DocumentCode :
2077635
Title :
CFiTT - corrupt free file transfer technique
Author :
Sultana, Amna ; Bashir, Muhammad Farhan ; Qadir, Muhammad Abdul
Author_Institution :
Mohammad Ali Jinnah Univ., Islamabad
fYear :
2007
fDate :
6-7 July 2007
Firstpage :
1
Lastpage :
6
Abstract :
Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion is corrupt. This technique provides reliability by eliminating the corruption from a file, hence requiring less bandwidth of the network by reducing the amount of data to be re-sent in case of corruption. The reliability is ensured with the help of file signature generation method which we have devised in this paper. The beauty of this technique that it generates hashes which are not easy to break, hence ensuring security of the file. We have used TCP as the underlying protocol, whereas TCP is already considered to be reliable, but the fact is that it does not ensure the reliable transfer over the network due to the fact that it uses CRC which is still vulnerable to network conditions and malicious attacks. Our technique operates at the application layer and tries to finish the cope up with the reliability over the file transfer. We have also developed a prototype to test the integrity of our technique. Empirical results ensure the reliability of our technique. The emphasis of this paper is to provide users with the corrupt free file transfer over the network, so that their time and valuable resources might be saved.
Keywords :
computer communications software; security of data; transport protocols; CFiTT; FTP; TCP; corrupt free file transfer technique; file security; file signature generation method; hashes; reliability; Bandwidth; Computer network reliability; Computer science; Cyclic redundancy check; Data security; Humans; Protocols; Prototypes; Telecommunication network reliability; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Emerging Technologies, 2007. ICIET 2007. International Conference on
Conference_Location :
Karachi
Print_ISBN :
978-1-4244-1246-4
Electronic_ISBN :
978-1-4244-1247-1
Type :
conf
DOI :
10.1109/ICIET.2007.4381319
Filename :
4381319
Link To Document :
بازگشت