parasitic computing

27
Shashwat Shriparv [email protected] InfinitySoft

Upload: elu

Post on 23-Feb-2016

130 views

Category:

Documents


0 download

DESCRIPTION

PARASITIC COMPUTING. Shashwat Shriparv [email protected] InfinitySoft. OUTLINE. Introduction Internet Communication Proof Of Concept 2-SAT Problem Implementation Using TCP Issues ▪ Problems For Parasites ▪ Problems For Servers How It Differs From Others Future Summary. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: PARASITIC COMPUTING

Shashwat [email protected]

Page 2: PARASITIC COMPUTING

OUTLINE• Introduction• Internet Communication• Proof Of Concept • 2-SAT Problem• Implementation Using TCP• Issues ▪ Problems For Parasites ▪ Problems For Servers• How It Differs From Others• Future• Summary

Page 3: PARASITIC COMPUTING

Introduction• First Reported in journal ‘Nature’ in 2001 by

Barabasi, Freech, Feong and Brockman• A form of distributed computing• Used for solving complex computational

problems• Exploits standard set of communication

protocols on internet.• Potential candidate protocols include

TCP,HTTP, or encryption/decryption with secure socket layer

Page 4: PARASITIC COMPUTING

Internet CommunicationWhen a user selects a URL

Actions at center ▪Open a TCP connection to web server ▪ Issues a HTTP request over TCP

connection ▪ TCP message is carried via IP

Page 5: PARASITIC COMPUTING

Establishing a TCP connection.

Page 6: PARASITIC COMPUTING

Internet Communication• Actions at receiver ▪Receive message through IP ▪Validate checksum at TCP ◦Validated pushed to HTTP ◦Not validated discard the packet

Page 7: PARASITIC COMPUTING

Internet Communication

Page 8: PARASITIC COMPUTING

Proof Of Concept

• Solved the SAT problem• Usually solved by testing several

candidate solutions• Each candidate solution can be

examined in parallel

Page 9: PARASITIC COMPUTING

Implementation

• Computations takes place at many layers in internet

• Several internet protocols could be exploited to perform parasitic computation

• Implementation made using TCP or higher levels

Page 10: PARASITIC COMPUTING

Implementation Using TCP• TCP checksums Provide enough logic to compute any

boolean function

• HTTP service Protocol always send a response to any

message received

Page 11: PARASITIC COMPUTING

TCP Checksum• Sender breaks message into 16 bit words• These words are added together• The result is inverted and send with

message• Receiver breaks message into 16 bit

words• All words are added together• If the result is all ones, the message is

valid• Otherwise, the message is dropped

Page 12: PARASITIC COMPUTING
Page 13: PARASITIC COMPUTING

TCP/IP segment used for parasitic computing

Page 14: PARASITIC COMPUTING

2-SAT Problem

Page 15: PARASITIC COMPUTING

Solving 2-SAT Problem

• Send a specially created TCP packet containing a possible solution

• If the possible solution is correct, the HTTP server returns an error message

• If the solution is wrong, then packet is dropped at TCP layer

Page 16: PARASITIC COMPUTING

Creating Parasitic Messages

• Variables values of a possible solution are distributed so they will align when split in 16 bit words

• TCP checksum sent is a representation of the expected answer

• “Parasitic” checksum and the variable string are sent to remote machine for verification

Page 17: PARASITIC COMPUTING
Page 18: PARASITIC COMPUTING

AlgorithmS = create TCP segmentS.checksum = checksumforeach x S.data = pad with zeroes (x ) send S receive answer if answer = true write x is a solution

Page 19: PARASITIC COMPUTING

Prototype Of Parasitic Computing

Page 20: PARASITIC COMPUTING

3-SAT Problem• NP complete • Can be solved similar to 2-SAT because

the maximum sum of three variables is 1+1+1=11,which can be represented by two bits without overflow

• The algorithm does not change, only the way to create packet is changed

Page 21: PARASITIC COMPUTING

Problems For Parasites

• Several computational cycles are taken to process the possible solutions

• Possibility of false negatives• Possibility of false positives

Page 22: PARASITIC COMPUTING

Problems For Servers• Delays due to processing the parasitic

messages could cause a denial of service• Almost impossible to prevent someone

from running a parasitic job on your server

▪ Removing or changing the exploited functions would cause the server to be unable to communicate on the internet

Page 23: PARASITIC COMPUTING

How It Differs From Others• Cluster computing ▪ In cluster computing, many

computers pool in their resources willingly

▪ Parasitic computing does not require the willingness of any target machine

• It is not cracking

Page 24: PARASITIC COMPUTING

Future• Computation-to-communication ratio

must increase• Exploiting HTTP or encryption/decryption

could execute in an efficient manner.• Enabling all computers to swap

information and services they are needed could lead to unparalleled emergent behavior, drastically altering the current use of the Internet.

Page 25: PARASITIC COMPUTING

Summary• parasitic computing moves computation

onto what is logically the communication infrastructure of the Internet, blurring the distinction between computing and communication.

Page 26: PARASITIC COMPUTING

References• Barabasi et.al., Parasitic Computing,

NATURE 412, 30 Aug 2001.• Barabasi et.al. Supplement material for

Parasitic Computing : http://www.nd.edu/~parasite/

• www.hindu.com/thehindu/2001/09/13/stories/08130001.htm

Page 27: PARASITIC COMPUTING

Thank You

Shashwat [email protected]