774 resultados para Read-to-peer
Resumo:
JXTA is an open peer-to-peer (P2P) protocols specification that, in its about 10 years of history, has slowly evolved to appeal to a broad set of applications. As part of this process,some long awaited security improvements have been included in the latest versions. However, under some contexts, even more advanced security requirements should be met, such as anonymity. Several approaches exist to deploy anonymity in P2P networks, but no perfect solution exists. Even though path-based approaches are quite popular, it is considered that, in dynamicgroups, using a split message-based one is better. In this work, we propose an anonymity service for JXTA using such approach. The proposal takes advantage JXTA's core services, in a manner so that it can be easily integrated to existing end applications and services.
Resumo:
Nowadays, Wireless Sensor Networks (WSN) arealready a very important data source to obtain data about the environment. Thus, they are key to the creation of Cyber-Physical Systems (CPS). Given the popularity of P2P middlewares as ameans to efficiently process information and distribute services, being able to integrate them to WSN¿s is an interesting proposal. JXTA is a widely used P2P middleware that allows peers to easily exchange information, heavily relying on its main architectural highlight, the capability to organize peers with common interests into peer groups. However, right now, approaches to integrate WSNs to a JXTA network seldom take advantage of peer groups. For this reason, in this paper we present jxSensor, an integrationlayer for sensor motes which facilitates the deployment of CPS¿s under this architecture. This integration has been done taking into account JXTA¿s idiosyncrasies and proposing novel ideas,such as the Virtual Peer, a group of sensors that acts as a single entity within the peer group context.
Resumo:
JXTA is a peer-to-peer (P2P) middleware whichhas undergone successive iterations through its 10 years of history, slowly incorporating a security baseline that may cater to different applications and services. However, in order to appeal to a broader set of secure scenarios, it would be interesting to take into consideration more advanced capabilities, such as anonymity.There are several proposals on anonymous protocols that can be applied in the context of a P2P network, but it is necessary to be able to choose the right one given each application¿s needs. In this paper, we provide an experimental evaluation of two relevant protocols, each one belonging to a different category of approaches to anonymity: unimessage and split message. Webase our analysis on two scenarios, with stable and non-stable peers, and three metrics: round trip-time (RTT), node processing time and reliability.
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
The UMSIC project will produce an application for social inclusion of children. This application will run on Nokia N810 internet tablet. PeerHood is an implementation of Peer-to-Peer neighborhood and communication concept, it is going to be used as a part of middleware in the project. PeerHood is responsible for providing neighboring information and connections to nearby devices. This thesis will present the requirements that the project sets to PeerHood including the general state of the art middleware requirements and the requirements set by the target device. These requirements will not be analyzed further. One main focus of this thesis is to analyze PeerHood from the UMSIC project point of view. In this thesis the results of PeerHood analysis are presented, including memory consumption testing, performance testing and testing of networking components of PeerHood. As a result of these tests modifications for PeerHood are introduced. The modifications are related to PeerHood usage in real mobile environment. Based on these requirements a framework was implemented that, when used properly, will enhance the context awareness of PeerHood, especially in mobile devices. The techniques used in framework are presented and instructions about how to use the framework are given. The approaches used in the implemented framework are analysed in this thesis. As an outcome of this thesis the context awareness of PeerHood is improved. As an additional outcome the guidelines for future development of PeerHood are introduced that are based on the results of the analysis of both PeerHood and the implemented framework.
Resumo:
Peer-to-Peer (P2P) technology has revolutionized file exchange activities besides enhancing processing power distribution. As such, this technology which is nowadays made freely available to all internet users also imposes a threat as it enables the illegal distribution of copyrighted digital work. P2P technology continuously evolves in a greater pace than copyright legislation, leading to compatibility gaps between the applicability of copyright law and the illicit file sharing and downloading. Such issues give high incentives to consumers to practise piracy using P2P systems with a low perception of risk towards prosecution, leading to substantial losses for copyright owners. This study focuses on developing insights for content owners on consumer behaviour towards piracy in Finland, where quantitative analyses are assessed using a data set based on a survey conducted by the Helsinki Institute for IT. The research approach investigates the significance of three fundamental areas in relation to evaluate consumer behaviour as: environmental-related factors, innovation-related factors and consumer-related. each of these are integrates concepts derived in previous theoretical models such as the technology acceptance model, theory of reasoned action, theory of planned behaviour, the issue-risk-judgement model and the Hunt & Vitell’s model.
