G*@"8 (10)LT 2007 O7OA VAHNTIMSPATENTIJ BITIRAS \Iy (12)PARAISKOS APRASYMAS

Total Page:16

File Type:pdf, Size:1020Kb

G*@ sos YBP.,^ (1e) g*@"8 (10)LT 2007 O7OA VAHNTIMSPATENTIJ BITIRAS \iy (12)PARAISKOS APRASYMAS (21) ParaiSkosnumeris: 2OO7070 (51) Int.Cl. (2006): G01B 15/00 (22) Parai5kospadavimo data: 2007 11 20 (41) Parai5kospaskelbimo data: 2009 03 25 (62) Parai5kos,i5kurios dokumentas i5skirtas, numeris: (86) Tarptautindsparai5kosnumeris: (86) Tarptautin6sparaiSkos padavimo data: (85) NacionalinioPCT lygioprocedIros pradZios data: (30) Prioritetas: P-06-128,2006 11 21, LV (71) PareiSkdjas: RENESANSE PLUS, SlA, Pulkve2aBrie1aiela4-2, LV-2015 JUrmala, LV (72) l5raddjas: Dainis USlttS,tV (74) Patentinis patikdti n is/atstovas: "lntels", TatjanaSTERLINA, UAB Naugarduko9.3212, LT-03225 Vilnius, LT (5+) Pavadinimas: Kompiuteriniqtinklq vartotojq elgesio kontrol6s budas (57) Referatas: l5radimaspriklauso kompiuterinems sistemoms. B0das iSsiskiriatuo, kad vartotojokompiuteris(U) sujungiamassu prieigossistemos serveriu (AS), kuris atitinkamaisujungtas su HUB serveriqsistemos HUB serveriais (H) ir registracijosbloku (RB). B0das vykdomas nuosekliaitam tikrais veiksmais: vartotojo indentifikacijosduomenq nusiuntimasi5 vartoto,jokompiuterio (U) j prieigossistemos serveri (AS); duomenq nusiuntimasnuo prieigos sistemos serverio j registracijosblokq (RB); vartotojo identifikaciniq duomenq autenti5kumopatikrinimas ir vartotojoprieigos teisiq nustatymas, lyginant su registracijosbloke (RB) tam tikroje lentelejearba lentelese(T1)esandiais duomenimis; sujungimo su vartotojouZsakytu HUB serveriupatvifiinimas. Jeigu konstatuojamasvartoto,io autenti5kumas ir jraSytiduomenys atitinka duomenis vienoje arba keliose o lenteldse(T1), o lenteleje(T1) randamasjra5as, kad Sis vartotojasturi prieigq,tuomet siunciamaatitinkama N Zinutevartotojui irlarba HUB serveriui.Jeigu konstatuojama,jog vartotojoduomenys ne autentiSkiir jra5yti o duomenysneatitinka duomenq nd vienojelenteleje (T1), o lenteldjear lenteldsendra jra5o apie tai, kad vafiotojas f- turi teise naudotisHUB serveriqsistema ir registruotisregistracijos bloko (RB)vienoje ar kelioselentelese (T1), o tuomet su jranga (P1) (ji yra kiekvienameHUB serveriqsistemos serveryje) palyginami vartotojo veiksmq o duomenys HUB serveriqsistemoje su jraSais registracijosbloko (RB) vienoje arba keliose lentel6se(T3), sl nustatomipa2eidimai ir vartotojuipritaikomos kontroles priemonds (sankcijos), ira5ytos registracijos bloko (RB) vienojear kelioseatitinkamose lenteldse (T5). Jeigu atitinka jra5ai vienoje ar kelioselentelese (T1) ir HUBserveriq F sistemosregistraci.jos bloko (RB)vienojearba kelioselentel6se (T3), lenteleje (T1) registruojamiduomenys apie J pritaikytaskontroles priemones ir apietai siundiamasprane5imas vartotojui irlarba HUB serveriui. KOMPIUTERINIU TINKLU VARTOTOJU ELGESIO KONTROLES BUDAS I5radimas priklauso valdomoms kompiuteriu sistemoms, bltent kompiuteriniq tinklq vartotojq elgesiokontrolds bDdams, tikrinant ar Siselgesys atitinka tam tikras taisykles. Zinomas P2P (angl. Peerlo-peer) kompiuterinis tinklas, kuris pagristas tinklo dalyviq kompiuteriais, o ne s4lyginai nedideliu serveriq skaidiumi. Tai prieSingybekliento-serverio modeliui. GrynameP2P tinkle ndra ,,kliento'oir ,,serverio"sqvokq - abu susijungqvartotojai yra lygiaverdiai,kiekvienas veikia ir kaip klientas,ir kaip serveris.P2P tinklai yra tipi5kai naudojami, norint sujungti mazgus per didesniushoc sujungimus.Tokie ir panaSls sujungimai naudojami pagal kelis prieigos pareikalavimus.NeZi[rint i tai, kad tinklas padalintas,jis turi bendro naudojimo failus (sharing files), kuriuose yra skaitmeninioformato garso, vaizdo duomenysir realaus laiko duomenys,pavyzdZiui, telefono linijos, kuriose naudojamosP2P technologijos. (ReinventinsP2P: CreatingLegitimate Businesses out of File-SharingNetworks by David Card, ZiaDaniell Wigder, and Corina Matiesanu.