Psichogios.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Psichogios.Pdf 1 ΠΑΝΕΠΙΣΤΗΜΙΟ ΠΕΙΡΑΙΩΣ Τμήμα Ψηφιακών Συστημάτων «Διαχείριση κατανεμημένου πολυμεσικού περιεχομένου με χρήση υπηρεσιοστρεφών αρχιτεκτονικών » ΨΥΧΟΓΥΙΟΣ ΕΥΣΤΑΘΙΟΣ Η εργασία υποβάλλεται για την μερική κάλυψη των απαιτήσεων με στόχο την απόκτηση του Μεταπτυχιακού Διπλώματος Σπουδών στα Ψηφιακά Συστήματα του Πανεπιστήμιο Πειραιώς 2 ΠΙΝΑΚΑΣ ΠΕΡΙΕΧΟΜΕΝΩΝ ΠΙΝΑΚΑΣ ΠΕΡΙΕΧΟΜΕΝΩΝ ............................................................................... 2 ΠΕΡΙΛΗΨΗ ............................................................................................................. 4 ΚΑΤΑΛΟΓΟΣ ΣΧΗΜΑΤΩΝ .................................................................................. 5 ΕΙΣΑΓΩΓΗ .............................................................................................................. 6 ΜΕΡΟΣ ΠΡΩΤΟ ..................................................................................................... 7 0 ΚΕΦΑΛΑΙΟ 1 - ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ ........................................ 7 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΕΙΣΑΓΩΓΗ ........................................... 7 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΠΛΕΟΝΕΚΤΗΜΑΤΑ ............................. 9 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΠΑΡΑΔΕΙΓΜΑΤΑ................................ 10 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΤΙ ΑΛΛΑΖΕΙ; ....................................... 11 ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – TO ΜΕΛΛΟΝ ΤΟΥΣ ΣΤΗΝ ΕΛΛΑΔΑ .. 12 ΤΕΧΝΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ – ΟΡΙΣΜΟΣ ....................................................ΠΕΙΡΑΙΑ 14 ΤΕΧΝΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ – ΜΟΝΤΕΛΟ ................................................... 15 ΤΕΧΝΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ – ΔΗΜΙΟΥΡΓΙΑ ΤΩΝ WEB SERVICES ........... 19 ΤΕΧΝΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ – ΧΡΗΣΗ ΤΩΝ WEB SERVICES ..................... 22 ΤΕΧΝΙΚΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ – ΣΥΜΠΕΡΑΣΜΑΤΑ ....................................... 23 0 ΚΕΦΑΛΑΙΟ 2 – JAVA MEDIA FRAMEWORK ................................................ 24 JMF –JAVA MEDIA FRAMEWORK – ΕΙΣΑΓΩΓΗ .......................................... 24 JMF –JAVA MEDIA FRAMEWORK – ΕΦΑΡΜΟΓΕΣ ...................................... 25 ΠΡΟΑΠΑΙΤΟΥΜΕΝΑ ΓΙΑ ΤΗΝ ΕΓΚΑΤΑΣΤΑΣΗ ΤΟΥ JMF ............................. 25 ΕΓΚΑΤΑΣΤΑΣΗ ΤΟΥ JMF ............................................................................... 26 JMF –JAVA MEDIA FRAMEWORK – ΑΡΧΙΤΕΚΤΟΝΙΚΗ ............................... 27 ΑΝΑΛΥΣΗ ΣΗΜΑΝΤΙΚΟΤΕΡΩΝ ΟΡΩΝ ΤΟΥ JMF ......................................... 31 RTP – REAL TIME TRANSFER PROTOCOL ................................................... 34 ΜΕΡΟΣ ΔΕΥΤΕΡΟ ............................................................................................... 35 ΚΕΦΑΛΑΙΟ 1Ο- ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΣΥΣΤΗΜΑΤΟΣ ........................................ 