Abbreviations and Acronyms

Total Page:16

File Type:pdf, Size:1020Kb

Abbreviations and Acronyms Abbreviations and Acronyms 3DES Triple-DES 3G 3rd Generation 4G 4th Generation A2DO Advanced Audio Distribution Profile AAL ATM Adaption Layer ACK Acknowledgement ACM Association for Computing Machinery ACL Asynchronous Connectionless Link ACOR Admission Control enabled On demand Routing ACR Attenuation Crosstalk Ratio ADM Add Drop Multiplexer ADSL Asymmetric Digital Subscriber Line ADU Atomic Data Unit AH Authentication Header AID Association Identifier AIFS Arbitration Interframe Space AJAX Asynchronous JavaScript and XML AM Amplitude Modulation AMA Active Member Address ANSI American National Standards Institute AODV Ad Hoc On-Demand Distance Vector Routing AP Access Point API Application Programming Interface APP Atom Publishing Protocol ARA Ant-based Routing Algorithm ARP Address Resolution Protocol ARPA Advanced Research Project Agency ARQ Automatic Repeat Request AS Autonomes System AS Authentication Server C. Meinel and H. Sack, Internetworking, X.media.publishing, 849 DOI: 10.1007/978-3-642-35392-5, Ó Springer-Verlag Berlin Heidelberg 2013 850 Abbreviations and Acronyms ASCII American Standard Code for Information Interchange ASK Amplitude Shift Keying ASM Analog Modulation Spectrum ASO Address Supporting Organization ATIM Announcement Traffic Indicator Message ATM Asynchronous Transfer Mode AuC Authentification Center AVRCP Audio Video Remote Control Profile AWDS Ad hoc Wireless Distribution Service B3G Beyond 3G BAN Body Area Network BASK Binary Amplitude Shift Keying BCD Binary Coded Digits BDSG Bundesdatenschutzgesetz BECN Backward Explicit Congestion Notification BGP Border Gateway Protocol BID Burned-In Addresses BIND Berkeley Internet Name Domain BIP Basic Imaging Profile B-ISDN Broadband Integrated Service Digital Network Bit Binary Digit bit Basic Indissoluble Information Unit BITS Bump in the Stack BITW Bump in the Wire BNC Bayonet Neill Concelman BNEP Bluetooth Network Encapsulation Protocol BPP Basic Printing Profile bps Bits per Second BPSK Binary Phase Shift Keying BS Basis Station BSC Bit Synchronous Communication BSC Base Station Controller BSR Backup Source Routing BSS Basic Service Set BSS Base Station Subsystem BSSID Basic Service Set IDentifier b/w Black and White BWA Broadband WIreless Access BT Burst Tolerance BTS Base Transceiver Station BUS Broadcast and Unknown Server BZT Bundesamt fur¨ Zulassungen in der Telekommunikation CA Certification Authority CAC Connection Admission Control CAP Carrierless Amplitude Phase Abbreviations and Acronyms 851 CAPI Common Application Interface CBR Constant Bit Rate CC Carbon Copy CC Creative Commons CCIR Comite´ Consultatif International des Radiocommunications CCITT Comite´ Consultatif International de Telegraphique et Telefonique CCK Complementary Code Keying ccNSO country-code Name Supporting Organization ccTLD country-code Top-Level Domain CD Compact Disc CD-DA Compact Disc Digital Audio CDDI Copper Distributed Data Interface CDIR Classless InterDomain Routing CDMA Code Division Multiple Access CDP Conditional DePhase Encoding CD-ROM Compact Disc Read Only Memory CDTR Cell Delay Variation Tolerance CDV Cell Delay Variation CER Cell Error Rate CERN Conseil Europeen´ pour la Recherche Nucleaire´ CERT Computer Emergency Response Team CF Contention Free CFP Contention Free Period CG Cyclic Group CGA Cryptographically Generated Addresses CGSR Clusterhead Gateway Switch Routing Protocol CH Cyclic Header CHAMP CacHing And MultiPath routing CHDLC Cisco High-Level Data Link Protocol CHAP Cryptographic Handshake Authentication Protocol CID Channel IDentifier CIP Common ISDN Access Profile CIR Commited Information Rate CLLN Consolidated Link Layer Management CLP Cell Loss Priority CLR Cell Loss Ratio CMR