(Digital - Mar 24,2006) Visas P2P tinklas neidentifikuojasavqs nei kaip klientas,nei kaip serveris,bet veikia kaip atskiraspeer- to- peer elementas.Bet kuris mazgasveikia ir kaip ,,klientas", ir kaip ,,serveriso'vienu metu, stimuliuodamasabiejq elementqveiksmus. Tokio tinklo sudetis skiriasi nuo iprasto kliento- serveriomodelio, kuriuose komunikacija vyksta per centrin[ server[. Tipi5kas pavyzdys,norint persiqsti non P2P failus, yra FTP serveris,kuriame kliento ir serverio programos yra konkrediai apibreZtos.Kai klientas pradeda faihl persiuntim4 serverisreaguoja ir patenkinauZklausim4. Senesni P2P tinklai pladiai naudojo Usenet Ziniq serveriq sistem4 kurioje bendravo vienas su kitu, kad i5platintrtrUsenet naujienq ir informacijos straipsniusper (Jsenet tinklq. Padioje Usenet pradZioje UUCP buvo naudojamatam, kad galima butq kuo pladiaunaudoti internet4.Tokiu bldu individualusvartotojas (klientas) prisijungdavo prie lokalausZiniq serverioir galejo skaitlti Ij[ [keltus straipsnius.Tokiu padiu budu veikia ir taikomasisSMTP elektroninispa5tas, kuriame Pa5topersiuntimo agentas tiesiogiai (kaip n Peer-to-peeratveju )(Mail transferagents) sujungia periferini paStovartotojq su kliento serveriu. Kai kurie tinklai ir kanalai, pavyzdLiui,Napster, OpenNAP ir IRC serveriokanalai, turi struktflrizuotas mi5rias sistemas ir naudoja kliento-serverio strukturq tik atskiriems uZdaviniams(pavyzdLiui, paie5kai),P2P struktDrE- kitiems uZdaviniams.Tokie tinklai kaip Gnutella arba Freenettaip pat naudojastruktlrizuotas sistemas,kuriose daugiausiai paplitusi peer-to-peer struktlra Tadiau kartais, ypatingai Gnutella tinkle, atliekant paskutiniuspatikrinimus (Zingsnius),norint palengvinti tiesiogini priejim4 prie serverio, tiesiogiai sujungiami skirtingq lygiq vartotojai. Tiesioginis sujungimasyra peer-to-peerbendro vartojimo failq (file-sharing)protokolas. Tiesioginis sujungimasleidZia klientui prisijungti prie centrinio HUB serverioir vienam i5 kito persiqstifailus. HUB atpaZistavartotojus ir sujungiajuos. Centriniai serveriaiSiuo atveju reikalingi tik tam, kad padetq surasti kit4 pusq, o veliau bendravimas jau vyksta tiesiogiai. Vieno lygio tinklq protokolai ir programind iranga BitTorrent: Azureus,BitComet, BitTorrent,Opera; Direct Connect:DC++, NeoModusDirect Connect,RevConnect; DNS eDonkey2000: eDonkey2000, eMule; Gnutella:LimeWire: Napster; Usenet; Network or ProtocolUse Applications; Ares File sharingAres Galaxy,WarezP2P, Filecroc; BitTorrent File sharing/Softwaredistribution/Media distribution ABC, AllPeers,Azureus, BitComet, Bitlord, BitSpirit, BitTornado, BitTorrent, Burst!, Deluge, FlashGet,G3 Torrent, Halite, KTonent, LimeWire, MlDonkey, Opera, QTorrent, rTorrent, Shareaza, TorrentFlux,Transmission, Tribler, pTonent,Thunder; Buzm SharedHTML wiki a peer-to-peerwiki platform; CSpace File sharing, text chat, remote desktop a peer-to-peerbased communications system(bendro vartojimo komunikacinessitemos- tekstinis bendravimas); Direct Connect File sharing DC++, NeoModus Direct Connect, SababaDC,BCDC++, ApexDC++, StrongDC++; Domain Name System Internet information retrieval See Comparison of DNS server software; eDonkeyFile sharingaMule, eDonkey2000(discontinued), eMule, eMule Plus, FlashGet, Hydranode, iMesh, Jubster, lMule, Lphant, Ml-Donkey, Morpheus, Pruna, Shareaza, xMule; FastTrack File sharing giFT, Grokster, iMesh (and its variants stripped of adware including iMesh Light), Kazaa (and its variants strippedof adwaresuch as Kazaa Lite), KCeasy,Mammoth, MlDonkey, Poisoned; FreenetDistributed data store Entropy (on its own network),Freenet; GNUnet File sharing,chat GNUnet, (GNUnet-gtk); GnutellaFile sharingAcquisition, BearShare,Cabos, FrostWire, Gnucleus, Grokster, gtk- gnutella, iMesh, Kiwi Alpha, LimeWire, MlDonkey, Morpheus, Poisoned, Swapper, Shareaza.XoloX: Gnutella2 File sharing Adagio, Caribou, Gnucleus, iMesh, Kiwi Alpha, MlDonkey, Morpheus,Shareaza, TrustyFiles Kad Network File sharingaMule, eMule, MlDonkey; JXTA Peer applications WiredReach Platform, Collanos Workplace (Teamwork software).Sixearch: Krawler Socialnetwork Krawler[x] ; MANOLITO/MP2P File sharingBlubster, Piolet; MFPnet File sharingamiciPhone (no longeravailable); NapsterFile sharingNapigator, Napster; NeoEdgeFile sharing,peer applicationsMostFun GamePlayer, NeoARM gamedelivery OpenNapFile sharingWinMX, Utatane,XNap, Lopster,Winlop, Napster; P2PTV Video stream or file sharing TVUPlayer, Joost, CoolStreaming,Cybersky-TV, TVants.PPLive. Kontiki. LiveStation: PDTP Streamingmedia or file sharingDistribuStream; PeercastingMulticasting streamsPeerCast, IceShare, FreeCast, PeerStream, Rawfl ow RetroshareRetroshare serverless Filesharins with Chat Messenser: Tranche; UsenetDistributed discussion expressl-oad; Windows Peer-to-PeerAdvanced Networking Pack for Windows XP,Windows XP SP2, Windows Vista (Tai Windows komponentai,kurie uZtikrinapeer-to-peer tinkle ir atgalini pareiSkimq); WPNP File sharingWinMX. Multi-tinklo parei5kimas Bendronaudoj imo failq parei5kimqpal i ginimas; Tinklo parei5kimasarba Protokolo operacinds sistemos Licencija; AMIGIFT FastTrack,Ares, OpenFT,Gnutella, BitTonent AmigaOS GPL / PD; aMule eDonkeynetwork, Kad network Cross-platformGPL; eMule eDonkeynetwork, Kad network Windows GPL; FileScopeeDonkey network, Gnutella,Gnutella2, OpenNAP Cross-platform GPL; giFT eDonkeynetwork, FastTrack, Gnutella Cross-platform GPL; GnucleusGnutella, Gnutella2 Windows GPL; Gtk-GnutellaGnutella Linux GPL; iMesh FastTrack,eDonkey network, Gnutella, Gnutella2 Windows KCeasyAres, FastTrack,Gnutella, OpenFT Windows GPL; Kiwi Alpha Gnutella,Gnutella2 Windows MLDonkey BitTorrent, Direct Connect, eDonkey network, FastTrack, Gnutella, Gnutella2,Kad Network, OpenNap,SoulSeek, HTTP/FTP Cross-platformGPL; MorpheusNEO Network, Gnutella,Gnutella2, BitTorrent Windows
Recommended publications
  • Eurosim Mk7.1 Software User's Manual
    EuroSim Mk7.1 Software User’s Manual iss: 8 rev: 1 SUM NLR-EFO-SUM-2 Summary EuroSim Mk7.1 is an engineering simulator framework to support the quick development of hard real- time simulators. EuroSim provides a reconfigurable real-time execution environment with the possibility of man-in-the-loop and/or hardware-in-the-loop additions. Extensive Graphical User Interfaces assist the user in constructing, using and analysing real-time simulations, resolving the user from the specialist software engineering knowledge required to built hard real-time systems. EuroSim has been developed initially to support the verification of space (sub) systems defined by ESA programmes of various scales. It’s heritage lies in the development of the European Robotic Arm(ERA) project where EuroSim was essential in the development and verification of the large symmetrical arm that can move accross the International Space Station. Up to today, EuroSim installations are still used around the world to support ERA’s mission preparation, verification and training. After initial devel- opment and application for