m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones"

Transcription

1 m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones Nitesh Kumar Rohit V. Gugale Jatin J. Kakani Rahul G. Dalal Abstract: Since the advent of internet, data sharing has got its own importance. Today most of the organizations and college campuses have private wireless networks for internet access. However, apart from using them merely for accessing the internet, it will be great if we can use them for sharing the data within that network. Also in today s world many people have wifi enabled mobile phones with lots of storage capacity which are active 24x7. For most of the time, these devices are in idle state. But we can use them for other purposes. It will be great if we use our mobile phones to share files within a wireless network without any need of internet access. Our idea is to create a wireless peer-to-peer bit torrent-like file sharing system which will allow users to search and download interested data from other users while they are within the range of the wireless network. Colleges can deploy this system within their campus so that all the students in the campus can share their files while they are in campus. Also organization can use this system in their buildings so that all employees can share their data. Keywords- BitTorrent, mobile torrent, wifi enabled mobile phones, wireless LAN, wireless access point, J2ME I. INTRODUCTION When mobile phones first came into picture, analog signal was used and no data service was supported. After we entered the era of digital signal, GSM emerged but it only supports several simple data services, e.g. Short Message Service (SMS). Although the 2.5G technology General Packet Radio Switch (GPRS) greatly improves the data rate, it is still not enough. 3G is an excellent service for future wireless communication world. Providing an average data rate of 384Kb/s and help of other relevant protocols, 3G mobile phones can literally support any data services that have been implemented in the Internet. We know that data sharing has always got its own importance. Gradually data sharing over the internet came into picture. It enabled people to share their data or files with people whom they know. P2P proved to be very useful. With the advent of internet, file sharing gained a lot of importance. However, prior to the discovery of Bit Torrent, users used to share the data only with those whom they knew. Bit Torrent made it possible for unfamiliar users to share data with each other. In this paper, a system for sharing the data between two unfamiliar users in a wireless network is discussed. II. BACKGROUND Our work is greatly based on two technologies: Peer-to- Peer network and a prototype of BitTorrent Protocol. In this section, we explain the general background of these technologies. A. Peer-to-Peer network [2] P2P network architecture has changed the traditional network built on Client-Server model. When several computers are interconnected, but no computer occupies a privileged position, the network is usually referred to as a peer-to-peer network. In this type of network, every computer can communicate with all the other machines on the network, but in general each one stores its own files and runs its own applications. With a client-server network, one or more servers will perform critical functions on behalf of the other machines (the clients) on the network. These functions consist of user authentication, data storage, and the running of large, shared, resource-intensive applications. Typically, both peerto-peer and client-server networks rely on a shared Internet connection for access to external resources of these basic network structures. 167

2 There are three major types of P2P network architecture. The first type is centralized topology which needs a central server for peers and resource discovery. The second one is decentralized unstructured topology which is also called pure P2P. It does not involve any central server and every node has equal functionality. The last one is decentralized structured topology, which is also called hybrid P2P. It is a mixture the first and the second type, where there exist several super-peers for peer and resource discovery. B. A prototype of BitTorrent Protocol [3] Complete BitTorrent file distribution system consists of following entities [1] : A static metadata file (torrent file) consisting of the content to be shared A web server for publishing torrent files (or published by other means) A BitTorrent tracker An original peer publishing content which may move out of the network if the whole content is available among other peers in the system Web browser for finding torrent files A downloader application to handle torrent files and operate in the BitTorrent network. C. Full Text Search Mechanism In present days searching is a very common operation which performed on databases. While performing search by SQL queries based on select statements with where clause it is okay for small databases but a large database may cause slow result. A WHERE LIKE clause is not efficient in such cases. For example if you consider a search engine like Google it is a poor idea to use where like clause to perform search based on text. Two basic problems are: first, slow processing and second, less accurate result set. Both of the above disadvantages has been overcome by the introduction of full text search, which compare strings instead of character sequence and provide best accuracy. Also creation of full text index solves the problem of speed of operation. The clause MATCH()..AGAINST() of MySQL enables us to compare a sentence against multiple columns of a table at once. Full-text indexes can be used only with MyISAM tables, and can be created only for CHAR, VARCHAR, or TEXT columns. Full text search can be performed in any of three modes: Natural Language Mode Boolean Mode Query Expansion Mode 1. Working: The originating user (the seed) makes available one copy of the file, which is then split up into chunks. Different chunks are sent out to the various computers (BitTorrent clients) trying to get hold of a copy of the file. Figure 1: Download Protocol Each client uploads their part of the file to other clients while simultaneously downloading bits of the file they don't have from other clients. All the clients work together as a swarm to share the file. The file-sharing process doesn't happen in the systematic, sequential way. Clients upload and download simultaneously and the file actually builds up in a more random way. There are often hundreds of clients involved in each swarm. Eventually, every client receives a complete copy of the file. Thus the data can be shared to a large no. of users with a minimum overhead on original seeder. Following points lists the features of BitTorrent: Multisource downloading i.e. simultaneous downloading from multiple sources Simultaneously uploading and downloading the content A tit-for-tat policy provides very efficient spreading of the content Integrity checks which are done at the piece level One corrupted piece does not ruin the complete download process. III. MOTIVATION As of today, very less work has been done for file sharing using mobile over the wireless networks. We rarely use wireless network for purposes other than using internet. Hence wireless networks are not used to their full capacity. Also, we have mobile phones that are ON 24x7 having high storage capacities and capable enough to transfer files with similar other devices. So can we design a system to 168

