SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
MULTITHREADED PEER - PEER
      COMMUNICATION USING
    DISTRIBUTED FRAMEWORKS
INTRODUCTION
Distributed computing is a science which solves a large problem by giving small
parts of the problem to many computers to solve and then combining the solutions
for the parts into a solution for the problem.
A type of computing in which a computational task is divided into subtasks that
execute on a collection of networked computers. The networks are general-
purpose networks (LANs, WANs, or the Internet) as opposed to dedicated cluster
interconnects
Computing systems in which services to users are provided by teams of computers
collaborating over a network. Distributed computing is a programming model in
which processing occurs in many different places (or nodes) around a network.
Processing can occur wherever it makes the most sense, whether that is on a
server, Web site, personal computer, handheld device, or other smart device.
Distributed computing or Distributed system is the process of aggregating the
power of several computing entities to collaboratively run a single computational
task in a transparent and coherent way, so that they appear as a single,
centralized system.
Peer-to-peer — an architecture where there is no special machine or machines
that provide a service or manage the network resources. Instead all responsibilities
are uniformly divided among all machines, known as peers.
A peer-to-peer (or P2P) computer network is a network that relies on the
computing power and bandwidth of the participants in the network rather than
concentrating it in a relatively few servers. P2P networks are typically used for
connecting nodes via largely ad hoc connections.
Such networks are useful for many purposes. Sharing content files containing
audio, video, data or anything in digital format is very common, and realtime data,
such as Telephony traffic, is also passed using P2P technology. The term "P2P
network" can also mean grid computing.
A pure peer-to-peer file transfer network does not have the notion of clients or
servers, but only equal peer nodes that simultaneously function as both "clients"
and "servers" to the other nodes on the network. This model of network
arrangement differs from the client-server model where communication is usually
to and from a central server.
A typical example for a non peer-to-peer file transfer is an FTP server. One user
uploads a file to the FTP server, then many others download it, with no need for
the uploader and downloader to be connected at the same time.
Some networks and channels, such as NAPSTER (now closed), OPENNAP, or
IRC, use a client-server structure for some tasks (e.g., searching) and a peer-to-
peer structure for others.
Networks such as GNUTELLA or FREENET use a peer-to-peer structure for all
purposes, and are sometimes referred to as true peer-to-peer networks, although
GNUTELLA is greatly facilitated by directory servers that inform peers of the
network addresses of other peers.
Distributed computing works by splitting up the larger task into smaller chunks
which can be performed at the same time independently of each other.
For example, say your task is in the form of a linear sequence of repeated steps,
where the result of the previous step is needed to perform the subsequent step.
This task is not appropriate to distribution. Only one step can be performed at a
time. The main strength of distributed computing is to harness the tons of idle time
of computers in the world. There are ways to keep the details secret, but from a
technical viewpoint, they are all doomed to failure.


AIM OR OBJECTIVE OF THE PROPOSED SYSTEM
The proposed system’s prime objective is to develop a software system, which will
have distributed file sharing system, which should handle the center point of failure
of the system in the case of single server NAPSTER architecture.
The proposed system will adopt a GNUTELLA - MULTIPLE SERVER
DISTRIBUTED MODEL, wherein even if one of the server is unavailable, the other
servers would substitute for the unavailable server by the databse replication.
Moreover the client use a Peer-peer network approach to enble direct
communication process without burdening of the server.


EXISTING SYSTEM
  There are lots of file sharing software existing, but commonly used one is the
  NAPSTER architecture.in NAPSTER architecture, a central directory server is
  responsible for holding the addressability information of the connected
  connected clients
   The major demerit of the above system is that if the ventral server collapses,
   then the entire network communication would collapse and come to a stand-still
   To eliminate the above demerit, there arose another architecure called
   GNUTELLA

PROPOSED SYSTEM ADVANTAGES
   This GNUTELLA architecture consists of clients gets connected to one another,
   where all the clients uses peer-peer communication. It will also use the
   MULTIPLE server model which helps all the clients to use the centralized
   server and accesses the database, along with peer-peer networks.
   In this model, all the clients are connected to one another and can
   communicate with one another with three servers and one client successfully
   connects to either of them.
All the nodes demand increases in parallel with all the clients, including
   bandwidth, storage space and computing power. Thus the total capacity of the
   system also increases.
   The distributed nature of peer-to-peer networks also increases robustness in
   case of failures by replicating data over multiple peers, and in pure P2P systems
   by enabling peers to find the data without relying on a centralized index server.


         PROPOSED SYSTEM HARDWARE REQUIREMENTS
HARDWARE
Processor   -     PIII or higher processor server and client
RAM         -     128 MB or higher
HDD         -     40 GB or higher
MONITOR -         LG/SAMSUNG colour
FDD - 1.44 MB / Keyboard / Mouse / ATX Cabinet

SOFTWARE
OPERATING SYSTEM          :     WIN 2000 / WIN XP / WIN 98
SOFTWARE                  :     JDK 1.3 OR HIGHER
NETWORK OS CLIENT         :     WINDOWS 98 Client
DATABASE                  :     ORACLE 8i


ABOUT THE PROPOSED PROJECT
A popular solution is the "Distributed Computing" model, where the task is split
up into smaller chunks and performed by the many computers owned by the
general public. Computers spend a lot of their time doing nothing.
With the recent popularity of the Internet, distributed computing has become
popular. The technology behind distributed computing is old, where it is usually
known as parallel computing. When people speak of parallel computing, it is
usually in the context of a local group of computers, owned by the same person or
organization, with good links between nodes.
Distributed computing, bringing in computers owned by the general public over the
world. The key issues here are that the computing power that we don’t own is still
used.


IN OUR PROJECT
   Files are stored in the client and not in the server. Only address ability
   information in the server
   Information about the client should be given before the client connection is
   made.
   The proposed system follows a MULTIPLE SERVER DISTRIBUTED MODEL
   where there are 3 servers, and when a client can successfully, connects to
   either of them, the respective session details and files they are sharing, are
   recorded, in the server database
ADVANTAGES OF PEER - TO - PEER NETWORKS
An important goal in peer-to-peer networks is that all clients provide resources,
including bandwidth, storage space, and computing power.
Thus, as nodes arrive and demand on the system increases, the total capacity of
the system also increases.
This is not true of a client-server architecture with a fixed set of servers, in which
adding more clients could mean slower data transfer for all users. In the latter
case, there is no single point of failure in the system.
When the term peer-to-peer was used to describe the NAPSTER network, it
implied that the peer protocol nature was important, but, in reality, the great
achievement of NAPSTER was the empowerment of the peers (i.e., the fringes of
the network) in association with a central index, which made it fast and efficient to
locate available content. The peer protocol was just a common way to achieve this.


ASSUMPTIONS
   1. The user knows the file name for the sharing concept
   2. Clients, Servers, IP addresses and port numbers are pre-defined
   3. The system should have minimum of three nodes

                       PROPOSED SYSTEM MODULES
A. SERVER MODULES
    1.   Client information
    2.   Client validation
    3.   Record the shared files
    4.   Files search result
    5.   Connection establishment with other servers
    6.   Client data updation
    7.   Active users list
    8.   Database replication
    9.   Shortest path simulation using DIJIKSTRA


B. CLIENT MODULES
    1. Login authentication
    2. Registration
    3. File sharing list
    4. Client file search request
    5. File transfer
    6. Account maintenance
    7. Connection with other servers

Contenu connexe

Plus de ncct

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 
A S P
A S PA S P
A S Pncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...ncct
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojectsncct
 
A S P
A S PA S P
A S Pncct
 

Plus de ncct (20)