35 ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΣΥΣΤΗΜΑΤΟΣ – ΕΙΣΑΓΩΓΗ ............................................ 35 ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΣΥΣΤΗΜΑΤΟΣ .................................................................. 37 ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΣΥΣΤΗΜΑΤΟΣ – ΕΦΑΡΜΟΓΗ ΧΡΗΣΤΗ ΟΘΟΝΕΣ ΕΦΑΡΜΟΓΗΣ.................................................................................................. 43 ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΣΥΣΤΗΜΑΤΟΣ - ΕΦΑΡΜΟΓΗ ΧΡΗΣΤΗ ΑΝΑΛΥΣΗ ΚΛΑΣΕΩΝ........................................................................................................ 51 ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΣΥΣΤΗΜΑΤΟΣ – ΑΝΑΛΥΣΗ ΥΠΗΡΕΣΙΩΝ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ .............................................................................................................. 56 ΑΡΧΙΤΕΚΤΟΝΙΚΗ ΣΥΣΤΗΜΑΤΟΣ – ΑΝΑΛΥΣΗ ΒΑΣΗΣ ΔΕΔΟΜΕΝΩΝ ........ 58 ΜΕΡΟΣ ΤΡΙΤΟ ..................................................................................................... 64 0 ΚΕΦΑΛΑΙΟ 1 – P2P ΔΙΚΤΥΑ ........................................................................... 64 P2P ΔΙΚΤΥΑ ΕΙΣΑΓΩΓΗ ................................................................................. 64 ΠΤΕΧΑΝΟΛΝΟΓΙΑΕ GNUΠTELLΙΣA .............................................................................ΤΗΜΙΟ 65 ΤΕΧΝΟΛΟΓΙΑ FAST TRACK ........................................................................... 68 ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ ΤΟΥ ΣΥΣΤΗΜΑΤΟΣ ΜΑΣ ............................................... 69 3 0 ΚΕΦΑΛΑΙΟ 2 – ΔΥΣΚΟΛΙΕΣ ΥΛΟΠΟΙΗΣΗΣ &ΠΡΟΟΠΤΙΚΕΣ ΕΞΕΛΙΞΗΣ .. 70 ΔΥΣΚΟΛΙΕΣ – ΠΡΟΒΛΗΜΑΤΑ ΥΛΟΠΟΙΗΣΗΣ .............................................. 70 ΠΡΟΟΠΤΙΚΕΣ ΕΞΕΛΙΞΗΣ ΚΑΙ ΒΕΛΤΙΩΣΗΣ ................................................. 72 ΒΙΒΛΙΟΓΡΑΦΙΑ.................................................................................................... 73 URL’S .................................................................................................................. 73 ΣΥΓΓΡΑΜΜΑΤΑ -ΔΗΜΟΣΙΕΥΣΕΙΣ ................................................................. 73 ΠΕΙΡΑΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ 4 ΠΕΡΙΛΗΨΗ Το παρών σύγγραμμα αποτελεί το παραδοτέο της πτυχιακής εργασίας του μεταπτυχιακού φοιτητή Ψυχογυιού Ευστάθιου και αφορά στην προσπάθεια υλοποίησης ενός συστήματος ανταλλαγής αρχείων πολυμέσων με την χρήση της τεχνολογίας υπηρεσιών παγκόσμιου ιστού. Λέξεις κλειδιά 1. Web Services 2. SOAP (Simple Object Architecture Protocol) ΠΕΙΡΑΙΑ 3. Java 4. JMF (Java Media FrameWork) 5. XML (Extensive Markup Language) 6. HTTP (Hyper Text Transfer Protocol) 7. P2P (Peer to Peer) 8. Apache Tomcat 9. My Sql ΠΑΝΕΠΙΣΤΗΜΙΟ 5 ΚΑΤΑΛΟΓΟΣ ΣΧΗΜΑΤΩΝ Ακολουθεί κατάλογος με τα σχήματα του παρόντος συγγράμματος: 1. Σχήμα 1.1.1 -Παράδειγμα web 20. Σχήμα 2.1.5 – Κεντρική οθόνη services 21. Σχήμα 2.1.6 – Προβολή 2. Σχήμα 1.1.2 - Web Service μηνυμάτων Logos 22. Σχήμα 2.1.7- Οθόνη προβολής 3. Σχήμα 1.1.3 - Κλήση Web μενού File & Help services 