Abstract-
In this paper we are going to review on Peer to peer networking being pursued by couple of research papers, to get an idea of latest upcoming technology on given topic. Peer to peer system is more than file sharing; it is a distributed application architecture that partitions task between peers. It common aspects are fault tolerance, Redundancy, Shared resources, decentralized management, self-administration and so on. In this research of project have five topics where give an overview results for better future.
Index Term: Social Networking service, modelling, decentralized service, Semantic small world, Service Capacity.
Social Networking Service based on Peer-to-Peer Network
Introduction
In this paper, an internet-based application wants a selection of requirements, i.e. security, extensibility, reliability, flexibility and Quality of services (QOS). To get all these required services they have to pay high cost. But, P2P (Peer to Peer) communication system gives much easier results for all kinds of distributed resources for accessing. For the most part, the P2P communication technology gives a support of sharing assets of clients on an assortment of wired or remote systems utilizing terminals of the clients under a universal situation. In other words, as the correspondence environment and an individual terminal 's execution are enhanced, requests of substance sharing and administration interworking between diverse gadgets, whenever and anyplace, are expanding.
With working with a Peer to Peer (P2P) network, it’s a type of approach used in computer networking that means every computer will share responsibility for any data processing. This type of networking is common in small local LANs (local area networks), typically found in home networking and even small businesses. This type of network can be wireless and even
The first recommendation is for Dirt Bikes’ to introduce a local area network to allow all the computers to communicate with one
The networking of the system is recommended after a system study and the fact that there has been a 100% expansion of the demand for the system- from 5 to 50 have been noted. It is also shown that as of now there are machines that are stand alone with windows 7 operating system. The task is to provide a network connectivity that would provide direct connections between the employees, and be centralized in the operation. This essentially requires the creation of a network. This means that all the computers must be installed with a network card and this would be the case with windows 7. The question then comes is if there must be windows networking or use other protocols. We can also partly use the most modern practical solutions.
Security is always the main issue for a network, when it is a wireless system the security becomes the main concern for a user. A wireless P2P network is suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also include to use a node bandwidth and increase the Delay of Service for other host over the network. This work is basically based on such type of attack. There are some system that exists on same attack model by comparing the hop time and some other means. But in all such system the Detection system is performed on a centralized system. We are proposing and intelligent predictive system
Peer-to-Peer file sharing is a more unorthodox way of obtaining files because instead of going through a web browser to get files, computer users use software such as Limewire and Vuze to access the files on other user’s computers. These file sharing software find as many computers as they can with the files that they are looking for, divide up the information necessary among the computers, and download a fraction of information from each computer. Each computer is given the title “peer” if it is utilized in the
It is mainly used in small business with ten employees or less. Anymore, and the network can become unstable. In a Peer to Peer each workstation is an administrator and the security is less to be desired. There is almost no central security within the shared network. The only security is a password can be added to your shared file. A different password can be given out to others as read only. Downloading programs and files from the internet are not monitored. Shared documents would be another uncontrolled action which will cause problems.
The network that I devised is both a peer to peer and a server based network. Reason
C/S systems are easier to produce than P2P systems [9]. The proposed network uses C/S techniques; allowing a relatively easy implementation, making this system a possible solution to the C/S scalability issues in a normal C/S network.
d) Why do you have more flexibility with LAN service than with WAN service? Why? [374]
Have you ever heard of peer to peer file sharing technology or P2P? What is P2P? According to J.A Pouwelse. P. Garbacki and his article “The Bittorrent P2P File-Sharing System: Measurements and Analysis”, “P2P is the transfer of a digital file from one “peer” to another. “peer” refers to computer clients. This transfer can be as simple as the File Transfer Protocol(FTP), which transfer a file directly to a visitor’s personal computer through a server-hosted website (Pouwelse, Garbacki, Epema, Sip, 2005).” File sharing create many ethical issues, but these ethical issues can be different if we are looking at it morally, ethically or legally. Moral is an individual’s belief about right or wrong. Not everyone will have the same moral beliefs because they have different background or culture. For examples, we can see many people streaming many document online and or sharing this document and these people do not consider this issue a problem. If we look at it in an author stand point we might consider this issue a problem since it influences our benefit. On the other hand, if we are looking at a user standpoint, we do not think it is a problem because we are not paying for the information we are accessing. We can conclude, that It depends on your cultural belief. Ethic is a belief that depends on the society. The society or a group determines if a situation is good or bad. An individual cannot change the ethical belief unless a group. This can be
Before going further on this document, first we need discuss some basics of networking, so that it would be easy to understand the topics easily.
In this report, we make a research about network internet services application. After we discus about this network internet services application we will choose to research about SAMBA because it use is extensive in businesses, governments, and organizations. After going through this report the reader will able to:
Modern day computing systems rely on a distributed system for data, functions and services. Arguably all popular software such as Uber, Spotify, Facebook and Fitbit among others, host their data and applications on dedicated servers to allow for user access services through their devices. The challenge with server based systems is that the integrity and security of private data is left out to third parties, nowadays established as corporations who offer hosting services for applications database and file storage. The main advantage of cloud based models is that customers do not have to pay for the installation of data storage and processing capabilities for applications (Jadeja,
In the Distributed Operating System, different computers are connected together. With this kind of connection, the kind of topology in this system is hierarchical system. Hierarchical system topology, involves a server/client pattern that is used by the databases, distributed systems, and web servers (Grant, 2014). With this hierarchical system, information from different sources, root servers, flow to the next servers. Here different clients are connected and are able to receive and send their information.
Management of access to LAN LAN performance and Support issues & Viruses on LAN Submitted By : Kalyan Gaddam Tutor: vidya ID : i144462 Cohort No : 70714 Table of Contents INTRODUCTION 4 1.management of acess to local area computer network Descretionary Access Control………………………………………………………………………………………………………5 Mandatory Access Control………………………………………………………………………………………………………….. 5 Role Based Access Control……………………………………………………………………………………………………………6 1.1 Resources whose access can be managed 6 1.1.1 Hard disk 6 1.1.2 Print server 7 1.1.3 Folders 7 1.2 Level of access for user, operator and administrator 8 1.2.1 User 8 1.2.2 Operator 8 1.2.3 Administrator 8 1.3 Methods of controlling access 9 1.3.1 Personal Identification 9 1.3.2 Directory 9 1.3.3 File 9 1.3.4 Temporal 9 1.3.5 Location 9 1.4 Access to an Audit Trail 9 2. Explain Local Area Network performance issues 10 2.1 How Network Response Times are affected for the following 10 2.1.1 Speed of Devices 10 2.1.2 Bandwidth of Transmission Line 10 2.1.3 Queuing at nodes 10 2.1.4