T.A: Viktor Kulikov Eyal Madar Mikael Cohen Spring 2006.

Slides:



Advertisements
Similar presentations
Module XXI Cryptography
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Processes Management.
Spades Game Application with Video Conference Group 12 Anıl Yaman Emre Ergün Hüseyin Aktaş Pınar Tekir.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
CS490T Advanced Tablet Platform Applications Network Programming Evolution.
Java Socket Support Presentation by: Lijun Yuan Course Number: cs616.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
T.Sharon-A.Frank Multimedia Internet/Web MM Interaction Tools.
An Introduction to Internetworking. Algorithm for client-server communication with UDP (connectionless) A SERVER A CLIENT Create a server-socket (listener)and.
VSP Video Station Protocol Presented by : Mittelman Dana Ben-Hamo Revital Ariel Tal Instructor : Sela Guy Presented by : Mittelman Dana Ben-Hamo Revital.
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
© Aastra Aastra BluStar for PC High-Quality Audio and HD Video from Your Desktop.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
IPNexus Briefing Instant Messaging and Collaboration.
Internet.
Chapter Two Application Layer Prepared by: Dr. Bahjat Qazzaz CS Dept. Sept
TeamViewer. TeamViewer is an easy and friendly way for desktop sharing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal VideoConference Archives Indexing System.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Public Key Encryption  Illustration  Uses  Importance  RSA  Cryptcard.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Texas Forty-Two By: Nate Normandin CS 470. What is Texas Forty-Two? A Domino Game A way for people to learn the game A way for people to play others A.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Final Presentation Avilés-Angélica, Blanco-Alberto, Fuentes-Alba, Pell-Xavier, Schenini-Juan, Talukder-Nurul.
NetTech Solutions Security and Security Permissions Lesson Nine.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
JavaScript and Ajax (Internet Background) Week 1 Web site:
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
April 20023CSG11 Electronic Commerce Encryption John Wordsworth Department of Computer Science The University of Reading Room.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
1 VRoIP (Virtual Reality over IP) NCHC TDW TaskForce Jacky Chih-Lung Chang
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 K. Salah Application Layer Module K. Salah Network layer duties.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
Introduction to Barracuda IM Firewall
Instructor Materials Chapter 5 Providing Network Services
Outline Overview Development Tools
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Windows desktop sharing
Computer Networks Protocols
Presentation transcript:

T.A: Viktor Kulikov Eyal Madar Mikael Cohen Spring 2006

Introduction boosts communication and allows easy collaboration. not forced to reply immediately Less intrusive than communication via phone. Companies like IBM have their own Chat application witch allows labs working across the world Encryption is required to secure the business communications Why a chat application ? real-time communication between two or more people based on typed text May have more options, like transfer files, voice, video… What is a chat application?

Goals Building a Chat application in C#, using.Net Implementing: Public forum Private chat File transfer Security encryption Convivial and intuitive GUI

Chat Design Frame matched with the windows style. Tabs appear with a pretty gray relief. Clear and intuitive. Can easily put it in full screen.

Remote executing means running a process in another computer without using any resource or CPU load in the local computer Using a client/server application What is Remoting?

Tcp A server, a client and a network Server Client Ca Cb Proxy Marshal By Reference Object Client Ca creates a proxy instance of Cb Client Ca can uses Cb provided functions via a Tcp channel

Remote Activation Concepts Marshal By Reference Object Marshal By Value Object

Server Activated – Wellknown Singleton Single Instance of Object Services All Clients Types of.NET Remote Objects Server Activated – Wellknown Singlecall New Instance of Object on Every Use

The solution consists of four projects: - ServerConsole - ServerInterface - ClientApp - ClientInterface ServerConsole is a Windows Form. ServerInterface holds the necessary interfaces for the ServerConsole ClientApp is a Windows Form ClientInterface holds the necessary interfaces for the ClientApp Client/Server Architecture (1)

Server Form Server Remote Client Form Client Remote Remoting Server Machine Client Machine Client/Server Architecture (2)

 Remote  Interface  Class link

Client Server Interface Can use from Server: - Logon - Logout - Send Message - Ask for private chat Server Interface (1)

Server Interface (2) Logon: Client log in to the Server Logoff: Client log out from the Server SendMsg: Send a message to another user via the Server GetPortNo: Receive a port number to communicate with the server AskForPrivate: Ask private chat to another user via the Server

Server Client Interface Can use from Client: - UpdateClient - LogOffClient - DoYouWantPrivateChat Client Interface (1)

Client Interface (2) UpdateClient: Update Client Form LogOffClient: Close the Client DoYouWantPrivateChat: Demand for a private chat

Client Form Client Remote Server Is Marshall! Server uses Client functions Client Function Client functions are given by IClient Interface

Server Form Server Remote Client Server Function Is Marshall! Server Function Server functions are given by IServer Interface Client uses Server functions

Client A Client B Server Ask For Private chat Do you want a private chat with A? Private Chat port Private Chat

Intuitive Fast Secured Transfer File

Encryption algorithm used : RSA - Rivest, Shamir (israel), Adelman Security RSA has been invented at a Pessah Seder in 1977 Did you know that RSA encryption is used in our Private Chat File transfer

Public key RSA involves two keys: The public key can be known to everyone and is used to encrypt messages. These messages can only be decrypted by use of the private key Order encrypted with the public key Even if intercepted, the message can’t be decrypted without private key ! Easily decrypted with the private key ! RSA principle

Server Client B Client A Client C Possibility of a Peer to peer private Chat Public Chat Secured

Conclusion We have build an intuitive chat, which allows public, private, secured discussions, and secured transfer files Future works: - Voice conversation - Video conference

Thanks… To Viktor for his time and his patience. To Swlab Laboratory To you who have listened our presentation until the end!

Chat Design Please follow us to the lab!