Optimistic way of Accessing Open Storage using Collaborative Approach



Similar documents
Variable length subnetting

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

Design and Implementation of an Intelligent Network Monitoring and Management Tool in Internet and Intranet

Advanced Peer to Peer Discovery and Interaction Framework

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Communications and Computer Networks

Network Models OSI vs. TCP/IP

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

High Performance Cluster Support for NLB on Window

Ethernet. Ethernet. Network Devices

Computer Networks/DV2 Lab

NQA Technology White Paper

CPS221 Lecture: Layered Network Architecture

EXPLORER. TFT Filter CONFIGURATION

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

S y s t e m A r c h i t e c t u r e

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Chapter 7. Address Translation

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, Socket Programming

21.4 Network Address Translation (NAT) NAT concept

Transport Layer Protocols

ReadyNAS Remote White Paper. NETGEAR May 2010

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

File Sharing. Peter Lo. CP582 Peter Lo

Pharos Control User Guide

Internet Concepts. What is a Network?

Portal Authentication Technology White Paper

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

MANAGING NETWORK COMPONENTS USING SNMP

Chapter 11. User Datagram Protocol (UDP)

HP IMC User Behavior Auditor

Machine control going www - Opportunities and risks when connecting a control system to the Internet

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Document Management Glossary

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Protocols and Architecture. Protocol Architecture.

Network Programming TDC 561

A Heterogeneous Internetworking Model with Enhanced Management and Security Functions

Software installation and configuration IEC-line series

SSL VPN Technology White Paper

FioranoMQ 9. High Availability Guide

Network Discovery Protocol LLDP and LLDP- MED

AIMMS The Network License Server

CCNA 2 Chapter 5. Managing Cisco IOS Software

Network Discovery Protocol LLDP and LLDP- MED

ELIXIR LOAD BALANCER 2

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Network Pop Quiz 5 Brought to you by please visit our site!

Monitoring MSDynamix CRM 2011

Remote Logging. Tanveer Brohi(14cs28)

How To Design A Layered Network In A Computer Network

Electronic Mail

Virtual machine interface. Operating system. Physical machine interface

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: Rev 6

NetFlow Collection and Processing Cartridge Pack User Guide Release 6.0

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

ETM System SIP Trunk Support Technical Discussion

FINS Gateway For OMRON PLCs

Configuring DNS. Finding Feature Information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Chapter 3. Internet Applications and Network Programming

Implementing Secure Converged Wide Area Networks (ISCW)

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

GlobalSCAPE DMZ Gateway, v1. User Guide

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

COMPUTER NETWORK TECHNOLOGY (300)

Cornerstones of Security

TOSHIBA GA Printing from Windows

EXTENDED FILE SYSTEM FOR F-SERIES PLC

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

ichip FTP Client Theory of Operation Version 1.32

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

WhatsUp Gold v11 Features Overview

Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0

Load Balancing using MS-Redirect Mechanism

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

GLBP - Gateway Load Balancing Protocol

System i and System p. Customer service, support, and troubleshooting

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0

The Shift to Wireless Data Communication

Enterprise Security Critical Standards Summary

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Design and Implementation of Distributed Process Execution Environment

The TCP/IP Reference Model

Traffic Engineering Management Concepts

IBM Security QRadar Vulnerability Manager Version User Guide

Basic Network Configuration

CS3250 Distributed Systems

Internet Protocol version 4 Part I

Network Layers. CSC358 - Introduction to Computer Networks

Lab VI Capturing and monitoring the network traffic

Objectives of Lecture. Network Architecture. Protocols. Contents

What communication protocols are used to discover Tesira servers on a network?

Transcription:

International Journal of Electronics and Computer Science Engineering 502 Available Online at www.ijecse.org ISSN: 2277-1956 Optimistic way of Accessing Open Storage using Collaborative Approach Kishore Bhamidipati 1, Srinivasan Nagaraj 2, Satish Muppidi 3 1 Assistant Professor Sr. Scale, Dept. of CSE, Manipal Institute of Technology, Manipal, India 2 Senior Assistant Professor, Dept. of CSE, GMR Institute of Technology, Rajam 3 Assistant Professor, Dept. of IT, GMR Institute of Technology, Rajam Email- 1 kishore.gmr@gmail.com, 2 sri.mtech04@gmail.com, 3 msatishmtech@gmail.com, Abstract- Files are sent and delivered only if the Source-System and the Receiving-System is Switched-On. The system is on Client-Server architecture and not Peer-To-Peer. To provide Secured File-Transaction over the intranet and to ensure Data Availability, this is being achieved by constructing a virtual intranet over the Physical intranet. Accessing Open Storage using Collaborative Approach is a system based on a peer-to-peer distribution focused on data backup, in order to assure the availability and safety of user s information and allowing its recovery. Polling Server will monitor your entire network infrastructure. It provides an interface for trend reports, device status and event logs. Polling Server automatically discovers and polls connected systems, allow you to collect network statistics and automatically generate Trend Reports. Once the systems are polled for their presence, shared memory is created for the connected systems and the files are uploaded to the shared memory. The file can then be downloaded on to the personal systems hard disk or can either be deleted / modified according to the usage of that file. The objective of this paper is to develop a software product that will assist the work flow of an organization and focuses on data backup. Keywords: Client Server architecture, peer-to-peer, polling, shared memory. 1-Introduction It is a system based on a peer-to-peer distribution focused on data backup, in order to assure the availability and safety of user s information and allowing its recovery. It s a sort of distributed computing, and the remote files are being shared. To provide Secured File-Transaction over the intranet and to ensure Data Availability, this is being achieved by constructing a virtual intranet over the Physical intranet. In OSCA, Polling Server will monitor your entire network infrastructure. It provides an interface for trend reports, device status and event logs. Polling Server automatically discovers and polls connected systems, allow you to collect network statistics and automatically generate Trend Reports. The distributed polling architecture makes it easy to manage networks that span multiple sites. Once the systems are polled for their presence, shared memory is created for the connected systems and the files are uploaded to the shared memory, hence maintaining the workflow in an institution and availability of data. The file can be then be downloaded on to the personal systems hard disk or can either be deleted and modified according to the usage of that file. 1.1 IP address IP address is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. The classes of IP address are class A, class B, Class C, class D and class E. 1.2 Socket A socket is one end-point of a two-way communication link between two programs running on the network. Socket classes are used to represent the connection between a client program and a server program. 1.3 Datagram The UDP protocol provides a mode of network communication whereby applications send packets of data, called datagram, to one another. A datagram is an independent, self-contained message sent over the network whose arrival, arrival time, and content are not guaranteed. 1.4 Port

503 Optimistic way of Accessing Open Storage using Collaborative Approach A port is network entry point in a system. There are dedicated ports which are available for dedicated protocols like as follows 21 FTP, 23 Telnet, 25 SMTP etc. 2.1 Polling 2. Various Available Procedures The polling technique involved here is one-to-many polling. If a machine is found to be missing from the list of active OSCA machines all the machine s databases will updated indicating the absence of that particular machine. 2.2 Shared Memory In OSCA machine a shared memory region (SMR) will be created so that the files stored in SMR will be visible for machines which are connecting to the machine in peers. 2.3 File-upload The files will be uploaded in to the shared memory, so that they are visible for other machines which have OSCA software running in them. 2.4 Delete The file which will be no longer needed will be unshared or deleted from the Shared Memory, while deleting the files offline issues are considered. 2.5 Download Download the file to the local hard disk from the Shared Memory region. 2.6 Update The file which needs to be updated will be done and the same updated file is then taken to the Shared Memory region, so that the systems connecting in Peers and the machines in which the OSCA software is being run the corresponding files will be updated. 3. Project Planning The Project Planning Process provides a framework for software development and software maintenance teams to develop their project plans. Using the activities detailed in this process description and in supporting documents, project teams describe the work they will do, develop estimates of effort, develop a schedule, plan their management and technical approaches, identify measures to gather, and develop a risk management approach. The Files are sent over the Intranet in the same format where Third-party (Hackers) if captured can easily read the content. Destination System receiving the file can do any type of modification. Files are delivered only if the Receiving-System is Switched-On. Only when the Machine is On the files are manually sent to the destination system. 3.1 Proposed System Feature Data-Encryption Algorithm is used while the files are sent to protect the data. Only the File-Owner has the permission to Delete or Update the content. In case if the Receiving-system is Switched-off then the File-name to be sent and System-name is saved in Data-Base called PENDING-LIST and will be delivered automatically once the system is Switched on. All active system details within the intranet is available at any time without any Manual- Operation and it includes the features of Extensive One-to-many polling and a Shared Memory is created and RSS methodology of Updating is done with Dedicated Ports listen to a Dedicated Node in peer network and the offline issues are rectified. 3.2 The Algorithm for POLLING: 01 Var recp : integer 02 init 0;(* for initiator only *) 03 (* for the initiator *) 04 begin forall q neighp do Send (tok) to qf; 05 while recp <# neighp do

