This module consist the implementation of Sender Algorithm in the

advertisement
SYSTEM REQUIRMENTS SPECIFICATION
A. Aim of the Project:
PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) system.
PACK’s main advantage is its capability of offloading the server TRE effort to end-clients, thus
minimizing the processing costs induced by the TRE algorithm. PACK is based on a novel TRE
technique, which allows the client to use newly received chunks to identify previously received
chunk chains, which in turn can be used as reliable predictors to future transmitted chunks.
The main aim is to eliminate redundant data transfer and reduce bandwidth cost on the
network, in particular traffic redundancy elimination (TRE), for reducing bandwidth costs.
Problem Definition:
In Internet end user’s activities, such as repeatedly accessing, downloading, uploading i.e.,
backup, distributing, and modifying the same or similar information items such as documents, data,
Web, and video. Redundancy in network can be defined as the supplying of duplicate copies of
various data. TRE is used to eliminate the transmission of redundant content and, there-fore, to
significantly reduce the network cost.
B. Existing System
To achieve traffic redundancy elimination most of the enterprises today use WAN optimizers
and EndRE system also called as Sender-based end-to-end TRE solutions. Sender-based end-to-end
TRE solutions add a considerable load to the servers, which may eradicate the network cost saving
addressed by the TRE in the first place. Our experiments further show that current end-to-end
solutions also suffer from the requirement to maintain end-to-end synchronization that may result
in degraded TRE efficiency.
Disadvantage:
The drawbacks of the existing system are they do not cop well with end-to-end encrypted traffic
and leave the data uncompressed and also for encrypted data they need encryption key but these
weaken end-to-end semantics and it is cost for end user’s. Existing System is not a cost effective.
C. Proposed System
We present a novel receiver-based end-to-end TRE solution that relies on the power of
predictions to eliminate redundant traffic between the server and its end-users (client). In this
solution, each receiver observes the incoming stream and tries to match its chunks with a
previously received chunk chain or a chunk chain of a local file. Using the long-term chunks’ metadata information kept locally, the receiver sends to the server predictions that include chunks’
signatures and easy-to-verify hints of the sender’s future data. The sender first examines the hint
and performs the TRE operation only on a hint-match. The purpose of this procedure is to avoid the
expensive TRE computation at the sender side in the absence of traffic redundancy. When
redundancy is detected, the sender then sends to the receiver only the ACKs to the predictions,
instead of sending the data. On the receiver side, we propose a new computationally lightweight
chunking (fingerprinting) scheme termed PACK chunking. PACK chunking is a new alternative for
Rabin fingerprinting traditionally used by RE applications. This technique is used to improve
storage utilization and can also be applied to network data transfers to reduce the number of bytes
that must be sent.
D. Description of Project In Short:
We implement this project as a simulation. Both client and server consist of PACK chunking
code. This project consist of two systems one as a client and other as a server. The sender sends
part of the data i.e. chunk to the server (Receiver), on receiving the receiver create unique key for
the respective chunk using SHA-1 Algorithm, and compared with the chunks present in the
database. If the chunk is present, receiver retrieves the subsequent chunks from the database and
generates prediction. This prediction is sent to the sender, sender uses this prediction to check
whether the prediction and data in the buffer are same if yes, sends prediction acknowledgement
other it will sent data.
E. Algorithm:
1. Pack Algorithm:
Performs parsing of data, generating chunks and prediction.
2. Receiver Algorithm:
Performs handling received data and sending prediction.
3. Sender Algorithm:
Receives prediction and generating ACK.
1. Input:
We give input as file up to 10MB limit (1 byte to 10MB).
2. Output/Results:
We will get output /result as redundant content of that file.
F. Experimental Setup:
We require minimum 3 number of PC’s to make client server environment. We have
to install server in one PC and it will be Pack Server and other will be clients of it.
Hardware Requirements:

Pentium processor at 900 MHz or higher

1 GB RAM or higher

25 GB or more hard disk
Software Requirements:

Operating System

Developing language : - Java (JDK 1.7)
: - Windows 7/8

Database
: - MySql 5.0

Server
:- Tomcat 7.0
Design and Implementation Constraints
1)
We implement the project as a simulation, at the user level.
2)
We use files as input data and input file limit will be 10MB
Assumptions and Dependencies
1) It is considered that the number of servers will be one.
2) Client Application developed using java swing (Desktop type) and it makes requests to
server.
3) Server will implemented with J2EE and it will deployed in Tomcat Server.
G. Modules Information
1) Module 1: (Login Authentication and Database Designing)
This module contains login module which authenticates user and implemented on server
side. It also contains facility to upload and download a file. Creating database at Server side,
we receive the request from client and send the response to respected request.
2) Module 2: (Creating chunks and Make Prediction)
This module consists of PACK algorithm implementation. Generating chunks at client side
and it will send to server. Server makes prediction for receiving chunks.
3) Module 3: (Receiver Algorithm)
This module consist the implementation of Sender Algorithm in the client side. On receiving
data it create a unique key using SHA-1 Algorithm and find respective key in chunk store. If
generated key matched in chunk store then it sent prediction with TCP ACK else, it sent TCP
ACK only.
4) Module 4: (Sender Algorithm and Deployment)
This module consist the implementation of server side Receiver Algorithm. On receiving
prediction from server with TCP ACK, then it will generate the key for chunk with SHA-1
Algorithm which is prepared to sent and compare with received prediction. If prediction is
right then it will sent PRED ACK to server, else chunk will sent.
.
Download