Question

In: Computer Science

The host computers used in peer-to-peer systems are often simply desktop computers in users’offices or homes....

The host computers used in peer-to-peer systems are often simply desktop computers in users’offices or homes. What are the implications of this for the availability and security of any shared data objects that they hold and to what extent can weaknesses be overcome?

Solutions

Expert Solution

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

Problems:

  • people often turn their desktop computers off when not using them. Even if on most of the time, they will be off when user is away for an extended time or the computer is being moved.
  • the owners of participating computers are unlikely to be known to other participants, so their trustworthiness is unknown. With current hardware and operating systems the owner of a computer has total control over the data on it and may change it or delete it at will.
  • network connections to the peer computers are exposed to attack (including denial of service).

The importance of these problems depends on the application. For the music downloading that was the original driving force for peer-to-peer it isn’t very important. Users can wait until the relevant host is running to access a particular piece of music. There is little motivation for users to tamper with the music. But for more conventional applications such as file storage availability and integrity are all-important.

Solutions:

Replication:

  • if data replicas are sufficiently widespread and numerous, the probability that all are unavailable simultaneously can be reduced the a negligible level.
  • one method for ensuring the integrity of data objects stored at multiple hosts (against tampering or accidental error) is to perform an algorithm to establish a consensus about the value of the data (e.g. by exchanging hashes of the object’s value and comparing them). This is discussed in Chapter 15. But there is a simpler solution for objects whose value doesn’t change (e.g. media files such as music, photographs, radio broadcasts or films).

Secure hash identifiers:

  • The object’s identifier is derived from its hash code. The identifier is used to address the object. When the object is received by a client, the hash code can be checked for correspondence with the identifier. The hash algorithms used must obey the properties required of a secure hash algorithm

Kindly revert for any queries

Thanks.


Related Solutions

Complete a comprehensive report justifying the process you used to establish Upgrading employee desktop computers and...
Complete a comprehensive report justifying the process you used to establish Upgrading employee desktop computers and software for three regional offices recommended schedule baseline and recommended processes for change management and schedule control throughout the project life cycle
Jivraj and Juma are accountants at Desktop Computers. Desktop Computers has not adopted the revaluation model for accounting for its property, plant, and equipment.
P11.8B: Jivraj and Juma are accountants at Desktop Computers. Desktop Computers has not adopted the revaluation model for accounting for its property, plant, and equipment. The accountants disagree over the following transactions that occurred during the fiscal year ended December 31, 2021: Identify elements, assumptions, constraints, and recognition and measurement criteria. Desktop purchased equipment for $60,000 at a going-out-of-business sale. The equipment was worth $75,000. Jivraj believes that the following entry should be made: Equipment 75,000     Cash   60,000   Gain on...
[5 marks] An organization has 2 server computers and a number of desktop computers and a...
[5 marks] An organization has 2 server computers and a number of desktop computers and a few printers. All of them are connected together via an internal network, and the network is connected to the Internet via the border router of the organization. From the outside of the organization, on the Internet, only these 2 server computers are visible. One of them is the email server (IP address: e1.e2.e3.e4), and the other one is the web server (IP address: w1.w2.w3.w4)....
Diet is a term that simply means “what you eat.” This term is often used in...
Diet is a term that simply means “what you eat.” This term is often used in conjunction with losing weight. In this assignment, you will compare (explain how they are the same) and contrast (tell how they are different) the three diet plans identified below. Latin American Diet Plan Mediterranean Plate Mediterranean Diet Plan USDA My Plate So, start out by: Describe each of the 3 diet plans or pyramids. Address each plan individually and explain the key components of...
Tablet computers are rapidly becoming more mainstream and replacing traditional desktop and laptop computers with the...
Tablet computers are rapidly becoming more mainstream and replacing traditional desktop and laptop computers with the first IPAD becoming available in 2010 and an assortment of Linux and Windows-based tablets following. How do you believe that tablet computers have changed or contributed to the ways Forensic Scientists have to think or function on a daily basis? Do you believe that tablet computers have made a Forensic Scientist's job easier or harder? Can you think of any other technologies that have...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The production process is automated, and the company has found activity-based costing useful in assigning overhead costs to its products. The company has identified five major activities involved in producing the keyboards. Activity Allocation Base Allocation Rate Materials receiving & handling Cost of material 2 % of material cost Production setup Number of setups $ 108.00 per setup Assembly Number of parts $ 6.00 per...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The...
Rundle Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The production process is automated, and the company has found activity-based costing useful in assigning overhead costs to its products. The company has identified five major activities involved in producing the keyboards. Activity Allocation Base Allocation Rate Materials receiving & handling Cost of material 2 % of material cost Production setup Number of setups $ 108.00 per setup Assembly Number of parts $ 6.00 per...
Franklin Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The...
Franklin Manufacturing produces two keyboards, one for laptop computers and the other for desktop computers. The production process is automated, and the company has found activity-based costing useful in assigning overhead costs to its products. The company has identified five major activities involved in producing the keyboards. Activity Allocation Base Allocation Rate Materials receiving & handling Cost of material 1 % of material cost Production setup Number of setups $ 113.00 per setup Assembly Number of parts $ 5.00 per...
9. A _____ is simply an extension of a foreign corporation into the host country. A.branch...
9. A _____ is simply an extension of a foreign corporation into the host country. A.branch office B.foreign partnership C.joint venture D.franchise 10. Which of the following is true of Islamic countries? A.Their cultures are more homogeneous than that of Western countries. B.A clear separation of religion and state exists in these countries. C.Religion is the basis for many legal, as well as ethical, standards in these countries. D.Trade and commerce with Western countries is usually prohibited in these countries....
Surveys are often used to evaluate systems within health care entities. Such objective data is often...
Surveys are often used to evaluate systems within health care entities. Such objective data is often used by leadership within an organization to evaluate the effectiveness of organizational systems and processes. Suppose there was a recent decline in patient satisfaction, employee satisfaction, and culture of safety surveys. As an innovative healthcare leader, how would you approach addressing this recent data?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT