m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones
|
|
- Blaise Gordon
- 7 years ago
- Views:
Transcription
1 m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones Nitesh Kumar Rohit V. Gugale Jatin J. Kakani Rahul G. Dalal Abstract: Since the advent of internet, data sharing has got its own importance. Today most of the organizations and college campuses have private wireless networks for internet access. However, apart from using them merely for accessing the internet, it will be great if we can use them for sharing the data within that network. Also in today s world many people have wifi enabled mobile phones with lots of storage capacity which are active 24x7. For most of the time, these devices are in idle state. But we can use them for other purposes. It will be great if we use our mobile phones to share files within a wireless network without any need of internet access. Our idea is to create a wireless peer-to-peer bit torrent-like file sharing system which will allow users to search and download interested data from other users while they are within the range of the wireless network. Colleges can deploy this system within their campus so that all the students in the campus can share their files while they are in campus. Also organization can use this system in their buildings so that all employees can share their data. Keywords- BitTorrent, mobile torrent, wifi enabled mobile phones, wireless LAN, wireless access point, J2ME I. INTRODUCTION When mobile phones first came into picture, analog signal was used and no data service was supported. After we entered the era of digital signal, GSM emerged but it only supports several simple data services, e.g. Short Message Service (SMS). Although the 2.5G technology General Packet Radio Switch (GPRS) greatly improves the data rate, it is still not enough. 3G is an excellent service for future wireless communication world. Providing an average data rate of 384Kb/s and help of other relevant protocols, 3G mobile phones can literally support any data services that have been implemented in the Internet. We know that data sharing has always got its own importance. Gradually data sharing over the internet came into picture. It enabled people to share their data or files with people whom they know. P2P proved to be very useful. With the advent of internet, file sharing gained a lot of importance. However, prior to the discovery of Bit Torrent, users used to share the data only with those whom they knew. Bit Torrent made it possible for unfamiliar users to share data with each other. In this paper, a system for sharing the data between two unfamiliar users in a wireless network is discussed. II. BACKGROUND Our work is greatly based on two technologies: Peer-to- Peer network and a prototype of BitTorrent Protocol. In this section, we explain the general background of these technologies. A. Peer-to-Peer network [2] P2P network architecture has changed the traditional network built on Client-Server model. When several computers are interconnected, but no computer occupies a privileged position, the network is usually referred to as a peer-to-peer network. In this type of network, every computer can communicate with all the other machines on the network, but in general each one stores its own files and runs its own applications. With a client-server network, one or more servers will perform critical functions on behalf of the other machines (the clients) on the network. These functions consist of user authentication, data storage, and the running of large, shared, resource-intensive applications. Typically, both peerto-peer and client-server networks rely on a shared Internet connection for access to external resources of these basic network structures. 167
2 There are three major types of P2P network architecture. The first type is centralized topology which needs a central server for peers and resource discovery. The second one is decentralized unstructured topology which is also called pure P2P. It does not involve any central server and every node has equal functionality. The last one is decentralized structured topology, which is also called hybrid P2P. It is a mixture the first and the second type, where there exist several super-peers for peer and resource discovery. B. A prototype of BitTorrent Protocol [3] Complete BitTorrent file distribution system consists of following entities [1] : A static metadata file (torrent file) consisting of the content to be shared A web server for publishing torrent files (or published by other means) A BitTorrent tracker An original peer publishing content which may move out of the network if the whole content is available among other peers in the system Web browser for finding torrent files A downloader application to handle torrent files and operate in the BitTorrent network. C. Full Text Search Mechanism In present days searching is a very common operation which performed on databases. While performing search by SQL queries based on select statements with where clause it is okay for small databases but a large database may cause slow result. A WHERE LIKE clause is not efficient in such cases. For example if you consider a search engine like Google it is a poor idea to use where like clause to perform search based on text. Two basic problems are: first, slow processing and second, less accurate result set. Both of the above disadvantages has been overcome by the introduction of full text search, which compare strings instead of character sequence and provide best accuracy. Also creation of full text index solves the problem of speed of operation. The clause MATCH()..AGAINST() of MySQL enables us to compare a sentence against multiple columns of a table at once. Full-text indexes can be used only with MyISAM tables, and can be created only for CHAR, VARCHAR, or TEXT columns. Full text search can be performed in any of three modes: Natural Language Mode Boolean Mode Query Expansion Mode 1. Working: The originating user (the seed) makes available one copy of the file, which is then split up into chunks. Different chunks are sent out to the various computers (BitTorrent clients) trying to get hold of a copy of the file. Figure 1: Download Protocol Each client uploads their part of the file to other clients while simultaneously downloading bits of the file they don't have from other clients. All the clients work together as a swarm to share the file. The file-sharing process doesn't happen in the systematic, sequential way. Clients upload and download simultaneously and the file actually builds up in a more random way. There are often hundreds of clients involved in each swarm. Eventually, every client receives a complete copy of the file. Thus the data can be shared to a large no. of users with a minimum overhead on original seeder. Following points lists the features of BitTorrent: Multisource downloading i.e. simultaneous downloading from multiple sources Simultaneously uploading and downloading the content A tit-for-tat policy provides very efficient spreading of the content Integrity checks which are done at the piece level One corrupted piece does not ruin the complete download process. III. MOTIVATION As of today, very less work has been done for file sharing using mobile over the wireless networks. We rarely use wireless network for purposes other than using internet. Hence wireless networks are not used to their full capacity. Also, we have mobile phones that are ON 24x7 having high storage capacities and capable enough to transfer files with similar other devices. So can we design a system to 168