3 provide a platform for sharing data under a private wireless network among people having wifi enabled mobile phones? IV. PROPOSED SYSTEM Our aim is to design a platform independent BitTorrent like system for wifi enabled mobile phones in a wireless local area network for data sharing Thus, the aim of this project is to develop a BitTorrent - like system for mobile phones where users can exchange data with other users whom they may or may not know but are connected to the same wireless LAN. The proposed system will provide an efficient way to use the wireless networks for file sharing. V. SCOPE The system is limited to a particular wireless LAN. Users connected within the same wireless LAN where system is deployed can download and share the data with other users. The peer-to-peer file sharing will be possible only till the users remain within the range of wireless network. This system is not developed for internet users. That is, the domain for our system is a wireless local area network. VI. SYSTEM ARCHITECTURE m-torrent system is divided into two components: Figure 2: Architecture of m-torrent System A. Server: Server will be deployed in college campus or in the organization. It is connected with wireless access point. Module running on server is developed in J2EE which consists of two parts: 1. Searching Module: which will allow users to search for a specific torrent. 2. Tracker Module: which will keep track of live traffic for each torrent, that is, it will maintain a list of mobile phones which are currently downloading the same torrent file. B. Client: Client module is mobile application developed in J2ME which is installed on mobile devices. This application will be used to- connect to the server for creating a torrent file for downloading data using the torrent file The system implements both client - server as well as adhoc network architecture. For functionalities like search, create, upload and download torrent file, each mobile phone directly communicates with the server. Thus, the system implements client-server architecture. On the other hand when mobile phones are exchanging data among them, they are connected in a mesh topology hence they are using ad-hoc network architecture. VII. IMPLEMENTATION A. Assumptions: It is assumed that the m-torrent application is installed on user s cell phone to facilitate the sharing of files. The users have wifi enabled mobile phones supporting java environment. The users are connected to the same wireless LAN. Server is connected with wireless network and server module is deployed on it. B. Implementation Constraints: Necessary requirement for this system is that at least one seeder should be available in the wireless network who has complete copy of the data. Also user downloading the file must remain in the range of wireless access point to continue download. User can t download file having size greater than available memory. C. Working: 1) Creating and uploading a torrent file: The client user who wants to download the file is going to use a metadata file to initiate download. This metadata file is called as mtorrent file which needs to be created first. The creation of m-torrent file is done by the initial seeder using the same client application. During the creation of mtorrent file, all file specifications are recorded in it. While creating a torrent file for specific file or for directory which contains the data, the user needs to- 1. Select the path of that file or directory in mobile phone 2. Name the torrent file 3. Select the chunk size in which the file will be divided Once user provides all the information, file is divided into no. of chunks. A hash code for each chunk is then calculated. 169