23. Σχήμα 2.1.8– Οθόνη προβολής 4. Σχήμα 1.1.4 –SOAP envelope μενού Tools 5. Σχήμα 1.1.5– Σχεδιάγραμμα 24. Σχήμα 2.1.9– Οθόνη λειτουργίας Web Service προσθήκης αρχείων στην βιβλιοθήκη 6. Σχήμα 1.1.6– Οθόνη WSDL 25. Σχήμα Π2.1.10Ε– ΟΙθόΡνη ΑΙΑ 7. Σχήμα 1.2,1– Οθόνη JMF προσθ ήκης αρχείων στην STUDIO βιβλιοθήκη 8. Σχήμα 1.2.2– Αρχιτεκτονική 26. Σχήμα 2.1.11– Οθόνη JMF προβολής της βιβλιοθήκης 9. Σχήμα 1.2.3-JMF stack 27. Σχήμα 2.1.12- Οθόνη τροποποίησης εγγραφής 10. Σχήμα 1.2.4- Player 28. Σχήμα 2.1.13– Οθόνη 11. Σχήμα 1.2.5- Processor προβολής του ιστορικού των 12. Σχήμα 1.2.6– Επεξεργασία αρχείων μου σήματος 29. Σχήμα 2.1.14 - Οθόνη προβολής network settings 13. Σχήμα 1.2.7 – JMF logo 30. Σχήμα 2.1.15-Διάγραμμα 14. Σχήμα 1.2.8- Player Οντοτήτων Συσχετίσεων 15. Σχήμα 1.2.9- Processor 31. Σχήμα 2.1.16 -Διάγραμμα 16. Σχήμα 2.1.1– Αρχιτεκτονική Οντοτήτων Συσχετίσεων υπηρεσίας 32. Σχήμα 2.1.17 – Πίνακες της 17. Σχήμα 2.1.2– Ανταλλαγή βάσης αρχείων σε P2P επίπεδο 33. Σχήμα 2.1.18 - Πίνακας user 18. Σχήμα 2.1.3– Διάγραμμα 34. Σχήμα 2.1.19- Πίνακας music περιπτώσεων χρήσης file 19. Σχήμα 2.1.4– Επικοινωνία με ΠΑΝΕΠΙΣΤΗΜ35.ΙΟ Σχήμα 2.1.20- Πίνακας video βάση Δεδομένων file 6 ΕΙΣΑΓΩΓΗ Στόχος μας είναι η ανάπτυξη μιας ολοκληρωμένης υπηρεσίας ανταλλαγής αρχείων πολυμέσων (multimedia file exchange service) –με την χρήση υπηρεσιών παγκόσμιου ιστού (web services). Η υπηρεσία αυτή θα πρέπει να υποστηρίζει τόσο ανταλλαγή αρχείων (file downloading) όσο και file streaming μεταξύ των χρηστών. Το παρών σύγγραμμα αποτελεί συνοδευτικό του κώδικα και των αρχείων υλοποίησης της υπηρεσίας μας . Είναι δομημένο σε 3 μέρη. Ø Στο πρώτο μέρος γίνεται μια επισκόπηση των βασικότερων τεχνολογιών που χρησιμοποιήσαμε. Απαρτίζεται από 2 κεφάλαια. Στο πρώτο γίνεται αναφορά στην τεχνολογία των υπηρεσιών παγκόσμιου ιστού. Απαρτίζεται από 10 παραγράφους. Επικεντρώνεται κυρίως στην χρήσηΠ τωνΕ υπηΙρεσΡιώνΑ αυΙΑτών στην χώρα μας καθώς και στα πλεονεκτήματα που αποκομίζουμε από αυτήν Τέλος γίνεται αναφορά στο βασικότερο μοντέλο υλοποίησης των υπηρεσιών αυτών Στο δεύτερο κεφάλαιο ασχολούμαστε με το Java Media Framework – το οποίο και χρησιμοποιούμε για το streaming των αρχείων πολυμέσων. Απαρτίζεται από 7 παραγράφους ενώ γίνεται αναφορά και στο πρωτόκολλο μεταφοράς που χρησιμοποιούμε –Real Transfer Protocol. Ø Στο δεύτερο μέρος απαρτίζεται επίσης από 2 κεφάλαια .Στο πρώτο γίνεται ανάλυση της αρχιτεκτονικής, της λειτουργίας και των κλάσεων που υλοποιούν την υπηρεσία μας Απαρτίζεται από 6 παραγράφους .Στο δεύτερο κεφάλαιο παρουσιάζονται οι κυριότερες δυσκολίες που συναντήσαμε για την ολοκλήρωση της παρούσας εργασίας καθώς και οι λύσεις που υιοθετήσαμε. Ø Στο τρίτο και τελευταίο μέρος γίνεται μια ανάλυση ης τεχνολογίας P2P (Peer to Peer) και γίνεται σύγκριση του συστήματος μας με άλλα ήδη υπάρχοντα. Κλείνοντας γίνεται σύντομη αναφορά στις δυσκολίες που συναντήσαμε καθώς και στις προοπτικές εξέλιξης του συστήματος μας. ΠΑΝΕΠΙΣΤΗΜΙΟ 7 ΜΕΡΟΣ ΠΡΩΤΟ ΚΕΦΑΛΑΙΟ 10 - ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ ΥΠΗΡΕΣΙΕΣ ΠΑΓΚΟΣΜΙΟΥ ΙΣΤΟΥ – ΕΙΣΑΓΩΓΗ Σήμερα το Internet αποτελεί για τις επιχειρήσεις