Literature Survey

Total Page:16

File Type:pdf, Size:1020Kb

Literature Survey An Asynchronous Collaboration and Content Management Framework with High-Performance P2P-based Data Transfer Capability for Scientific Computing Ali Kaplan Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the Department of Computer Science, Indiana University July 2007 i Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Doctoral Committee _______________________________ Prof. Geoffrey C. Fox (Principal Advisor) ________________________________ Prof. Dennis Gannon ________________________________ Prof. ________________________________ Prof. 28, 2008 ii © 2008 Ali Kaplan All Rights Reserved iii Acknowledgements iv Abstract v Table of Contents Chapter 1 ‐ Introduction ..................................................................................................... 1 1.1 Motivation ......................................................................................................................... 4 1.2 Use Cases .......................................................................................................................... 5 1.3 Research Issues .................................................................................................................. 6 1.4 Contributions ..................................................................................................................... 7 1.5 Organization of the Thesis ................................................................................................. 9 Chapter 2 ‐ Literature Survey .......................................................................................... 12 2.1 Introduction ..................................................................................................................... 12 2.2 Overview ......................................................................................................................... 14 2.3 System-level Data Movement Techniques ...................................................................... 16 2.4 Application-level Data Movement Techniques ............................................................... 17 2.4.1 TCP -based Data Movement Techniques ................................................................... 17 2.4.1.1 GridFTP ............................................................................................................................................. 18 2.4.1.2 GridHTTP .......................................................................................................................................... 22 2.4.1.3 bbFTP ................................................................................................................................................ 22 2.4.1.4 The BaBar Copy Program (bbcp) ....................................................................................................... 23 2.4.2 UDP -based Data Movement Techniques ................................................................... 23 2.4.2.1 Simple Available Bandwidth Utilization Library (SABUL) .............................................................. 24 2.4.2.2 UDP-based Data Transfer Protocol (UDT) ........................................................................................ 24 2.4.2.3 Fast Object –Based data transfer System (FOBS) .............................................................................. 25 2.4.2.4 Reliable Blast UDP (RBUDP) ........................................................................................................... 26 2.4.2.5 Tsunami ............................................................................................................................................. 26 vi 2.4.2.6 UFTP ................................................................................................................................................. 27 2.5 Peer-to-Peer based Data Movement Techniques ............................................................. 27 2.5.1 BitTorrent ................................................................................................................... 30 2.6 Network-level Data Transfer Techniques ........................................................................ 34 2.7 Discussion ....................................................................................................................... 37 Chapter 3 ‐ The GridTorrent Framework Architecture ............................................... 39 3.1 The Overview of the GridTorrent Framework ................................................................ 39 3.2 Main Components of the GridTorrent Framework .......................................................... 42 3.3 Summary ......................................................................................................................... 46 Chapter 4 ‐ The GridTorrent Framework Client Architecture .................................... 48 4.1 Introduction ..................................................................................................................... 48 4.2 Overview of the GridTorrent Framework Client Architecture ........................................ 50 4.3 Torrent Data Sharing Logic ............................................................................................. 52 4.4 Core Modules Layer ........................................................................................................ 53 4.4.1 Data Transfer Modules ............................................................................................... 53 4.4.2 Management Modules ................................................................................................ 55 4.4.2.1 Task Manager .................................................................................................................................... 56 4.4.2.2 WS-Tracker Client ............................................................................................................................. 56 4.5 Security Manager ............................................................................................................. 58 4.6 Task Generation and Exchange ....................................................................................... 59 4.6.1 Tasks ........................................................................................................................... 60 4.6.1.1 Task List Request Task ...................................................................................................................... 63 4.6.1.2 Share Content Request Task .............................................................................................................. 64 4.6.1.3 Share Content Response Task ............................................................................................................ 65 4.6.1.4 Download Content Request Task ....................................................................................................... 66 4.6.1.5 Download Content Response Task .................................................................................................... 67 vii 4.6.1.6 Access Control List Request Task ..................................................................................................... 68 4.6.1.7 Access Control List Response Task ................................................................................................... 69 4.6.1.8 Update Status Task: (UPT) ................................................................................................................ 70 4.7 Summary ......................................................................................................................... 71 Chapter 5 ‐ Asynchronous Collaboration and Content Management Architecture ... 72 5.1 Introduction ..................................................................................................................... 72 5.2 The concept of Asynchronous Collaboration and Content Management ........................ 73 5.2.1 Definition of term “Asynchronous Collaboration” ..................................................... 73 5.2.2 Definition of term “Content” and “Content Management” ........................................ 74 5.2.3 Requirements .............................................................................................................. 74 5.3 Related Work ................................................................................................................... 75 5.4 Access Control Schemes ................................................................................................. 81 5.5 The Collaboration and Content Management .................................................................. 83 5.5.1 Objects of the System ................................................................................................. 85 5.5.2 Services of the System ................................................................................................ 87 5.5.3 Collaboration Management Module ........................................................................... 90 5.5.4 Access Control Mechanism of CCM .......................................................................... 92 5.5.5 Content Management Module .................................................................................... 93 5.6 Summary ........................................................................................................................
