gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...
Date: Wed, 05 Mar 2003 06:58:00 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/03/05 06:57:58

Modified files:
        Documentation/misc/hemppah-progradu: masterthesis.tex 

Log message:
        More problems overview

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/masterthesis.tex.diff?tr1=1.114&tr2=1.115&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/masterthesis.tex
diff -u gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.114 
gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.115
--- gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.114      Wed Mar 
 5 06:31:31 2003
+++ gzz/Documentation/misc/hemppah-progradu/masterthesis.tex    Wed Mar  5 
06:57:58 2003
@@ -1772,7 +1772,7 @@
 from fragments of data. 
 
 In the xanalogical storage model, each fragment of data is identified by a 
globally 
-unique identifier. In Fenfire, data fragments are scroll blocks of Storm 
storage module.
+unique identifier. In Fenfire, data fragments are scroll blocks, generated by 
Storm storage module.
 As we discussed already in chapter 4, Fenfire's Storm design 
 uses SHA-1 \footnote{SHA-1 is considered a collision free hash function. 
Therefore, it is 
 very unlikely that two different Storm scroll blocks would have same 
identifier.} 
@@ -1781,7 +1781,7 @@
 throughout the Peer-to-Peer overlay. Our task is to locate and fetch 
 (i.e. obtain) \emph{all} Storm scroll blocks, associated to a specific 
''virtual 
 file'', from Peer-to-Peer overlay as efficiently as possible. In addition to 
-\emph{direct} scroll block obtaining using globally unique identifier of Storm 
block, 
+\emph{direct} scroll block obtaining using globally unique identifier of Storm 
scroll block, 
 we also must support \emph{indirect} obtaining of Storm scroll block using 
pointer blocks.
 
 Some research regarding to these problem has been made by Lukka et al. 
@@ -1789,20 +1789,21 @@
 xanalogical model in Peer-to-Peer enviroment with globally unique identifiers. 
Lukka et al.
 use Freenet \cite{clarke00freenet} as a example Peer-to-Peer system supporting 
 globally unique identifiers. This thesis presented here extends their work by 
-evaluating different Peer-to-Peer approaches more extensively to Fenfire's 
needs. 
-Additionally, related to non-xanalogical hypermedia systems, Thompson and de 
Roure 
-\cite{thompson01hypermedia} have studied locating documents and links in 
Peer-to-Peer
-environment. Bouving \cite{bouvin02openhypermedia} has done initial work 
regarding  
+evaluating different Peer-to-Peer approaches more extensively to Fenfire's 
needs.
  
-
-In the following sections, we don't respond to security issues. We assume 
-that either system has a reliable techique for identifying invidual entities, 
or
-there are no hostile entities in the system.
-
-
-
-\cite{wiil02p2phypertext}
-
+Additionally, related to non-xanalogical hypermedia systems, Bouving 
+\cite{bouvin02openhypermedia} has done initial work regarding  ways in which 
+Peer-to-Peer can used in non-xanalogical hypermedia systems. Thompson and de 
Roure 
+\cite{thompson01hypermedia} have studied locating documents and links in 
Peer-to-Peer
+environment. At the Hypertext '02 panel, moderated by Wiil 
\cite{wiil02p2phypertext},
+participants responded whether Peer-to-Peer systems are suitable for hypermedia
+publishing or not. 
+
+In the following sections we assume that we know the structure of ''virtual 
file'' before hand, 
+i.e. when assmbling a ''virtual file'', we know all Storm scroll/pointer 
blocks, which are required
+when building the ''virtual file''. Also, we don't respond to security issues 
related to Peer-to-Peer
+systems. We assume that Fenfire has a reliable techique for identifying 
invidual entities, or
+there are no hostile entities among participating peers.
 
 
 \section{Objectives}




reply via email to

[Prev in Thread] Current Thread [Next in Thread]