Resumo:
In this thesis, a Peer-to-Peer communication middleware for mobile environment is developed using the Qt framework and the Qt Mobility extension. The Peer-to-Peer middleware – called as PeerHood – is for service sharing in network neighborhood. In addition, the PeerHood enables service connectivity and device monitoring functionalities. The concept of the PeerHood is already available in native C++ implementation on Linux platform using services from the platform. In this work, the PeerHood concept is remade to be based on use of the Qt framework. The objective of the new solution is to increase PeerHood quality with using functionalities from the Qt framework and the Qt Mobility extension. Furthermore, by using the Qt framework, the PeerHood middleware can be implemented to be portable cross-platform middleware. The quality of the new PeerHood implementation is evaluated with defined quality factors and compared with the existing PeerHood. Reliability, CPU usage, memory usage and static code analysis metrics are used in evaluation. The new PeerHood is shown to be more reliable and flexible that the existing one.
Resumo:
Bitcoin on ensimmäinen maailmanlaajuinen hajautettu ”peer-to-peer” virtuaalivaluutta, jonka toimintaa ei säätele mikään taho, esimerkiksi keskuspankki tai valtio. Tässä kandidaatintyössä pyritään selvittämään Bitcoinin etuja verrattuna perinteisiin maksumenetelmiin, kuten pankkien, luottoyhtiöiden ja muiden maksuvälitysyhtiöiden tarjoamiin palveluihin. Tämän lisäksi työssä tutkitaan Bitcoiniin liittyviä ongelmia sekä haasteita, kuten rikollista käyttöä, turvallisuusongelmia sekä volatiliteettia. Työn lopussa käsitellään Bitcoinin tulevaisuutta sekä luuodaan arvio Bitcoinin kehityksestä jatkossa. Bitcoinin vahvuuksia ja etuja verrattuna perinteisiin maksumenetelmiin ovat edullisuus, anonymiteetti, arvon määräytyminen sekä transaktioiden nopeus. Perinteiset maksumenetelmät veloittavat asiakkailtaan huomattavia välityspalkkioita, vaativat tunnistuksia palveluihinsa sekä transaktioiden suorittaminen kestää päivistä viikkoihin. Bitcoinin avulla kustannukset ovat minimaaliset sekä transaktiot käyttäjien välillä ovat välittömiä ja anonyymeja. Voidaan nähdä, että Bitcoinilla on tulevaisuudessa kaksi mahdollista suuntaa; Bitcoinin käyttö tulee kasvamaan vaihdonvälineenä tai jokin toinen virtuaalivaluutta tulee korvamaan Bitcoinin tulevaisuudessa parempana maksuvälineenä.
Resumo:
Guided by the social-ecological conceptualization of bullying, this thesis examines the implications of classroom and school contexts—that is, students’ shared microsystems—for peer-to-peer bullying and antibullying practices. Included are four original publications, three of which are empirical studies utilizing data from a large Finnish sample of students in the upper grade levels of elementary school. Both self- and peer reports of bullying and victimization are utilized, and the hierarchical nature of the data collected from students nested within school ecologies is accounted for by multilevel modeling techniques. The first objective of the thesis is to simultaneously examine risk factors for victimization at individual, classroom, and school levels (Study I). The second objective is to uncover the individual- and classroom-level working mechanisms of the KiVa antibullying program which has been shown to be effective in reducing bullying problems in Finnish schools (Study II). Thirdly, an overview of the extant literature on classroom- and school-level contributions to bullying and victimization is provided (Study III). Finally, attention is paid to the assessment of victimization and, more specifically, to how the classroom context influences the concordance between self- and peer reports of victimization (Study IV). Findings demonstrate the multiple ways in which contextual factors, and importantly students’ perceptions thereof, contribute to the bullying dynamic and efforts to counteract it. Whereas certain popular beliefs regarding the implications of classroom and school contexts do not receive support, the role of peer contextual factors and the significance of students’ perceptions of teachers’ attitudes toward bullying are highlighted. Directions for future research and school-based antibullying practices are suggested.