Recommended publications
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • P2P Networking and Applications
    P2P Networking and Applications John F. Buford Heather Yu Eng Keong Lua AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO u' SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO MORGAN Morean Kaufmann Publishers is an imprint of Elsevier Table of Contents Preface xvii About the Authors xxi CHAPTER 1 Introduction 1 P2P Emerges as a Mainstream Application 1 The Rise of P2P File-Sharing Applications 1 Voice over P2P (VoP2P) 4 P2PTV 5 P2P Networking and the Internet 8 P2P Overlays and Network Services 8 Impact of P2P Traffic on the Internet 10 Motivation for P2P Applications 11 P2P from the End User's Perspective 11 Is P2P = Piracy? 12 P2P Strengths and Benefits 12 P2P Open Issues 14 P2P Economics 14 The P2P Value Proposition 14 Barrier to Entry 15 Revenue Models and Revenue Collection 15 P2P Application Critical Mass 16 Anatomy of Some P2P Business Models 17 VoP2P 17 File Sharing 19 Social Impact 21 Technology Trends Impacting P2P 22 Summary 23 Further Reading 23 CHAPTER 2 Peer-to-Peer Concepts 25 Operation of a P2P System 25 The User View 25 P2P Beyond the Desktop Computer 26 Overlay View 28 Principles of the P2P Paradigm 29 A Graph Theoretic Perspective 31 Overview 31 Overlay 31 Graph Properties 33 Object Storage and Lookup 34 vi Table of Contents A Design Space Perspective 35 A Routing Performance Perspective 36 Routing Geometries and Resilience 36 Tradeoff Between Routing State and Path Distance 37 Churn and Maintaining the Overlay 37 Locality 39 An Implementation Perspective: OverlayWeaver 41 Summary 43 For Further
    [Show full text]
  • Wired 13.01: the Bittorrent Effect
    Wired 13.01: The BitTorrent Effect Search: Wired Magazine 6 Search The BitTorrent Effect Movie studios hate it. File-swappers love it. Bram Cohen's blazing-fast P2P software has turned the Internet into a universal TiVo. For free video-on-demand, just click here. By Clive ThompsonPage 1 of 5 next » "That was a bad move," Bram Cohen tells me. We're huddled over a table in Feature: his Bellevue, Washington, house playing a board game called Amazons. Cohen The Bit Torrent Effect picked it up two weeks ago and has already mastered it. The 29-year-old programmer consumes logic puzzles at the same rate most of us buy magazines. Plus: Behind his desk he keeps an enormous plastic bin filled with dozens of Rubik's A Better Way to Share Files Cube-style twisting gewgaws that he periodically scrambles and solves throughout the day. Cohen says he loves Amazons, a cross between chess and the Japanese game Go, because it is pure strategy. Players take turns dropping more and more tokens on a grid, trying to box in their opponent. As I ponder my next move, Cohen studies the board, his jet-black hair hanging in front of his face, and tells me his philosophy of the perfect game."The best strategy games are the ones where you put a piece down and it stays there for the whole game," he explains. "You say, OK, I'm staking out this area. But you can't always figure out if that's going to work for you or against you.