ένα μέσο προβολής και δημοσιοποίησης των δραστηριοτήτων τους. Τα τελευταία χρόνια όμως πολλές επιχειρήσεις παγκΠοσμίωςΕ ΙάΡρχισΑαν ΙΑνα χρησιμοποιούν το Internet ως μέσο παροχής υπηρεσιών προς τους πελάτες τους αλλά και προς άλλες επιχειρήσεις. Με την εξέλιξη αυτή δημιουργήθηκε ένα σύνολο από θέματα που είχαν να κάνουν με την ευχρηστία, τη λειτουργικότητα και την απλότητα των παρεχόμενων υπηρεσιών. Και ενώ οι προσπάθειες που έγιναν για να δοθούν λύσεις ήταν πολλές, το αποτέλεσμα ήταν το ίδιο: υπήρχε ένα μεγάλο σύνολο από έτοιμες υπηρεσίες στο Internet αλλά η χρησιμοποίησή τους ήταν πάρα πολύ μικρή. Πρόσφατα όμως μία αρχιτεκτονική που ήδη έχει θεσπιστεί και από το world wide web consortium [ www.w3c.org ], με το όνομα web service, ήρθε να δώσει λύση στα προβλήματα ευχρηστίας και λειτουργικότητας των ηλεκτρονικών υπηρεσιών. Μέσα από την αρχιτεκτονική των web services ορίζεται ένα σύνολο από προδιαγραφές και κανόνες με τους οποίους είναι δυνατή η δημιουργία και η παροχή ηλεκτρονικών υπηρεσιών μέσα στο Internet με αρκετά απλό τρόπο. Έτσι τα τελευταία τρία
Recommended publications
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Pledge of Compliance of the Information Security Policy of Nagoya University
    For submission Pledge of Compliance of the Information Security Policy of Nagoya University To the Director of Information and Communications Headquarters 1. As a member of the academic community of Nagoya University, I will carefully read the following two documents and hereby pledge to comply with the rules, regulations and guidelines specified therein. a. The Information Security Policy of Nagoya University (*1) b. The Network Usage Guidelines (User Information) of Nagoya University (*2) 2. I promise to take the “e-Learning Training Course on Information Security” (*3) within one month after enrollment. Examinee's number Date: School / Graduate School: Department: Name: Signature: Notice: Users who violate the Information Security Policy of Nagoya University and/or the Network Usage Guidelines (User Information) of Nagoya University may be subject to disciplinary action according to the Nagoya University General Rules, the Nagoya University Student Discipline Rules, etc. Downloading illegally distributed music and/or movie files is an infringement of copyright law. Those who download files illegally will be liable for compensation damages. Nagoya University will prohibit any illegal downloading of files through its computers and/or network. Nagoya University prohibits the use of file sharing software such as Winny, WinMX, Share, Gnutella (Cabos, LimeWire, Shareaza, etc.) and Xunlei. * If the use of said software is required for education or research purposes, prior approval by the Information and Communications Headquarters is mandatory. If users fail to take the “e-Learning Training Course on Information Security” within one month after enrollment or if they do not successfully complete the course, their access to the Nagoya University Portal, Nagoya University Mail, the Information Media System, and the Wireless LAN (NUWNET) will be suspended.
