Advertisement

Design and implementation of software consistency detection system based on Netty framework

  • Jun Yang
  • Haipeng ZhangEmail author
  • Lifang Han
  • Baojiang Cui
  • Guowei Dong
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)

Abstract

For studying the consistent detection problem of software code deployed on the server, analysing the existing domestic and foreign consistency detection technology, based on the Netty framework and consistent hash comparison, achieved a software consistency detecting system for remote server. The system can effectively detect software’s consistency information which deployed on the server, and realize communication between server and client by Netty, including comparing task management, comparing information interaction, and through with traditional IO, asynchronous NIO of comparative tests proved the effectiveness and efficiency of the system.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Huang Y. DIGITAL WATERMARKING TECHNIQUE USING HVS AND STATISTICAL CHARACTERISTIC OF IMAGE[J]. Computer Applications & Software, 2004Google Scholar
  2. 2.
    Tao S Q, Chang X R. Software Protection of Power System based on the Encryption Lock[J]. Computer Security, 2010Google Scholar
  3. 3.
    Hao Y H, Liu H B, Zheng L, et al. Software Piracy-proof Method Based on USB Encryption Lock[J]. Computer Engineering, 2010, 36(23):119-120Google Scholar
  4. 4.
    Huang X L, Zhou L, Li J. A Consistency Detection Method of Power Quality Data Interchange Format File[J]. Applied Mechanics & Materials, 2013, 411-414:1465-1469Google Scholar
  5. 5.
    Pimentel V,Nickerson B.G.Communicating and Displaying Real-Time Data with WebSocketGoogle Scholar
  6. 6.
    JBoss.Netty projec[CP t /OL][. 2012-4-1]. http://netty.io/
  7. 7.
    Java Message Service[EB/OL]. http://java.sun.com/products/jms/
  8. 8.
    Jin Z G, Wei L I. Design and implementation of HTTP client based on Netty[J]. Telecom Engineering Technics & Standardization, 2014Google Scholar
  9. 9.
    Shang C W, Liu Q T, Zhao G, et al. Study on Mechanism of Consistency Detection in BPEL Activities Authorization Coordination Based on CPN[J]. Computer Science, 2014Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Jun Yang
    • 1
  • Haipeng Zhang
    • 1
    • 3
    Email author
  • Lifang Han
    • 2
  • Baojiang Cui
    • 1
    • 3
  • Guowei Dong
    • 4
  1. 1.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.China Electric Power Research InstituteBeijingChina
  3. 3.National Engineering Laboratory for Mobile Network SecurityBeijingChina
  4. 4.China Information Technology Security Evaluation CenterBeijingChina

Personalised recommendations