Beruflich Dokumente
Kultur Dokumente
CERTIFICATE OF APPROVAL
To the best of my knowledge, the content of the thesis does not form a
basis for the award of any previous Degree to any one else.
Head
Department of Computer Science
Birla Institute of Technology
Mesra , Ranchi - 835215
Preface
The well planned properly executed and evaluated training helps a lot in
including good culture. It provides linkage between the student and the
of an organization.
This report serves the purpose of elaborating the analysis and the
that have been included in the final implementation have been clearly
explained to make the project easy to understand. It has been taken care
that this document elicits the system development process in a clear and
well-documented manner.
Acknowledgement
us in training period but still from core of our heart we feel that the fruit of
success comes up with the emissive support of our colleagues and time to
time guidance from our respected Project Manager Mr. Rakesh Kumar.
The skill that we are able to explore here will definitely help us in our
future. The spirit of team working and coordination made us know our
competition. I feel, I was able to make all that due to timely support from
for giving us the opportunity to work with the organization. Friends you
might have heard about proverb that “Err is to Human”, so if you find
something better or something wrong then we’ll feel glad by your anytime
when required.
Company Profile
COMPANY PROFILE
Oops Info Solutions was established in 2003. It's foundation and purpose is to
provide and construct programs for existing companies and provide new and
exciting updates to primitive bases technology. Oops Info Solutionsstarted in
Mohali which is situated in Punjab India and was the one of the first to be opened
in the vicinity. Oops Info Solutionsfirst started with the education in India,
through their curriculum we were able to negotiate a service that was accessible
to all students and post Graduates (this continued with great success). We also
provide study materials i.e. program languages C, C++, Visual C++, VB, VB.Net,
ASP.Net, XML, Oracle 9i, Sql Server 2000, ASP, Java, and Advance Java,
Multimedia (Flash MX, Director MX, Fireworks MX, and Dreamweaver MX).
We now expand our network to other countries such as England, USA. This has
been met with much appreciation & support. Oops Info Solutionsnow in entering
its 4th successful year. Through networking we are able to provide a service to all
races of people.
1.1 OBJECTIVE
4. Stimulate and offer aid for research and development of the benefit of
manufactures End users Electronic Data Processing Systems.
In pursuit of these objectives, the Centre may engage in the following activities.
candidates, and monitor the interviewing and hiring process from beginning till
end.
1 Blog Site : - This site allow on line users to send the comments on the
specific topics. The other users can send reply to the comments. Managements
can view the overall comments and reply to different blogs.
2 University Management :- Manages the Universities to track the information
on line of different universities and colleges.
Contact information
SCO-110-111,
Top Floor,
Sector 34A,
Chandigarh.
iNDEX
9 Conclusion
49
ABSTRACT
CHAPTER-1
INTRODUCTION
INTRODUCTION
Peer-to-peer is a type of network in which each work-station has equivalent
capabilities and responsibilities. This differs from client/server architecture in
which some computers are dedicated to serve others.
Peer-to-peer (P2P) networks are increasingly becoming popular
because they offer opportunities for real-time communication, ad-hoc
collaboration and information sharing in a large-scale distributed environment.
Peer-to-peer computing is defined as the sharing of computer resources and
information through direct exchange.
The most distinct characteristic of P2P computing is that there is
symmetric communication between the peers; each peer has both a client and a
server role. The advantages of the P2P systems are multi-dimensional; they
improve scalability by enabling direct and real timesharing of services and
information; enable knowledge sharing by aggregating information and resources
from nodes that are located on geographically distributed and potentially
heterogeneous platforms; and, provide high availability by eliminating the need
for a single centralized component.
which each party has the same capabilities and either party can initiate a
communication session". So we could define P2P as direct communication or
collaboration (mostly file-sharing) between computers, where none are simply
client or server, but all machines are equals - peers. In that case, P2P is at least 30
years old. With this definition, communication between two servers is P2P. It
could even be argued that telephones and email are P2P.
