SlideShare a Scribd company logo
Ethics of Parasitic Computing
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-29 1 / 8
Outlines
1 Introduction
2 Parasitic computing
3 Issues and open ethical problem
Dr. Varun Kumar (IIIT Surat) Lecture-29 2 / 8
Introduction
Key point → Computer communication perspective
⇒ Reliable communication on the Internet is guaranteed by a standard
set of protocols, used by all computers.
Example → Computer communication
When a user selects a URL (uniform resource locator), requesting a
web page, the browser opens a transmission control protocol (TCP)
connection to a web server.
Issues a hyper-text transmission protocol (HTTP) request over the
TCP connection.
The TCP message is carried via the Internet protocol (IP)
It might break the message into several packages.
It navigate independently through numerous routers between source
and destination.
When an HTTP request reaches its target web server, a response is
returned via the same TCP connection to the user’s browser.
Dr. Varun Kumar (IIIT Surat) Lecture-29 3 / 8
Continued–
The original message is reconstructed through a series of consecutive
steps, involving IP and TCP.
It is finally interpreted at the HTTP level, eliciting the appropriate
response.
A simple request for a web page involves a significant amount of
computation in the network and at the computers at the end points.
The success of the Internet rests on the cooperation of and trust
between all involved parties.
Dr. Varun Kumar (IIIT Surat) Lecture-29 4 / 8
Graphical representation: source– www.nature.com
a A single parasite node coordinates the computations occurring remotely in
the Internet protocols. It sends specially constructed messages to some
number of targeted nodes, which are web servers consisting of an arithmetic
and logic unit (ALU) and a network interface (NIF).
b Levels of communication between the parasitic node and the target in our
proof-of-principle implementation. The packet carrying the problem to be
solved is inserted into the network at the IP level, bypassing the parasitic
node’s TCP
Dr. Varun Kumar (IIIT Surat) Lecture-29 5 / 8
Parasitic computing
Parasitic computing is a programming technique where a program in
normal authorized interactions with another program manages to get the
other program to perform computations of a complex nature.
⇒ First reported in journal ”Nature” in 2001 by Barabasi, Freech, Feong
and Brockman.
⇒ A form of distributed computer architecture.
⇒ Used for solving complex computational problem.
⇒ Target could never know
⇒ Exploit standard set of communication protocol in internet.
⇒ Potential standard protocols are TCP, HTTP.
Dr. Varun Kumar (IIIT Surat) Lecture-29 6 / 8
Issues and open ethical problem
⇒ Examine alternative Idealistic and Pragmatic ethical viewpoints on
parasitic form of distributed computing
⇒ Information Ethics are basically digital versions of older ethical
dilemmas
Identity theft
Copyright
Infringement
Invasion of privacy
Possible question
♦ To what extent does the owner of a web server consent, explicitly or
implicitly, to IP interrogation when that host is connected to the
Internet?
♦ What constitutes abusive activation of IP protocol decoders, or any
other physical sensors (e.g., motion sensors, electric eyes, etc.)located
in the public domain?
Dr. Varun Kumar (IIIT Surat) Lecture-29 7 / 8
Continued–
♦ Is parasitic computing really a form of trespassing or is it more like
using a bathroom in a MacDonalds without making any purchase?
♦ How is one to judge the ethics of parasitic computing from a
philosophic perspective?
Conclusion:
The ethics of parasitic computing would seem, then, to depend upon
the philosophic viewpoint from which one approaches the experiment.
If one is an Idealist, the experiment would involve ethical problems.
But if one is a Pragmatist, no ethical fault is involved.
Dr. Varun Kumar (IIIT Surat) Lecture-29 8 / 8

More Related Content

PDF
Software as a Property
VARUN KUMAR
 
PDF
Copyright Vs Patent and Trade Secrecy Law
VARUN KUMAR
 
DOC
Savita_Patil_Resume (2)
Savi Patil
 
PDF
INTRODUCTION TO ALGORITHMS Third Edition
PHI Learning Pvt. Ltd.
 
PPSX
Parasitic computing
Aritra Mukherjee
 
PPTX
Parasitic Computing
Anushka Singh
 
PDF
Are Computer Ethical Issues Unique ?
VARUN KUMAR
 
DOCX
Coming Of Calm Technology
Chuka Okoye
 
Software as a Property
VARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
VARUN KUMAR
 
Savita_Patil_Resume (2)
Savi Patil
 
INTRODUCTION TO ALGORITHMS Third Edition
PHI Learning Pvt. Ltd.
 
