5583 B (1E) G*6'E YALSIYBIMSPATINTU BITIRAS \H7 (12)PATENTO Apnasvuas

Total Page:16

File Type:pdf, Size:1020Kb

5583 B (1E) G*6'E YALSIYBIMSPATINTU BITIRAS \H7 (12)PATENTO Apnasvuas lxsler^ .qos (10)LT 5583 B (1e) g*6'E YALSIYBIMSPATINTU BITIRAS \H7 (12)PATENTO APnASVUAS (11) Patentonumeris: 5583 (51) Int.Cl. (2006): G01B 15/00 (21) Parai5kosnumeris: 2OO7O7O (22) Parai5kospadavimo data: 2OO711 20 (41) Parai5kospaskelbimo data: 2009 03 25 (45) Patentopaskelbimo data: 2009 07 27 (62) ParaiSkos,i5kurios dokumentas i5skirtas, numeris: (86) TarptautindsparaiSkos numeris: (86) Tarptautindsparai5kos padavimo data: (85) NacionalinioPCT lygioprocedUros pradZios data: (30) Prioritetas: P-06-128,2006 11 21, LV (72) l5radejas: DainisUSINS, LV (73) Patentosavininkas: RENESANSE PLUS, SlA, PulkvelaBrielalela4-2, LV-2015 J0rmala, LV (74) Patentinis patikdtin is/atstovas: m TatjanaSTERLINA, UAB ,,lntels", Naugarduko 9.3212, LT-03225 Vilnius, LT CY} @ ro (54) Pavadinimas: to Kompiuteriniqtinklq vartotojqelgesio kontrol6s bUdas F J (57) Referatas: lSradimaspriklauso kompiuterindmssistemoms. Budas iSsiskiriatuo, kad vartotojo kompiuteris(U) sujungiamassu prieigossistemos serveriu (AS), kuris atitinkamaisujungtas su HUB serveriqsistemos HUB serveriais (H) ir registracijosbloku (RB). BUdas vykdomas nuosekliai tam tikrais veiksmais: vartotojo indentifikacijosduomenq nusiuntimasi5 vartotojokompiuterio (U) j prieigossistemos serverj (AS); duomenq nusiuntimasnuo prieigos sistemos serverio j registracijosblokq (RB); vartotojo identifikaciniq duomenq autenti5kumopatikrinimas ir vartotojoprieigos teisiq nustatymas, lyginant su registracijosbloke (RB) tam tikroje lenteldjearba lentel6se(T1) esandiaisduomenimis; sujungimo su vartotojouZsakytu HUB serveriupatvirtinimas. Jeigu konstatuojamasvaftotojo autenti5kumas ir jraSytiduomenys atitinka duomenis vienoje arba keliose lentelese (T1), o lenteleje(T1) randamasjra5as, kad Sis vartotojasturi prieigq,tuomet siundiamaatitinkama Zinutd vaftotojuiirlarba HUB serveriui.Jeigu konstatuojama,jog vartotojoduomenys ne autenti5kiir jra5ytiduomenys neatitinkaduomenq ne vienojelenteldje (T1), o lenteldjear lenteldsenera jraSo apie tai, kad vartotojasturi teisg naudotisHUB serueriqsistema ir registruotisregistracijos bloko (RB) vienoje ar kelioselenteldse (T1), tuomet su jranga (P1) (ji yra kiekvienameHUB serveriqsistemos serveryje) palyginami vartotojo veiksmq duomenys HUB serveriqsistemoje su jra5aisregistracijos bloko (RB) vienoje arba keliose lentelese (T3), nustatomi paZeidimai ir vartotojuipritaikomos kontrol6s priemon6s (sankcijos), jraSytos registracijos bloko (RB) vienoje ar keliose atitinkamoselentelese (T5). Jeigu atitinkajra5ai vienoje ar keliose lenteldse(T1) ir HUB serveriqsistemos registracijosbloko (RB)vienoje arba kelioselentelese (T3), lenteleje (T1) registruojamiduomenys apie pritaikytas kontrolespriemones ir apietai siundiamaspraneSimas vartotoiui irlarba HUB serveriui. LT 5583B ISradimaspriklauso valdomomskompiuteriu sistemoms, b[tent kompiuteriniqtinklq vartotojqelgesio kontroles b0dams, tikrinant ar Siselgesys atitinka tam tikrastaisykles. Zinomas P2P (angl. Peer-to-peer)kompiuterinis tinklas, kuris pag4stas tinklo dalyviq kompiuteriais,o ne s4lyginai nedideliuserveriq skaidiumi. Tai prieSingybekliento-serverio modeliui.Gryname P2P tinkle ndra,,kliento" ir ,,serverio"s4vokq - abu susijungqvartotojai yra lygiaverdiai,kiekvienas veikia ir kaipklientas, ir kaipserveris. P2P tinklai yra tipiSkainaudojami, norint sujungtimzvgus per didesniushoc sujungimus.Tokie ir panaSilssujungimai naudojami pagal kelis prieigos pareikalavimus.NeZitrint i tai, kad tinklas padalintas,jis turi bendro naudojimofailus (sharing files), kuriuoseyra skaitmeninioformato garso,vaizdo duomenysir realauslaiko duomenys, pavyzdiiui, telefono linijos, kuriose naudojamosP2P technologijos. by DavidCard, Zia DaniellWigder, and CorinaMatiesanu. (Digital - Mar 24,2006) VisasP2P tinklas neidentifikuojasavgs nei kaip klientas,nei kaip serveris,bet veikia kaip atskiraspeer- to- peer elementas.Bet kuris mazgasveikia ir kaip ,,klientas",ir kaip ,,seryeris"vienu metu, stimuliuodamasabiejq elementqveiksmus. Tokio tinklo sudetis skiriasi nuo iprasto kliento- serveriomodelio, kuriuose komunikacija vyksta per centrini server!.Tipilkas paryzdys,norint persiqstinon P2P failus, yra FTP serveris,kuriame kliento ir serverio programosyra konkrediai apibr€Ztos.Kai klientas pradedafailq persiuntim4,serveris reaguoja ir patenkinauZklausim4. SenesniP2P tinklai pladiainaudojo (JsenetZiniq serveriqsistem4, kurioje bendravo vienas su kitu, kad iSplatinfi4(Jsener naujienq ir informacijosstraipsnius per Usenet tinkl4. Padioje(Jsenet pradZiojeUUCP buvo naudojamatam, kad galimabUq kuo pladiaunaudoti internetq. Tokiu bUdu individualus vartotojas (klientas) prisijungdavo prie lokalausZiniq serverioir galejoskaityti ij! ikelrusstraipsnius. Tokiu padiubfidu veikia ir taikomasisSMTP elektroninispajtas, kuriame Pa5to persiuntimo agentas tiesiogiai (kaip ir Peer-to-peera1eju)(Nlail transfer agents) sujungia periferini paSto vartotoj4 su kliento serveriu. Kai kurie tinklai ir kanalai,pavyzdliui, Napster, OpenNAP ir IRC serv'eriokanalai, turi strukt[rizuotasmi5rias sistemas ir naudoja kliento-serveriostruktur4 tik atskiriems uZdaviniams (pavyzd1iui. paiesk at), PZP struktfir4 - kitiemsuZdaviniams. Tokie tinklai kaipGnutella arba Freenet taip pat naudojastruktlrizuotas sistemas, kuriose daugiausiai LT 5583B paplitusi peer-to-peerstruktflra Tadiaukartais, ypatingai Gnutella tinkle, atliekant paskutiniuspatikrinimus (Zingsnius), norint palengvinti tiesiogini priejimq prie serverio, tiesiogiaisuj ungiami skirtingq lygiq vartotojai. Tiesioginissujungimas yn peer-to-peerbendro vartojimo failq (file-sharing)protokolas. Tiesioginissujungimas leidZia klientui prisijungtiprie centrinioHUB serverioir vienam i5 kito persiqstifailus. HUB atpaZlstavartotojus ir sujungiajuos. Centriniaiserveriai Siuo atveju reikalingi tik tam, kad padetq surasti kit4 pusQ, o veliau bendravimasjau vyksta tiesiogiai. Vieno lygio tinklq protokolaiir programindiranga BitTonent:Azureus, BitComet, BitTonent, Opera; DirectConnect: DC++. NeoModus Direct Connect, RevConnect; DNS eDonkey2000: eDonkey2000, eMule; Gnutella:LimeWire: Napster; Usenet; Networkor ProtocolUse Applications; AresFile sharing Ares Galaxy,WarczP2P, Filecroc; BitTorrentFile sharing/Softwaredistribution/Media distribution ABC, AllPeers,Azureus, BitComet,Bitlord, BitSpirit,BitTornado, BitTorrent, Burstl, Deluge,FlashGet, G3 Torrent,Halite, KTorrent,LimeWire, MlDonkey, Opera,QTorrent, rTorrent, Shareaza, TorrentFlux,Transmission, Tribler, pTorrent,Thunder; BuzmShared HTML wiki a peer-to-peerwiki platform; CSpaceFile sharing,text chat,remote desktop a peer-to-peerbased communications system(bendro vartoj imo komunikacines sitemos- tekstinis bendravimas), DirectConnect File sharingDC++, NeoModusDirect Connect, SababaDC, BCDC++, ApexDC++,StrongDC++; LT 5583B Domain Name System Intemet information retrieval See Comparison of DNS server software; eDonkeyFile sharing aMule, eDonkey2000(discontinued), eMule, eMule Plus, FlashGet, Hydranode, iMesh, Jubster,lMule, Lphant, MlDonkey, Morpheus, Pruna, Shareaza, xMule; FastTrack File sharing giFT, Grokster, iMesh (and its variants stripped of adware including iMesh Light), Kazaa(and its variants strippedof adware such as Kazaa