[Home]Parasitic computing

HomePage | Recent Changes | Preferences

Difference (from prior major revision) (no other diffs)

Changed: 1c1
When we send a request to a web server for a web page the communication programs in our machine split it into information packets before sending it across the Net. When these packets reach the target machine, they go through certain communication layers before reaching the target program- here the web server that serves the requested page. One such layer is the TCP –Transmission Control Protocol- that assembles the packets in proper order and makes sure that all the packets are in proper shape before handing them over to the web server. During this stage the TCP component makes some computation to ascertain the validity of the received information packets. As reported in the magazine Nature (http://www.nature.com/nature/fow/010830.html), this aspect of the TCP -called a checksum- is exploited to deploy the computing power of various servers (without any permission) by a few scientists to make some computations and thereby convert the Net into a giant distributed computer in which the servers perform computation on behalf of a remote node.
Parasitic computing occurs as follows. When we send a request to a web server for a web page, the communication programs in our machine split it into [information packet]?s before sending it across the Internet. When these packets reach the target machine, they go through certain communication layers before reaching the target program--here, the web server that serves the requested page. One such layer is the TCP (transmission control protocol) that assembles the packets in proper order and makes sure that all the packets are in proper shape before handing them over to the web server. During this stage the TCP component makes some computation to ascertain the validity of the received information packets. As reported in the magazine Nature [1], this aspect of the TCP, called a checksum?, is exploited to deploy the computing power of various servers (without any permission) by a few scientists to make some computations and thereby convert the Internet into a giant distributed computer in which the servers perform computation on behalf of a remote node.

Changed: 3c3,4
If you want to know more details on this subject access the link at: http://www.nd.edu/~parasite.
External links:
* http://www.nd.edu/~parasite

Added: 5a7,8

/Talk

Parasitic computing occurs as follows. When we send a request to a web server for a web page, the communication programs in our machine split it into [information packet]?s before sending it across the Internet. When these packets reach the target machine, they go through certain communication layers before reaching the target program--here, the web server that serves the requested page. One such layer is the TCP (transmission control protocol) that assembles the packets in proper order and makes sure that all the packets are in proper shape before handing them over to the web server. During this stage the TCP component makes some computation to ascertain the validity of the received information packets. As reported in the magazine Nature [1], this aspect of the TCP, called a checksum?, is exploited to deploy the computing power of various servers (without any permission) by a few scientists to make some computations and thereby convert the Internet into a giant distributed computer in which the servers perform computation on behalf of a remote node.

External links:

J.Murali

/Talk


HomePage | Recent Changes | Preferences
This page is read-only | View other revisions
Last edited September 17, 2001 2:18 am by Larry Sanger (diff)
Search: