5 research outputs found

    Routing performance of structured overlay in Distributed Hash Tables (DHT) for P2P

    Get PDF
    This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network

    Smart Final Year Project Archive System Using Laravel Framework with Email Notification (SFYPAS)

    Get PDF
    Final Year Project (FYP) is a compulsory requirement for graduation of every bachelor programme in Universiti Teknologi MARA (UiTM). Finding a topic for the final year project is quite challenging. However, being able to access previous FYP thesis helps students to generate some ideas. Supervisors and lecturers can also determine whether the proposed project is already among the previous research project or a new one. Unfortunately, the past FYP thesis is usually kept in a specific thesis room. Hence, this will make going to the thesis room and searching the thesis for references quite burdensome. The lack of electronic management for FYP thesis causes several problems in arrangement and search methods. This project aims to develop Smart Final Year Project Archive System (SFYPAS) using Laravel Framework and evaluate the system in terms of technology acceptance model (TAM). SFYPAS is developed using Laravel framework and the methodology used throughout the project is using Software Development Life Cycle (SDLC). The system tested based on its functionality, user acceptance with TAM and heuristic evaluation by an expert. The system was tested on thirty respondents who shared their feedback by answering a set of questionnaires upon completing the testing. The result shows that the mean for user acceptance with TAM in terms of perceived ease of use is 4.27, while perceived usefulness is 4.47. Thus, it shows that the respondents are satisfied with the system in terms of its perceived usefulness. In conclusion, this research has achieved the objectives where it eases the user by providing a web-based smart archive system as a platform to access the past FYP thesis. For future work, the system can be improved by adding a search engine that implements any searching algorithm to yield a better result

    Village Stay Reservation and Management System for Tourism Industry in Malaysia

    Get PDF
    Tourism industry in Malaysia is being developed to be better thus, making Malaysia as one of the most attractive countries to visit. Many Village Stays in Malaysia are owned and managed by inexperienced personnel and have inefficient system. This makes local products and nearby tourist attractions not able to be advertised properly or are not made known to the public. So, the objectives of this project are to develop Village Stay Reservation and Management System that caters for the information of the local tourist attraction products and to evaluate Village Stay Reservation and Management System in terms of perceived ease of use. In order to achieve the objectives, this project develops the system using PHP programming language and tests the system of its functionality, usability and user acceptance. There are fifteen respondents who tested the system. A set of questionnaires was used to collect the data. The mean for user acceptance test is 3.77 while for user reaction in usability testing is 3.74. The respondents are satisfied with the system in terms of its functionality. In conclusion, this research has achieved the objectives. It is shown that the users can deal more effectively and efficiently when using this system. This system will reduce the workload of staffs when using an online system to monitor the reservation as well as attending to other chores

    Security Performance Analysis of Photography Service System

    Get PDF
    Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers. The use of the system have its advantages such as easiness of accessing data and also make users share the data faster. The purpose of the system was developed to ease the daily works and can be used frequently by photography companies as a method to send photos and videos to their customers. A penetration testing was conducted in order to test the security performance by conducting four security attacks which were Denial of Service (DoS), SQL injection, Cross Site Scripting, and sniffing password. The purpose of these attacks were conducted is to testing and finding the vulnerabilities of the system because the system deals with the customers’ privacy data which is the photos and the videos owned by the customers. This is crucial to secure a system where the first step taken as a prevention to introduce the system to the public, vulnerability assessments was performed to determine the weaknesses of the system. Scanning and vulnerability assessment are done using tools which is Vega Scanning Tool, Wireshark, and Low Orbit Ion Cannon (LOIC). All results are collected and have been analyze. As a summary of the result, it shows that the system are vulnerable to DoS attack, SQL injection attack, cross site scripting and also password sniffing.

    Network Security Performance Analysis of Mobile Voice Over Ip Application (mVoIP): Kakao Talk, WhatsApp, Telegram and Facebook Messenger

    Get PDF
    VoIP application usage has increased from time to time and makes our daily life more convenient. VoIP application has features to make a phone call, send a text message and share the file through the apps for free. However, most of the users did not seem aware of VoIP security features such as authentication ability, password encryption ability, or voice or audio and text communication encryption ability. It is essential to ensure the VoIP used is secure from password decrypter and eavesdrops the user conversation. Thus, the first objective of this research was to study and investigate VoIP application consist of Kakao Talk, Telegram, Facebook Messenger and WhatsApp for both Android and web application. The second objective was to evaluate the four VoIP application identified based on authentication requirement, password encryption, voice or audio encryption communication, and text encryption communication. There were two mobile phones used. One acts as a client and a personal computer act as an attacker. Wireshark and packet capture were run in personal computer and mobile phone to monitoring and scanning the network traffic while both devices connected in the same WLAN. The experiment implements MITM, interception, and sniffing attacks. This research project has identified Facebook Messenger and WhatsApp web application do not provide secure password ability
    corecore