Cell Miisinsertion Ratio CN Core Network COFDM Coded Orthogonal Frequency Division Multiplex CP Contention Period CPU Central Processing Unit CR Carriage Return CRC Cyclic Redundancy Check CRMA Cyclic Reservation Multiple Access CRP Cable Replacement Protocol 852 Abbreviations and Acronyms CS Convergence Sublayer CS Carrier Sense CSMA/CD Carrier Sense Multiple Access Collision Detect CSNet Computer Science Network CSS Chirp Spread Spectrum CTD Cell Transfer Delay CTP Cordless Telephony Profile CTS Clear to Send CW Contention Window DA Destination Address DAB Digital Audio Broadcasting DAC Dual Attached Component DAP Directory Access Protocol DARPA Defense Advanced Research Projects Agency DAS Dual Attached Station DASL DAV Search and Locate db decibel DBF Distributed Bellman-Ford Routing Protocol DBPSK Differential Binary Phase Shift Keying DCC Digital Compac Cassette DCCP Datagram Congestion Control Protocol DCE Data Communication Equipment DCF Decentralized Coordination Function DCT Discrete Cosine Transform DDCMP Digital Data Communications Message Protocol DDoS Distributed Denial-of-Service DECT Digital Enhanced Cordless Telecommunications DE-NIC Deutscher Network Information Center DES Data Encryption Standard DFN Deutsches Forschungsnetzwerk DFR Direction Forward Routing DFT Discrete Fourier Transform DHCP Dynamic Host Configuration Protocol DHT Distributed Hash Table DIFS Distributed Coordination Function Interframe Space DIGI e.V. Deutsche Interessengemeinschaft Internet e.V. DIN Deutsche Industrie Norm DLCI Data Link Connection Identifier DLL Data Link Layer DMT Discrete Multitone DNS Domain Name Service DNSO Domain Name Support Organization DoD Department of Defense DOI Digital Object Identifier DoS Denial of Service Abbreviations and Acronyms 853 DPAM Demand Priority Access Method DPG Dedicated Packet Group dpi dots per inch DPSK Differential Phase Shift Keying DQDB Distributed Queue Dual Bus DQPSK Differential Quadrature Phase Shift Keying DPSK Differential Phase Shift Keying DRM Digital Rights Management DS Distribution System DSAP Destination Service Access Point DSDV Destination Sequence Distance Vector Routing DSL Digital Subscriber Line DSLAM Digital Subscriber Line Access Multiplexer DSMX Digitaler Signalmultiplexer DSR Dynamic Source Routing DS Delegation Signer DSS1 Digital Signalling System No. 1 DSSS Direct Sequence Spread Spectrum DTE Data Terminal Equipment DTIM Delivery Traffic Indicator Message DTLS Datagram Transport Layer Security DTR Dedicated Token Ring DTS Decode Time Stamp DTX Discontinouse Transmission DUA Directory User Agent DUAL Diffusing Update Algorithm DUE¨ Datenubertragungseinrichtung¨ DUN Dial-up Networking Profile DVB Digital Video Broadcasting DVB-C Digital Video Broadcast - Cable DVD Digital Versatile Disk DVMRP Distance Vector Multicast Routing Protocol DXC Digital Cross Connect DYMO DYnamic Manet On-demand Routing EAP Extensible Authentication Protocol EAPOL EAP Over LAN EARN European Academit Research Network eBGP exterior Border Gateway Routing Protocol ECN Explicit Congestion Notification ECRIM European Research Consortium for Informatics and Mathematics ED End Delimiter EDCF Enhanced Distribution Coordination Function EDGE Enhanced Data Rate for GPRS Execution EEPROM Electronic Erasable Programmable Read Only Memory EFF Electronic Frontier Foundation 854 Abbreviations and Acronyms EGP Exterior Gateway Protocol EHF Extreme High Frequency EIA Electronic Industry Association EIFS Extended Interframe Space EIGRP Enhanced Interior Gateway Routing Protocol EIR Excess Information Rate EIR Equipment Identification Registry EOB End of Block EOF End of File EOT End of Text ErWiN Erweiterte Wissenschaftsnetz ESD End-of-Stream Delimiter ESDP Extended Service Discovery Profile ESMTP Extended Simple Mail Transfer Protocol ESP