ERA, EuroSim has been succesfully used in the development, verification and training of the Autonomous Transfer Vehicle (ATV) with multiple installations worldwide. Other space programs where EuroSim has been applied since are Galileo, Herschel & Planck, Gaia to name a few major missions. Currently EuroSim has made its way in to other domains as well, with application in the F-35 Lightning-II Embedded Training program and simulations in support of road tunnel system verification. This document contains both the User Guide as well as the Reference Guide documentation and consists of five volumes.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • CONCLUSIONES DEL ABOGADO GENERAL SR. PEDRO CRUZ VILLALÓN Presentadas El 14 De Abril De 2011 1
    CONCLUSIONES DEL SR. CRUZ VILLALÓN — ASUNTO C-70/10 CONCLUSIONES DEL ABOGADO GENERAL SR. PEDRO CRUZ VILLALÓN presentadas el 14 de abril de 2011 1 Índice I. Introducción ................................................................... I - 11964 II. Marco jurídico ................................................................. I - 11967 A. Derecho de la Unión ....................................................... I - 11967 1. Normativa en materia de protección de la propiedad intelectual ............. I - 11967 a) Directiva 2001/29 relativa a la armonización de determinados aspectos de los derechos de autor y derechos afines a los derechos de autor en la sociedad de la información ......................................... I - 11967 b) Directiva 2004/48 relativa al respeto de los derechos de propiedad intelec- tual . I - 11968 2. Normativa en materia de protección de datos personales ................... I - 11969 a) Directiva 95/46 relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos . I - 11969 b) Directiva 2002/58 relativa al tratamiento de los datos personales y a la protección de la intimidad en el sector de las comunicaciones electróni- cas . I - 11969 3. Normativa en materia de comercio electrónico: Directiva 2000/31 ........... I - 11970 B. Derecho nacional . I - 11970 1 — Lengua original: francés. I - 11962 SCARLET EXTENDED III. Hechos que dieron lugar al litigio principal y cuestiones prejudiciales ................. I - 11971 A. Hechos
    [Show full text]
  • Spyglassfall2015.Pdf
    1 THERE ARE MANY WAYS TO TELL A STORY. Part of our mission is to keep alive the maritime history of our Nation’s Oldest PortSM by telling its stories. Well, we have two important stories to tell in our new exhibit, Wrecked!, which will be opening in May 2016. We want everyone, especially our young- est visitors, to be able to connect with this unique shipwreck story and with the archaeological side of discovering, exca- vating and conserving shipwrecks. That’s why we have added a new storyteller to our Lighthouse family—Star Waters! Star is a curious, adventerous young student who will inspire a whole new generation of underwater archaeologists and explorers. Throughout the Wrecked! exhibit, you’ll see a series of vignettes called “Star Waters Wonders” which will ask questions that provoke our young guests to think more in-depth about science, history, math, and engineering. So let our friend Star give you a sneak peek of the new exhibit (which is unlike anything you have ever seen at our Museum) in this special issue! 2 Dear Members, We have so much to be thankful for this holiday season. The blessing of being busy is always with us. We are about to break ground on a new Maritime Archaeology & Education Center with public viewing areas for shipwreck artifacts and handicap accessible learning spaces. A new exhibit is coming in the spring. Luminary Night is coming December 2nd! Our membership is larger than ever! We are thankful for the privilege to work for you. We are blessed to know and serve you.