Lite), KCeasy,Mammoth, MLDonkeY,Poisoned; FreenetDistributed data storeEntropy (on its own network),Freenet; GNUnet File sharing,chat GNUnet, (GNUnet-gtk); Gnutella File sharing Acquisition,BearShare, Cabos, FrostWire, Gnucleus, Grokster, gtk- gnutella, iMesh, Kiwi Alpha, LimeWire, MlDonkey, Morpheus, Poisoned, Swapper, Shareaza,XoloX; Gnutella2 File sharing Adagio, Caribou, Gnucleus, iMesh, Kiwi Alpha, Ml-Donkey, Morpheus,Shareaza, TrustYFiles Kad Network File sharingaMule, eMule, MlDonkey; IXTA Peer applications WiredReach Platform, Collanos Workplace (Teamwork software), Sixearch; Krawler Social network Krawler[x] ; MANOLITOA4P2P File sharingBlubster, Piolet; MFPnet File sharingamiciPhone (no longer available); NapsterFile sharingNapigator, Napster; NeoEdgeFile sharing,peer applications MostFun GamePlayer, NeoARM gamedelivery .. OpenNapFile sharingWinMX, Utatane,XNap, Lopster,Winlop, Napster; P2PTV Video stream or file sharing TVUPlayer, Joost, CoolStreaming,Cybersky-TV, TVants, PPLive, Kontiki, LiveStation; PDTP Streamingmedia or file sharingDistribuStream; PeercastingMulticasting streamsPeerCast, IceShare, FreeCast, PeerStream, Ravdlow RetroshareRetroshare serverless Filesharing with ChatMessenger; Tranche; UsenetDistributed discussion expressload; WindorvsPeer-to-Peer Advanced Networking Packfor Windows XP,WindorvsXP SP2, Windows Vista (Tai Windorvskomponentai, kurie uZtikrinapeer-to-peer tinkle ir atgalini pareiSkim4); WPNP File sharineWinVIX. LT 5583B Multi-tinklo parei5kimas Bendro naudojimo fai lq parei5kimqpali ginimas ; Tinklo parei5kimasarba Protokolooperacinds sistemos Licencija; AMIGIFT FastTrack,Ares, OpenFT,Gnutella, BitTonent AmigaOS GPL / PD; aMule eDonkey network, Kad network Cross-platformGPL; eMule eDonkey network, Kad network Windows GPL; FileScopeeDonkey network, Gnutella,Gnutella2, OpenNAP Cross-platform GPL; giFT eDonkey network, FastTrack,Gnutella Cross-platformGPL; GnucleusGnutella, Gnutella2Windows GPL; Gtk-Gnutella Gnutella Linux GPL; iMesh FastTrack, eDonkey network, Gnutella, Gnutella2Windows KCeasyAres, FastTrack,Gnutella, OpenFT Windows GPL; Kiwi Alpha Gnutella, Gnutella2Windows MlDonkey BitTorrent, Direct Connect, eDonkey network, FastTrack, Gnutella, Gnutella2,Kad Network, OpenNap,SoulSeek, HTTPIFTP Cross-platformGPL; Morpheus NEO Network, Gnutella, Gnutella2, BitTonent Windows NapshareKey network, MUTE network Linux, Windows
Recommended publications
  • Eurosim Mk7.1 Software User's Manual
    EuroSim Mk7.1 Software User’s Manual iss: 8 rev: 1 SUM NLR-EFO-SUM-2 Summary EuroSim Mk7.1 is an engineering simulator framework to support the quick development of hard real- time simulators. EuroSim provides a reconfigurable real-time execution environment with the possibility of man-in-the-loop and/or hardware-in-the-loop additions. Extensive Graphical User Interfaces assist the user in constructing, using and analysing real-time simulations, resolving the user from the specialist software engineering knowledge required to built hard real-time systems. EuroSim has been developed initially to support the verification of space (sub) systems defined by ESA programmes of various scales. It’s heritage lies in the development of the European Robotic Arm(ERA) project where EuroSim was essential in the development and verification of the large symmetrical arm that can move accross the International Space Station. Up to today, EuroSim installations are still used around the world to support ERA’s mission preparation, verification and training. After initial devel- opment and application for ERA, EuroSim has been succesfully used in the development, verification and training of the Autonomous Transfer Vehicle (ATV) with multiple installations worldwide. Other space programs where EuroSim has been applied since are Galileo, Herschel & Planck, Gaia to name a few major missions. Currently EuroSim has made its way in to other domains as well, with application in the F-35 Lightning-II Embedded Training program and simulations in support of road tunnel system verification. This document contains both the User Guide as well as the Reference Guide documentation and consists of five volumes.