4 IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: Also, a key specific to that torrent file is calculated. A torrent file is created and all this information is stored into torrent file. search for all available torrent files. These results are then sent back to user using wireless network. c) After receiving results user will select particular result to download torrent file associated with it. This request is sent to server and in reply server sends copy of torrent file back to user. Figure 3: Creating and uploading a torrent file Client now connects to the server and sends request to upload a torrent file. Once server agrees, torrent file is uploaded on the server where server lists that file in its records and starts tracking that torrent. 2) Getting a torrent file To start downloading actual data file user is required to have a torrent file for the same. There are two ways to get it. Either user can directly get it from any of his friend by file copy or he can search the torrent system database and then can select and download any one of the listed search results. During search the mobile client application sends the query in string format to the server. Server uses full text search to dig the related files and result see is sent back to client in a bunch of 10 results every time the client requests for more results. The result is interpreted at client end. And after selection of any result for download the torrent file is downloaded to the mobile. Now the user can proceed for the data file download. The torrent file, being very small in size, is downloaded very fast. The maximum size of torrent file is found to be less than 1KB in our case during testing. 3) Downloading a file: As shown in fig.4, user will first install m-torrent client application on his/her mobile. a) Using m-torrent client application user will connect to server and if he/her wants to download any data, he/she will enter search query in application. b) This request will be sent to the server where Search module running on server will process this query and will Figure 4: Downloading of data This torrent file contains: i) File/Directory name ii) Date of creation iii) Total size of data iv) Tracker address v) No. of pieces vi) A key for uniquely identifying a torrent file vii) A hash code for each piece Now as the user has torrent file, he can now start downloading the actual data. d) To start downloading user first selects corresponding torrent file and clicks on start download option. As user clicks on start download option query is sent to server to get list of seeders and leechers i.e. other mobiles which are downloading the same file or having a copy of it. e) When this request is received by server, tracker module running on server will send list of seeders and leechers back to user. f) After receiving this list, m-torrent creates separate connection with each peer and can now start downloading the file. 170

5 VIII. FUTURE SCOPE m-torrent system can be further integrated with current bittorrent system over the internet. For such integration, work of the server will be done by existing bit-torrent system and our mobile application will act as client for the user for downloading data. Our current system can be further extended to support free Video calling, SMS and Chat service within wireless network. All the users which are connected to the system can talk to each other using video calling. For this feature voice and video will be sent in the form of packets to both devices and at the user side conversion will be done back to original form. For such calling, function of authentication and call management will be done by server. Also using the same technique, user can send SMS to any other user who is within the range of wireless network and is using our application. Chatting service is also possible to implement with current system. m-torrent client application can have chat option where user will first select other user for chat. This request for chat will be sent to other user. When that user confirms request chat service can be initiated where conversation will be sent in the form of packets to both parties. IX. CONCLUSION In this paper we have presented a system whose aim is to provide a platform for data sharing services in wireless network to mobile phones in a modular and adaptive way. The system will enable remote users within a wireless local area network to share data between them. Using this system, a wireless network can be used efficiently for data sharing along with internet usage. Also the system utilizes the idle time of mobile phones to provide a powerful functionality without affecting other functionalities of mobiles. REFERENCES [1] Jani Peltotalo, Department of Communications Engineering, Tampere University of Technology, P2P File Sharing: BitTorrent in Detail [2] Liang Li, Xinshe Wang, P2P File-Sharing Application on Mobile Phones Based on SIP, , 2008 IEEE [3] Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thierry Turletti, BitHoc: A content sharing application for Wireless Ad-hoc Networks [4] Baptiste Dubuis, Java bittorrent API, Lausanne, February 19, 2007 [5] Leonardi, G. Morabito, S. Palazzo, A. Panto, F. Scoto, ShareAnywhere: a platform for developing mobile sharing applications,2008 IEEE [6] 171

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

Today. Architectural Styles

Today. Architectural Styles Today Architectures for distributed systems (Chapter 2) Centralized, decentralized, hybrid Middleware Self-managing systems Lecture 2, page 1 Architectural Styles Important styles of architecture for distributed

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

P2P File Sharing: BitTorrent in Detail

P2P File Sharing: BitTorrent in Detail ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2

More information

ISO-OSI 7-Layer Network Architecture

ISO-OSI 7-Layer Network Architecture ISO-OSI 7-Layer Network Architecture This lecture introduces the ISO-OSI layered architecture of Networks. According to the ISO standards, networks have been divided into 7 layers depending on the complexity

More information

The Algorithm of Sharing Incomplete Data in Decentralized P2P

The Algorithm of Sharing Incomplete Data in Decentralized P2P IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

CSE 5306 Distributed Systems. Architectures

CSE 5306 Distributed Systems. Architectures CSE 5306 Distributed Systems Architectures 1 Architecture Software architecture How software components are organized, How software components interact System architecture Instantiation and placement of

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741 Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741 ISBN 978-83-60810-22-4 DCFMS: A Chunk-Based Distributed File System for Supporting Multimedia Communication

More information

Java Bit Torrent Client

Java Bit Torrent Client Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download

More information

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES

ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES Maria Teresa Andrade FEUP / INESC Porto mandrade@fe.up.pt ; maria.andrade@inescporto.pt http://www.fe.up.pt/~mandrade/