    [Show full text]
  • Issues in the Design and Implementation of a Real-Time Garbage Collection Architecture " (1992)
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1992 Issues in the design and implementation of a real- time garbage collection architecture William Jon Schmidt Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Schmidt, William Jon, "Issues in the design and implementation of a real-time garbage collection architecture " (1992). Retrospective Theses and Dissertations. 10388. https://lib.dr.iastate.edu/rtd/10388 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper aligrmient can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps.
    [Show full text]
  • Title: P2P Networks for Content Sharing
    Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia (chd, sarana, raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section. 1. INTRODUCTION Peer-to-peer (P2P) content sharing has been an astonishingly successful P2P application on the Internet. P2P has gained tremendous public attention from Napster, the system supporting music sharing on the Web. It is a new emerging, interesting research technology and a promising product base. Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems". This thus gives P2P systems two main key characteristics: • Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system. • Reliability: The malfunction on any given node will not effect the whole system (or maybe even any other nodes). File sharing network like Gnutella is a good example of scalability and reliability.
    [Show full text]
  • Investigating the User Behavior of Peer-To-Peer File Sharing Software
    www.ccsenet.org/ijbm International Journal of Business and Management Vol. 6, No. 9; September 2011 Investigating the User Behavior of Peer-to-Peer File Sharing Software Shun-Po Chiu (Corresponding author) PhD candidate, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan & Lecture, Department of Information Management Vanung University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Huey-Wen Chou Professor, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Received: March 26, 2011 Accepted: May 10, 2011 doi:10.5539/ijbm.v6n9p68 Abstract In recent years, peer-to-peer file sharing has been a hotly debated topic in the fields of computer science, the music industry, and the movie industry. The purpose of this research was to examine the user behavior of peer-to-peer file-sharing software. A methodology of naturalistic inquiry that involved qualitative interviews was used to collect data from 21 university students in Taiwan. The results of the study revealed that a substantial amount of P2P file-sharing software is available to users. The main reasons for using P2P file-sharing software are to save money, save time, and to access files that are no longer available in stores. A majority of respondents use P2P file-sharing software to download music, movies, and software, and the respondents generally perceive the use of such software as neither illegal nor unethical. Furthermore, most users are free-riders, which means that they do not contribute files to the sharing process. Keywords: Peer to peer, File sharing, Naturalistic inquiry 1. Introduction In recent years, Peer-to-Peer (P2P) network transmission technology has matured.
    [Show full text]
  • Public Peer-To-Peer Filesharing Networks’ Evaluation
    PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]