m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones

Size: px
Start display at page:

Download "m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones"

Transcription

1 m-torrent: Torrent System within Wireless Network for Java Supported Mobile Phones Nitesh Kumar Rohit V. Gugale Jatin J. Kakani Rahul G. Dalal Abstract: Since the advent of internet, data sharing has got its own importance. Today most of the organizations and college campuses have private wireless networks for internet access. However, apart from using them merely for accessing the internet, it will be great if we can use them for sharing the data within that network. Also in today s world many people have wifi enabled mobile phones with lots of storage capacity which are active 24x7. For most of the time, these devices are in idle state. But we can use them for other purposes. It will be great if we use our mobile phones to share files within a wireless network without any need of internet access. Our idea is to create a wireless peer-to-peer bit torrent-like file sharing system which will allow users to search and download interested data from other users while they are within the range of the wireless network. Colleges can deploy this system within their campus so that all the students in the campus can share their files while they are in campus. Also organization can use this system in their buildings so that all employees can share their data. Keywords- BitTorrent, mobile torrent, wifi enabled mobile phones, wireless LAN, wireless access point, J2ME I. INTRODUCTION When mobile phones first came into picture, analog signal was used and no data service was supported. After we entered the era of digital signal, GSM emerged but it only supports several simple data services, e.g. Short Message Service (SMS). Although the 2.5G technology General Packet Radio Switch (GPRS) greatly improves the data rate, it is still not enough. 3G is an excellent service for future wireless communication world. Providing an average data rate of 384Kb/s and help of other relevant protocols, 3G mobile phones can literally support any data services that have been implemented in the Internet. We know that data sharing has always got its own importance. Gradually data sharing over the internet came into picture. It enabled people to share their data or files with people whom they know. P2P proved to be very useful. With the advent of internet, file sharing gained a lot of importance. However, prior to the discovery of Bit Torrent, users used to share the data only with those whom they knew. Bit Torrent made it possible for unfamiliar users to share data with each other. In this paper, a system for sharing the data between two unfamiliar users in a wireless network is discussed. II. BACKGROUND Our work is greatly based on two technologies: Peer-to- Peer network and a prototype of BitTorrent Protocol. In this section, we explain the general background of these technologies. A. Peer-to-Peer network [2] P2P network architecture has changed the traditional network built on Client-Server model. When several computers are interconnected, but no computer occupies a privileged position, the network is usually referred to as a peer-to-peer network. In this type of network, every computer can communicate with all the other machines on the network, but in general each one stores its own files and runs its own applications. With a client-server network, one or more servers will perform critical functions on behalf of the other machines (the clients) on the network. These functions consist of user authentication, data storage, and the running of large, shared, resource-intensive applications. Typically, both peerto-peer and client-server networks rely on a shared Internet connection for access to external resources of these basic network structures. 167