Encapsulating Secure Payload ESS Extended Service Set ET Exchange Termination ETSI European Telecommunication Standards Institute EUI Extended Unique Identifier EUNet European Unix Network EUUG European UNIX Users Group FAST Flexible Authentication via Secure Tunneling FAXP FAX Profile FCC Federal Communications Commission FCS Frame Check Sequence FDC Final Comitee Draft FDD Frequency Division Duplex FDDI Fiber Distributed Data Interface FDMA Frequency Division Multiple Access FEC Forward Error Check FECN Forward Explicit Congestion Notification FFD Full Function Devices FHSS Frequency Hopping Spread Spectrum FIFO First In First Out FLV Flash Video FM Frequency Modulation fps Frames per Second FS Frame Status FSK Frequency Shift Keying FSN Full Service Network FTP File Transfer Protocol FTP Foiled Twisted Pair GAC Governmental Advisory Committee GAN Global Area Network GAP Generic Access Profile Abbreviations and Acronyms 855 GAVDP Generic AV Distribution Profile GFC General Flow Control GFR Guaranteed Frame Rate GFSK Gaussian Frequency Shift Keying GFX Graphical Framework Extension GIF Graphic Interchange Format GMK Group Master Key GMSK Gaussian Minimum Shift Keying GNSO Generic Name Support Organization GNU GNU is Not Unix GNU-FDL GNU Free Document License GNU-GPL GNU General Public License GOEP Generic Object Exchange Profile GRP General Registration Protocol GPRS General Paket Radio Service GPS Global Positioning System GSM Global System for Mobile Communication GTC Generic Token Card GTK Group Temporary Key gTLD generic Top-Level Domain GTS Guaranteed Time Slots HC Hybrid Coordinator HCF Hybrid Coordination Function HCI Host Controller Interface HCRP Hardcopy Cable Replacement Profile HDB High Density Bipolar HDCL High Level Data Link Protocol HDP Health Device Profile HDSL High Bit Rate DSL HEC Header Error Check HF High Frequency HFP Hands Free Profile HID Human Interface Device Profile HiperLAN High Performance Radio Local Area Network HLR Home Location Registry HOB Head of Bus HPI Hasso Plattner Institute HRPLS Hybrid Routing
Recommended publications
  • PCC Task Group for Coding Non-RDA Entities in Nars: Final Report November 16, 2020
    1 PCC Task Group for Coding non-RDA Entities in NARs: Final Report November 16, 2020 Contents Executive summary 2 Recommendations 2 Charge, background, and scope 3 Purposes served by coding entity type 4 Purposes served by coding descriptive convention 4 Data model 5 Recommended terms for 075 6 Recommended coding for 040 $e 6 Implementation issues 7 Platform for hosting vocabulary 7 Maintenance and development of the vocabulary (extensibility) 7 Collaboration with DNB 8 Training and documentation 8 Out of scope issues 9 Fictitious characters and pseudonyms 9 Shared pseudonyms 11 Descriptive conventions for non-RDA entities 11 Elements for non-agent entities 12 Division of the world 12 Legacy data 13 Examples 13 Appendix: Charge and roster 18 2 Executive summary With the introduction of the LRM data model in the beta RDA Toolkit, it became necessary to distinguish RDA Agent and non-Agent entities in the LC Name Authority File. The PCC Policy Committee (PoCo) determined that 075 $a in the MARC authority format could be used to record this distinction, and that it would also be necessary to designate a different descriptive convention in 040 $e. PoCo charged the present Task Group to make recommendations for coding these subfields. In considering its recommendations, the Task Group identified the core use cases that would need to be met, and evaluated several potential data models. An important concern was that the proposed vocabulary be simple to maintain and apply. These considerations led the Task Group to recommend a small set of terms reflecting categories that are given distinct treatment in cataloging practice.
    [Show full text]
  • IMS/ISC: .Org Proposal Form
    TOP THE .ORG TLD IS A PUBLIC TRUST » « A Joint Effort of the INTERNET MULTICASTING SERVICE and eorg INTERNET SOFTWARE CONSORTIUM » TRANSMITTAL » FITNESS DISCLOSURE » « VOICE YOUR SUPPORT » PROPOSAL » SUPPLEMENTARY MATERIALS » « SPREAD THE DOT » CONFIDENTIAL INFORMATION » SUPPLEMENTAL QUESTIONS » .org Proposal Form Executive Summary This is a joint bid between the Internet Multicasting Service (IMS) and the Internet Software Consortium (ISC). We are both public benefit corporations with a long history of operating public works and creating freely available software for key infrastructure services on the Internet. The .org Top Level Domain (TLD) is the home for the noncommercial organizations of the world, and we would operate the .org registry service as a public trust: ● We have designed a rock-solid service in strategic exchange points throughout the world. We will build this service on our existing infrastructure and operate a stable, high-performance, high-availability registry service for the .org TLD. ● We will operate this service with strong support for registrars, the registrants in the .org TLD, the general Internet community, ICANN, and our other constituencies. ● We will build on our deep familiarity with the subject area and our extensive experience in provisioning complex Internet services. We will provide a smooth transition with no break in service. ● The .org TLD registry service will support all IETF recommended protocols. Our software, including packages for registry servers, registrar clients, Whois, namespace management, and secure DNS solutions will be freely available with no restrictions in source and binary form. ● We will work with our extensive network of partners throughout the world to provide substantial input to the standards process and advances in core technologies.
    [Show full text]
  • 9 Purple 18/2
    THE CONCORD REVIEW 223 A VERY PURPLE-XING CODE Michael Cohen Groups cannot work together without communication between them. In wartime, it is critical that correspondence between the groups, or nations in the case of World War II, be concealed from the eyes of the enemy. This necessity leads nations to develop codes to hide their messages’ meanings from unwanted recipients. Among the many codes used in World War II, none has achieved a higher level of fame than Japan’s Purple code, or rather the code that Japan’s Purple machine produced. The breaking of this code helped the Allied forces to defeat their enemies in World War II in the Pacific by providing them with critical information. The code was more intricate than any other coding system invented before modern computers. Using codebreaking strategy from previous war codes, the U.S. was able to crack the Purple code. Unfortunately, the U.S. could not use its newfound knowl- edge to prevent the attack at Pearl Harbor. It took a Herculean feat of American intellect to break Purple. It was dramatically intro- duced to Congress in the Congressional hearing into the Pearl Harbor disaster.1 In the ensuing years, it was discovered that the deciphering of the Purple Code affected the course of the Pacific war in more ways than one. For instance, it turned out that before the Americans had dropped nuclear bombs on Japan, Purple Michael Cohen is a Senior at the Commonwealth School in Boston, Massachusetts, where he wrote this paper for Tom Harsanyi’s United States History course in the 2006/2007 academic year.
    [Show full text]
  • Replication Strategies for Streaming Media
    “replication-strategies” — 2007/4/24 — 10:56 — page 1 — #1 Research Report No. 2007:03 Replication Strategies for Streaming Media David Erman Department of Telecommunication Systems, School of Engineering, Blekinge Institute of Technology, S–371 79 Karlskrona, Sweden “replication-strategies” — 2007/4/24 — 10:56 — page 2 — #2 °c 2007 by David Erman. All rights reserved. Blekinge Institute of Technology Research Report No. 2007:03 ISSN 1103-1581 Published 2007. Printed by Kaserntryckeriet AB. Karlskrona 2007, Sweden. This publication was typeset using LATEX. “replication-strategies” — 2007/4/24 — 10:56 — page i — #3 Abstract Large-scale, real-time multimedia distribution over the Internet has been the subject of research for a substantial amount of time. A large number of mechanisms, policies, methods and schemes have been proposed for media coding, scheduling and distribution. Internet Protocol (IP) multicast was expected to be the primary transport mechanism for this, though it was never deployed to the expected extent. Recent developments in overlay networks has reactualized the research on multicast, with the consequence that many of the previous mechanisms and schemes are being re-evaluated. This report provides a brief overview of several important techniques for media broad- casting and stream merging, as well as a discussion of traditional IP multicast and overlay multicast. Additionally, we present a proposal for a new distribution system, based on the broadcast and stream merging algorithms in the BitTorrent distribution and repli- cation system. “replication-strategies” — 2007/4/24 — 10:56 — page ii — #4 ii “replication-strategies” — 2007/4/24 — 10:56 — page iii — #5 CONTENTS Contents 1 Introduction 1 1.1 Motivation .
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Bittorrent Files Hace Stopped Downloading
    bittorrent files hace stopped downloading Why Some Torrents Don’t Download? A torrent that doesn’t start downloading or one that suddenly stops can be very frustrating. You check your Internet connection, the cables, and everything looks good. So what can be the reasons for those torrents that don’t seem to work? Some Torrents Don’t Download. The main reason behind a torrent file that doesn’t even start downloading is the lack of seeders and peers. In other words, there is no one seeding that file, meaning there’s no place where you can download it from. That’s why it’s very important that you have a look at the number of seeders and peers every time you start a new download. Seeders are the users who already finished downloading and are only sharing. The peers are the ones like you, the ones who are downloading and uploading at the same time. Some Files Suddenly Stop Downloading. This is another common scenario. We’ve all been there when a torrent stops at some moment, such as 99%. That usually happens when there are only peers, but no seeders . If you think about it, it makes total sense. The peers have many parts of the torrent in common, and they will share those between them. But because there are zero seeders, no one has the entire file , and everyone will share the same parts and stop in the same percentage point. A Dead Torrent. Both of the situations we just saw are what users in the community call a “dead torrent”.
    [Show full text]
  • ICAO Abbreviations and Codes
    Doc 8400 Procedures for Air Navigation Services ICAO Abbreviations and Codes This edition incorporates all amendments approved by the Council prior to 24 July 2010 and supersedes, on 18 November 2010, all previous editions of PANS-ABC (Doc 8400). Eighth Edition — 2010 International Civil Aviation Organization Suzanne Doc 8400 Procedures for Air Navigation Services ICAO Abbreviations and Codes ________________________________ This edition incorporates all amendments approved by the Council prior to 24 July 2010 and supersedes, on 18 November 2010, all previous editions of PANS-ABC (Doc 8400). Eighth Edition — 2010 International Civil Aviation Organization Published in separate English, French, Russian and Spanish editions by the INTERNATIONAL CIVIL AVIATION ORGANIZATION 999 University Street, Montréal, Quebec, Canada H3C 5H7 For ordering information and for a complete listing of sales agents and booksellers, please go to the ICAO website at www.icao.int First edition,1964. Seventh edition, 2007. Eighth edition, 2010. Doc 8400, Procedures for Air Navigation Services — ICAO Abbreviations and Codes Order Number: 8400 ISBN 978-92-9231-626-6 © ICAO 2010 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, without prior permission in writing from the International Civil Aviation Organization. AMENDMENTS Amendments are announced in the supplements to the Catalogue of ICAO Publications; the Catalogue and its supplements are available on the ICAO website at www.icao.int. The space below is provided to keep a record of such amendments. RECORD OF AMENDMENTS AND CORRIGENDA AMENDMENTS CORRIGENDA Date Date Entered Date Date Entered No.
