International Journal of Electronics and Computer Science Engineering 502 Available Online at www.ijecse.org ISSN: 2277-1956 Optimistic way of Accessing Open Storage using Collaborative Approach Kishore Bhamidipati 1, Srinivasan Nagaraj 2, Satish Muppidi 3 1 Assistant Professor Sr. Scale, Dept. of CSE, Manipal Institute of Technology, Manipal, India 2 Senior Assistant Professor, Dept. of CSE, GMR Institute of Technology, Rajam 3 Assistant Professor, Dept. of IT, GMR Institute of Technology, Rajam Email- 1 kishore.gmr@gmail.com, 2 sri.mtech04@gmail.com, 3 msatishmtech@gmail.com, Abstract- Files are sent and delivered only if the Source-System and the Receiving-System is Switched-On. The system is on Client-Server architecture and not Peer-To-Peer. To provide Secured File-Transaction over the intranet and to ensure Data Availability, this is being achieved by constructing a virtual intranet over the Physical intranet. Accessing Open Storage using Collaborative Approach is a system based on a peer-to-peer distribution focused on data backup, in order to assure the availability and safety of user s information and allowing its recovery. Polling Server will monitor your entire network infrastructure. It provides an interface for trend reports, device status and event logs. Polling Server automatically discovers and polls connected systems, allow you to collect network statistics and automatically generate Trend Reports. Once the systems are polled for their presence, shared memory is created for the connected systems and the files are uploaded to the shared memory. The file can then be downloaded on to the personal systems hard disk or can either be deleted / modified according to the usage of that file. The objective of this paper is to develop a software product that will assist the work flow of an organization and focuses on data backup. Keywords: Client Server architecture, peer-to-peer, polling, shared memory. 1-Introduction It is a system based on a peer-to-peer distribution focused on data backup, in order to assure the availability and safety of user s information and allowing its recovery. It s a sort of distributed computing, and the remote files are being shared. To provide Secured File-Transaction over the intranet and to ensure Data Availability, this is being achieved by constructing a virtual intranet over the Physical intranet. In OSCA, Polling Server will monitor your entire network infrastructure. It provides an interface for trend reports, device status and event logs. Polling Server automatically discovers and polls connected systems, allow you to collect network statistics and automatically generate Trend Reports. The distributed polling architecture makes it easy to manage networks that span multiple sites. Once the systems are polled for their presence, shared memory is created for the connected systems and the files are uploaded to the shared memory, hence maintaining the workflow in an institution and availability of data. The file can be then be downloaded on to the personal systems hard disk or can either be deleted and modified according to the usage of that file. 1.1 IP address IP address is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. The classes of IP address are class A, class B, Class C, class D and class E. 1.2 Socket A socket is one end-point of a two-way communication link between two programs running on the network. Socket classes are used to represent the connection between a client program and a server program. 1.3 Datagram The UDP protocol provides a mode of network communication whereby applications send packets of data, called datagram, to one another. A datagram is an independent, self-contained message sent over the network whose arrival, arrival time, and content are not guaranteed. 1.4 Port
503 Optimistic way of Accessing Open Storage using Collaborative Approach A port is network entry point in a system. There are dedicated ports which are available for dedicated protocols like as follows 21 FTP, 23 Telnet, 25 SMTP etc. 2.1 Polling 2. Various Available Procedures The polling technique involved here is one-to-many polling. If a machine is found to be missing from the list of active OSCA machines all the machine s databases will updated indicating the absence of that particular machine. 2.2 Shared Memory In OSCA machine a shared memory region (SMR) will be created so that the files stored in SMR will be visible for machines which are connecting to the machine in peers. 2.3 File-upload The files will be uploaded in to the shared memory, so that they are visible for other machines which have OSCA software running in them. 2.4 Delete The file which will be no longer needed will be unshared or deleted from the Shared Memory, while deleting the files offline issues are considered. 2.5 Download Download the file to the local hard disk from the Shared Memory region. 2.6 Update The file which needs to be updated will be done and the same updated file is then taken to the Shared Memory region, so that the systems connecting in Peers and the machines in which the OSCA software is being run the corresponding files will be updated. 3. Project Planning The Project Planning Process provides a framework for software development and software maintenance teams to develop their project plans. Using the activities detailed in this process description and in supporting documents, project teams describe the work they will do, develop estimates of effort, develop a schedule, plan their management and technical approaches, identify measures to gather, and develop a risk management approach. The Files are sent over the Intranet in the same format where Third-party (Hackers) if captured can easily read the content. Destination System receiving the file can do any type of modification. Files are delivered only if the Receiving-System is Switched-On. Only when the Machine is On the files are manually sent to the destination system. 3.1 Proposed System Feature Data-Encryption Algorithm is used while the files are sent to protect the data. Only the File-Owner has the permission to Delete or Update the content. In case if the Receiving-system is Switched-off then the File-name to be sent and System-name is saved in Data-Base called PENDING-LIST and will be delivered automatically once the system is Switched on. All active system details within the intranet is available at any time without any Manual- Operation and it includes the features of Extensive One-to-many polling and a Shared Memory is created and RSS methodology of Updating is done with Dedicated Ports listen to a Dedicated Node in peer network and the offline issues are rectified. 3.2 The Algorithm for POLLING: 01 Var recp : integer 02 init 0;(* for initiator only *) 03 (* for the initiator *) 04 begin forall q neighp do Send (tok) to qf; 05 while recp <# neighp do
