ABSTRACT
File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books. It may be implemented through a variety of storage, transmission, and distribution models and common methods of file sharing incorporate manual sharing using removable media, centralized computer file server installations on computer networks, World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking. In peer-to-peer networks, clients provide resources, which may include bandwidth, storage space, and computing power. As nodes arrive and demand on the system increases, the total capacity of the system also increases. In contrast, in a typical client–server architecture, clients share only their demands with the system, but not their resources. In this case, as more clients join the system, less resources are available to serve each client. As with most network systems, unsecured and unsigned codes may allow remote access to files on a victim's computer or even compromise the entire network. The distributed nature of peer-to-peer networks also increases robustness, and—in pure peer-to-peer systems—by enabling peers to find the data without relying on a centralized index server
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 STATE OF THE PROBLEM
1.3 PURPOSE OF THE STUDY
1.4 AIMS AND OBJECTIVES
1.5 SCOPE OF STUDY
1.6 LIMITATIONS OF STUDY
1.7 ASSUMPTIONS
1.8 DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
CHAPTER THREE
3.1 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2 FACT FINDING METHOD USED
3.3 ORGANIZATION STRUCTURE
3.4 OBJECTIVES OF EXISTING SYSTEM
3.5 INPUT, PROCESS AND OUTPUT ANALYSIS
3.6 INFORMATION FLOW DIAGRAMS
3.7 PROBLEMS OF THE EXISTING SYSTEM
3.8 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
4.1 DESIGN OF THE NEW SYSTEM
4.2 INPUT SPECIFICATION AND DESIGN
4.3 OUTPUT SPECIFICATION AND DESIGN
4.4 FILE DESIGN
4.5 PROCEDURE CHART
4.6 SYSTEM FLOW CHART
4.7 SYSTEM REQUIREMENTS
5.1 IMPLEMENTATION
5.2 PROGRAM DESIGN
5.3 PROGRAM FLOWCHART
5.4 PSEUDO CODE
5.5 SOURCE PROGRAM: TEST RUN
DOCUMENTATION
CHAPTER FIVE
7.1 RECOMMENDATION
7.2 CONCLUSION
BIBLIOGRAPHY
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Design And Simulation Of Academic Peer To Peer Network.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389
"Design And Simulation Of Academic Peer To Peer Network." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389>.
"Design And Simulation Of Academic Peer To Peer Network.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389>.
"Design And Simulation Of Academic Peer To Peer Network.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/3130/design-and-simulation-of-academic-peer-to-peer-network-7389.
- Related Works
- Dynamic Atm Card Management System
- Design And Implementation Of E-career Consultancy Services Online (case Study Of Careers Nigeria)
- Design And Implementation Of Computerized Puyo Game
- Design And Implementation Of Computerized Medical Duties Scheduling System (a Case Study Of University Of Nigeria Teaching Hospital)
- Characteristics Of Java
- Design And Implementation Of Student’s Transcript Generating Software (a Case Study Of I.m.t)
- Design And Implementation Of A Computerized Commodity Exchange Information System (case Study Of Enugu State)
- Novel Information Security Framework For Automated Teller Machine Atm
- Design And Implementation Of A Computerized Goods Transportation System
- Design And Implementation Of Steganography For Hiding Data In Audio Film (case Study Of Woman Of Faith)