    [Show full text]
  • Instructions for Using Your PC ǍʻĒˊ Ƽ͔ūś
    Instructions for using your PC ǍʻĒˊ ƽ͔ūś Be careful with computer viruses !!! Be careful of sending ᡅĽ/ͼ͛ᩥਜ਼ƶ҉ɦϹ࿕ZPǎ Ǖễƅ͟¦ᰈ Make sure to install anti-virus software in your PC personal profile and ᡅƽញƼɦḳâ 5☦ՈǍʻPǎᡅ !!! information !!! It is very dangerous !!! ᫬ΚTẝ«ŵ┭ՈT Stop violation of copyright concerning illegal acts of ơųጛňƿՈ☢ͩ ⚷<ǕO਍ᜐ&« transmitting music and ₑᡅՈϔǒ]ᡅ others through the Don’t forget to backup ඡȭ]dzÑՈ Internet !!! important data !!! Ȥᩴ̣é If another person looks in at your E-mail, it’s a big ὲâΞȘᝯɣ׏r problem !!! Don’t install software in dz]ǣrPǎᡅ ]ᡅîPéḳâ╓ ͛ƽញ4̶ᾬϹ࿕ ۅTake care of keeping your some other PCs without ੥ˊΙǺ password !!! permission !!! ₐ Stop sending the followings !!! ؄ŌՈϹوInformation against public order and Somebody targets on your PC for Pǎ]ᡅǕễạǑ͘͝ࢭÛ ΞȘƅ¦Ƿń morals illegal access !!! Ոƅ͟ǻᢊ᫁᫨ĐՈ ࿕Ϭ⓶̗ʵ£࿁îƷljĈ Information about discrimination, Shut out those attacks with firewall untruth and bad reputation against a !!! Ǎʻ ᰻ǡT person ᤘἌ᭔ ᆘჍഀ ጠᅼૐᾑ ᭼᭨᭞ᮞęɪᬡ෉ᬡǰɟ ᆘȐೈ࿴ ᾑ૥ ጠᅼ3ظ ᤘἌ᭔ ǰɟᯓۀ᭞ᮞ᭿ᮐᮧ᭪᭑᭎ᮖ᭤ᬞᬢ ഄᅤ Έʡȩîᬡ͒ͮᬢـ ᅼܘᆘȐೈ ǸᆜሹظᤘἌ᭔࿴ ཬᴔ ᭼᭨᭞ᮞᬞᬢŽᬍ᭑᭎ᮖ᭤̛ɏ᭨ᮀ᭳ᭅ ரἨ᳜ᄌ࿘Π ؼ˨ഀ ୈ᡼ὼ$ ഄጵ↬3L ʍ୰ᬞᯓ ᄨῼ33 Ȋථᬚᬌᬻᯓ ഄ˽ ઁǢᬝຨϙଙͮـᅰჴڹެ ሤᆵͨ˜Ɍ ጵႸᾀ żᆘ᭔ ᬝᬜ᫞Ϊ̎UઁɃᬢ ࡶ୰ᬝ᭲ᮧ᭪ᬢ ᄨؼᾭᄨ ᾑ૥ ٕ࿩ᅨ ΰ̛ᬞ᭫ᮌᯓ ᭻᭮᭚᭍᭮ᮂᭅ ሬČ ཬȴ3 ᾘɤɟ3 Ƌᬿᬍᬞᯓ ᫾ᬿᬒᬼۏąഄᅼ Ѹᆠᅨ ᮌᮧᮖᭅ ⃸ᛴܠ ఼ ᆬð3 ᤘἌ᭔࿴ ƂŬᯓ ᭨ᮀ᭳᭑᭒᭍ᭅƖ̳ᬞ ĩᬡ᭼᭨᭞ᮞᬞٴ ரἨ᳜ᄌ࿘ ᭼᭤ᮚᮧ᭴ᬡɼǂᬢ ڹެ ᵌೈჰ˨ ˜ϐ ᛄሤ↬3 ᆜೈᯌ ϤᏤ ᬊᬖ᫾ᬽᬊᬻ᫹ᯓ ᭏ᮞ᭤᭳ᮧᮖᬊᬝ᫷ᬚ ሬČʀ ͌ǜ ąഄᅼ ΰ̛ᬞ ޅ᫾᫿᫵ᬝᬒᬡ᭼᭨᭞ᮞᭅ ᤘἌ᭔Π ͬϐʼ ᆬð3 ʏͦᬞɃᬌᬾȩî ēᬖᬙ᫷ᬾᯓ ܘˑˑᏬୀΠ ᄨؼὼ ሹ ߍɋᬞ᫵ᬒᬾȩî ᮀᭌ᭏᭍᭑᭔ᮧᮖwƫᬚފᴰᆘ࿘ჸ $±ᅠʀ =Ė ܘ૥Čٍᅨ ᙌۨ5ࡨٍὼ ሹ ഄϤᏤ ᤘἌ᭔ ኩ˰Π3 ᬢ͒ͮᬊᬝ᫷ᯓ ᭢ᮎ᭮᭳᭍᭑᭳ᬊᬻ᫹ᯓـ ʧʧ¥¥ᬚᬚP2PP2P᭨᭨ᮀᮀ᭳᭳᭑᭑᭒᭒᭍᭍ᬢᬢ DODO NOTNOT useuse P2PP2P softwaresoftware ̦̦ɪɪᬚᬚᬀᬀᬱᬱᬎᬎᭆᭆᯓᯓ inin campuscampus networknetwork !!!! Z ʧ¥᭸᭮᭳ᮚᮧ᭚ᬞ᫽ᬄᬾ੒ͮᬢȴƏΜˉ᭢᭤᭱ Z All communications in our campus network are ᬈᬿᬙ᫷ᬱᬌ᫟ʧ¥ᬚP2P᭨ᮀ always monitored automatically.
