Smartdust 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

PARASITIC COMPUTING

Parasitic computing is a concept by which one can


ABSTRACT use the resources of machines that
are connected on the Internet. This technology
Reliable communication on the Internet exploits open Internet protocols to use the
is guaranteed by a standard set of resources of remote machines. As the name
protocols, used by all computers. Here suggests, the machine that requires the
we show that these protocols can be services of others does not need to be authorized by
exploited to compute with the the latter. Any machine, which is
communication infrastructure, connected to the Internet, has to carry out minimum
transforming the Internet into a processing of any packet they
distributed computer in which servers receive without any authorization. This concept is
exploited by parasitic computing in
unwittingly perform computation on
order to make use of computing powers of remote
behalf of a remote node. In this model,
machines and web servers all around
which we call 'parasitic computing', one
the globe. So one cannot really stop their machines
machine forces target computers to solve from being utilized in this manner.
a piece of a complex computational How it differs from cluster computing?
problem merely by engaging them in Parasitic computing differs from cluster computing.
standard communication. Consequently, Cluster computing is an idea in
the target computers are unaware that which many computers pool in their resources
they have performed computation for the willingly to create a cumulative power
benefit of a commanding node. As equivalent to that of a supercomputer capable of
experimental evidence of the principle of solving complex computational
parasitic computing, we harness the problems. In contrast, parasitic computing does not
power of several web servers across the require the willingness of any target
globe, which—unknown to them—work machine to participate in the problem solving. This
together to solve an NP complete way one can make use of many
problem2. distributed resources across the Internet, which is
otherwise remaining idle. Also if one
divides the task in such a manner that no computer
is overloaded remote machine
performance won’t deteriorate much and our task
will be also be accomplished.
Introduction It is not cracking.
Parasitic computing though works without
authorization it is entirely different from
THE NET is a fertile place where new
the concept of cracking. In cracking data is sent to
ideas/products surface quite often. We have
the remote computer with malicious
already come across many innovative ideas such as
intentions and in order to corrupt some resource of
Peer-to-Peer file sharing, distributed
the remote machine whereas in this
computing and the like. Parasitic computing, which
case we are utilizing those resources for a
harnesses the computing power of
constructive purpose and also accessing only
machines that spread across the Net to accomplish
those parts of remote machines, which are made
complex computing tasks, is new in
open on the Internet and that is done
this category. The successor to distributed
without any malicious intentions but it can cause
computing has opened up a whole new can of
delay of services in the remote
worms. It works by exploiting a weakness in the
machines as resources are being utilized without the
TCP/IP system's error checking system.
knowledge of the owner.
The problem is that forcing target machines into
performing calculations puts a greater
load on them than a regular packet would, and the CONCLUSION: The question of where
server owner has not agreed to take research on parasitic computing is headed is an
part - in effect the technique is stealing processing interesting one from
power, but without breaking any laws. several perspectives. From an efficiency standpoint,
Although the technique is too slow to have much as noted above, some attention could be
practical value at present, it does raise focused on how the overall paradigm can be
questions for the future. The report discusses the improved along the lines noted by Barabasi et al.
technical aspects of what has already (2001): “To make the model viable, the
been carried out and the related issues. computation-to-communication ratio must increase
until the computation exported by the parasitic node
DETAILS OF PARASITIC is larger than the amount of cycles
required by the node to solve the problem itself
COMPUTING instead of sending it to the target” (p. 897).
One way to do this, as noted by Freeh (2002), is to • Barabasi et.al. Supplement material for Parasitic
increase the number of packets sent by a Computing :
parasite to a single host. Such an approach also http://www.nd.edu/~parasite/
would increase the importance of dealing with • Barger N. Robert & Crowell R. Charles,The ethics
the reliability problems associated with parasitic of Parasitic
computing (i.e., false negatives and false Computing, Sept 2003 :
positives). In terms of the TCP/IP vulnerability www.nd.edu/~ccrowell/Parasitic%20Computing.pdf
exploited by parasitic computing, Freeh (2002) • Ivars Peterson, Sneaky Calculations, Science
has noted that more work is needed to better define News 160, 17 Nov 2001.
and understand the viability and level of •
threat associated with various forms of exploitation www.hindu.com/thehindu/2001/09/13/stories/08130
inherent in Internet protocols. Finally, with 001.htm
respect to a justification for parasitic computing,

REFERENCES:
• Barabasi et.al., Parasitic Computing, NATURE
412, 30 Aug 2001.

You might also like