ABSTRACT
File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books. It may be implemented through a variety of storage, transmission, and distribution models and common methods of file sharing incorporate manual sharing using removable media, centralized computer file server installations on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking. In peer-to-peer networks, clients provide resources, which may include bandwidth, storage space, and computing power. As nodes arrive and demand on the system increases, the total capacity of the system also increases. In contrast, in a typical client–server architecture, clients share only their demands with the system, but not their resources. In this case, as more clients join the system, less resources are available to serve each client. As with most network systems, unsecured and unsigned codes may allow remote access to files on a victim's computer or even compromise the entire network. The distributed nature of peer-to-peer networks also increases robustness, and—in pure peer-to-peer systems—by enabling peers to find the data without relying on a centralized index server
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 STATE OF THE PROBLEM
1.3 PURPOSE OF THE STUDY
1.4 AIMS AND OBJECTIVES
1.5 SCOPE OF STUDY
1.6 LIMITATIONS OF STUDY
1.7 ASSUMPTIONS
1.8 DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
CHAPTER THREE
3.1 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2 FACT FINDING METHOD USED
3.3 ORGANIZATION STRUCTURE
3.4 OBJECTIVES OF EXISTING SYSTEM
3.5 INPUT, PROCESS AND OUTPUT ANALYSIS
3.6 INFORMATION FLOW DIAGRAMS
3.7 PROBLEMS OF THE EXISTING SYSTEM
3.8 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
4.1 DESIGN OF THE NEW SYSTEM
4.2 INPUT SPECIFICATION AND DESIGN
4.3 OUTPUT SPECIFICATION AND DESIGN
4.4 FILE DESIGN
4.5 PROCEDURE CHART
4.6 SYSTEM FLOW CHART
4.7 SYSTEM REQUIREMENTS
5.1 IMPLEMENTATION
5.2 PROGRAM DESIGN
5.3 PROGRAM FLOWCHART
5.4 PSEUDO CODE
5.5 SOURCE PROGRAM: TEST RUN
DOCUMENTATION
CHAPTER FIVE
7.1 RECOMMENDATION
7.2 CONCLUSION
BIBLIOGRAPHY
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Design And Simulation Of Academic Peer To Peer Network.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389
"Design And Simulation Of Academic Peer To Peer Network." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389>.
"Design And Simulation Of Academic Peer To Peer Network.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389>.
"Design And Simulation Of Academic Peer To Peer Network.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389.
- Related Works
- Design And Implementation Of A Computerized System For The Methodological Test Analysis (a Case Study Of Sickle Cell Disease)
- Design And Implementation Of An On-line Vehicle Registration (a Case Study Of Motor Licensing Office, Enugu South)
- Design And Implementation Of A Crime Management And Tracking Information System (a Case Study Of Fiib Headquarters Ogbor-hill Aba)
- Design And Implementation Of Online Polling System (online Voting System)
- Design And Simulation Of Computer Piagonistic System (a Case Study Of Ibm Pg)
- Authentification Of Digital Images By Encryption And Decryption With Primary Key Implementation Using Ism Algorithm And Steganography
- A Near-optimal Multicast Scheme For Mobile Adhoc Network Using Genetic Algorithm
- Employee Management System
- Design And Implementation Of A Computerized Banking System (a Case Study Of United Bank For Africa)
- Statistical Techniques For Detecting Traffic Anomalies Through Packet Header Data