Monday, June 2, 2008
Week 13: Reflection!
Overall I believe that this course has a very well structured program. Though the practical side could become a bit more complex, I understand that the course is only an introductory course. I would recommend this course to any student moving into an arts education.
Thursday, May 29, 2008
Essay (Final Copy)!
A P2P network is a type of network in which each computer connected is equal and has the same capabilities and tasks. The term peer-to-peer refers to the concept of a network of equals and through the use of information and communication systems; two or more computers can pool resources and share with each other without needing any centralized coordination (Schoder, Fischbach, Schmitt, 2005). This contrasts to the server/client architecture as there are no server computers dedicated to serving others. P2P networks can be classified into five areas, which are communication and collaboration, distributed contribution, Internet service support, database systems and content distribution (Theotokis, Spinellis, 2004). The networks can be further classified by the degree of centralization. For example, P2P networks that are classified ‘pure’ have peers acting as equals and no central server managing the network. Many networkers argue that only networks where every peer has equal capabilities is P2P (Oram, 2001).
In the late 1960’s the Internet was originally created as a P2P network. Though the term P2P was not well established before the Internet was made available to the public, there were fixtures created that were based on the P2P concept. An example of this is Usenet. Usenet was created in 1979 and is a worldwide network of discussion groups. In some ways Usenet is considered the Grandfather of the P2P applications and software used today (Oram, 2001). Once the Internet was made available to the public, this allowed P2P networks to evolve. In 1999, Napster was created and so came the phenomenon of P2P file sharing. Napster was created as a hybrid system and though its file sharing was decentralized, the directory of those files was centralized. The network had a central server supplying the search queries and brokering user connections (Oram, 2001). Because of this, Napster was shutdown due to legal controversy. From then on, most P2P file sharing applications were created as ‘pure’ networks. In 2002 Bit Torrent was created and began another generation of P2P networks. It is clear to see from this brief timeline, that P2P networks have evolved over time and continue to become more efficient and effective.
P2P networks have easily emerged as one of the largest innovation rich areas in computer science and networking (Elsevier, 2007). This large amount of interest towards P2P networks is due to the advantages that occur through the use of the networks. The first and foremost advantage of a P2P network is that they are less expensive and easier to set up then client/server networks. The basis of P2P networks is that all clients provide the resources, which include computing power, storage and bandwidth. Therefore, as user numbers and demands on the network grow then so does its resources. The network also remains strong, healthy, flexible and adaptable by replicating data over numerous peers and in pure systems; a peer is allowed to locate data without a centralized server (Rosseholvel, 2008).
Because of these advantages, many areas within our society have begun to explore ways to adapt and use P2P networks. Academics have been creating P2P search engines to provide free and open search to academic knowledge. At the Pennsylvania State University, a P2P application has been developed called LionShare and its purpose is to share academic information between users at various academic establishments (Solyrich, 2006). In 2001, according to the Washington Post (Walker, 2001) the United States military began conducting research on P2P networks and planned to use the networks for a modern network warfare strategy against the war on terrorism. Hundreds of businesses have also invested into P2P networks, mainly in the area of file sharing networks. However, businesses have shown interest in distributing content, e-marketplace and groupware based on P2P networks. Within telecommunications, more and more emphasis is being placed on P2P networks. Many researchers are trying to apply the concept of P2P networks into cellular networks (Raivio, 2005). An example of this is the current ‘BlueTooth’ network.
However, in spite of the above advantages, P2P networks also receive large amounts of criticism and can create a number of problems. The basic problems of P2P networks are to do with the cooperation and contribution of the peers. Many peers damage a network by poisoning and polluting its contents. This occurs by providing files which contents do not fit its description and the insertion of files into the network that do not function properly. Peers known as ‘leechers’ are users that do not allow their own resources available to the network. This reduces the networks efficiency. Another huge problem for P2P networks is that they allow viruses to be spread at a rapid rate. In some countries there have even been cases of identity attacks where a user has been able to track down other users and steel their identity. Due to the rise of the P2P file-sharing phenomenon, there is an ongoing problem with copyright infringement. P2P file sharing applications allow any user to download large amounts of copyrighted video, audio and visuals. In 2002, the Recording Industry Association of America released figures that claimed Internet piracy, lead by P2P file sharing applications, was responsible for a 5% decrease in the dollar value of music worldwide in year 2001 (Ghosemmmajumder, 2002).