The basic idea is that two computing devices (peers) share resources
and information with each other, with both acting as a kind of mini-server, that
is to say neither is specifically a client or server.
1.1.1 Past
Before we had P2P, one of the big favorites for companies to use was B2C. B2C
stands for "Business-To-Consumer".
The history of P2P cannot be recounted without reference to Napster, the software
that brought P2P into the mainstream. Napster became the single most popular
P2P application literally overnight.
Napster's winning idea was in giving P2P, for free, to the masses. At
the same time as Napster was released three factors greatly increased its mass
popularity - higher bandwidth, more powerful desktop processors and cheaper
storage. Since the Napster case, many other P2P programs have surfaced
including Gnutella, KaZaa and Winmp.
1.1.2 Present
The growth in the number of P2P technology users has been exponential since the
birth of Napster. The vacuum left by Napster's demise has been filled by
numerous other companies/applications, with Kazaa and Gnutella dominating the
market. It has been reported that these two account for between 40% and 60% of
all traffic on the Internet. In recent years we have seen P2P technologies being
embraced by large companies trying to tap its vast potential. Two of the more
notable examples of this are Deloitte & Touché, and Intel. Central databases are
no longer required when using P2P. This means it can be less expensive and far
easier to scale. Intel has been using P2P since 1992, thus avoiding the need for a
large server. Traditional databases are still commonplace today, but as increasing
numbers of companies follow the example of organizations like Intel, such
databases could be overtaken and replaced by P2P.
1.1.3 Future
It's hard to know what the future of P2P is until the legal situation becomes clear.
Companies will have to expend significant resources to protect themselves
against lawsuits. There will always be illegal file-sharing and copyright
infringement, but these will be at the periphery. A lot depends on the legislation
drawn up by governments in response to P2P.
CHAPTER-2
PEER TO PEER NETWORKS
Traditional Peer-to-Peer
architecture which consists of one higher performance system, the SERVER and
several lower performance systems, the clients is called as Client/Server network.
The central server system provides a single point of failure and a visible target for
legal attacks on the network. Also because the central server index is only
updated periodically there is a possibility of client receiving outdated information.
They are more rugged, because a single point of failure is eliminated. They are
also harder to shut down.
Searching a decentralized network is slower. You are not guaranteed to find a file
even if it is on the network because it may be too far away for a search request to
reach the peer which has it before the TTL expires.
CHAPTER-3
P2P MODELS
P2P MODELS
The Current article deals with the models of p2p communication including Pure,
Hybrid and Federated p2p.It also describes the p2p architecture.
Figure 3 shows structure of a network where there are three peers and a discovery,
lookup, and content server. This last approach is here to only show that P2P
model can be reduced back to client/server model if we rely more and more on
the server. In this model peers (clients) upload all content that they have to
provide to central server so that any other peer can access the content even when
the provider is not online.
CHAPTER-4
GNUTELLA
Gnutella
"Gnutella is a very simple file sharing protocol that uses the principles of
peer-to-peer networking to allow users to share data".
The Gnutella protocol (current version 0.4) is run over TCP/IP a connection-
oriented network protocol. A typical session comprises a client connecting to a
server. The client then sends a Gnutella packet advertising its presence. This
advertisement is propagated by the servers through the network by recursively
forwarding it to other connected servers. All servers that receive the packet reply
with a similar packet about themselves.
Queries are propagated in the same manner, with positive responses being routed
back the same path. When a resource is found and selected for downloading, a
direct point to point connection is made between the client and the host of the
resource, and the file downloaded directly using HTTP. The server in this case
will act as a web server capable of responding to HTTP GET requests.
Where:
Message ID in conjunction with a given TCP/IP connection is used to uniquely
identify a transaction.
Function ID is one of: Advertisement [response], Query [response] or Push-
Request.
TTL is the time-to-live of the packet, i.e. how many more times the packets will
be forwarded.
Hops count the number of times a given packet is forwarded.
Payload length is the length in bytes of the body of the packet.