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Chapter 2 Architectures. Layered Architecture

Chapter 2 Architectures. Layered Architecture Chapter 2 Architectures Software architecture logical organization of the software components Architectural styles: layered, object based, eventbased, shared data space System architecture the instantiation

More information

Revisiting P2P content sharing in wireless ad hoc networks

Revisiting P2P content sharing in wireless ad hoc networks Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications

More information

Research Article Volume 6 Issue No. 4

Research Article Volume 6 Issue No. 4 DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha

More information

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5 Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study

More information

CGHub Client Security Guide Documentation

CGHub Client Security Guide Documentation CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................

More information

PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS

PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 8 (October2012) PP: 20-25 PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS Manoj

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Table of Contents Introduction... 4 System and Hardware Requirements... 4 Supported Operating Systems... 4 Microsoft SQL Server... 4 Microsoft.

Table of Contents Introduction... 4 System and Hardware Requirements... 4 Supported Operating Systems... 4 Microsoft SQL Server... 4 Microsoft. 1 Table of Contents Introduction... 4 System and Hardware Requirements... 4 Supported Operating Systems... 4 Microsoft SQL Server... 4 Microsoft.NET Framework 4.0... 4 Microsoft Internet Information Services

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

CHAPTER 9: THE EVOLVING INTERNET

CHAPTER 9: THE EVOLVING INTERNET CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense

More information

Experiment of network services invocation in the Orange testbed The CINA interface

Experiment of network services invocation in the Orange testbed The CINA interface Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs bertrand2.mathieu@orange.com Workshop «Optimisation of Network

More information

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Examples Peer-to-Peer Applications. (Gnutella, Kazaa, BitTorrent, Skype)

Examples Peer-to-Peer Applications. (Gnutella, Kazaa, BitTorrent, Skype) Examples Peer-to-Peer Applications (Gnutella, Kazaa, BitTorrent, Skype) Second generation approach Gnutella Fully distributed approach Constructs Gnutella overlay network What is an overlay network? How

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology

A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology Yasha Sardey 1, Pranoti Deshmukh 2, Pooja Mandlik 3, Saurabh Shelar 4, Minal Nerkar 5 1,2,3,4,5 AISSMS

More information

Solutions to the Sample Questions on Application Layer

Solutions to the Sample Questions on Application Layer Solutions to the Sample Questions on Application Layer 1) Why is SMTP not used for transferring e-mail messages from the recipient s mail server to the recipient s personal computer? Answer: Whereas SMTP

More information

PEER: Peer-to-peer Enhanced Edge Router

PEER: Peer-to-peer Enhanced Edge Router PEER: Peer-to-peer Enhanced Edge Router Patrick Crowley This is the work of my doctoral student Shakir James 2009 Intel Embedded and Communications Education Summit P2P: Two Points of View A user s point

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

Storage and Data processing for Wireless Sensor Network integrated with Cloud Computing

Storage and Data processing for Wireless Sensor Network integrated with Cloud Computing International Journal of Research In Science & Engineering e-issn: 2394-8299 Special Issue: Techno-Xtreme 16 p-issn: 2394-8280 Storage and Data processing for Wireless Sensor Network integrated with Cloud

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

A Week in the Life of the Most Popular BitTorrent Swarms

A Week in the Life of the Most Popular BitTorrent Swarms A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

1.1 P2P. Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof.

1.1 P2P. Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing

More information

GCSE Computing A451 Unit 6.1 Networks

GCSE Computing A451 Unit 6.1 Networks Candidates should be able to: a. Explain the advantages of networking stand-alone computers into a LAN b. Describe H/W needed to connect stand-alone computers into a LAN, including hub/switches, wireless

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent

Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada

More information

Networking Basics & Crystal Printer Network Installation Guidelines

Networking Basics & Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Information Searching Methods In P2P file-sharing systems

Information Searching Methods In P2P file-sharing systems Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do

More information

Facebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation

Facebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation Facebook: Cassandra Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/24 Outline 1 2 3 Smruti R. Sarangi Leader Election

More information

OUTDOOR HYBRID LOCATION TRACKING SYSTEM WITH REMOTE MONITORING

OUTDOOR HYBRID LOCATION TRACKING SYSTEM WITH REMOTE MONITORING Review of the Air Force Academy No 1 (31) 2016 OUTDOOR HYBRID LOCATION TRACKING SYSTEM WITH REMOTE MONITORING Cristinel GAVRILĂ, Eleonora JELESCU, Marian ALEXANDRU Transilvania University, Braşov, Romania