3 provide a platform for sharing data under a private wireless network among people having wifi enabled mobile phones? IV. PROPOSED SYSTEM Our aim is to design a platform independent BitTorrent like system for wifi enabled mobile phones in a wireless local area network for data sharing Thus, the aim of this project is to develop a BitTorrent - like system for mobile phones where users can exchange data with other users whom they may or may not know but are connected to the same wireless LAN. The proposed system will provide an efficient way to use the wireless networks for file sharing. V. SCOPE The system is limited to a particular wireless LAN. Users connected within the same wireless LAN where system is deployed can download and share the data with other users. The peer-to-peer file sharing will be possible only till the users remain within the range of wireless network. This system is not developed for internet users. That is, the domain for our system is a wireless local area network. VI. SYSTEM ARCHITECTURE m-torrent system is divided into two components: Figure 2: Architecture of m-torrent System A. Server: Server will be deployed in college campus or in the organization. It is connected with wireless access point. Module running on server is developed in J2EE which consists of two parts: 1. Searching Module: which will allow users to search for a specific torrent. 2. Tracker Module: which will keep track of live traffic for each torrent, that is, it will maintain a list of mobile phones which are currently downloading the same torrent file. B. Client: Client module is mobile application developed in J2ME which is installed on mobile devices. This application will be used to- connect to the server for creating a torrent file for downloading data using the torrent file The system implements both client - server as well as adhoc network architecture. For functionalities like search, create, upload and download torrent file, each mobile phone directly communicates with the server. Thus, the system implements client-server architecture. On the other hand when mobile phones are exchanging data among them, they are connected in a mesh topology hence they are using ad-hoc network architecture. VII. IMPLEMENTATION A. Assumptions: It is assumed that the m-torrent application is installed on user s cell phone to facilitate the sharing of files. The users have wifi enabled mobile phones supporting java environment. The users are connected to the same wireless LAN. Server is connected with wireless network and server module is deployed on it. B. Implementation Constraints: Necessary requirement for this system is that at least one seeder should be available in the wireless network who has complete copy of the data. Also user downloading the file must remain in the range of wireless access point to continue download. User can t download file having size greater than available memory. C. Working: 1) Creating and uploading a torrent file: The client user who wants to download the file is going to use a metadata file to initiate download. This metadata file is called as mtorrent file which needs to be created first. The creation of m-torrent file is done by the initial seeder using the same client application. During the creation of mtorrent file, all file specifications are recorded in it. While creating a torrent file for specific file or for directory which contains the data, the user needs to- 1. Select the path of that file or directory in mobile phone 2. Name the torrent file 3. Select the chunk size in which the file will be divided Once user provides all the information, file is divided into no. of chunks. A hash code for each chunk is then calculated. 169
4 IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: Also, a key specific to that torrent file is calculated. A torrent file is created and all this information is stored into torrent file. search for all available torrent files. These results are then sent back to user using wireless network. c) After receiving results user will select particular result to download torrent file associated with it. This request is sent to server and in reply server sends copy of torrent file back to user. Figure 3: Creating and uploading a torrent file Client now connects to the server and sends request to upload a torrent file. Once server agrees, torrent file is uploaded on the server where server lists that file in its records and starts tracking that torrent. 2) Getting a torrent file To start downloading actual data file user is required to have a torrent file for the same. There are two ways to get it. Either user can directly get it from any of his friend by file copy or he can search the torrent system database and then can select and download any one of the listed search results. During search the mobile client application sends the query in string format to the server. Server uses full text search to dig the related files and result see is sent back to client in a bunch of 10 results every time the client requests for more results. The result is interpreted at client end. And after selection of any result for download the torrent file is downloaded to the mobile. Now the user can proceed for the data file download. The torrent file, being very small in size, is downloaded very fast. The maximum size of torrent file is found to be less than 1KB in our case during testing. 3) Downloading a file: As shown in fig.4, user will first install m-torrent client application on his/her mobile. a) Using m-torrent client application user will connect to server and if he/her wants to download any data, he/she will enter search query in application. b) This request will be sent to the server where Search module running on server will process this query and will Figure 4: Downloading of data This torrent file contains: i) File/Directory name ii) Date of creation iii) Total size of data iv) Tracker address v) No. of pieces vi) A key for uniquely identifying a torrent file vii) A hash code for each piece Now as the user has torrent file, he can now start downloading the actual data. d) To start downloading user first selects corresponding torrent file and clicks on start download option. As user clicks on start download option query is sent to server to get list of seeders and leechers i.e. other mobiles which are downloading the same file or having a copy of it. e) When this request is received by server, tracker module running on server will send list of seeders and leechers back to user. f) After receiving this list, m-torrent creates separate connection with each peer and can now start downloading the file. 170