CHAPTER-5
FREENET
Freenet
Freenet enables users to share unused disk space, just like systems
like distributed.net enable ordinary users to share unused CPU cycles. The system
operates at the application layer and assumes the existence of a secure transport
layer, although it is transport-independent.
1. Keys are passed along from node to node through a chain of requests in which
each node makes a local decision about where to send the request next, in the
style of IP (Internet Protocol) routing.
2. Depending on the key requested the routes would vary.
Advantages:
1. Freenet is solving many of the problems seen in centralized networks.
2. Freenet also removes the single point of attack for censors and the single point
of technical failure.
Disadvantages:
1. It is designed for file distribution and not fixed storage. It is NOT intended to
guarantee permanent file storage.
2. Freenet does not yet have a search system, because designing a search system
which is sufficiently efficient and anonymous can be difficult.
3. The node operators cannot be held responsible for what is being stored on its
hard drive.
CHAPTER-6
MOBILE P2P
6.1 Introduction
6.2 Architecture
The proposed mobile peer-to-peer architecture is shown in Fig. 1. All of the peer-
to-peer communication entities that have a common set of interest and obey a
common set of policies construct one peer-to-peer community. This architecture
consists of the following basic components:
Peer-to-peer node: The peer-to-peer node is an independent communication
entity in the peer-to-peer network. It can be a mobile device, a PDA, a personal
computer, a server or a workstation, or any of a variety of devices.
Mobile proxy: Theoretically, all the mobile devices (e.g. WAP or i-mode
terminals) can be independent nodes in the peer-to- peer architecture. However
some of them are functionally limited and can not act as autonomous nodes. The
mobile proxy is a function in a node, which acts as a proxy for the mobile devices
with constrained capability, so that these mobile devices can join the peer-to-peer
architecture.
6.4 Technologies
There are several technologies to choose from when designing wireless home
computing environment. Here we will concentrate only to the two most important
ones: Bluetooth and WLAN.
Bluetooth
Bluetooth is a wireless low-power, low-cost technology that is designed for short
range wireless communication. Specification is developed by Bluetooth Special
Interest Group. It is designed to smooth wireless communication between PDAs,
laptops and other similar devices. Bluetooth works in the frequency band of 2.4
GHz. Even though it has been a long time since Bluetooth was published, devices
that support Bluetooth have been appearing quite slowly. However, now there are
many devices, and chips have become relatively cheap as originally intended.
Bluetooth is ideal in indoor communications since its range is very short, about
10 meters. It has many advantages in home environment in addition to being
wireless. There has been news flashes about high technology homes in which
television can communicate with refrigerator. With Bluetooth this becomes quite
easy. Every Bluetooth chip can communicate with each other and every chip has
its own identity. It is possible for example to use Bluetooth chip as a key that
opens door when person approaches his home. When entering, the chip might
connect to the lighting system and turn on the lights while refrigerator would
upload shopping list to person’s PDA. Possibilities are endless.
Bluetooth’s close range throughput is 1 Mbps so it doesn’t
compete with WLAN with its speed. However, Bluetooth can be an optimal
solution for devices like printers and MP3 players that don’t need large data flow.
Actually, Bluetooth can be used to create a so called Personal Area Network
(PAN) that transfers data with mobile devices that can be carried all the time.
Wireless LAN
Wireless LAN (name WLAN is used here to refer to the IEEE standard 802.11b)
is a communications system that can be used to replace or extend wired LAN.
WLAN is actually an IEEE standard which means that different products work
well together.
WLAN operates in the radio frequencies just like Bluetooth but its
main advantage over Bluetooth is its fastness. WLANs throughput can be as high
as 11 Mbps. It typically needs an access point that connects it to the wired
network but it can also be used in “P2P mode” that lets two computers
communicate whenever they are in the range of each other. WLAN that works in
“P2P mode” have exactly the same advantages than Bluetooth network but it is
much more expensive. However, when large throughput or longer ranges are
needed WLAN is superior to Bluetooth. As WLAN cards are quite high-priced,
building the same kind of network with them as with Bluetooth chips is way too
expensive for most people. It makes no sense to add WLAN cards to refrigerators
and devices like that so it is worth thinking a little bit before choosing between
WLAN and Bluetooth. Actually, there is no need to choose, because the two
technologies are complementary and can be used together to fill anyone’s needs at
least in home environment.
that data is encrypted with a key that can be used only by the intended recipient
of the data.
