gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...
Date: Wed, 26 Feb 2003 07:51:07 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/02/26 07:51:03

Modified files:
        Documentation/misc/hemppah-progradu: masterthesis.tex 
                                             progradu.bib 

Log message:
        Intro enchs

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/masterthesis.tex.diff?tr1=1.82&tr2=1.83&r1=text&r2=text
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/progradu.bib.diff?tr1=1.85&tr2=1.86&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/masterthesis.tex
diff -u gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.82 
gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.83
--- gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.82       Wed Feb 
26 07:38:17 2003
+++ gzz/Documentation/misc/hemppah-progradu/masterthesis.tex    Wed Feb 26 
07:51:01 2003
@@ -19,7 +19,7 @@
 %***********************
 \title{Fenfire in Peer-to-Peer Enviroment}
 
-\translatedtitle{Fenfire in Peer-to-Peer Enviroment}
+\translatedtitle{Fenfire vertaisverkko ympäristössä}
 
 \author{Hermanni Hyytiälä}
 
@@ -27,9 +27,9 @@
 
 \tyyppi{Master's Thesis}
 
-\keywords{Peer-to-Peer, P2P, Hypermedia, Distributed systems}
+\keywords{Peer-to-Peer, P2P, security, Distributed systems}
 
-\avainsanat{Vertaisverkot, Hypermedia, hajautetut järjestelmät}
+\avainsanat{Vertaisverkot, P2P, tietoturva, hajautetut järjestelmät}
 
 \contactinformation{\\
 Hermanni Hyytiälä\\
@@ -39,7 +39,7 @@
 
 
 \abstract{
-In this thesis we review existing Peer-to-Peer approaches, protocols and their
+In this thesis, we review existing Peer-to-Peer approaches, protocols and their
 key properties. We summarize open problems in Peer-to-Peer networks and divide
 problems into three sub-categories. We observe that there are many
 problems, which have not solutions at all, or problems have proposed
@@ -60,9 +60,9 @@
 
 Tämän jälkeen annamme yleiskuvan Fenfire-järjestelmästämme ja kuvaamme 
 vertaisverkkotoiminnallisuuden kannalta Fenfiren tärkeimmät ohjelmamoduulit.
-Arvioimme olemassaolevia vertaisverkkoarkkitehtuureja- löyhästi ja tiukasti
+Ar-vioimme olemassaolevia vertaisverkkoarkkitehtuureja- löyhästi ja tiukasti
 rakennettuja päällysverkkoja- Fenfiren vaatimusten valossa. Lopuksi ehdotamme
-yksinkertaisia algoritmeja, joiden avulla voidaan tehokkaasti löytää
+yksin-kertaisia algoritmeja, joiden avulla voidaan tehokkaasti löytää
 vertaisverkosta tietoa Fenfire:n liittyen.
 }
 
@@ -87,14 +87,13 @@
 provides new, direct way to achieve interoperability between network 
participants. 
 Finally, the distributed and ad-hoc nature of Peer-to-Peer improves scalability
 and reliability againts certain kinds of faults (e.g., single point of 
failure).
+
 There are many definitions of Peer-to-Peer networks. The Intel Peer-to-Peer 
 Working Group defines is as ''the sharing of computer resources and defines
 and services by direct exchange between systems''. Dave Winer 
\cite{winer00whatisp2p} lists several
 properties of Peer-to-Peer network, while most notably the statement 
 ''The user's machine is a client and a server'' describes best Peer-to-Peer
-networks. 
-
-To summarize, Peer-to-Peer systems can be characterized as distributed 
+networks. To summarize, Peer-to-Peer systems can be characterized as 
distributed 
 systems in which all communication is symmetric and all participants have 
identical 
 capabilities and responsabilities. Each \emph{peer} may contribute data or 
 computing resources (e.g., unused storage) to the overall system and the 
welfare 
@@ -113,7 +112,7 @@
 problems in easy-to-understand tables. 
 
 Next, we give an overview of our Fenfire system, which implements xanalogical 
storage model. We
-also describe briefly Storm design and urn-5 concept, which are essential to 
Fenfire's
+also describe briefly Storm software module, which is essential part of 
Fenfire's
 Peer-to-Peer functionality. We evaluate existing Peer-to-Peer approaches and
 choose the best alternative to our needs. We discover that Storm, xanalogical 
model and
 tightly structured Peer-to-Peer approach all have similar method to deal with 
data,
Index: gzz/Documentation/misc/hemppah-progradu/progradu.bib
diff -u gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.85 
gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.86
--- gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.85   Wed Feb 26 
07:27:35 2003
+++ gzz/Documentation/misc/hemppah-progradu/progradu.bib        Wed Feb 26 
07:51:01 2003
@@ -883,7 +883,7 @@
        author = "Dejan S. Milojicic and Vana Kalogeraki and Rajan Lukose and 
Kiran Nagaraja1
                and Jim Pruyne and Bruno Richard and Sami Rollins and Zhichen 
Xu",
        title = "Peer-to-Peer Computing",
-       institution = "Hewlett-Packard",winer
+       institution = "Hewlett-Packard",
        number = "HPL-2002-57", 
        year = 2002,
        url = "http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf";




reply via email to

[Prev in Thread] Current Thread [Next in Thread]