E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.

Slides:



Advertisements
Similar presentations
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Advertisements

FEATURES, BENEFITS AND THE USAGE ESS D igital D ocument M anagement S ystem.
Novell from Home Net Storage. Novell access via NetStorage 1-Web Interface Connect to your shared drive through your web browser Windows, Mac or Linux.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Peer-to-Peer Networking By: Peter Diggs Ken Arrant.
Fall 2007cs4251 Distributed Computing Umar Kalim Dept. of Communication Systems Engineering 31/10/2007.
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Picture Users Making Art Chat An interactive communication tool.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
Tracking Services for ANY websites and web applications Zhu Xiong CSE 403 LCO.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
For more notes and topics visit:
Creating a Web Presence Introduction to WordPress Week 1.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
NMS1.0(c) Copyright Final Year Project Demonstration Dublin City University 29 th May 2003 Team Members : David ReadeTimothy Kelly
Virtual Private Networking Allows any internet enabled computer to connect to STI network. Runs at your local connection speed. Must have username and.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
Remote OMNeT++ v2.0 Introduction What is Remote OMNeT++? Remote environment for OMNeT++ Remote simulation execution Remote data storage.
Sauna Network Protocol. Create User $SAU,CU,[UserName],[Password],[Firstname],[ Lastname],[ ],[Phone]
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
FTP Presentation Using “CuteFTP” By IT the IT Support Team.
By Matt Baker Eric Sprauve Stephen Cauterucio. The Problem Advisors create a sign-up sheet to be posted on the door of their office. These sign-up sheets.
RefWorks Your Personal Online Database And Bibliography Creator.
OmnėMail Nicholas Allen Effie Goenawan Annie Liu.
Managing a MAPICS R7/R9 PowerLink Environment (704)
Sudoku Taryn Wise. Operational Concepts and System Requirements Solve sudoku puzzles in a convenient way Have a notes option for number possibilities.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Our goal is to make a web based multi-user organizer that can be accessed via cellular devices. There are three main component for this project: A main.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Unified Distributed (UDub Mail) Life Cycle Objectives Sachin Pradhan Gabriel Maganis.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
AXIOMTEK e-Service System User Guide (Internal) AXIOMTEK e-Service System User Guide (Internal) Golden Chiu Customer Service Department Date: 2007/01/02.
D. Heynderickx DH Consultancy, Leuven, Belgium 22 April 2010EuroPlanet, London, UK.
Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson.
Introduction TO Network Administration
ELECTRONIC DOCUMENT SHARING AND MANAGEMENT BY: EDWARD DISI JUSTIN HEIN BROM ESPY Senior Design 1.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
PhotoBytes Burt Bielicki. Overview What is PhotoBytes? Who Will Use PhotoBytes? System Requirements System and Software Architecture Lifecycle Plan Feasibility.
Centralized Grading System. LCO Objectives Operational Concepts System Requirements System and Software Architecture Lifecycle Plan Feasibility Rationale.
Space Notifier Jeh-Sang Cho Jin Pae. Introduction  Registering for classes  What do you do when a class is full?  How often do you check for space.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
Online School Management System Supervisor Name: Ashraful Islam Juwel Lecturer of Asian University of Bangladesh Submitted By: Bikash Chandra SutrodhorID.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
CAPSTONE PROJECT iTest Group Members Dao Van Son Le Thi Huy Duong Do Thanh Trung Nguyen Duc Loc SupervisorNguyen Van Sang.
Features to look for in a Work Management Software before choosing one.
Unit 3 Virtualization.
Chapter 7. Identifying Assets and Activities to Be Protected
Cloud Computing.
Multilevel Marketing Tree Viewer
The Online Smith Family Recipe Program
Teacher: Alison Roberts Northern Sydney Institute of TAFE
The Improvement of PaaS Platform ZENG Shu-Qing, Xu Jie-Bin 2010 First International Conference on Networking and Distributed Computing SQUARE.
What do you Wanna Do? The LCO Overview.
FileSpot Collaborative File Manager
PHP / MySQL Introduction
Introduction to Cloud Computing
File Transfer Protocol
CSE 403 Project SDS Presentation
Getting Started.
Getting Started.
Communications & Computer Networks Resource Notes - Introduction
Online Multilevel Media Sharing
INTERNET SECURITY.
Presentation transcript:

E a s y S h a r e Jung Son Ky Le

Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely popular s, IM, Peer-to-Peer Apps Limitations in current file-sharing applications

Operational Concepts (cont.) EasyShare provides convenient way of sharing files Share files with friends, family, others Centralized database, eliminating peer-to-peer connection Faster than peer-to-peer file sharing Speed is only limited by the user’s own connection speed

System Requirements Users given fixed amount of storage Users can upload/download files to/from personal online database Folders can be made private, password protected or public Users can add friends, view/download their friends’ public files

System Requirements (cont.) Search files and download Protected folders are useful for sharing confidential files between friends Application maintains statistics for each file

System & Software Architecture Clients use application via window that includes friend management, download/upload/search files Server needs a database system Major software components include: login, main, friend management, down/upload window

System & Software Architecture (cont.)

Life Cycle Plan Seven weeks to complete with 4-8 students Requires developers knowledgeable in database, networking, and building platform Work divided into three parts Each developer spends ~15 hours/week

Life Cycle Plan (cont.) Use of Spiral Model Week 1: collect requirements, resources and build a detail design. Week 2 – 5: coding. Update the design if necessary. First release after week 2. Week 6: testing. Update the design. Second release at the beginning of the week. Week 7: testing and finish. Final release.

Feasibility Rationale Risks: Availability of developers with database & networking knowledge Security and high transfer rate Searching & sorting implementation

Feasibility Rationale (cont.) Can this really be built? With today’s resources and technology, YES, given that project members are knowledgeable in networking, database management, and platform building