First draft of thesis - About DSC



Collaborative Framework for High-Performance P2P-based Data Transfer in Scientific ComputingAli KaplanSubmitted to the faculty of the University Graduate School in partial fulfillment of the requirementsfor the degree Doctor of Philosophy in the Department of Computer Science, Indiana University February 2009Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Doctoral Committee _______________________________ Prof. Geoffrey C. Fox (Principal Advisor) ________________________________ Prof. Dennis Gannon ________________________________ Prof. ________________________________ Prof. 28, 2009? 2009 Ali KaplanAll Rights ReservedAcknowledgementsAbstractWith the advances in network bandwidth, computational power, memory capabilities, and the development of new storage technologies, computational science has been evolving over the past few years into data intensive computing. In contrast to this evolvement, TCP – Transmission Control Protocol has remained to be the most commonly used protocol for data transfer. TCP is unsuitable for moving large volume of data sets across the networks particularly for wide area networks (WANs) because of the default TCP settings on most hosts, which are configured to deliver reasonable data transfer performance -instead of optimal performance- both on Ethernet local area networks (LANs) and on WANs. Therefore, in order to circumvent the performance drawbacks over wide area high-speed networks originating from window-based congestion control mechanism of TCP and its default settings, different solutions have been proposed over the years. However, most of these solutions are based on client/server paradigm; thus, they are focused on improving the performance of data transmission between the sender and the receiver. When there are multiple receivers which are interested in the same data sets, which is very common in scientific computing, this approach fails to ameliorate the performance of bulk data transfer between the receivers.In this dissertation, we present a GridTorrent architecture that is built on a peer-to-peer network model and combines collaboration and service-oriented computing principles with adequate security features such as authentication, authorization, and data integrity in order to provide an efficient, scalable, secure, and modular framework for high-performance data transfer in scientific computing. Our lightweight architecture not only performs well on very high-performance networks but also on networks with limited bandwidth capacity. In addition to the fact that it can be deployed on any type of platform, its data transmission layer is a generic transfer layer that is independent of data type and format.Table of Contents TOC \o "2-4" \h \z \t "Chapter Title,1" Introduction PAGEREF _Toc228272565 \h 11.1Motivation PAGEREF _Toc228272566 \h 41.2Use Cases PAGEREF _Toc228272567 \h 51.3Research Issues PAGEREF _Toc228272568 \h 61.4Contributions PAGEREF _Toc228272569 \h 71.5Organization of the Thesis PAGEREF _Toc228272570 \h 9Literature Survey PAGEREF _Toc228272571 \h 122.1Introduction PAGEREF _Toc228272572 \h 122.2Overview PAGEREF _Toc228272573 \h 142.3System-level Data Movement Techniques PAGEREF _Toc228272574 \h 162.4Application-level Data Movement Techniques PAGEREF _Toc228272575 \h 172.4.1 TCP -based Data Movement Techniques PAGEREF _Toc228272576 \h 172.4.1.1 GridFTP PAGEREF _Toc228272577 \h 182.4.1.2 GridHTTP PAGEREF _Toc228272578 \h 222.4.1.3 bbFTP PAGEREF _Toc228272579 \h 222.4.1.4 The BaBar Copy Program (bbcp) PAGEREF _Toc228272580 \h 232.4.2 UDP -based Data Movement Techniques PAGEREF _Toc228272581 \h 232.4.2.1 Simple Available Bandwidth Utilization Library (SABUL) PAGEREF _Toc228272582 \h 242.4.2.2 UDP-based Data Transfer Protocol (UDT) PAGEREF _Toc228272583 \h 242.4.2.3 Fast Object –Based data transfer System (FOBS) PAGEREF _Toc228272584 \h 252.4.2.4 Reliable Blast UDP (RBUDP) PAGEREF _Toc228272585 \h 262.4.2.5 Tsunami PAGEREF _Toc228272586 \h 262.4.2.6 UFTP PAGEREF _Toc228272587 \h 272.5Peer-to-Peer based Data Movement Techniques PAGEREF _Toc228272588 \h 272.5.1 BitTorrent PAGEREF _Toc228272589 \h 302.6Network-level Data Transfer Techniques PAGEREF _Toc228272590 \h 342.7Discussion PAGEREF _Toc228272591 \h 38The GridTorrent Framework Architecture PAGEREF _Toc228272592 \h 403.1The Overview of the GridTorrent Framework PAGEREF _Toc228272593 \h 403.2Main Components of the GridTorrent Framework PAGEREF _Toc228272594 \h 423.3Summary PAGEREF _Toc228272595 \h 47The GridTorrent Framework Client Architecture PAGEREF _Toc228272596 \h 484.1Introduction PAGEREF _Toc228272597 \h 484.2Overview of the GridTorrent Framework Client Architecture PAGEREF _Toc228272598 \h 504.3Torrent Data Sharing Logic PAGEREF _Toc228272599 \h 524.4Core Modules Layer PAGEREF _Toc228272600 \h 534.4.1 Data Transfer Modules PAGEREF _Toc228272601 \h 534.4.2 Management Modules PAGEREF _Toc228272602 \h 554.4.2.1 Task Manager PAGEREF _Toc228272603 \h 564.4.2.2 WS-Tracker Client PAGEREF _Toc228272604 \h 564.5Security Manager PAGEREF _Toc228272605 \h 584.6Task Generation and Exchange PAGEREF _Toc228272606 \h 594.6.1 Tasks PAGEREF _Toc228272607 \h 594.6.1.1 Task List Request Task PAGEREF _Toc228272608 \h 634.6.1.2 Share Content Request Task PAGEREF _Toc228272609 \h 634.6.1.3 Share Content Response Task PAGEREF _Toc228272610 \h 654.6.1.4 Download Content Request Task PAGEREF _Toc228272611 \h 664.6.1.5 Download Content Response Task PAGEREF _Toc228272612 \h 664.6.1.6 Access Control List Request Task PAGEREF _Toc228272613 \h 684.6.1.7 Access Control List Response Task PAGEREF _Toc228272614 \h 694.6.1.8 Update Status Task: (UPT) PAGEREF _Toc228272615 \h 704.7Summary PAGEREF _Toc228272616 \h 71Asynchronous Collaboration and Content Management Architecture PAGEREF _Toc228272617 \h 725.1Introduction PAGEREF _Toc228272618 \h 725.2The concept of Asynchronous Collaboration and Content Management PAGEREF _Toc228272619 \h 735.2.1 Definition of term “Asynchronous Collaboration” PAGEREF _Toc228272620 \h 735.2.2 Definition of term “Content” and “Content Management” PAGEREF _Toc228272621 \h 745.2.3 Requirements PAGEREF _Toc228272622 \h 745.3Related Work PAGEREF _Toc228272623 \h 755.4Access Control Schemes PAGEREF _Toc228272624 \h 815.5The Collaboration and Content Management PAGEREF _Toc228272625 \h 835.5.1 Objects of the System PAGEREF _Toc228272626 \h 855.5.2 Services of the System PAGEREF _Toc228272627 \h 875.5.3 Collaboration Management Module PAGEREF _Toc228272628 \h 905.5.4 Access Control Mechanism of CCM PAGEREF _Toc228272629 \h 925.5.5 Content Management Module PAGEREF _Toc228272630 \h 935.6Summary PAGEREF _Toc228272631 \h 94WS-Tracker Architecture PAGEREF _Toc228272632 \h 956.1Introduction PAGEREF _Toc228272633 \h 956.2Web Service PAGEREF _Toc228272634 \h 976.3WS-Tracker Service PAGEREF _Toc228272635 \h 1006.3.1 Multiple Trackers PAGEREF _Toc228272636 \h 1026.3.2 Fault Tolerance PAGEREF _Toc228272637 \h 1036.3.3 Security PAGEREF _Toc228272638 \h 1056.4Summary PAGEREF _Toc228272639 \h 106Security Modules and Issues of GridTorrent Framework PAGEREF _Toc228272640 \h 1077.1Introduction PAGEREF _Toc228272641 \h 1077.2The Grid Security Infrastructure (GSI) PAGEREF _Toc228272642 \h 1107.2.1 History of the GSI PAGEREF _Toc228272643 \h 1107.2.2 Overview of the Grid Security Infrastructure PAGEREF _Toc228272644 \h 1117.2.3 GT4 WS Security PAGEREF _Toc228272645 \h 1127.2.4 GT4 Pre-WS Security PAGEREF _Toc228272646 \h 1147.3The GridTorrent Framework Security Infrastructure PAGEREF _Toc228272647 \h 1147.3.1 Security at Collaboration and Content Manager (CCM) PAGEREF _Toc228272648 \h 1177.3.2 Security at WS-Tracker Service PAGEREF _Toc228272649 \h 1207.3.3 Security between GTF Clients PAGEREF _Toc228272650 \h 1217.4Dealing with Various Attack Scenarios PAGEREF _Toc228272651 \h 1237.4.1 Man-in-the-middle Attacks PAGEREF _Toc228272652 \h 1237.4.2 Replay Attacks PAGEREF _Toc228272653 \h 1247.4.3 Denial of Service Attacks PAGEREF _Toc228272654 \h 1247.4.4 Non-Repudiation PAGEREF _Toc228272655 \h 1257.5Summary PAGEREF _Toc228272656 \h 125Performance Evaluation PAGEREF _Toc228272657 \h 1268.1Introduction PAGEREF _Toc228272658 \h 1268.2PTCP Architecture PAGEREF _Toc228272659 \h 1298.3LAN Test PAGEREF _Toc228272660 \h 1308.3.1 Scenario I: Testbed PAGEREF _Toc228272661 \h 1328.3.2 Scenario I: LAN Test Result PAGEREF _Toc228272662 \h 1348.3.3 Overhead PAGEREF _Toc228272663 \h 1378.4Continental WAN Test PAGEREF _Toc228272664 \h 1418.4.1 Scenario II: Testbed PAGEREF _Toc228272665 \h 1428.4.2 Scenario II: Test Result PAGEREF _Toc228272666 \h 1448.4.3 Overhead PAGEREF _Toc228272667 \h 1488.5Multi-nodes PAGEREF _Toc228272668 \h 1528.6Summary PAGEREF _Toc228272669 \h 159Conclusions and Future Work PAGEREF _Toc228272670 \h 1609.1Conclusion PAGEREF _Toc228272671 \h 1609.2Summary of Answers for Research Questions PAGEREF _Toc228272672 \h 1619.2.1 How can we build a peer-to-peer data transfer mechanism which utilizes SOA for scientific community? Which one of available peer-to-peer system is best for this purpose and what type of modifications and new features are needed to be added to it? PAGEREF _Toc228272673 \h 1629.2.2 How can we provide a medium that allows participants to manage, share, discover, and download their contents and integrate it with data transfer mechanism? PAGEREF _Toc228272674 \h 1629.2.3 Is the data transfer mechanism scalable? PAGEREF _Toc228272675 \h 1639.2.4 How is the performance of data transfer mechanism and it is acceptable? PAGEREF _Toc228272676 \h 1649.2.5 What is the overhead of this system and is it reasonable? PAGEREF _Toc228272677 \h 1649.2.6 How can we make it enough secure for scientific community as security is not a concern in peer-to-peer to networks for non-scientific community? PAGEREF _Toc228272678 \h 1659.3Contributions PAGEREF _Toc228272679 \h 1659.4Limitations and Future Research Direction PAGEREF _Toc228272680 \h 1679.4.1 Data Transfer Component PAGEREF _Toc228272681 \h 1679.4.2 WS-Tracker Service PAGEREF _Toc228272682 \h 1679.4.3 Asynchronous Collaboration and Content Management PAGEREF _Toc228272683 \h 168Bibliography PAGEREF _Toc228272684 \h 169List of Tables TOC \h \z \c "Table" Table 41 Tasks Overview PAGEREF _Toc228209080 \h 60Table 42 Presentation of Task List Request Task in XML format PAGEREF _Toc228209081 \h 63Table 43 Illustration of Share Content Request Task in the XML message PAGEREF _Toc228209082 \h 64Table 44 Representation of Share Content Response Task in the form of XML message PAGEREF _Toc228209083 \h 66Table 45 An example of Download Content Request Task in XML format PAGEREF _Toc228209084 \h 66Table 46 Illustration of Download Content Response Task in the XML message PAGEREF _Toc228209085 \h 67Table 47 Presentation of Torrent Data Task in XML format PAGEREF _Toc228209086 \h 67Table 48 Representation of Torrent No Data Task in the form of XML message PAGEREF _Toc228209087 \h 68Table 49 Illustration of Access Control List Request Task in the XML message PAGEREF _Toc228209088 \h 68Table 410 An example of Access Control List Response Task in XML format PAGEREF _Toc228209089 \h 70Table 411 Presentation of Update Status Task in XML format PAGEREF _Toc228209090 \h 70Table 51 Partial List of Sakai 2.5 Tools PAGEREF _Toc228209091 \h 79Table 52 Overview of objects used in the Collaboration and Content Manager PAGEREF _Toc228209092 \h 86Table 53 Summary of services used in the Collaboration and Content Manager PAGEREF _Toc228209093 \h 88Table 54 Access levels offered by the Collaboration and Content Manager PAGEREF _Toc228209094 \h 92Table 71 Comparison of transport-level and message-level security from [102] PAGEREF _Toc228209095 \h 113Table 72 Summary of security issues between GTF components PAGEREF _Toc228209096 \h 123Table 81 Server and client machines’ descriptions and their locations PAGEREF _Toc228209097 \h 128Table 82 Performance characteristics of Iperf, PTCP disk-to-disk and PTCP memory-to-memory with various parallel streams or sources on LAN PAGEREF _Toc228209098 \h 134Table 83 Bandwidth utilization of GridTorrent with various parallel streams and seeds for useful data transmission on LAN PAGEREF _Toc228209099 \h 135Table 84 Bandwidth utilization of GridTorrent including overhead with various parallel streams and seeds on LAN PAGEREF _Toc228209100 \h 138Table 85 Performance characteristics of Iperf, PTCP disk-to-disk and PTCP memory-to-memory with various parallel streams or sources on WAN PAGEREF _Toc228209101 \h 145Table 86 Bandwidth utilization of GridTorrent with various parallel streams and seeds for useful data transmission on WAN PAGEREF _Toc228209102 \h 146Table 87 Bandwidth utilization of GridTorrent including overhead with various parallel streams and seeds on WAN PAGEREF _Toc228209103 \h 149Table 88 Transmission sequence matrix of PTCP PAGEREF _Toc228209104 \h 156Table 89 Transmission sequence matrix of GridTorrent PAGEREF _Toc228209105 \h 156List of Figures TOC \h \z \c "Figure" Figure 31 GridTorrent Framework is composed of a client, a Web Service Tracker, and a Collaboration and Content Manager. Each component communicates with another one via different protocols such as HTTP, TCP, and PTCP PAGEREF _Toc228209037 \h 44Figure 41 Client/Server model PAGEREF _Toc228209038 \h 50Figure 42 Peer-to-peer model PAGEREF _Toc228209039 \h 51Figure 43 GridTorrent Framework Client Architecture PAGEREF _Toc228209040 \h 52Figure 44 Simulation Architecture PAGEREF _Toc228209041 \h 54Figure 45 Representation of XML schema of Task PAGEREF _Toc228209042 \h 61Figure 46 Activity diagram of GTF’s tasks PAGEREF _Toc228209043 \h 62Figure 47 Processes workflow of share content request task and share content action task PAGEREF _Toc228209044 \h 65Figure 48 Access Control List (ACL) request task's processes workflow PAGEREF _Toc228209045 \h 69Figure 49 Update status task (UST) is one of the important and periodic task that is used to inform WS-Tracker service about current status of the GTF clients PAGEREF _Toc228209046 \h 71Figure 51 The interaction of Collaboration and Content Manager with other entities of the GridTorrent Framework PAGEREF _Toc228209047 \h 84Figure 52 Anatomy of the Collaboration and Content Management module PAGEREF _Toc228209048 \h 85Figure 53 Possible roles and rights in the Collaboration and Content Management Module PAGEREF _Toc228209049 \h 91Figure 61 The flow of information between a user and GTF Peer through Content and Collaboration Manager and WS-Tracker service PAGEREF _Toc228209050 \h 100Figure 62 Message flow between GTF peers via WS-Tracker Service PAGEREF _Toc228209051 \h 102Figure 71 GT4 security protocols from [103] PAGEREF _Toc228209052 \h 112Figure 72 All possible interaction among components of GTF require security services. PAGEREF _Toc228209053 \h 116Figure 73 Establishing security credentials at Collaboration and Content Manager Server. PAGEREF _Toc228209054 \h 118Figure 74 Security Credentials obtaining process between GTF and GSI components. PAGEREF _Toc228209055 \h 122Figure 81 A parallel TCP socket architecture PAGEREF _Toc228209056 \h 129Figure 82 Client and server configuration for PTCP test case. Server, machine A, is located at Bloomington, IN, whereas client, machine B, is at Indianapolis, IN. PAGEREF _Toc228209057 \h 132Figure 83 GridTorrent test case configuration for LAN test. Unlike PTCP test case configuration, regular single Java sockets are used for data transfer in GridTorrent test case. However, server and client’s configuration and location is same as that of PTCP test case. PAGEREF _Toc228209058 \h 133Figure 84 Achieved average data transfer rate of Iperf, PTCP and GridTorrent with various parallel flows versus the number of seeds on LAN type computer network (IU-IU settings) PAGEREF _Toc228209059 \h 136Figure 85 Achieved average useful data throughput of GridTorrent with various parallel flows versus the number of seeds on LAN type computer network (IU-IU settings) PAGEREF _Toc228209060 \h 136Figure 86 The ratio of wasted throughput of GridTorrent with various parallel streams versus the number of seeds on LAN (IU-IU settings) PAGEREF _Toc228209061 \h 138Figure 87 Achieved average throughput of GridTorrent with and without overhead using one stream with various number of seeds on LAN type computer network (IU-IU settings) PAGEREF _Toc228209062 \h 139Figure 88 Achieved average throughput of GridTorrent with and without overhead using two parallel streams with various number of seeds on LAN type computer network (IU-IU settings) PAGEREF _Toc228209063 \h 139Figure 89 Attained average throughput of GridTorrent with and without overhead using four parallel streams with various number of seeds on LAN type computer network (IU-IU settings) PAGEREF _Toc228209064 \h 140Figure 810 Achieved average throughput of GridTorrent with and without overhead using eight parallel streams with various number of seeds on LAN type computer network (IU-IU settings) PAGEREF _Toc228209065 \h 140Figure 811 Achieved average throughput of GridTorrent with and without overhead using sixteen parallel streams with various number of seeds on LAN type computer network (IU-IU settings) PAGEREF _Toc228209066 \h 141Figure 812 Client and server layout for PTCP test case. Parallel TCP streams were used for data transfer. Server is located at Bloomington, IN, whereas client is at Baton Rouge, LA. PAGEREF _Toc228209067 \h 142Figure 813 GridTorrent test case topology for wide area network test. Similar to PTCP test case configuration, parallel Java sockets are used for data transfer in GridTorrent test case. Seeds and peer’s configurations and locations are same as that of PTCP test case. PAGEREF _Toc228209068 \h 143Figure 814 Achieved average data transfer rate of Iperf, PTCP and GridTorrent with various parallel flows or seeds on wide area network (IU-LSU settings) PAGEREF _Toc228209069 \h 147Figure 815 Achieved average useful data throughput of GridTorrent with various parallel flows or seeds on WAN (IU-LSU settings) PAGEREF _Toc228209070 \h 147Figure 816 The ratio of wasted throughput of GridTorrent with various parallel streams versus the number of seeds on WAN (IU-LSU settings) PAGEREF _Toc228209071 \h 148Figure 817 Achieved average throughput of Iperf vs GridTorrent with and without overhead using one stream with various number of seeds on WAN (IU-LSU settings) PAGEREF _Toc228209072 \h 149Figure 818 Achieved average throughput of Iperf vs GridTorrent with and without overhead using two parallel streams with various number of seeds on WAN (IU-LSU settings) PAGEREF _Toc228209073 \h 150Figure 819 Achieved average throughput of Iperf vs GridTorrent with and without overhead using four parallel streams with various number of seeds on WAN (IU-LSU settings) PAGEREF _Toc228209074 \h 150Figure 820 Achieved average throughput of Iperf vs GridTorrent with and without overhead using eight parallel streams with various number of seeds on WAN (IU-LSU settings) PAGEREF _Toc228209075 \h 151Figure 821 Achieved average throughput of Iperf vs GridTorrent with and without overhead using sixteen parallel streams with various number of seeds on WAN (IU-LSU settings) PAGEREF _Toc228209076 \h 151Figure 822 Multiple nodes representation for GridTorrent and PTCP PAGEREF _Toc228209077 \h 155Figure 823 Achieved average aggregated bandwidth of GridTorrent with various parallel streams versus the number of peers on LAN (IU-IU settings) PAGEREF _Toc228209078 \h 157Figure 824 Achieved average aggregated bandwidth of GridTorrent with various parallel streams versus the number of peers on WAN (IU-LSU settings) PAGEREF _Toc228209079 \h 158Introduction“There is nothing permanent except change.” –Heraclitus of Ephesus. This is very true for nearly seventy years of the history of computing systems and computational science. When the first modern computers emerged in 1940, computer systems were so large in size and expensive to build that they had a roomful size and only a few very big companies and institutions were able to afford them. These computer systems operated independently without communicating to each other. In fact, there was no reason to connect them at that time. Throughout the 1950s, computers used vacuum tubes as their electronic components. Transistor-based electronics was used to replace vacuum tube electronics in the 1960s. In the 1950s and early 1960s, one prevalent computer networking method was built on the central mainframe method in which terminals were connected to their central mainframe via long leased lines. The groundbreaking integrated circuit (IC) technology and manufacturing of microprocessors were introduced in the 1970s. IC technology and microprocessor architecture caused manufacture of smaller, faster, more reliable, and cheaper computers. Modern computers based on ICs are enormously more capable but a fraction of the space and price of the first version of IC technology. Another important advancement of the late 1960s and early 1970s was the development several packet switched networking solutions to address the network interoperability problems. By the 1980s, computers became so affordable, small, and simple that regular people could afford to buy computers for personal purposes and used them at their homes. Nowadays, computers are ubiquities. For example, embedded computers are used in machines ranging from spaceship to industrial robots, digital cameras, children’s toys, and wristwatches. Following the introduction of privately run the Internet Service Providers in the 1980s, the Internet became prevalent which led to invention of high speed computer networks with multitude of connected machines. In the last seventy years, the advancement in computers and computer networks not only changed their size, speed, reliability, and price but also shifted their main usage paradigm from computational-intensive usage to data-intensive usage ADDIN EN.CITE <EndNote><Cite><Author>Bell</Author><Year>2006</Year><RecNum>53</RecNum><record><rec-number>53</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">53</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Bell, G.</author><author>Gray, J.</author><author>Szalay, A.</author></authors></contributors><titles><title>Petascale Computational Systems</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><pages>110-112</pages><volume>39</volume><number>1</number><dates><year>2006</year></dates><label>Applications</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Bell</Author><Year>2006</Year><RecNum>53</RecNum><record><rec-number>53</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">53</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Bell, G.</author><author>Gray, J.</author><author>Szalay, A.</author></authors></contributors><titles><title>Petascale Computational Systems</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><pages>110-112</pages><volume>39</volume><number>1</number><dates><year>2006</year></dates><label>Applications</label><urls></urls></record></Cite></EndNote>[1]. New scientific devices such as large-scale observatories and state of the art microscopes generate massive volumes of datasets. The Internet and computational Grid PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk5PC9ZZWFyPjxS

ZWNOdW0+NTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjUwPC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij41MDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJCb29rIj42

PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0

aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT5UaGUgR3JpZDogQmx1ZXByaW50IGZvciBhIE5ldyBDb21wdXRpbmcg

SW5mcmFzdHJ1Y3R1cmU8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4s

IFNhbiBGcmFuY2lzY28sIENBPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+

PGZ1bGwtdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4sIFNhbiBGcmFuY2lzY28sIENBPC9mdWxsLXRp

dGxlPjwvcGVyaW9kaWNhbD48dm9sdW1lPjIxMTwvdm9sdW1lPjxkYXRlcz48eWVhcj4xOTk5PC95

ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+

Njk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjY5PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtl

eXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3

MDJ6Ij42OTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGlj

bGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJ

LjwvYXV0aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjxhdXRob3I+TmljaywgSi48

L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRv

cnM+PHRpdGxlcz48dGl0bGU+VGhlIFBoeXNpb2xvZ3kgb2YgdGhlIEdyaWQ6IEFuIE9wZW4gR3Jp

ZCBTZXJ2aWNlcyBBcmNoaXRlY3R1cmUgZm9yIERpc3RyaWJ1dGVkIFN5c3RlbXMgSW50ZWdyYXRp

b24sIEp1bmUgMjAwMjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJ

bmZyYXN0cnVjdHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3Rp

dGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJbmZyYXN0cnVj

dHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxkYXRl

cz48eWVhcj4yMDAyPC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk4

PC9ZZWFyPjxSZWNOdW0+NjI8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjYyPC9yZWMtbnVt

YmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNz

dHZweGRtZTJ0ejB2MmV3MDJ6Ij42Mjwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1l

PSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48

YXV0aG9yPkZvc3RlcixJYW48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1hbiwgQ2FybDwvYXV0aG9y

PjxhdXRob3I+VHN1ZGlrLCBHZW5lPC9hdXRob3I+PGF1dGhvcj5UdWVja2UsIFN0ZXZlbjwvYXV0

aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5BIFNlY3VyaXR5IEFy

Y2hpdGVjdHVyZSBmb3IgQ29tcHV0YXRpb25hbCBHcmlkczwvdGl0bGU+PHNlY29uZGFyeS10aXRs

ZT5Qcm9jZWVkaW5ncyBvZiB0aGUgNXRoIEFDTSBjb25mZXJlbmNlIG9uIENvbXB1dGVyIGFuZCBj

b21tdW5pY2F0aW9ucyBzZWN1cml0eTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj4xOTk4PC95ZWFyPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5TYW4gRnJhbmNpc2NvLCBDYWxp

Zm9ybmlhLCBVbml0ZWQgU3RhdGVzPC9wdWItbG9jYXRpb24+PHB1Ymxpc2hlcj5BQ008L3B1Ymxp

c2hlcj48bGFiZWw+U2VjdXJpdHk8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNv

dXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMjg4MDkwLjI4ODExMTwvZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+Rm9zdGVyPC9B

dXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj40ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+NDg8L2tleT48L2ZvcmVpZ24ta2V5

cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPkZvc3RlciwgSS48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1h

biwgQy48L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+VGhlIEFuYXRvbXkgb2YgdGhlIEdyaWQ6IEVuYWJsaW5n

IFNjYWxhYmxlIFZpcnR1YWwgT3JnYW5pemF0aW9uczwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5J

bnRlcm5hdGlvbmFsIEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L3NlY29u

ZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5JbnRlcm5hdGlvbmFs

IEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L2Z1bGwtdGl0bGU+PC9wZXJp

b2RpY2FsPjxwYWdlcz4yMDDigJMyMjI8L3BhZ2VzPjx2b2x1bWU+MTU8L3ZvbHVtZT48bnVtYmVy

PjM8L251bWJlcj48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5HcmlkPC9s

YWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk5PC9ZZWFyPjxS

ZWNOdW0+NTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjUwPC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij41MDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJCb29rIj42

PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0

aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT5UaGUgR3JpZDogQmx1ZXByaW50IGZvciBhIE5ldyBDb21wdXRpbmcg

SW5mcmFzdHJ1Y3R1cmU8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4s

IFNhbiBGcmFuY2lzY28sIENBPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+

PGZ1bGwtdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4sIFNhbiBGcmFuY2lzY28sIENBPC9mdWxsLXRp

dGxlPjwvcGVyaW9kaWNhbD48dm9sdW1lPjIxMTwvdm9sdW1lPjxkYXRlcz48eWVhcj4xOTk5PC95

ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+

Njk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjY5PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtl

eXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3

MDJ6Ij42OTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGlj

bGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJ

LjwvYXV0aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjxhdXRob3I+TmljaywgSi48

L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRv

cnM+PHRpdGxlcz48dGl0bGU+VGhlIFBoeXNpb2xvZ3kgb2YgdGhlIEdyaWQ6IEFuIE9wZW4gR3Jp

ZCBTZXJ2aWNlcyBBcmNoaXRlY3R1cmUgZm9yIERpc3RyaWJ1dGVkIFN5c3RlbXMgSW50ZWdyYXRp

b24sIEp1bmUgMjAwMjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJ

bmZyYXN0cnVjdHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3Rp

dGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJbmZyYXN0cnVj

dHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxkYXRl

cz48eWVhcj4yMDAyPC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk4

PC9ZZWFyPjxSZWNOdW0+NjI8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjYyPC9yZWMtbnVt

YmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNz

dHZweGRtZTJ0ejB2MmV3MDJ6Ij42Mjwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1l

PSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48

YXV0aG9yPkZvc3RlcixJYW48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1hbiwgQ2FybDwvYXV0aG9y

PjxhdXRob3I+VHN1ZGlrLCBHZW5lPC9hdXRob3I+PGF1dGhvcj5UdWVja2UsIFN0ZXZlbjwvYXV0

aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5BIFNlY3VyaXR5IEFy

Y2hpdGVjdHVyZSBmb3IgQ29tcHV0YXRpb25hbCBHcmlkczwvdGl0bGU+PHNlY29uZGFyeS10aXRs

ZT5Qcm9jZWVkaW5ncyBvZiB0aGUgNXRoIEFDTSBjb25mZXJlbmNlIG9uIENvbXB1dGVyIGFuZCBj

b21tdW5pY2F0aW9ucyBzZWN1cml0eTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj4xOTk4PC95ZWFyPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5TYW4gRnJhbmNpc2NvLCBDYWxp

Zm9ybmlhLCBVbml0ZWQgU3RhdGVzPC9wdWItbG9jYXRpb24+PHB1Ymxpc2hlcj5BQ008L3B1Ymxp

c2hlcj48bGFiZWw+U2VjdXJpdHk8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNv

dXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMjg4MDkwLjI4ODExMTwvZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+Rm9zdGVyPC9B

dXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj40ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+NDg8L2tleT48L2ZvcmVpZ24ta2V5

cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPkZvc3RlciwgSS48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1h

biwgQy48L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+VGhlIEFuYXRvbXkgb2YgdGhlIEdyaWQ6IEVuYWJsaW5n

IFNjYWxhYmxlIFZpcnR1YWwgT3JnYW5pemF0aW9uczwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5J

bnRlcm5hdGlvbmFsIEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L3NlY29u

ZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5JbnRlcm5hdGlvbmFs

IEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L2Z1bGwtdGl0bGU+PC9wZXJp

b2RpY2FsPjxwYWdlcz4yMDDigJMyMjI8L3BhZ2VzPjx2b2x1bWU+MTU8L3ZvbHVtZT48bnVtYmVy

PjM8L251bWJlcj48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5HcmlkPC9s

YWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk5PC9ZZWFyPjxS

ZWNOdW0+NTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjUwPC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij41MDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJCb29rIj42

PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0

aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT5UaGUgR3JpZDogQmx1ZXByaW50IGZvciBhIE5ldyBDb21wdXRpbmcg

