3. Introduction
Key point → Computer communication perspective
⇒ Reliable communication on the Internet is guaranteed by a standard
set of protocols, used by all computers.
Example → Computer communication
When a user selects a URL (uniform resource locator), requesting a
web page, the browser opens a transmission control protocol (TCP)
connection to a web server.
Issues a hyper-text transmission protocol (HTTP) request over the
TCP connection.
The TCP message is carried via the Internet protocol (IP)
It might break the message into several packages.
It navigate independently through numerous routers between source
and destination.
When an HTTP request reaches its target web server, a response is
returned via the same TCP connection to the user’s browser.
Dr. Varun Kumar (IIIT Surat) Lecture-29 3 / 8
4. Continued–
The original message is reconstructed through a series of consecutive
steps, involving IP and TCP.
It is finally interpreted at the HTTP level, eliciting the appropriate
response.
A simple request for a web page involves a significant amount of
computation in the network and at the computers at the end points.
The success of the Internet rests on the cooperation of and trust
between all involved parties.
Dr. Varun Kumar (IIIT Surat) Lecture-29 4 / 8
5. Graphical representation: source– www.nature.com
a A single parasite node coordinates the computations occurring remotely in
the Internet protocols. It sends specially constructed messages to some
number of targeted nodes, which are web servers consisting of an arithmetic
and logic unit (ALU) and a network interface (NIF).
b Levels of communication between the parasitic node and the target in our
proof-of-principle implementation. The packet carrying the problem to be
solved is inserted into the network at the IP level, bypassing the parasitic
node’s TCP
Dr. Varun Kumar (IIIT Surat) Lecture-29 5 / 8
6. Parasitic computing
Parasitic computing is a programming technique where a program in
normal authorized interactions with another program manages to get the
other program to perform computations of a complex nature.
⇒ First reported in journal ”Nature” in 2001 by Barabasi, Freech, Feong
and Brockman.
⇒ A form of distributed computer architecture.
⇒ Used for solving complex computational problem.
⇒ Target could never know
⇒ Exploit standard set of communication protocol in internet.
⇒ Potential standard protocols are TCP, HTTP.
Dr. Varun Kumar (IIIT Surat) Lecture-29 6 / 8
7. Issues and open ethical problem
⇒ Examine alternative Idealistic and Pragmatic ethical viewpoints on
parasitic form of distributed computing
⇒ Information Ethics are basically digital versions of older ethical
dilemmas
Identity theft
Copyright
Infringement
Invasion of privacy
Possible question
♦ To what extent does the owner of a web server consent, explicitly or
implicitly, to IP interrogation when that host is connected to the
Internet?
♦ What constitutes abusive activation of IP protocol decoders, or any
other physical sensors (e.g., motion sensors, electric eyes, etc.)located
in the public domain?
Dr. Varun Kumar (IIIT Surat) Lecture-29 7 / 8
8. Continued–
♦ Is parasitic computing really a form of trespassing or is it more like
using a bathroom in a MacDonalds without making any purchase?
♦ How is one to judge the ethics of parasitic computing from a
philosophic perspective?
Conclusion:
The ethics of parasitic computing would seem, then, to depend upon
the philosophic viewpoint from which one approaches the experiment.
If one is an Idealist, the experiment would involve ethical problems.
But if one is a Pragmatist, no ethical fault is involved.
Dr. Varun Kumar (IIIT Surat) Lecture-29 8 / 8