Parasitic computing
Aritra Mukherjee
 
Parasitic Computing
Anushka Singh
 
Are Computer Ethical Issues Unique ?
VARUN KUMAR
 
Coming Of Calm Technology
Chuka Okoye
 

Similar to Ethics of Parasitic Computing (20)

PDF
3 f6 9_distributed_systems
op205
 
PDF
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
Dr. Michael Agbaje
 
PDF
Smart cities: how computers are changing our world for the better
Roberto Siagri
 
PPTX
Parasitic Computing
jojothish
 
PDF
Data dirtroad infocosm-1995
Artificial Intelligence Institute at UofSC
 
PDF
From Data Dirt Roads to Infocosm
Amit Sheth
 
PPTX
Parasitic Computing.pptx
Lahari973613
 
PPTX
Parasitic Computing.pptx
Lahari973613
 
PPTX
Parasitic Computing.pptx
Lahari973613
 
PDF
Cloud Computing UNIT-1 for computer science and engineering students
upputurimohan04
 
PDF
"Volunteer Computing with BOINC Client-Server side" por Diamantino Cruz e Ric...
Núcleo de Electrónica e Informática da Universidade do Algarve
 
PPT
9271736-Parasitic-computing.ppt for students reference
PragnyaNandaSabat
 
PDF
CloudComputing_UNIT1.pdf
khan593595
 
PDF
CloudComputing_UNIT1.pdf
khan593595
 
PPTX
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
Centric
 
PPTX
QUIZ # 2 CSS 12pptx aComputer System and
rfaquino1216
 
PDF
Basic Concepts and Trends in Emerging Technologies
Tharindu Weerasinghe
 
PDF
Un bot (no inteligente) multiinterfaz y distribuido como asistente personal
Fernando Tricas García
 
DOCX
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology
 
PDF
Introduction to computer ethics
VARUN KUMAR
 
3 f6 9_distributed_systems
op205
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
Dr. Michael Agbaje
 
Smart cities: how computers are changing our world for the better
Roberto Siagri
 
Parasitic Computing
jojothish
 
Data dirtroad infocosm-1995
Artificial Intelligence Institute at UofSC
 
From Data Dirt Roads to Infocosm
Amit Sheth
 
Parasitic Computing.pptx
Lahari973613
 
Parasitic Computing.pptx
Lahari973613
 
Parasitic Computing.pptx
Lahari973613
 
Cloud Computing UNIT-1 for computer science and engineering students
upputurimohan04
 
"Volunteer Computing with BOINC Client-Server side" por Diamantino Cruz e Ric...
Núcleo de Electrónica e Informática da Universidade do Algarve
 
9271736-Parasitic-computing.ppt for students reference
PragnyaNandaSabat
 
CloudComputing_UNIT1.pdf
khan593595
 
CloudComputing_UNIT1.pdf
khan593595
 
Presentatie The Internet of Things iBestuur Congres 2013 door Ben van Lier
Centric
 
QUIZ # 2 CSS 12pptx aComputer System and
rfaquino1216
 
Basic Concepts and Trends in Emerging Technologies
Tharindu Weerasinghe
 
Un bot (no inteligente) multiinterfaz y distribuido como asistente personal
Fernando Tricas García
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology
 
Introduction to computer ethics
VARUN KUMAR
 
Ad

More from VARUN KUMAR (20)

PDF
Distributed rc Model
VARUN KUMAR
 
PDF
Electrical Wire Model
VARUN KUMAR
 
PDF
Interconnect Parameter in Digital VLSI Design
VARUN KUMAR
 
PDF
Introduction to Digital VLSI Design
VARUN KUMAR
 
PDF
Challenges of Massive MIMO System
VARUN KUMAR
 
PDF
E-democracy or Digital Democracy
VARUN KUMAR
 
PDF
Action Lines of Geneva Plan of Action
VARUN KUMAR
 
PDF
Geneva Plan of Action
VARUN KUMAR
 
PDF
Fair Use in the Electronic Age
VARUN KUMAR
 
PDF
Orthogonal Polynomial
VARUN KUMAR
 
PDF
Patent Protection
VARUN KUMAR
 
PDF
Property Right and Software
VARUN KUMAR
 
PDF
Investigating Data Trials
VARUN KUMAR
 
PDF
Gaussian Numerical Integration
VARUN KUMAR
 
PDF
Censorship and Controversy
VARUN KUMAR
 
PDF
Romberg's Integration
VARUN KUMAR
 
PDF
Introduction to Censorship
VARUN KUMAR
 
PDF
Protect your online privacy-2
VARUN KUMAR
 
PDF
Interception Act vs Privacy Act
VARUN KUMAR
 
PDF
Simpson's rule of integration
VARUN KUMAR
 
Distributed rc Model
VARUN KUMAR
 
Electrical Wire Model
VARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
VARUN KUMAR
 