    [Show full text]
  • NET Institute*
    NET Institute* www.NETinst.org Working Paper #07-42 October 2007 Online Peer-to-peer Communities: An Empirical Investigation of a Music Sharing Network as a Dynamic Two-sided Network Bin Gu, University of Texas, Yun Huang, University of Texas, Wenjing Duan, George Washington University Andrew Whinston, University of Texas * The Networks, Electronic Commerce, and Telecommunications (“NET”) Institute, http://www.NETinst.org, is a non-profit institution devoted to research on network industries, electronic commerce, telecommunications, the Internet, “virtual networks” comprised of computers that share the same technical standard or operating system, and on network issues in general. ONLINE PEER-TO-PEER COMMUNITIES: AN EMPIRICAL INVESTIGATION OF A MUSIC SHARING COMMUNITY AS A 1 DYNAMIC TWO-SIDED NETWORK Bin Gu2, Yun Huang2, Wenjing Duan3, Andrew Whinston2 Abstract Online peer-to-peer communities and online social networks have become increasingly popular. In particular, the recent boost of online peer-to-peer communities leads to exponential growth in sharing of user-contributed content which have brought profound changes to business and economic practices. Understanding the formation and sustainability of such peer-to-peer communities has important implications for businesses. We develop a dynamic two-sided network model that relates growth of communities to interactions between contribution and consumption of resources in online sharing activities. Using online music sharing data collected from a popular IRC music sharing service over five years, we empirically apply the model to identify dynamics in the music sharing community. We find that the music sharing community demonstrates distinctive characteristics of a two-sided network. Contribution in the community leads to more consumption and consumption leads to more contribution, creating positive network effects in the community.
    [Show full text]
  • Smart Internet 2010 Report
    SMART INTERNET TECHNOLOGY CRC SMART INTERNET 2010 REPORT SMART INTERNET 2010 Version: General distribution Date of Publication: August 2005 Authors: Trevor Barr, Alex Burns, Darren Sharp Faculty of Life and Social Sciences Swinburne University of Technology Established and supported under the Australian Government’s Cooperative Research Centres Programme Acknowledgment The editorial team who compiled and wrote sections of this report, and the individual section contributors, wish to collectively thank all of the interviewees who so generously gave of their time, and their thoughts, for this report. The interviewees responded in person, or by email, or in taped telephone conversations. Many were overseas and agreed to be interviewed at difficult times for them. Every endeavour has been made to fully acknowledge the views of those external experts who were consulted and quoted for the compilation of this report. Disclaimer This report contains references, comments and views regarding the topic of Smart Internet 2010. The recipient acknowledges that these references, comments and views reflect opinions and assumptions by the individual contributors, editorial team and Smart Internet Technology CRC Pty Ltd concerning the future, which may or may not prove correct. Smart Internet Technology CRC Pty Ltd and its respective directors and officers expressly disclaim any liability, representations or warranties expressed or implied contained in this report or any omissions from it. This disclaimer extends to any other information whether written or not, provided at any time by or on behalf of the Smart Internet Technology CRC Pty Ltd. © Smart Internet Technology CRC Pty Ltd 2005. All Rights Reserved. All trademarks mentioned in this document are the property of their respective owners.
    [Show full text]
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
    UMG Recordings, Inc. et al v. Veoh Networks, Inc. et al Doc. 78 1 Re: Docket # 71 Steven A. Marenberg (101033) ([email protected]) 2 Elliot Brown (150802) ([email protected]) Brian Ledahl (186579) ([email protected]) 3 Benjamin Glatstein (242034) ([email protected]) IRELL & MANELLA LLP 4 1800 Avenue of the Stars, Suite 900 Los Angeles, California 90067-4276 5 Telephone: (310) 277-1010 Facsimile: (310) 203-7199 6 Attorneys for Plaintiffs 7 ADDITIONAL COUNSEL LISTED 8 ON SIGNATURE PAGE 9 UNITED STATES DISTRICT COURT 10 CENTRAL DISTRICT OF CALIFORNIA 11 WESTERN DIVISION 12 13 UMG RECORDINGS, INC., et al., ) Case No. CV-07-05744 AHM (AJWx) 14 ) ) JOINT STIPULATION UNDER 15 Plaintiffs, ) LOCAL RULE 37-2 REGARDING ) UMG RECORDINGS, INC.’S 16 ) MOTION TO COMPEL v. ) RESPONSES TO DISCOVERY 17 ) AGAINST VEOH NETWORKS, INC. ) 18 VEOH NETWORKS, INC., ) Filed Concurrently Herewith: ) [Declaration of Brian Ledahl and 19 ) Jennifer A. Golinveaux] Defendant. ) 20 ) ) Magistrate: Hon. Andrew J. Wistrich 21 ) ) Date: August 11, 2008 22 ) Time: 10:00 a.m. ) Courtroom: 690 23 ) ) Discovery Cutoff: January 12, 2009 24 ) Pretrial Conference: April 6, 2009 ) Trial Date: April 21, 2009 25 26 REDACTED PURSUANT TO INTERIM PROTECTIVE ORDER ENTERED 27 ON MAY 21, 2008-CONFIDENTIAL INFORMATION OMITTED 28 UNREDACTED COPY FILED UNDER SEAL 1899242 Dockets.Justia.com 1 TABLE OF CONTENTS 2 Page 3 I. INTRODUCTORY STATEMENTS ...............................................................2 4 A. UMG’s Introductory Statement .............................................................2
