Você está na página 1de 5

Overview

A file system is the method of permanent storage of files and organizing those files so that it is easy to
find those files and access them. A distributed file system is conversely a network of file systems, which
provides the storage of the files among the commodity of connected computers. A typical configuration
of a DFS (Distributed File System) is a collection of workstations and mainframes connected by a local
area network (LAN). A DFS is implemented as part of the operating system of each of the connected
computers. One of the main drawbacks found in the prevailing file systems is the lack of the scalability.
While the scalability is possible up to some extent, continuous growth of larger files will result in the
requirement of storage capacity after reaching up to the maximum of local disk space. Some of the key
features of this project are Manipulation of files using Framework, Improved Scalability, Improved
reliability, Security (Using cryptography), Authentication.

Aim

Purpose of this project is to develop a distributed file system, which will be deployed on network of
commodity computers. The solution hides the complexities of saving/storage and retrieving files using
networked computers.

PROBLEM STATEMENT:

A file system is the method of permanent storage of files and organizing those files to make it
easy to find and access them. A distributed file system is conversely a network of file systems,
which provides the storage of files among the commodity of connected computers. One of the
main drawbacks found in the prevailing file systems is the lack of the scalability. While the
scalability is possible up to some extent, continuous growth of lager files will result in the
requirement of storage capacity after reaching up to the maximum of local disk space, in the
previous Ara.
OBJECTIVE:

Purpose of this project is to develop a distributed file system, which will be deployed on network
of commodity computers. The solution hides the complexities of saving and retrieving files using
networked computers, and exposes an API which allows users to interact with the system in a
simple, straight forward manner.

KEY FEATURES:

Manipulation of files using Framework;


Improved scalability;
Improved reliability;
Security(using cryptography);
Authentication;

WHATS NEW?

We will try to provide one to multi-client request and response is received by only that
client which has shortest distance from the requesting client (using Dijikstra);
We will provide visibility of the name of each connected system instead of IP addresses;
METHOD

Encryption:

Encryption is used for enforcing security in distributed systems. The work of


Needham and Schroeder is the basis for most of the current security mechanisms
in distributed systems. In their scheme, two entities wishing to communicate with
each other establish a key for conversation with the help of an authentication
server. It is important to note that the conversation key is determined by the
authentication server, but is never spent in plain (unencrypted) text to either of the
entities.

Splitting and Merging:

Original files are spited according to connected client then send to chuck data
randomly on client.

Encryption and Description:

In this method we encrypt the file (when client upload) and descript file (when the
client download) for high security purpose.

TCP/IP Protocol:

This protocol used for file transmission between client and server.

Development Method
The Waterfall Cycle Model is used in the development of the product which consists of 6 different
stages. Database tables have been created following with the Data Flow Diagrams, Entity
Relationship Diagram and Use Case diagram are also implemented as discussed in the first topic.
Next will be the implementation stage where the coding part will be implemented and will be
followed by testing where different testing methodologies will be carried out such as Black Box
Testing, White Box Testing, and Unit Testing.
UML CASE DIAGRAM

Listion Request

Registration

Login

Send Request

Received Request

Received file

Send file Client


Server
CONCLUSION

In this project we can learn and implement the file security. How to manage client and server
transmission on TCP/IP protocol and how to manage session of client. We can also learn file splitting and
merging and file encryption and description.

Você também pode gostar