A System for Creating Specialized DDS ArchitecturesObjectivesProcessStep 1: Pick a subset of existing DDSsSlide 5Slide 6Slide 7Step 2: Determine main common componentsSlide 9Slide 10Step 3: Break up the components within each DDS into disjoint entities.Slide 12Slide 13Step 4: Combine the breakdowns of the different DDSs together within each componentSlide 15Slide 16Step 5: Determine a set of attributes, and tag inheritance lines with themStep 5: Determine a set of attributes, and tag inheritance lines with themSlide 19Step 6: Create an architecture based on a set of given attributes in which to customizeSlide 21Step 7: Analysis, Conclusions, Problem summary, and moreSlide 23Individual FocusOriginal Project FocusCurrent ProgressPlanned Future ActivitiesFuture Activities (Continued)References (1)References (2)CSE333CSE333 DDS.1A System for Creating Specialized DDS ArchitecturesResearch and Work By:Tom PuzakNathan ViniconisSolomon BerheJeffrey PeckProject web site: http://www.revrick.net/CSE333/ProjectTimeline.htmCSE333CSE333 DDS.2ObjectivesObjectivesBreak down multiple (Data Distribution System) Break down multiple (Data Distribution System) DDS architectures into their main components.DDS architectures into their main components.Create a unified view of the differing architectures Create a unified view of the differing architectures in UML.in UML.Tag elements in each component with the Tag elements in each component with the attributes of each DDS analyzed.attributes of each DDS analyzed.Propose a method to generate DDS architectures Propose a method to generate DDS architectures by utilizing the component breakdown and by utilizing the component breakdown and attribute selection.attribute selection.CSE333CSE333 DDS.3ProcessProcessStep 1:Step 1: Pick a subset of existing DDSs Pick a subset of existing DDSsStep 2:Step 2: Determine main common components Determine main common componentsStep 3:Step 3: Break up the components within each DDS Break up the components within each DDS into disjoint entities.into disjoint entities.Step 4:Step 4: Combine the breakdowns of the different Combine the breakdowns of the different DDSs together within each componentDDSs together within each componentStep 5:Step 5: Determine a set of attributes, and tag Determine a set of attributes, and tag inheritance lines with theminheritance lines with themStep 6:Step 6: Create an architecture based on a set of Create an architecture based on a set of given attributes in which to customizegiven attributes in which to customizeStep 7:Step 7: Analysis, Conclusions, Problem summary, Analysis, Conclusions, Problem summary, and moreand moreCSE333CSE333 DDS.4Step 1:Step 1: Pick a subset of existing DDSs Pick a subset of existing DDSsDDSs are used to transfer data across a network, DDSs are used to transfer data across a network, however the methods involved vary.however the methods involved vary.To generate a more complete picture of the generic To generate a more complete picture of the generic DDS architecture, analysis of existing DDSs needs DDS architecture, analysis of existing DDSs needs to take place over a broad scope.to take place over a broad scope.We chose four DDSs:We chose four DDSs:Unix FTP – FTP ProtocolLimewire – Gnutella ProtocolBitTorrent – BitTorrent ProtocolDC++ – Direct Connect Protocol (not standard)They are all File Sharing Applications but their They are all File Sharing Applications but their underlying functionality is different.underlying functionality is different.CSE333CSE333 DDS.5Step 1:Step 1: Pick a subset of existing DDSs Pick a subset of existing DDSsThe DDSs were chosen to show a wide range of The DDSs were chosen to show a wide range of functionality:functionality:FTP was chosen because of its simplicityFTP was chosen because of its simplicitySever and client have separate, well-defined rolesMaintains separate connections for data and messages (i.e. commands)Lots of documentation availableLimewire represents an interesting and very popular Limewire represents an interesting and very popular peer-to-peer systempeer-to-peer systemNo central server; every client is also a serverEvery client maintains networkSearches traverse the network to a defined depthCSE333CSE333 DDS.6Step 1:Step 1: Pick a subset of existing DDSs Pick a subset of existing DDSsBitTorrent was chosen because it is exotic.BitTorrent was chosen because it is exotic.It does not behave like any other peer-to-peer file sharing system.Very large files are broken into small pieces which are “held together” by .torrent files, which contain information about the files.A new solution to the problem of transferring large files over the InternetDirect Connect was chosen because it represents a simple Direct Connect was chosen because it represents a simple peer-to-peer system that utilizes it's own non-standard peer-to-peer system that utilizes it's own non-standard protocol.protocol.Clients connect to a hub, where they search for other client's files and then directly connect.Maintains security, restricting certain functions on the hub from non-“Op” users.CSE333CSE333 DDS.7ProcessProcessStep 1:Step 1: Pick a subset of existing DDSs Pick a subset of existing DDSsStep 2:Step 2: Determine main common components Determine main common componentsStep 3:Step 3: Break up the components within each DDS Break up the components within each DDS into disjoint entities.into disjoint entities.Step 4:Step 4: Combine the breakdowns of the different Combine the breakdowns of the different DDSs together within each componentDDSs together within each componentStep 5:Step 5: Determine a set of attributes, and tag Determine a set of attributes, and tag inheritance lines with theminheritance lines with themStep 6:Step 6: Create an architecture based on a set of Create an architecture based on a set of given attributes in which to customizegiven attributes in which to customizeStep 7:Step 7: Analysis, Conclusions, Problem summary, Analysis, Conclusions, Problem summary, and moreand moreCSE333CSE333 DDS.8Step 2: Determine main common componentsFTPLimewireDirectConnectBitTorrent1. Network Connection2. Search3. Different Security Mechanism4. GUICSE333CSE333 DDS.9Step 2:Step 2: Determine main common Determine main common componentscomponentsInitial focus of research is the Network Initial focus of
View Full Document