over Linux Platform
Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
Towards a Peer-to-Peer Extended Content Delivery Network
Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
