The Internet Encyclopedia (Volume 3)

(coco) #1

P1: B-10-Camp


Camp WL040/Bidgoli-Vol III-Ch-03 July 11, 2003 11:42 Char Count= 0


FURTHERREADING 33

Domain name system The technical and political pro-
cess of assigning, using, and coordinating domain
names.
Front-end processor The first IBM front-end processor
enabled users to access multiple mainframe computers
from a single terminal.
Node A machine (sometimes a set of machines) that has
a single specific name.
Metadata Data about data, e.g., location, subject, or
value of data.
Persistent Information or state that remains reliably
available over time despite changes in the underlying
network.
Reliable The maintaining of a system’s performance as
a whole despite localized flaws or errors; e.g., file recov-
ery despite disk errors, file transmission despite partial
network failure; alternatively a system (particularly a
storage system) in which all failures are recoverable,
so that there is never long-term loss.
Scalable The idea that a system that works within a
small domain or for a small number of units will also
work for a number of units orders of magnitude larger.
Swarm A download of the same file from multiple
sources.
Servlet Software-integrating elements of client and
server software.
Top-level domain name The element of the domain
name that identifies the class and not the specific net-
work; early examples: edu and org.
Trusted The state of a component if the user is worse
off should the component fail, the component allows
actions that are otherwise impossible, i.e., it is en-
abling, and there is no way to obtain the desired im-
provement without accepting the risk of failure. (Note
that reliable systems do not require trust of a specific
component.)
UNIX A family of operating system used by minicom-
puters and servers, and increasingly on desktops; Linux
is a part of the UNIX family tree.
Virus A program fragment that attaches to a complete
program in order to damage the program, files on the
same machine, and/or infect other programs.

CROSS REFERENCES
SeeClient/Server Computing; Middleware; Web Services.

REFERENCES
Borland, J. (2002, April 1). Stealth P2P network hides in-
side Kazaa.CNET Tech News.Retrieved from http://
news.com.com/2100-1023-873181.html
Camp, L. J. (2001).Trust and risk in Internet commerce.
Cambridge, MA: MIT Press.
Lemos, R. (2002, June 6). AIM+ creators delete “spyware”
feature.CNET Tech News.Retrieved from http://news.
com.com/2100-1040-933576.html
Oram, A. (Ed.) (2001). Peer-to-peer harnessing the
power of disruptive technologies. Cambridge, MA:
O’Reilly.
Pahfl, M. (2001). Giving music away to make money: Inde-
pendent musicians on the Internet.First Monday, 6(8).
Retrieved from http://www.firstmonday.org/issues/
issue68/pfahl/index.html
Ritter, J. (2001, February). Why Gnutella can’t scale.
No, really. Retrieved from http://www.darkridge.
com/∼jpr5/doc/gnutella.html
Sniffen, B. (2000).Trust economies in the Free Haven
Project(MIT technical report). Cambridge, MA: Mas-
sachusetts Institute of Technology.
von Lohmann, F. (2001). Peer to peer sharing and copy-
right law after Napster. Retrieved from http://www.
eff.org/Intellectualproperty/Audio/Napster/20010309
p2pexecsum.html
Wulf, W. A., Wang, C., & Kienzle, D. (1995, August). A
new model of security for distributed systems (Com-
puter Science Technical Report CS-95-34). University
of Virginia.

FURTHER READING
Online
Beowulf, http://www.beowulf.org/
Free Haven, http://www.freehaven.net
Free Network Project, http://freenet.sourceforge.net
Gnutella, http://www.gnutella.org
Kazaa, http://www.kazaa.com
Kazaa Lite, http://www.k-lite.tk, a version of Kazaa with-
out “spyware” or limits on download speed.
Mojo Nation, http://sourceforge.net/projects/mojonation
Napster Protocol, http://opennap.sourceforge.net/napster.
txt
SETI@home, http://setiathome.ssl.berkeley.edu
Free download pdf