F a FILE SHARING SERVICE for UNIVERSITIES BASED on CLOUD COMPUTING

Total Page:16

File Type:pdf, Size:1020Kb

F a FILE SHARING SERVICE for UNIVERSITIES BASED on CLOUD COMPUTING INTRODUCTON f A FILE SHARING SERVICE FOR UNIVERSITIES BASED ON CLOUD COMPUTING BY ALNTHEER MUHAMMED HASSAN ELSANOUSI INDEX NO. 084021 Supervisor DR/Muhammad Alkarouri REPORT SUPMITTED TO University Of Khartoum In partial fulfillment of the requirement for the degree B.Sc. (HONS) Electrical and Electronic Engineering (ELECTRONIC SYSTEMS SOFTWARE ENGINEERING) Faculty of Engineering Department of Electrical and Electronic Engineering July 2013 1 DECLARATION OF ORIGINALITY I declare that this report entitled “a file sharing service for universities based on Cloud computing ” is my own work except as cited in the references. The report has not been accepted for any degree and is not being submitted concurrently in candidature for any degree or other award. Signature: _________________________ Name: _________________________ Date: _________________________ DEDICATION ii To my portents, To my siblings, To my teachers’ To my friends and colleagues, To those who guided me throughout my journey and supported me all through the way. iii ACKNOWLEDGMENTS All praise and thanks is due to almighty God. I wish to thank him for all that he has gifted us with, though he can never be praised or thanked enough. I would like to give my deepest gratitude to our supervisor DR/Muhammad Alkarouri who offered valuable comments and advices throughout the condition of this project. Special thanks to the young engineers at the University of Khartoum and to my partners Awab Ahmed Almisbah and Omer khogli Imam for their cooperation and kind sharing to their efforts, time and knowledge. I would like to express my love and gratitude to my family; for their understanding and un-conditioning love and support during my life. Lastly, I offer my regards and blessing to all of those who supported me in any respect during the completion of the project. It goes without saying that I am deeply indebted to our esteemed university, which I am so proud to be one of its students. iv TABLE OF CONTENTS 1 INTRODUCTION .............................................................................................................................. 1 1.1 Introduction: ........................................................................................................................... 1 1.2 Project background: ............................................................................................................. 1 1.3 Problem statement: .............................................................................................................. 1 1.4 Motivation: ............................................................................................................................... 2 1.5 Project objectives .................................................................................................................. 2 1.6 Thesis layout ........................................................................................................................... 2 CHAPTER TWO ............................................................................................................................................. 3 2 LITERATURE REVIEW .................................................................................................................. 3 2.1 Introduction: ........................................................................................................................... 3 2.2 Historical background in cloud computing: ................................................................ 3 2.3 Definitions of cloud computing: ....................................................................................... 4 2.4 Classification of cloud computing services: ................................................................ 5 2.4.1 SOFTWARE AS A SERVICE (SAAS): .................................................................................. 5 2.4.2 PLATFORM AS A SERVICE (PAAS) .................................................................................... 5 2.4.3 INFRASTRUCTURE AS A SERVICE (IAAS) ......................................................................... 6 2.5 Hosting and employing cloud computing .................................................................... 6 2.5.1 Private cloud ................................................................................................................... 6 2.5.2 Community cloud ........................................................................................................... 6 2.5.3 Public cloud ..................................................................................................................... 7 2.5.4 Hybrid cloud .................................................................................................................... 7 2.6 Relationships in the cloud: ................................................................................................ 7 v 2.6.1 Cloud consumer .............................................................................................................. 7 2.6.2 Cloud provider ................................................................................................................ 7 2.6.3 Cloud auditor .................................................................................................................. 8 2.6.4 Cloud broker .................................................................................................................... 8 2.6.5 Cloud carrier ................................................................................................................... 8 2.7 Characteristics of cloud computing ................................................................................ 9 2.7.1 On Demand Self-Services ............................................................................................. 9 2.7.2 Broad network access .................................................................................................. 9 2.7.3 Resource pooling ......................................................................................................... 10 2.7.4 Rapid elasticity ............................................................................................................ 10 2.7.5 Measured service ........................................................................................................ 10 2.7.6 Multi Tenacity .............................................................................................................. 10 2.8 Applications and benefits of cloud computing: ...................................................... 11 2.9 Cloud services: ..................................................................................................................... 12 2.9.1 Offsite, provided by third-party provider ........................................................... 12 2.9.2 Accessed via the Internet.......................................................................................... 13 2.9.3 Minimal/no IT skills to “implement” .................................................................... 13 2.9.4 Provisioning .................................................................................................................. 13 2.9.5 Pricing ............................................................................................................................ 13 2.9.6 User Interface ............................................................................................................... 13 2.9.7 System Interface .......................................................................................................... 13 2.9.8 Shared Resources/common Versions ................................................................... 13 2.10 Barriers to the Adoption of Cloud Computing: ....................................................... 14 2.10.1 Interoperability ........................................................................................................... 14 2.10.2 Latency ........................................................................................................................... 14 vi 2.10.3 Platform or Language Constraint ......................................................................... 14 2.10.4 Regulations ................................................................................................................... 14 2.10.5 Reliability ...................................................................................................................... 14 2.10.6 Resource Control ......................................................................................................... 14 2.10.7 Security .......................................................................................................................... 15 2.11 Drivers for Adoption of Cloud Computing: ............................................................... 15 2.11.1 Availability .................................................................................................................... 15 2.11.2 Collaboration ............................................................................................................... 15 2.11.3 Elasticity ........................................................................................................................ 15 2.11.4 Lower Infrastructure Costs...................................................................................... 15 2.11.5 Mobility .........................................................................................................................
