scholarly journals Mars to Earth Data Downloading: A Directory Synchronization Approach

2019 ◽  
Vol 11 (8) ◽  
pp. 173
Author(s):  
Marco Bertolazzi ◽  
Carlo Caini

This paper aims to present a possible alternative to direct file transfer in “challenged networks”, by using DTNbox, a recent application for peer-to-peer directory synchronization between DTN nodes. This application uses the Bundle Protocol (BP) to tackle long delays and link intermittency typical of challenged networks. The directory synchronization approach proposed in the paper consists of delegating the transmission of bulk data files to DTNbox, instead of modifying source applications to interface with the API of a specific BP implementation, or making use of custom scripts for file transfers. The validity of the proposed approach is investigated in the paper by considering a Mars to Earth interplanetary environment. Experiments are carried out by means of Virtual Machines running ION, the NASA-JPL implementation of DTN protocols. The results show that the directory synchronization approach is a valid alternative to direct transfer in interplanetary scenarios such as that considered in the paper.

2012 ◽  
Vol 3 (1) ◽  
pp. 111-112
Author(s):  
Bob Litan

Almost by definition, all disruptive technologies or innovations threaten vested interests. If markets and the legal environment are sufficiently flexible – and in the United States, for the most they are – innovations that buyers want diffuse throughout the economy despite the opposition.There are cases, however, where the existing order uses the legal system to fight back, to forestall or delay change. Napster is a case in point: it threatened the established recording industry, which eventually persuaded the courts to shut down that particular form of peer-to-peer file transfer. But even in this case, “the law” has failed to stop innovation. Other peer-to-peer networks have found ways to legally permit free Internet-based file transfers, while some companies – notably Apple – have developed business models around paid file transfer


Author(s):  
H. O. Colijn

Many labs today wish to transfer data between their EDS systems and their existing PCs and minicomputers. Our lab has implemented SpectraPlot, a low- cost PC-based system to allow offline examination and plotting of spectra. We adopted this system in order to make more efficient use of our microscopes and EDS consoles, to provide hardcopy output for an older EDS system, and to allow students to access their data after leaving the university.As shown in Fig. 1, we have three EDS systems (one of which is located in another building) which can store data on 8 inch RT-11 floppy disks. We transfer data from these systems to a DEC MINC computer using “SneakerNet”, which consists of putting on a pair of sneakers and running down the hall. We then use the Hermit file transfer program to download the data files with error checking from the MINC to the PC.


2013 ◽  
Vol 5 (1) ◽  
pp. 70-81 ◽  
Author(s):  
Mohammed K. Madi ◽  
Yuhanis Yusof ◽  
Suhaidi Hassan

Data Grid is an infrastructure that manages huge amount of data files, and provides intensive computational resources across geographically distributed collaboration. To increase resource availability and to ease resource sharing in such environment, there is a need for replication services. Data replication is one of the methods used to improve the performance of data access in distributed systems by replicating multiple copies of data files in the distributed sites. Replica placement mechanism is the process of identifying where to place copies of replicated data files in a Grid system. Existing work identifies the suitable sites based on number of requests and read cost of the required file. Such approaches consume large bandwidth and increases the computational time. The authors propose a replica placement strategy (RPS) that finds the best locations to store replicas based on four criteria, namely, 1) Read Cost, 2) File Transfer Time, 3) Sites’ Workload, and 4) Replication Sites. OptorSim is used to evaluate the performance of this replica placement strategy. The simulation results show that RPS requires less execution time and consumes less network usage compared to existing approaches of Simple Optimizer and LFU (Least Frequently Used).


2014 ◽  
Vol 905 ◽  
pp. 627-630
Author(s):  
Jing Ying Zhao ◽  
Hai Guo

Compared with traditional client/server modes, peer-to-peer (P2P) mode has obvious advantages in eliminating the performance bottleneck of server and enhancing the utilization rate of network resources. Based on P2P technology, local area network (LAN) communication software was well designed in this paper. By using the support function of Java for multithreading technology and socket technology, P2P mode was adopted to realize various communication functions, such as LAN text message transmission, file transfer and voice transmission. Though processing multicast messages, the software can detect the login and logout status of LAN users. Proved by testing, this software can operate stably in a system environment installed with Java Virtual Machine (JVM).


