ABSTRACT
Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.
The example given can also be two computers communicating over the Internet, under disguise of a standard communications session. The first computer is attempting to solve a large and extremely difficult 3-SAT problem; it has decomposed the original 3-SAT problem in a considerable number of smaller problems. Each of these smaller problems is then encoded as a relation between a checksum and a packet such that whether the checksum is accurate or not is also the answer to that smaller problem. The packet/checksum is then sent to another computer. This computer will, as part of receiving the packet and deciding whether it is valid and well-formed, create a checksum of the packet and see whether it is identical to the provided checksum. If the checksum is invalid, it will then request a new packet from the original computer. The original computer now knows the answer to that smaller problem based on the second computer's response, and can transmit a fresh packet embodying a different sub-problem. Eventually, all the sub-problems will be answered and the final answer easily calculated.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION PAGE
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 IMPORTANCE OF THE STUDY
1.4 DEFINITION OF TERMS
1.5 ASSUMPTION OF THE STUDY
CHAPTER TWO
2.0LITERATURE REVIEW
INTERNET'S INFINITE POSSIBILITIES
CHAPTER THREE
3.0COMMUNICATION MEDIA
CHAPTER FOUR
4.0COMMUNICATIONS PROTOCOL
4.1ETHERNET
4.2INTERNET PROTOCOL SUITE
4.3SONET/SDH
4.4ASYNCHRONOUS TRANSFER MODE
CHAPTER FIVE
5.0CONCLUSION
5.1 LIMITATION OF THE STUDY
5.2 SUGGESTION FOR FURTHER RESEARCH
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Parasitic Computing.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/265/parasitic-computing
"Parasitic Computing." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/265/parasitic-computing>.
"Parasitic Computing.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/265/parasitic-computing>.
"Parasitic Computing.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/265/parasitic-computing.
- Related Works
- Design And Implementation Of A Computerized Hotel Billing System
- Design And Implementation Computerized Employee Clocking System (a Case Study Of Marlun Construction Company Enugu)
- Error Detection And Correction In Data Communications Using Parity Bit And Cyclic Redundancy Check
- The Design And Implementation Of A Software For Automobile Insurance Scheme In Nigeria. A Case Study Of Motor Insurance Departmetn Of Universal Insurance Company Ltd Enugu.
- Design And Implementation Of A Computerised Quality Control System In Stock Product (a Case Study Of Anammco Nig. Ltd Emene Enugu)
- Design And Implementation Of Online Drug Control Information System (nafdac Enugu State)
- Design And Implementation Of A Database Management Software For A Confectionery Business
- Design And Implementation Of A Computerized Data Security System A Case Study Of Leecon Finance And Investment Ltd
- Design And Implementation Of A Computer Based Human Resources Management Information System (a Case Study Of Nitel Plc Enugu)
- Design And Implementation Of A Computer Based Bill Of Material Processing System