SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
MULTITHREADED PEER - PEER
      COMMUNICATION USING
    DISTRIBUTED FRAMEWORKS
INTRODUCTION
Distributed computing is a science which solves a large problem by giving small
parts of the problem to many computers to solve and then combining the solutions
for the parts into a solution for the problem.
A type of computing in which a computational task is divided into subtasks that
execute on a collection of networked computers. The networks are general-
purpose networks (LANs, WANs, or the Internet) as opposed to dedicated cluster
interconnects
Computing systems in which services to users are provided by teams of computers
collaborating over a network. Distributed computing is a programming model in
which processing occurs in many different places (or nodes) around a network.
Processing can occur wherever it makes the most sense, whether that is on a
server, Web site, personal computer, handheld device, or other smart device.
Distributed computing or Distributed system is the process of aggregating the
power of several computing entities to collaboratively run a single computational
task in a transparent and coherent way, so that they appear as a single,
centralized system.
Peer-to-peer — an architecture where there is no special machine or machines
that provide a service or manage the network resources. Instead all responsibilities
are uniformly divided among all machines, known as peers.
A peer-to-peer (or P2P) computer network is a network that relies on the
computing power and bandwidth of the participants in the network rather than
concentrating it in a relatively few servers. P2P networks are typically used for
connecting nodes via largely ad hoc connections.
Such networks are useful for many purposes. Sharing content files containing
audio, video, data or anything in digital format is very common, and realtime data,
such as Telephony traffic, is also passed using P2P technology. The term "P2P
network" can also mean grid computing.
A pure peer-to-peer file transfer network does not have the notion of clients or
servers, but only equal peer nodes that simultaneously function as both "clients"
and "servers" to the other nodes on the network. This model of network
arrangement differs from the client-server model where communication is usually
to and from a central server.
A typical example for a non peer-to-peer file transfer is an FTP server. One user
uploads a file to the FTP server, then many others download it, with no need for
the uploader and downloader to be connected at the same time.
Some networks and channels, such as NAPSTER (now closed), OPENNAP, or
IRC, use a client-server structure for some tasks (e.g., searching) and a peer-to-
peer structure for others.
Networks such as GNUTELLA or FREENET use a peer-to-peer structure for all
purposes, and are sometimes referred to as true peer-to-peer networks, although
GNUTELLA is greatly facilitated by directory servers that inform peers of the
network addresses of other peers.
Distributed computing works by splitting up the larger task into smaller chunks
which can be performed at the same time independently of each other.
For example, say your task is in the form of a linear sequence of repeated steps,
where the result of the previous step is needed to perform the subsequent step.
This task is not appropriate to distribution. Only one step can be performed at a
time. The main strength of distributed computing is to harness the tons of idle time
of computers in the world. There are ways to keep the details secret, but from a
technical viewpoint, they are all doomed to failure.


AIM OR OBJECTIVE OF THE PROPOSED SYSTEM
The proposed system’s prime objective is to develop a software system, which will
have distributed file sharing system, which should handle the center point of failure
of the system in the case of single server NAPSTER architecture.
The proposed system will adopt a GNUTELLA - MULTIPLE SERVER
DISTRIBUTED MODEL, wherein even if one of the server is unavailable, the other
servers would substitute for the unavailable server by the databse replication.
Moreover the client use a Peer-peer network approach to enble direct
communication process without burdening of the server.


EXISTING SYSTEM
  There are lots of file sharing software existing, but commonly used one is the
  NAPSTER architecture.in NAPSTER architecture, a central directory server is
  responsible for holding the addressability information of the connected
  connected clients
   The major demerit of the above system is that if the ventral server collapses,
   then the entire network communication would collapse and come to a stand-still
   To eliminate the above demerit, there arose another architecure called
   GNUTELLA

PROPOSED SYSTEM ADVANTAGES
   This GNUTELLA architecture consists of clients gets connected to one another,
   where all the clients uses peer-peer communication. It will also use the
   MULTIPLE server model which helps all the clients to use the centralized
   server and accesses the database, along with peer-peer networks.
   In this model, all the clients are connected to one another and can
   communicate with one another with three servers and one client successfully
   connects to either of them.
All the nodes demand increases in parallel with all the clients, including
   bandwidth, storage space and computing power. Thus the total capacity of the
   system also increases.
   The distributed nature of peer-to-peer networks also increases robustness in
   case of failures by replicating data over multiple peers, and in pure P2P systems
   by enabling peers to find the data without relying on a centralized index server.


         PROPOSED SYSTEM HARDWARE REQUIREMENTS
HARDWARE
Processor   -     PIII or higher processor server and client
RAM         -     128 MB or higher
HDD         -     40 GB or higher
MONITOR -         LG/SAMSUNG colour
FDD - 1.44 MB / Keyboard / Mouse / ATX Cabinet

SOFTWARE
OPERATING SYSTEM          :     WIN 2000 / WIN XP / WIN 98
SOFTWARE                  :     JDK 1.3 OR HIGHER
NETWORK OS CLIENT         :     WINDOWS 98 Client
DATABASE                  :     ORACLE 8i


ABOUT THE PROPOSED PROJECT
A popular solution is the "Distributed Computing" model, where the task is split
up into smaller chunks and performed by the many computers owned by the
general public. Computers spend a lot of their time doing nothing.
With the recent popularity of the Internet, distributed computing has become
popular. The technology behind distributed computing is old, where it is usually
known as parallel computing. When people speak of parallel computing, it is
usually in the context of a local group of computers, owned by the same person or
organization, with good links between nodes.
Distributed computing, bringing in computers owned by the general public over the
world. The key issues here are that the computing power that we don’t own is still
used.


IN OUR PROJECT
   Files are stored in the client and not in the server. Only address ability
   information in the server
   Information about the client should be given before the client connection is
   made.
   The proposed system follows a MULTIPLE SERVER DISTRIBUTED MODEL
   where there are 3 servers, and when a client can successfully, connects to
   either of them, the respective session details and files they are sharing, are
   recorded, in the server database
ADVANTAGES OF PEER - TO - PEER NETWORKS
An important goal in peer-to-peer networks is that all clients provide resources,
including bandwidth, storage space, and computing power.
Thus, as nodes arrive and demand on the system increases, the total capacity of
the system also increases.
This is not true of a client-server architecture with a fixed set of servers, in which
adding more clients could mean slower data transfer for all users. In the latter
case, there is no single point of failure in the system.
When the term peer-to-peer was used to describe the NAPSTER network, it
implied that the peer protocol nature was important, but, in reality, the great
achievement of NAPSTER was the empowerment of the peers (i.e., the fringes of
the network) in association with a central index, which made it fast and efficient to
locate available content. The peer protocol was just a common way to achieve this.


ASSUMPTIONS
   1. The user knows the file name for the sharing concept
   2. Clients, Servers, IP addresses and port numbers are pre-defined
   3. The system should have minimum of three nodes

                       PROPOSED SYSTEM MODULES
A. SERVER MODULES
    1.   Client information
    2.   Client validation
    3.   Record the shared files
    4.   Files search result
    5.   Connection establishment with other servers
    6.   Client data updation
    7.   Active users list
    8.   Database replication
    9.   Shortest path simulation using DIJIKSTRA


B. CLIENT MODULES
    1. Login authentication
    2. Registration
    3. File sharing list
    4. Client file search request
    5. File transfer
    6. Account maintenance
    7. Connection with other servers

Contenu connexe

Plus de ncct

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 
A S P
A S PA S P
A S Pncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...ncct
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojectsncct
 
A S P
A S PA S P
A S Pncct
 

Plus de ncct (20)

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
 
A S P
A S PA S P
A S P
 

Dernier

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Java Abs Multithreaded Peer Peer Communication Using Dis