    [Show full text]
  • ABCD Just Released New Books September 2010
    ABCD springer.com Just Released New Books September 2010 All Titles, All Languages sorted by author and title within the main discipline springer.com Arts 2 G. Marranci, National University of Singapore, Dept of Sociology, Arts Singapore (Ed.) Biomedicine Muslim Societies and the É. Brian, EHESS, Paris, France (Ed.) Challenge of Secularization: An J. Barciszewski, PAN Poznan, Poznan, Poland (Ed.) Travail et savoirs techniques dans la Interdisciplinary Approach RNA Technologies and Their Chine prémoderne Applications 2. Trajectoire d’experts Scholars from various disciplines worked together to present the first interdisciplinary book to address the issue of Islam, secularism and globalization. The Innovation in biotechnology that combine molecu- book has a clear structure which represents its inter- lar biology, cell biology, microfabrication and bioin- Dans un pays, la Chine, où l’action collective est disciplinary approach: the first section addresses formatics are moving nucleic acid technologies from soumise de très longue date à un État bureaucra- the philosophical and historical discussion about futuristic possibilities into common laboratory and tique, étudier la formation des activités et des savoirs Islam and secularism; the second section discusses clinical procedures. They have potential to revolu- techniques, c’est se donner un angle pertinent pour the topic from an ethnographical and social anthro- tionize biomedical research and medicine. Three saisir les liens que cet État et la société créent et pological viewpoint; and the final section addresses variants of RNA technologies are known, namely reconfigurent continûment. Ce numéro traite des Islam, secularism and globalization from a politi- antisense oligonucleotides, RNA interference, and trajectoires individuelles des experts.
    [Show full text]
  • Shutter Limewire
    Case 1:06-cv-05936-KMW Document 235-2 Filed 06/04/2010 Page 1 of 15 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ARISTA RECORDS LLC; ATLANTIC RECORDING CORPORATION; BMG MUSIC; CAPITOL RECORDS, INC.; ELECTRA ENTERTAINMENT GROUP INC.; INTERSCOPE RECORDS; LAFACE RECORDS LLC; MOTOWN RECORD COMPANY, L.P.; PRIORITY RECORDS LLC; SONY BMG MUSIC ENTERTAINMENT; UMG RECORDINGS, 06 Civ. 05936 (KMW) INC.; and WARNER BROS. RECORDS INC., ECF CASE Plaintiffs, [PROPOSED] PERMANENT v. INJUNCTION AGAINST LIME WIRE LLC; LIME GROUP LLC; LIME WIRE LLC; LIME GROUP LLC; AND MARK GORTON MARK GORTON; GREG BILDSON; and M.J.G. LIME WIRE FAMILY LIMITED PARTNERSHIP, Defendants. By Opinion and Order entered May 11, 2010, and amended on May 25, 2010 (“Order”), this Court found defendants Lime Group LLC, Lime Wire LLC, and Mark Gorton (collectively, “Lime Wire”) liable for inducing copyright infringement on a “massive scale.” (Order at 33.) The Court now enters a Permanent Injunction in favor of the Plaintiffs, and against Lime Wire pursuant to 17 U.S.C. § 502 and Federal Rule of Civil Procedure 65, and in accordance with the following terms. I. PERMANENT INJUNCTIVE RELIEF IS WARRANTED In its Order, the Court held Lime Wire liable for inducement of copyright infringement, as well as for common law copyright infringement and unfair competition as to Plaintiffs’ protected pre-1972 works. The evidence showed as a matter of law that: Lime Wire “intentionally encouraged direct infringement” by Lime Wire users. (Order at 29.) 10710383.4 1 Case 1:06-cv-05936-KMW Document 235-2 Filed 06/04/2010 Page 2 of 15 The LimeWire client software is used “overwhelmingly for infringement,” and allows for infringement on a “massive scale.” (Id.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Comodo System Cleaner Software Version 3.0
    Comodo System Cleaner Software Version 3.0 User Guide Guide Version 3.0.011811 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System- Cleaner - Introduction ................................................................................................................................. 3 1.1.System Requirements......................................................................................................................................................... 5 1.2.Installing Comodo System-Cleaner..................................................................................................................................... 5 1.3.Starting Comodo System-Cleaner....................................................................................................................................... 9 1.4.The Main Interface............................................................................................................................................................ 10 1.5.The Summary Area........................................................................................................................................................... 11 1.6.Understanding Profiles...................................................................................................................................................... 12 2.Registry Cleaner......................................................................................................................................................................