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
 
A S P
A S PA S P
A S P
 

Dernier

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 

Dernier (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

Java Abs Multithreaded Peer Peer Communication Using Dis

  • 1. MULTITHREADED PEER - PEER COMMUNICATION USING DISTRIBUTED FRAMEWORKS INTRODUCTION Distributed computing is a science which solves a large problem by giving small parts of the problem to many computers to solve and then combining the solutions for the parts into a solution for the problem. A type of computing in which a computational task is divided into subtasks that execute on a collection of networked computers. The networks are general- purpose networks (LANs, WANs, or the Internet) as opposed to dedicated cluster interconnects Computing systems in which services to users are provided by teams of computers collaborating over a network. Distributed computing is a programming model in which processing occurs in many different places (or nodes) around a network. Processing can occur wherever it makes the most sense, whether that is on a server, Web site, personal computer, handheld device, or other smart device. Distributed computing or Distributed system is the process of aggregating the power of several computing entities to collaboratively run a single computational task in a transparent and coherent way, so that they appear as a single, centralized system. Peer-to-peer — an architecture where there is no special machine or machines that provide a service or manage the network resources. Instead all responsibilities are uniformly divided among all machines, known as peers. A peer-to-peer (or P2P) computer network is a network that relies on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively few servers. P2P networks are typically used for connecting nodes via largely ad hoc connections. Such networks are useful for many purposes. Sharing content files containing audio, video, data or anything in digital format is very common, and realtime data, such as Telephony traffic, is also passed using P2P technology. The term "P2P network" can also mean grid computing. A pure peer-to-peer file transfer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both "clients" and "servers" to the other nodes on the network. This model of network arrangement differs from the client-server model where communication is usually to and from a central server. A typical example for a non peer-to-peer file transfer is an FTP server. One user uploads a file to the FTP server, then many others download it, with no need for the uploader and downloader to be connected at the same time.
  • 2. Some networks and channels, such as NAPSTER (now closed), OPENNAP, or IRC, use a client-server structure for some tasks (e.g., searching) and a peer-to- peer structure for others. Networks such as GNUTELLA or FREENET use a peer-to-peer structure for all purposes, and are sometimes referred to as true peer-to-peer networks, although GNUTELLA is greatly facilitated by directory servers that inform peers of the network addresses of other peers. Distributed computing works by splitting up the larger task into smaller chunks which can be performed at the same time independently of each other. For example, say your task is in the form of a linear sequence of repeated steps, where the result of the previous step is needed to perform the subsequent step. This task is not appropriate to distribution. Only one step can be performed at a time. The main strength of distributed computing is to harness the tons of idle time of computers in the world. There are ways to keep the details secret, but from a technical viewpoint, they are all doomed to failure. AIM OR OBJECTIVE OF THE PROPOSED SYSTEM The proposed system’s prime objective is to develop a software system, which will have distributed file sharing system, which should handle the center point of failure of the system in the case of single server NAPSTER architecture. The proposed system will adopt a GNUTELLA - MULTIPLE SERVER DISTRIBUTED MODEL, wherein even if one of the server is unavailable, the other servers would substitute for the unavailable server by the databse replication. Moreover the client use a Peer-peer network approach to enble direct communication process without burdening of the server. EXISTING SYSTEM There are lots of file sharing software existing, but commonly used one is the NAPSTER architecture.in NAPSTER architecture, a central directory server is responsible for holding the addressability information of the connected connected clients The major demerit of the above system is that if the ventral server collapses, then the entire network communication would collapse and come to a stand-still To eliminate the above demerit, there arose another architecure called GNUTELLA PROPOSED SYSTEM ADVANTAGES This GNUTELLA architecture consists of clients gets connected to one another, where all the clients uses peer-peer communication. It will also use the MULTIPLE server model which helps all the clients to use the centralized server and accesses the database, along with peer-peer networks. In this model, all the clients are connected to one another and can communicate with one another with three servers and one client successfully connects to either of them.
  • 3. All the nodes demand increases in parallel with all the clients, including bandwidth, storage space and computing power. Thus the total capacity of the system also increases. The distributed nature of peer-to-peer networks also increases robustness in case of failures by replicating data over multiple peers, and in pure P2P systems by enabling peers to find the data without relying on a centralized index server. PROPOSED SYSTEM HARDWARE REQUIREMENTS HARDWARE Processor - PIII or higher processor server and client RAM - 128 MB or higher HDD - 40 GB or higher MONITOR - LG/SAMSUNG colour FDD - 1.44 MB / Keyboard / Mouse / ATX Cabinet SOFTWARE OPERATING SYSTEM : WIN 2000 / WIN XP / WIN 98 SOFTWARE : JDK 1.3 OR HIGHER NETWORK OS CLIENT : WINDOWS 98 Client DATABASE : ORACLE 8i ABOUT THE PROPOSED PROJECT A popular solution is the "Distributed Computing" model, where the task is split up into smaller chunks and performed by the many computers owned by the general public. Computers spend a lot of their time doing nothing. With the recent popularity of the Internet, distributed computing has become popular. The technology behind distributed computing is old, where it is usually known as parallel computing. When people speak of parallel computing, it is usually in the context of a local group of computers, owned by the same person or organization, with good links between nodes. Distributed computing, bringing in computers owned by the general public over the world. The key issues here are that the computing power that we don’t own is still used. IN OUR PROJECT Files are stored in the client and not in the server. Only address ability information in the server Information about the client should be given before the client connection is made. The proposed system follows a MULTIPLE SERVER DISTRIBUTED MODEL where there are 3 servers, and when a client can successfully, connects to either of them, the respective session details and files they are sharing, are recorded, in the server database
  • 4. ADVANTAGES OF PEER - TO - PEER NETWORKS An important goal in peer-to-peer networks is that all clients provide resources, including bandwidth, storage space, and computing power. Thus, as nodes arrive and demand on the system increases, the total capacity of the system also increases. This is not true of a client-server architecture with a fixed set of servers, in which adding more clients could mean slower data transfer for all users. In the latter case, there is no single point of failure in the system. When the term peer-to-peer was used to describe the NAPSTER network, it implied that the peer protocol nature was important, but, in reality, the great achievement of NAPSTER was the empowerment of the peers (i.e., the fringes of the network) in association with a central index, which made it fast and efficient to locate available content. The peer protocol was just a common way to achieve this. ASSUMPTIONS 1. The user knows the file name for the sharing concept 2. Clients, Servers, IP addresses and port numbers are pre-defined 3. The system should have minimum of three nodes PROPOSED SYSTEM MODULES A. SERVER MODULES 1. Client information 2. Client validation 3. Record the shared files 4. Files search result 5. Connection establishment with other servers 6. Client data updation 7. Active users list 8. Database replication 9. Shortest path simulation using DIJIKSTRA B. CLIENT MODULES 1. Login authentication 2. Registration 3. File sharing list 4. Client file search request 5. File transfer 6. Account maintenance 7. Connection with other servers