{"title":"P2P文件传输的一些可能的增强与被动用户和传输的远程控制有关","authors":"B. Milašinović, K. Fertalj","doi":"10.1109/ITI.2004.242575","DOIUrl":null,"url":null,"abstract":"The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Some possible enhancements of P2P file transfer related to passive users and remote control of transfer\",\"authors\":\"B. Milašinović, K. Fertalj\",\"doi\":\"10.1109/ITI.2004.242575\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system\",\"PeriodicalId\":320305,\"journal\":{\"name\":\"26th International Conference on Information Technology Interfaces, 2004.\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"26th International Conference on Information Technology Interfaces, 2004.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITI.2004.242575\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"26th International Conference on Information Technology Interfaces, 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITI.2004.242575","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Some possible enhancements of P2P file transfer related to passive users and remote control of transfer
The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system