To My Mother Моей Маме
نویسندگان
چکیده
1 Introduction Today, peer-to-peer technology has reached the peak of its popularity. Currently, P2P file sharing represents the dominant usage component of Internet bandwidth. Moreover, P2P networks enable sharing of other different computer resources and services, including distributed (collaborative) computing, processing cycles, instant messaging, CPU and storage resources, etc. Peer-to-peer (P2P) is a communication model in which multiple autonomous devices interact as equals. In a pure P2P network each node implements functions of both client and server, and either peer can initiate a communication session at any moment. In terms of Internet users, P2P is a sort of " transient " network that allows a group of computers with the same networking software (P2P client) to directly access files from one another's hard drives via Internet connection – simple to join, simple to use. Nevertheless, P2P network is a quite complex system that represents a synthesis of several technological components, and one of them is overlay network. Nowadays, overlay networks based on Distributed Hash Tables (DHT) are a building block of many peer-to-peer applications. DHT mechanisms provide guaranteed data retrieval, moderate lookup times, automatic load balancing and self-organizing data storage and lookup system [1]. However, DHT-based peer-to-peer networks represent a particular environment susceptible to some specific threats and attacks due to their completely distributed nature without any centralized control. Generally, these attacks are caused by malicious behaviour of some nodes of the network and aimed at routing and lookup processes. Security in DHT-based Peer-to-Peer Networks 10 This thesis is meant to find solutions for some specific security problems of DHT-based P2P environment. At the same time, it is also proposed to exploit the advantages of DHT mechanisms applying them to systems where they can be effective against some particular problems. In other words, the research was conducted in two directions: • DHT as an object to specific attacks; • DHT as a security improving tool. Regarding the first direction, we propose some solutions based on the use of trust and reputation evaluation mechanisms to cope with some types of specific attacks of DHT environment. The character of interactions between peers and the presence of " misbehaving " and " honest " peers indicate an analogy between P2P environment and human communities. So, it makes sense to apply reputation evaluation techniques to avoid further contacts with nodes that have already demonstrated malevolent behaviour in order to resolve the problem of polluting …
منابع مشابه
P-66: The Impact of Infertility on Pschological and Social Status of Women in Iran: A Content Analysis Study
s:7477:"Background: To explore the Impact of Infertility on Pschological and Social Status of Women in Iran Materials and Methods: Design A qualitative design, based on the content analysis approach, was employed for data collection and analysis of the experiences of Iranian women on infertility. Qualitative studies are intended to enhance understanding and describe the world of human experienc...
متن کاملOn loving and hating my mentally retarded mother.
In this article I have explored why I love and hate my mother. It is a retrospective and ongoing participant observation of the phenomenon of being the daughter of a mother with mental retardation. In it, I make use of a layered account--an experimental, postmodern, ethnographic reporting format that enables researchers to use varied resources, such as social theory, lived experience, and emoti...
متن کاملAuthentification Rapide Et Controle D’acces Base Sur La Confiance Dans Les Reseaux sans Fil Heterogenes
1 ACKNOWLEDGEMENTS To my family Моей семье I have an opportunity to express my gratitude to all people who have contributed to this work, supported and accompanied me during my thesis preparation. First of all, I would like to express my sincere gratitude to my thesis supervisor, Professor Michel Riguidel for the guidance, continuous encouragement and patience. Many thanks for his suggestions, ...
متن کاملA young woman looks back: losing her mother to breast cancer.
15 I n August 1997, the wonderful life my mother had worked so hard to make for us came to an abrupt halt. I distinctly remember the hot summer day when we were watching television and the telephone rang. It was the gynecologist my mom had worked with for 20 years asking her to come into the office to discuss the results of her mammogram. I can still recall the frightened look on my mother’s fa...
متن کاملFirst Self
lowly, purposefully, my mother unbuttons her blouse. It is blue with small white flowers, and the tail is tucked firmly into the elastic waistband of her salmon-pink pants. Beginning at the top and moving down, she works carefully at each of the small plastic buttons. " Mother, " I plead with her, " you don't need to do that. " She smiles at me and continues unfastening buttons. Her padded cott...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008