IJECSE,Volume1,Number 2 Kishore Bhamidipati et al. 06 begin receive(tok); 07 recp= recp+1; 08 end; 09 decide; 10 end 11 (* for the non initiator *) 12 Begin receive (tok) from q; 13 Send (tok) to q 14 End. In the above polling algorithm the initiator ask each neighbor to reply with a unique token and decides after the recipient of the unique tokens whether the system has OSCA software running in it or not. The algorithms keep track of all the systems in the network which has OSCA running in it. The Virtual Intranet is created by loading OSCA in each and every system which is willing to be part of Virtual Intranet (VI). We will have to create a shared memory region in each and every system such that the systems are able to share all the contents placed in the shared memory. The status of the systems i.e. either it s online or offline is found out by polling. The updating of system which is willing to join our VI is done by RSS algorithm. Artificial Intelligence (AI) program is run concurrently to automatically configure the system. The polling and the shared memory are the foundation modules upon which the framework for file uploading and downloading in the virtual intranet is done. 3.3 RSS Methodology Figure 1. The Architecture view of the model The Really Syndication methodology is used when a system goes off line the file to be transmitted to the intended systems will be maintained in a database i.e. the name of the file is stored in a database and the destination system name will also be stored. When the systems comes online the database is cleared and the file is transferred the destination system. 4. Program Architecture The entire system will be developed in a networking Peer To Peer environment. The Program architecture is given below.

Optimistic way of Accessing Open Storage using Collaborative Approach 505 The System are connected in peers and one many polling is performed to check the systems which has been OSCA enabled. The functionality is Auto Update Update the files when the contents are changed. Auto Delete Delete unwanted files when not in use. File Transfer when all the updating process is done the file is send to the destination systems. File permission various file permissions are set in order to see that they are not tampered. 4.1 Establishing a polling Machine Figure 2 Peer to Peer environment. In OSCA, Polling Server will monitor your entire network infrastructure. Polling Server automatically discovers and polls connected systems, allow you to collect network statistics and automatically generate Trend Reports. 4.2 Shared Memory Creator All the processors have the ability to access all memory as one global address space. Multiple processors can operate independently but share the same memory space. Changes performed in a location by one processor are visible to all the processors. 4.3 Establishing a File Permission Enabler The system can handle several users, all-working simultaneously with unrelated tasks. The system is responsible for properly sharing and managing requests. The permission scheme is applied for shared memory, also whoever has `read' permission can list files (and thus discover what files are there); whoever has `write' permission can create and delete files in that shared memory. 4.4 Establishing an Automated Machine Finder In this module artificial intelligence plays vital role. It makes all the process automatically. Module gives permission (read, write) to the file system intelligent methods based on file type. 4.5 Deleting Files in Remote systems Unwanted files are deleting from Remote system. If user can like to delete the particular file then delete to remote system. Delete server can find out OFF line system and ON line system. Immediately send the delete command to ON

IJECSE,Volume1,Number 2 Kishore Bhamidipati et al. line system and delete same file in all the remote ON line system. After deleting ON line system, then waiting for OFF line system. If OFF line systems can LOG ON the network it can be detect the delete server and send the delete command to LOG ON system and delete the corresponding file. 4.6 Establishing RSS Updating Really Simple Syndication (RSS) is designed for sharing the resources automatically. This provides an efficient and quick updating of files. When the machine again comes alive in the network the file intended for the system is send and the table is updated accordingly updated. 5. Results Figure 3. Polling Routine Figure 4. Shared Memory Created

507 Optimistic way of Accessing Open Storage using Collaborative Approach Figure 5. Main Screen 6. Conclusion The OSCA system which is used for accessing of file can be done even though the OSCA system is in OFF state. It mainly focuses on data backup. Deletions and updating of files can be done even the OSCA system is in OFF state. It can find out the OSCA systems automatically which are currently connected in the LAN. It has the ability to down load the remote files and also can change the file permissions of remote files. This paper has been designed for providing right for accessing this by an authorized user. It reduces the man power required to enter all details manually. By this, availability, reliability as well as security to the most important files that often flow through the network have been achieved. 7. References [1] Herbert Schildt, The Complete Reference Java, Seventh Edition, Tata McGraw-Hill Edition. [2] John Zukowski, The Definitive Guide to Java Swing, Third Edition, Apress Publications (2000) [3] Elliotte Harold, Java Network Programming, Third Edition, O REILLY Publications (2004) [4] Stephen R. Schach, Software Engineering with JAVA, Second Edition, Tata McGraw-Hill Edition (2004) [5] http://www.jguru.com [6] http://practicallynetworked.com