5 VIII. FUTURE SCOPE m-torrent system can be further integrated with current bittorrent system over the internet. For such integration, work of the server will be done by existing bit-torrent system and our mobile application will act as client for the user for downloading data. Our current system can be further extended to support free Video calling, SMS and Chat service within wireless network. All the users which are connected to the system can talk to each other using video calling. For this feature voice and video will be sent in the form of packets to both devices and at the user side conversion will be done back to original form. For such calling, function of authentication and call management will be done by server. Also using the same technique, user can send SMS to any other user who is within the range of wireless network and is using our application. Chatting service is also possible to implement with current system. m-torrent client application can have chat option where user will first select other user for chat. This request for chat will be sent to other user. When that user confirms request chat service can be initiated where conversation will be sent in the form of packets to both parties. IX. CONCLUSION In this paper we have presented a system whose aim is to provide a platform for data sharing services in wireless network to mobile phones in a modular and adaptive way. The system will enable remote users within a wireless local area network to share data between them. Using this system, a wireless network can be used efficiently for data sharing along with internet usage. Also the system utilizes the idle time of mobile phones to provide a powerful functionality without affecting other functionalities of mobiles. REFERENCES [1] Jani Peltotalo, Department of Communications Engineering, Tampere University of Technology, P2P File Sharing: BitTorrent in Detail [2] Liang Li, Xinshe Wang, P2P File-Sharing Application on Mobile Phones Based on SIP, , 2008 IEEE [3] Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thierry Turletti, BitHoc: A content sharing application for Wireless Ad-hoc Networks [4] Baptiste Dubuis, Java bittorrent API, Lausanne, February 19, 2007 [5] Leonardi, G. Morabito, S. Palazzo, A. Panto, F. Scoto, ShareAnywhere: a platform for developing mobile sharing applications,2008 IEEE [6] 171
The BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
More informationPEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
More informationP2P File Sharing: BitTorrent in Detail
ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationThe Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
More informationArchitectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices
Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationLecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
More informationJava Bit Torrent Client
Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download
More informationProceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741 ISBN 978-83-60810-22-4 DCFMS: A Chunk-Based Distributed File System for Supporting Multimedia Communication
More informationENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES
ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES Maria Teresa Andrade FEUP / INESC Porto mandrade@fe.up.pt ; maria.andrade@inescporto.pt http://www.fe.up.pt/~mandrade/
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationMasters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
More informationPeer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
More informationFuture Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
More informationAN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,
More informationKeywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
More informationInternet and Services
3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationLimitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
More informationLOCATIONS AROUND ME (ANDROID)
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 193-198 Impact Journals LOCATIONS AROUND ME (ANDROID)
More informationRevisiting P2P content sharing in wireless ad hoc networks
Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications
More informationA Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
More informationRWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR
Try it now: We have setup a Sync folder in the BitTorrent office that contains 1.1GB of BitTorrent Featured Content. You are welcome to sync with it by using the following secret key: RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR
More informationA Week in the Life of the Most Popular BitTorrent Swarms
A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationMC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican
More informationPORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS
International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 8 (October2012) PP: 20-25 PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS Manoj
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationTIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD
TIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD Sapana Kapadnis 1,Prof. Ranjana Dahake 2 Department of Computer Engineering, MET BKC, Adgoan ABSTRACT In cloud computing most
More informationNetwork Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
More informationChapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
More informationOptimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationUsage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
More informationNagpur, Maharashtra, India
Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Door
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationComputer Network and Communication
2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and
More informationBit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
More informationCGHub Client Security Guide Documentation
CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More informationAN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS
AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS G.MERLIN SHEEBA Electronics and Telecommunication Department, Sathyabama University Chennai, TamilNadu,
More informationKPN SMS mail. Send SMS as fast as e-mail!
KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.
More informationOptimistic way of Accessing Open Storage using Collaborative Approach
International Journal of Electronics and Computer Science Engineering 502 Available Online at www.ijecse.org ISSN: 2277-1956 Optimistic way of Accessing Open Storage using Collaborative Approach Kishore
More informationA Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application
A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application K. Akhila 1 B. Prathyusha 2 M. PavanKumar 3 M. Amrutha 4 Research Scholar Research Scholar Research Scholar
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationCMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
More informationModeling an Agent-Based Decentralized File Sharing Network
Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration
More informationResearch Article Volume 6 Issue No. 4
DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationN6Lookup( title ) Client
CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding
More informationAn in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based
More informationComputer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationIncentives Build Robustness in BitTorrent
Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves
More informationCHAPTER 9: THE EVOLVING INTERNET
CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense
More informationExperiment of network services invocation in the Orange testbed The CINA interface
Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs bertrand2.mathieu@orange.com Workshop «Optimisation of Network
More informationChapter-1 : Introduction 1 CHAPTER - 1. Introduction
Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet
More informationSystem Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
More informationPeer-to-Peer: an Enabling Technology for Next-Generation E-learning
Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationAttacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent
Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationMobile Devices: Server and Management Lesson 05 Service Discovery
Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)
More informationPeer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
More informationTraffic Localization for DHT-based BitTorrent networks
Traffic Localization for DHT-based BitTorrent networks Moritz Steiner and Matteo Varvello 1 OUTLINE Motivation DHT Traffic Localization DHT Traffic Localization in Action! Evaluation Conclusion Motivation
More informationFacebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation
Facebook: Cassandra Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/24 Outline 1 2 3 Smruti R. Sarangi Leader Election
More informationAnonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationP2P content sharing in spontaneous multi-hop wireless networks
P2P content sharing in spontaneous multi-hop wireless networks Mohamed Karim Sbai EPI Planete, INRIA, France Email: mksbai@sophia.inria.fr Emna Salhi EPI Planete, INRIA, France ENSI, Tunisia Email: esalhi@sophia.inria.fr
More informationFile sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion
More informationBluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. III (May-Jun. 2014), PP 61-66 Bluetooth Messenger: an Android Messenger app based on Bluetooth
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationA Mobile Application for Bus Information System and Location Tracking using Client-Server Technology
A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology Yasha Sardey 1, Pranoti Deshmukh 2, Pooja Mandlik 3, Saurabh Shelar 4, Minal Nerkar 5 1,2,3,4,5 AISSMS
More informationComputers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA
Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used
More informationWeb Service Provisioning on Android Mobile Host
Web Service Provisioning on Android Mobile Host Kishor S. Wagh. Research Scholar, SGGS Nanded. Marathwada Mitra Mandal s Institute of Technology, Pune R. C. Thool, Ph.D Professor, Department of Information
More informationInformation Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
More informationEvaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
More informationAdvanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
More informationHow To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip
Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing
More informationINTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST
THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast.
More informationThe Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst
The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman
More informationNow SMS/MMS Android Modem Quick Start Guide
Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider
More informationCloud Based Distributed Databases: The Future Ahead
Cloud Based Distributed Databases: The Future Ahead Arpita Mathur Mridul Mathur Pallavi Upadhyay Abstract Fault tolerant systems are necessary to be there for distributed databases for data centers or
More informationFast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
More informationThe Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial
More informationET225 Networking Concepts. Chapter 1 What is a Computer Network?
ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.
More informationThe GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationDiscovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
More informationDDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationUnderstand VLANs, Wired LANs, and Wireless LANs
LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)
More information