SW5mcmFzdHJ1Y3R1cmU8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4s

IFNhbiBGcmFuY2lzY28sIENBPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+

PGZ1bGwtdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4sIFNhbiBGcmFuY2lzY28sIENBPC9mdWxsLXRp

dGxlPjwvcGVyaW9kaWNhbD48dm9sdW1lPjIxMTwvdm9sdW1lPjxkYXRlcz48eWVhcj4xOTk5PC95

ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+

Njk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjY5PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtl

eXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3

MDJ6Ij42OTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGlj

bGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJ

LjwvYXV0aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjxhdXRob3I+TmljaywgSi48

L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRv

cnM+PHRpdGxlcz48dGl0bGU+VGhlIFBoeXNpb2xvZ3kgb2YgdGhlIEdyaWQ6IEFuIE9wZW4gR3Jp

ZCBTZXJ2aWNlcyBBcmNoaXRlY3R1cmUgZm9yIERpc3RyaWJ1dGVkIFN5c3RlbXMgSW50ZWdyYXRp

b24sIEp1bmUgMjAwMjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJ

bmZyYXN0cnVjdHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3Rp

dGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJbmZyYXN0cnVj

dHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxkYXRl

cz48eWVhcj4yMDAyPC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk4

PC9ZZWFyPjxSZWNOdW0+NjI8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjYyPC9yZWMtbnVt

YmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNz

dHZweGRtZTJ0ejB2MmV3MDJ6Ij42Mjwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1l

PSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48

YXV0aG9yPkZvc3RlcixJYW48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1hbiwgQ2FybDwvYXV0aG9y

PjxhdXRob3I+VHN1ZGlrLCBHZW5lPC9hdXRob3I+PGF1dGhvcj5UdWVja2UsIFN0ZXZlbjwvYXV0

aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5BIFNlY3VyaXR5IEFy

Y2hpdGVjdHVyZSBmb3IgQ29tcHV0YXRpb25hbCBHcmlkczwvdGl0bGU+PHNlY29uZGFyeS10aXRs

ZT5Qcm9jZWVkaW5ncyBvZiB0aGUgNXRoIEFDTSBjb25mZXJlbmNlIG9uIENvbXB1dGVyIGFuZCBj

b21tdW5pY2F0aW9ucyBzZWN1cml0eTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj4xOTk4PC95ZWFyPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5TYW4gRnJhbmNpc2NvLCBDYWxp

Zm9ybmlhLCBVbml0ZWQgU3RhdGVzPC9wdWItbG9jYXRpb24+PHB1Ymxpc2hlcj5BQ008L3B1Ymxp

c2hlcj48bGFiZWw+U2VjdXJpdHk8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNv

dXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMjg4MDkwLjI4ODExMTwvZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+Rm9zdGVyPC9B

dXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj40ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+NDg8L2tleT48L2ZvcmVpZ24ta2V5

cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPkZvc3RlciwgSS48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1h

biwgQy48L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+VGhlIEFuYXRvbXkgb2YgdGhlIEdyaWQ6IEVuYWJsaW5n

IFNjYWxhYmxlIFZpcnR1YWwgT3JnYW5pemF0aW9uczwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5J

bnRlcm5hdGlvbmFsIEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L3NlY29u

ZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5JbnRlcm5hdGlvbmFs

IEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L2Z1bGwtdGl0bGU+PC9wZXJp

b2RpY2FsPjxwYWdlcz4yMDDigJMyMjI8L3BhZ2VzPjx2b2x1bWU+MTU8L3ZvbHVtZT48bnVtYmVy

PjM8L251bWJlcj48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5HcmlkPC9s

YWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA [2-5] make all these archives accessible to anyone at anywhere, allowing the creation, replication, and recreation of more data ADDIN EN.CITE <EndNote><Cite><Author>Graham</Author><Year>2005</Year><RecNum>52</RecNum><record><rec-number>52</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">52</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Graham, S. L.</style></author><author><style face="normal" font="Times New Roman" size="100%">Snir, M.</style></author><author><style face="normal" font="Times New Roman" size="100%">Patterson, C. A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Getting Up To Speed: The Future Of Supercomputing</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2005</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">National Academy Press</style></publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Graham</Author><Year>2005</Year><RecNum>52</RecNum><record><rec-number>52</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">52</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Graham, S. L.</style></author><author><style face="normal" font="Times New Roman" size="100%">Snir, M.</style></author><author><style face="normal" font="Times New Roman" size="100%">Patterson, C. A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Getting Up To Speed: The Future Of Supercomputing</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2005</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">National Academy Press</style></publisher><urls></urls></record></Cite></EndNote>[6]. People interested in analyzing the data sets are geographically dispersed as well. The scientific disciplines with the above characteristic are as diverse as high-energy physics and bioinformatics. To exemplify, petabytes of data generated by the Large Hadron Collider (LHC) experiment at European Council for Nuclear Research, Conseil Européen pour la Recherche Nucléaire (CERN), are required to be distributed worldwide. Another example is that the Pacific Northwest National Laboratory is building new Confocal microscopes with enhanced capabilities. High resolution video of the subject samples, which are typically protein molecules, are provided by these microscopes of which typical use of is multidisciplinary, requiring the data stream to be multicast to multiple scientists at multiple remote institutions. Within 6 months, 625 Mbps of data rates are expected per microscope. In addition to the microscopes, there is a proteomics simulation program that will be generating 5 petabytes of data annually, within the next 5 years ADDIN EN.CITE <EndNote><Cite><Author>Adams</Author><Year>2006</Year><RecNum>218</RecNum><record><rec-number>218</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">218</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Adams, P</author><author>Canon, S</author><author>Carter, S</author><author>Draney, B</author><author>Greenwald, M</author><author>Hodges, J</author><author>Lauret, J</author><author>Michaels, G</author><author>Rahn, L</author><author>Schissel, D</author><author>Strand, G</author><author>Walter, H</author><author>Wehner, M</author><author>Williams, D</author></authors></contributors><titles><title>Science-Driven Network Requirements for ESnet</title></titles><dates><year>2006</year></dates><publisher>LBNL--61832, Ernest Orlando Lawrence Berkeley NationalLaboratory, Berkeley, CA (US)</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Adams</Author><Year>2006</Year><RecNum>218</RecNum><record><rec-number>218</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">218</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Adams, P</author><author>Canon, S</author><author>Carter, S</author><author>Draney, B</author><author>Greenwald, M</author><author>Hodges, J</author><author>Lauret, J</author><author>Michaels, G</author><author>Rahn, L</author><author>Schissel, D</author><author>Strand, G</author><author>Walter, H</author><author>Wehner, M</author><author>Williams, D</author></authors></contributors><titles><title>Science-Driven Network Requirements for ESnet</title></titles><dates><year>2006</year></dates><publisher>LBNL--61832, Ernest Orlando Lawrence Berkeley NationalLaboratory, Berkeley, CA (US)</publisher><urls></urls></record></Cite></EndNote>[7].Consequently, bulk data transfer and management have become one of the immensely popular research fields in computational science. Particularly, for wide-area networks (WANs), a lot of work and solutions have been proposed. At the beginning, some of these works had only concentrated on data transmission aspect ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[8]. Solutions for data catalog and management drew researchers’ attention later. However, proposed systems with regard to data catalog and management were employed for only the data location discovery and they may not be functioning as collaboration framework. This dissertation is motivated by the need for a Peer-to-Peer based High Performance Data Transfer Framework that effectively combines “Data management and collaboration services” with “SOA principles”; evaluating the system design parameters in terms of simplicity, scalability, security, performance, and platform independency; and evaluating the influence these factors on overall infrastructure.MotivationThe number of the Internet users greatly increased with the dramatic expansion of the Internet over the past few years. As a consequence, high-performance networks with low-cost and powerful computational machines were proposed. This led to the genesis of new distributed computing infrastructure termed Computational and Data Grid. Computational and Data Grid is the base of large-scale distributed computing systems by interconnecting geographically distributed computational resources via very high-performance networks ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[9]. High performance data transfer techniques coupled with collaboration and data management is required for handling widely geographically dispersed data resources. However, existing solutions have shown limitations since most of their systems and unpublished protocols are incompatible with each other and these solutions are usually platform dependent solutions ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[8]. Firstly, existing solutions are built on the client-server architecture that makes them vulnerable to single point of failure and bottleneck problem under heavy load. In addition, most of the existing solutions focus on the problems of aggressive high performance data transfer rate and do not consider collaboration and optimal use of resources. Moreover, some of these techniques are data type centric solutions. Focusing on specific type of data makes this kind of techniques inflexible and impractical for systems with dynamic and various data types. With the ability of handling any data type, data transfer techniques based on peer-to-peer network might be remedy to the aforementioned shortcomings of existing solutions by making feasible effective resource (e.g. network, CPU, storage) usage by exploiting unutilized resources; however, very few efforts have yet been devoted to harness fully peer-to-peer network. Secondly, present data management systems are separate and heavy systems and they are tightly-coupled to their underlying data transfer mechanisms. Administrator tasks which require a great deal of the knowledge have been mainly been performed by people. There is a need for simple and lightweight data management frameworks requiring minimum administrator efforts.Thirdly, existing data management systems lack collaboration feature. As the large datasets are generated and users of them dynamically distributed, sharing, discovering, and transferring of these datasets are becoming more problematical. To this end, we see a greater need for a collaboration framework that is very valuable and needed for geographically dispersed scientific communities to escalate scientific research output. Finally, as it is evident that Service Oriented Architecture (SOA) ADDIN EN.CITE <EndNote><Cite><Author>Booth</Author><Year>2004</Year><RecNum>220</RecNum><record><rec-number>220</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">220</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Booth, D</author><author>Haas, H</author><author>McCabe, F</author><author>Newcomer, E</author><author>Champion, M</author><author>Ferris, C</author><author>Orchard, D</author></authors></contributors><titles><title>Web Services Architecture</title><secondary-title>W3C Working Group Note</secondary-title></titles><periodical><full-title>W3C Working Group Note</full-title></periodical><pages>2005-1</pages><volume>11</volume><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Booth</Author><Year>2004</Year><RecNum>220</RecNum><record><rec-number>220</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">220</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Booth, D</author><author>Haas, H</author><author>McCabe, F</author><author>Newcomer, E</author><author>Champion, M</author><author>Ferris, C</author><author>Orchard, D</author></authors></contributors><titles><title>Web Services Architecture</title><secondary-title>W3C Working Group Note</secondary-title></titles><periodical><full-title>W3C Working Group Note</full-title></periodical><pages>2005-1</pages><volume>11</volume><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[10] and its current implementation, Web services ADDIN EN.CITE <EndNote><Cite><Author>Channabasavaiah</Author><Year>2004</Year><RecNum>219</RecNum><record><rec-number>219</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">219</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Channabasavaiah, K</author><author>Holley, K</author><author>Tuggle, E</author></authors></contributors><titles><title>Migrating to a Service-oriented Architecture</title><secondary-title>IBM White Paper</secondary-title></titles><periodical><full-title>IBM White Paper</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Channabasavaiah</Author><Year>2004</Year><RecNum>219</RecNum><record><rec-number>219</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">219</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Channabasavaiah, K</author><author>Holley, K</author><author>Tuggle, E</author></authors></contributors><titles><title>Migrating to a Service-oriented Architecture</title><secondary-title>IBM White Paper</secondary-title></titles><periodical><full-title>IBM White Paper</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[11], will have profound impact on the next generation of distributed systems, it would be great opportunity to investigate challenges and benefits of exploiting SOA in a high performance bulk data transfer service.Use CasesOrganizations have resources (e.g. CPU power, network bandwidth capacity, disk performance) with widely varying characteristics. These characteristics determine the requirements for data management and transfer. We give a description of two sample use cases that are explanatory of the applicability of our proposed system.Replication: Replication is the process of copying data from one location to another to ensure consistency between redundant resources to improve reliability, fault-tolerance, or accessibility. Data transfer techniques based on peer-to-peer network architecture would convert machines which download data from master-source into active sources and enable to utilize their unused resources, particularly their network bandwidth capacity.Data sharing in systems with varying CPU power and network capacity: Only a few organizations have opportunity to have the super-powerful machines and very high-performance networks, yet almost all of them still desire to share their research results with geographically distributed participants. In fact, aggregation of average personal computer CPU power yields an astonishing computational power. Seti@home PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZXJ0aGltZXI8L0F1dGhvcj48WWVhcj4xOTk3PC9ZZWFy

PjxSZWNOdW0+MTQ0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE0NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+V2VydGhpbWVyLCBELjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvd2VyLCBTPC9z

dHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29iYiwgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdlZHll

LCBEPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kZXJzb24sIEQ8L3N0eWxlPjwvYXV0aG9yPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5TdWxsaXZhbiwgV1Q8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkEgTmV3IE1ham9yIFNFVEkgUHJvamVjdCBCYXNlZCBvbiBQcm9qZWN0

IFNlcmVuZGlwIERhdGEgYW5kIDEwMCwwMDAgUGVyc29uYWwgQ29tcHV0ZXJzPC9zdHlsZT48L3Rp

dGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEJpb2FzdHJvbm9teTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90

aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+MTk5Nzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxz

PjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJyaWFuPC9BdXRob3I+PFllYXI+QWNjZXNz

ZWQgb24tbGluZSAyMDA4PC9ZZWFyPjxSZWNOdW0+MTQyPC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj4xNDI8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0nRU4nIGRiLWlkPSdl

cmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnonPjE0Mjwva2V5PjwvZm9yZWlnbi1r

ZXlzPjxyZWYtdHlwZSBuYW1lPSdXZWIgUGFnZSc+MTI8L3JlZi10eXBlPjxjb250cmlidXRvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0n

VGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5UaGUgc2V0aUBob21lIHByb2plY3Qgd2ViIHNp

dGU8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAy

MDA4PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxl

IGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8v

c2V0aWF0aG9tZS5iZXJrZWxleS5lZHU8L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwv

QXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJl

ZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRv

cnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0

eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRv

LVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5

czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48

dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+

PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9p

c2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1u

dW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmlj

LXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZXJ0aGltZXI8L0F1dGhvcj48WWVhcj4xOTk3PC9ZZWFy

PjxSZWNOdW0+MTQ0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE0NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+V2VydGhpbWVyLCBELjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvd2VyLCBTPC9z

dHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29iYiwgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdlZHll

LCBEPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kZXJzb24sIEQ8L3N0eWxlPjwvYXV0aG9yPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5TdWxsaXZhbiwgV1Q8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkEgTmV3IE1ham9yIFNFVEkgUHJvamVjdCBCYXNlZCBvbiBQcm9qZWN0

IFNlcmVuZGlwIERhdGEgYW5kIDEwMCwwMDAgUGVyc29uYWwgQ29tcHV0ZXJzPC9zdHlsZT48L3Rp

dGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEJpb2FzdHJvbm9teTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90

aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+MTk5Nzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxz

PjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJyaWFuPC9BdXRob3I+PFllYXI+QWNjZXNz

ZWQgb24tbGluZSAyMDA4PC9ZZWFyPjxSZWNOdW0+MTQyPC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj4xNDI8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0nRU4nIGRiLWlkPSdl

cmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnonPjE0Mjwva2V5PjwvZm9yZWlnbi1r

ZXlzPjxyZWYtdHlwZSBuYW1lPSdXZWIgUGFnZSc+MTI8L3JlZi10eXBlPjxjb250cmlidXRvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0n

VGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5UaGUgc2V0aUBob21lIHByb2plY3Qgd2ViIHNp

dGU8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAy

MDA4PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxl

IGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8v

c2V0aWF0aG9tZS5iZXJrZWxleS5lZHU8L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwv

QXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJl

ZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRv

cnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0

eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRv

LVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5

czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48

dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+

PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9p

c2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1u

dW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmlj

LXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZXJ0aGltZXI8L0F1dGhvcj48WWVhcj4xOTk3PC9ZZWFy

PjxSZWNOdW0+MTQ0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE0NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+V2VydGhpbWVyLCBELjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvd2VyLCBTPC9z

dHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29iYiwgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdlZHll

LCBEPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kZXJzb24sIEQ8L3N0eWxlPjwvYXV0aG9yPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5TdWxsaXZhbiwgV1Q8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkEgTmV3IE1ham9yIFNFVEkgUHJvamVjdCBCYXNlZCBvbiBQcm9qZWN0

IFNlcmVuZGlwIERhdGEgYW5kIDEwMCwwMDAgUGVyc29uYWwgQ29tcHV0ZXJzPC9zdHlsZT48L3Rp

dGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEJpb2FzdHJvbm9teTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90

aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+MTk5Nzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxz

PjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJyaWFuPC9BdXRob3I+PFllYXI+QWNjZXNz

ZWQgb24tbGluZSAyMDA4PC9ZZWFyPjxSZWNOdW0+MTQyPC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj4xNDI8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0nRU4nIGRiLWlkPSdl

cmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnonPjE0Mjwva2V5PjwvZm9yZWlnbi1r

ZXlzPjxyZWYtdHlwZSBuYW1lPSdXZWIgUGFnZSc+MTI8L3JlZi10eXBlPjxjb250cmlidXRvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0n

VGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5UaGUgc2V0aUBob21lIHByb2plY3Qgd2ViIHNp

dGU8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAy

MDA4PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxl

IGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8v

c2V0aWF0aG9tZS5iZXJrZWxleS5lZHU8L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwv

QXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJl

ZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRv

cnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0

eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRv

LVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5

czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48

dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+

PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9p

c2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1u

dW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmlj

LXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [12-14] and Genome@home PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5MYXJzb248L0F1dGhvcj48WWVhcj4y

MDAzPC9ZZWFyPjxSZWNOdW0+MTQ1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDU8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0NTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJCb29rIFNlY3Rpb24iPjU8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkxhcnNvbiwgUyBNPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U25vdywgQyA8L3N0eWxl

PjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5QYW5kZSwgVlMgPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9j

b250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Nb2Rlcm4gTWV0aG9kcyBpbiBDb21wdXRhdGlvbmFs

IEJpb2xvZ3k8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PHNlY3Rpb24+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Gb2xkaW5nQEhvbWUgYW5k

IEdlbm9tZUBIb21lOiBVc2luZyBEaXN0cmlidXRlZCBDb21wdXRpbmcgdG8gVGFja2xlIFByZXZp

b3VzbHkgSW50cmFjdGFibGUgUHJvYmxlbXMgaW4gQ29tcHV0YXRpb25hbCBCaW9sb2d5PC9zdHls

ZT48L3NlY3Rpb24+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHB1Ymxp

c2hlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPkhvcml6b24gUHJlc3M8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29y

ZD48L0NpdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQz

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIGdlbm9tZUBob21lIHByb2plY3Qgd2ViIHNpdGU8L3N0

eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZv

bnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAyMDA4PC9z

dHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxlIGZhY2U9

J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8vZ2Vub21l

YXRob21lLnN0YW5mb3JkLmVkdS88L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48

L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5MYXJzb248L0F1dGhvcj48WWVhcj4y

MDAzPC9ZZWFyPjxSZWNOdW0+MTQ1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDU8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0NTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJCb29rIFNlY3Rpb24iPjU8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkxhcnNvbiwgUyBNPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U25vdywgQyA8L3N0eWxl

PjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5QYW5kZSwgVlMgPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9j

b250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Nb2Rlcm4gTWV0aG9kcyBpbiBDb21wdXRhdGlvbmFs

IEJpb2xvZ3k8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PHNlY3Rpb24+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Gb2xkaW5nQEhvbWUgYW5k

IEdlbm9tZUBIb21lOiBVc2luZyBEaXN0cmlidXRlZCBDb21wdXRpbmcgdG8gVGFja2xlIFByZXZp

b3VzbHkgSW50cmFjdGFibGUgUHJvYmxlbXMgaW4gQ29tcHV0YXRpb25hbCBCaW9sb2d5PC9zdHls

ZT48L3NlY3Rpb24+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHB1Ymxp

c2hlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPkhvcml6b24gUHJlc3M8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29y

ZD48L0NpdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQz

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIGdlbm9tZUBob21lIHByb2plY3Qgd2ViIHNpdGU8L3N0

eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZv

bnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAyMDA4PC9z

dHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxlIGZhY2U9

J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8vZ2Vub21l

YXRob21lLnN0YW5mb3JkLmVkdS88L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48

L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5MYXJzb248L0F1dGhvcj48WWVhcj4y

MDAzPC9ZZWFyPjxSZWNOdW0+MTQ1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDU8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0NTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJCb29rIFNlY3Rpb24iPjU8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkxhcnNvbiwgUyBNPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U25vdywgQyA8L3N0eWxl

PjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5QYW5kZSwgVlMgPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9j

b250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Nb2Rlcm4gTWV0aG9kcyBpbiBDb21wdXRhdGlvbmFs

IEJpb2xvZ3k8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PHNlY3Rpb24+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Gb2xkaW5nQEhvbWUgYW5k

IEdlbm9tZUBIb21lOiBVc2luZyBEaXN0cmlidXRlZCBDb21wdXRpbmcgdG8gVGFja2xlIFByZXZp

b3VzbHkgSW50cmFjdGFibGUgUHJvYmxlbXMgaW4gQ29tcHV0YXRpb25hbCBCaW9sb2d5PC9zdHls

ZT48L3NlY3Rpb24+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHB1Ymxp

c2hlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPkhvcml6b24gUHJlc3M8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29y

ZD48L0NpdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQz

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIGdlbm9tZUBob21lIHByb2plY3Qgd2ViIHNpdGU8L3N0

eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZv

bnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAyMDA4PC9z

dHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxlIGZhY2U9

J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8vZ2Vub21l

YXRob21lLnN0YW5mb3JkLmVkdS88L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48