    [Show full text]
  • NETWORK APPLICATION PROFILING with TRAFFIC CAUSALITY GRAPHS 291 to Search Related flows
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2014; 24: 289–303 Published online 5 June 2014 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/nem.1865 Network application profiling with traffic causality graphs Hirochika Asai,1; Kensuke Fukuda,2 Patrice Abry,3 Pierre Borgnat3 and Hiroshi Esaki1 1Graduate School of Information Science and Technology, University of Tokyo, Japan 2NII, Tokyo, Japan 3CNRS, Ecole Normale Supérieure de Lyon, Lyon, France SUMMARY A network application profiling framework is proposed that is based on traffic causality graphs (TCGs), representing temporal and spatial causality of flows to identify application programs. The proposed framework consists of three modules: the feature vector space construction using discriminative patterns extracted from TCGs by a graph-mining algorithm; a feature vector supervised learning procedure in the constructed vector space; and an application identification program using a similarity measure in the feature vector space. Accuracy of the proposed framework for application identification is evaluated, making use of ground truth packet traces from seven peer-to-peer (P2P) application programs. It is demonstrated that this framework achieves an overall 90:0% accuracy in application identification. Contributions are twofold: (1) using a graph-mining algorithm, the proposed framework enables automatic extraction of discriminative patterns serving as identification features; 2) high accuracy in application identification is achieved, notably for P2P applications that are more difficult to identify because of their using random ports and potential communication encryption. Copyright © 2014 John Wiley & Sons, Ltd Received 31 October 2013; Revised 26 March 2014; Accepted 10 April 2014 KEY WORDS: Network application profiling; Identification; Traffic causality graph; Graph mining 1.
    [Show full text]
  • Licensing in the Shadow of Copyright
    LICENSING IN THE SHADOW OF COPYRIGHT Peter DiCola* David Touve** CITE AS: 17 STAN. TECH. L. REV. 397 (2014) http://stlr.stanford.edu/pdf/licensinginshadow.pdf ABSTRACT Copyright offers protection to creative works, but new technologies put pressure on that protection. Copyright owners and technology firms negotiate over new ways of distributing and transmitting creative works. Understanding the shadow that copyright casts on private negotiations will allow policy makers to better design the statute in a way that encourages more competition, diversity, and transactional efficiency in markets for digital goods. Prime examples of copyright licensing negotiations are the attempts to license digital music services over the past decade. In this Article we present the first qualitative and quantitative data about the licensing process for on-demand music streaming services, gleaned from confidential interviews with executives and attorneys. We report our findings about the time it takes to license a nascent service, if negotiations succeed; the number of record labels and publishers with which new music services typically deal; the general processes through which these licenses evolve; and how changes in the law over the period may have affected the dynamics of these negotiations. We find that copyright law, alongside business practices and professional attitudes, sets complex background rules for these private licensing negotiations. Copyright shapes, constrains, and also presents opportunities for innovation. TABLE OF CONTENTS INTRODUCTION ....................................................................................................... 398 I. THE LEGAL ENVIRONMENT FOR DIGITAL MUSIC .............................................. 404 * Associate Professor, Northwestern University School of Law. ** Assistant Professor and Director of the Galant Center for Entrepreneurship, McIntire School of Commerce, University of Virginia. We thank Nathan Brenner and Abigail Bunce for research assistance.