IJECSE,Volume1,Number 2 Kishore Bhamidipati et al. 06 begin receive(tok); 07 recp= recp+1; 08 end; 09 decide; 10 end 11 (* for the non initiator *) 12 Begin receive (tok) from q; 13 Send (tok) to q 14 End. In the above polling algorithm the initiator ask each neighbor to reply with a unique token and decides after the recipient of the unique tokens whether the system has OSCA software running in it or not. The algorithms keep track of all the systems in the network which has OSCA running in it. The Virtual Intranet is created by loading OSCA in each and every system which is willing to be part of Virtual Intranet (VI). We will have to create a shared memory region in each and every system such that the systems are able to share all the contents placed in the shared memory. The status of the systems i.e. either it s online or offline is found out by polling. The updating of system which is willing to join our VI is done by RSS algorithm. Artificial Intelligence (AI) program is run concurrently to automatically configure the system. The polling and the shared memory are the foundation modules upon which the framework for file uploading and downloading in the virtual intranet is done. 3.3 RSS Methodology Figure 1. The Architecture view of the model The Really Syndication methodology is used when a system goes off line the file to be transmitted to the intended systems will be maintained in a database i.e. the name of the file is stored in a database and the destination system name will also be stored. When the systems comes online the database is cleared and the file is transferred the destination system. 4. Program Architecture The entire system will be developed in a networking Peer To Peer environment. The Program architecture is given below.
Optimistic way of Accessing Open Storage using Collaborative Approach 505 The System are connected in peers and one many polling is performed to check the systems which has been OSCA enabled. The functionality is Auto Update Update the files when the contents are changed. Auto Delete Delete unwanted files when not in use. File Transfer when all the updating process is done the file is send to the destination systems. File permission various file permissions are set in order to see that they are not tampered. 4.1 Establishing a polling Machine Figure 2 Peer to Peer environment. In OSCA, Polling Server will monitor your entire network infrastructure. Polling Server automatically discovers and polls connected systems, allow you to collect network statistics and automatically generate Trend Reports. 4.2 Shared Memory Creator All the processors have the ability to access all memory as one global address space. Multiple processors can operate independently but share the same memory space. Changes performed in a location by one processor are visible to all the processors. 4.3 Establishing a File Permission Enabler The system can handle several users, all-working simultaneously with unrelated tasks. The system is responsible for properly sharing and managing requests. The permission scheme is applied for shared memory, also whoever has `read' permission can list files (and thus discover what files are there); whoever has `write' permission can create and delete files in that shared memory. 4.4 Establishing an Automated Machine Finder In this module artificial intelligence plays vital role. It makes all the process automatically. Module gives permission (read, write) to the file system intelligent methods based on file type. 4.5 Deleting Files in Remote systems Unwanted files are deleting from Remote system. If user can like to delete the particular file then delete to remote system. Delete server can find out OFF line system and ON line system. Immediately send the delete command to ON
IJECSE,Volume1,Number 2 Kishore Bhamidipati et al. line system and delete same file in all the remote ON line system. After deleting ON line system, then waiting for OFF line system. If OFF line systems can LOG ON the network it can be detect the delete server and send the delete command to LOG ON system and delete the corresponding file. 4.6 Establishing RSS Updating Really Simple Syndication (RSS) is designed for sharing the resources automatically. This provides an efficient and quick updating of files. When the machine again comes alive in the network the file intended for the system is send and the table is updated accordingly updated. 5. Results Figure 3. Polling Routine Figure 4. Shared Memory Created
507 Optimistic way of Accessing Open Storage using Collaborative Approach Figure 5. Main Screen 6. Conclusion The OSCA system which is used for accessing of file can be done even though the OSCA system is in OFF state. It mainly focuses on data backup. Deletions and updating of files can be done even the OSCA system is in OFF state. It can find out the OSCA systems automatically which are currently connected in the LAN. It has the ability to down load the remote files and also can change the file permissions of remote files. This paper has been designed for providing right for accessing this by an authorized user. It reduces the man power required to enter all details manually. By this, availability, reliability as well as security to the most important files that often flow through the network have been achieved. 7. References [1] Herbert Schildt, The Complete Reference Java, Seventh Edition, Tata McGraw-Hill Edition. [2] John Zukowski, The Definitive Guide to Java Swing, Third Edition, Apress Publications (2000) [3] Elliotte Harold, Java Network Programming, Third Edition, O REILLY Publications (2004) [4] Stephen R. Schach, Software Engineering with JAVA, Second Edition, Tata McGraw-Hill Edition (2004) [5] http://www.jguru.com [6] http://practicallynetworked.com