L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [14-16] are the well-know projects tapped into this power. Similarly, aggregating parallel data streams in modest high-performance network produce very high performance data transfer capability. Almost all of the high-performance data transfer techniques utilize parallel data streaming in order to boost their performance. However, a peer-to-peer system, Bittorrent, has outperformed GridFTP, the de facto data transfer mechanism in many scientific communities, in network areas where only limited bandwidth is available ADDIN EN.CITE <EndNote><Cite><Author>Zissimos</Author><Year>2007</Year><RecNum>56</RecNum><record><rec-number>56</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">56</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zissimos, A.</author><author>Doka, K.</author><author>Chazapis, A.</author><author>Koziris, N.</author></authors></contributors><titles><title>GridTorrent: Optimizing data transfers in the Grid with collaborative sharing</title><secondary-title>11th Panhellenic Conference on Informatics (Patras, Greece, May 2007). PCI2007</secondary-title></titles><periodical><full-title>11th Panhellenic Conference on Informatics (Patras, Greece, May 2007). PCI2007</full-title></periodical><dates><year>2007</year></dates><label>GridTorrent</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zissimos</Author><Year>2007</Year><RecNum>56</RecNum><record><rec-number>56</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">56</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zissimos, A.</author><author>Doka, K.</author><author>Chazapis, A.</author><author>Koziris, N.</author></authors></contributors><titles><title>GridTorrent: Optimizing data transfers in the Grid with collaborative sharing</title><secondary-title>11th Panhellenic Conference on Informatics (Patras, Greece, May 2007). PCI2007</secondary-title></titles><periodical><full-title>11th Panhellenic Conference on Informatics (Patras, Greece, May 2007). PCI2007</full-title></periodical><dates><year>2007</year></dates><label>GridTorrent</label><urls></urls></record></Cite></EndNote>[17]. Thus, our lightweight system might perform well both on very high-performance networks and networks with limited bandwidth and can be deployed on any type of platform.Research IssuesIn this thesis, we describe the design and implementation of a peer-to-peer based high performance data transfer system architecture with data management and collaboration framework. We have thoroughly analyzed the system to determine how the system would respond and have presented benchmarks on different number of peers. A major goal of this thesis is to provide a simple and lightweight data transfer framework from which any size of scientific community would benefit.We now summarize the research issues we plan to address in this dissertation:How can a peer-to-peer bulk data transfer mechanism that utilizes SOA be built for scientific communities? Which one of the available peer-to-peer systems is best for this purpose and what type of modifications and new features should be added to it?How can a collaborative medium that allows participants to manage, share, discover, and download their contents be provided and integrated with data transfer mechanism?Is the data transfer mechanism scalable?How is the performance of data transfer mechanism and is it acceptable?What is the overhead of this system and is it reasonable?How can an adequate security mechanism be implemented in this system to meet the requirements of security of scientific communities, as security is not a concern in peer-to-peer networks for non-scientific communities?ContributionsIn this thesis, the expected contributions can be summarized as following. We will identify a novel system for collaboration framework for scientific community. We will also define the minimum set of requirements to build a collaboration framework dedicated to share and cooperate on users’ data with given access control rights. We will identify the additional essential features and services needed to be included into the selected best practice of peer-to-peer systems. Existing data transfer techniques focus on the problems of aggressive high performance data transfer rate and do not consider collaboration or optimal use of resources.There are some systems used for the data location discovery and they may not be functioning as collaboration framework. We are going to look into for determining the features for collaboration framework for scientific environment.Available high performance oriented data transfer techniques for scientific computing are broadly categorized File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP) based techniques. GridFTP ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[8] is an example of FTP based data transfer means. GridFTP is not fully portable, due to its implementation, for every platform; in fact, it is completely deployable only Unix/Linux operating systems installed machines Another data transfer technique is used in scientific community is GridHTTP ADDIN EN.CITE <EndNote><Cite><Author>McNab</Author><Year>2006</Year><RecNum>18</RecNum><record><rec-number>18</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">18</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>A. McNab</author><author>S. Kaushal</author><author>Yibiao Li</author></authors></contributors><titles><title>Web servers for bulk file transfer and storage </title><secondary-title>CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing)</secondary-title></titles><dates><year>2006</year><pub-dates><date>February 2006</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Tranfer Techniques</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>McNab</Author><Year>2006</Year><RecNum>18</RecNum><record><rec-number>18</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">18</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>A. McNab</author><author>S. Kaushal</author><author>Yibiao Li</author></authors></contributors><titles><title>Web servers for bulk file transfer and storage </title><secondary-title>CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing)</secondary-title></titles><dates><year>2006</year><pub-dates><date>February 2006</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Tranfer Techniques</label><urls></urls></record></Cite></EndNote>[18], which is implemented by adding new features like authentication and authorization to HTTP. There are some other techniques; however, they use GridFTP as the underlying data transfer mechanism.Peer to peer network structure providing optimal usage of resources is another technique for data moving. It is utilized as a data transfer method for non-scientific community to share mainly video, mp3, and game files. We can investigate existing peer to peer systems to find the most suitable candidate and to decide the essential features needed to be implemented to render the more suitable peer-to-peer system utilizable in scientific community by meeting the requirements of scientific data transfer such as security.In designing our architecture, we have identified the following requirements to build a collaborative framework with high-performance peer-to-peer based data transfer for Scientific Computing. First, the architecture should have a medium to let users to publish and subscribe to their contents. Second, the architecture should allow users to create a group or friend list in which they can add other users. Third, the system should enable users to set access control rights to a specific content for a specific user or groups due to great sensitivity attribute of scientific data. In order to provide a collaborative framework satisfying the requirements stated above, there are several issues that we will study and investigate in building our anization of the ThesisThis thesis entails nine chapters. In the next chapter, we briefly related work information on this area, for instance, GridFTP, Reliable File Transfer (RFT), and prominent peer-to-peer technologies. We will also give an overview of BitTorrent algorithm because it inspired us to implement our data transferring mechanism.In Chapter three, we give an overview of the overall architecture and explain shortly the main components of proposed system to provide a clear understanding of the whole system. In Chapter Four, we present the architecture of the first major component of the GridTorrent Framework (GTF), the GridTorrent Peer (GTP). The GTP is responsible for actual data sharing and transfer tasks. It has modular and layered structure so that it can be enhanced and maintained easily effortlessly. Each of its modules and layers is discussed in detail in this chapter.The details of collaboration and content manager module which is of paramount importance to data sharing and participant cooperation are given in Chapter five. Users can publish (i.e. make their contents available to other users) their contents and subscribe –content download process- to available contents through CCM. Similar to the structure of GTP, the structure of CCM is modular. At the beginning of the Chapter, the big picture of architecture is presented to demonstrate the general idea and principles. Its modules and layers are explored in the remainder of the chapter.The WS-Tracker is very essential part of the GTF and at the center of the whole system. Its major role is to orchestrate communications taking places among the GTF Clients through sending and receiving meta-data. Since our WS-Tracker is designed to serve for scientific community, it needs to satisfy their requirements such as security and access right control. As a result, it is more advanced than BitTorrent’s regular Tracker. Its architectural details and differences between them are explained in chapter six. In Chapter seven, we present the security issues and its implementation in the GTF. There are different security requirements at different communications happening between aforementioned components. It is very difficult to deploy all the security protocols, as well as it is availability of myriads of choices. Consequently, we had to choose some of them. We selected the Grid security infrastructure (GSI) as a security frame model to build our security component in GTF because not only do the characteristics of the Grid community fit our targeted user profile, but also it is one of the largest scientific communities in the world. Besides, it is proven, common standard, and its participants are exceptionally diverse and geographically dispersed. At the beginning of Chapter seven, we give short and historical overview of the GSI. The way GSI and other security schemes schemas are followed to implement secure the GTF components are explained in the remainder of the chapter.We introduce our prototype test results in Chapter Eight and provide detailed analysis for them. The tests were conducted in two types of computer networks: (1) LAN and (2) WAN. We have two different sets of scenarios. These tests and different scenarios help us to determine where the system performs well and proves to be useful and what the limits of the system are in terms of the maximum number of data seeds and clients that can be supported without a significant loss in performance.Finally in Chapter Nine, a very brief précis of thesis with the overall lessons learned from our study are provided and answers are given to the research questions identified in Chapter one. At the end of this chapter, we provide concluding remarks, the contribution of this thesis, and outline future research directions.Literature SurveyIntroductionA basic computer system consists of three fundamental services: data processing, data storing, and data transferring. Although all of these services are of equal importance, data transferring is the most appealing, functional and active one among three of them since it renders the data meaningful and useful by moving it from one place to another. The distance between the source and the destination of the data which will be transferred ranges from few millimicrons to a few terrameters ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>98</RecNum><record><rec-number>98</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>98</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title><style face='normal' font='Times New Roman' size='100%'>Voyager, The Interstellar Mission:</style></title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[19]; hence, application fields of data transferring are much more diverse than that of others. It is natural that each system has widely varying characteristics with respect to data and conveyance of data such as size, importance, and security of data and medium of transmission; therefore, these characteristics require different methods and apparatus for the data transmission. For instance, the size of data at Level1 cache is only few KB and data loss probability is nearly impossible while transferring data from Level1 cache to central processing unit (CPU). The transmission time only takes few CPU cycles. On the other hand, transferring data from one computer to another one on wide area network may take seconds to hours or maybe days depending on the size of data, capacity of bandwidth, and physical distance between source and destination. Another extreme example is data transmission from Voyager 1 ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>98</RecNum><record><rec-number>98</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>98</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title><style face='normal' font='Times New Roman' size='100%'>Voyager, The Interstellar Mission:</style></title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[19] to Earth. The Voyager 1 spacecraft, launched on September 5, 1977, is a robotic space probe that was sent for an expedition to Jupiter, Saturn, Uranus, Neptune and the outer solar system and beyond. It is over 16 billion kilometers from the Sun as of May 9, 2008. It returns its data through the Deep Space Network (DNS) with X band transmitter that provides downlink telemetry at 160 bit/s normally and 1.4 kbit/s for playback of high-rate plasma wave data. It is expected that Voyager 1 will continue to return valuable data until at least 2025 ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>98</RecNum><record><rec-number>98</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">98</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Voyager, The Interstellar Mission:</style></title></titles><dates><year>2008</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">99</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Voyager I</title></titles><dates></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">100</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Voyager Program</style></title></titles><dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>98</RecNum><record><rec-number>98</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">98</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Voyager, The Interstellar Mission:</style></title></titles><dates><year>2008</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">99</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Voyager I</title></titles><dates></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">100</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Voyager Program</style></title></titles><dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[19-21].Another important example of data transfer technique is utilized in wide-area-network (WAN) environments and being part of this thesis subject as well. This type of data transfer has been gaining great importance because of the dramatic expansion of the Internet in recent years, availability of low-cost high-performance powerful computational engines, production of huge amount of data –either raw or processed– by scientific gadgets, and interconnection of geographically distributed computational resources via very high-performance networks ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[22]. These factors have given rise to development of a new set of technologies termed Computational Grid ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[22]. The appearance of Computational Grid resulted in dramatic increase in state-of-the-art high performance distributed applications. For high volume data transfer in WAN type of computer networks, a lot of work and solutions have been proposed. At the beginning, some of these works had only concentrated on data transmission aspect ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[8]. Solutions for data catalog and management drew researchers’ attention later. However, those systems the results of studies in the area of data catalog and management are utilized for only the data location discovery and they may not be functioning as collaboration framework. Although some of these existing data transfer techniques may be considered successful, most of their systems and unpublished protocols are incompatible with each other and they are dispersed solutions ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[8]. Moreover, they focus on the problems of aggressive high performance data transfer rate and do not take into consideration of collaboration and optimum use of resources seriously. In addition, they failed to harness fully newly emerged technology such as peer-to-peer network. As a result, there is still a need for new solutions to address above requirements. The objective of this thesis is to leverage data transferring mechanism in distributed systems for achieving fast and economical data transmission by exploiting peer-to-peer protocol -BitTorrent algorithm- and providing collaboration framework. In this chapter, we present an overview of the various strategies relevant to our work. OverviewData-intensive applications have gained widespread attentions and become more prevalent with the infrastructure provided by computational grid, and in consequence there is a growing need for the efficient management and transfer of information, in terabyte-scale or even petabyte-scale, in wide-area computing environments ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2002</Year><RecNum>80</RecNum><record><rec-number>80</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">80</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Allcock, B.</author><author>Bester, J.</author><author>Bresnahan, J.</author><author>Chervenak, A. L.</author><author>Foster, I.</author><author>Kesselman, C.</author><author>Meder, S.</author><author>Nefedova, V.</author><author>Quesnel, D.</author><author>Tuecke, S.</author></authors></contributors><titles><title>Data Management and Transfer in High Performance Computational Grid Environments</title><secondary-title>Parallel Computing</secondary-title></titles><periodical><full-title>Parallel Computing</full-title></periodical><pages>749-771</pages><volume>28</volume><number>5</number><dates><year>2002</year><pub-dates><date>May</date></pub-dates></dates><label>Data Management</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2002</Year><RecNum>80</RecNum><record><rec-number>80</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">80</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Allcock, B.</author><author>Bester, J.</author><author>Bresnahan, J.</author><author>Chervenak, A. L.</author><author>Foster, I.</author><author>Kesselman, C.</author><author>Meder, S.</author><author>Nefedova, V.</author><author>Quesnel, D.</author><author>Tuecke, S.</author></authors></contributors><titles><title>Data Management and Transfer in High Performance Computational Grid Environments</title><secondary-title>Parallel Computing</secondary-title></titles><periodical><full-title>Parallel Computing</full-title></periodical><pages>749-771</pages><volume>28</volume><number>5</number><dates><year>2002</year><pub-dates><date>May</date></pub-dates></dates><label>Data Management</label><urls></urls></record></Cite></EndNote>[23]. There are many aspects that can be used to categorize data transfer techniques; the place where they operate, the characteristics of their communication over an IP structure (e.g., point-to-point, multicast, peercasting), their design architecture (e.g., client/server, peer-to-peer), and the characteristics of data that they used for to name a few. Since the operating place is the relatively broader and the most accepted perspective, we, as well, categorized them with respect to their operating places. Data transferring techniques can be deployed at network-level, system-level, or application-level. The data movement technologies at network-level, as the name implies, are network-based solutions and they are categorized into NAS and SAN ADDIN EN.CITE <EndNote><Cite><Author>Gibson</Author><Year>2000</Year><RecNum>103</RecNum><record><rec-number>103</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">103</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gibson, GA</author><author>Van Meter, R</author></authors></contributors><titles><title>Network Attached Storage Architecture</title><secondary-title>Communications of the ACM</secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages>37-45</pages><volume>43</volume><number>11</number><dates><year>2000</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gibson</Author><Year>2000</Year><RecNum>103</RecNum><record><rec-number>103</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">103</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gibson, GA</author><author>Van Meter, R</author></authors></contributors><titles><title>Network Attached Storage Architecture</title><secondary-title>Communications of the ACM</secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages>37-45</pages><volume>43</volume><number>11</number><dates><year>2000</year></dates><urls></urls></record></Cite></EndNote>[24]. There are certain similarities between system-level and application-level data transfer techniques; both of them involve endeavors in order to overcome the limitations of Transmission Control Protocol (TCP) ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. However, they adopt different approaches to cope with the limitations of TCP. The system-level solutions usually include modifications to the operating systems of the machine, of the network apparatus, or of both ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. These techniques sometimes require development of new versions of TCP such as Selective Acknowledgment TCP ADDIN EN.CITE <EndNote><Cite><Author>Mathis</Author><Year>1996</Year><RecNum>106</RecNum><record><rec-number>106</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">106</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Mathis, M</author><author>Mahdavi, J</author><author>Floyd, S</author><author>Romanow, A</author></authors></contributors><titles><title>RFC2018: TCP Selective Acknowledgement Options</title><secondary-title>RFC Editor United States</secondary-title></titles><periodical><full-title>RFC Editor United States</full-title></periodical><dates><year>1996</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Mathis</Author><Year>1996</Year><RecNum>106</RecNum><record><rec-number>106</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">106</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Mathis, M</author><author>Mahdavi, J</author><author>Floyd, S</author><author>Romanow, A</author></authors></contributors><titles><title>RFC2018: TCP Selective Acknowledgement Options</title><secondary-title>RFC Editor United States</secondary-title></titles><periodical><full-title>RFC Editor United States</full-title></periodical><dates><year>1996</year></dates><urls></urls></record></Cite></EndNote>[26], High Speed TCP ADDIN EN.CITE <EndNote><Cite><Author>Floyd</Author><Year>2003</Year><RecNum>107</RecNum><record><rec-number>107</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">107</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Floyd, Sally</author></authors></contributors><titles><title>RFC3649: HighSpeed TCP for Large Congestion Windows</title><secondary-title>Internet RFCs</secondary-title></titles><periodical><full-title>Internet RFCs</full-title></periodical><dates><year>2003</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Floyd</Author><Year>2003</Year><RecNum>107</RecNum><record><rec-number>107</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">107</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Floyd, Sally</author></authors></contributors><titles><title>RFC3649: HighSpeed TCP for Large Congestion Windows</title><secondary-title>Internet RFCs</secondary-title></titles><periodical><full-title>Internet RFCs</full-title></periodical><dates><year>2003</year></dates><urls></urls></record></Cite></EndNote>[27], and Scalable TCP ADDIN EN.CITE <EndNote><Cite><Author>Kelly</Author><Year>2003</Year><RecNum>104</RecNum><record><rec-number>104</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">104</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Kelly, Tom</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Scalable TCP: Improving Performance in High Speed Wide Area Networks</style></title><secondary-title><style face="italic" font="Times New Roman" size="100%">of First International Workshop on Protocols for Fast Long-Distance Networks</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">February 2003</style></date></pub-dates></dates><pub-location><style face="normal" font="Times New Roman" size="100%">CERN, Geneva, Switzerland</style></pub-location><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Kelly</Author><Year>2003</Year><RecNum>104</RecNum><record><rec-number>104</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">104</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Kelly, Tom</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Scalable TCP: Improving Performance in High Speed Wide Area Networks</style></title><secondary-title><style face="italic" font="Times New Roman" size="100%">of First International Workshop on Protocols for Fast Long-Distance Networks</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">February 2003</style></date></pub-dates></dates><pub-location><style face="normal" font="Times New Roman" size="100%">CERN, Geneva, Switzerland</style></pub-location><urls></urls></record></Cite></EndNote>[28]. In order to accomplish some of those modifications, the privilege of system’s super user is required. Unlike application-level solutions, both network and system-level solutions can yield very good performance. In exchange, they usually require substantial costly upgrades/updates of the networking structure, and considerable system-level modifications. In spite of their better performance, they suffer from the distance limitations and high network cost.Application-level techniques, on the other hand, attempt to overcome the limitations of high bandwidth delay product networks by using software based techniques such as exploiting parallel streams, increasing TCP window size when it possible, or employing rate-based control algorithms ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. Application-level solutions are based on either TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. They have much broader use because they do not require any system or network level modifications or upgrades to deploy them. After our extensive survey of the data movement techniques, we must acknowledge that there has been a tremendous amount of research with regard to the development of application level data transfer protocols; thus, it is impossible to cover all types of data transfer techniques and solutions in spite of our best efforts. System-level Data Movement TechniquesThe system-level solutions usually include modifications to the operating systems of the machine, of the network apparatus, or of both ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. Group Transport Protocol for Lambda-Grids (GTP) PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA [29] is a good example of system-level data delivery techniques. The development team of GTP focused on achieving high performance in complex network structures in lambda-grids PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA [29]. Multicast data delivery and shifting the rate and congestion control to end-points were their motivations to develop receiver-driven transport protocol PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA [29]. Even though, it is a software package, operating on TCP and UDP, it is specific for Lambda Grids and requires very high speed dedicated links. A Lambda-Grid is a set of distributed resources directly connected with Dense Wavelength Division Multiplexing (DWDM) links PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA [29]. DWDM is a technology that multiplexes multiple optical carrier signals on a single optical fiber by using different wavelengths of laser light.Application-level Data Movement TechniquesHaving communication links cover a large geographic area subjects the wide-area networks (WAN) to very high round-trip latencies. It is because of this that they are often termed high Bandwidth Delay Product (BDP) network ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. TCP is the most widely used protocol in the Internet and de facto data transmission protocol on any type of computer networks including WAN for reliable data movement. However, it substantially underutilizes network bandwidth over high-speed connections with long delays because TCP employs its window size as the congestion control techniques PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA [29] in order to impose a limit on the amount of data it will send before it waits for an acknowledgement ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. This is because traditional TCP and its variants were developed for shared networks where the bandwidth on internal links is a critical and limited resource. Hence, as stated in PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XdTwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xMzg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEzODwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTM4PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVu

Y2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5XdSwgUi4gWC48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5DaGllbiwgQS4gQS48L3N0eWxlPjwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdUUDogR3JvdXAg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBMYW1iZGEtR3JpZHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkNsdXN0ZXIgQ29tcHV0aW5nIGFuZCB0aGUgR3JpZCwgMjAwNC4gQ0NHcmlkIDIw

MDQuIElFRUUgSW50ZXJuYXRpb25hbCBTeW1wb3NpdW0gb248L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjxhbHQtdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5DbHVzdGVyIENvbXB1dGluZyBhbmQgdGhlIEdyaWQsIDIwMDQuIENDR3Jp

ZCAyMDA0LiBJRUVFIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uPC9zdHlsZT48L2FsdC10aXRs

ZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMjgtMjM4PC9zdHlsZT48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29y

ZD5kYXRhIGNvbW11bmljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JpZCBjb21wdXRpbmc8L2tl

eXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48a2V5d29yZD50

ZWxlY29tbXVuaWNhdGlvbiBjb25nZXN0aW9uIGNvbnRyb2w8L2tleXdvcmQ+PGtleXdvcmQ+dGVs

ZWNvbW11bmljYXRpb24gdHJhZmZpYzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJvdG9j

b2xzPC9rZXl3b3JkPjxrZXl3b3JkPndhdmVsZW5ndGggZGl2aXNpb24gbXVsdGlwbGV4aW5nPC9r

ZXl3b3JkPjxrZXl3b3JkPndvcmtzdGF0aW9uIGNsdXN0ZXJzPC9rZXl3b3JkPjxrZXl3b3JkPkRX

RE08L2tleXdvcmQ+PGtleXdvcmQ+R1RQPC9rZXl3b3JkPjxrZXl3b3JkPmNvbnRlbnRpb248L2tl

eXdvcmQ+PGtleXdvcmQ+Y29udmVyZ2luZyBmbG93czwva2V5d29yZD48a2V5d29yZD5kZW5zZSB3

YXZlbGVuZ3RoIGRpdmlzaW9uIG11bHRpcGxleGluZzwva2V5d29yZD48a2V5d29yZD5lbmQgc3lz

dGVtIGNvbnRlbnRpb248L2tleXdvcmQ+PGtleXdvcmQ+Z3JvdXAgdHJhbnNwb3J0IHByb3RvY29s

PC9rZXl3b3JkPjxrZXl3b3JkPmxhbWJkYS1Hcmlkczwva2V5d29yZD48a2V5d29yZD5tdWx0aXBs

ZSBmbG93czwva2V5d29yZD48a2V5d29yZD5tdWx0aXBvaW50LXRvLXBvaW50IGRhdGEgbW92ZW1l

bnQ8L2tleXdvcmQ+PGtleXdvcmQ+b3B0aWNhbCBwYXRoczwva2V5d29yZD48a2V5d29yZD5wZXJm

b3JtYW5jZTwva2V5d29yZD48a2V5d29yZD5yYXRlLWJhc2VkIGV4cGxpY2l0IGZsb3cgY29udHJv

bDwva2V5d29yZD48a2V5d29yZD5yZWNlaXZlci1jZW50cmljIG1heC1taW4gZmFpciByYXRlIGFs

bG9jYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cmVxdWVzdC1yZXNwb25zZSBkYXRhIHRyYW5zZmVy

IG1vZGVsPC9rZXl3b3JkPjxrZXl3b3JkPnRocm91Z2hwdXQ8L2tleXdvcmQ+PC9rZXl3b3Jkcz48

ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNv

cmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA [29], accomplishing high performance data transfer in high BDP networks is a long-standing research challenge for point-to-point data transfer.TCP -based Data Movement TechniquesAll TCP-based data transfer techniques use TCP connections to overcome TCP’s window size problems by using parallel streams. In this method, an aggregated congestion window is acquired so as to be able to fully utilize the available capacity provided by the high BDP network. In other words, the larger congestion window size, the higher the throughput ADDIN EN.CITE <EndNote><Cite><Author>Zhang</Author><Year>1998</Year><RecNum>32</RecNum><record><rec-number>32</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">32</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zhang, Y.</author><author>Yan, E.</author><author>Dao, S.</author></authors></contributors><titles><title>A Measurement of TCP over Long-Delay Network</title><secondary-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</secondary-title></titles><periodical><full-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</full-title></periodical><dates><year>1998</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zhang</Author><Year>1998</Year><RecNum>32</RecNum><record><rec-number>32</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">32</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zhang, Y.</author><author>Yan, E.</author><author>Dao, S.</author></authors></contributors><titles><title>A Measurement of TCP over Long-Delay Network</title><secondary-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</secondary-title></titles><periodical><full-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</full-title></periodical><dates><year>1998</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote>[30].As the classic File Transfer Protocol ADDIN EN.CITE <EndNote><Cite><Author>Postel</Author><Year>1985</Year><RecNum>109</RecNum><record><rec-number>109</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">109</key></foreign-keys><ref-type name="Standard">58</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Postel, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Reynolds, J</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">File Transfer Protocol (FTP)</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">RFC Editor United States</style></secondary-title></titles><periodical><full-title>RFC Editor United States</full-title></periodical><dates><year><style face="normal" font="Times New Roman" size="100%">1985</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">STD 9, RFC 959, October 1985</style></publisher><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Postel</Author><Year>1985</Year><RecNum>109</RecNum><record><rec-number>109</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">109</key></foreign-keys><ref-type name="Standard">58</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Postel, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Reynolds, J</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">File Transfer Protocol (FTP)</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">RFC Editor United States</style></secondary-title></titles><periodical><full-title>RFC Editor United States</full-title></periodical><dates><year><style face="normal" font="Times New Roman" size="100%">1985</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">STD 9, RFC 959, October 1985</style></publisher><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[31] (FTP) is the most common protocol used for bulk data transfer on the Internet ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>102</RecNum><record><rec-number>102</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>102</RecNum><record><rec-number>102</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[32]. It is a well-understood IETF standard and widely implemented protocol, and it supports dynamic discovery of the extensions ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[22]. Most TCP-based Data transfer techniques, therefore, are the derivations of the classic File Transfer Protocol (FTP); for instance, GridFTP ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>102</RecNum><record><rec-number>102</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>102</RecNum><record><rec-number>102</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[32] and bbFTP ADDIN EN.CITE <EndNote><Cite><Author>Bonachea</Author><Year>2008</Year><RecNum>91</RecNum><record><rec-number>91</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>91</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>bbFTP --Large files transfer protocol </title></titles><dates><pub-dates><date>2005</date></pub-dates></dates><urls><related-urls><url>;[33]. The Secure Copy Protocol ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>110</RecNum><record><rec-number>110</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>110</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title><style face='normal' font='Times New Roman' size='100%'>Secure Copy-</style></title></titles><dates><year><style face='normal' font='Times New Roman' size='100%'>2007</style></year></dates><urls><related-urls><url><style face='normal' font='Times New Roman' size='100%'>;[34] (SCP) is another data transfer tool provided by Unix/Linux based operating systems. The Babar Copy Program ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote>[35] (bbcp) is an example of data movement technique implemented based on the peer-to-peer architecture.GridFTPGridFTP is a common data transfer and access protocol that extends the standard FTP protocol. The standard FTP protocol does not meet the key features necessary to Grid applications such as advanced security support, third-party control of data transfer and striped data transfer. In order to make GridFTP a high-performance, secure, reliable data transfer protocol PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjEwMjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTAyPC9yZWMtbnVtYmVyPjxm

b3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRt

ZTJ0ejB2MmV3MDJ6Ij4xMDI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iUmVw

b3J0Ij4yNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywg

V2lsbGlhbSBFLiA8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkdyaWRGVFA6IFByb3RvY29sIEV4dGVuc2lvbnMgdG8gRlRQIGZvciB0aGUgR3Jp

ZDwvc3R5bGU+PC90aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAzPC9zdHlsZT48L3llYXI+

PHB1Yi1kYXRlcz48ZGF0ZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkFwcmlsPC9zdHlsZT48L2RhdGU+PC9wdWItZGF0ZXM+PC9kYXRlcz48

dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+QWxsY29jazwvQXV0aG9y

PjxZZWFyPjIwMDU8L1llYXI+PFJlY051bT4xMTE8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVy

PjExMTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSdFTicgZGItaWQ9J2VyZWY5

cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeic+MTExPC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9J0NvbmZlcmVuY2UgUHJvY2VlZGluZ3MnPjEwPC9yZWYtdHlwZT48Y29u

dHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+QWxsY29jaywgVzwvYXV0aG9yPjxhdXRob3I+QnJl

c25haGFuLCBKPC9hdXRob3I+PGF1dGhvcj5LZXR0aW11dGh1LCBSPC9hdXRob3I+PGF1dGhvcj5M

aW5rLCBNPC9hdXRob3I+PGF1dGhvcj5EdW1pdHJlc2N1LCBDPC9hdXRob3I+PGF1dGhvcj5SYWlj

dSwgSTwvYXV0aG9yPjxhdXRob3I+Rm9zdGVyLCBJPC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPlRoZSBHbG9idXMgU3RyaXBlZCBHcmlkRlRQIEZyYW1ld29y

ayBhbmQgU2VydmVyPC90aXRsZT48L3RpdGxlcz48dm9sdW1lPjIwMDU8L3ZvbHVtZT48ZGF0ZXM+

PHllYXI+MjAwNTwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENp

dGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ5PC9S

ZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj40OTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxr

ZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+

NDk8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4x

NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkFsbGNvY2ssIEIuPC9h

dXRob3I+PGF1dGhvcj5CZXN0ZXIsIEouPC9hdXRob3I+PGF1dGhvcj5CcmVzbmFoYW4sIEouPC9h

dXRob3I+PGF1dGhvcj5DaGVydmVuYWssIEEuPC9hdXRob3I+PGF1dGhvcj5Gb3N0ZXIsIEkuPC9h

dXRob3I+PGF1dGhvcj5LZXNzZWxtYW4sIEMuPC9hdXRob3I+PGF1dGhvcj5NZWRlciwgUy48L2F1

dGhvcj48YXV0aG9yPk5lZmVkb3ZhLCBWLjwvYXV0aG9yPjxhdXRob3I+UXVlc25lbCwgRC48L2F1

dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+

PHRpdGxlcz48dGl0bGU+U2VjdXJlLCBFZmZpY2llbnQgRGF0YSBUcmFuc3BvcnQgYW5kIFJlcGxp

Y2EgTWFuYWdlbWVudCBmb3IgSGlnaC1QZXJmb3JtYW5jZSBEYXRhLUludGVuc2l2ZSBDb21wdXRp

bmc8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+SUVFRSBNYXNzIFN0b3JhZ2UgQ29uZmVyZW5jZTwv

c2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPklFRUUgTWFz

cyBTdG9yYWdlIENvbmZlcmVuY2U8L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjx2b2x1bWU+MjA8

L3ZvbHVtZT48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5EYXRhIE1hbmFn

ZW1lbnQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjEwMjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTAyPC9yZWMtbnVtYmVyPjxm

b3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRt

ZTJ0ejB2MmV3MDJ6Ij4xMDI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iUmVw

b3J0Ij4yNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywg

V2lsbGlhbSBFLiA8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkdyaWRGVFA6IFByb3RvY29sIEV4dGVuc2lvbnMgdG8gRlRQIGZvciB0aGUgR3Jp

ZDwvc3R5bGU+PC90aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAzPC9zdHlsZT48L3llYXI+

PHB1Yi1kYXRlcz48ZGF0ZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkFwcmlsPC9zdHlsZT48L2RhdGU+PC9wdWItZGF0ZXM+PC9kYXRlcz48

dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+QWxsY29jazwvQXV0aG9y

PjxZZWFyPjIwMDU8L1llYXI+PFJlY051bT4xMTE8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVy

PjExMTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSdFTicgZGItaWQ9J2VyZWY5

cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeic+MTExPC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9J0NvbmZlcmVuY2UgUHJvY2VlZGluZ3MnPjEwPC9yZWYtdHlwZT48Y29u

dHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+QWxsY29jaywgVzwvYXV0aG9yPjxhdXRob3I+QnJl

c25haGFuLCBKPC9hdXRob3I+PGF1dGhvcj5LZXR0aW11dGh1LCBSPC9hdXRob3I+PGF1dGhvcj5M

aW5rLCBNPC9hdXRob3I+PGF1dGhvcj5EdW1pdHJlc2N1LCBDPC9hdXRob3I+PGF1dGhvcj5SYWlj

dSwgSTwvYXV0aG9yPjxhdXRob3I+Rm9zdGVyLCBJPC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPlRoZSBHbG9idXMgU3RyaXBlZCBHcmlkRlRQIEZyYW1ld29y

ayBhbmQgU2VydmVyPC90aXRsZT48L3RpdGxlcz48dm9sdW1lPjIwMDU8L3ZvbHVtZT48ZGF0ZXM+

PHllYXI+MjAwNTwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENp

dGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ5PC9S

ZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj40OTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxr

ZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+

NDk8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4x

NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkFsbGNvY2ssIEIuPC9h

dXRob3I+PGF1dGhvcj5CZXN0ZXIsIEouPC9hdXRob3I+PGF1dGhvcj5CcmVzbmFoYW4sIEouPC9h

dXRob3I+PGF1dGhvcj5DaGVydmVuYWssIEEuPC9hdXRob3I+PGF1dGhvcj5Gb3N0ZXIsIEkuPC9h

dXRob3I+PGF1dGhvcj5LZXNzZWxtYW4sIEMuPC9hdXRob3I+PGF1dGhvcj5NZWRlciwgUy48L2F1

dGhvcj48YXV0aG9yPk5lZmVkb3ZhLCBWLjwvYXV0aG9yPjxhdXRob3I+UXVlc25lbCwgRC48L2F1

dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+

PHRpdGxlcz48dGl0bGU+U2VjdXJlLCBFZmZpY2llbnQgRGF0YSBUcmFuc3BvcnQgYW5kIFJlcGxp

Y2EgTWFuYWdlbWVudCBmb3IgSGlnaC1QZXJmb3JtYW5jZSBEYXRhLUludGVuc2l2ZSBDb21wdXRp

bmc8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+SUVFRSBNYXNzIFN0b3JhZ2UgQ29uZmVyZW5jZTwv

c2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPklFRUUgTWFz

cyBTdG9yYWdlIENvbmZlcmVuY2U8L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjx2b2x1bWU+MjA8

L3ZvbHVtZT48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5EYXRhIE1hbmFn

ZW1lbnQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjEwMjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTAyPC9yZWMtbnVtYmVyPjxm

b3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRt

ZTJ0ejB2MmV3MDJ6Ij4xMDI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iUmVw

b3J0Ij4yNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywg

V2lsbGlhbSBFLiA8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkdyaWRGVFA6IFByb3RvY29sIEV4dGVuc2lvbnMgdG8gRlRQIGZvciB0aGUgR3Jp

ZDwvc3R5bGU+PC90aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAzPC9zdHlsZT48L3llYXI+

PHB1Yi1kYXRlcz48ZGF0ZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkFwcmlsPC9zdHlsZT48L2RhdGU+PC9wdWItZGF0ZXM+PC9kYXRlcz48

dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+QWxsY29jazwvQXV0aG9y

PjxZZWFyPjIwMDU8L1llYXI+PFJlY051bT4xMTE8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVy

PjExMTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSdFTicgZGItaWQ9J2VyZWY5

cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeic+MTExPC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9J0NvbmZlcmVuY2UgUHJvY2VlZGluZ3MnPjEwPC9yZWYtdHlwZT48Y29u

dHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+QWxsY29jaywgVzwvYXV0aG9yPjxhdXRob3I+QnJl

c25haGFuLCBKPC9hdXRob3I+PGF1dGhvcj5LZXR0aW11dGh1LCBSPC9hdXRob3I+PGF1dGhvcj5M

aW5rLCBNPC9hdXRob3I+PGF1dGhvcj5EdW1pdHJlc2N1LCBDPC9hdXRob3I+PGF1dGhvcj5SYWlj

dSwgSTwvYXV0aG9yPjxhdXRob3I+Rm9zdGVyLCBJPC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPlRoZSBHbG9idXMgU3RyaXBlZCBHcmlkRlRQIEZyYW1ld29y

ayBhbmQgU2VydmVyPC90aXRsZT48L3RpdGxlcz48dm9sdW1lPjIwMDU8L3ZvbHVtZT48ZGF0ZXM+

PHllYXI+MjAwNTwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENp

dGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ5PC9S

ZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj40OTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxr

ZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+

NDk8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4x

NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkFsbGNvY2ssIEIuPC9h

dXRob3I+PGF1dGhvcj5CZXN0ZXIsIEouPC9hdXRob3I+PGF1dGhvcj5CcmVzbmFoYW4sIEouPC9h

dXRob3I+PGF1dGhvcj5DaGVydmVuYWssIEEuPC9hdXRob3I+PGF1dGhvcj5Gb3N0ZXIsIEkuPC9h

dXRob3I+PGF1dGhvcj5LZXNzZWxtYW4sIEMuPC9hdXRob3I+PGF1dGhvcj5NZWRlciwgUy48L2F1

dGhvcj48YXV0aG9yPk5lZmVkb3ZhLCBWLjwvYXV0aG9yPjxhdXRob3I+UXVlc25lbCwgRC48L2F1

dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+

PHRpdGxlcz48dGl0bGU+U2VjdXJlLCBFZmZpY2llbnQgRGF0YSBUcmFuc3BvcnQgYW5kIFJlcGxp

Y2EgTWFuYWdlbWVudCBmb3IgSGlnaC1QZXJmb3JtYW5jZSBEYXRhLUludGVuc2l2ZSBDb21wdXRp

bmc8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+SUVFRSBNYXNzIFN0b3JhZ2UgQ29uZmVyZW5jZTwv

c2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPklFRUUgTWFz

cyBTdG9yYWdlIENvbmZlcmVuY2U8L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjx2b2x1bWU+MjA8

L3ZvbHVtZT48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5EYXRhIE1hbmFn

ZW1lbnQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA [32, 36, 37], the GridFTP development team has defined new extensions to enhance the standard FTP by providing new features. The GridFTP protocol includes the following features that are new extensions to the standard FTP:Grid Security Infrastructure (GSI) and Kerberos support: Security is one of the crucial features required in Grid computing when transferring or managing files. To meet the security requirements, GridFTP implemented the GSS API extensions defined in RFC 2228 (FTP Security Extensions) PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjkzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj45MzwvcmVjLW51bWJlcj48Zm9y

ZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUy

dHowdjJldzAyeiI+OTM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iUmVwb3J0

Ij4yNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywgIFcu

IDwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxl

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

R3JpZEZUUCBQcm90b2NvbCBTcGVjaWZpY2F0aW9uIChHbG9iYWwgR3JpZCBGb3J1bSBSZWNvbW1l

bmRhdGlvbiBHRkQuMjApPC9zdHlsZT48L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8

L3N0eWxlPjwveWVhcj48L2RhdGVzPjx1cmxzPjxyZWxhdGVkLXVybHM+PHVybD48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPmh0dHA6Ly93d3cu

Z2xvYnVzLm9yZy9hbGxpYW5jZS9wdWJsaWNhdGlvbnMvcGFwZXJzL0dGRC1SLjAyMDEucGRmPC9z

dHlsZT48L3VybD48L3JlbGF0ZWQtdXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxB

dXRob3I+QWxsY29jazwvQXV0aG9yPjxZZWFyPjIwMDM8L1llYXI+PFJlY051bT4xMDI8L1JlY051

bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEwMjwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkg

YXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTAy

PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IlJlcG9ydCI+Mjc8L3JlZi10eXBl

Pjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFsbGNvY2ssIFdpbGxpYW0gRS4gPC9zdHls

ZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxl

IGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5HcmlkRlRQ

OiBQcm90b2NvbCBFeHRlbnNpb25zIHRvIEZUUCBmb3IgdGhlIEdyaWQ8L3N0eWxlPjwvdGl0bGU+

PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjxwdWItZGF0ZXM+PGRhdGU+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5B

cHJpbDwvc3R5bGU+PC9kYXRlPjwvcHViLWRhdGVzPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVj

b3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkhvcm93aXR6PC9BdXRob3I+PFllYXI+MTk5NzwvWWVh

cj48UmVjTnVtPjExMjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTEyPC9yZWMtbnVtYmVy

Pjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZw

eGRtZTJ0ejB2MmV3MDJ6Ij4xMTI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0i

U3RhbmRhcmQiPjU4PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+SG9y

b3dpdHosIE08L2F1dGhvcj48YXV0aG9yPkx1bnQsIFM8L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+RlRQIFNlY3VyaXR5IEV4dGVuc2lvbnM8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+UkZDIEVkaXRvciBVbml0ZWQgU3RhdGVzPC9zZWNvbmRhcnktdGl0bGU+

PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+UkZDIEVkaXRvciBVbml0ZWQgU3RhdGVz

PC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHllYXI+MTk5NzwveWVhcj48L2RhdGVz

Pjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjkzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj45MzwvcmVjLW51bWJlcj48Zm9y

ZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUy

dHowdjJldzAyeiI+OTM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iUmVwb3J0

Ij4yNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywgIFcu

IDwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxl

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

R3JpZEZUUCBQcm90b2NvbCBTcGVjaWZpY2F0aW9uIChHbG9iYWwgR3JpZCBGb3J1bSBSZWNvbW1l

bmRhdGlvbiBHRkQuMjApPC9zdHlsZT48L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8

L3N0eWxlPjwveWVhcj48L2RhdGVzPjx1cmxzPjxyZWxhdGVkLXVybHM+PHVybD48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPmh0dHA6Ly93d3cu

Z2xvYnVzLm9yZy9hbGxpYW5jZS9wdWJsaWNhdGlvbnMvcGFwZXJzL0dGRC1SLjAyMDEucGRmPC9z

dHlsZT48L3VybD48L3JlbGF0ZWQtdXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxB

dXRob3I+QWxsY29jazwvQXV0aG9yPjxZZWFyPjIwMDM8L1llYXI+PFJlY051bT4xMDI8L1JlY051

bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEwMjwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkg

YXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTAy

PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IlJlcG9ydCI+Mjc8L3JlZi10eXBl

Pjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFsbGNvY2ssIFdpbGxpYW0gRS4gPC9zdHls

ZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxl

IGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5HcmlkRlRQ

OiBQcm90b2NvbCBFeHRlbnNpb25zIHRvIEZUUCBmb3IgdGhlIEdyaWQ8L3N0eWxlPjwvdGl0bGU+

PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjxwdWItZGF0ZXM+PGRhdGU+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5B

cHJpbDwvc3R5bGU+PC9kYXRlPjwvcHViLWRhdGVzPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVj

b3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkhvcm93aXR6PC9BdXRob3I+PFllYXI+MTk5NzwvWWVh

cj48UmVjTnVtPjExMjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTEyPC9yZWMtbnVtYmVy

Pjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZw

eGRtZTJ0ejB2MmV3MDJ6Ij4xMTI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0i

U3RhbmRhcmQiPjU4PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+SG9y

b3dpdHosIE08L2F1dGhvcj48YXV0aG9yPkx1bnQsIFM8L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+RlRQIFNlY3VyaXR5IEV4dGVuc2lvbnM8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+UkZDIEVkaXRvciBVbml0ZWQgU3RhdGVzPC9zZWNvbmRhcnktdGl0bGU+

PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+UkZDIEVkaXRvciBVbml0ZWQgU3RhdGVz

PC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHllYXI+MTk5NzwveWVhcj48L2RhdGVz

Pjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjkzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj45MzwvcmVjLW51bWJlcj48Zm9y

ZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUy

dHowdjJldzAyeiI+OTM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iUmVwb3J0

Ij4yNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywgIFcu

IDwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxl

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

R3JpZEZUUCBQcm90b2NvbCBTcGVjaWZpY2F0aW9uIChHbG9iYWwgR3JpZCBGb3J1bSBSZWNvbW1l

bmRhdGlvbiBHRkQuMjApPC9zdHlsZT48L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8

L3N0eWxlPjwveWVhcj48L2RhdGVzPjx1cmxzPjxyZWxhdGVkLXVybHM+PHVybD48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPmh0dHA6Ly93d3cu

Z2xvYnVzLm9yZy9hbGxpYW5jZS9wdWJsaWNhdGlvbnMvcGFwZXJzL0dGRC1SLjAyMDEucGRmPC9z

dHlsZT48L3VybD48L3JlbGF0ZWQtdXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxB

dXRob3I+QWxsY29jazwvQXV0aG9yPjxZZWFyPjIwMDM8L1llYXI+PFJlY051bT4xMDI8L1JlY051

bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEwMjwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkg

YXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTAy

PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IlJlcG9ydCI+Mjc8L3JlZi10eXBl

Pjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFsbGNvY2ssIFdpbGxpYW0gRS4gPC9zdHls

ZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxl

IGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5HcmlkRlRQ

OiBQcm90b2NvbCBFeHRlbnNpb25zIHRvIEZUUCBmb3IgdGhlIEdyaWQ8L3N0eWxlPjwvdGl0bGU+

PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjxwdWItZGF0ZXM+PGRhdGU+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5B

cHJpbDwvc3R5bGU+PC9kYXRlPjwvcHViLWRhdGVzPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVj

b3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkhvcm93aXR6PC9BdXRob3I+PFllYXI+MTk5NzwvWWVh

cj48UmVjTnVtPjExMjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTEyPC9yZWMtbnVtYmVy

Pjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZw

eGRtZTJ0ejB2MmV3MDJ6Ij4xMTI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0i

U3RhbmRhcmQiPjU4PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+SG9y

b3dpdHosIE08L2F1dGhvcj48YXV0aG9yPkx1bnQsIFM8L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+RlRQIFNlY3VyaXR5IEV4dGVuc2lvbnM8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+UkZDIEVkaXRvciBVbml0ZWQgU3RhdGVzPC9zZWNvbmRhcnktdGl0bGU+

PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+UkZDIEVkaXRvciBVbml0ZWQgU3RhdGVz

PC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHllYXI+MTk5NzwveWVhcj48L2RhdGVz

Pjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [8, 32, 38] in order to support GSI and Kerberos authentication, with user controlled setting of various levels of data integrity and/or confidentiality ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2005</Year><RecNum>111</RecNum><record><rec-number>111</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">111</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite><Cite><Author>Bonachea</Author><Year>2008</Year><RecNum>94</RecNum><record><rec-number>94</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>94</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>What is GridFTP ? </title></titles><dates><pub-dates><date>2004</date></pub-dates></dates><urls><related-urls><url>;[36, 39]. Automatic negotiation of TCP buffer (window sizes): The performance of data transfer in wide area networks can be improved significantly by using optimal settings for TCP window sizes. However, manually setting TCP window size is not an easy operation since it requires super user privileges to perform it. Therefore, in order to support both manual setting and automatic negotiation of TCP buffer sizes for large files and for large sets of small files, GridFTP extends the standard FTP command set and data channel protocol ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2005</Year><RecNum>111</RecNum><record><rec-number>111</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">111</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote>[36].Third-party control of data transfer: Authenticated third-party control of data transfers between storage servers is requisite in order to manage large datasets for distributed communities easily. By adding GSSAPI (Generic Security Services Authentication Programming Interface) security to the existing third-party control of data transfer, a user or an application at one site can initiate, monitor and control a data transfer operation between storage servers ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%"> app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>111</key></foreign-keys><ref-type name='Conference Proceedings'>10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%"> app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>111</key></foreign-keys><ref-type name='Conference Proceedings'>10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote>[22, 36]. Parallel data transfer: Aggregating bandwidth by using multiple TCP streams in parallel (even between the same source and destination) improves high performance data transfer in high BDP networks ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2005</Year><RecNum>111</RecNum><record><rec-number>111</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">111</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote>[36]. Through FTP command extensions and data channel extensions, GridFTP supports parallel data transfer not only from a single server but also from multiple servers as well ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><Year>2000</Year><RecNum>113</RecNum><record><rec-number>113</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">113</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>GridFTP: Universal Data Transfer for the Grid</title><secondary-title>Globus Project White Paper, University of Chicago</secondary-title></titles><periodical><full-title>Globus Project White Paper, University of Chicago</full-title></periodical><dates><year>2000</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="9">; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><Year>2000</Year><RecNum>113</RecNum><record><rec-number>113</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">113</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>GridFTP: Universal Data Transfer for the Grid</title><secondary-title>Globus Project White Paper, University of Chicago</secondary-title></titles><periodical><full-title>Globus Project White Paper, University of Chicago</full-title></periodical><dates><year>2000</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="9">;[40].Striped data transfer: Besides using multiple TCP streams in parallel, striping or interleaving data across multiple servers may be used to provide further bandwidth improvements, as in a DPSS network disk cache or a stripped file system ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2005</Year><RecNum>111</RecNum><record><rec-number>111</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">111</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote>[36]. Striped transfers allows portions of the data to come from different servers. In other words, striped data transfer permit having multiple network endpoints at the source, destination, or both when the same file is transferred among them.Partial file transfer: Transferring portions of files rather than complete files could be beneficial for some applications: for instance, high-energy physics analyses that require access to relatively small subsets of massive, object oriented physics database files ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2005</Year><RecNum>111</RecNum><record><rec-number>111</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">111</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote>[36]. GridFTP supports the capability by specifying the byte position in the file to begin the transfer ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2005</Year><RecNum>111</RecNum><record><rec-number>111</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">111</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote>[36].Support for reliable and restartable data transfer: Due to distributed nature of Grid computing, reliable transfer and fault tolerant features are of great importance for many applications that manage data. Fault recovery methods are needed to handle failures such as transient network and server outages. GridFTP exploits these features and extends them to cover the new data channel protocol ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2005</Year><RecNum>111</RecNum><record><rec-number>111</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">111</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Allcock, W</author><author>Bresnahan, J</author><author>Kettimuthu, R</author><author>Link, M</author><author>Dumitrescu, C</author><author>Raicu, I</author><author>Foster, I</author></authors></contributors><titles><title>The Globus Striped GridFTP Framework and Server</title></titles><volume>2005</volume><dates><year>2005</year></dates><urls></urls></record></Cite></EndNote>[36]. Although GridFTP has many good features and impressive data transfer performance, in our opinion, it still suffers from some drawbacks that stemmed from the nature of the standard FTP and TCP. GridFTP team has been devising and adding new features or systems on top of the GridFTP to circumvent these problems. For instance, Reliable File Transfer PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZWIgTWFpbnRlbmFuY2UgVGVhbSBvZiBjYy5qbGFiLm9y

ZzwvQXV0aG9yPjxZZWFyPjIwMDg8L1llYXI+PFJlY051bT4xMTc8L1JlY051bT48cmVjb3JkPjxy

ZWMtbnVtYmVyPjExNzwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSdFTicgZGIt

aWQ9J2VyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeic+MTE3PC9rZXk+PC9mb3Jl

aWduLWtleXM+PHJlZi10eXBlIG5hbWU9J1dlYiBQYWdlJz4xMjwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+R2xvYnVzIEFsbGlhbmNlLDwvc3R5bGU+PC9hdXRob3I+PC9h

dXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwn

IGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+UmVsaWFibGUgRmlsZSBUcmFuc2Zl

ciBTZXJ2aWNlIChSRlQpPC9zdHlsZT48L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3

PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+aHR0cDovL3d3dy5nbG9idXMu

b3JnL3Rvb2xraXQvZG9jcy80LjIvNC4yLjAvZGF0YS9yZnQvPC9zdHlsZT48L3VybD48L3JlbGF0

ZWQtdXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+TWFkZHVyaTwvQXV0

aG9yPjxZZWFyPjIwMDI8L1llYXI+PFJlY051bT4xMTQ8L1JlY051bT48cmVjb3JkPjxyZWMtbnVt

YmVyPjExNDwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTE0PC9rZXk+PC9mb3JlaWduLWtl

eXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48

Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYWRkdXJpLCBSSzwvc3R5bGU+PC9hdXRob3I+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkhvb2QsIENTPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywgV0U8L3N0eWxl

PjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlJlbGlhYmxl

IEZpbGUgVHJhbnNmZXIgaW4gR3JpZCBFbnZpcm9ubWVudHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkxvY2FsIENvbXB1dGVyIE5ldHdvcmtzLCAyMDAyLiBQcm9jZWVkaW5ncy4gTENO

IDIwMDIuIDI3dGggQW5udWFsIElFRUUgQ29uZmVyZW5jZSBvbjwvc3R5bGU+PC9zZWNvbmRhcnkt

dGl0bGU+PC90aXRsZXM+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+NzM3LTczODwvc3R5bGU+PC9wYWdlcz48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDAyPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxD

aXRlPjxBdXRob3I+QWxsY29jazwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT4xNTwv

UmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTU8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48

a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoi

PjE1PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUGFwZXIi

PjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+QWxsY29jaywgVy5F

LjwvYXV0aG9yPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0aG9yPjxhdXRob3I+TWFkZHVyaSwgUi48

L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+UmVsaWFibGUg

RGF0YSBUcmFuc3BvcnQ6IEEgQ3JpdGljYWwgU2VydmljZSBmb3IgdGhlIEdyaWQ8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+QnVpbGRpbmcgU2VydmljZSBCYXNlZCBHcmlkcyBXb3Jrc2hvcCwgR2xv

YmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MjAw

NDwveWVhcj48cHViLWRhdGVzPjxkYXRlPjExLCBKdW5lIDIwMDQuPC9kYXRlPjwvcHViLWRhdGVz

PjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48L0VuZE5vdGU+

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZWIgTWFpbnRlbmFuY2UgVGVhbSBvZiBjYy5qbGFiLm9y

ZzwvQXV0aG9yPjxZZWFyPjIwMDg8L1llYXI+PFJlY051bT4xMTc8L1JlY051bT48cmVjb3JkPjxy

ZWMtbnVtYmVyPjExNzwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSdFTicgZGIt

aWQ9J2VyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeic+MTE3PC9rZXk+PC9mb3Jl

aWduLWtleXM+PHJlZi10eXBlIG5hbWU9J1dlYiBQYWdlJz4xMjwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+R2xvYnVzIEFsbGlhbmNlLDwvc3R5bGU+PC9hdXRob3I+PC9h

dXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwn

IGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+UmVsaWFibGUgRmlsZSBUcmFuc2Zl

ciBTZXJ2aWNlIChSRlQpPC9zdHlsZT48L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3

PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+aHR0cDovL3d3dy5nbG9idXMu

b3JnL3Rvb2xraXQvZG9jcy80LjIvNC4yLjAvZGF0YS9yZnQvPC9zdHlsZT48L3VybD48L3JlbGF0

ZWQtdXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+TWFkZHVyaTwvQXV0

aG9yPjxZZWFyPjIwMDI8L1llYXI+PFJlY051bT4xMTQ8L1JlY051bT48cmVjb3JkPjxyZWMtbnVt

YmVyPjExNDwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTE0PC9rZXk+PC9mb3JlaWduLWtl

eXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48

Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYWRkdXJpLCBSSzwvc3R5bGU+PC9hdXRob3I+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkhvb2QsIENTPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywgV0U8L3N0eWxl

PjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlJlbGlhYmxl

IEZpbGUgVHJhbnNmZXIgaW4gR3JpZCBFbnZpcm9ubWVudHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkxvY2FsIENvbXB1dGVyIE5ldHdvcmtzLCAyMDAyLiBQcm9jZWVkaW5ncy4gTENO

IDIwMDIuIDI3dGggQW5udWFsIElFRUUgQ29uZmVyZW5jZSBvbjwvc3R5bGU+PC9zZWNvbmRhcnkt

dGl0bGU+PC90aXRsZXM+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+NzM3LTczODwvc3R5bGU+PC9wYWdlcz48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDAyPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxD

aXRlPjxBdXRob3I+QWxsY29jazwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT4xNTwv

UmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTU8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48

a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoi

PjE1PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUGFwZXIi

PjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+QWxsY29jaywgVy5F

LjwvYXV0aG9yPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0aG9yPjxhdXRob3I+TWFkZHVyaSwgUi48

L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+UmVsaWFibGUg

RGF0YSBUcmFuc3BvcnQ6IEEgQ3JpdGljYWwgU2VydmljZSBmb3IgdGhlIEdyaWQ8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+QnVpbGRpbmcgU2VydmljZSBCYXNlZCBHcmlkcyBXb3Jrc2hvcCwgR2xv

YmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MjAw

NDwveWVhcj48cHViLWRhdGVzPjxkYXRlPjExLCBKdW5lIDIwMDQuPC9kYXRlPjwvcHViLWRhdGVz

PjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48L0VuZE5vdGU+

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZWIgTWFpbnRlbmFuY2UgVGVhbSBvZiBjYy5qbGFiLm9y

ZzwvQXV0aG9yPjxZZWFyPjIwMDg8L1llYXI+PFJlY051bT4xMTc8L1JlY051bT48cmVjb3JkPjxy

ZWMtbnVtYmVyPjExNzwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSdFTicgZGIt

aWQ9J2VyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeic+MTE3PC9rZXk+PC9mb3Jl

aWduLWtleXM+PHJlZi10eXBlIG5hbWU9J1dlYiBQYWdlJz4xMjwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+R2xvYnVzIEFsbGlhbmNlLDwvc3R5bGU+PC9hdXRob3I+PC9h

dXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwn

IGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+UmVsaWFibGUgRmlsZSBUcmFuc2Zl

ciBTZXJ2aWNlIChSRlQpPC9zdHlsZT48L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3

PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+aHR0cDovL3d3dy5nbG9idXMu

b3JnL3Rvb2xraXQvZG9jcy80LjIvNC4yLjAvZGF0YS9yZnQvPC9zdHlsZT48L3VybD48L3JlbGF0

ZWQtdXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+TWFkZHVyaTwvQXV0

aG9yPjxZZWFyPjIwMDI8L1llYXI+PFJlY051bT4xMTQ8L1JlY051bT48cmVjb3JkPjxyZWMtbnVt

YmVyPjExNDwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTE0PC9rZXk+PC9mb3JlaWduLWtl

eXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48

Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYWRkdXJpLCBSSzwvc3R5bGU+PC9hdXRob3I+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkhvb2QsIENTPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QWxsY29jaywgV0U8L3N0eWxl

PjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlJlbGlhYmxl

IEZpbGUgVHJhbnNmZXIgaW4gR3JpZCBFbnZpcm9ubWVudHM8L3N0eWxlPjwvdGl0bGU+PHNlY29u

ZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkxvY2FsIENvbXB1dGVyIE5ldHdvcmtzLCAyMDAyLiBQcm9jZWVkaW5ncy4gTENO

IDIwMDIuIDI3dGggQW5udWFsIElFRUUgQ29uZmVyZW5jZSBvbjwvc3R5bGU+PC9zZWNvbmRhcnkt

dGl0bGU+PC90aXRsZXM+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+NzM3LTczODwvc3R5bGU+PC9wYWdlcz48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDAyPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxD

aXRlPjxBdXRob3I+QWxsY29jazwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT4xNTwv

UmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTU8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48

a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoi

PjE1PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUGFwZXIi

PjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+QWxsY29jaywgVy5F

LjwvYXV0aG9yPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0aG9yPjxhdXRob3I+TWFkZHVyaSwgUi48

L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+UmVsaWFibGUg

RGF0YSBUcmFuc3BvcnQ6IEEgQ3JpdGljYWwgU2VydmljZSBmb3IgdGhlIEdyaWQ8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+QnVpbGRpbmcgU2VydmljZSBCYXNlZCBHcmlkcyBXb3Jrc2hvcCwgR2xv

YmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MjAw

NDwveWVhcj48cHViLWRhdGVzPjxkYXRlPjExLCBKdW5lIDIwMDQuPC9kYXRlPjwvcHViLWRhdGVz

PjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48L0VuZE5vdGU+

ADDIN EN.CITE.DATA [41-43] (RFT) was developed to provide reliability in the face of local failure. When the client loses its state, transfer process has to restart ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[22]. In addition to RFT, Globus-url-copy ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>116</RecNum><record><rec-number>116</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">116</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">globus-url-copy Documentation</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%"> </style></url></related-urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>116</RecNum><record><rec-number>116</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">116</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">globus-url-copy Documentation</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%"> </style></url></related-urls></urls></record></Cite></EndNote>[44] and UberFTP clients are other well-know clients of GridFTP. TeraGrid Copy ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>118</RecNum><record><rec-number>118</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">118</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Moving Data Fast on the TeraGrid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>118</RecNum><record><rec-number>118</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">118</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Moving Data Fast on the TeraGrid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[45] (TGCP), designed for taking full advantage of a 10 or 30 Gb/s network link for an individual file transfer, is a wrapper over globus-url-copy and RFT in order to provide a SCP-style GridFTP interface to users ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>118</RecNum><record><rec-number>118</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">118</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Moving Data Fast on the TeraGrid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>118</RecNum><record><rec-number>118</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">118</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Moving Data Fast on the TeraGrid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[45]. The Replica Location Service (RLS) ADDIN EN.CITE <EndNote><Cite><Author>Ripeanu</Author><Year>2002</Year><RecNum>136</RecNum><record><rec-number>136</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">136</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Matei Ripeanu</style></author><author><style face="normal" font="Times New Roman" size="100%">Ian Foster</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Decentralized, Adaptive Replica Location Mechanism</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><urls></urls></record></Cite><Cite><Author>Globus Alliance</Author><RecNum>120</RecNum><record><rec-number>120</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>120</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>MySQL</title></titles><dates><year>2007</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Ripeanu</Author><Year>2002</Year><RecNum>136</RecNum><record><rec-number>136</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">136</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Matei Ripeanu</style></author><author><style face="normal" font="Times New Roman" size="100%">Ian Foster</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Decentralized, Adaptive Replica Location Mechanism</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><urls></urls></record></Cite><Cite><Author>Globus Alliance</Author><RecNum>120</RecNum><record><rec-number>120</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>120</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>MySQL</title></titles><dates><year>2007</year></dates><urls><related-urls><url>;[46, 47] is design for creating and managing multiple copies of files by providing a framework for tracking the physical locations of data has been replicated. At its simplest, RLS maps logical names to physical names, and it is intended to be used in conjunction with other components like RFT service, GridFTP, the Metadata Catalog Service, and reliable replication and workflow management services ADDIN EN.CITE <EndNote><Cite><Author>Web Maintenance Team of cc.</Author><Year>2008</Year><RecNum>120</RecNum><record><rec-number>120</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>120</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors><authors><author><style face='normal' font='Times New Roman' size='100%'>Globus Alliance,</style></author></authors></contributors><titles><title><style face='normal' font='Times New Roman' size='100%'>Replica Location Service (RLS)</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face='normal' font='Times New Roman' size='100%'>;[48].Another problem is the performance of GridFTP servers which suffers drastically if the dataset is large but consists of many small files (smaller than 100 MB), known as the “lots of small files (LOSF)”. This poor performance is because of the command/response semantics of the RFC959 FTP protocol. It is similar to acknowledgement process of TCP. If a client has multiple files to receive, it waits to initiate another request until it receives “226 Transfer Complete” acknowledgement message. To solve the LOSF problem, they use pipelining approaches by forcing the client to make next request instead of waiting for the 226 Transfer Complete” acknowledgement message ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[49]. According to test result in ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[49], pipelining improves the throughput of LOSF transfers considerably.GridFTP has attempted to circumvent TCP problems by incorporating UDP based solutions and diving a TCP connections into a set of shorter connections into their latest version ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[49]. GridHTTPGridHTTP ADDIN EN.CITE <EndNote><Cite><Author>McNab</Author><Year>2006</Year><RecNum>18</RecNum><record><rec-number>18</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">18</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>A. McNab</author><author>S. Kaushal</author><author>Yibiao Li</author></authors></contributors><titles><title>Web servers for bulk file transfer and storage </title><secondary-title>CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing)</secondary-title></titles><dates><year>2006</year><pub-dates><date>February 2006</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Tranfer Techniques</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>McNab</Author><Year>2006</Year><RecNum>18</RecNum><record><rec-number>18</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">18</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>A. McNab</author><author>S. Kaushal</author><author>Yibiao Li</author></authors></contributors><titles><title>Web servers for bulk file transfer and storage </title><secondary-title>CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing)</secondary-title></titles><dates><year>2006</year><pub-dates><date>February 2006</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Tranfer Techniques</label><urls></urls></record></Cite></EndNote>[18] is a protocol, defined within the GridSite ADDIN EN.CITE <EndNote><Cite><Author>GridSite Team</Author><Year>2008</Year><RecNum>121</RecNum><record><rec-number>121</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">121</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">GridSite Team,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Grid Security for the Web, Web platforms for Grids</style></title></titles><dates><year>2008</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>GridSite Team</Author><Year>2008</Year><RecNum>121</RecNum><record><rec-number>121</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">121</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">GridSite Team,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Grid Security for the Web, Web platforms for Grids</style></title></titles><dates><year>2008</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[50] framework that supports bulk data transfers via unencrypted HTTP connection, but first requires authentication of the clients via HTTPS. The aim of this protocol is to allow large (gigabyte) files to be transferred at optimal speeds while still maintaining some level of security. The problem of authentication over HTTP (usually achieved via usernames and passwords) is avoided by using the certificate handling capabilities of the GridSite software as well as the access control list functionality. Clients must connect to a web server over HTTPS and set the value of the “Upgrade” header in the request to “GridHTTP/1.0” in order to retrieve a file using the GridHTTP protocol ADDIN EN.CITE <EndNote><Cite><Author>McNab</Author><Year>2006</Year><RecNum>18</RecNum><record><rec-number>18</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">18</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>A. McNab</author><author>S. Kaushal</author><author>Yibiao Li</author></authors></contributors><titles><title>Web servers for bulk file transfer and storage </title><secondary-title>CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing)</secondary-title></titles><dates><year>2006</year><pub-dates><date>February 2006</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Tranfer Techniques</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>McNab</Author><Year>2006</Year><RecNum>18</RecNum><record><rec-number>18</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">18</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>A. McNab</author><author>S. Kaushal</author><author>Yibiao Li</author></authors></contributors><titles><title>Web servers for bulk file transfer and storage </title><secondary-title>CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing)</secondary-title></titles><dates><year>2006</year><pub-dates><date>February 2006</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Tranfer Techniques</label><urls></urls></record></Cite></EndNote>[18].bbFTPbbFTP ADDIN EN.CITE <EndNote><Cite><Author>Bonachea</Author><Year>2008</Year><RecNum>91</RecNum><record><rec-number>91</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>91</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>bbFTP --Large files transfer protocol </title></titles><dates><pub-dates><date>2005</date></pub-dates></dates><urls><related-urls><url>;[33] is an open source file transfer software which implement its own transfer protocol optimizing for large files (larger than 2 GB). Similar to GridFTP, bbFTP is built upon the standard FTP protocol and uses parallel TCP streams ADDIN EN.CITE <EndNote><Cite><Author>Sivakumar</Author><Year>2000</Year><RecNum>45</RecNum><record><rec-number>45</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">45</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Sivakumar, H.</style></author><author><style face="normal" font="Times New Roman" size="100%">Bailey, S.</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R. L.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</style></secondary-title></titles><periodical><full-title>Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</full-title></periodical><dates><year><style face="normal" font="Times New Roman" size="100%">2000</style></year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Sivakumar</Author><Year>2000</Year><RecNum>45</RecNum><record><rec-number>45</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">45</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Sivakumar, H.</style></author><author><style face="normal" font="Times New Roman" size="100%">Bailey, S.</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R. L.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</style></secondary-title></titles><periodical><full-title>Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</full-title></periodical><dates><year><style face="normal" font="Times New Roman" size="100%">2000</style></year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote>[51]. The main strength of bbFTP is the ability to use SSH and certificate based authentication, data compression on-the-fly, and customizable time-outs ADDIN EN.CITE <EndNote><Cite><Author>Mattmann</Author><Year>2006</Year><RecNum>12</RecNum><record><rec-number>12</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">12</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Mattmann, Chris A.</author><author>Kelly, Sean</author><author>Crichton, Daniel J.</author><author>Hughes, J. Steven</author><author>Hardman, Sean</author><author>Ramirez, Paul</author><author>Joyner, Ron</author></authors></contributors><titles><title>A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products</title><secondary-title>Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park</secondary-title></titles><dates><year>2006</year></dates><pub-location>Maryland, USA</pub-location><label>DT Evaluation</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Mattmann</Author><Year>2006</Year><RecNum>12</RecNum><record><rec-number>12</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">12</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Mattmann, Chris A.</author><author>Kelly, Sean</author><author>Crichton, Daniel J.</author><author>Hughes, J. Steven</author><author>Hardman, Sean</author><author>Ramirez, Paul</author><author>Joyner, Ron</author></authors></contributors><titles><title>A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products</title><secondary-title>Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park</secondary-title></titles><dates><year>2006</year></dates><pub-location>Maryland, USA</pub-location><label>DT Evaluation</label><urls></urls></record></Cite></EndNote>[52]. Due to being more secure and attempting to optimize network bandwidth usage, it is preferable over than traditional FTP ADDIN EN.CITE <EndNote><Cite><Author>Web Maintenance Team of cc.</Author><Year>2008</Year><RecNum>125</RecNum><record><rec-number>125</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">125</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Web Maintenance Team of cc.,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Off-Site File Transfer Facilities</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2008</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Web Maintenance Team of cc.</Author><Year>2008</Year><RecNum>125</RecNum><record><rec-number>125</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">125</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Web Maintenance Team of cc.,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Off-Site File Transfer Facilities</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2008</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[53]. There are other FTP based solutions such as SafeTP ADDIN EN.CITE <EndNote><Cite><Author>Bonachea</Author><Year>2001</Year><RecNum>123</RecNum><record><rec-number>123</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">123</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Bonachea, D</author><author>McPeak, S</author></authors></contributors><titles><title>SafeTP: Transparently Securing FTP Network Services</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><dates><year>2001</year></dates><urls></urls></record></Cite><Cite><Author>Bonachea</Author><Year>2008</Year><RecNum>124</RecNum><record><rec-number>124</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">124</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bonachea, D</style></author><author><style face="normal" font="Times New Roman" size="100%">McPeak, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SafeTP: Secure FTP Transparently</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2008</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Bonachea</Author><Year>2001</Year><RecNum>123</RecNum><record><rec-number>123</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">123</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Bonachea, D</author><author>McPeak, S</author></authors></contributors><titles><title>SafeTP: Transparently Securing FTP Network Services</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><dates><year>2001</year></dates><urls></urls></record></Cite><Cite><Author>Bonachea</Author><Year>2008</Year><RecNum>124</RecNum><record><rec-number>124</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">124</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bonachea, D</style></author><author><style face="normal" font="Times New Roman" size="100%">McPeak, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SafeTP: Secure FTP Transparently</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2008</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[54, 55], which is developed at the University of California at Berkeley to provide a secure method for file transfer between Unix/Windows clients and secure FTP server ADDIN EN.CITE <EndNote><Cite><Author>Bonachea</Author><Year>2001</Year><RecNum>123</RecNum><record><rec-number>123</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">123</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Bonachea, D</author><author>McPeak, S</author></authors></contributors><titles><title>SafeTP: Transparently Securing FTP Network Services</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><dates><year>2001</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Bonachea</Author><Year>2001</Year><RecNum>123</RecNum><record><rec-number>123</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">123</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Bonachea, D</author><author>McPeak, S</author></authors></contributors><titles><title>SafeTP: Transparently Securing FTP Network Services</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><dates><year>2001</year></dates><urls></urls></record></Cite></EndNote>[54], but their main concerns is to provide secure data transfer rather than high-performance data transfer.The BaBar Copy Program (bbcp)The Babar Copy Program ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote>[35], successor of Secure Fast Copy (sfcp), is another high-performance data transfer program and it was purely built upon the peer-to-peer architecture, in contrast to many other solutions. It is because of the bbcp’s peer-to-peer architecture that it is well suited to environments where information flow is equal. The important features of bbcp are that carrying with a very low administrative overhead, using SSH ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote>[35] for authentication, providing an elegant and simple model. Similar to previous solutions, it exploits multiple TCP stream in parallel in order to accelerate the movement of data ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Hanushevsky</Author><Year>2001</Year><RecNum>92</RecNum><record><rec-number>92</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">92</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Hanushevsky, A.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing for Secure High Performance Data Copying</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computing in High Energy Phyasics</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><pub-location><style face="normal" font="Times New Roman" size="100%">Beijing</style></pub-location><label>p2p, bbcp</label><urls></urls></record></Cite></EndNote>[35].UDP -based Data Movement TechniquesTo improve the bandwidth throughput in wide-area networks, the other alternative approach is to employ UDP-based application-level solutions. UDP is a connection-less unreliable messaging protocol, whereas TCP is a connection-oriented reliable data streaming protocol ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56]. Unreliability is a major drawback for data transfer. Therefore, UDP-based application-level solutions implement congestion control algorithm and reliability control mechanism at application layer that is fifth layer and above the transport layer, consisted of TCP and UDP, in the layered Internet architecture ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56]. SABUL ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[57], UDT ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56], FOBS ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[9], RBUDP ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote>[58], Tsunami ADDIN EN.CITE <EndNote><Cite><Author>Meiss</Author><Year>2002</Year><RecNum>130</RecNum><record><rec-number>130</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">130</key></foreign-keys><ref-type name="Unpublished Work">34</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Meiss, M</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Indiana University</style></publisher><urls></urls></record></Cite><Cite><Author>Wallace</Author><Year>2003</Year><RecNum>131</RecNum><record><rec-number>131</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">131</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Wallace, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami File Transfer Protocol</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of First Int. Workshop on Protocols for Fast Long-Distance Networks</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date>February 2003</date></pub-dates></dates><pub-location><style face="normal" font="Times New Roman" size="100%">CERN, Geneva, Switzerland</style></pub-location><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Meiss</Author><Year>2002</Year><RecNum>130</RecNum><record><rec-number>130</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">130</key></foreign-keys><ref-type name="Unpublished Work">34</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Meiss, M</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Indiana University</style></publisher><urls></urls></record></Cite><Cite><Author>Wallace</Author><Year>2003</Year><RecNum>131</RecNum><record><rec-number>131</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">131</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Wallace, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami File Transfer Protocol</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of First Int. Workshop on Protocols for Fast Long-Distance Networks</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date>February 2003</date></pub-dates></dates><pub-location><style face="normal" font="Times New Roman" size="100%">CERN, Geneva, Switzerland</style></pub-location><urls></urls></record></Cite></EndNote>[59, 60], UFTP ADDIN EN.CITE <EndNote><Cite><Author>Bush</Author><Year>2001</Year><RecNum>132</RecNum><record><rec-number>132</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">132</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bush, Dennis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UFTP - UDP Based FTP with Multicast</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">July 29, 2008</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Bush</Author><Year>2001</Year><RecNum>132</RecNum><record><rec-number>132</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">132</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bush, Dennis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UFTP - UDP Based FTP with Multicast</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">July 29, 2008</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[61], and FRTP ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[62] are ongoing works using rate-based UDP for high performance data transfer to overcome inefficiency of TCP ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56]. Since some of these UDP-based solutions are derivations of existing ones, we only present main or important UDP-based solutions here.Simple Available Bandwidth Utilization Library (SABUL)SABUL is an application-level a rate-based protocol designed for data-intensive applications over high BDP networks to transport data reliably PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5aaHU8L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFyPjxSZWNO

dW0+MTAxPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xMDE8L3JlYy1udW1iZXI+PGZvcmVp