Introduction to Digital VLSI Design
VARUN KUMAR
 
Challenges of Massive MIMO System
VARUN KUMAR
 
E-democracy or Digital Democracy
VARUN KUMAR
 
Action Lines of Geneva Plan of Action
VARUN KUMAR
 
Geneva Plan of Action
VARUN KUMAR
 
Fair Use in the Electronic Age
VARUN KUMAR
 
Orthogonal Polynomial
VARUN KUMAR
 
Patent Protection
VARUN KUMAR
 
Property Right and Software
VARUN KUMAR
 
Investigating Data Trials
VARUN KUMAR
 
Gaussian Numerical Integration
VARUN KUMAR
 
Censorship and Controversy
VARUN KUMAR
 
Romberg's Integration
VARUN KUMAR
 
Introduction to Censorship
VARUN KUMAR
 
Protect your online privacy-2
VARUN KUMAR
 
Interception Act vs Privacy Act
VARUN KUMAR
 
Simpson's rule of integration
VARUN KUMAR
 
Ad

Recently uploaded (20)

PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
easa module 3 funtamental electronics.pptx
tryanothert7
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
Information Retrieval and Extraction - Module 7
premSankar19
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
easa module 3 funtamental electronics.pptx
tryanothert7
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 

Ethics of Parasitic Computing

  • 1. Ethics of Parasitic Computing Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-29 1 / 8
  • 2. Outlines 1 Introduction 2 Parasitic computing 3 Issues and open ethical problem Dr. Varun Kumar (IIIT Surat) Lecture-29 2 / 8
  • 3. Introduction Key point → Computer communication perspective ⇒ Reliable communication on the Internet is guaranteed by a standard set of protocols, used by all computers. Example → Computer communication When a user selects a URL (uniform resource locator), requesting a web page, the browser opens a transmission control protocol (TCP) connection to a web server. Issues a hyper-text transmission protocol (HTTP) request over the TCP connection. The TCP message is carried via the Internet protocol (IP) It might break the message into several packages. It navigate independently through numerous routers between source and destination. When an HTTP request reaches its target web server, a response is returned via the same TCP connection to the user’s browser. Dr. Varun Kumar (IIIT Surat) Lecture-29 3 / 8
  • 4. Continued– The original message is reconstructed through a series of consecutive steps, involving IP and TCP. It is finally interpreted at the HTTP level, eliciting the appropriate response. A simple request for a web page involves a significant amount of computation in the network and at the computers at the end points. The success of the Internet rests on the cooperation of and trust between all involved parties. Dr. Varun Kumar (IIIT Surat) Lecture-29 4 / 8
  • 5. Graphical representation: source– www.nature.com a A single parasite node coordinates the computations occurring remotely in the Internet protocols. It sends specially constructed messages to some number of targeted nodes, which are web servers consisting of an arithmetic and logic unit (ALU) and a network interface (NIF). b Levels of communication between the parasitic node and the target in our proof-of-principle implementation. The packet carrying the problem to be solved is inserted into the network at the IP level, bypassing the parasitic node’s TCP Dr. Varun Kumar (IIIT Surat) Lecture-29 5 / 8
  • 6. Parasitic computing Parasitic computing is a programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. ⇒ First reported in journal ”Nature” in 2001 by Barabasi, Freech, Feong and Brockman. ⇒ A form of distributed computer architecture. ⇒ Used for solving complex computational problem. ⇒ Target could never know ⇒ Exploit standard set of communication protocol in internet. ⇒ Potential standard protocols are TCP, HTTP. Dr. Varun Kumar (IIIT Surat) Lecture-29 6 / 8
  • 7. Issues and open ethical problem ⇒ Examine alternative Idealistic and Pragmatic ethical viewpoints on parasitic form of distributed computing ⇒ Information Ethics are basically digital versions of older ethical dilemmas Identity theft Copyright Infringement Invasion of privacy Possible question ♦ To what extent does the owner of a web server consent, explicitly or implicitly, to IP interrogation when that host is connected to the Internet? ♦ What constitutes abusive activation of IP protocol decoders, or any other physical sensors (e.g., motion sensors, electric eyes, etc.)located in the public domain? Dr. Varun Kumar (IIIT Surat) Lecture-29 7 / 8
  • 8. Continued– ♦ Is parasitic computing really a form of trespassing or is it more like using a bathroom in a MacDonalds without making any purchase? ♦ How is one to judge the ethics of parasitic computing from a philosophic perspective? Conclusion: The ethics of parasitic computing would seem, then, to depend upon the philosophic viewpoint from which one approaches the experiment. If one is an Idealist, the experiment would involve ethical problems. But if one is a Pragmatist, no ethical fault is involved. Dr. Varun Kumar (IIIT Surat) Lecture-29 8 / 8