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • CONCLUSIONES DEL ABOGADO GENERAL SR. PEDRO CRUZ VILLALÓN Presentadas El 14 De Abril De 2011 1
    CONCLUSIONES DEL SR. CRUZ VILLALÓN — ASUNTO C-70/10 CONCLUSIONES DEL ABOGADO GENERAL SR. PEDRO CRUZ VILLALÓN presentadas el 14 de abril de 2011 1 Índice I. Introducción ................................................................... I - 11964 II. Marco jurídico ................................................................. I - 11967 A. Derecho de la Unión ....................................................... I - 11967 1. Normativa en materia de protección de la propiedad intelectual ............. I - 11967 a) Directiva 2001/29 relativa a la armonización de determinados aspectos de los derechos de autor y derechos afines a los derechos de autor en la sociedad de la información ......................................... I - 11967 b) Directiva 2004/48 relativa al respeto de los derechos de propiedad intelec- tual . I - 11968 2. Normativa en materia de protección de datos personales ................... I - 11969 a) Directiva 95/46 relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos . I - 11969 b) Directiva 2002/58 relativa al tratamiento de los datos personales y a la protección de la intimidad en el sector de las comunicaciones electróni- cas . I - 11969 3. Normativa en materia de comercio electrónico: Directiva 2000/31 ........... I - 11970 B. Derecho nacional . I - 11970 1 — Lengua original: francés. I - 11962 SCARLET EXTENDED III. Hechos que dieron lugar al litigio principal y cuestiones prejudiciales ................. I - 11971 A. Hechos
    [Show full text]
  • Spyglassfall2015.Pdf
    1 THERE ARE MANY WAYS TO TELL A STORY. Part of our mission is to keep alive the maritime history of our Nation’s Oldest PortSM by telling its stories. Well, we have two important stories to tell in our new exhibit, Wrecked!, which will be opening in May 2016. We want everyone, especially our young- est visitors, to be able to connect with this unique shipwreck story and with the archaeological side of discovering, exca- vating and conserving shipwrecks. That’s why we have added a new storyteller to our Lighthouse family—Star Waters! Star is a curious, adventerous young student who will inspire a whole new generation of underwater archaeologists and explorers. Throughout the Wrecked! exhibit, you’ll see a series of vignettes called “Star Waters Wonders” which will ask questions that provoke our young guests to think more in-depth about science, history, math, and engineering. So let our friend Star give you a sneak peek of the new exhibit (which is unlike anything you have ever seen at our Museum) in this special issue! 2 Dear Members, We have so much to be thankful for this holiday season. The blessing of being busy is always with us. We are about to break ground on a new Maritime Archaeology & Education Center with public viewing areas for shipwreck artifacts and handicap accessible learning spaces. A new exhibit is coming in the spring. Luminary Night is coming December 2nd! Our membership is larger than ever! We are thankful for the privilege to work for you. We are blessed to know and serve you.