    [Show full text]
  • Enhanced Distributed Multimedia Services Using Advanced Network Technologies
    ENHANCED DISTRIBUTED MULTIMEDIA SERVICES USING ADVANCED NETWORK TECHNOLOGIES By SUNGWOOK CHUNG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2010 °c 2010 Sungwook Chung 2 Dedicated to my family 3 ACKNOWLEDGMENTS I would like to thank all people who provided me with their help during my Ph.D years. First of all, I would like to thank my advisor, Dr. Jonathan C.L. Liu for all his support and encouragement. Without his constant inspiration, this dissertation would not have been possible. The discussion with him on any topic has also made me pleasant and relaxed. I am also grateful to my supervisory committee members, Dr. Shigang Chen, Dr. Douglas D. Dankel II, Dr. Paul Fishwick, and Dr. Paul W. Chun for their invaluable suggestions and comments for my research. In addition, I would thank all my Korean friends and families who shared happy memories in Gainesville. Last but not least, I truly appreciate my parents, Sangkab Chung and Malnam Seo, who have been supporting me and have always stood behind me for my whole life, heartfeltly believing in me without any doubt even at a moment. I also appreciate my sister, Kyungae Chung, who has pleasantly helped me out with her warm heart all the time. I would also like to thank all my family members and friends in Korea. 4 TABLE OF CONTENTS page ACKNOWLEDGMENTS .................................. 4 LIST OF TABLES ...................................... 7 LIST OF FIGURES ..................................... 8 LIST OF ALGORITHMS .................................. 10 ABSTRACT ........................................
    [Show full text]
  • Comparative Analysis of Peer to Peer Networks
    Int. J. Advanced Networking and Applications 3477 Volume: 09 Issue: 04 Pages: 3477-3491(2018) ISSN: 0975-0290 Comparative Analysis of Peer to Peer Networks SalehaMasood Department of Computer Science, Comsats Institute of Information technology WahCantt [E-mail: [email protected]] Muhammad AlyasShahid Department of Computer Science, Comsats Institute of Information technology WahCantt [E-mail: [email protected]] Muhammad Sharif Department of Computer Science, Comsats Institute of Information technology WahCantt [E-mail: [email protected]] MussaratYasmin Department of Computer Science, Comsats Institute of Information technology WahCantt [E-mail: [email protected]] -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Today over the Internet, communication and computing environments are considerably and significantly becoming more and more chaotic and complex than normal classical distributed systems that have some lacking of any hierarchical control and some centralized organization. There in the emerging of Peer-to-Peer (P2P) networks overlays has become of much interest because P2P networks provide a good quality substrate to create a large- scale content distribution, data sharing, and multicast applications at the application-level. P2P networks are commonly used as “file-swapping” in any network to provide support in sharing of distributed contents. For data and file sharing, a number of P2P networks have been deployed and developed. Gnutella, Fast track and Napster are three popular and commonly used P2P networking systems. In this research a broad overview of P2P networks computing is presented. This research is focusing on content sharing technologies, networks and techniques. In this research, it is also tried to emphasize on the study and analysis of popular P2P network topologies used in networking systems.
    [Show full text]
  • GAO-05-634 File Sharing Programs: the Use of Peer-To-Peer Networks
    United States Government Accountability Office GAO Report to Congressional Requesters May 2005 FILE SHARING PROGRAMS The Use of Peer-to-Peer Networks to Access Pornography a GAO-05-634 May 2005 FILE SHARING PROGRAMS Accountability Integrity Reliability Highlights The Use of Peer-to-Peer Networks to Highlights of GAO-05-634, a report to Access Pornography congressional requesters Why GAO Did This Study What GAO Found Peer-to-peer (P2P) file sharing According to three popular file sharing Web sites, 134 P2P programs are programs represent a major change available to the public. Of those programs, Warez, Kazaa, and Morpheus in the way Internet users find and were among the most popular, as of February 2005. exchange information. The increasingly popular P2P programs Pornographic images are easily shared and accessed on the three P2P allow direct communication between computer users who can programs we tested—Warez, Kazaa, and Morpheus. Juveniles continue to be access and share digital music, at risk of inadvertent exposure to pornographic images when using P2P images, and video files. These programs. programs are known for having the functionality to share copyrighted Two of the three P2P programs—Kazaa and Morpheus—provided filters digital music and movies, and they intended to block access to objectionable material, but the effectiveness of are also a conduit for sharing the filters varied. Warez did not provide a filter. The filters provided by pornographic images and videos. Kazaa and Morpheus functioned differently: Kazaa filtered words found in Regarding these uses of P2P titles or metadata (data associated with the files that contain descriptive programs, GAO was asked to, information), while Morpheus required the user to enter the specific words among other things to be filtered.
    [Show full text]