Though there are various problems that arise from the use of P2P networks, it is clear to see that in the end, the advantages and potential of P2P networks out-way the disadvantages. With the proper research and development, P2P networks will be able to be filtered and controlled effectively to rid the networks of any basic impurities. Companies concerned with copyright infringement need to adapt to the new age of computer science and begin to implement new ways to distribute their content. When our society begins to adapt we will then be able to see the true potential of P2P networks.
Reference List:
Books:
(1) Oram, Andrew, 2001, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, O’Reilly and Associates, Sebastopol CA.
(2) Steinmetz, Ralf & Wehlre, Klaus, 2005, Peer-to-Peer Systems and Applications, Springer Publishing, Germany.
Jounral Articles:
(1) Schoder, Detlef & Fischbach, Kai & Schmitt, Christian, 2005, ‘Core Concepts in Peer-to-Peer Networking’, Idea Group Inc.
(2) Raivio, Yrjo, 2005, ‘Mobile Peer-to-Peer in Cellular Networks’, Helsinki University of Technology.
(3) Elsevier, 2007, ‘Foundations of Peer-to-Peer Computing’, Computer Communications, Vol. 31, pp. 187-189.
(4) Theotokis, Stephanos Androutsellis & Spinellis, Diomidis, 2004, ‘A Survey of Peer-to-Peer Content Distribution Technologies’, ACM Computer Surveys, Vol. 36, No. 4, pp. 335-371.
(5) Ghosemajumder, Shuman, 2002, ‘Advanaced Peer-Based Technology Business Models‘, MIT Sloan.
Internet Sites:
(1) Solyrich, 2006, Advantages of Peer-to-Peer Networks, P2P World http://www.solyrich.com/p2p-pros-cons.asp
(2) Walker, Leslie, 2001, Uncle Sam Wants Napster!, Washington Post http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=washtech/techthursday/columns/dotcom&contentId=A59099-2001Nov7
(3) Rossenhovel, Carsten, 2008, Peer-to-Peer Filters: The Big Report, Internet Evolution http://www.internetevolution.com/document.asp?doc_id=148803&f_src=flfone
Monday, May 12, 2008
Essay Outline!
Topic: Peer-to-Peer networks; Arguments for and against.
Summary:
For my essay I have chosen the topic of Peer-to-Peer networks. I chose this topic because I am familiar with it and there is a lot of controversy on how people look at peer-to-peer networks and whether they are good or bad. Within the essay my argument will be that even though Peer-to-Peer networks create many problems, the advantages out way the disadvantages and the networks have a lot of potential in the future. When researching the topic I used the catalogue databases Griffith has access to and Google Scholar. I found Google Scholar much more effective then going through Griffith databases. Once I had some references I was able to begin to structure my essay.
Introduction-
- Introduce the topic of Peer-to-Peer networks; give a brief explanation on what they are. Outline the structure of the essay.
Body-
- History of Peer-to-Peer networks, explain how they work and how they have evolved over time. Give examples of major peer-to-peer networks.
- Outline the advantages of Peer-to-Peer networks. Describe the different areas in society that use peer-to-peer networks such as Bioinformatics, military, education, business, TV and telecommunications.
- Describe the problems of peer-to-peer networks; outline the disadvantages. This includes the spread of viruses, leeching, spamming, copyright infringement, illegal downloading and identity attacks. Use Napster as an example to describe the problem of illegal downloading and to outline legal controversy.
Conclusion-
- Conclude on the note that even though there are many problems with Peer-to-Peer networks, they are very useful and have significant potential.
Resources:
- Schoder, Detlef & Fischbach, Kai & Schmitt, Christian, 2005, Core Concepts in Peer-to-Peer Networking, Idea Group Inc, Germany.
- Khan, Javid I & Wierzbicki, Adam, 2007, Foundations of Peer to Peer Computing, Elsevier B.V, pp. 187 – 189.