Traditional WLAN security includes the use of Service Set Identifiers (SSIDs),
open or shared-key authentication, static WEP keys and optional Media Access
Control (MAC) authentication. This combination offers a rudimentary level of
access control and privacy, but each element can be compromised.
ATTACKING A WLAN NETWORK
2. Tampering: The attacker can modify the content of the intercepted packets
from the wireless network and this result in a loss of data integrity.
8. Mac spoofing– Identity theft: Many enterprises secure their wireless LAN
with authentication based on an authorized list of MAC addresses. Any
user can easily change the MAC address of a station or access point to
change its 'identity' and defeat MAC address-based authentication.
Software tools such as Kismet or Ethereal are available for hackers to
easily pick off the MAC addresses of an authorized user. The hacker can
then assume the identity of that user by asserting the stolen MAC address
as his own.
to complete the attack and defeat the VPN. The hacker sends a spoofed
reply, with large sequence number, which bumps the victim's station off the
network and keeps it from re-associating (i.e. 0x00ffffff). The hacker then
enters the network as the authorized station.
Moving security from access points to a wiring closet: Access points are
situated for ideal throughput and coverage, and as a result are often
positioned in an open setting where they are exposed. Unscrupulous
visitors and careless employees can easily move, replace, or reset them
with alarming ease. When also considering the fact that many vendors
are equipping the access points themselves with security measures, it is
important to ensure the integrity of your WLAN’s security by splitting out
security from the physical access points to storage in a secured wiring
closet.
CONCLUSION
It is preferable to have only one access point and make it run under a secure
operating system like Linux. It is better to occasionally boot up and trap
sections of traffic to look for any attack signatures. The user must connect
via a VPN, the access point is secured so it cannot be reset, WEP is enabled,
and access point is in a position that limits travel of the radio frequency
outside of the premises. The traffic between the access point and the LAN
passes through a firewall to help block any possible DoS attacks on the
WLAN from entering the enterprise LAN. WLANs are definitely here to
stay, but pose definite security issues which can be minimized.
CHAPTER-7
P2P SECURITY
Overview
P2p security.
P2P networks are not just about communication between devices on the wire.
Security is a prerequisite for many of the meaningful interactions and scalability
in the p2p world. In addition to the traditional security primitives like
Confidentiality, Integrity and Availability, factors like privacy, DRM and identity
management are fundamentally required to make a P2P network effective.
CHAPTER-8
P2P APPLICATIONS
At a personal level, at home we all have come across devices that are at a
different computer than the one we want. P2P networks could help here -
for example a fast CD burner could be accessed via P2P network from any
other computer in the network.
CHAPTER-9
CONCLUSION
It seems that P2P technology is still evolving and all of its capabilities haven’t
even been found yet. However, there is no doubt that P2P is here to stay and quite
likely it will replace client/server model in the near future.
P2P communication model seems to fit perfectly to home
environments where there are many different devices and it is crucial that they are
able to communicate with each other. Using P2P model home networks can orient
themselves to the most effective form and P2P networks become much cheaper
than centrally managed networks. Interoperability of different digital devices
definitely is something that has been waited for and it opens huge amount of
possibilities when designing home of the future.
BIBLIOGRAPHY
References
[1] Tommo Reti, Yki Kortesniemi and Mikko Välimäki, “Broadcasting
Commercial Data on Mobile Peer-to-Peer Networks” Tokyo Mobile Roundtable
2002.
Web sites
http://www.peer-to-peerwg.org/
http://www.openp2p.com
http://www.yahoo.com