1993 ◽  
Vol 04 (02) ◽  
pp. 101-115 ◽  
Author(s):  
SHIN-ICHI NAKANO ◽  
TAKAO NISHIZEKI

The file transfer scheduling problem was introduced and studied by Coffman, Garey, Johnson and LaPaugh. The problem is to schedule transfers of a large collection of files between various nodes of a network under port constraint so as to minimize the overall finishing time. This paper extends their model to include communication channel constraint in addition to port constraint. We formulate the problem with both port and channel constraints as a new type of edge-coloring of multigraphs, called an fg-edge-coloring, and give an efficient approximation algorithm with absolute worst-case ratio 3/2.


2021 ◽  
Author(s):  
Ajay Arunachalam ◽  
vinayakumar R

Peer-to-Peer (P2P) Networking have a lot of practical applicability’s over the years. File storage and resource sharing are few key areas among the others where such peered network architecture is widely successful. The common building block for P2P networking is to store or locate an identifiable resource, for which there are basically 3 approaches namely (1) local storage/broadcast search (2) global storage/local search (3) distributed storage/distributed search. With the development of mobile hardware and wireless technology, it further became feasible to use mobile devices in these P2P networks. This computing architecture is widely used in Mobile Ad-hoc Network (MANET) for building content sharing applications. Search algorithm and file transfer schemes are the basic components of such content sharing systems. In this article, we provide a brief overview of the resource discovery approaches for peer-to-peer file sharing applications over MANET. We analyze and classify the search techniques into 4 broad schemes, mainly the flooding-based schemes, Distributed Hash Table (DHT) based schemes, advertisement-based schemes, and social network-based schemes. The pros and cons of each technique is summarized. Further, a one-to-one comparison is done across the classes for quick interpretation. We also outline the various issues, and complications that should be taken into consideration while designing any resource discovery algorithm. Further, we briefly discuss the security threats, and present state-of-the-art countermeasures for it. Also, we highlight some important guidelines that need to be focused while designing efficient file sharing applications and services in Mobile Edge Computing (MEC) enabled networks. Comprehensive and in-depth assessments of the related approaches are presented providing clear insights for the future research directions.


Author(s):  
Ricci S.C. Ieong ◽  
Pierre K.Y. Lai ◽  
K. P. Chow ◽  
Michael Y.K. Kwan ◽  
Frank Y.W. Law

The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in an unbridled manner over the Foxy network (a popular P2P network in Chinese regions). These incidents have urged the authors to develop an investigation model for tracing suspicious P2P activities. Unfortunately, hindered by the distributed design and anonymous nature of these networks, P2P investigation can be practically difficult and complicated. In this chapter, the authors briefly review the characteristics of current P2P networks. By observing the behaviors of these networks, they propose some heuristic rules for identifying the first uploader of a shared file. Also, the rules have been demonstrated to be applicable to some simulated cases. The authors believe their findings provide a foundation for future development in P2P file-sharing networks investigation.


2002 ◽  
Vol 01 (03) ◽  
pp. 441-455 ◽  
Author(s):  
JUNQI YAN ◽  
JUNYING SHEN ◽  
WEIMING SHEN

The tele-collaborative product development (TeleCo-PD) is an important technology for modern enterprises to win in the 21st century global market. It concerns how to utilize distributed product development resources to design and manufacture a new product. This paper presents a series of tools developed to construct a TeleCo-PD platform, which provides small and middle size enterprises with the ability to collaborate with each other. The proposed platform is based on an Integrated Service Digital Network (ISDN), with a Client/Server based process management system for defining and assigning tasks, a whiteboard for sharing engineering drawings, and a File Transfer Protocol server for transferring product data files. The platform has been deployed in a virtual enterprise in developing a new digital camera.


Sign in / Sign up

Export Citation Format

Share Document