Library Technology – Reviews, Tips, Giveaways, Freeware

What is Parasitic Computing and will it be a Blessing or a Curse for Online Community?

Posted In Products Review - By Mike on Tuesday, December 11th, 2012 With No Comments »

Parasitic computing can be considered as a potential technology that can be envisaged as a healthy addition, yet a big threat to the internet world, as it opens up newer ways for the hackers to exploit emails and systems of billions of innocent users.

What is Parasitic Computing?

Parasitic computing is a programming method wherein a program manages to get another program to do the complex computations during normal authorized interactions between the two. In simple words, it can be said that it is a security exploit due to the fact that the program which implements parasitic computing does not have any authority to make use of resources that are offered to the other program. It refers to any method, which scams remote computers into small computation devoid of their knowledge by using algorithms that exist in the communication software.

Reliable communication over the net is assured by a standard protocol set that is used by all the computers. These are the protocols that can be exploited to work with the communication infrastructure, thereby converting internet into a distributed computer wherein the servers unintentionally do the calculation instead of a remote node. In such cases, one computer compels the target machines to solve a tough computation problem just by involving them in standard communication. But, the biggest concern is that such a concept can be put into negative use for hacking and carrying out unethical acts on the Internet.

tech tips, tips, news, Parasitic Computing

Solving Problems using Parasitic Computing

Generally, solving problems using parasitic computing involves generating several candidate solutions, which are then sent to the destination node. Here, the solutions are tested for adequacy and accuracy. It is then considered to be valid if the result is true or else it is dropped out. The result from each is used to build a solution.

How does Parasitic Computing Differ from Cluster Computing?

Cluster computing needs many computers to pool in the respective resources readily, while parasitic computing does not need the interest of any target computer. The former needs special software, but the latter does not need any.

Theoretically, parasitic computing gives the opportunity to use the huge computational power of internet. Solutions for many big computational problems can be obtained by employing many web servers that are physically situated in different parts of world. Thus, it is a decently demanding substitute for cluster computing as it makes use of resources without computer owner’s consent.

Parasitic computing does not conciliate the targeted servers’ security, and access only the servers’ parts that are made available explicitly for internet communication.

In the near future, enabling all computers to exchange services and information that are required could lead to unmatched emergent behavior, modifying the present internet use drastically.

On the whole, parasitic computing is looked upon as a superior method for moving computation to what is probably the internet communication infrastructure, hazing the distinction between communication and computing.

tech tips, tips, news, Parasitic Computing

Shortcomings and Future Prospects

This technology is still too naïve and its POC is awfully inefficient since the amount of computation required for just transferring the data packets in the place, is more than the computations leeched from the supplementary platform. Moreover, in case of any network problems, or checksum errors, the data packets may have to be retransmitted, so applying this technology on the industrial level may turn out to be a very tough task.

Therefore, whether the concept of parasitic computing will be applied at a larger scale or not, will purely depend upon the extent to which, its efficiency could be improved.

Author Bio – Brandi has been writing SMTP relay service reviews and variety of technology articles for over 5 years. She also loves to review the latest Android smartphones in the market.

More contents in: ,

About -