-Caveat Lector-

Doing science by stealth

Soon your computer could be doing science without your permission
By BBC News Online technology correspondent Mark Ward

http://news.bbc.co.uk/hi/english/sci/tech/newsid_1515000/1515559.stm

Scientists have found a way to coerce computers into doing science without
the consent of their owners.

By exploiting basic functions of web servers a group of US scientists have
been able to make the machines carry out a small part of a much larger
computation.

The researchers believe that the technique could be used to turn the web
into a powerful distributed computer.

But they said their technique for covert computation is cumbersome, and
needs to be refined before it is more widely used.

Parasites abound

Before now enrolling your computer in a distributed computing project to
search for extraterrestrial life involved downloading special software that
can run while the computer is otherwise idle.

But all this could change as US scientists subvert an error-checking
procedure used by all web servers into a means for carrying out
computations.

When any information is sent across the internet it is split up into small
chunks or packets that travel, often independently of each other, to their
common destination.

Each packet is stamped with information about its source and destination,
as well as a value that reveals how many bits it contains.

When a web server receives a packet of data it performs a quick calculation
to see if the number of bits received is the same as the number sent.

If this number or "checksum" is different to the one stamped on the packet,
this reveals that the packet has been corrupted during transit. Corrupted
packets are discarded.

One of the internet's basic standards, called the Transmission Control
Protocol (TCP), governs this error checking process.

Scientists from the physics and computer science departments at the
University of Notre Dame in Indiana are using this error checking procedure
to carry out "parasitic computing".

In the journal Nature, physicist Albert-Laszlo Barabasi and colleagues show
how to subvert error checking to carry out more complex calculations, and
force a web server to inadvertently take part in a distributed science
project.

Short salesmen

The scientists tested their ideas by using web servers to find the correct
solution to an example of a mathematical conundrum known as the "travelling
salesmen problem". This involves working out the shortest route that a
fictional salesman would have to take to visit all possible locations on a
hypothetical map.

The more locations on the hypothetical map means more potential routes, and
the longer it would take any single computer to crank through all possible
combinations.

But by sharing the job of working out which route is shortest, the total
time it takes to solve any particular travelling salesman problem can be
vastly reduced.

Professor Barabasi and his colleagues used one computer to generate
possible solutions to a travelling salesman problem, and then used
parasitic computing to make lots of web servers perform the calculations on
each candidate solution.

Because of the way TCP works, only solutions to their travelling salesman
problem were returned to the researchers. All others, because they produced
invalid checksums, were discarded.

The scientists said their technique needed refinement because it takes far
longer for a web server to carry out a calculation on their behalf than it
does to check that packets of data were intact.

Widespread use of it could slow down the rate at which a web server
receives data. "Parasitic computing represents an ethically challenging
alternative for cluster computing, as it uses resources without the consent
of the computer's owner," wrote the researchers in their paper.


But they said it has potential to harness far more computers than take part
voluntarily in projects such as Seti@home.


[Forwarded For Information Purposes Only - Not
Necessarily Endorsed By The Sender - A.K. Pritchard]

------------------------------

A.K. Pritchard
http://members.ll.net/chiliast/

To subscribe to  "The Republican"  email list - just ask!
[EMAIL PROTECTED]


Three groups spend other people's money:
children, thieves, politicians.  All three need
supervision.

-Dick Armey (R-Texas)
The Freedom Revolution (Regency)

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to