2 There are three major types of P2P network architecture. The first type is centralized topology which needs a central server for peers and resource discovery. The second one is decentralized unstructured topology which is also called pure P2P. It does not involve any central server and every node has equal functionality. The last one is decentralized structured topology, which is also called hybrid P2P. It is a mixture the first and the second type, where there exist several super-peers for peer and resource discovery. B. A prototype of BitTorrent Protocol [3] Complete BitTorrent file distribution system consists of following entities [1] : A static metadata file (torrent file) consisting of the content to be shared A web server for publishing torrent files (or published by other means) A BitTorrent tracker An original peer publishing content which may move out of the network if the whole content is available among other peers in the system Web browser for finding torrent files A downloader application to handle torrent files and operate in the BitTorrent network. C. Full Text Search Mechanism In present days searching is a very common operation which performed on databases. While performing search by SQL queries based on select statements with where clause it is okay for small databases but a large database may cause slow result. A WHERE LIKE clause is not efficient in such cases. For example if you consider a search engine like Google it is a poor idea to use where like clause to perform search based on text. Two basic problems are: first, slow processing and second, less accurate result set. Both of the above disadvantages has been overcome by the introduction of full text search, which compare strings instead of character sequence and provide best accuracy. Also creation of full text index solves the problem of speed of operation. The clause MATCH()..AGAINST() of MySQL enables us to compare a sentence against multiple columns of a table at once. Full-text indexes can be used only with MyISAM tables, and can be created only for CHAR, VARCHAR, or TEXT columns. Full text search can be performed in any of three modes: Natural Language Mode Boolean Mode Query Expansion Mode 1. Working: The originating user (the seed) makes available one copy of the file, which is then split up into chunks. Different chunks are sent out to the various computers (BitTorrent clients) trying to get hold of a copy of the file. Figure 1: Download Protocol Each client uploads their part of the file to other clients while simultaneously downloading bits of the file they don't have from other clients. All the clients work together as a swarm to share the file. The file-sharing process doesn't happen in the systematic, sequential way. Clients upload and download simultaneously and the file actually builds up in a more random way. There are often hundreds of clients involved in each swarm. Eventually, every client receives a complete copy of the file. Thus the data can be shared to a large no. of users with a minimum overhead on original seeder. Following points lists the features of BitTorrent: Multisource downloading i.e. simultaneous downloading from multiple sources Simultaneously uploading and downloading the content A tit-for-tat policy provides very efficient spreading of the content Integrity checks which are done at the piece level One corrupted piece does not ruin the complete download process. III. MOTIVATION As of today, very less work has been done for file sharing using mobile over the wireless networks. We rarely use wireless network for purposes other than using internet. Hence wireless networks are not used to their full capacity. Also, we have mobile phones that are ON 24x7 having high storage capacities and capable enough to transfer files with similar other devices. So can we design a system to 168

3 provide a platform for sharing data under a private wireless network among people having wifi enabled mobile phones? IV. PROPOSED SYSTEM Our aim is to design a platform independent BitTorrent like system for wifi enabled mobile phones in a wireless local area network for data sharing Thus, the aim of this project is to develop a BitTorrent - like system for mobile phones where users can exchange data with other users whom they may or may not know but are connected to the same wireless LAN. The proposed system will provide an efficient way to use the wireless networks for file sharing. V. SCOPE The system is limited to a particular wireless LAN. Users connected within the same wireless LAN where system is deployed can download and share the data with other users. The peer-to-peer file sharing will be possible only till the users remain within the range of wireless network. This system is not developed for internet users. That is, the domain for our system is a wireless local area network. VI. SYSTEM ARCHITECTURE m-torrent system is divided into two components: Figure 2: Architecture of m-torrent System A. Server: Server will be deployed in college campus or in the organization. It is connected with wireless access point. Module running on server is developed in J2EE which consists of two parts: 1. Searching Module: which will allow users to search for a specific torrent. 2. Tracker Module: which will keep track of live traffic for each torrent, that is, it will maintain a list of mobile phones which are currently downloading the same torrent file. B. Client: Client module is mobile application developed in J2ME which is installed on mobile devices. This application will be used to- connect to the server for creating a torrent file for downloading data using the torrent file The system implements both client - server as well as adhoc network architecture. For functionalities like search, create, upload and download torrent file, each mobile phone directly communicates with the server. Thus, the system implements client-server architecture. On the other hand when mobile phones are exchanging data among them, they are connected in a mesh topology hence they are using ad-hoc network architecture. VII. IMPLEMENTATION A. Assumptions: It is assumed that the m-torrent application is installed on user s cell phone to facilitate the sharing of files. The users have wifi enabled mobile phones supporting java environment. The users are connected to the same wireless LAN. Server is connected with wireless network and server module is deployed on it. B. Implementation Constraints: Necessary requirement for this system is that at least one seeder should be available in the wireless network who has complete copy of the data. Also user downloading the file must remain in the range of wireless access point to continue download. User can t download file having size greater than available memory. C. Working: 1) Creating and uploading a torrent file: The client user who wants to download the file is going to use a metadata file to initiate download. This metadata file is called as mtorrent file which needs to be created first. The creation of m-torrent file is done by the initial seeder using the same client application. During the creation of mtorrent file, all file specifications are recorded in it. While creating a torrent file for specific file or for directory which contains the data, the user needs to- 1. Select the path of that file or directory in mobile phone 2. Name the torrent file 3. Select the chunk size in which the file will be divided Once user provides all the information, file is divided into no. of chunks. A hash code for each chunk is then calculated. 169