    [Show full text]
  • Singing for the School
    Journal of Theoretical and Applied Electronic Commerce Research This paper is Available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 1 / ISSUE 3 / DECEMBER 2006 / 42 - 57 © 2006 Universidad de Talca - Chile P2P's Significance for eBusiness: Towards a Research Agenda Roger Clarke1 1 Xamax Consultancy Pty Ltd, Canberra, Australia and Visiting Professor in eCommerce at Uni. of Hong Kong, in Cyberspace Law and Policy at Uni. of N.S.W. and in Computer Science at A.N.U. [email protected] Received 25 April 2006; received in revised form 15 August 2006; accepted 13 October 2006 Abstract Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application functionality, and the categories of digital works that are shared using P2P facilities. A range of significant strategic, consumer and policy issues also arise, such as challenges to the operation of copyright, defamation and other censorship laws. Organisations affected by P2P are devising and deploying countermeasures, such as technological protections for digital works and attempts to identify devices and users. These too require study. This paper presents the landscape of research opportunities, indicating methods that might be appropriately applied to the various kinds of questions. Key words: P2P overlay networks, P2P applications, file-sharing, strategic impacts, policy impacts 42 P2P's Significance for eBusiness: Towards a Research Agenda Roger Clarke Journal of Theoretical and Applied Electronic Commerce Research This paper is Available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 1 / ISSUE 3 / DECEMBER 2006 / 42 - 57 © 2006 Universidad de Talca - Chile 1 Introduction Applications of Peer-to-peer (P2P) technology have exploded since the late 1990s.
    [Show full text]
  • Detection of Encrypted Traffic Generated by Peer-To-Peer Live
    UNIVERSIDADE DA BEIRA INTERIOR Engenharia Detection of Encrypted Traffic Generated by Peer-to-Peer Live Streaming Applications Using Deep Packet Inspection André Filipe Ferreira Esteves Dissertation submitted in candidature for the degree of Master of Science in Computer Science and Engineering (2nd Cycle Degree) Supervisor: Dr. Mário Marques Freire Covilhã, October 2011 ii Work financed by FEDER funds through Programa Operacional Factores de Competitividade – COMPETE and by national funds through the Portuguese Fundação para a Ciência e a Tecnologia within the project TRAMANET: Traffic and Trust Management in Peer-to-Peer Networks with contracts PTDC/EIA/73072/2006 and FCOMP-01-0124-FEDER-007253. i ii Acknowledgements First i would like to start thanking the person who give the chance to integrate his dynamic research team where work and fun walk side by side, to professor Mário Freire my gratitude, for all the scientific knowledge acquired along this work, for the motivation, and also for the almost unlimited resources provided to make this research possible. I would also like to thank David Milheiro for the help mounting the research test-bed, and João Gomes and professor Pedro Inácio for the great suggestions to improve my work. I am also grateful to the University of Beira Interior, in special to the Computer Science Department and to the Multimedia Signal Processing research group for all the support and equipment provided for this work, and also for having such delight place to work. To my parents and my brother for all the motivation and support over the years, as without them i would not have made here.
    [Show full text]
  • Architecture of P2P Systems
    Architecture of P2P systems Peer-to-peer systems often implement an abstract overlay network, built at Application Layer, on top of the native or physical network topology. Such overlays are used for indexing and peer discovery and make the P2P system independent from the physical network topology. Content is typically exchanged directly over the underlying Internet Protocol (IP) network. Anonymous peer-to-peer systems are an exception, and implement extra routing layers to obscure the identity of the source or destination of queries. In structured peer-to-peer networks, peers (and, sometimes, resources) are organized following specific criteria and algorithms, which lead to overlays with specific topologies and properties. They typically use distributed hash table-based (DHT) indexing, such as in the Chord system (MIT).[2] Unstructured peer-to-peer networks do not impose any structure on the overlay networks. Peers in these networks connect in an ad-hoc fashion[3]. Ideally, unstructured P2P systems would have absolutely no centralized system, but in practice there are several types of unstructured systems with various degrees of centralization. Three categories can easily be seen. In pure peer-to-peer systems the entire network consists solely of equipotent peers. There is only one routing layer, as there are no preferred nodes with any special infrastructure function. Hybrid peer-to-peer systems allow such infrastructure nodes to exist, often called supernodes.[4] . In centralized peer-to-peer systems, a central server is used for indexing functions and to bootstrap the entire system. Although this has similarities with a structured architecture, the connections between peers are not determined by any algorithm.