    [Show full text]
  • Improving Fairness in Peer-To-Peer Networks by Separating the Role of Seeders in Network Infrastructures
    Turkish Journal of Electrical Engineering & Computer Sciences Turk J Elec Eng & Comp Sci (2016) 24: 2255 { 2266 http://journals.tubitak.gov.tr/elektrik/ ⃝c TUB¨ ITAK_ Research Article doi:10.3906/elk-1402-304 Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures Alireza NAGHIZADEH∗, Reza EBRAHIMI ATANI Department of Computer Engineering, Faculty of Engineering, University of Guilan, Rasht, Iran Received: 27.02.2014 • Accepted/Published Online: 08.07.2014 • Final Version: 15.04.2016 Abstract:Fairness is one of the most important challenges that should be considered as a priority when designing a P2P file-sharing network. An unfair P2P network may attract free-riders, frustrate the majority of users, and consequently shorten the longevity of files. When BitTorrent protocol was first introduced, by suggesting new algorithms like tit-for- tat or rarest-first and combining them with methods like choking and unchoking, it pushed fairness one step forward. However, BitTorrent did not bring a plenary solution and has its own shortcomings. For instance, neither this protocol nor other P2P protocols that we are aware of precisely indicate how seeders should be treated in their networks. Most of the time they dictate that seeders upload as much as possible. With this approach, seeders can easily be abused by free-riders. It gets even worse when we realize that for lack of a good infrastructure a lawful user may become a free-rider unknowingly. The purpose of this paper is to address this problem by suggesting a novel and universal method that can be implemented in current P2P networks.
    [Show full text]
  • Telecommunication Technologies for Smart Grid Projects with Focus on Smart Metering Applications
    energies Review Telecommunication Technologies for Smart Grid Projects with Focus on Smart Metering Applications Nikoleta Andreadou *, Miguel Olariaga Guardiola and Gianluca Fulli Energy Security, Systems and Markets Unit, Institute of Energy and Transport, Joint Research Centre, Ispra 21027, Italy; [email protected] (M.O.G.); [email protected] (G.F.) * Correspondence: [email protected]; Tel.: +39-033-278-3866 Academic Editor: Neville Watson Received: 10 February 2016; Accepted: 29 April 2016; Published: 17 May 2016 Abstract: This paper provides a study of the smart grid projects realised in Europe and presents their technological solutions with a focus on smart metering Low Voltage (LV) applications. Special attention is given to the telecommunications technologies used. For this purpose, we present the telecommunication technologies chosen by several European utilities for the accomplishment of their smart meter national roll-outs. Further on, a study is performed based on the European Smart Grid Projects, highlighting their technological options. The range of the projects analysed covers the ones including smart metering implementation as well as those in which smart metering applications play a significant role in the overall project success. The survey reveals that various topics are directly or indirectly linked to smart metering applications, like smart home/building, energy management, grid monitoring and integration of Renewable Energy Sources (RES). Therefore, the technological options that lie behind such projects are pointed out. For reasons of completeness, we also present the main characteristics of the telecommunication technologies that are found to be used in practice for the LV grid. Keywords: smart grid; smart grid projects; telecommunication technologies; smart metering solutions 1.
    [Show full text]
  • A Field Study to Determine the Feasibility of Establishing Remote Data Transmission of Advertising for a Local Newspaper
    Rochester Institute of Technology RIT Scholar Works Theses 11-1-1995 A Field study to determine the feasibility of establishing remote data transmission of advertising for a local newspaper John McKeever Jr Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation McKeever, John Jr, "A Field study to determine the feasibility of establishing remote data transmission of advertising for a local newspaper" (1995). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. A Field Study to Determine the Feasibility of Establishing Remote Data Transmission of Advertising for a Local Newspaper By John J. McKeever, Jr. A thesis project submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Printing Management and Sciences of the Rochester Institute of Technology November, 1995 Thesis Advisors: Professors A. Ajayi and R. Hacker School ofPrinting Management and Sciences Rochester Institute ofTechnology Rochester, New York Certificate of Approval Master's Thesis lhis is to certify that the Master's Thesis of JohnJ. McKeever, Jr. With a major in Graphic Arts Publishing - Electronic Publishing has been approved by the Thesis Committee as satisfactory for the thesis requirement for the Master ofScience degree at the convocation of November 20, 1995 Thesis Committee: Robert G. Hacker Thesis Advisor Aisha Ajayi Thesis Advisor Marie Freckleton Graduate Program Coordinat()r C. Harold Goffin Director or Designate Copyright 1995 by John J.
