Client-server , Computer Networking

Assignment Help:

We need to design and implement a secure conference system. The system will allow users to connect to a conference server and to participate in a shared conversation. The conversation is public for all connected users. No private (user to user) communication is required. The conversation stream crosses the network in encrypted format. The conference application consists of three parts: the conference server, the server configuration tool and the conference client. The server role is to dispatch the received message from any client to all other clients.

The Scenario:

The scenario of the conference system consists of five main operations:

1.       Configuring and launching the server

2.        Configuring and launching the client

3.       Client Authenticating

4.       Sending a message

5.       Receiving a message

Configuring and launching the server

1.  The administrator creates a public and private key for the server. The keys are stored on the server.

2. The administrator creates a meeting on the conference server. Each meeting has a title, a unique ID, a secret-key encryption algorithm and a randomly-generated secret key appropriate for the encryption algorithm. The administrator creates also user accounts. The user information consists of the username and the user public key.

3.   The administrator launches the server and the server is waiting for connections from clients. The server listens to a certain IP address and a certain port. The server has a list of active meetings.

Configuring and launching the client

1.  The client creates a public and private key for the user. The keys are stored on the client.

2.  If the client wants to use the conference room, he (or she) should ask the server administrator to create an account for him (her). The client provides the server administrator with the username and the user public key.

3.  The user launches the client and connects to the server.

Client Authenticating

1.       The client connects to conference server by specifying the IP address, the port address, the meeting ID.

2.  The client also sends its authentication information which are the username and the user name encrypted using its private key. These information are sent encrypted using the public key of the server.

3. The server authenticate the client. If the authentication is not successful an error message is returned back to the client. The authentication is done by three steps:  1-decrypting the information sent by the client using the server private key, 2- lookup the user public key, 3- comparing the username and the result of decrypting the username using the stored user public key.

4.   If the authentication is successful the server returns back the encryption algorithm used for the meeting and the secret key of the meeting to the client. This information is sent encrypted using the public key of the client.

5.   The client decrypts the meeting encryption parameters using its private key and start sending and receiving messages.

Sending Messages

1. The client sends messages in encrypted format. The message encryption is done using the meeting encryption algorithm and the meeting secret key.

2.  The server forwards the received encrypted message from the client to all the other clients connected to the server on the specified meeting.

Receiving Messages

1.       The client receives an encrypted message.

2.       The client decrypts the message using the meeting encryption algorithm and the meeting secret key.

3.        The client shows the message to the user.

Requirements

The following requirements are essential for the implementation and delivery of the assignment:

1.    Both server and client application should use only text file format for configuration and storage. No DBMS are allowed.

2.    The student should provide the text-format user database containing the user information.

3.    The following encryption algorithms should be used:

a.    DES and/or AES for symmetric key cryptography

b.    RSA for public key cryptography

4.    The server and client applications should be configurable using a UI containing the following information:

a.    Server application: server IP address, port address, path of user database file, server public key, server private key

b.    Client application: server IP address, port address, client public key, client private key

5.    The following documents and source code should be delivered

a.    Assignment specification and design document. This document should contain:

1.    Written using pdf format.

2.    Description of the designed system.

3.    Description of the designed server.

4.    Description of the designed client.

5.    Description of the design of the text-format user database.

6.    A list of error messages exchanged between the client and the server.

b.    Source code of the server application. It should meet the following:

1.    Written in C# using VS 2005.

2.    Use of multi-threading technique for client-server communication.

3.    It uses the Namespace: System.Security .Cryptography (mscorlib) for cryptography functions.

4.    Built using sub procedures

5.    Well commented

c.    Source code of the client application. It should meet the following:

1.    Written in C# using VS 2005.

2.    Use of multi-threading technique for client-server communication.

3.    It uses the Namespace: System.Security .Cryptography (mscorlib) for cryptography functions.

4.    Built using sub procedures

5.    Well commented

d.    System usage manual document. This document should meet the following:

1.    Written using pdf format.

2.    It contains description of the usage of the server application.

3.     It contains description of the configuration of the server application.

4.    It contains description of the usage of the client application.

5.    It contains description of the configuration of the client application.


Related Discussions:- Client-server

Concept of permutation network, Concept Of Permutation Network In permu...

Concept Of Permutation Network In permutation interconnection networks the information replace requires data transfer from input set of nodes to output set of nodes and likely

What are reasons behind using layered protocols, What are reasons behind us...

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay

State in brief about the information access intranet, State in brief about ...

State in brief about the Information Access Intranet This type of Intranet is the type commonly found on the World Wide Web. The static web page may include information on

What are the key benefits of layered network, What are the key benefits of ...

What are the key benefits of layered network? Main advantages of layered network are given below: a) Complex systems can be split into understandable subsystems. b) Any f

Cost saving - application layer, Cost Saving Better performance  scala...

Cost Saving Better performance  scalability  and viability  translates into  saving  for  website  operators.  Because  fewer  application  web servers are required  to meet

What are the two broad classes of middleware, Two broad classes of middlewa...

Two broad classes of middleware are a) General middleware b) Service-specific middleware.

Define virtual channel, Virtual channel is normally a link from one source...

Virtual channel is normally a link from one source to one destination, although multicast connections are also allowed. The other name for virtual channel is virtual circuit.

Developing prototypes - digital receipts, Increasingly it is the quality of...

Increasingly it is the quality of the interface of mobile phones that are giving competitors the edge.  Users not only make selections based on cost but also functionality and cert

Difference between windows 2000 and windows 2003, What is the difference am...

What is the difference among Windows 2000 and Windows 2003?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd