Dissertation > Excellent graduate degree dissertation topics show

The Research of Embedded File-Shared System Based on P2P Network

Author: AMaJi
Tutor: LuKai
School: National University of Defense Science and Technology
Course: Computer technology
Keywords: P2P JXTA DHT JVN JOSS JMPN Security
CLC: TP393.02
Type: Master's thesis
Year: 2007
Downloads: 31
Quote: 0
Read: Download Dissertation

Abstract


With the wide use of the embedded system we are entering a Back PC times that is characterized by the embedded system and pervasive computing. By the embedded systems’ connecting with each other, the pervasive computing can improve its ability of service and value of application. So how to make the embedded systems overcome the isomerism and do an efficient search or file sharing have become the most challenge so far. So our interest is focused on the file-shared system technology based on the P2P network in embedded system, spanned among deferent platforms, light, efficiently and highly safe, then implementing its prototype.1、Considering the strong dynamics of the P2P system, especially in the embedded environment, network topology’s coherence has more challenge. We researched the JVN virtual network and implemented it, making the communication among the peers without considering and managing the physical network topology which is complicated and simply changed.2、The resource localization of P2P network is the basic key technology during building P2P system. This paper built a JMPN hybrid resource localization model, drawing the advantages of centralized topology and distributed topology, high performance, easily flexible and managed. The empirical evaluation shows that the JMPN model is well adaptive and robust.3、To keep safe is an important question which limited the development of P2P network. Lots of fake data and cheated deeds affected the further spread of P2P applications with more and more appearances of hostile nodes in P2P network.This paper analyzed the hidden trouble from the aspects of the roles and behaviors of members, proposing a safety mechanism and peer group CA and transport safety protocol TLS based on peer group to make the node identification certification and the safe data transmission and integrality of data.At last, we performed a complete experimental test on the three-level network of CAPF. It shows that its performance improved while the system is become old. And system is some autonomous and fault tolerant, moderately efficiently multi-downloading ability, moderately response of the extreme non-uniform downloading.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  3. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  4. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  5. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  6. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  7. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  8. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  9. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  10. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  11. The Study of Social Security System of the Fishermen of Guangdong after the Beibu Gulf Demarcation,F323.89
  12. Health protection of migrant workers,D412.6
  13. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  14. Comprehensive Evaluation of Ecological Security of Land Application,X826
  15. Study on Evaluation Index System for Land Ecological Security,X826
  16. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  17. Research on Peer-to-Peer Traffic Identification Algorithm Based on Cluster Analysis,TP393.02
  18. Research on the Social Security of Fishermen under the Harmonious Society,D632.1
  19. Genetically Modified Food Ethics,B82-05
  20. On the systematic construction of the Chinese Communist Party democracy,D262.11
  21. The Analysis about Modes of Exchanging Land Contracted Management Right for Urban Social Security,D632.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer network architecture and design
© 2012 www.DissertationTopic.Net  Mobile