    [Show full text]
  • Issues in the Design and Implementation of a Real-Time Garbage Collection Architecture " (1992)
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1992 Issues in the design and implementation of a real- time garbage collection architecture William Jon Schmidt Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Schmidt, William Jon, "Issues in the design and implementation of a real-time garbage collection architecture " (1992). Retrospective Theses and Dissertations. 10388. https://lib.dr.iastate.edu/rtd/10388 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper aligrmient can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps.
    [Show full text]
  • Title: P2P Networks for Content Sharing
    Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia (chd, sarana, raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section. 1. INTRODUCTION Peer-to-peer (P2P) content sharing has been an astonishingly successful P2P application on the Internet. P2P has gained tremendous public attention from Napster, the system supporting music sharing on the Web. It is a new emerging, interesting research technology and a promising product base. Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems". This thus gives P2P systems two main key characteristics: • Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system. • Reliability: The malfunction on any given node will not effect the whole system (or maybe even any other nodes). File sharing network like Gnutella is a good example of scalability and reliability.
    [Show full text]
  • Investigating the User Behavior of Peer-To-Peer File Sharing Software
    www.ccsenet.org/ijbm International Journal of Business and Management Vol. 6, No. 9; September 2011 Investigating the User Behavior of Peer-to-Peer File Sharing Software Shun-Po Chiu (Corresponding author) PhD candidate, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan & Lecture, Department of Information Management Vanung University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Huey-Wen Chou Professor, Department of Information Management National Central University, Jhongli, Taoyuan, Taiwan E-mail: [email protected] Received: March 26, 2011 Accepted: May 10, 2011 doi:10.5539/ijbm.v6n9p68 Abstract In recent years, peer-to-peer file sharing has been a hotly debated topic in the fields of computer science, the music industry, and the movie industry. The purpose of this research was to examine the user behavior of peer-to-peer file-sharing software. A methodology of naturalistic inquiry that involved qualitative interviews was used to collect data from 21 university students in Taiwan. The results of the study revealed that a substantial amount of P2P file-sharing software is available to users. The main reasons for using P2P file-sharing software are to save money, save time, and to access files that are no longer available in stores. A majority of respondents use P2P file-sharing software to download music, movies, and software, and the respondents generally perceive the use of such software as neither illegal nor unethical. Furthermore, most users are free-riders, which means that they do not contribute files to the sharing process. Keywords: Peer to peer, File sharing, Naturalistic inquiry 1. Introduction In recent years, Peer-to-Peer (P2P) network transmission technology has matured.
    [Show full text]
  • Public Peer-To-Peer Filesharing Networks’ Evaluation
    PUBLIC PEER-TO-PEER FILESHARING NETWORKS’ EVALUATION J. Lloret Mauri1, B. Molina Moreno2, C. Palau Salvador3, M. Esteve Domingo4 Department of Communications, Polytechnic University of Valencia Camino Vera s/n, Valencia, Spain [email protected], [email protected], [email protected], [email protected] ABSTRACT • Download speed: some internal P2P network, due to Since the recent appearance of P2P file-sharing networks, its internal behaviour, are optimal for downloading many Internet users have chosen this technology to search files of reduced size. Others, however, use for programs, films, songs, etc. Their number of users is multisplitting mechanisms and permit the download growing every day due to the attractive and interesting from multiple sources, making them suitable for content type that can be found and downloaded over these obtaining larger files. networks. In this article six public architectures are analyzed, Gnutella, FastTrack, Opennap, Edonkey, MP2P These parameters are responsible for an architecture and Soulseek, tracking their evolution during a week in becoming very popular or, on the other hand, terms of connected users, number of files and size of disappearing. The above factors can make a P2P network shared files per hour. The results will be compared and more attractive to users of a specific nation due to the discussed with previous measurements taken a year ago. utilization of a specific language or even social trends [7]. These data can be used to design new network models, to It is also interesting to distinguish between a P2P network calculate their performance or to optimize new network and P2P client, the development of which must not be parameters.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]