  • 1. MULTITHREADED PEER - PEER COMMUNICATION USING DISTRIBUTED FRAMEWORKS INTRODUCTION Distributed computing is a science which solves a large problem by giving small parts of the problem to many computers to solve and then combining the solutions for the parts into a solution for the problem. A type of computing in which a computational task is divided into subtasks that execute on a collection of networked computers. The networks are general- purpose networks (LANs, WANs, or the Internet) as opposed to dedicated cluster interconnects Computing systems in which services to users are provided by teams of computers collaborating over a network. Distributed computing is a programming model in which processing occurs in many different places (or nodes) around a network. Processing can occur wherever it makes the most sense, whether that is on a server, Web site, personal computer, handheld device, or other smart device. Distributed computing or Distributed system is the process of aggregating the power of several computing entities to collaboratively run a single computational task in a transparent and coherent way, so that they appear as a single, centralized system. Peer-to-peer — an architecture where there is no special machine or machines that provide a service or manage the network resources. Instead all responsibilities are uniformly divided among all machines, known as peers. A peer-to-peer (or P2P) computer network is a network that relies on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively few servers. P2P networks are typically used for connecting nodes via largely ad hoc connections. Such networks are useful for many purposes. Sharing content files containing audio, video, data or anything in digital format is very common, and realtime data, such as Telephony traffic, is also passed using P2P technology. The term "P2P network" can also mean grid computing. A pure peer-to-peer file transfer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both "clients" and "servers" to the other nodes on the network. This model of network arrangement differs from the client-server model where communication is usually to and from a central server. A typical example for a non peer-to-peer file transfer is an FTP server. One user uploads a file to the FTP server, then many others download it, with no need for the uploader and downloader to be connected at the same time.
  • 2. Some networks and channels, such as NAPSTER (now closed), OPENNAP, or IRC, use a client-server structure for some tasks (e.g., searching) and a peer-to- peer structure for others. Networks such as GNUTELLA or FREENET use a peer-to-peer structure for all purposes, and are sometimes referred to as true peer-to-peer networks, although GNUTELLA is greatly facilitated by directory servers that inform peers of the network addresses of other peers. Distributed computing works by splitting up the larger task into smaller chunks which can be performed at the same time independently of each other. For example, say your task is in the form of a linear sequence of repeated steps, where the result of the previous step is needed to perform the subsequent step. This task is not appropriate to distribution. Only one step can be performed at a time. The main strength of distributed computing is to harness the tons of idle time of computers in the world. There are ways to keep the details secret, but from a technical viewpoint, they are all doomed to failure. AIM OR OBJECTIVE OF THE PROPOSED SYSTEM The proposed system’s prime objective is to develop a software system, which will have distributed file sharing system, which should handle the center point of failure of the system in the case of single server NAPSTER architecture. The proposed system will adopt a GNUTELLA - MULTIPLE SERVER DISTRIBUTED MODEL, wherein even if one of the server is unavailable, the other servers would substitute for the unavailable server by the databse replication. Moreover the client use a Peer-peer network approach to enble direct communication process without burdening of the server. EXISTING SYSTEM There are lots of file sharing software existing, but commonly used one is the NAPSTER architecture.in NAPSTER architecture, a central directory server is responsible for holding the addressability information of the connected connected clients The major demerit of the above system is that if the ventral server collapses, then the entire network communication would collapse and come to a stand-still To eliminate the above demerit, there arose another architecure called GNUTELLA PROPOSED SYSTEM ADVANTAGES This GNUTELLA architecture consists of clients gets connected to one another, where all the clients uses peer-peer communication. It will also use the MULTIPLE server model which helps all the clients to use the centralized server and accesses the database, along with peer-peer networks. In this model, all the clients are connected to one another and can communicate with one another with three servers and one client successfully connects to either of them.
  • 3. All the nodes demand increases in parallel with all the clients, including bandwidth, storage space and computing power. Thus the total capacity of the system also increases. The distributed nature of peer-to-peer networks also increases robustness in case of failures by replicating data over multiple peers, and in pure P2P systems by enabling peers to find the data without relying on a centralized index server. PROPOSED SYSTEM HARDWARE REQUIREMENTS HARDWARE Processor - PIII or higher processor server and client RAM - 128 MB or higher HDD - 40 GB or higher MONITOR - LG/SAMSUNG colour FDD - 1.44 MB / Keyboard / Mouse / ATX Cabinet SOFTWARE OPERATING SYSTEM : WIN 2000 / WIN XP / WIN 98 SOFTWARE : JDK 1.3 OR HIGHER NETWORK OS CLIENT : WINDOWS 98 Client DATABASE : ORACLE 8i ABOUT THE PROPOSED PROJECT A popular solution is the "Distributed Computing" model, where the task is split up into smaller chunks and performed by the many computers owned by the general public. Computers spend a lot of their time doing nothing. With the recent popularity of the Internet, distributed computing has become popular. The technology behind distributed computing is old, where it is usually known as parallel computing. When people speak of parallel computing, it is usually in the context of a local group of computers, owned by the same person or organization, with good links between nodes. Distributed computing, bringing in computers owned by the general public over the world. The key issues here are that the computing power that we don’t own is still used. IN OUR PROJECT Files are stored in the client and not in the server. Only address ability information in the server Information about the client should be given before the client connection is made. The proposed system follows a MULTIPLE SERVER DISTRIBUTED MODEL where there are 3 servers, and when a client can successfully, connects to either of them, the respective session details and files they are sharing, are recorded, in the server database
  • 4. ADVANTAGES OF PEER - TO - PEER NETWORKS An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. This is not true of a client-server architecture with a fixed set of servers, in which adding more clients could mean slower data transfer for all users. In the latter case, there is no single point of failure in the system. When the term peer-to-peer was used to describe the NAPSTER network, it implied that the peer protocol nature was important, but, in reality, the great achievement of NAPSTER was the empowerment of the peers (i.e., the fringes of the network) in association with a central index, which made it fast and efficient to locate available content. The peer protocol was just a common way to achieve this. ASSUMPTIONS 1. The user knows the file name for the sharing concept 2. Clients, Servers, IP addresses and port numbers are pre-defined 3. The system should have minimum of three nodes PROPOSED SYSTEM MODULES A. SERVER MODULES 1. Client information 2. Client validation 3. Record the shared files 4. Files search result 5. Connection establishment with other servers 6. Client data updation 7. Active users list 8. Database replication 9. Shortest path simulation using DIJIKSTRA B. CLIENT MODULES 1. Login authentication 2. Registration 3. File sharing list 4. Client file search request 5. File transfer 6. Account maintenance 7. Connection with other servers