    [Show full text]
  • Sandvine Global Internet Phenomena Report
    Global Internet Phenomena Report 1H 2012 Executive Summary The Global Internet Phenomena Report: 1H 2012 shines a light on fixed and mobile data networks around the world, identifying facts, fads, and the future trends that will shape the Internet’s future. Within this report, we present a mix of high-level observations, regional-focused analysis, deep-dives into specific subjects, and educational tidbits. Communications service providers (CSPs) in particular are in the position to act on this information, but we believe that the findings will be of interest to a wide range of readers. At the highest level, we observed that Real-Time Entertainment (comprised mostly of streaming video and audio) is the largest traffic category on every network we examined. Furthermore, with the sole exception of NorthAmerica’s fixed access networks (where Netflix is dominant), YouTube is the largest single source of Real-Time Entertainment traffic. With appeal that crosses regions, access technologies and devices, YouTube has emerged to account for more Internet traffic than any other service. We also observed that rich communication services like WhatsApp, that replace traditional source of operator revenue, continue to enjoy widespread adoption – we counted an average of 7.6 million WhatsApp messages per day on a mobile operator with 1 million subscribers. North America’s mobile networks have the highest proportion of Real-Time Entertainment traffic – in fact, the majority of mobile data in North America is streaming audio and video. YouTube leads the way, accounting for 23.4% of daily traffic, but Pandora Radio has emerged to make up 6.4%.
    [Show full text]
  • Survey on Peer-Assisted Content Delivery Networks
    Accepted Manuscript Survey on Peer-assisted Content Delivery Networks Nasreen Anjum, Dmytro Karamshuk, Mohammad Shikh-Bahaei, Nishanth Sastry PII: S1389-1286(17)30046-4 DOI: 10.1016/j.comnet.2017.02.008 Reference: COMPNW 6107 To appear in: Computer Networks Received date: 26 July 2016 Revised date: 13 February 2017 Accepted date: 14 February 2017 Please cite this article as: Nasreen Anjum, Dmytro Karamshuk, Mohammad Shikh-Bahaei, Nishanth Sastry, Survey on Peer-assisted Content Delivery Networks, Computer Networks (2017), doi: 10.1016/j.comnet.2017.02.008 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. ACCEPTED MANUSCRIPT Survey on Peer-assisted Content Delivery Networks 1 2, 3, 4, Nasreen Anjum , Dmytro Karamshuk ∗, Mohammad Shikh-Bahaei ∗, Nishanth Sastry ∗ Department of Informatics, King’s College London Abstract Peer-assisted content delivery networks have recently emerged as an economically viable alternative to traditional content delivery approaches: the feasibility studies conducted for several large content providers suggested a remark- able potential of peer-assisted content delivery networks to reduce the burden of user requests on content delivery servers and several commercial peer-assisted deployments have been recently introduced. Yet there are many tech- nical and commercial challenges which question the future of peer-assisted solutions in industrial settings.
    [Show full text]
  • Liveshift: Atime-Shiftedp2p Multimediastreamingapproach
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2013 LiveShift: a time-shifted P2P multimedia streaming approach Hecht, Fabio Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-89253 Dissertation Published Version Originally published at: Hecht, Fabio. LiveShift: a time-shifted P2P multimedia streaming approach. 2013, University of Zurich, Faculty of Economics. LiveShift: A Time-Shifted P2P Multimedia Streaming Approach Doctoral Thesis For the Degree of Doctor of Informatics At the Faculty of Economics, Business Administration And Information Technology of the University of Zurich by Fabio Victora Hecht from Brazil Accepted on the recommendation of Prof. Dr. Burkhard Stiller Dr. Tobias Hoßfeld 2013 The Faculty of Economics, Business Administration and Information Tech- nology of the University of Zurich herewith permits the publication of the aforementioned dissertation without expressing any opinion on the views contained therein. Zurich, January 23, 2013 The Vice Dean of the Academic Program in Informatics: Prof. Dr. Harald C. Gall Abstract Interest in multimedia streaming – download and immediate playback of audio and video content – on the Internet has grown immensely in the last decade. Traditional client/server (C/S) and content distribution network (CDN) architectures, though technically simpler, are expensive, since they require infrastructure to grow according to the number of simultaneous clients. This results in the existence of only a few large content providers, thus support for transmission of events without great commercial appeal is restricted. The peer-to-peer (P2P) architecture, on the contrary, allows low-cost and scalable distribution of multimedia content by users them- selves, without requiring large infrastructure investments.
    [Show full text]