    [Show full text]
  • P2P File Sharing P2P File Sharing
    P2P File Sharing P2P file sharing Alice chooses one of the peers, Bob. File is copied from Bob’s PC to Example Alice’s notebook: HTTP Alice runs P2P client While Alice downloads, other application on her notebook users uploading from Alice. computer Alice’s peer is both a Web client Intermittently connects to and a transient Web server. Internet; gets new IP address All peers are servers = highly for each connection scalable! Asks for “Hey Jude” Application displays other peers that have copy of Hey Jude. P2P: centralized directory (Napster’s Approach) Bob centralized directory server original “Napster” design 1 1) when peer connects, it peers 1 informs central server: IP address 1 3 content 2 1 2) Alice queries for “Hey Jude” 3) Alice requests file from Alice Bob P2P: problems with centralized directory file transfer is Single point of failure decentralized, but locating content is Performance highly decentralized bottleneck Copyright infringement Query flooding: Gnutella overlay network: graph edge between peer X fully distributed and Y if there’s a TCP no central server connection public domain all active peers and protocol edges is overlay net many Gnutella clients Edge is not a physical implementing protocol link Given peer will typically be connected with < 10 overlay neighbors Gnutella: protocol Ì File transfer: Query message HTTP sent over existing TCP connections Query Ì peers forward QueryHit Query message Ì QueryHit sent over reverse Query path QueryHit Scalability: limited scope flooding Gnutella: Peer joining 1. Joining peer X must find some other peer in Gnutella network: use list of candidate peers 2.
    [Show full text]
  • Compsci 514: Computer Networks Lecture 21-2: from Bittorrent to Bittyrant Problem Statement
    CompSci 514: Computer Networks Lecture 21-2: From BitTorrent to BitTyrant Problem Statement ... Server • One-to-many content distribution – Millions of clients downloading from the same server Evolving Solutions • Observation: duplicate copies of data are sent • Solutions – IP multicast – End system multicast – Content distribution networks e.g. Akamai – P2P cooperative content distribution • Bittorrent etc. IP multicast • End systems join a multicast group • Routers set up a multicast tree • Packets are duplicated and forwarded to multiple next hops at routers • Multicast pros and cons End system multicast • End systems rather than routers organize into a tree, forward and duplicate packets • Pros and cons Content distribution networks • Akamai – Works well but expensive, requires infrastructure support Peer-to-Peer Cooperative Content Distribution u Use the client’s uplink bandwidth u New problem: incentives for cooperation or how to motivate clients to upload The Gnutella approach u All nodes are true peers u A peer is the publisher, the uploader and the downloader. u No single point of failure. u Efficiency and scalability issue: u File searches span across a large number of nodes generating lots of traffic. u Integrity, i.e.content pollution issue: u Anyone can claim that he publishes valid content u No guarantee of quality of objects u Incentive issue: u No incentives for cooperation (free-riding in Gnutella) Outline u Problem of Content Distribution u The BitTorrent approach u BitTyrant BitTorrent overview Tracker 1 2 3 Leecher A Seeder Leecher C Leecher B u File is divided into chunks (e.g. 256KB) uShA1 hashes of all the pieces are included in the .torrent file for integrity check uA chunk is divided into sub-pieces to improve efficiency u Seeders have all chunks of the file u Leechers have some or no chunks of the file BitTorrent overview Tracker 1 2 3 Leecher A Seeder Leecher C Leecher B u File is divided into chunks (e.g.
    [Show full text]