More information

RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR

RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR Try it now: We have setup a Sync folder in the BitTorrent office that contains 1.1GB of BitTorrent Featured Content. You are welcome to sync with it by using the following secret key: RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR

More information

EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University

EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University 1 EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University Abstract In this document, we explain the various configurations

More information

MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature

MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-4 E-ISSN: 2347-2693 MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature Neelam Salia

More information

TIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD

TIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD TIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD Sapana Kapadnis 1,Prof. Ranjana Dahake 2 Department of Computer Engineering, MET BKC, Adgoan ABSTRACT In cloud computing most

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Medium Access Control (MAC) protocol

Medium Access Control (MAC) protocol Medium Access ontrol (MA) protocol omputers DNS Shared medium Point-to-Point. R R. WLAN AP R LAN. Shared medium AP DNS DNS: Domain Name System Figure 1: Different components of a network The Internet consists

More information

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast.

More information

P2P content sharing in spontaneous multi-hop wireless networks

P2P content sharing in spontaneous multi-hop wireless networks P2P content sharing in spontaneous multi-hop wireless networks Mohamed Karim Sbai EPI Planete, INRIA, France Email: mksbai@sophia.inria.fr Emna Salhi EPI Planete, INRIA, France ENSI, Tunisia Email: esalhi@sophia.inria.fr

More information

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet

More information

NETWORKING. A major difference in the network types is the distance covered by the networks.

NETWORKING. A major difference in the network types is the distance covered by the networks. NETWORKING What is a computer network? A network is a group of connected computer systems and devices (Laptop, Desktops, Servers) via a link, which enables the sharing of data/information between the connected

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science,

The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, The Bittorrent P2P File-sharing System: Measurements And Analysis J.A. Pouwelse, P. Garbacki, D.H.J. Epema, H.J. Sips Department of Computer Science, Delft University of Technology, the Netherlands BitTorrent

More information

Rapid Prototyping and Deployment of User-to-User Networked Applications

Rapid Prototyping and Deployment of User-to-User Networked Applications Rapid Prototyping and Deployment of User-to-User Networked Applications Wan-Teh Chang Department of Electrical Engineering and Computer Sciences University of California at Berkeley DSP SEMINAR, 3 MAY

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Task Offloading Framework to Enhance the Computing Capabilities of Smartphone and Devices using Cloud

Task Offloading Framework to Enhance the Computing Capabilities of Smartphone and Devices using Cloud Task Offloading Framework to Enhance the Computing Capabilities of Smartphone and Devices using Cloud Mr. Rahul Shelke 1, Prof. S.K.Korde 2 1 PG Student, Computer Department, PREC, Maharashtra, India.

More information

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

Networking. Networking and Communication Trends Convergence Speed Stability

Networking. Networking and Communication Trends Convergence Speed Stability Networking and Communication Trends Convergence Speed Stability What is a Computer Network General definition Related hardware Network Interface Card Network Operating System What is a Computer Network

More information

Three short case studies

Three short case studies Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.

More information

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur Module 17 Client-Server Software Development Lesson 41 Basic Ideas on Client- Server Software Development and Client-Server Architecture Specific Instructional Objectives At the end of this lesson the

More information

Modeling an Agent-Based Decentralized File Sharing Network

Modeling an Agent-Based Decentralized File Sharing Network Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration

More information

Remote Monitoring, Controlling and Lost Hardware Detecting through GSM

Remote Monitoring, Controlling and Lost Hardware Detecting through GSM Remote Monitoring, Controlling and Lost Hardware Detecting through GSM Amir Sheikh, Rahul Hendawe, Rajnish Singh, Jayashree Shiral, Anmol Rohan Abstract The project aims to develop various network utilities

More information

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.

SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent

More information

Peer-to-Peer Data Management

Peer-to-Peer Data Management Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 11. Content Distribution 1. Reliability in Distributed

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

An Efficient Windows Cardspace identity Management Technique in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 61-66 An Efficient Windows Cardspace identity Management Technique

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Understand VLANs, Wired LANs, and Wireless LANs

Understand VLANs, Wired LANs, and Wireless LANs LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)

More information

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER)

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER) Journal homepage: www.mjret.in ISSN:2348-6953 DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER) Narendra Shewale 1, Sharad Hadke 2, Mayur Kharote 3 Department of Computer Engineering, University

More information