Resumo:
With the new age of Internet of Things (IoT), object of everyday such as mobile smart devices start to be equipped with cheap sensors and low energy wireless communication capability. Nowadays mobile smart devices (phones, tablets) have become an ubiquitous device with everyone having access to at least one device. There is an opportunity to build innovative applications and services by exploiting these devices’ untapped rechargeable energy, sensing and processing capabilities. In this thesis, we propose, develop, implement and evaluate LoadIoT a peer-to-peer load balancing scheme that can distribute tasks among plethora of mobile smart devices in the IoT world. We develop and demonstrate an android-based proof of concept load-balancing application. We also present a model of the system which is used to validate the efficiency of the load balancing approach under varying application scenarios. Load balancing concepts can be apply to IoT scenario linked to smart devices. It is able to reduce the traffic send to the Cloud and the energy consumption of the devices. The data acquired from the experimental outcomes enable us to determine the feasibility and cost-effectiveness of a load balanced P2P smart phone-based applications.
Resumo:
Human beings have always strived to preserve their memories and spread their ideas. In the beginning this was always done through human interpretations, such as telling stories and creating sculptures. Later, technological progress made it possible to create a recording of a phenomenon; first as an analogue recording onto a physical object, and later digitally, as a sequence of bits to be interpreted by a computer. By the end of the 20th century technological advances had made it feasible to distribute media content over a computer network instead of on physical objects, thus enabling the concept of digital media distribution. Many digital media distribution systems already exist, and their continued, and in many cases increasing, usage is an indicator for the high interest in their future enhancements and enriching. By looking at these digital media distribution systems, we have identified three main areas of possible improvement: network structure and coordination, transport of content over the network, and the encoding used for the content. In this thesis, our aim is to show that improvements in performance, efficiency and availability can be done in conjunction with improvements in software quality and reliability through the use of formal methods: mathematical approaches to reasoning about software so that we can prove its correctness, together with the desirable properties. We envision a complete media distribution system based on a distributed architecture, such as peer-to-peer networking, in which different parts of the system have been formally modelled and verified. Starting with the network itself, we show how it can be formally constructed and modularised in the Event-B formalism, such that we can separate the modelling of one node from the modelling of the network itself. We also show how the piece selection algorithm in the BitTorrent peer-to-peer transfer protocol can be adapted for on-demand media streaming, and how this can be modelled in Event-B. Furthermore, we show how modelling one peer in Event-B can give results similar to simulating an entire network of peers. Going further, we introduce a formal specification language for content transfer algorithms, and show that having such a language can make these algorithms easier to understand. We also show how generating Event-B code from this language can result in less complexity compared to creating the models from written specifications. We also consider the decoding part of a media distribution system by showing how video decoding can be done in parallel. This is based on formally defined dependencies between frames and blocks in a video sequence; we have shown that also this step can be performed in a way that is mathematically proven correct. Our modelling and proving in this thesis is, in its majority, tool-based. This provides a demonstration of the advance of formal methods as well as their increased reliability, and thus, advocates for their more wide-spread usage in the future.
