REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE )

ABSTRACT
Remote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor, occupies a unique point in the design space: It does not use any control messages except simple packet acknowledgements, and each node makes routing decisions locally and independently without exchanging any routing state with other nodes. Its novel design makes Castor resilient to a wide range of attacks and allows the protocol to scale to large network sizes and to remain efficient under high mobility. We compare Castor against four representative protocols from the literature. Our protocol achieves up to two times higher packet delivery rates, particularly in large and highly volatile networks, while incurring no or only limited additional overhead. At the same time, Castor is able to survive more severe attacks and recovers from them faster.

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS

CHAPTER ONE
INTRODUCTION
1.1BACKGROUND OF THE STUDY
1.2STATE OF THE PROBLEM
1.3PURPOSE OF THE STUDY
1.4AIMS AND OBJECTIVES
1.5SCOPE OF STUDY
1.6LIMITATIONS OF STUDY
1.7ASSUMPTIONS
1.8DEFINITION OF TERMS

CHAPTER TWO
LITERATURE REVIEW

CHAPTER THREE
3.1DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2FACT FINDING METHOD USED
3.3ORGANIZATION STRUCTURE
3.4OBJECTIVES OF EXISTING SYSTEM
3.5INPUT, PROCESS AND OUTPUT ANALYSIS
3.6INFORMATION FLOW DIAGRAMS
3.7PROBLEMS OF THE EXISTING SYSTEM
3.8JUSTIFICATION OF THE NEW SYSTEM

CHAPTER FOUR
4.1DESIGN OF THE NEW SYSTEM
4.2INPUT SPECIFICATION AND DESIGN
4.3OUTPUT SPECIFICATION AND DESIGN
4.4FILE DESIGN
4.5PROCEDURE CHART
4.6SYSTEM FLOW CHART
4.6.1SYSTEM REQUIREMENTS
4.7IMPLEMENTATION
4.7.1PROGRAM DESIGN
4.7.2PROGRAM FLOWCHART
4.7.3PSEUDO CODE
4.7.4SOURCE PROGRAM: TEST RUN

CHAPTER FIVE
5.0DOCUMENTATION
5.1RECOMMENDATION
5.2CONCLUSION
BIBLIOGRAPHY
Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Possibility, A. (2018). REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE ). Afribary. Retrieved from https://tracking.afribary.com/works/remote-pc-access-in-cyber-cafe-case-study-of-pressure-world-cafe-6028

MLA 8th

Possibility, Aka "REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE )" Afribary. Afribary, 29 Jan. 2018, https://tracking.afribary.com/works/remote-pc-access-in-cyber-cafe-case-study-of-pressure-world-cafe-6028. Accessed 24 Nov. 2024.

MLA7

Possibility, Aka . "REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE )". Afribary, Afribary, 29 Jan. 2018. Web. 24 Nov. 2024. < https://tracking.afribary.com/works/remote-pc-access-in-cyber-cafe-case-study-of-pressure-world-cafe-6028 >.

Chicago

Possibility, Aka . "REMOTE PC ACCESS IN CYBER CAFE (CASE STUDY OF PRESSURE WORLD CAFE )" Afribary (2018). Accessed November 24, 2024. https://tracking.afribary.com/works/remote-pc-access-in-cyber-cafe-case-study-of-pressure-world-cafe-6028