Recommended publications
  • The Web ICT Systems for Business Networking Vito Morreale
    ICT Systems for Business Networking Vito Morreale The Web ICT Systems for Business Networking Vito Morreale Note. The content of this document is mainly drawn from Wikipedia [www.wikipedia.org] and follows GNU Free Documentation License (GFDL), the license through which Wikipedia's articles are made available. The GNU Free Documentation License (GFDL) permits the redistribution, creation of derivative works, and commercial use of content provided its authors are attributed and this content remains available under the GFDL. Material on Wikipedia (and this document too) may thus be distributed multilingually to, or incorporated from, resources which also use this license. Table of contents 1 INTRODUCTION ................................................................................................................................................ 3 2 HOW THE WEB WORKS .................................................................................................................................. 4 2.1 PUBLISHING WEB PAGES ....................................................................................................................................... 4 2.2 SOCIOLOGICAL IMPLICATIONS ................................................................................................................................ 5 3 UNIFORM RESOURCE IDENTIFIER (URI) ................................................................................................. 5 4 HYPERTEXT TRANSFER PROTOCOL (HTTP) ........................................................................................
    [Show full text]
  • A Measurement Study of the Wuala On-Line Storage Service
    A Measurement Study of the Wuala On-line Storage Service Thomas Mager, Ernst Biersack, and Pietro Michiardi EURECOM Sophia Antipolis, France fmager,erbi,[email protected] Abstract—Wuala is a popular online backup and file sharing • Understand if and how coding techniques are used to system that has been successfully operated for several years. assure the availability and durability of the data in case Very little is known about the design and implementation of of node failures Wuala. We capture the network traffic exchanged between the machines participating in Wuala to reverse engineer the design • Determine the transport protocol used to move data and operation of Wuala. When Wuala was launched, it used between peers and servers a clever combination of centralized storage in data centers for • Describe the evolution Wuala has undergone between long-term backup with peer-assisted file caching of frequently 2010 and 2012. downloaded files. Large files are broken up into transmission blocks and additional transmission blocks are generated using Our findings indicate that Wuala uses a simple, yet clever a classical redundancy coding scheme. Multiple transmission system design. Data availability – i.e., making sure that files blocks are sent in parallel to different machines and reliability is are accessible at any time – and durability – that is ensuring assured via a simple Automatic Repeat Request protocol on top of that files are never lost – are achieved by relying on servers UDP. Recently, however, Wuala has adopted a pure client/server based architecture. Our findings and the underlying reasons are located in a data center, instead of using peers.
    [Show full text]
  • Advanced Copyright Issues on the Internet
    ADVANCED COPYRIGHT ISSUES ON THE INTERNET * David L. Hayes, Esq. FENWICK & WEST LLP * Chairman of Intellectual Property Practice Group, Fenwick & West LLP, Mountain View & San Francisco, California. B.S.E.E. (Summa Cum Laude), Rice University (1978); M.S.E.E., Stanford University (1980); J.D. (Cum Laude), Harvard Law School (1984). An earlier version of this paper appeared in David L. Hayes, “Advanced Copyright Issues on the Internet,” 7 Tex. Intell. Prop. L.J. 1 (Fall 1998). The author expresses appreciation to Matthew Becker for significant contributions to Section III.E (“Streaming and Downloading”). © 1997-2013 David L. Hayes. All Rights Reserved. (Updated as of June 2013) TABLE OF CONTENTS I. INTRODUCTION 14 II. RIGHTS IMPLICATED BY TRANSMISSION AND USE OF WORKS ON THE INTERNET 15 A. The Right of Reproduction 15 1. The Ubiquitous Nature of “Copies” on the Internet 16 2. Whether Images of Data Stored in RAM Qualify as “Copies” 16 3. The WIPO Treaties & the European Copyright Directive Are Unclear With Respect to Interim “Copies” 23 (a) Introduction to the WIPO Treaties & the European Copyright Directive 23 (b) The WIPO Copyright Treaty 25 (c) The WIPO Performances and Phonograms Treaty 28 4. The Requirement of Volition for Direct Liability 30 (a) The Netcom Case 31 (b) The MAPHIA Case 33 (c) The Sabella Case 34 (d) The Frena Case 35 (e) The Webbworld Case 36 (f) The Sanfilippo Case 37 (g) The Free Republic Case 38 (h) The MP3.com Cases 40 (i) The CoStar Case 43 (j) The Ellison Case 44 (k) Perfect 10 v.