Resumo:
Tutkielman tavoitteena on määrittää, miten pankkien vakavaraisuussääntelyn muuttuminen on vaikuttanut startup-yritysten lainan hintaan ja ehtoihin, sekä tarkastella startup-yritysten muiden rahoitusmahdollisuuksien kehittymistä. Startup-yritysten eri rahoituslähteiden kasvu kootaan lähteiden vuositilastoista. Pankkien vakavaraisuussääntelyä tarkastellaan vertailemalla lainsäädännön tilaa eri vuosina. Sääntelyn vaikutuksia arvioidaan suorittamalla laskuesimerkkejä tietynlaisten pankkien ja startup-yritysten tilanteessa. Lähtöarvot kootaan lainsäädännöstä, tilastoista, tieteellisistä julkaisuista tai asiantuntijahaastattelujen pohjalta. Startup-yritysten luottoluokitukset määritetään käyttämällä Suomen Asiakastieto Oy:n luokitusmallia. Tuloksena tutkielma luo kattavan kuvan pankkien vakavaraisuussääntelyn kehittymisestä ja startup-yritysten rahoituslähteistä. Pankkisektorin ulkopuolinen rahoitus startupeille on kasvanut 2,5 %:n vuosivauhtia vuodesta 2008, josta vertaislainat ovat olleet suuressa roolissa. Lähes 72 % pankkien vähittäislainojen markkinoista on siirtynyt sisäisten luokitusten menetelmään vastuiden riskipainojen laskennassa. Siirtymä uuteen menetelmään aiheuttaa korkopaineita viidesosalle startupeista. 58 %:lle startupeista muutos ei ole ongelma. 42 % startupeista ei voi pienentää potentiaalisen lainan korkoaan edes lainan kokoisella vakuudella. Pääomavaatimusten kasvu ja pankkien siirtyminen uusiin laskentamenetelmiin voi nostaa startup-yrityksen lainan korkoa jopa 15 %.
Resumo:
Currency is something people deal with every day in their lives. The contemporary society is very much revolving around currencies. Even though technological development has been rapid, the principle of currency has stayed relatively unchanged for a long time. Bitcoin is a digital currency that introduced an alternative to other digital currencies, and to the traditional physical currencies. Bitcoin is peer-to-peer, open source, and it erases the need of a third party in transactions. Bitcoin has since inception gained certain fame, but it has not established itself as a common currency in the world. The purpose of this study was to analyse what kind of potential does Bitcoin have to become a widely accepted currency in day-to-day transactions. The main research question was divided into three sub questions: • What kind of a process is the diffusion of new innovations? • What kinds of factors speak for the wider adoption of Bitcoin? • What kinds of factors speak against the wider adoption of Bitcoin? The purpose of the study was approached by having diffusion of innovations as the theoretical framework. The four elements in diffusion of innovations are, innovation, communication, time, and social system. The theoretical framework is applied to Bitcoin, and the research questions answered by analysing Bitcoin’s potential diffusion prospects. The body of research data consisted of media texts and statistics. In this study, content analysis was the research method. The main findings of the study are that Bitcoin has clear strengths, but it faces a large amount of uncertainty. Bitcoin’s strong areas are the transactions. They are fast, easy, and cheap. From the innovation diffusion perspective Bitcoin is still relatively unknown, and the general public’s attitudes towards it are sceptical. The research findings purport that Bitcoin has potential demand especially when the financial system of a region is dysfunctional, or when there is a financial crisis. Bitcoin is not very trusted, and the majority of people do not see a reason to start using Bitcoin in the future. A large number of people associate it with illegal activities. In general people are largely unaware of what Bitcoin is or what are the strengths and weaknesses. Bitcoin is an innovative alternative currency. However, unless people see a major need for Bitcoin due to a financial crisis, or dysfunctionality in the financial system, Bitcoin will not become much more widespread as it is today. Bitcoin’s underlying technology can be harnessed to multiple uses. Developments in that field in the future are something that future researchers could look into.
Resumo:
Le présent article vise à exposer la situation du régime de la copie privée face à Internet, tant dans son application que dans sa légitimité. L’auteur soumet notamment que l’exception de la copie privée n’est applicable ni à la mise à disposition ni au téléchargement de fichiers musicaux sur Internet à moins que, quant à ce dernier acte, la copie provienne d’une source licite, ce qui exclut les réseaux peer-to-peer. Ensuite, l’auteur analyse la question quant à savoir si les enregistreurs audionumériques et les disques durs des ordinateurs personnels devraient être soumis aux redevances au Canada, et conclut à l’effet qu’une réforme de la Loi sur le droit d’auteur est de mise si l’on veut en arriver à une telle éventualité. Finalement dans la dernière partie, l’auteur soulève la question de la remise en cause du régime de la copie privée face à l’importance grandissante que l‘on accorde à la gestion numérique des droits.