4 IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: Also, a key specific to that torrent file is calculated. A torrent file is created and all this information is stored into torrent file. search for all available torrent files. These results are then sent back to user using wireless network. c) After receiving results user will select particular result to download torrent file associated with it. This request is sent to server and in reply server sends copy of torrent file back to user. Figure 3: Creating and uploading a torrent file Client now connects to the server and sends request to upload a torrent file. Once server agrees, torrent file is uploaded on the server where server lists that file in its records and starts tracking that torrent. 2) Getting a torrent file To start downloading actual data file user is required to have a torrent file for the same. There are two ways to get it. Either user can directly get it from any of his friend by file copy or he can search the torrent system database and then can select and download any one of the listed search results. During search the mobile client application sends the query in string format to the server. Server uses full text search to dig the related files and result see is sent back to client in a bunch of 10 results every time the client requests for more results. The result is interpreted at client end. And after selection of any result for download the torrent file is downloaded to the mobile. Now the user can proceed for the data file download. The torrent file, being very small in size, is downloaded very fast. The maximum size of torrent file is found to be less than 1KB in our case during testing. 3) Downloading a file: As shown in fig.4, user will first install m-torrent client application on his/her mobile. a) Using m-torrent client application user will connect to server and if he/her wants to download any data, he/she will enter search query in application. b) This request will be sent to the server where Search module running on server will process this query and will Figure 4: Downloading of data This torrent file contains: i) File/Directory name ii) Date of creation iii) Total size of data iv) Tracker address v) No. of pieces vi) A key for uniquely identifying a torrent file vii) A hash code for each piece Now as the user has torrent file, he can now start downloading the actual data. d) To start downloading user first selects corresponding torrent file and clicks on start download option. As user clicks on start download option query is sent to server to get list of seeders and leechers i.e. other mobiles which are downloading the same file or having a copy of it. e) When this request is received by server, tracker module running on server will send list of seeders and leechers back to user. f) After receiving this list, m-torrent creates separate connection with each peer and can now start downloading the file. 170

5 VIII. FUTURE SCOPE m-torrent system can be further integrated with current bittorrent system over the internet. For such integration, work of the server will be done by existing bit-torrent system and our mobile application will act as client for the user for downloading data. Our current system can be further extended to support free Video calling, SMS and Chat service within wireless network. All the users which are connected to the system can talk to each other using video calling. For this feature voice and video will be sent in the form of packets to both devices and at the user side conversion will be done back to original form. For such calling, function of authentication and call management will be done by server. Also using the same technique, user can send SMS to any other user who is within the range of wireless network and is using our application. Chatting service is also possible to implement with current system. m-torrent client application can have chat option where user will first select other user for chat. This request for chat will be sent to other user. When that user confirms request chat service can be initiated where conversation will be sent in the form of packets to both parties. IX. CONCLUSION In this paper we have presented a system whose aim is to provide a platform for data sharing services in wireless network to mobile phones in a modular and adaptive way. The system will enable remote users within a wireless local area network to share data between them. Using this system, a wireless network can be used efficiently for data sharing along with internet usage. Also the system utilizes the idle time of mobile phones to provide a powerful functionality without affecting other functionalities of mobiles. REFERENCES [1] Jani Peltotalo, Department of Communications Engineering, Tampere University of Technology, P2P File Sharing: BitTorrent in Detail [2] Liang Li, Xinshe Wang, P2P File-Sharing Application on Mobile Phones Based on SIP, , 2008 IEEE [3] Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thierry Turletti, BitHoc: A content sharing application for Wireless Ad-hoc Networks [4] Baptiste Dubuis, Java bittorrent API, Lausanne, February 19, 2007 [5] Leonardi, G. Morabito, S. Palazzo, A. Panto, F. Scoto, ShareAnywhere: a platform for developing mobile sharing applications,2008 IEEE [6] 171

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

P2P File Sharing: BitTorrent in Detail

P2P File Sharing: BitTorrent in Detail ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

The Algorithm of Sharing Incomplete Data in Decentralized P2P

The Algorithm of Sharing Incomplete Data in Decentralized P2P IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,

More information

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Lecture 6 Content Distribution and BitTorrent

Lecture 6 Content Distribution and BitTorrent ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent

More information

Java Bit Torrent Client

Java Bit Torrent Client Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download

More information

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741

Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741 Proceedings of the Federated Conference on Computer Science and Information Systems pp. 737 741 ISBN 978-83-60810-22-4 DCFMS: A Chunk-Based Distributed File System for Supporting Multimedia Communication

More information

ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES

ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES Maria Teresa Andrade FEUP / INESC Porto mandrade@fe.up.pt ; maria.andrade@inescporto.pt http://www.fe.up.pt/~mandrade/

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,

More information

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5 Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study

More information

Internet and Services

Internet and Services 3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information

LOCATIONS AROUND ME (ANDROID)

LOCATIONS AROUND ME (ANDROID) IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 193-198 Impact Journals LOCATIONS AROUND ME (ANDROID)

More information

Revisiting P2P content sharing in wireless ad hoc networks

Revisiting P2P content sharing in wireless ad hoc networks Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications

More information

A Comparison of Mobile Peer-to-peer File-sharing Clients

A Comparison of Mobile Peer-to-peer File-sharing Clients 1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics

More information

RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR

RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR Try it now: We have setup a Sync folder in the BitTorrent office that contains 1.1GB of BitTorrent Featured Content. You are welcome to sync with it by using the following secret key: RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR

More information

A Week in the Life of the Most Popular BitTorrent Swarms

A Week in the Life of the Most Popular BitTorrent Swarms A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican

More information

PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS

PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 8 (October2012) PP: 20-25 PORTABLE AND ECONOMIC SMART GENERIC DATA SERVER FOR SMALL SCALE BUSINESS Manoj

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

TIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD

TIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD TIME EFFICIENT DISTRIBUTED FILE STORAGE AND SHARING USING P2P NETWORK IN CLOUD Sapana Kapadnis 1,Prof. Ranjana Dahake 2 Department of Computer Engineering, MET BKC, Adgoan ABSTRACT In cloud computing most

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Nagpur, Maharashtra, India

Nagpur, Maharashtra, India Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Door

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Computer Network and Communication

Computer Network and Communication 2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

CGHub Client Security Guide Documentation

CGHub Client Security Guide Documentation CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS G.MERLIN SHEEBA Electronics and Telecommunication Department, Sathyabama University Chennai, TamilNadu,

More information

KPN SMS mail. Send SMS as fast as e-mail!

KPN SMS mail. Send SMS as fast as e-mail! KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.

More information

Optimistic way of Accessing Open Storage using Collaborative Approach

Optimistic way of Accessing Open Storage using Collaborative Approach International Journal of Electronics and Computer Science Engineering 502 Available Online at www.ijecse.org ISSN: 2277-1956 Optimistic way of Accessing Open Storage using Collaborative Approach Kishore

More information

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application K. Akhila 1 B. Prathyusha 2 M. PavanKumar 3 M. Amrutha 4 Research Scholar Research Scholar Research Scholar

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Modeling an Agent-Based Decentralized File Sharing Network

Modeling an Agent-Based Decentralized File Sharing Network Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration

More information

Research Article Volume 6 Issue No. 4

Research Article Volume 6 Issue No. 4 DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Incentives Build Robustness in BitTorrent

Incentives Build Robustness in BitTorrent Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves

More information

CHAPTER 9: THE EVOLVING INTERNET

CHAPTER 9: THE EVOLVING INTERNET CHAPTER 9: THE EVOLVING INTERNET Multiple Choice: 1. What was the department of the U.S. government that developed the initial stages of the Internet? A. Department of Commerce B. Department of Defense

More information

Experiment of network services invocation in the Orange testbed The CINA interface

Experiment of network services invocation in the Orange testbed The CINA interface Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs bertrand2.mathieu@orange.com Workshop «Optimisation of Network

More information

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet

More information

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

More information

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent

Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

Mobile Devices: Server and Management Lesson 05 Service Discovery

Mobile Devices: Server and Management Lesson 05 Service Discovery Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Traffic Localization for DHT-based BitTorrent networks

Traffic Localization for DHT-based BitTorrent networks Traffic Localization for DHT-based BitTorrent networks Moritz Steiner and Matteo Varvello 1 OUTLINE Motivation DHT Traffic Localization DHT Traffic Localization in Action! Evaluation Conclusion Motivation

More information

Facebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation

Facebook: Cassandra. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Overview Design Evaluation Facebook: Cassandra Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/24 Outline 1 2 3 Smruti R. Sarangi Leader Election

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

P2P content sharing in spontaneous multi-hop wireless networks

P2P content sharing in spontaneous multi-hop wireless networks P2P content sharing in spontaneous multi-hop wireless networks Mohamed Karim Sbai EPI Planete, INRIA, France Email: mksbai@sophia.inria.fr Emna Salhi EPI Planete, INRIA, France ENSI, Tunisia Email: esalhi@sophia.inria.fr

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity

Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. III (May-Jun. 2014), PP 61-66 Bluetooth Messenger: an Android Messenger app based on Bluetooth

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology

A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology Yasha Sardey 1, Pranoti Deshmukh 2, Pooja Mandlik 3, Saurabh Shelar 4, Minal Nerkar 5 1,2,3,4,5 AISSMS

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

Web Service Provisioning on Android Mobile Host

Web Service Provisioning on Android Mobile Host Web Service Provisioning on Android Mobile Host Kishor S. Wagh. Research Scholar, SGGS Nanded. Marathwada Mitra Mandal s Institute of Technology, Pune R. C. Thool, Ph.D Professor, Department of Information

More information

Information Searching Methods In P2P file-sharing systems

Information Searching Methods In P2P file-sharing systems Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip

How To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing

More information

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST

INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST THE NATIONAL CENTER FOR JUSTICE AND THE RULE OF LAW AND THE NATIONAL JUDICIAL COLLEGE INTERNET CRIMES AGAINST CHILDREN: PEER-TO-PEER TECHNOLOGIES WEBCAST Thank you for participating in our live webcast.

More information

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman

More information

Now SMS/MMS Android Modem Quick Start Guide

Now SMS/MMS Android Modem Quick Start Guide Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider

More information

Cloud Based Distributed Databases: The Future Ahead

Cloud Based Distributed Databases: The Future Ahead Cloud Based Distributed Databases: The Future Ahead Arpita Mathur Mridul Mathur Pallavi Upadhyay Abstract Fault tolerant systems are necessary to be there for distributed databases for data centers or

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

ET225 Networking Concepts. Chapter 1 What is a Computer Network? ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.

More information

The GSM and GPRS network T-110.300/301

The GSM and GPRS network T-110.300/301 The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

DDoS Vulnerability Analysis of Bittorrent Protocol

DDoS Vulnerability Analysis of Bittorrent Protocol DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

Understand VLANs, Wired LANs, and Wireless LANs

Understand VLANs, Wired LANs, and Wireless LANs LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)

More information