11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

file transfer protocols 193a central server still may <strong>of</strong>fer better security <strong>and</strong> can serveas a central repository from which documents or sourcecode can be “checked out” <strong>and</strong> updated in an orderly way(version control).Further Reading“Designing <strong>and</strong> Deploying File Servers.” Micros<strong>of</strong>t TechNet.Available online. URL: http://technet2.micros<strong>of</strong>t.com/windowsserver/en/library/42befce4-7c15-4306-8edc-a80b8c57c67d1033.mspx. Accessed August 1, 2007.Eckstein, Robert, David Collier-Brown, <strong>and</strong> Peter Kelly. UsingSamba. 2nd ed. Sebastapol, Calif.: O’Reilly Media, 2003.Matthews, Martin S. Windows Server 2003: A Beginner’s Guide. 2nded. Berkeley, Calif.: McGraw-Hill Osborne, 2003.“Samba: Opening Windows to a Wider World.” Available online.URL: http://us3.samba.org. Accessed August 1, 2007.Tulloch, Mitch. Introducing Windows Server 2008. Redmond,Wash.: Micros<strong>of</strong>t Press, 2007.file-sharing <strong>and</strong> P2P networksFile-sharing services allow participants to provide access t<strong>of</strong>iles on their personal computers, such as music or video.In turn, the user can browse the service to find <strong>and</strong> downloadmaterial <strong>of</strong> interest. The structure is generally that <strong>of</strong> apeer-to-peer (P2P) network with no central server.The first major file-sharing service was Napster. Thiswas a P2P network but had a central server that providedthe searchable list <strong>of</strong> files <strong>and</strong> locations—but not the filesthemselves, which were downloaded from users’ PCs.Napster was forced to close in 2001 by legal action fromcopyright holders (see intellectual property <strong>and</strong> computing).A new but unrelated for-pay service opened laterunder the same name.Because <strong>of</strong> the legal vulnerability <strong>of</strong> centralized-list P2Pservices, a new model was developed, typified by Gnutella.This is a fully P2P model with both indexing <strong>and</strong> datadecentralized in nodes throughout the network. As <strong>of</strong> mid-2006, Gnutella <strong>and</strong> similar services such as Kazaa had anestimated 10 million users.BitTorrentMany services today use the popular BitTorrent file-sharingprotocol. A BitTorrent client (either the program <strong>of</strong> thatname or another compatible one) can transmit or receiveany type <strong>of</strong> data. To share a file, the client creates a “torrent”—asmall file that contains metadata describing thefile <strong>and</strong> an assignment to a “tracker.” The tracker is anothercomputer (node) that coordinates the distribution <strong>of</strong> thefile. Although this sounds complicated <strong>and</strong> a request takeslonger to set up than an ordinary HTTP connection, theadvantage is that once set up, downloading is efficientlymanaged even for files for which there is high dem<strong>and</strong>.The downloading client connects to multiple clients thatprovide pieces <strong>of</strong> the desired file. Because <strong>of</strong> its efficiency,BitTorrent allows for distribution <strong>of</strong> substantial amounts <strong>of</strong>data at low cost, particularly since the system “scales up”automatically without having to provide extra resources.BitTorrent is currently being used for a variety <strong>of</strong> legallydistributed material, including video, sound, <strong>and</strong> textualcontent (see blogs <strong>and</strong> blogging, podcasting, <strong>and</strong> rss).Legal IssuesBecause <strong>of</strong> their frequent use to share copyrighted music,video, or other material, a variety <strong>of</strong> organizations <strong>of</strong> copyrightowners have sued file-sharing services <strong>and</strong>/or theirusers. The biggest problem for the courts is to determinewhether there is “substantial non-infringing use”—that is,the service is being used to exchange legal data.Some file-sharing services have been accused <strong>of</strong> distributingmalware (viruses or spyware) or <strong>of</strong> being usedto distribute material that is illegal per se (such as childpornography).In response to litigation threats, file-sharing serviceshave tended to become more decentralized, <strong>and</strong> some havefeatures that increase anonymity <strong>of</strong> users (see anonymity<strong>and</strong> the Internet) or use encryption.Further ReadingBitTorrent. Available online. URL: http://www.bittorrent.com/.Accessed September 20, 2007.Gardner, Susannah, <strong>and</strong> Kris Krug. BitTorrent for Dummies. Hoboken,N.J.: Wiley, 2006.Gnutella. Available online. URL: http://www.gnutella.com/.Accessed September 20, 2007.Roush, Wade. “P2P: From Internet Scourge to Savior.” <strong>Technology</strong>Review. December 15, 2006. Available online. URL: http://www.technologyreview.com/Biztech/17904. Accessed September21, 2007.Schmidt, Aernout, Wilfred Dolfsma, <strong>and</strong> Wim Keuvelaar. Fightingthe War on File Sharing. Cambridge: Cambridge UniversityPress, 2007.Silverthorne, Sean. “Music Downloads: Pirates—or Customers?”[Q&A with Felix Oberholzer-Gee]. Harvard Business SchoolWorking Knowledge. Available online. URL: http://hbswk.hbs.edu/item/4206.html. Accessed September 20, 2007.Wang, Wallace. Steal This File Sharing Book: What They Won’t TellYou About File Sharing. San Francisco: No Starch Press, 2004.file transfer protocolsWith today’s networked PCs <strong>and</strong> the use <strong>of</strong> e-mail attachmentsit is easy to send a copy <strong>of</strong> a file or files from onecomputer to another, because networks already include allthe facilities for doing so. Earlier, many PCs were not networkedbut could be connected via a dial-up modem. Toestablished the connection, a terminal program running onone PC had to negotiate with its counterpart on the othermachine, agreeing on whether data would be sent in 7- or8-bit chunks, <strong>and</strong> the number <strong>of</strong> parity bits that would beincluded for error-checking (see error correction). Thesending program would inform the receiving program asto the name <strong>and</strong> basic type <strong>of</strong> the file. For binary files(files intended to be interpreted as literal binary codes, aswith executable programs, images, <strong>and</strong> so on) the contentswould be sent unchanged. For text files, there might be theissue <strong>of</strong> which character set (7- bit or 8-bit ASCII) was beingused, <strong>and</strong> whether the ends <strong>of</strong> lines were to be marked witha CR (carriage return) character, an LF (linefeed), or both(see characters <strong>and</strong> strings).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!