    [Show full text]
  • Your Church Website
    Your Church Website Lai Salmonson Webmaster, BSCNC Cary, NC 27511 [email protected] (800) 395-5102 ext. 5589 (919) 459-5589 Table of Contents: Websites 101 Website Design Tips Wix or WordPress Content Management Systems and Hosting Options Wix (Hosting and Domain) WordPress (DreamHost hosting and domain is Free) SiteGround (Host your website) Other Resources Online Giving Solutions Sign up for more classes at: www.ncbaptist.org/website ​ Note: Pricing and services change so please check with the links provided. 1 Websites 101 Q&A: 1. What is a website? a. A website is a set of related web pages served from a single web domain. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet address known as a Uniform Resource Locator (URL). All publicly accessible websites collectively constitute the World Wide Web. The World Wide Web (WWW) was created in 1990 by British CERN physicist, Tim Berners-Lee. On 30 April 1993, CERN (the European Organization for Nuclear Research) announced that the World Wide Web would be free to use for anyone. (https://en.wikipedia.org/wiki/Website) ​ ​ 2. How big is the World Wide Web? a. Current size:https://www.worldwidewebsize.com/ and ​ ​ http://www.internetlivestats.com/ 3. What is a web Content Management System (CMS)? a. A web content management system is a bundled or stand-alone application to create, manage, store and deploy content on Web pages. Web content includes text and embedded graphics, photos, video, audio, and code that displays content or interacts with the user.
    [Show full text]
  • Module: 2 Web Server Hardware and Software
    MODULE: 2 WEB SERVER HARDWARE AND SOFTWARE A server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide, or help to provide, a network service. Servers can be run on a dedicated computer, which is also often referred to as 'the server', but many networked computers are capable of hosting servers. In many cases a computer can provide several services and have several servers running. A server is any computer used to provide (or “serve”) files or make programs available to other computers connected to it through a network (such as a LAN or a WAN). The software that the server computer uses to make these files and programs available to the other computers is sometimes called server software. Sometimes this server software is included as part of the operating system that is running on the server computer. Thus, some information systems professionals informally refer to the operating system software on a server computer as server software, a practice that adds considerable confusion to the use of the term “server.” In short, Server refers to a computer or device on a network that manages network resources. Types of servers In a general network environment the following types of servers may be found. Application server, a server dedicated to running certain software applications Catalog server, a central search point for information across a distributed network Communications server, carrier-grade computing platform for communications networks Compute server, a server intended
    [Show full text]
  • Stealthwatch V7.0 Default Applications Definitions
    Cisco Stealthwatch Default Applications Definitions 7.0 Stealthwatch® v7.0 Default Applications Definitions Stealthwatch® v7.0 Default Applications Definitions The table in this document lists the default Stealthwatch applications defined on the Custom Applications page in the SMC Web App. The intended audience for this document includes users who want a clearer understanding of what com- prises a default application that Stealthwatch monitors. In the table below, the number in parentheses after the application name is a unique identifier (UID). Application Criteria Name Description Stealthwatch Classification Port/Protocol Registered with IANA on port 629 3com AMP3 3com AMP3 (719) TCP/UDP. Registered with IANA on port 106 3com TSMUX 3com TSMUX (720) TCP/UDP. The Application Configuration Access Pro- tocol (ACAP) is a protocol for storing and synchronizing general configuration and preference data. It was originally ACAP ACAP (722) developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in sync across all clients. AccessBuilder (Access Builder) is a family AccessBuilder AccessBuilder (724) Copyright © 2018 Cisco Systems, Inc. All rights reserved. - 2 - Stealthwatch® v7.0 Default Applications Definitions Application Criteria Name Description Stealthwatch Classification Port/Protocol of dial-in remote access servers that give mobile computer users and remote office workers full access to workgroup, depart- mental, and enterprise network resources. Remote users dial into AccessBuilder via analog or digital connections to get direct, transparent links to Ethernet and Token Ring LANs-just as if they were connected locally. AccessBuilder products support a broad range of computing platforms, net- work operating systems, and protocols to fit a variety of network environments.
