Encyclopedia > Parasitic computing

  Article Content

Parasitic computing

Parasitic computing occurs as follows: when we send a request to a web server for a web page, the communication programs in our machine split it into information packets[?] before sending it across the Internet. When these packets reach the target machine, they go through certain communication layers before reaching the target program--here, the web server that serves the requested page. One such layer is the TCP (transmission control protocol) that assembles the packets in proper order and makes sure that all the packets are in proper shape before handing them over to the web server. During this stage the TCP component makes some computation to ascertain the validity of the received information packets. As reported in the magazine Nature, this aspect of the TCP, called a checksum, is exploited to deploy the computing power of various servers (without any permission) by a few scientists to make some computations and thereby convert the Internet into a giant distributed computer in which the servers perform computation on behalf of a remote node.

External links:



All Wikipedia text is available under the terms of the GNU Free Documentation License

 
  Search Encyclopedia

Search over one million articles, find something about almost anything!
 
 
  
  Featured Article
Grand Prix

... 2003-03-17 with ...

 
 
 
This page was created in 25.2 ms