- Engle, Marling & Khan, Javid I, 2006, Vulnerabilities of P2P Systems and a Critical Look at their Solutions, Internetworking and Media Communications Research Laboratories, Department of Computer Science, Kent State University.
- Theotok, S, 2004, A Survey of Peer-to-Peer Content Distribution Technologies, Athens University of Economics and Business, Athens.
- Rossenhovel, Carsten 2008, Peer to Peer Filters: Ready for the Internet Prime Time? Internet Evolution, http://www.internetevolution.com/document.asp?doc_id=148803&f_src=flfon
Monday, April 28, 2008
Week 8: Part 2!
Week 8: Part 1!
When using Microsoft word I had no problems at all until the mail merge section of the exercises. After trying to figure it out I ended up using the Word help function which showed me how to set up a mail merge source, giving step by step instructions. However apart from the mail merge feature I found the exercises very simple as I have had plenty of experience with the Word software. I believe the 2003 version of Word is very useful to use and it is why it became so widely used and popular around the world.
When using the Microsoft Excel program I did not struggle with any of the exercises as I have used Excel in those ways before. A fair amount of my previous education such as accounting has delt with the use of excel and provided me with all i needed to complete the graph and formula exercises. Though I was not too familar with creating my own toolbar and applying the macros, I had done this before and picked it up easily enough. Though Excel might seem confusing and off-putting at first, it is very useful to use and again is why it is so widely used around the world.
Monday, April 14, 2008
Week 6!
'Stargate SG1' is a science fiction tv series that has been running for over 10 years and is a lead on from the original motion picture 'Stargate'. The article located on wikipedia is very long and is somewhat more detailed then most wikipedia entires. However this is neccasary as Stargate SG1 has 10 years of history and has a complex plotline. I believe that this article does a very effective job in being accurate and providing the basic facts sorrounding a show. The references that the information was obtained from are reliable sources as they come from the producers and writers themselves and television broadcast sites. The article provides the basic concpet around the stargate, production information, cast members the basic plotline over the 10 season outlining the different arcs that occur and also provides media information and future productions. After reading this article, even if a person had not seen the show before, they would have a pretty good understanding of what the show is about. The article follows the wikipedia guidelines quite well though the only downfall could be the size of the article. However as it was discussed previously, it was neccasary of the article to be this size and the article does do a good job connecting other relevant topics as there is alot more information on the Stargate world. The article also remains unbiased towards the show throughout the article.
'Lupe Fiasco' is a grammy award winning hip hop artist who rose to fame in 2006 following his debut release 'Food and Liquor'. This article is not as detailed as the 'Stargate Sg1' article but does provide the basic background information that is needed to fill anyone who hasn't heard of Lupe up to speed. Though the one downfall of this article could be the accuracy. Lupe Fiasco has always been very underground especially in his earlier career and likes to keep it that way and therefore alot of the information written about him was not from solid sources. This article however does follow the the wikipedia guidelines such as providing an article summary and complying with the article size. It also remains unbiased and just provides the information about the artist with no expression of opinion.
Both the articles I chose were effective and very well written articles. Any one person could read both these articles and be caught up to speed on the subject topics without any difficulty.
Monday, April 7, 2008
Week 5!
It could be argued that now anyone can create a piece of art digitally, it is not art. However I believe it still should be classsified as art. Art is a product of human creativity. Therefore if a person has put in time and effort and the piece holds a significance, then it should be considered art whether it was created digitally or not. However, I do believe that by creating art on a digital platform that it does depreciate the authenticity of it. A photoshop image will never be worth that much to anyone or authentic as it can be copied with two clicks of a mouse and spread around the world.
Going back to Benjamin's ideas, it is clear to see that digital art does not have the unqiue 'aura' he outlines. The reason paintings and drawings have this 'aura' is because there is an original authentic copy that can be seen without electricity, it can be touched and it was skillfulness of the artist that created it. Digital art is skillful in its own way but real art requires the skill and cordination of human functions to create. This is why digital art does not have the 'aura' Benjamin outlines in his article.