    [Show full text]
  • Ifta's Copyright Guide
    IFTA® Practical Guide to Copyright Protection Contents A Road Map to Protect Your Works and Enforce Your Rights / 1 Checklist for Copyright Protection and Security at Critical Points of Vulnerability / 12 International and National Legal Frameworks for Copyright Protection and Enforcement / 19 Steps for Notifying ISPs, Payment Processors, Search Engines, and Advertisers of Copyright Infringement / 25 Drafting Distribution Agreements to Maximize Copyright Protection / 30 Glossary of Terminology / 34 Please contact the IFTA Legal Department for more information on any matters in this Guide. Your feedback, experiences and input are welcome in developing Member services that matter most to your business. IFTA Legal Department Susan Cleary, Vice President and General Counsel [email protected] Eric Cady, Senior Counsel [email protected] Orson Rheinfurth, Counsel & Director, IFTA Collections [email protected] Marisol Figueroa, Administrative Assistant, Legal & Collections [email protected] © 2015 IFTA. All Rights Reserved. A Road Map to Protect Your Works and Enforce Your Rights New digital platforms and distribution technology create opportunities for the independent film and television industry. Yet those same technologies also dramatically expand the ease with which a single act of infringement can rapidly spread worldwide across multiple mediums and decisively undermine revenue expectations and future financing options. The risk of theft arises well before a film or program is ready for release and should be addressed prior to production. The stakes are too high to leave to chance. Protecting the security of assets must be the responsibility of everyone in your company and of all those who touch the film or program from beginning to the end of its distribution cycle.
    [Show full text]
  • Unit 4 Web Hosting
    Programming for the Web Unit 4 Web Hosting What is Web Hosting? Web hosting is a service that allows organizations and individuals to post a website or web page onto the Internet. Web hosting is a necessity for any website — it is the physical location of your website on the Internet, an online storage center that houses the information, images, video, and other content that comprises your website. A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center. Web hosting is the place where all the files of your website live. It is like the home of your website where it actually lives. Unit 4-Web Hosting Page 1 Programming for the Web In a nutshell, web hosting is the process of renting or buying space to house a website on the World Wide Web. Website content such as HTML, CSS, and images has to be housed on a server to be viewable online. When a hosting provider allocates space on a web server for a website to store its files, they are hosting a website. Web hosting makes the files that comprise a website (code, images, etc.) available for viewing online. Every website you’ve ever visited is hosted on a server. What exactly is a server? A server is a computer that connects other web users to your site from anywhere in the world.
    [Show full text]
  • Terms & Conditions
    Terms & Conditions BETWEEN: The Client, Hereafter called the “User”, AND: HostDZire Web Services Pvt. Ltd Reachable via its Internet site http//www.hostdzire.com/ Article 1. DEFINITIONS Supplier: We”, “Us”, “HostDZire”, “HostDZire Web Services Pvt. Ltd.”, “Our” and / or “HostDZire Web Services Private Limited” is the hosting service provider and maybe called by any one of these names. HostDZire Web Services Private Limited is a registered company in India. CIN: U72300BR2015PTC024063 Customer: “You”, “Your”, “Client”, “Customer” and / or “Member” is the person or person’s representative who purchases hosting service(s) from HostDZire Web Services Private Limited. Agreement: The Agreement comprises these Terms And Conditions and/or each Order Including Account Opening Form, HostDZire Policies and all other schedules there to, pursuant to which HostDZire shall provide certain (internet) services to Customer, which Services are indicated on the Order Form(s) or the Order Confirmation which form an integral part of the Agreement; the entire set is hereafter called the “Agreement”. Site Or Internet Website: www.hostdzire.com providing access to the Account Management Console in particular. Server: A computer dedicated to the User and used by the latter once it is made available and that is permanently connected to the Internet via a high-speed connection. Dedicated Servers: A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. Web Hosting: A web host, or web hosting service, that provides the technologies and services needed for the website or webpage to be viewed in the Internet.
    [Show full text]
  • A Cloud Architecture for Reducing Costs in Local Parallel And
    A CLOUD ARCHITECTURE FOR REDUCING COSTS IN LOCAL PARALLEL AND DISTRIBUTED VIRTUALIZED CLOUD ENVIRONMENTS by JEFFREY MICHAEL GALLOWAY Dr. SUSAN VRBSKY, COMMITTEE CHAIR Dr. XIAOYAN HONG Dr. JOHN LUSTH Dr. RANDY SMITH Dr. FEI HU A DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of The University of Alabama TUSCALOOSA, ALABAMA 2013 Copyright Jeffrey Michael Galloway 2013 ALL RIGHTS RESERVED ABSTRACT Deploying local cloud architectures can be beneficial to organizations that wish to maxi- mize their available computational and storage resources. Many users are reluctant to move their computational and storage needs to a public cloud vendor. While designing scalable local cloud architectures, power requirements should be given adamant attention. This dissertation focuses on several challenging concerns relating to cloud computing architectures, specifically lowering the power requirements of Infrastructure-as-a-Service (IaaS) local cloud architectures. These chal- lenges include power efficient computational resource load consolidating, power efficient persis- tent cloud storage consolidating, and deploying a local IaaS cloud architecture with limited net- working resources. The design of a load consolidation approach to Infrastructure-as-a-Service cloud archi- tectures that is power efficient is presented in this dissertation. A proposed Power Aware Load Consolidation algorithm, PALC, maintains the state of all compute nodes, and based on utiliza- tion percentages, decides the number of compute nodes that should be operating. Results show that PALC provides adequate availability to compute node resources while decreasing the overall power consumed by the local cloud architecture. Persistent storage is a necessity in cloud computing architectures.
    [Show full text]
  • Stealthwatch V6.9.0 Default Applications Definitions
    TABLE | Stealthwatch v6.9 Default Applications Definitions STEALTHWATCH® V6.9 DEFAULT APPLICATIONS DEFINITIONS Stealthwatch (SMC) v6.9 Default Applications Definitions The table in this document lists the default Stealthwatch applications defined on the Custom Applications page in the SMC Web Application (App) interface. Audience The intended audience for this document includes users who want a clearer understanding of what comprises a default application that Stealthwatch monitors. Note: In the table below, the number in parentheses after the application name is a unique identifier (UID). Name Application Criteria Description Stealthwatch Port/ IP Range Classification Protocol 3com AMP3 3com AMP3 (719) Registered with IANA on port 629 TCP/UDP. 3com TSMUX 3com TSMUX (720) Registered with IANA on port 106 TCP/UDP. ACAP ACAP (722) The Application Configuration Access Protocol (ACAP) is a protocol for storing and synchronizing general configuration and preference data. It was originally developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in sync across all clients. 1 TABLE | Stealthwatch v6.9 Default Applications Definitions Name Application Criteria Description Stealthwatch Port/ IP Range Classification Protocol AccessBuilder AccessBuilder (724) AccessBuilder (Access Builder) is a family of dial-in remote access servers that give mobile computer users and remote office workers full access to workgroup, departmental, and enterprise network resources. Remote users dial into AccessBuilder via analog or digital connections to get direct, transparent links to Ethernet and Token Ring LANs-just as if they were connected locally. AccessBuilder products support a broad range of computing platforms, network operating systems, and protocols to fit a variety of network environments.
    [Show full text]
  • Cloud Computing: VM Placement & Load Balancing
    www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 11 November, 2014 Page No. 9197-9200 Cloud Computing: VM placement & Load Balancing Adeel Hashmi Maharaja Surajmal Institute of Technology, Department of Computer Science Janakpuri, New Delhi, India [email protected] Abstract: In recent years, cloud computing has become a popular paradigm for hosting and delivering services over the internet. The key technology that makes cloud computing possible is server virtualization, which enables dynamic sharing of physical resources. Through virtualization, a cloud service provider can ensure QoS delivered to the user while achieving higher server utilization and energy efficiency. Virtualization introduces the problem of virtual machine placement and also increases the overheads in load balancing. This paper discusses the various the various algorithms dealing with VM placement and load balancing in cloud environment. Keywords: Cloud computing, Virtualization, Virtual Machines, Load balancing. 1. Introduction Infrastructure-as-a-Service provides the customer with storage and virtual server instances, as well as APIs that allow the customer to configure their virtual servers and Clusters [1] are distributed systems under the supervision of storage. This model allows the organization to pay for only single administrative domain. Grid [1] is a geographically as much capacity as is needed, and scale up/down as soon as dispersed collection of distributed systems. Cloud is a required. Popular example is Google Drive, Amazon EC2 collection of parallel and distributed system where the nodes (Elastic Compute Cloud). are virtualized whereby a single physical server can run multiple virtual servers, thus reducing the resources as well All the given examples i.e.
    [Show full text]