Z24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6

MHYyZXcwMnoiPjEwMTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJSZXBvcnQi

PjI3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+Wmh1LCBZaTwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRhbGljIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjE0Ij5CYXNzaSwgQWxlc3NhbmRybyA8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+TWFz

c29uZXQsIFBoaWxpcHBlIDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRh

bGljIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjE0Ij5UYWxpYSwgRG9tZW5pY28gPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NZWNo

YW5pc21zIGZvciBIaWdoIFZvbHVtZSBEYXRhIFRyYW5zZmVyIGluIEdyaWRzPC9zdHlsZT48L3Rp

dGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0

ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+aHR0cDovL3d3dy5jb3JlZ3JpZC5uZXQvbWFtYm8vaW1hZ2VzL3N0b3JpZXMv

VGVjaG5pY2FsUmVwb3J0cy90ci0wMTIxLnBkZjwvc3R5bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+

PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkd1PC9BdXRob3I+PFllYXI+MjAw

MzwvWWVhcj48UmVjTnVtPjEyNzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTI3PC9yZWMt

bnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGll

ZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xMjc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUg

bmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+R3UsIFk8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Hcm9zc21hbiwgUjwvc3R5bGU+

PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U0FCVUw6IEEg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBHcmlkIENvbXB1dGluZzwvc3R5bGU+PC90aXRsZT48c2Vj

b25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+Sm91cm5hbCBvZiBHcmlkIENvbXB1dGluZzwvc3R5bGU+PC9zZWNvbmRhcnkt

dGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+Sm91cm5hbCBvZiBHcmlkIENv

bXB1dGluZzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Mzc3LTM4Njwvc3R5bGU+PC9w

YWdlcz48dm9sdW1lPjE8L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NDwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5

ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0

ZT48L0VuZE5vdGU+

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5aaHU8L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFyPjxSZWNO

dW0+MTAxPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xMDE8L3JlYy1udW1iZXI+PGZvcmVp

Z24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6

MHYyZXcwMnoiPjEwMTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJSZXBvcnQi

PjI3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+Wmh1LCBZaTwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRhbGljIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjE0Ij5CYXNzaSwgQWxlc3NhbmRybyA8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+TWFz

c29uZXQsIFBoaWxpcHBlIDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRh

bGljIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjE0Ij5UYWxpYSwgRG9tZW5pY28gPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NZWNo

YW5pc21zIGZvciBIaWdoIFZvbHVtZSBEYXRhIFRyYW5zZmVyIGluIEdyaWRzPC9zdHlsZT48L3Rp

dGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0

ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+aHR0cDovL3d3dy5jb3JlZ3JpZC5uZXQvbWFtYm8vaW1hZ2VzL3N0b3JpZXMv

VGVjaG5pY2FsUmVwb3J0cy90ci0wMTIxLnBkZjwvc3R5bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+

PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkd1PC9BdXRob3I+PFllYXI+MjAw

MzwvWWVhcj48UmVjTnVtPjEyNzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTI3PC9yZWMt

bnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGll

ZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xMjc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUg

bmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+R3UsIFk8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Hcm9zc21hbiwgUjwvc3R5bGU+

PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U0FCVUw6IEEg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBHcmlkIENvbXB1dGluZzwvc3R5bGU+PC90aXRsZT48c2Vj

b25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+Sm91cm5hbCBvZiBHcmlkIENvbXB1dGluZzwvc3R5bGU+PC9zZWNvbmRhcnkt

dGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+Sm91cm5hbCBvZiBHcmlkIENv

bXB1dGluZzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Mzc3LTM4Njwvc3R5bGU+PC9w

YWdlcz48dm9sdW1lPjE8L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NDwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5

ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0

ZT48L0VuZE5vdGU+

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5aaHU8L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFyPjxSZWNO

dW0+MTAxPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xMDE8L3JlYy1udW1iZXI+PGZvcmVp

Z24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6

MHYyZXcwMnoiPjEwMTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJSZXBvcnQi

PjI3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+Wmh1LCBZaTwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRhbGljIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjE0Ij5CYXNzaSwgQWxlc3NhbmRybyA8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+TWFz

c29uZXQsIFBoaWxpcHBlIDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRh

bGljIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjE0Ij5UYWxpYSwgRG9tZW5pY28gPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NZWNo

YW5pc21zIGZvciBIaWdoIFZvbHVtZSBEYXRhIFRyYW5zZmVyIGluIEdyaWRzPC9zdHlsZT48L3Rp

dGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0

ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+aHR0cDovL3d3dy5jb3JlZ3JpZC5uZXQvbWFtYm8vaW1hZ2VzL3N0b3JpZXMv

VGVjaG5pY2FsUmVwb3J0cy90ci0wMTIxLnBkZjwvc3R5bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+

PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkd1PC9BdXRob3I+PFllYXI+MjAw

MzwvWWVhcj48UmVjTnVtPjEyNzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTI3PC9yZWMt

bnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGll

ZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xMjc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUg

bmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+R3UsIFk8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Hcm9zc21hbiwgUjwvc3R5bGU+

PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U0FCVUw6IEEg

VHJhbnNwb3J0IFByb3RvY29sIGZvciBHcmlkIENvbXB1dGluZzwvc3R5bGU+PC90aXRsZT48c2Vj

b25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+Sm91cm5hbCBvZiBHcmlkIENvbXB1dGluZzwvc3R5bGU+PC9zZWNvbmRhcnkt

dGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+Sm91cm5hbCBvZiBHcmlkIENv

bXB1dGluZzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Mzc3LTM4Njwvc3R5bGU+PC9w

YWdlcz48dm9sdW1lPjE8L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NDwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5

ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0

ZT48L0VuZE5vdGU+

ADDIN EN.CITE.DATA [22, 57]. Although SABUL uses UDP as data transfer channel and TCP as a control channel, it can coexist with TCP since it was not designed to replace TCP ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[57]. As stated by Gu and Grossman ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[57], it is designed for reliability, high performance, fairness and stability. In addition, since SABUL has implemented as an open source library, it can be easily deployed without requiring any significant modifications to network stacks of an operating system or to the existing network infrastructure ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[57]. Experimental studies, As claimed in ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[57], have demonstrated that SABUL can efficiently use available bandwidth in links with high BDP.Fixed Rate Transport Protocol (FRTP) is a modified version of SABUL for end-to-end circuits ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[62]. SABUL was designed for packet-switched networks according to ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[62]; thus, it has poor performance on circuit-switched networks since congestion control service is not needed when the circuit is provisioned successfully due to fact that resource reservation and congestion is handled during the circuit setup ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[62]. Congestion control mechanism, on the other hand, adjusts data sending rates during the data transmission in packet-switched networks ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[62]. Therefore, eliminating problems of SABUL stemmed from end-to-end circuit is the main motivation behind the FRTP. UDP-based Data Transfer Protocol (UDT)The UDT protocol, a UDP-based protocol and designed to effectively utilize high-speed wide area optical networks, is an application-level high performance bulk data transfer protocol ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56]. In order to attain high throughput data transfer with low data loss, UDT combines rate-based, window-based and delay-based congestion control mechanismsPEVuZE5vdGU+PENpdGU+PEF1dGhvcj5HdTwvQXV0aG9yPjxZZWFyPjIwMDc8L1llYXI+PFJlY051

bT4xMjY8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEyNjwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTI2PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwg

QXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkd1LCBZ

PC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+R3Jvc3NtYW4sIFJMPC9zdHlsZT48L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5VRFQ6IFVEUC1iYXNlZCBkYXRhIHRy

YW5zZmVyIGZvciBoaWdoLXNwZWVkIHdpZGUgYXJlYSBuZXR3b3Jrczwvc3R5bGU+PC90aXRsZT48

c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+Q29tcHV0ZXIgTmV0d29ya3M8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxl

PjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkNvbXB1dGVyIE5ldHdvcmtzPC9mdWxs

LXRpdGxlPjwvcGVyaW9kaWNhbD48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4xNzc3LTE3OTk8L3N0eWxlPjwvcGFnZXM+PHZvbHVt

ZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjUxPC9zdHlsZT48L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Nzwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5ZWFy

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MjAwNzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48

Q2l0ZT48QXV0aG9yPkFuZ2xhbm88L0F1dGhvcj48WWVhcj4yMDA0PC9ZZWFyPjxSZWNOdW0+ODc8

L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjg3PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+

PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6

Ij44Nzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFBhcGVy

Ij40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29zaW1vIEFuZ2xh

bm88L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYXNzaW1vIENhbm9uaWNvPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIENvbXBhcmF0aXZlIEV2

YWx1YXRpb24gb2YgSGlnaC1QZXJmb3JtYW5jZSBGaWxlIFRyYW5zZmVyIFN5c3RlbXMgZm9yIERh

dGEtSW50ZW5zaXZlIEdyaWQgQXBwbGljYXRpb25zPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgMTN0aCBJRUVFIEludGVybmF0aW9uYWwgV29ya3Nob3Bz

IG9uIEVuYWJsaW5nIFRlY2hub2xvZ2llczogSW5mcmFzdHJ1Y3R1cmUgZm9yIENvbGxhYm9yYXRp

dmUgRW50ZXJwcmlzZXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjIwMDQ8L3N0eWxlPjwveWVhcj48L2RhdGVzPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JRUVFIENvbXB1dGVyIFNv

Y2lldHk8L3N0eWxlPjwvcHVibGlzaGVyPjxsYWJlbD5EVCBFdmFsdWF0aW9uPC9sYWJlbD48dXJs

cz48L3VybHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+aHR0cDovL2R4LmRvaS5vcmcvMTAuMTEw

OS9FTkFCTC4yMDA0LjI8L3N0eWxlPjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+

PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5HdTwvQXV0aG9yPjxZZWFyPjIwMDc8L1llYXI+PFJlY051

bT4xMjY8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEyNjwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTI2PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwg

QXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkd1LCBZ

PC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+R3Jvc3NtYW4sIFJMPC9zdHlsZT48L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5VRFQ6IFVEUC1iYXNlZCBkYXRhIHRy

YW5zZmVyIGZvciBoaWdoLXNwZWVkIHdpZGUgYXJlYSBuZXR3b3Jrczwvc3R5bGU+PC90aXRsZT48

c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+Q29tcHV0ZXIgTmV0d29ya3M8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxl

PjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkNvbXB1dGVyIE5ldHdvcmtzPC9mdWxs

LXRpdGxlPjwvcGVyaW9kaWNhbD48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4xNzc3LTE3OTk8L3N0eWxlPjwvcGFnZXM+PHZvbHVt

ZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjUxPC9zdHlsZT48L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Nzwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5ZWFy

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MjAwNzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48

Q2l0ZT48QXV0aG9yPkFuZ2xhbm88L0F1dGhvcj48WWVhcj4yMDA0PC9ZZWFyPjxSZWNOdW0+ODc8

L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjg3PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+

PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6

Ij44Nzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFBhcGVy

Ij40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29zaW1vIEFuZ2xh

bm88L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYXNzaW1vIENhbm9uaWNvPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIENvbXBhcmF0aXZlIEV2

YWx1YXRpb24gb2YgSGlnaC1QZXJmb3JtYW5jZSBGaWxlIFRyYW5zZmVyIFN5c3RlbXMgZm9yIERh

dGEtSW50ZW5zaXZlIEdyaWQgQXBwbGljYXRpb25zPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgMTN0aCBJRUVFIEludGVybmF0aW9uYWwgV29ya3Nob3Bz

IG9uIEVuYWJsaW5nIFRlY2hub2xvZ2llczogSW5mcmFzdHJ1Y3R1cmUgZm9yIENvbGxhYm9yYXRp

dmUgRW50ZXJwcmlzZXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjIwMDQ8L3N0eWxlPjwveWVhcj48L2RhdGVzPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JRUVFIENvbXB1dGVyIFNv

Y2lldHk8L3N0eWxlPjwvcHVibGlzaGVyPjxsYWJlbD5EVCBFdmFsdWF0aW9uPC9sYWJlbD48dXJs

cz48L3VybHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+aHR0cDovL2R4LmRvaS5vcmcvMTAuMTEw

OS9FTkFCTC4yMDA0LjI8L3N0eWxlPjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+

PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5HdTwvQXV0aG9yPjxZZWFyPjIwMDc8L1llYXI+PFJlY051

bT4xMjY8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjEyNjwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTI2PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwg

QXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkd1LCBZ

PC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+R3Jvc3NtYW4sIFJMPC9zdHlsZT48L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5VRFQ6IFVEUC1iYXNlZCBkYXRhIHRy

YW5zZmVyIGZvciBoaWdoLXNwZWVkIHdpZGUgYXJlYSBuZXR3b3Jrczwvc3R5bGU+PC90aXRsZT48

c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+Q29tcHV0ZXIgTmV0d29ya3M8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxl

PjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkNvbXB1dGVyIE5ldHdvcmtzPC9mdWxs

LXRpdGxlPjwvcGVyaW9kaWNhbD48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4xNzc3LTE3OTk8L3N0eWxlPjwvcGFnZXM+PHZvbHVt

ZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjUxPC9zdHlsZT48L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Nzwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5ZWFy

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MjAwNzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48

Q2l0ZT48QXV0aG9yPkFuZ2xhbm88L0F1dGhvcj48WWVhcj4yMDA0PC9ZZWFyPjxSZWNOdW0+ODc8

L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjg3PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+

PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6

Ij44Nzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFBhcGVy

Ij40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29zaW1vIEFuZ2xh

bm88L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYXNzaW1vIENhbm9uaWNvPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIENvbXBhcmF0aXZlIEV2

YWx1YXRpb24gb2YgSGlnaC1QZXJmb3JtYW5jZSBGaWxlIFRyYW5zZmVyIFN5c3RlbXMgZm9yIERh

dGEtSW50ZW5zaXZlIEdyaWQgQXBwbGljYXRpb25zPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgMTN0aCBJRUVFIEludGVybmF0aW9uYWwgV29ya3Nob3Bz

IG9uIEVuYWJsaW5nIFRlY2hub2xvZ2llczogSW5mcmFzdHJ1Y3R1cmUgZm9yIENvbGxhYm9yYXRp

dmUgRW50ZXJwcmlzZXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjIwMDQ8L3N0eWxlPjwveWVhcj48L2RhdGVzPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JRUVFIENvbXB1dGVyIFNv

Y2lldHk8L3N0eWxlPjwvcHVibGlzaGVyPjxsYWJlbD5EVCBFdmFsdWF0aW9uPC9sYWJlbD48dXJs

cz48L3VybHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+aHR0cDovL2R4LmRvaS5vcmcvMTAuMTEw

OS9FTkFCTC4yMDA0LjI8L3N0eWxlPjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+

PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA [25, 56]. It is more TCP friendly than other rate-based schemes due to its slow start and AIMD control schemes for flow control ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25].Notwithstanding the fact that it is the successor of SABUL, it is a re-implementation from scratch with a new protocol design ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56]. The main reason for redesigning it, as stated by Gu and Grossman ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56], is the use of TCP as an control message channel for the simplicity of design and implementation in SABUL because TCP’s own reliability and congestion control mechanism can result in unnecessary delay of control information in other protocols with their own reliability and congestion control mechanism. Therefore, UDT uses UDP protocol for both data and control packet transmission.Similar to SABUL, it does not require any changes to network stacks of an operating system or to the existing network infrastructure and it is released as free software ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Zhu</Author><Year>2007</Year><RecNum>101</RecNum><record><rec-number>101</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">101</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="italic" font="Times New Roman" size="14">Zhu, Yi</style></author><author><style face="italic" font="Times New Roman" size="14">Bassi, Alessandro </style></author><author><style face="italic" font="Times New Roman" size="14">Massonet, Philippe </style></author><author><style face="italic" font="Times New Roman" size="14">Talia, Domenico </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Mechanisms for High Volume Data Transfer in Grids</style></title></titles><dates><year>2007</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[22]. In addition, it permits applications to send data of any size by removing the concept of sending data block by block over UDP ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56]. Moreover, it can be employed above other packet-switched network layer in such a way that it can be deployed as a transport layer protocol by using IP directly PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5aaHU8L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFyPjxSZWNO

dW0+MTAxPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xMDE8L3JlYy1udW1iZXI+PGZvcmVp

Z24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6

MHYyZXcwMnoiPjEwMTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJSZXBvcnQi

PjI3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+Wmh1LCBZaTwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRhbGljIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjE0Ij5CYXNzaSwgQWxlc3NhbmRybyA8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+TWFz

c29uZXQsIFBoaWxpcHBlIDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRh

bGljIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjE0Ij5UYWxpYSwgRG9tZW5pY28gPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NZWNo

YW5pc21zIGZvciBIaWdoIFZvbHVtZSBEYXRhIFRyYW5zZmVyIGluIEdyaWRzPC9zdHlsZT48L3Rp

dGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0

ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+aHR0cDovL3d3dy5jb3JlZ3JpZC5uZXQvbWFtYm8vaW1hZ2VzL3N0b3JpZXMv

VGVjaG5pY2FsUmVwb3J0cy90ci0wMTIxLnBkZjwvc3R5bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+

PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkd1PC9BdXRob3I+PFllYXI+MjAw

MzwvWWVhcj48UmVjTnVtPjEzMzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTMzPC9yZWMt

bnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGll

ZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xMzM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUg

bmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+R3UsIFk8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Hcm9zc21hbiwgUjwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkhvbmcsIFg8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYXp6dWNjbywg

TTwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxl

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

VXNpbmcgVURQIGZvciBSZWxpYWJsZSBEYXRhIFRyYW5zZmVyIG92ZXIgSGlnaCBCYW5kd2lkdGgt

RGVsYXkgUHJvZHVjdCBOZXR3b3Jrczwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TGFi

b3JhdG9yeSBmb3IgQWR2YW5jZWQgQ29tcHV0aW5nLCBVbml2ZXJzaXR5IG9mIElsbGlub2lzIGF0

IENoaWNhZ2U8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxm

dWxsLXRpdGxlPkxhYm9yYXRvcnkgZm9yIEFkdmFuY2VkIENvbXB1dGluZywgVW5pdmVyc2l0eSBv

ZiBJbGxpbm9pcyBhdCBDaGljYWdlPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHll

YXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij4yMDAzPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRl

PjwvRW5kTm90ZT4A

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5aaHU8L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFyPjxSZWNO

dW0+MTAxPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xMDE8L3JlYy1udW1iZXI+PGZvcmVp

Z24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6

MHYyZXcwMnoiPjEwMTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJSZXBvcnQi

PjI3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+Wmh1LCBZaTwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRhbGljIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjE0Ij5CYXNzaSwgQWxlc3NhbmRybyA8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+TWFz

c29uZXQsIFBoaWxpcHBlIDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRh

bGljIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjE0Ij5UYWxpYSwgRG9tZW5pY28gPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NZWNo

YW5pc21zIGZvciBIaWdoIFZvbHVtZSBEYXRhIFRyYW5zZmVyIGluIEdyaWRzPC9zdHlsZT48L3Rp

dGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0

ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+aHR0cDovL3d3dy5jb3JlZ3JpZC5uZXQvbWFtYm8vaW1hZ2VzL3N0b3JpZXMv

VGVjaG5pY2FsUmVwb3J0cy90ci0wMTIxLnBkZjwvc3R5bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+

PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkd1PC9BdXRob3I+PFllYXI+MjAw

MzwvWWVhcj48UmVjTnVtPjEzMzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTMzPC9yZWMt

bnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGll

ZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xMzM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUg

bmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+R3UsIFk8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Hcm9zc21hbiwgUjwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkhvbmcsIFg8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYXp6dWNjbywg

TTwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxl

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

VXNpbmcgVURQIGZvciBSZWxpYWJsZSBEYXRhIFRyYW5zZmVyIG92ZXIgSGlnaCBCYW5kd2lkdGgt

RGVsYXkgUHJvZHVjdCBOZXR3b3Jrczwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TGFi

b3JhdG9yeSBmb3IgQWR2YW5jZWQgQ29tcHV0aW5nLCBVbml2ZXJzaXR5IG9mIElsbGlub2lzIGF0

IENoaWNhZ2U8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxm

dWxsLXRpdGxlPkxhYm9yYXRvcnkgZm9yIEFkdmFuY2VkIENvbXB1dGluZywgVW5pdmVyc2l0eSBv

ZiBJbGxpbm9pcyBhdCBDaGljYWdlPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHll

YXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij4yMDAzPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRl

PjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5aaHU8L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFyPjxSZWNO

dW0+MTAxPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xMDE8L3JlYy1udW1iZXI+PGZvcmVp

Z24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6

MHYyZXcwMnoiPjEwMTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJSZXBvcnQi

PjI3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+Wmh1LCBZaTwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRhbGljIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjE0Ij5CYXNzaSwgQWxlc3NhbmRybyA8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Iml0YWxpYyIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxNCI+TWFz

c29uZXQsIFBoaWxpcHBlIDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0iaXRh

bGljIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjE0Ij5UYWxpYSwgRG9tZW5pY28gPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NZWNo

YW5pc21zIGZvciBIaWdoIFZvbHVtZSBEYXRhIFRyYW5zZmVyIGluIEdyaWRzPC9zdHlsZT48L3Rp

dGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHVybHM+PHJlbGF0

ZWQtdXJscz48dXJsPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+aHR0cDovL3d3dy5jb3JlZ3JpZC5uZXQvbWFtYm8vaW1hZ2VzL3N0b3JpZXMv

VGVjaG5pY2FsUmVwb3J0cy90ci0wMTIxLnBkZjwvc3R5bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+

PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkd1PC9BdXRob3I+PFllYXI+MjAw

MzwvWWVhcj48UmVjTnVtPjEzMzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTMzPC9yZWMt

bnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGll

ZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xMzM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUg

bmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+R3UsIFk8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Hcm9zc21hbiwgUjwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkhvbmcsIFg8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYXp6dWNjbywg

TTwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxl

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

VXNpbmcgVURQIGZvciBSZWxpYWJsZSBEYXRhIFRyYW5zZmVyIG92ZXIgSGlnaCBCYW5kd2lkdGgt

RGVsYXkgUHJvZHVjdCBOZXR3b3Jrczwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TGFi

b3JhdG9yeSBmb3IgQWR2YW5jZWQgQ29tcHV0aW5nLCBVbml2ZXJzaXR5IG9mIElsbGlub2lzIGF0

IENoaWNhZ2U8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxm

dWxsLXRpdGxlPkxhYm9yYXRvcnkgZm9yIEFkdmFuY2VkIENvbXB1dGluZywgVW5pdmVyc2l0eSBv

ZiBJbGxpbm9pcyBhdCBDaGljYWdlPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHll

YXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij4yMDAzPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRl

PjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA [22, 63]. Fast Object –Based data transfer System (FOBS)FOBS ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[9] is an application-level, UDP-based, highly efficient large scale data transmission system designed for the high-bandwidth, high-delay network environment typical of computational Grids ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>97</RecNum><record><rec-number>97</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">97</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Dickens, P. M.</author><author>Kannan, V.</author></authors></contributors><titles><title>Application-Level Congestion Control Mechanisms for Large Scale Data Transfers Across Computational Grids</title><secondary-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</secondary-title></titles><periodical><full-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</full-title></periodical><dates><year>2003</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>97</RecNum><record><rec-number>97</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">97</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Dickens, P. M.</author><author>Kannan, V.</author></authors></contributors><titles><title>Application-Level Congestion Control Mechanisms for Large Scale Data Transfers Across Computational Grids</title><secondary-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</secondary-title></titles><periodical><full-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</full-title></periodical><dates><year>2003</year></dates><urls></urls></record></Cite></EndNote>[64]. Similar to many other UDP-based solutions, it utilizes UDP protocol for actual data transfer and TCP protocol for control information exchange. It uses, however, two TCP channels to transfer control information between sender and receiver; one channel for ENDOFSEGMENT/DONE/FEEDBACK/ACK packets and one for COMPLETEDPKT/WRITECOMPLETEDPKT packets ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[9]. Developing multiple congestion control mechanisms with the ability to dynamically switch between mechanisms to adapt to changes in the state of the end-to-end system is the uniqueness of FOBS ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>97</RecNum><record><rec-number>97</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">97</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Dickens, P. M.</author><author>Kannan, V.</author></authors></contributors><titles><title>Application-Level Congestion Control Mechanisms for Large Scale Data Transfers Across Computational Grids</title><secondary-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</secondary-title></titles><periodical><full-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</full-title></periodical><dates><year>2003</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>97</RecNum><record><rec-number>97</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">97</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Dickens, P. M.</author><author>Kannan, V.</author></authors></contributors><titles><title>Application-Level Congestion Control Mechanisms for Large Scale Data Transfers Across Computational Grids</title><secondary-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</secondary-title></titles><periodical><full-title>the Proceedings of The International Conference on High Performance Distributed Computing and Applications</full-title></periodical><dates><year>2003</year></dates><urls></urls></record></Cite></EndNote>[64].Reliable Blast UDP (RBUDP)The Reliable Blast UDP (RBUDP) is an aggressive bulk data transfer scheme designed for extremely high bandwidth, Quality-of-Service enabled networks, such as optically switched networks ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote>[58]. In order to fully leverage the underlying high-bandwidth network structure for pure data delivery, it not only purges slow-start and congestion control mechanisms of TCP, but also aggregates acknowledgements ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote>[58]. Similar to SABUL, hosts exchange data packets via UDP, and control packets via TCP ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Anglano</Author><Year>2004</Year><RecNum>87</RecNum><record><rec-number>87</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">87</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Cosimo Anglano</style></author><author><style face="normal" font="Times New Roman" size="100%">Massimo Canonico</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">IEEE Computer Society</style></publisher><label>DT Evaluation</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">;[25]. TsunamiTsunami is a reliable file transfer protocol intended for faster transfer of large files over the uncongested high-bandwidth, high-delay networks ADDIN EN.CITE <EndNote><Cite><Author>Meiss</Author><Year>2002</Year><RecNum>130</RecNum><record><rec-number>130</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">130</key></foreign-keys><ref-type name="Unpublished Work">34</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Meiss, M</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Indiana University</style></publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Meiss</Author><Year>2002</Year><RecNum>130</RecNum><record><rec-number>130</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">130</key></foreign-keys><ref-type name="Unpublished Work">34</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Meiss, M</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Indiana University</style></publisher><urls></urls></record></Cite></EndNote>[59]. As stated by Ansari ADDIN EN.CITE <EndNote><Cite><Author>Ansari</Author><RecNum>134</RecNum><record><rec-number>134</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">134</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Ansari, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami—A Study</style></title></titles><dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Ansari</Author><RecNum>134</RecNum><record><rec-number>134</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">134</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Ansari, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami—A Study</style></title></titles><dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[65], the architecture of Tsunami follows a classic client server model typical of conventional FTP. Tsunami, similar to FTP, uses a control channel to authenticate and negotiate the connection and a data session to transfer data ADDIN EN.CITE <EndNote><Cite><Author>Ansari</Author><RecNum>134</RecNum><record><rec-number>134</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">134</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Ansari, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami—A Study</style></title></titles><dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Ansari</Author><RecNum>134</RecNum><record><rec-number>134</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">134</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Ansari, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami—A Study</style></title></titles><dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[65]. Tsunami contrasts with FTP in regard to the use of UDP as data transfer channel. In order to regulate the data transfer rate, it uses the delay time between packets instead of the TCP’s sliding window algorithm ADDIN EN.CITE <EndNote><Cite><Author>Wallace</Author><Year>2003</Year><RecNum>131</RecNum><record><rec-number>131</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">131</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Wallace, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami File Transfer Protocol</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of First Int. Workshop on Protocols for Fast Long-Distance Networks</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date>February 2003</date></pub-dates></dates><pub-location><style face="normal" font="Times New Roman" size="100%">CERN, Geneva, Switzerland</style></pub-location><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Wallace</Author><Year>2003</Year><RecNum>131</RecNum><record><rec-number>131</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">131</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Wallace, S</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami File Transfer Protocol</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of First Int. Workshop on Protocols for Fast Long-Distance Networks</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date>February 2003</date></pub-dates></dates><pub-location><style face="normal" font="Times New Roman" size="100%">CERN, Geneva, Switzerland</style></pub-location><urls></urls></record></Cite></EndNote>[60]. In addition, it implements negative acknowledgements to notify the sender for lost packages as opposed to TCP’s sending the acknowledgement of received data ADDIN EN.CITE <EndNote><Cite><Author>Meiss</Author><Year>2002</Year><RecNum>130</RecNum><record><rec-number>130</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">130</key></foreign-keys><ref-type name="Unpublished Work">34</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Meiss, M</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Indiana University</style></publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Meiss</Author><Year>2002</Year><RecNum>130</RecNum><record><rec-number>130</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">130</key></foreign-keys><ref-type name="Unpublished Work">34</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Meiss, M</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Indiana University</style></publisher><urls></urls></record></Cite></EndNote>[59].UFTPUFTP, utilizing a protocol based on Starburst MFTP, is a UDP-based multicast file transfer program ADDIN EN.CITE <EndNote><Cite><Author>Bush</Author><Year>2001</Year><RecNum>132</RecNum><record><rec-number>132</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">132</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bush, Dennis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UFTP - UDP Based FTP with Multicast</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">July 29, 2008</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Bush</Author><Year>2001</Year><RecNum>132</RecNum><record><rec-number>132</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">132</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bush, Dennis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UFTP - UDP Based FTP with Multicast</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">July 29, 2008</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[61]. It is designed for efficient and reliable bulk data transfer to multiple receivers concurrently ADDIN EN.CITE <EndNote><Cite><Author>Mattmann</Author><Year>2006</Year><RecNum>12</RecNum><record><rec-number>12</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">12</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Mattmann, Chris A.</author><author>Kelly, Sean</author><author>Crichton, Daniel J.</author><author>Hughes, J. Steven</author><author>Hardman, Sean</author><author>Ramirez, Paul</author><author>Joyner, Ron</author></authors></contributors><titles><title>A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products</title><secondary-title>Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park</secondary-title></titles><dates><year>2006</year></dates><pub-location>Maryland, USA</pub-location><label>DT Evaluation</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Mattmann</Author><Year>2006</Year><RecNum>12</RecNum><record><rec-number>12</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">12</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Mattmann, Chris A.</author><author>Kelly, Sean</author><author>Crichton, Daniel J.</author><author>Hughes, J. Steven</author><author>Hardman, Sean</author><author>Ramirez, Paul</author><author>Joyner, Ron</author></authors></contributors><titles><title>A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products</title><secondary-title>Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park</secondary-title></titles><dates><year>2006</year></dates><pub-location>Maryland, USA</pub-location><label>DT Evaluation</label><urls></urls></record></Cite></EndNote>[52]. This is useful for distributing large files to a large number of receivers ADDIN EN.CITE <EndNote><Cite><Author>Bush</Author><Year>2001</Year><RecNum>132</RecNum><record><rec-number>132</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">132</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bush, Dennis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UFTP - UDP Based FTP with Multicast</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">July 29, 2008</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Bush</Author><Year>2001</Year><RecNum>132</RecNum><record><rec-number>132</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">132</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bush, Dennis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UFTP - UDP Based FTP with Multicast</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">July 29, 2008</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[61]. Mattmann et al ADDIN EN.CITE <EndNote><Cite><Author>Mattmann</Author><Year>2006</Year><RecNum>12</RecNum><record><rec-number>12</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">12</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Mattmann, Chris A.</author><author>Kelly, Sean</author><author>Crichton, Daniel J.</author><author>Hughes, J. Steven</author><author>Hardman, Sean</author><author>Ramirez, Paul</author><author>Joyner, Ron</author></authors></contributors><titles><title>A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products</title><secondary-title>Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park</secondary-title></titles><dates><year>2006</year></dates><pub-location>Maryland, USA</pub-location><label>DT Evaluation</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Mattmann</Author><Year>2006</Year><RecNum>12</RecNum><record><rec-number>12</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">12</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Mattmann, Chris A.</author><author>Kelly, Sean</author><author>Crichton, Daniel J.</author><author>Hughes, J. Steven</author><author>Hardman, Sean</author><author>Ramirez, Paul</author><author>Joyner, Ron</author></authors></contributors><titles><title>A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products</title><secondary-title>Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park</secondary-title></titles><dates><year>2006</year></dates><pub-location>Maryland, USA</pub-location><label>DT Evaluation</label><urls></urls></record></Cite></EndNote>[52] commented that although UFTP is particularly effective for data dissemination over a satellite link with two way communication or high-delay Wide Area Networks (WANs) where the reliability and congestion mechanisms of TCP cause underuse of throughput capabilities of the available network, it suffers the disadvantage of having extremely poor reliability with the fault rate a function of the total dataset volume.Peer-to-Peer based Data Movement TechniquesPeer-to-peer (P2P) has become one of the most widely argued term in information technology ADDIN EN.CITE <EndNote><Cite><Author>Schoder</Author><Year>2005</Year><RecNum>3</RecNum><record><rec-number>3</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">3</key></foreign-keys><ref-type name="Book Section">5</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Schoder, Detlef</style></author><author><style face="normal" font="Times New Roman" size="100%">Fischbach, Kai</style></author><author><style face="normal" font="Times New Roman" size="100%">Schmitt, Christian</style></author></authors><secondary-authors><author><style face="normal" font="Times New Roman" size="100%">Subramanian, Ramesh </style></author><author><style face="normal" font="Times New Roman" size="100%">Goodman, Brian D.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Core Concepts in Peer-to-Peer Networking</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing: The Evolution of a Disruptive Technology</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">300 pages</style></pages><section><style face="normal" font="Times New Roman" size="100%">Chapter 1</style></section><dates><year><style face="normal" font="Times New Roman" size="100%">2005</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Idea Group Publishing</style></publisher><isbn><style face="normal" font="Times New Roman" size="100%">1591404290</style></isbn><label>P2P</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Schoder</Author><Year>2005</Year><RecNum>3</RecNum><record><rec-number>3</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">3</key></foreign-keys><ref-type name="Book Section">5</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Schoder, Detlef</style></author><author><style face="normal" font="Times New Roman" size="100%">Fischbach, Kai</style></author><author><style face="normal" font="Times New Roman" size="100%">Schmitt, Christian</style></author></authors><secondary-authors><author><style face="normal" font="Times New Roman" size="100%">Subramanian, Ramesh </style></author><author><style face="normal" font="Times New Roman" size="100%">Goodman, Brian D.</style></author></secondary-authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Core Concepts in Peer-to-Peer Networking</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Computing: The Evolution of a Disruptive Technology</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">300 pages</style></pages><section><style face="normal" font="Times New Roman" size="100%">Chapter 1</style></section><dates><year><style face="normal" font="Times New Roman" size="100%">2005</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">Idea Group Publishing</style></publisher><isbn><style face="normal" font="Times New Roman" size="100%">1591404290</style></isbn><label>P2P</label><urls></urls></record></Cite></EndNote>[66]. Due to wide application areas of P2P systems, it could be considered as a set of protocols, an IT architecture, decentralized design model, or a business model ADDIN EN.CITE <EndNote><Cite><Author>Schoder</Author><Year>2003</Year><RecNum>1</RecNum><record><rec-number>1</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">1</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Schoder, Detlef</style></author><author><style face="normal" font="Times New Roman" size="100%">Fischbach, Kai</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Prospects</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Communications of the ACM</style></secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">27-29</style></pages><volume><style face="normal" font="Times New Roman" size="100%">46</style></volume><number><style face="normal" font="Times New Roman" size="100%">2</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0001-0782</style></isbn><label>P2P</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">httpdoi.10.1145606272.606294</style></electronic-resource-num></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Schoder</Author><Year>2003</Year><RecNum>1</RecNum><record><rec-number>1</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">1</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Schoder, Detlef</style></author><author><style face="normal" font="Times New Roman" size="100%">Fischbach, Kai</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer Prospects</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Communications of the ACM</style></secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">27-29</style></pages><volume><style face="normal" font="Times New Roman" size="100%">46</style></volume><number><style face="normal" font="Times New Roman" size="100%">2</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0001-0782</style></isbn><label>P2P</label><urls></urls><electronic-resource-num><style face="normal" font="Times New Roman" size="100%">httpdoi.10.1145606272.606294</style></electronic-resource-num></record></Cite></EndNote>[67]. Therefore, there is a great deal of number of different definitions of P2P. According to Androutsellis-Theotokis and Spinellis ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>;[14], completely distributed systems composed of completely equivalent nodes in terms of functionality and tasks they perform is the most meticulous definition of “pure peer-to-peer” system. In other words, there is no discernable client or server role in a P2P architecture, although two nodes communicate with each other PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5IYW51c2hldnNreTwvQXV0aG9yPjxZZWFyPjIwMDE8L1ll

YXI+PFJlY051bT45MjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+OTI8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjkyPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNv

bmZlcmVuY2UgUGFwZXIiPjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5IYW51c2hldnNreSwgQS48L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPlBlZXItdG8tUGVlciBDb21wdXRpbmcgZm9yIFNlY3VyZSBIaWdoIFBl

cmZvcm1hbmNlIERhdGEgQ29weWluZzwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29t

cHV0aW5nIGluIEhpZ2ggRW5lcmd5IFBoeWFzaWNzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48

L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAxPC9zdHlsZT48L3llYXI+PC9kYXRlcz48cHViLWxvY2F0

aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+QmVpamluZzwvc3R5bGU+PC9wdWItbG9jYXRpb24+PGxhYmVsPnAycCwgYmJjcDwvbGFiZWw+

PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPlNjaG9kZXI8L0F1dGhv

cj48WWVhcj4yMDAzPC9ZZWFyPjxSZWNOdW0+MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+

MTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2

b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYt

dHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxh

dXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5TY2hvZGVyLCBEZXRsZWY8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5GaXNj

aGJhY2gsIEthaTwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRs

ZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+UGVlci10by1QZWVyIFByb3NwZWN0czwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5

LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+Q29tbXVuaWNhdGlvbnMgb2YgdGhlIEFDTTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+

PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+Q29tbXVuaWNhdGlvbnMgb2YgdGhlIEFD

TTwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjctMjk8L3N0eWxlPjwvcGFnZXM+PHZv

bHVtZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjQ2PC9zdHlsZT48L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Mjwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5

ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PGlzYm4+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4wMDAxLTA3ODI8L3N0eWxlPjwvaXNi

bj48bGFiZWw+UDJQPC9sYWJlbD48dXJscz48L3VybHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVt

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

aHR0cGRvaS5hY20ub3JnMTAuMTE0NTYwNjI3Mi42MDYyOTQ8L3N0eWxlPjwvZWxlY3Ryb25pYy1y

ZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5IYW51c2hldnNreTwvQXV0aG9yPjxZZWFyPjIwMDE8L1ll

YXI+PFJlY051bT45MjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+OTI8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjkyPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNv

bmZlcmVuY2UgUGFwZXIiPjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5IYW51c2hldnNreSwgQS48L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPlBlZXItdG8tUGVlciBDb21wdXRpbmcgZm9yIFNlY3VyZSBIaWdoIFBl

cmZvcm1hbmNlIERhdGEgQ29weWluZzwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29t

cHV0aW5nIGluIEhpZ2ggRW5lcmd5IFBoeWFzaWNzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48

L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAxPC9zdHlsZT48L3llYXI+PC9kYXRlcz48cHViLWxvY2F0

aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+QmVpamluZzwvc3R5bGU+PC9wdWItbG9jYXRpb24+PGxhYmVsPnAycCwgYmJjcDwvbGFiZWw+

PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPlNjaG9kZXI8L0F1dGhv

cj48WWVhcj4yMDAzPC9ZZWFyPjxSZWNOdW0+MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+

MTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2

b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYt

dHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxh

dXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5TY2hvZGVyLCBEZXRsZWY8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5GaXNj

aGJhY2gsIEthaTwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRs

ZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+UGVlci10by1QZWVyIFByb3NwZWN0czwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5

LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+Q29tbXVuaWNhdGlvbnMgb2YgdGhlIEFDTTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+

PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+Q29tbXVuaWNhdGlvbnMgb2YgdGhlIEFD

TTwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjctMjk8L3N0eWxlPjwvcGFnZXM+PHZv

bHVtZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjQ2PC9zdHlsZT48L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Mjwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5

ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PGlzYm4+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4wMDAxLTA3ODI8L3N0eWxlPjwvaXNi

bj48bGFiZWw+UDJQPC9sYWJlbD48dXJscz48L3VybHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVt

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

aHR0cGRvaS5hY20ub3JnMTAuMTE0NTYwNjI3Mi42MDYyOTQ8L3N0eWxlPjwvZWxlY3Ryb25pYy1y

ZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5IYW51c2hldnNreTwvQXV0aG9yPjxZZWFyPjIwMDE8L1ll

YXI+PFJlY051bT45MjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+OTI8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjkyPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNv

bmZlcmVuY2UgUGFwZXIiPjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5IYW51c2hldnNreSwgQS48L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPlBlZXItdG8tUGVlciBDb21wdXRpbmcgZm9yIFNlY3VyZSBIaWdoIFBl

cmZvcm1hbmNlIERhdGEgQ29weWluZzwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29t

cHV0aW5nIGluIEhpZ2ggRW5lcmd5IFBoeWFzaWNzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48

L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAxPC9zdHlsZT48L3llYXI+PC9kYXRlcz48cHViLWxvY2F0

aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+QmVpamluZzwvc3R5bGU+PC9wdWItbG9jYXRpb24+PGxhYmVsPnAycCwgYmJjcDwvbGFiZWw+

PHVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPlNjaG9kZXI8L0F1dGhv

cj48WWVhcj4yMDAzPC9ZZWFyPjxSZWNOdW0+MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+

MTwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2

b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYt

dHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxh

dXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5TY2hvZGVyLCBEZXRsZWY8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5GaXNj

aGJhY2gsIEthaTwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRs

ZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+UGVlci10by1QZWVyIFByb3NwZWN0czwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5

LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+Q29tbXVuaWNhdGlvbnMgb2YgdGhlIEFDTTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+

PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwtdGl0bGU+Q29tbXVuaWNhdGlvbnMgb2YgdGhlIEFD

TTwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjctMjk8L3N0eWxlPjwvcGFnZXM+PHZv

bHVtZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjQ2PC9zdHlsZT48L3ZvbHVtZT48bnVtYmVyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Mjwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5

ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PGlzYm4+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4wMDAxLTA3ODI8L3N0eWxlPjwvaXNi

bj48bGFiZWw+UDJQPC9sYWJlbD48dXJscz48L3VybHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVt

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

aHR0cGRvaS5hY20ub3JnMTAuMTE0NTYwNjI3Mi42MDYyOTQ8L3N0eWxlPjwvZWxlY3Ryb25pYy1y

ZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA [35, 67] using appropriate information and communication systems and are able to spontaneously collaborate without necessarily needing central coordination. However, there are some systems which employ the concept of super-nodes, function as mini-servers, such as Kazaa ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>140</RecNum><record><rec-number>140</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>140</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>The Kazaa web site</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>140</RecNum><record><rec-number>140</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>140</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>The Kazaa web site</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>;[14, 68], which are widely accepted as peer-to-peer systems. The definition of P2P given by ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>;[14] is broader enough to encompass all type of peer-to-peer systems:Peer-to-peer systems are distributed systems consisting of interconnected nodes able to self organize into network topologies with the purpose of sharing resources such as content, CPU cycles, storage and bandwidth, capable of adapting to failures and accommodating transient populations of nodes while maintaining acceptable connectivity and performance, without requiring the intermediation or support of a global centralized server or authority.Even though, the client/server model appears more prevalent architecture than peer-to-peer model for today’s Internet, the peer-to-peer architecture, at the outset, is the foundation that the original Internet was essentially built upon ADDIN EN.CITE <EndNote><Cite><Author>Oram</Author><Year>2001</Year><RecNum>5</RecNum><record><rec-number>5</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">5</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Oram, Andy</style></author></authors><secondary-authors><author><style face="normal" font="Times New Roman" size="100%"> </style></author></secondary-authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer: Harnessing the Power of Disruptive Technologies</style></title></titles><pages><style face="normal" font="Times New Roman" size="100%">432</style></pages><edition><style face="normal" font="Times New Roman" size="100%">First</style></edition><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">O&apos;Reilly &amp; Associates, Inc.</style></publisher><isbn><style face="normal" font="Times New Roman" size="100%">059600110X</style></isbn><label>P2P</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Oram</Author><Year>2001</Year><RecNum>5</RecNum><record><rec-number>5</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">5</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Oram, Andy</style></author></authors><secondary-authors><author><style face="normal" font="Times New Roman" size="100%"> </style></author></secondary-authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer: Harnessing the Power of Disruptive Technologies</style></title></titles><pages><style face="normal" font="Times New Roman" size="100%">432</style></pages><edition><style face="normal" font="Times New Roman" size="100%">First</style></edition><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">O&apos;Reilly &amp; Associates, Inc.</style></publisher><isbn><style face="normal" font="Times New Roman" size="100%">059600110X</style></isbn><label>P2P</label><urls></urls></record></Cite></EndNote>[69]. It has, however, changed into increasingly client/server model when the millions of clients communicating with a relatively privileged set of servers ADDIN EN.CITE <EndNote><Cite><Author>Oram</Author><Year>2001</Year><RecNum>5</RecNum><record><rec-number>5</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">5</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Oram, Andy</style></author></authors><secondary-authors><author><style face="normal" font="Times New Roman" size="100%"> </style></author></secondary-authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer: Harnessing the Power of Disruptive Technologies</style></title></titles><pages><style face="normal" font="Times New Roman" size="100%">432</style></pages><edition><style face="normal" font="Times New Roman" size="100%">First</style></edition><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">O&apos;Reilly &amp; Associates, Inc.</style></publisher><isbn><style face="normal" font="Times New Roman" size="100%">059600110X</style></isbn><label>P2P</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Oram</Author><Year>2001</Year><RecNum>5</RecNum><record><rec-number>5</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">5</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Oram, Andy</style></author></authors><secondary-authors><author><style face="normal" font="Times New Roman" size="100%"> </style></author></secondary-authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Peer-to-Peer: Harnessing the Power of Disruptive Technologies</style></title></titles><pages><style face="normal" font="Times New Roman" size="100%">432</style></pages><edition><style face="normal" font="Times New Roman" size="100%">First</style></edition><dates><year><style face="normal" font="Times New Roman" size="100%">2001</style></year></dates><publisher><style face="normal" font="Times New Roman" size="100%">O&apos;Reilly &amp; Associates, Inc.</style></publisher><isbn><style face="normal" font="Times New Roman" size="100%">059600110X</style></isbn><label>P2P</label><urls></urls></record></Cite></EndNote>[69]. Yet there are, still a good deal number of peer-to-peer applications employed in the Internet. In order to classify peer-to-peer systems, there are many distinguishing characteristics such as their network structure, the degree of network centralization, their purpose, their methods for distributed object location and routing, etc. We should note here that Androutsellis-Theotokis and Spinellis have made a very detailed study about peer-to-peer systems in ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>;[14] and analysis of peer-to-peer systems according to their purpose of use is an adaptation and simplification of the one presented in their work. As to their use, they categorized peer-to-peer systems into five groups; (1) communication and collaboration, (2) distributed computation, (3) Internet service supporter, (4) database systems, and (5) content munication and Collaboration: Peer-to-peer systems of this category provide the infrastructure for assisting direct, generally real-time, communication and collaboration between peer computers. The foremost applications in this category are chat and instant messaging applications, such as Chat/IRC, Instant Messaging (AOL, ICQ, Yahoo, MSN, Google Talk), and Jabber PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQx

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDE8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIEphYmJlciB3ZWIgc2l0ZTwvc3R5bGU+PC90aXRsZT48

L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3

IFJvbWFuJyBzaXplPScxMDAlJz5BY2Nlc3NlZCBvbi1saW5lIDIwMDg8L3N0eWxlPjwveWVhcj48

L2RhdGVzPjx1cmxzPjxyZWxhdGVkLXVybHM+PHVybD48c3R5bGUgZmFjZT0nbm9ybWFsJyBmb250

PSdUaW1lcyBOZXcgUm9tYW4nIHNpemU9JzEwMCUnPmh0dHA6Ly93d3cuamFiYmVyLm9yZzwvc3R5

bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0

aG9yPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzPC9BdXRob3I+PFllYXI+MjAwNDwvWWVhcj48UmVj

TnVtPjg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjg8L3JlYy1udW1iZXI+PGZvcmVpZ24t

a2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYy

ZXcwMnoiPjg8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRp

Y2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kcm91dHNl

bGxpcy1UaGVvdG9raXMsIFN0ZXBoYW5vczwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNwaW5lbGxp

cywgRGlvbWlkaXM8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkEgU3VydmV5IG9mIFBlZXItdG8tUGVlciBDb250ZW50IERpc3RyaWJ1dGlvbiBU

ZWNobm9sb2dpZXM8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0i

bm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFDTSBDb21wdXRpbmcg

U3VydmV5czwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1

bGwtdGl0bGU+QUNNIENvbXB1dGluZyBTdXJ2ZXlzPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48

cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4zMzUtMzcxPC9zdHlsZT48L3BhZ2VzPjx2b2x1bWU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4zNjwvc3R5bGU+PC92b2x1bWU+PG51

bWJlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjQ8L3N0eWxlPjwvbnVtYmVyPjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDQ8L3N0eWxlPjwveWVhcj48L2Rh

dGVzPjxpc2JuPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+MDM2MC0wMzAwPC9zdHlsZT48L2lzYm4+PGxhYmVsPlAyUDwvbGFiZWw+PHVybHM+

PC91cmxzPjxlbGVjdHJvbmljLXJlc291cmNlLW51bT5odHRwOi8vZG9pLmFjbS5vcmcvMTAuMTE0

NS8xMDQxNjgwLjEwNDE2ODE8L2VsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPjwvcmVjb3JkPjwvQ2l0

ZT48L0VuZE5vdGU+AG==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQx

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDE8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIEphYmJlciB3ZWIgc2l0ZTwvc3R5bGU+PC90aXRsZT48

L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3

IFJvbWFuJyBzaXplPScxMDAlJz5BY2Nlc3NlZCBvbi1saW5lIDIwMDg8L3N0eWxlPjwveWVhcj48

L2RhdGVzPjx1cmxzPjxyZWxhdGVkLXVybHM+PHVybD48c3R5bGUgZmFjZT0nbm9ybWFsJyBmb250

PSdUaW1lcyBOZXcgUm9tYW4nIHNpemU9JzEwMCUnPmh0dHA6Ly93d3cuamFiYmVyLm9yZzwvc3R5

bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0

aG9yPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzPC9BdXRob3I+PFllYXI+MjAwNDwvWWVhcj48UmVj

TnVtPjg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjg8L3JlYy1udW1iZXI+PGZvcmVpZ24t

a2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYy

ZXcwMnoiPjg8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRp

Y2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kcm91dHNl

bGxpcy1UaGVvdG9raXMsIFN0ZXBoYW5vczwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNwaW5lbGxp

cywgRGlvbWlkaXM8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkEgU3VydmV5IG9mIFBlZXItdG8tUGVlciBDb250ZW50IERpc3RyaWJ1dGlvbiBU

ZWNobm9sb2dpZXM8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0i

bm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFDTSBDb21wdXRpbmcg

U3VydmV5czwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1

bGwtdGl0bGU+QUNNIENvbXB1dGluZyBTdXJ2ZXlzPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48

cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4zMzUtMzcxPC9zdHlsZT48L3BhZ2VzPjx2b2x1bWU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4zNjwvc3R5bGU+PC92b2x1bWU+PG51

bWJlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjQ8L3N0eWxlPjwvbnVtYmVyPjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDQ8L3N0eWxlPjwveWVhcj48L2Rh

dGVzPjxpc2JuPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+MDM2MC0wMzAwPC9zdHlsZT48L2lzYm4+PGxhYmVsPlAyUDwvbGFiZWw+PHVybHM+

PC91cmxzPjxlbGVjdHJvbmljLXJlc291cmNlLW51bT5odHRwOi8vZG9pLmFjbS5vcmcvMTAuMTE0

NS8xMDQxNjgwLjEwNDE2ODE8L2VsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPjwvcmVjb3JkPjwvQ2l0

ZT48L0VuZE5vdGU+AG==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQx

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDE8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIEphYmJlciB3ZWIgc2l0ZTwvc3R5bGU+PC90aXRsZT48

L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3

IFJvbWFuJyBzaXplPScxMDAlJz5BY2Nlc3NlZCBvbi1saW5lIDIwMDg8L3N0eWxlPjwveWVhcj48

L2RhdGVzPjx1cmxzPjxyZWxhdGVkLXVybHM+PHVybD48c3R5bGUgZmFjZT0nbm9ybWFsJyBmb250

PSdUaW1lcyBOZXcgUm9tYW4nIHNpemU9JzEwMCUnPmh0dHA6Ly93d3cuamFiYmVyLm9yZzwvc3R5

bGU+PC91cmw+PC9yZWxhdGVkLXVybHM+PC91cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0

aG9yPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzPC9BdXRob3I+PFllYXI+MjAwNDwvWWVhcj48UmVj

TnVtPjg8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjg8L3JlYy1udW1iZXI+PGZvcmVpZ24t

a2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYy

ZXcwMnoiPjg8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRp

Y2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kcm91dHNl

bGxpcy1UaGVvdG9raXMsIFN0ZXBoYW5vczwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNwaW5lbGxp

cywgRGlvbWlkaXM8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkEgU3VydmV5IG9mIFBlZXItdG8tUGVlciBDb250ZW50IERpc3RyaWJ1dGlvbiBU

ZWNobm9sb2dpZXM8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0i

bm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFDTSBDb21wdXRpbmcg

U3VydmV5czwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1

bGwtdGl0bGU+QUNNIENvbXB1dGluZyBTdXJ2ZXlzPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48

cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4zMzUtMzcxPC9zdHlsZT48L3BhZ2VzPjx2b2x1bWU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4zNjwvc3R5bGU+PC92b2x1bWU+PG51

bWJlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPjQ8L3N0eWxlPjwvbnVtYmVyPjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDQ8L3N0eWxlPjwveWVhcj48L2Rh

dGVzPjxpc2JuPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+MDM2MC0wMzAwPC9zdHlsZT48L2lzYm4+PGxhYmVsPlAyUDwvbGFiZWw+PHVybHM+

PC91cmxzPjxlbGVjdHJvbmljLXJlc291cmNlLW51bT5odHRwOi8vZG9pLmFjbS5vcmcvMTAuMTE0

NS8xMDQxNjgwLjEwNDE2ODE8L2VsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPjwvcmVjb3JkPjwvQ2l0

ZT48L0VuZE5vdGU+AG==

ADDIN EN.CITE.DATA [14, 70].Distributed Computation: The main purpose of systems in this category is to exploit the available peer computer’s resources, for instance, processing power (CPU cycles) ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>;[14]. Seti@home PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZXJ0aGltZXI8L0F1dGhvcj48WWVhcj4xOTk3PC9ZZWFy

PjxSZWNOdW0+MTQ0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE0NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+V2VydGhpbWVyLCBELjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvd2VyLCBTPC9z

dHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29iYiwgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdlZHll

LCBEPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kZXJzb24sIEQ8L3N0eWxlPjwvYXV0aG9yPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5TdWxsaXZhbiwgV1Q8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkEgTmV3IE1ham9yIFNFVEkgUHJvamVjdCBCYXNlZCBvbiBQcm9qZWN0

IFNlcmVuZGlwIERhdGEgYW5kIDEwMCwwMDAgUGVyc29uYWwgQ29tcHV0ZXJzPC9zdHlsZT48L3Rp

dGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEJpb2FzdHJvbm9teTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90

aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+MTk5Nzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxz

PjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJyaWFuPC9BdXRob3I+PFllYXI+QWNjZXNz

ZWQgb24tbGluZSAyMDA4PC9ZZWFyPjxSZWNOdW0+MTQyPC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj4xNDI8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0nRU4nIGRiLWlkPSdl

cmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnonPjE0Mjwva2V5PjwvZm9yZWlnbi1r

ZXlzPjxyZWYtdHlwZSBuYW1lPSdXZWIgUGFnZSc+MTI8L3JlZi10eXBlPjxjb250cmlidXRvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0n

VGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5UaGUgc2V0aUBob21lIHByb2plY3Qgd2ViIHNp

dGU8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAy

MDA4PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxl

IGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8v

c2V0aWF0aG9tZS5iZXJrZWxleS5lZHU8L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwv

QXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJl

ZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRv

cnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0

eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRv

LVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5

czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48

dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+

PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9p

c2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1u

dW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmlj

LXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZXJ0aGltZXI8L0F1dGhvcj48WWVhcj4xOTk3PC9ZZWFy

PjxSZWNOdW0+MTQ0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE0NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+V2VydGhpbWVyLCBELjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvd2VyLCBTPC9z

dHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29iYiwgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdlZHll

LCBEPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kZXJzb24sIEQ8L3N0eWxlPjwvYXV0aG9yPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5TdWxsaXZhbiwgV1Q8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkEgTmV3IE1ham9yIFNFVEkgUHJvamVjdCBCYXNlZCBvbiBQcm9qZWN0

IFNlcmVuZGlwIERhdGEgYW5kIDEwMCwwMDAgUGVyc29uYWwgQ29tcHV0ZXJzPC9zdHlsZT48L3Rp

dGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEJpb2FzdHJvbm9teTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90

aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+MTk5Nzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxz

PjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJyaWFuPC9BdXRob3I+PFllYXI+QWNjZXNz

ZWQgb24tbGluZSAyMDA4PC9ZZWFyPjxSZWNOdW0+MTQyPC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj4xNDI8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0nRU4nIGRiLWlkPSdl

cmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnonPjE0Mjwva2V5PjwvZm9yZWlnbi1r

ZXlzPjxyZWYtdHlwZSBuYW1lPSdXZWIgUGFnZSc+MTI8L3JlZi10eXBlPjxjb250cmlidXRvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0n

VGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5UaGUgc2V0aUBob21lIHByb2plY3Qgd2ViIHNp

dGU8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAy

MDA4PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxl

IGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8v

c2V0aWF0aG9tZS5iZXJrZWxleS5lZHU8L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwv

QXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJl

ZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRv

cnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0

eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRv

LVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5

czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48

dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+

PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9p

c2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1u

dW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmlj

LXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5XZXJ0aGltZXI8L0F1dGhvcj48WWVhcj4xOTk3PC9ZZWFy

PjxSZWNOdW0+MTQ0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE0NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+V2VydGhpbWVyLCBELjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvd2VyLCBTPC9z

dHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+Q29iYiwgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdlZHll

LCBEPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5kZXJzb24sIEQ8L3N0eWxlPjwvYXV0aG9yPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5TdWxsaXZhbiwgV1Q8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPkEgTmV3IE1ham9yIFNFVEkgUHJvamVjdCBCYXNlZCBvbiBQcm9qZWN0

IFNlcmVuZGlwIERhdGEgYW5kIDEwMCwwMDAgUGVyc29uYWwgQ29tcHV0ZXJzPC9zdHlsZT48L3Rp

dGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEJpb2FzdHJvbm9teTwvc3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90

aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+MTk5Nzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHVybHM+PC91cmxz

PjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJyaWFuPC9BdXRob3I+PFllYXI+QWNjZXNz

ZWQgb24tbGluZSAyMDA4PC9ZZWFyPjxSZWNOdW0+MTQyPC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj4xNDI8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0nRU4nIGRiLWlkPSdl

cmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnonPjE0Mjwva2V5PjwvZm9yZWlnbi1r

ZXlzPjxyZWYtdHlwZSBuYW1lPSdXZWIgUGFnZSc+MTI8L3JlZi10eXBlPjxjb250cmlidXRvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9J25vcm1hbCcgZm9udD0n

VGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5UaGUgc2V0aUBob21lIHByb2plY3Qgd2ViIHNp

dGU8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3Jt

YWwnIGZvbnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAy

MDA4PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxl

IGZhY2U9J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8v

c2V0aWF0aG9tZS5iZXJrZWxleS5lZHU8L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwv

QXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJl

ZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+

PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRv

cnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0

eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRv

LVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRp

dGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5

czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48

dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+

PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9p

c2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1u

dW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmlj

LXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [12-14] and Genome@home PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5MYXJzb248L0F1dGhvcj48WWVhcj4y

MDAzPC9ZZWFyPjxSZWNOdW0+MTQ1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDU8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0NTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJCb29rIFNlY3Rpb24iPjU8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkxhcnNvbiwgUyBNPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U25vdywgQyA8L3N0eWxl

PjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5QYW5kZSwgVlMgPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9j

b250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Nb2Rlcm4gTWV0aG9kcyBpbiBDb21wdXRhdGlvbmFs

IEJpb2xvZ3k8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PHNlY3Rpb24+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Gb2xkaW5nQEhvbWUgYW5k

IEdlbm9tZUBIb21lOiBVc2luZyBEaXN0cmlidXRlZCBDb21wdXRpbmcgdG8gVGFja2xlIFByZXZp

b3VzbHkgSW50cmFjdGFibGUgUHJvYmxlbXMgaW4gQ29tcHV0YXRpb25hbCBCaW9sb2d5PC9zdHls

ZT48L3NlY3Rpb24+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHB1Ymxp

c2hlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPkhvcml6b24gUHJlc3M8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29y

ZD48L0NpdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQz

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIGdlbm9tZUBob21lIHByb2plY3Qgd2ViIHNpdGU8L3N0

eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZv

bnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAyMDA4PC9z

dHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxlIGZhY2U9

J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8vZ2Vub21l

YXRob21lLnN0YW5mb3JkLmVkdS88L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48

L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5MYXJzb248L0F1dGhvcj48WWVhcj4y

MDAzPC9ZZWFyPjxSZWNOdW0+MTQ1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDU8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0NTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJCb29rIFNlY3Rpb24iPjU8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkxhcnNvbiwgUyBNPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U25vdywgQyA8L3N0eWxl

PjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5QYW5kZSwgVlMgPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9j

b250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Nb2Rlcm4gTWV0aG9kcyBpbiBDb21wdXRhdGlvbmFs

IEJpb2xvZ3k8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PHNlY3Rpb24+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Gb2xkaW5nQEhvbWUgYW5k

IEdlbm9tZUBIb21lOiBVc2luZyBEaXN0cmlidXRlZCBDb21wdXRpbmcgdG8gVGFja2xlIFByZXZp

b3VzbHkgSW50cmFjdGFibGUgUHJvYmxlbXMgaW4gQ29tcHV0YXRpb25hbCBCaW9sb2d5PC9zdHls

ZT48L3NlY3Rpb24+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHB1Ymxp

c2hlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPkhvcml6b24gUHJlc3M8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29y

ZD48L0NpdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQz

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIGdlbm9tZUBob21lIHByb2plY3Qgd2ViIHNpdGU8L3N0

eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZv

bnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAyMDA4PC9z

dHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxlIGZhY2U9

J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8vZ2Vub21l

YXRob21lLnN0YW5mb3JkLmVkdS88L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48

L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5MYXJzb248L0F1dGhvcj48WWVhcj4y

MDAzPC9ZZWFyPjxSZWNOdW0+MTQ1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDU8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0NTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJCb29rIFNlY3Rpb24iPjU8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPkxhcnNvbiwgUyBNPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U25vdywgQyA8L3N0eWxl

PjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5QYW5kZSwgVlMgPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9j

b250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Nb2Rlcm4gTWV0aG9kcyBpbiBDb21wdXRhdGlvbmFs

IEJpb2xvZ3k8L3N0eWxlPjwvdGl0bGU+PC90aXRsZXM+PHNlY3Rpb24+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Gb2xkaW5nQEhvbWUgYW5k

IEdlbm9tZUBIb21lOiBVc2luZyBEaXN0cmlidXRlZCBDb21wdXRpbmcgdG8gVGFja2xlIFByZXZp

b3VzbHkgSW50cmFjdGFibGUgUHJvYmxlbXMgaW4gQ29tcHV0YXRpb25hbCBCaW9sb2d5PC9zdHls

ZT48L3NlY3Rpb24+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwMzwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PHB1Ymxp

c2hlcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEw

MCUiPkhvcml6b24gUHJlc3M8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29y

ZD48L0NpdGU+PENpdGU+PEF1dGhvcj5CcmlhbjwvQXV0aG9yPjxZZWFyPkFjY2Vzc2VkIG9uLWxp

bmUgMjAwODwvWWVhcj48UmVjTnVtPjE0MzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQz

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9J0VOJyBkYi1pZD0nZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Jz4xNDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVm

LXR5cGUgbmFtZT0nV2ViIFBhZ2UnPjEyPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjwvY29udHJp

YnV0b3JzPjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZvbnQ9J1RpbWVzIE5l

dyBSb21hbicgc2l6ZT0nMTAwJSc+VGhlIGdlbm9tZUBob21lIHByb2plY3Qgd2ViIHNpdGU8L3N0

eWxlPjwvdGl0bGU+PC90aXRsZXM+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSdub3JtYWwnIGZv

bnQ9J1RpbWVzIE5ldyBSb21hbicgc2l6ZT0nMTAwJSc+QWNjZXNzZWQgb24tbGluZSAyMDA4PC9z

dHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48cmVsYXRlZC11cmxzPjx1cmw+PHN0eWxlIGZhY2U9

J25vcm1hbCcgZm9udD0nVGltZXMgTmV3IFJvbWFuJyBzaXplPScxMDAlJz5odHRwOi8vZ2Vub21l

YXRob21lLnN0YW5mb3JkLmVkdS88L3N0eWxlPjwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48

L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [14-16] are the well-know projects in this category. Since the main purpose of the Grid Computing PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk5PC9ZZWFyPjxS

ZWNOdW0+NTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjUwPC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij41MDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJCb29rIj42

PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0

aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT5UaGUgR3JpZDogQmx1ZXByaW50IGZvciBhIE5ldyBDb21wdXRpbmcg

SW5mcmFzdHJ1Y3R1cmU8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4s

IFNhbiBGcmFuY2lzY28sIENBPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+

PGZ1bGwtdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4sIFNhbiBGcmFuY2lzY28sIENBPC9mdWxsLXRp

dGxlPjwvcGVyaW9kaWNhbD48dm9sdW1lPjIxMTwvdm9sdW1lPjxkYXRlcz48eWVhcj4xOTk5PC95

ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+

Njk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjY5PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtl

eXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3

MDJ6Ij42OTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGlj

bGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJ

LjwvYXV0aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjxhdXRob3I+TmljaywgSi48

L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRv

cnM+PHRpdGxlcz48dGl0bGU+VGhlIFBoeXNpb2xvZ3kgb2YgdGhlIEdyaWQ6IEFuIE9wZW4gR3Jp

ZCBTZXJ2aWNlcyBBcmNoaXRlY3R1cmUgZm9yIERpc3RyaWJ1dGVkIFN5c3RlbXMgSW50ZWdyYXRp

b24sIEp1bmUgMjAwMjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJ

bmZyYXN0cnVjdHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3Rp

dGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJbmZyYXN0cnVj

dHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxkYXRl

cz48eWVhcj4yMDAyPC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk4

PC9ZZWFyPjxSZWNOdW0+NjI8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjYyPC9yZWMtbnVt

YmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNz

dHZweGRtZTJ0ejB2MmV3MDJ6Ij42Mjwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1l

PSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48

YXV0aG9yPkZvc3RlcixJYW48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1hbiwgQ2FybDwvYXV0aG9y

PjxhdXRob3I+VHN1ZGlrLCBHZW5lPC9hdXRob3I+PGF1dGhvcj5UdWVja2UsIFN0ZXZlbjwvYXV0

aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5BIFNlY3VyaXR5IEFy

Y2hpdGVjdHVyZSBmb3IgQ29tcHV0YXRpb25hbCBHcmlkczwvdGl0bGU+PHNlY29uZGFyeS10aXRs

ZT5Qcm9jZWVkaW5ncyBvZiB0aGUgNXRoIEFDTSBjb25mZXJlbmNlIG9uIENvbXB1dGVyIGFuZCBj

b21tdW5pY2F0aW9ucyBzZWN1cml0eTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj4xOTk4PC95ZWFyPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5TYW4gRnJhbmNpc2NvLCBDYWxp

Zm9ybmlhLCBVbml0ZWQgU3RhdGVzPC9wdWItbG9jYXRpb24+PHB1Ymxpc2hlcj5BQ008L3B1Ymxp

c2hlcj48bGFiZWw+U2VjdXJpdHk8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNv

dXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMjg4MDkwLjI4ODExMTwvZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+Rm9zdGVyPC9B

dXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj40ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+NDg8L2tleT48L2ZvcmVpZ24ta2V5

cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPkZvc3RlciwgSS48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1h

biwgQy48L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+VGhlIEFuYXRvbXkgb2YgdGhlIEdyaWQ6IEVuYWJsaW5n

IFNjYWxhYmxlIFZpcnR1YWwgT3JnYW5pemF0aW9uczwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5J

bnRlcm5hdGlvbmFsIEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L3NlY29u

ZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5JbnRlcm5hdGlvbmFs

IEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L2Z1bGwtdGl0bGU+PC9wZXJp

b2RpY2FsPjxwYWdlcz4yMDDigJMyMjI8L3BhZ2VzPjx2b2x1bWU+MTU8L3ZvbHVtZT48bnVtYmVy

PjM8L251bWJlcj48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5HcmlkPC9s

YWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk5PC9ZZWFyPjxS

ZWNOdW0+NTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjUwPC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij41MDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJCb29rIj42

PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0

aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT5UaGUgR3JpZDogQmx1ZXByaW50IGZvciBhIE5ldyBDb21wdXRpbmcg

SW5mcmFzdHJ1Y3R1cmU8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4s

IFNhbiBGcmFuY2lzY28sIENBPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+

PGZ1bGwtdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4sIFNhbiBGcmFuY2lzY28sIENBPC9mdWxsLXRp

dGxlPjwvcGVyaW9kaWNhbD48dm9sdW1lPjIxMTwvdm9sdW1lPjxkYXRlcz48eWVhcj4xOTk5PC95

ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+

Njk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjY5PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtl

eXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3

MDJ6Ij42OTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGlj

bGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJ

LjwvYXV0aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjxhdXRob3I+TmljaywgSi48

L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRv

cnM+PHRpdGxlcz48dGl0bGU+VGhlIFBoeXNpb2xvZ3kgb2YgdGhlIEdyaWQ6IEFuIE9wZW4gR3Jp

ZCBTZXJ2aWNlcyBBcmNoaXRlY3R1cmUgZm9yIERpc3RyaWJ1dGVkIFN5c3RlbXMgSW50ZWdyYXRp

b24sIEp1bmUgMjAwMjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJ

bmZyYXN0cnVjdHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3Rp

dGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJbmZyYXN0cnVj

dHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxkYXRl

cz48eWVhcj4yMDAyPC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk4

PC9ZZWFyPjxSZWNOdW0+NjI8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjYyPC9yZWMtbnVt

YmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNz

dHZweGRtZTJ0ejB2MmV3MDJ6Ij42Mjwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1l

PSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48

YXV0aG9yPkZvc3RlcixJYW48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1hbiwgQ2FybDwvYXV0aG9y

PjxhdXRob3I+VHN1ZGlrLCBHZW5lPC9hdXRob3I+PGF1dGhvcj5UdWVja2UsIFN0ZXZlbjwvYXV0

aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5BIFNlY3VyaXR5IEFy

Y2hpdGVjdHVyZSBmb3IgQ29tcHV0YXRpb25hbCBHcmlkczwvdGl0bGU+PHNlY29uZGFyeS10aXRs

ZT5Qcm9jZWVkaW5ncyBvZiB0aGUgNXRoIEFDTSBjb25mZXJlbmNlIG9uIENvbXB1dGVyIGFuZCBj

b21tdW5pY2F0aW9ucyBzZWN1cml0eTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj4xOTk4PC95ZWFyPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5TYW4gRnJhbmNpc2NvLCBDYWxp

Zm9ybmlhLCBVbml0ZWQgU3RhdGVzPC9wdWItbG9jYXRpb24+PHB1Ymxpc2hlcj5BQ008L3B1Ymxp

c2hlcj48bGFiZWw+U2VjdXJpdHk8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNv

dXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMjg4MDkwLjI4ODExMTwvZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+Rm9zdGVyPC9B

dXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj40ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+NDg8L2tleT48L2ZvcmVpZ24ta2V5

cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPkZvc3RlciwgSS48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1h

biwgQy48L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+VGhlIEFuYXRvbXkgb2YgdGhlIEdyaWQ6IEVuYWJsaW5n

IFNjYWxhYmxlIFZpcnR1YWwgT3JnYW5pemF0aW9uczwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5J

bnRlcm5hdGlvbmFsIEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L3NlY29u

ZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5JbnRlcm5hdGlvbmFs

IEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L2Z1bGwtdGl0bGU+PC9wZXJp

b2RpY2FsPjxwYWdlcz4yMDDigJMyMjI8L3BhZ2VzPjx2b2x1bWU+MTU8L3ZvbHVtZT48bnVtYmVy

PjM8L251bWJlcj48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5HcmlkPC9s

YWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk5PC9ZZWFyPjxS

ZWNOdW0+NTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjUwPC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij41MDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJCb29rIj42

PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJLjwvYXV0

aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9y

cz48dGl0bGVzPjx0aXRsZT5UaGUgR3JpZDogQmx1ZXByaW50IGZvciBhIE5ldyBDb21wdXRpbmcg

SW5mcmFzdHJ1Y3R1cmU8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4s

IFNhbiBGcmFuY2lzY28sIENBPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+

PGZ1bGwtdGl0bGU+TW9yZ2FuIEthdWZpdWlhbm4sIFNhbiBGcmFuY2lzY28sIENBPC9mdWxsLXRp

dGxlPjwvcGVyaW9kaWNhbD48dm9sdW1lPjIxMTwvdm9sdW1lPjxkYXRlcz48eWVhcj4xOTk5PC95

ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+

Njk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjY5PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtl

eXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3

MDJ6Ij42OTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGlj

bGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+Rm9zdGVyLCBJ

LjwvYXV0aG9yPjxhdXRob3I+S2Vzc2VsbWFuLCBDLjwvYXV0aG9yPjxhdXRob3I+TmljaywgSi48

L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRv

cnM+PHRpdGxlcz48dGl0bGU+VGhlIFBoeXNpb2xvZ3kgb2YgdGhlIEdyaWQ6IEFuIE9wZW4gR3Jp

ZCBTZXJ2aWNlcyBBcmNoaXRlY3R1cmUgZm9yIERpc3RyaWJ1dGVkIFN5c3RlbXMgSW50ZWdyYXRp

b24sIEp1bmUgMjAwMjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJ

bmZyYXN0cnVjdHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L3NlY29uZGFyeS10aXRsZT48L3Rp

dGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5PcGVuIEdyaWQgU2VydmljZSBJbmZyYXN0cnVj

dHVyZSBXRywgR2xvYmFsIEdyaWQgRm9ydW08L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxkYXRl

cz48eWVhcj4yMDAyPC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWQ8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5Gb3N0ZXI8L0F1dGhvcj48WWVhcj4xOTk4

PC9ZZWFyPjxSZWNOdW0+NjI8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjYyPC9yZWMtbnVt

YmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNz

dHZweGRtZTJ0ejB2MmV3MDJ6Ij42Mjwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1l

PSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48

YXV0aG9yPkZvc3RlcixJYW48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1hbiwgQ2FybDwvYXV0aG9y

PjxhdXRob3I+VHN1ZGlrLCBHZW5lPC9hdXRob3I+PGF1dGhvcj5UdWVja2UsIFN0ZXZlbjwvYXV0

aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5BIFNlY3VyaXR5IEFy

Y2hpdGVjdHVyZSBmb3IgQ29tcHV0YXRpb25hbCBHcmlkczwvdGl0bGU+PHNlY29uZGFyeS10aXRs

ZT5Qcm9jZWVkaW5ncyBvZiB0aGUgNXRoIEFDTSBjb25mZXJlbmNlIG9uIENvbXB1dGVyIGFuZCBj

b21tdW5pY2F0aW9ucyBzZWN1cml0eTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48

eWVhcj4xOTk4PC95ZWFyPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5TYW4gRnJhbmNpc2NvLCBDYWxp

Zm9ybmlhLCBVbml0ZWQgU3RhdGVzPC9wdWItbG9jYXRpb24+PHB1Ymxpc2hlcj5BQ008L3B1Ymxp

c2hlcj48bGFiZWw+U2VjdXJpdHk8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNv

dXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMjg4MDkwLjI4ODExMTwvZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+Rm9zdGVyPC9B

dXRob3I+PFllYXI+MjAwMTwvWWVhcj48UmVjTnVtPjQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51

bWJlcj40ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVy

ZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+NDg8L2tleT48L2ZvcmVpZ24ta2V5

cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1

dG9ycz48YXV0aG9ycz48YXV0aG9yPkZvc3RlciwgSS48L2F1dGhvcj48YXV0aG9yPktlc3NlbG1h

biwgQy48L2F1dGhvcj48YXV0aG9yPlR1ZWNrZSwgUy48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+VGhlIEFuYXRvbXkgb2YgdGhlIEdyaWQ6IEVuYWJsaW5n

IFNjYWxhYmxlIFZpcnR1YWwgT3JnYW5pemF0aW9uczwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5J

bnRlcm5hdGlvbmFsIEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L3NlY29u

ZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5JbnRlcm5hdGlvbmFs

IEpvdXJuYWwgb2YgU3VwZXJjb21wdXRlciBBcHBsaWNhdGlvbnM8L2Z1bGwtdGl0bGU+PC9wZXJp

b2RpY2FsPjxwYWdlcz4yMDDigJMyMjI8L3BhZ2VzPjx2b2x1bWU+MTU8L3ZvbHVtZT48bnVtYmVy

PjM8L251bWJlcj48ZGF0ZXM+PHllYXI+MjAwMTwveWVhcj48L2RhdGVzPjxsYWJlbD5HcmlkPC9s

YWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA [2-5] is to enable the large-scale coordinated used and sharing of geographically dispersed resources, it can be, to some extent, considered a system in this category.Internet Service Support: This category includes systems that support wide assortment of Internet services. Such applications as peer-to-peer multicast systems PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5WYW4gUmVuZXNzZTwvQXV0aG9yPjxZZWFyPjIwMDM8L1ll

YXI+PFJlY051bT4xNDY8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE0NjwvcmVjLW51bWJl

cj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2

cHhkbWUydHowdjJldzAyeiI+MTQ2PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5WYW4gUmVuZXNzZSwgUjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJpcm1hbiwg

Szwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvemRvZywgQTwvc3R5bGU+PC9hdXRob3I+PGF1dGhv

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PkRpbS1JVFJJVSwgRDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNpbmdoLCBNPC9zdHlsZT48L2F1

dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+Vm9nZWxzLCBXPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmli

dXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5IZXRlcm9nZW5laXR5LUF3YXJlIFBlZXItdG8tUGVlciBNdWx0

aWNhc3Q8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlByb2NlZWRpbmdzIG9mIHRoZSAx

N3RoIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uIERpc3RyaWJ1dGVkIENvbXB1dGluZyAoRElT

QzIwMDMpPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAz

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRl

PjxBdXRob3I+Q2FzdHJvPC9BdXRob3I+PFllYXI+MjAwMjwvWWVhcj48UmVjTnVtPjE0NzwvUmVj

TnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQ3PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtl

eSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4x

NDc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4x

NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q2FzdHJvLCBNLjwvc3R5

bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkRydXNjaGVsLCBQLjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPktl

cm1hcnJlYywgQS4gTS48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Sb3dzdHJvbiwgQS4gSS4gVC48

L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNj

cmliZTogQSBMYXJnZS1TY2FsZSBhbmQgRGVjZW50cmFsaXplZCBBcHBsaWNhdGlvbi1MZXZlbCBN

dWx0aWNhc3QgSW5mcmFzdHJ1Y3R1cmU8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNl

bGVjdGVkIEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJRUVFIEpvdXJuYWwgb248L3N0eWxlPjwv

c2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPlNlbGVjdGVk

IEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJRUVFIEpvdXJuYWwgb248L2Z1bGwtdGl0bGU+PC9w

ZXJpb2RpY2FsPjxwYWdlcz48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPjE0ODktMTQ5OTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjA8L3N0eWxl

Pjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj44PC9zdHlsZT48L251bWJlcj48a2V5d29yZHM+PGtleXdvcmQ+SW50

ZXJuZXQ8L2tleXdvcmQ+PGtleXdvcmQ+Y29tcHV0ZXIgbmV0d29yayByZWxpYWJpbGl0eTwva2V5

d29yZD48a2V5d29yZD5kaXNjcmV0ZSBldmVudCBzaW11bGF0aW9uPC9rZXl3b3JkPjxrZXl3b3Jk

PmxhcmdlLXNjYWxlIHN5c3RlbXM8L2tleXdvcmQ+PGtleXdvcmQ+bXVsdGljYXN0IGNvbW11bmlj

YXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48

a2V5d29yZD5zZWxmLWFkanVzdGluZyBzeXN0ZW1zPC9rZXl3b3JkPjxrZXl3b3JkPnRlbGVjb21t

dW5pY2F0aW9uIG5ldHdvcmsgcm91dGluZzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJv

dG9jb2xzPC9rZXl3b3JkPjxrZXl3b3JkPkludGVybmV0IHByb3RvY29sIG11bHRpY2FzdDwva2V5

d29yZD48a2V5d29yZD5QYXN0cnk8L2tleXdvcmQ+PGtleXdvcmQ+U2NyaWJlPC9rZXl3b3JkPjxr

ZXl3b3JkPmJlc3QtZWZmb3J0IHJlbGlhYmlsaXR5IGd1YXJhbnRlZXM8L2tleXdvcmQ+PGtleXdv

cmQ+ZGVjZW50cmFsaXplZCBhcHBsaWNhdGlvbi1sZXZlbCBtdWx0aWNhc3QgaW5mcmFzdHJ1Y3R1

cmU8L2tleXdvcmQ+PGtleXdvcmQ+ZGVsYXk8L2tleXdvcmQ+PGtleXdvcmQ+ZGlzY3JldGUgZXZl

bnQgc2ltdWxhdG9yPC9rZXl3b3JkPjxrZXl3b3JkPmdlbmVyaWMgcGVlci10by1wZWVyIG9iamVj

dCBsb2NhdGlvbjwva2V5d29yZD48a2V5d29yZD5nZW5lcmljIHJvdXRpbmcgc3Vic3RyYXRlPC9r

ZXl3b3JkPjxrZXl3b3JkPmdyb3VwIHNpemU8L2tleXdvcmQ+PGtleXdvcmQ+bGluayBzdHJlc3M8

L2tleXdvcmQ+PGtleXdvcmQ+bG9jYWxpdHkgcHJvcGVydGllczwva2V5d29yZD48a2V5d29yZD5u

ZXR3b3JrIG5vZGVzPC9rZXl3b3JkPjxrZXl3b3JkPm5ldHdvcmsgdG9wb2xvZ3kgbW9kZWw8L2tl

eXdvcmQ+PGtleXdvcmQ+c2NhbGFibGUgYXBwbGljYXRpb24tbGV2ZWwgbXVsdGljYXN0IGluZnJh

c3RydWN0dXJlPC9rZXl3b3JkPjxrZXl3b3JkPnNlbGYtb3JnYW5pemF0aW9uPC9rZXl3b3JkPjxr

ZXl3b3JkPnNpbXVsYXRpb24gcmVzdWx0czwva2V5d29yZD48L2tleXdvcmRzPjxkYXRlcz48eWVh

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjIwMDI8L3N0eWxlPjwveWVhcj48L2RhdGVzPjxpc2JuPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MDczMy04NzE2PC9zdHlsZT48L2lzYm4+

PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPmh0dHA6Ly9pZWVleHBsb3JlLmllZWUub3JnL3N0YW1w

L3N0YW1wLmpzcD9hcm51bWJlcj0xMDM4NTc5JmFtcDtpc251bWJlcj0yMjI2MDwvdXJsPjwvcmVs

YXRlZC11cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2Vs

bGlzLVRoZW90b2tpczwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+

PHJlY29yZD48cmVjLW51bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9

IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+

PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10

eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lz

LCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1

cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9z

dHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxl

Pjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBD

b21wdXRpbmcgU3VydmV5czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwv

c3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48

L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAt

MDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQx

NjgxPC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5WYW4gUmVuZXNzZTwvQXV0aG9yPjxZZWFyPjIwMDM8L1ll

YXI+PFJlY051bT4xNDY8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE0NjwvcmVjLW51bWJl

cj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2

cHhkbWUydHowdjJldzAyeiI+MTQ2PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5WYW4gUmVuZXNzZSwgUjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJpcm1hbiwg

Szwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvemRvZywgQTwvc3R5bGU+PC9hdXRob3I+PGF1dGhv

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PkRpbS1JVFJJVSwgRDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNpbmdoLCBNPC9zdHlsZT48L2F1

dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+Vm9nZWxzLCBXPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmli

dXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5IZXRlcm9nZW5laXR5LUF3YXJlIFBlZXItdG8tUGVlciBNdWx0

aWNhc3Q8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlByb2NlZWRpbmdzIG9mIHRoZSAx

N3RoIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uIERpc3RyaWJ1dGVkIENvbXB1dGluZyAoRElT

QzIwMDMpPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAz

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRl

PjxBdXRob3I+Q2FzdHJvPC9BdXRob3I+PFllYXI+MjAwMjwvWWVhcj48UmVjTnVtPjE0NzwvUmVj

TnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQ3PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtl

eSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4x

NDc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4x

NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q2FzdHJvLCBNLjwvc3R5

bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkRydXNjaGVsLCBQLjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPktl

cm1hcnJlYywgQS4gTS48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Sb3dzdHJvbiwgQS4gSS4gVC48

L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNj

cmliZTogQSBMYXJnZS1TY2FsZSBhbmQgRGVjZW50cmFsaXplZCBBcHBsaWNhdGlvbi1MZXZlbCBN

dWx0aWNhc3QgSW5mcmFzdHJ1Y3R1cmU8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNl

bGVjdGVkIEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJRUVFIEpvdXJuYWwgb248L3N0eWxlPjwv

c2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPlNlbGVjdGVk

IEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJRUVFIEpvdXJuYWwgb248L2Z1bGwtdGl0bGU+PC9w

ZXJpb2RpY2FsPjxwYWdlcz48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPjE0ODktMTQ5OTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjA8L3N0eWxl

Pjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj44PC9zdHlsZT48L251bWJlcj48a2V5d29yZHM+PGtleXdvcmQ+SW50

ZXJuZXQ8L2tleXdvcmQ+PGtleXdvcmQ+Y29tcHV0ZXIgbmV0d29yayByZWxpYWJpbGl0eTwva2V5

d29yZD48a2V5d29yZD5kaXNjcmV0ZSBldmVudCBzaW11bGF0aW9uPC9rZXl3b3JkPjxrZXl3b3Jk

PmxhcmdlLXNjYWxlIHN5c3RlbXM8L2tleXdvcmQ+PGtleXdvcmQ+bXVsdGljYXN0IGNvbW11bmlj

YXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48

a2V5d29yZD5zZWxmLWFkanVzdGluZyBzeXN0ZW1zPC9rZXl3b3JkPjxrZXl3b3JkPnRlbGVjb21t

dW5pY2F0aW9uIG5ldHdvcmsgcm91dGluZzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJv

dG9jb2xzPC9rZXl3b3JkPjxrZXl3b3JkPkludGVybmV0IHByb3RvY29sIG11bHRpY2FzdDwva2V5

d29yZD48a2V5d29yZD5QYXN0cnk8L2tleXdvcmQ+PGtleXdvcmQ+U2NyaWJlPC9rZXl3b3JkPjxr

ZXl3b3JkPmJlc3QtZWZmb3J0IHJlbGlhYmlsaXR5IGd1YXJhbnRlZXM8L2tleXdvcmQ+PGtleXdv

cmQ+ZGVjZW50cmFsaXplZCBhcHBsaWNhdGlvbi1sZXZlbCBtdWx0aWNhc3QgaW5mcmFzdHJ1Y3R1

cmU8L2tleXdvcmQ+PGtleXdvcmQ+ZGVsYXk8L2tleXdvcmQ+PGtleXdvcmQ+ZGlzY3JldGUgZXZl

bnQgc2ltdWxhdG9yPC9rZXl3b3JkPjxrZXl3b3JkPmdlbmVyaWMgcGVlci10by1wZWVyIG9iamVj

dCBsb2NhdGlvbjwva2V5d29yZD48a2V5d29yZD5nZW5lcmljIHJvdXRpbmcgc3Vic3RyYXRlPC9r

ZXl3b3JkPjxrZXl3b3JkPmdyb3VwIHNpemU8L2tleXdvcmQ+PGtleXdvcmQ+bGluayBzdHJlc3M8

L2tleXdvcmQ+PGtleXdvcmQ+bG9jYWxpdHkgcHJvcGVydGllczwva2V5d29yZD48a2V5d29yZD5u

ZXR3b3JrIG5vZGVzPC9rZXl3b3JkPjxrZXl3b3JkPm5ldHdvcmsgdG9wb2xvZ3kgbW9kZWw8L2tl

eXdvcmQ+PGtleXdvcmQ+c2NhbGFibGUgYXBwbGljYXRpb24tbGV2ZWwgbXVsdGljYXN0IGluZnJh

c3RydWN0dXJlPC9rZXl3b3JkPjxrZXl3b3JkPnNlbGYtb3JnYW5pemF0aW9uPC9rZXl3b3JkPjxr

ZXl3b3JkPnNpbXVsYXRpb24gcmVzdWx0czwva2V5d29yZD48L2tleXdvcmRzPjxkYXRlcz48eWVh

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjIwMDI8L3N0eWxlPjwveWVhcj48L2RhdGVzPjxpc2JuPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MDczMy04NzE2PC9zdHlsZT48L2lzYm4+

PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPmh0dHA6Ly9pZWVleHBsb3JlLmllZWUub3JnL3N0YW1w

L3N0YW1wLmpzcD9hcm51bWJlcj0xMDM4NTc5JmFtcDtpc251bWJlcj0yMjI2MDwvdXJsPjwvcmVs

YXRlZC11cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2Vs

bGlzLVRoZW90b2tpczwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+

PHJlY29yZD48cmVjLW51bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9

IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+

PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10

eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lz

LCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1

cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9z

dHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxl

Pjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBD

b21wdXRpbmcgU3VydmV5czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwv

c3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48

L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAt

MDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQx

NjgxPC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5WYW4gUmVuZXNzZTwvQXV0aG9yPjxZZWFyPjIwMDM8L1ll

YXI+PFJlY051bT4xNDY8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE0NjwvcmVjLW51bWJl

cj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2

cHhkbWUydHowdjJldzAyeiI+MTQ2PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5WYW4gUmVuZXNzZSwgUjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJpcm1hbiwg

Szwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkJvemRvZywgQTwvc3R5bGU+PC9hdXRob3I+PGF1dGhv

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PkRpbS1JVFJJVSwgRDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNpbmdoLCBNPC9zdHlsZT48L2F1

dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+Vm9nZWxzLCBXPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmli

dXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj5IZXRlcm9nZW5laXR5LUF3YXJlIFBlZXItdG8tUGVlciBNdWx0

aWNhc3Q8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlByb2NlZWRpbmdzIG9mIHRoZSAx

N3RoIEludGVybmF0aW9uYWwgU3ltcG9zaXVtIG9uIERpc3RyaWJ1dGVkIENvbXB1dGluZyAoRElT

QzIwMDMpPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAz

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRl

PjxBdXRob3I+Q2FzdHJvPC9BdXRob3I+PFllYXI+MjAwMjwvWWVhcj48UmVjTnVtPjE0NzwvUmVj

TnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTQ3PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtl

eSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4x

NDc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4x

NzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSJu

b3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Q2FzdHJvLCBNLjwvc3R5

bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcg

Um9tYW4iIHNpemU9IjEwMCUiPkRydXNjaGVsLCBQLjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPktl

cm1hcnJlYywgQS4gTS48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Sb3dzdHJvbiwgQS4gSS4gVC48

L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNj

cmliZTogQSBMYXJnZS1TY2FsZSBhbmQgRGVjZW50cmFsaXplZCBBcHBsaWNhdGlvbi1MZXZlbCBN

dWx0aWNhc3QgSW5mcmFzdHJ1Y3R1cmU8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNl

bGVjdGVkIEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJRUVFIEpvdXJuYWwgb248L3N0eWxlPjwv

c2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPlNlbGVjdGVk

IEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJRUVFIEpvdXJuYWwgb248L2Z1bGwtdGl0bGU+PC9w

ZXJpb2RpY2FsPjxwYWdlcz48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPjE0ODktMTQ5OTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjA8L3N0eWxl

Pjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj44PC9zdHlsZT48L251bWJlcj48a2V5d29yZHM+PGtleXdvcmQ+SW50

ZXJuZXQ8L2tleXdvcmQ+PGtleXdvcmQ+Y29tcHV0ZXIgbmV0d29yayByZWxpYWJpbGl0eTwva2V5

d29yZD48a2V5d29yZD5kaXNjcmV0ZSBldmVudCBzaW11bGF0aW9uPC9rZXl3b3JkPjxrZXl3b3Jk

PmxhcmdlLXNjYWxlIHN5c3RlbXM8L2tleXdvcmQ+PGtleXdvcmQ+bXVsdGljYXN0IGNvbW11bmlj

YXRpb248L2tleXdvcmQ+PGtleXdvcmQ+cGVyZm9ybWFuY2UgZXZhbHVhdGlvbjwva2V5d29yZD48

a2V5d29yZD5zZWxmLWFkanVzdGluZyBzeXN0ZW1zPC9rZXl3b3JkPjxrZXl3b3JkPnRlbGVjb21t

dW5pY2F0aW9uIG5ldHdvcmsgcm91dGluZzwva2V5d29yZD48a2V5d29yZD50cmFuc3BvcnQgcHJv

dG9jb2xzPC9rZXl3b3JkPjxrZXl3b3JkPkludGVybmV0IHByb3RvY29sIG11bHRpY2FzdDwva2V5

d29yZD48a2V5d29yZD5QYXN0cnk8L2tleXdvcmQ+PGtleXdvcmQ+U2NyaWJlPC9rZXl3b3JkPjxr

ZXl3b3JkPmJlc3QtZWZmb3J0IHJlbGlhYmlsaXR5IGd1YXJhbnRlZXM8L2tleXdvcmQ+PGtleXdv

cmQ+ZGVjZW50cmFsaXplZCBhcHBsaWNhdGlvbi1sZXZlbCBtdWx0aWNhc3QgaW5mcmFzdHJ1Y3R1

cmU8L2tleXdvcmQ+PGtleXdvcmQ+ZGVsYXk8L2tleXdvcmQ+PGtleXdvcmQ+ZGlzY3JldGUgZXZl

bnQgc2ltdWxhdG9yPC9rZXl3b3JkPjxrZXl3b3JkPmdlbmVyaWMgcGVlci10by1wZWVyIG9iamVj

dCBsb2NhdGlvbjwva2V5d29yZD48a2V5d29yZD5nZW5lcmljIHJvdXRpbmcgc3Vic3RyYXRlPC9r

ZXl3b3JkPjxrZXl3b3JkPmdyb3VwIHNpemU8L2tleXdvcmQ+PGtleXdvcmQ+bGluayBzdHJlc3M8

L2tleXdvcmQ+PGtleXdvcmQ+bG9jYWxpdHkgcHJvcGVydGllczwva2V5d29yZD48a2V5d29yZD5u

ZXR3b3JrIG5vZGVzPC9rZXl3b3JkPjxrZXl3b3JkPm5ldHdvcmsgdG9wb2xvZ3kgbW9kZWw8L2tl

eXdvcmQ+PGtleXdvcmQ+c2NhbGFibGUgYXBwbGljYXRpb24tbGV2ZWwgbXVsdGljYXN0IGluZnJh

c3RydWN0dXJlPC9rZXl3b3JkPjxrZXl3b3JkPnNlbGYtb3JnYW5pemF0aW9uPC9rZXl3b3JkPjxr

ZXl3b3JkPnNpbXVsYXRpb24gcmVzdWx0czwva2V5d29yZD48L2tleXdvcmRzPjxkYXRlcz48eWVh

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjIwMDI8L3N0eWxlPjwveWVhcj48L2RhdGVzPjxpc2JuPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MDczMy04NzE2PC9zdHlsZT48L2lzYm4+

PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPmh0dHA6Ly9pZWVleHBsb3JlLmllZWUub3JnL3N0YW1w

L3N0YW1wLmpzcD9hcm51bWJlcj0xMDM4NTc5JmFtcDtpc251bWJlcj0yMjI2MDwvdXJsPjwvcmVs

YXRlZC11cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2Vs

bGlzLVRoZW90b2tpczwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+

PHJlY29yZD48cmVjLW51bWJlcj44PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9

IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+

PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10

eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lz

LCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1

cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9z

dHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxl

Pjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBD

b21wdXRpbmcgU3VydmV5czwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwv

c3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5l

dyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48

L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3

IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAt

MDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ry

b25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQx

NjgxPC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA [14, 71, 72], Internet indirection infrastructures PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5TdG9pY2E8L0F1dGhvcj48WWVhcj4y

MDA0PC9ZZWFyPjxSZWNOdW0+MTQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDg8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0ODwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJKb3VybmFsIEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5Jb24gU3RvaWNhPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGFuaWVsIEFka2lu

czwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNoZWxsZXkgWmh1YW5nPC9zdHlsZT48L2F1dGhvcj48

YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+U2NvdHQgU2hlbmtlcjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0i

bm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNvbmVzaCBTdXJhbmE8

L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPklu

dGVybmV0IEluZGlyZWN0aW9uIEluZnJhc3RydWN0dXJlPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5JRUVFL0FDTSBUcmFucy4gTmV0dy48L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwv

dGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPklFRUUvQUNNIFRyYW5zLiBOZXR3LjwvZnVs

bC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjA1LTIxODwvc3R5bGU+PC9wYWdlcz48dm9sdW1l

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MTI8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yPC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjEwNjMtNjY5Mjwvc3R5bGU+PC9pc2JuPjx1

cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2R4LmRvaS5vcmcvMTAu

MTEwOS9UTkVULjIwMDQuODI2Mjc5PC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3JlY29yZD48

L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5TdG9pY2E8L0F1dGhvcj48WWVhcj4y

MDA0PC9ZZWFyPjxSZWNOdW0+MTQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDg8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0ODwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJKb3VybmFsIEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5Jb24gU3RvaWNhPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGFuaWVsIEFka2lu

czwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNoZWxsZXkgWmh1YW5nPC9zdHlsZT48L2F1dGhvcj48

YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+U2NvdHQgU2hlbmtlcjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0i

bm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNvbmVzaCBTdXJhbmE8

L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPklu

dGVybmV0IEluZGlyZWN0aW9uIEluZnJhc3RydWN0dXJlPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5JRUVFL0FDTSBUcmFucy4gTmV0dy48L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwv

dGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPklFRUUvQUNNIFRyYW5zLiBOZXR3LjwvZnVs

bC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjA1LTIxODwvc3R5bGU+PC9wYWdlcz48dm9sdW1l

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MTI8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yPC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjEwNjMtNjY5Mjwvc3R5bGU+PC9pc2JuPjx1

cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2R4LmRvaS5vcmcvMTAu

MTEwOS9UTkVULjIwMDQuODI2Mjc5PC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3JlY29yZD48

L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5TdG9pY2E8L0F1dGhvcj48WWVhcj4y

MDA0PC9ZZWFyPjxSZWNOdW0+MTQ4PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNDg8L3Jl

Yy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJk

aWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0ODwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlw

ZSBuYW1lPSJKb3VybmFsIEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5Jb24gU3RvaWNhPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGFuaWVsIEFka2lu

czwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNoZWxsZXkgWmh1YW5nPC9zdHlsZT48L2F1dGhvcj48

YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+U2NvdHQgU2hlbmtlcjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0i

bm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNvbmVzaCBTdXJhbmE8

L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48

c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPklu

dGVybmV0IEluZGlyZWN0aW9uIEluZnJhc3RydWN0dXJlPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5JRUVFL0FDTSBUcmFucy4gTmV0dy48L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwv

dGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPklFRUUvQUNNIFRyYW5zLiBOZXR3LjwvZnVs

bC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjA1LTIxODwvc3R5bGU+PC9wYWdlcz48dm9sdW1l

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MTI8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yPC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjEwNjMtNjY5Mjwvc3R5bGU+PC9pc2JuPjx1

cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2R4LmRvaS5vcmcvMTAu

MTEwOS9UTkVULjIwMDQuODI2Mjc5PC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3JlY29yZD48

L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [14, 73], and security applications are used to leverage IP independent multicast routing and to provide protection against of denial of service or virus attacks PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5KYW5ha2lyYW1hbjwvQXV0aG9yPjxZZWFyPjIwMDM8L1ll

YXI+PFJlY051bT4xNTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE1MDwvcmVjLW51bWJl

cj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2

cHhkbWUydHowdjJldzAyeiI+MTUwPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUGFwZXIiPjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5SYW1hcHJhYmh1IEphbmFraXJhbWFuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TWFyY2Vs

IFdhbGR2b2dlbDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlFpIFpoYW5nPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JbmRyYTogQSBQZWVyLXRv

LVBlZXIgQXBwcm9hY2ggdG8gTmV0d29yayBJbnRydXNpb24gRGV0ZWN0aW9uIGFuZCBQcmV2ZW50

aW9uPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgVHdl

bGZ0aCBJbnRlcm5hdGlvbmFsIFdvcmtzaG9wIG9uIEVuYWJsaW5nIFRlY2hub2xvZ2llczogSW5m

cmFzdHJ1Y3R1cmUgZm9yIENvbGxhYm9yYXRpdmUgRW50ZXJwcmlzZXM8L3N0eWxlPjwvc2Vjb25k

YXJ5LXRpdGxlPjwvdGl0bGVzPjxwYWdlcz4yMjY8L3BhZ2VzPjxkYXRlcz48eWVhcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8L3N0

eWxlPjwveWVhcj48L2RhdGVzPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JRUVFIENvbXB1dGVyIFNvY2lldHk8L3N0eWxl

PjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5L

ZXJvbXl0aXM8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+MTQ5PC9SZWNOdW0+PHJl

Y29yZD48cmVjLW51bWJlcj4xNDk8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0i

RU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0OTwva2V5

PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVm

LXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5nZWxvcyBELiBLZXJvbXl0aXM8

L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj5WaXNoYWwgTWlzcmE8L3N0eWxlPjwvYXV0aG9yPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5EYW4gUnViZW5zdGVpbjwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3Jz

Pjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+U09TOiBTZWN1cmUgT3ZlcmxheSBTZXJ2aWNlczwvc3R5bGU+PC90aXRs

ZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+UHJvY2VlZGluZ3Mgb2YgdGhlIDIwMDIgY29uZmVyZW5jZSBvbiBB

cHBsaWNhdGlvbnMsIHRlY2hub2xvZ2llcywgYXJjaGl0ZWN0dXJlcywgYW5kIHByb3RvY29scyBm

b3IgY29tcHV0ZXIgY29tbXVuaWNhdGlvbnM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPlByb2NlZWRpbmdzIG9mIHRoZSAyMDAyIGNvbmZl

cmVuY2Ugb24gQXBwbGljYXRpb25zLCB0ZWNobm9sb2dpZXMsIGFyY2hpdGVjdHVyZXMsIGFuZCBw

cm90b2NvbHMgZm9yIGNvbXB1dGVyIGNvbW11bmljYXRpb25zPC9mdWxsLXRpdGxlPjwvcGVyaW9k

aWNhbD48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj42MS03Mjwvc3R5bGU+PC9wYWdlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9

Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAyPC9zdHlsZT48

L3llYXI+PC9kYXRlcz48cHViLWxvY2F0aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+UGl0dHNidXJnaCwgUGVubnN5bHZhbmlhLCBVU0E8

L3N0eWxlPjwvcHViLWxvY2F0aW9uPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BQ008L3N0eWxlPjwvcHVibGlzaGVyPjx1

cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEw

LjExNDUvNjMzMDI1LjYzMzAzMjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9D

aXRlPjxDaXRlPjxBdXRob3I+VmxhY2hvczwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xNTE8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE1MTwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTUxPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwg

QXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlZhc2ls

ZWlvcyBWbGFjaG9zPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U3RlcGhhbm9zIEFuZHJvdXRzZWxs

aXMtVGhlb3Rva2lzPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGlvbWlkaXMgU3BpbmVsbGlzPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5TZWN1

cml0eSBBcHBsaWNhdGlvbnMgb2YgUGVlci10by1QZWVyIE5ldHdvcmtzPC9zdHlsZT48L3RpdGxl

PjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5Db21wdXRlciBOZXR3b3JrczogVGhlIEludGVybmF0aW9uYWwgSm91

cm5hbCBvZiBDb21wdXRlciBhbmQgVGVsZWNvbW11bmljYXRpb25zIE5ldHdvcmtpbmc8L3N0eWxl

Pjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkNvbXB1

dGVyIE5ldHdvcmtzOiBUaGUgSW50ZXJuYXRpb25hbCBKb3VybmFsIG9mIENvbXB1dGVyIGFuZCBU

ZWxlY29tbXVuaWNhdGlvbnMgTmV0d29ya2luZzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBh

Z2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MTk1LTIwNTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NDU8L3N0eWxlPjwvdm9sdW1lPjxudW1i

ZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij4yPC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRl

cz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPjEzODktMTI4Njwvc3R5bGU+PC9pc2JuPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1y

ZXNvdXJjZS1udW0+aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNi9qLmNvbW5ldC4yMDA0LjAxLjAw

MjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+

QW5kcm91dHNlbGxpcy1UaGVvdG9raXM8L0F1dGhvcj48WWVhcj4yMDA0PC9ZZWFyPjxSZWNOdW0+

ODwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlz

PjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAy

eiI+ODwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUi

PjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BbmRyb3V0c2VsbGlz

LVRoZW90b2tpcywgU3RlcGhhbm9zPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U3BpbmVsbGlzLCBE

aW9taWRpczwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+

PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+QSBTdXJ2ZXkgb2YgUGVlci10by1QZWVyIENvbnRlbnQgRGlzdHJpYnV0aW9uIFRlY2hu

b2xvZ2llczwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QUNNIENvbXB1dGluZyBTdXJ2

ZXlzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10

aXRsZT5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxwYWdl

cz48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjMzNS0zNzE8L3N0eWxlPjwvcGFnZXM+PHZvbHVtZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjM2PC9zdHlsZT48L3ZvbHVtZT48bnVtYmVy

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

NDwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwNDwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+

PGlzYm4+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4wMzYwLTAzMDA8L3N0eWxlPjwvaXNibj48bGFiZWw+UDJQPC9sYWJlbD48dXJscz48L3Vy

bHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPmh0dHA6Ly9kb2kuYWNtLm9yZy8xMC4xMTQ1LzEw

NDE2ODAuMTA0MTY4MTwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjwv

RW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5KYW5ha2lyYW1hbjwvQXV0aG9yPjxZZWFyPjIwMDM8L1ll

YXI+PFJlY051bT4xNTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE1MDwvcmVjLW51bWJl

cj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2

cHhkbWUydHowdjJldzAyeiI+MTUwPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUGFwZXIiPjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5SYW1hcHJhYmh1IEphbmFraXJhbWFuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TWFyY2Vs

IFdhbGR2b2dlbDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlFpIFpoYW5nPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JbmRyYTogQSBQZWVyLXRv

LVBlZXIgQXBwcm9hY2ggdG8gTmV0d29yayBJbnRydXNpb24gRGV0ZWN0aW9uIGFuZCBQcmV2ZW50

aW9uPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgVHdl

bGZ0aCBJbnRlcm5hdGlvbmFsIFdvcmtzaG9wIG9uIEVuYWJsaW5nIFRlY2hub2xvZ2llczogSW5m

cmFzdHJ1Y3R1cmUgZm9yIENvbGxhYm9yYXRpdmUgRW50ZXJwcmlzZXM8L3N0eWxlPjwvc2Vjb25k

YXJ5LXRpdGxlPjwvdGl0bGVzPjxwYWdlcz4yMjY8L3BhZ2VzPjxkYXRlcz48eWVhcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8L3N0

eWxlPjwveWVhcj48L2RhdGVzPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JRUVFIENvbXB1dGVyIFNvY2lldHk8L3N0eWxl

PjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5L

ZXJvbXl0aXM8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+MTQ5PC9SZWNOdW0+PHJl

Y29yZD48cmVjLW51bWJlcj4xNDk8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0i

RU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0OTwva2V5

PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVm

LXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5nZWxvcyBELiBLZXJvbXl0aXM8

L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj5WaXNoYWwgTWlzcmE8L3N0eWxlPjwvYXV0aG9yPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5EYW4gUnViZW5zdGVpbjwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3Jz

Pjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+U09TOiBTZWN1cmUgT3ZlcmxheSBTZXJ2aWNlczwvc3R5bGU+PC90aXRs

ZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+UHJvY2VlZGluZ3Mgb2YgdGhlIDIwMDIgY29uZmVyZW5jZSBvbiBB

cHBsaWNhdGlvbnMsIHRlY2hub2xvZ2llcywgYXJjaGl0ZWN0dXJlcywgYW5kIHByb3RvY29scyBm

b3IgY29tcHV0ZXIgY29tbXVuaWNhdGlvbnM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPlByb2NlZWRpbmdzIG9mIHRoZSAyMDAyIGNvbmZl

cmVuY2Ugb24gQXBwbGljYXRpb25zLCB0ZWNobm9sb2dpZXMsIGFyY2hpdGVjdHVyZXMsIGFuZCBw

cm90b2NvbHMgZm9yIGNvbXB1dGVyIGNvbW11bmljYXRpb25zPC9mdWxsLXRpdGxlPjwvcGVyaW9k

aWNhbD48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj42MS03Mjwvc3R5bGU+PC9wYWdlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9

Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAyPC9zdHlsZT48

L3llYXI+PC9kYXRlcz48cHViLWxvY2F0aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+UGl0dHNidXJnaCwgUGVubnN5bHZhbmlhLCBVU0E8

L3N0eWxlPjwvcHViLWxvY2F0aW9uPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BQ008L3N0eWxlPjwvcHVibGlzaGVyPjx1

cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEw

LjExNDUvNjMzMDI1LjYzMzAzMjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9D

aXRlPjxDaXRlPjxBdXRob3I+VmxhY2hvczwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xNTE8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE1MTwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTUxPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwg

QXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlZhc2ls

ZWlvcyBWbGFjaG9zPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U3RlcGhhbm9zIEFuZHJvdXRzZWxs

aXMtVGhlb3Rva2lzPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGlvbWlkaXMgU3BpbmVsbGlzPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5TZWN1

cml0eSBBcHBsaWNhdGlvbnMgb2YgUGVlci10by1QZWVyIE5ldHdvcmtzPC9zdHlsZT48L3RpdGxl

PjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5Db21wdXRlciBOZXR3b3JrczogVGhlIEludGVybmF0aW9uYWwgSm91

cm5hbCBvZiBDb21wdXRlciBhbmQgVGVsZWNvbW11bmljYXRpb25zIE5ldHdvcmtpbmc8L3N0eWxl

Pjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkNvbXB1

dGVyIE5ldHdvcmtzOiBUaGUgSW50ZXJuYXRpb25hbCBKb3VybmFsIG9mIENvbXB1dGVyIGFuZCBU

ZWxlY29tbXVuaWNhdGlvbnMgTmV0d29ya2luZzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBh

Z2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MTk1LTIwNTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NDU8L3N0eWxlPjwvdm9sdW1lPjxudW1i

ZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij4yPC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRl

cz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPjEzODktMTI4Njwvc3R5bGU+PC9pc2JuPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1y

ZXNvdXJjZS1udW0+aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNi9qLmNvbW5ldC4yMDA0LjAxLjAw

MjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+

QW5kcm91dHNlbGxpcy1UaGVvdG9raXM8L0F1dGhvcj48WWVhcj4yMDA0PC9ZZWFyPjxSZWNOdW0+

ODwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlz

PjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAy

eiI+ODwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUi

PjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BbmRyb3V0c2VsbGlz

LVRoZW90b2tpcywgU3RlcGhhbm9zPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U3BpbmVsbGlzLCBE

aW9taWRpczwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+

PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+QSBTdXJ2ZXkgb2YgUGVlci10by1QZWVyIENvbnRlbnQgRGlzdHJpYnV0aW9uIFRlY2hu

b2xvZ2llczwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QUNNIENvbXB1dGluZyBTdXJ2

ZXlzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10

aXRsZT5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxwYWdl

cz48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjMzNS0zNzE8L3N0eWxlPjwvcGFnZXM+PHZvbHVtZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjM2PC9zdHlsZT48L3ZvbHVtZT48bnVtYmVy

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

NDwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwNDwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+

PGlzYm4+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4wMzYwLTAzMDA8L3N0eWxlPjwvaXNibj48bGFiZWw+UDJQPC9sYWJlbD48dXJscz48L3Vy

bHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPmh0dHA6Ly9kb2kuYWNtLm9yZy8xMC4xMTQ1LzEw

NDE2ODAuMTA0MTY4MTwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjwv

RW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5KYW5ha2lyYW1hbjwvQXV0aG9yPjxZZWFyPjIwMDM8L1ll

YXI+PFJlY051bT4xNTA8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE1MDwvcmVjLW51bWJl

cj48Zm9yZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2

cHhkbWUydHowdjJldzAyeiI+MTUwPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUGFwZXIiPjQ3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxh

dXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5SYW1hcHJhYmh1IEphbmFraXJhbWFuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TWFyY2Vs

IFdhbGR2b2dlbDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBm

b250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlFpIFpoYW5nPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JbmRyYTogQSBQZWVyLXRv

LVBlZXIgQXBwcm9hY2ggdG8gTmV0d29yayBJbnRydXNpb24gRGV0ZWN0aW9uIGFuZCBQcmV2ZW50

aW9uPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgVHdl

bGZ0aCBJbnRlcm5hdGlvbmFsIFdvcmtzaG9wIG9uIEVuYWJsaW5nIFRlY2hub2xvZ2llczogSW5m

cmFzdHJ1Y3R1cmUgZm9yIENvbGxhYm9yYXRpdmUgRW50ZXJwcmlzZXM8L3N0eWxlPjwvc2Vjb25k

YXJ5LXRpdGxlPjwvdGl0bGVzPjxwYWdlcz4yMjY8L3BhZ2VzPjxkYXRlcz48eWVhcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8L3N0

eWxlPjwveWVhcj48L2RhdGVzPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5JRUVFIENvbXB1dGVyIFNvY2lldHk8L3N0eWxl

PjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5L

ZXJvbXl0aXM8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxSZWNOdW0+MTQ5PC9SZWNOdW0+PHJl

Y29yZD48cmVjLW51bWJlcj4xNDk8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0i

RU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE0OTwva2V5

PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFBhcGVyIj40NzwvcmVm

LXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QW5nZWxvcyBELiBLZXJvbXl0aXM8

L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj5WaXNoYWwgTWlzcmE8L3N0eWxlPjwvYXV0aG9yPjxhdXRo

b3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij5EYW4gUnViZW5zdGVpbjwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3Jz

Pjx0aXRsZXM+PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+U09TOiBTZWN1cmUgT3ZlcmxheSBTZXJ2aWNlczwvc3R5bGU+PC90aXRs

ZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBS

b21hbiIgc2l6ZT0iMTAwJSI+UHJvY2VlZGluZ3Mgb2YgdGhlIDIwMDIgY29uZmVyZW5jZSBvbiBB

cHBsaWNhdGlvbnMsIHRlY2hub2xvZ2llcywgYXJjaGl0ZWN0dXJlcywgYW5kIHByb3RvY29scyBm

b3IgY29tcHV0ZXIgY29tbXVuaWNhdGlvbnM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPlByb2NlZWRpbmdzIG9mIHRoZSAyMDAyIGNvbmZl

cmVuY2Ugb24gQXBwbGljYXRpb25zLCB0ZWNobm9sb2dpZXMsIGFyY2hpdGVjdHVyZXMsIGFuZCBw

cm90b2NvbHMgZm9yIGNvbXB1dGVyIGNvbW11bmljYXRpb25zPC9mdWxsLXRpdGxlPjwvcGVyaW9k

aWNhbD48cGFnZXM+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj42MS03Mjwvc3R5bGU+PC9wYWdlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9

Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDAyPC9zdHlsZT48

L3llYXI+PC9kYXRlcz48cHViLWxvY2F0aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+UGl0dHNidXJnaCwgUGVubnN5bHZhbmlhLCBVU0E8

L3N0eWxlPjwvcHViLWxvY2F0aW9uPjxwdWJsaXNoZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BQ008L3N0eWxlPjwvcHVibGlzaGVyPjx1

cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDovL2RvaS5hY20ub3JnLzEw

LjExNDUvNjMzMDI1LjYzMzAzMjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9D

aXRlPjxDaXRlPjxBdXRob3I+VmxhY2hvczwvQXV0aG9yPjxZZWFyPjIwMDQ8L1llYXI+PFJlY051

bT4xNTE8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjE1MTwvcmVjLW51bWJlcj48Zm9yZWln

bi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHow

djJldzAyeiI+MTUxPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwg

QXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlZhc2ls

ZWlvcyBWbGFjaG9zPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U3RlcGhhbm9zIEFuZHJvdXRzZWxs

aXMtVGhlb3Rva2lzPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwi

IGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGlvbWlkaXMgU3BpbmVsbGlzPC9z

dHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5TZWN1

cml0eSBBcHBsaWNhdGlvbnMgb2YgUGVlci10by1QZWVyIE5ldHdvcmtzPC9zdHlsZT48L3RpdGxl

PjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj5Db21wdXRlciBOZXR3b3JrczogVGhlIEludGVybmF0aW9uYWwgSm91

cm5hbCBvZiBDb21wdXRlciBhbmQgVGVsZWNvbW11bmljYXRpb25zIE5ldHdvcmtpbmc8L3N0eWxl

Pjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkNvbXB1

dGVyIE5ldHdvcmtzOiBUaGUgSW50ZXJuYXRpb25hbCBKb3VybmFsIG9mIENvbXB1dGVyIGFuZCBU

ZWxlY29tbXVuaWNhdGlvbnMgTmV0d29ya2luZzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBh

Z2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+MTk1LTIwNTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NDU8L3N0eWxlPjwvdm9sdW1lPjxudW1i

ZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAl

Ij4yPC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0PC9zdHlsZT48L3llYXI+PC9kYXRl

cz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9

IjEwMCUiPjEzODktMTI4Njwvc3R5bGU+PC9pc2JuPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1y

ZXNvdXJjZS1udW0+aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNi9qLmNvbW5ldC4yMDA0LjAxLjAw

MjwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+

QW5kcm91dHNlbGxpcy1UaGVvdG9raXM8L0F1dGhvcj48WWVhcj4yMDA0PC9ZZWFyPjxSZWNOdW0+

ODwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+ODwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlz

PjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAy

eiI+ODwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUi

PjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZhY2U9

Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BbmRyb3V0c2VsbGlz

LVRoZW90b2tpcywgU3RlcGhhbm9zPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNl

PSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+U3BpbmVsbGlzLCBE

aW9taWRpczwvc3R5bGU+PC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+

PHRpdGxlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0i

MTAwJSI+QSBTdXJ2ZXkgb2YgUGVlci10by1QZWVyIENvbnRlbnQgRGlzdHJpYnV0aW9uIFRlY2hu

b2xvZ2llczwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+QUNNIENvbXB1dGluZyBTdXJ2

ZXlzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10

aXRsZT5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L2Z1bGwtdGl0bGU+PC9wZXJpb2RpY2FsPjxwYWdl

cz48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PjMzNS0zNzE8L3N0eWxlPjwvcGFnZXM+PHZvbHVtZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjM2PC9zdHlsZT48L3ZvbHVtZT48bnVtYmVy

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

NDwvc3R5bGU+PC9udW1iZXI+PGRhdGVzPjx5ZWFyPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9

IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAwNDwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+

PGlzYm4+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj4wMzYwLTAzMDA8L3N0eWxlPjwvaXNibj48bGFiZWw+UDJQPC9sYWJlbD48dXJscz48L3Vy

bHM+PGVsZWN0cm9uaWMtcmVzb3VyY2UtbnVtPmh0dHA6Ly9kb2kuYWNtLm9yZy8xMC4xMTQ1LzEw

NDE2ODAuMTA0MTY4MTwvZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+PC9yZWNvcmQ+PC9DaXRlPjwv

RW5kTm90ZT5=

ADDIN EN.CITE.DATA [14, 74-76] respectively. Database Systems: Distributed database systems are one of the most attractive research fields for peer-to-peer applications. The Local Relational Model (RLM) PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CZXJuc3RlaW48L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFy

PjxSZWNOdW0+MTUzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNTM8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE1Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+QmVybnN0ZWluLCBQQTwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdpdW5jaGlnbGlh

LCBGPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+S2VtZW50c2lldHNpZGlzLCBBPC9zdHlsZT48L2F1

dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+TXlsb3BvdWxvcywgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNlcmFmaW5p

LCBMPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+WmFpaHJheWV1LCBJPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5EYXRhIE1hbmFnZW1lbnQgZm9y

IFBlZXItdG8tUGVlciBDb21wdXRpbmc6IEEgVmlzaW9uPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25hbCBXb3Jrc2hvcCBv

biB0aGUgV2ViIGFuZCBEYXRhYmFzZXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVz

PjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPjIwMDI8L3N0eWxlPjwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3Jl

Y29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9y

PjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10

eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1

dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwv

YXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhv

cnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIg

Q29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwv

dGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVs

bC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1l

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxs

YWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0

cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291

cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CZXJuc3RlaW48L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFy

PjxSZWNOdW0+MTUzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNTM8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE1Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+QmVybnN0ZWluLCBQQTwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdpdW5jaGlnbGlh

LCBGPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+S2VtZW50c2lldHNpZGlzLCBBPC9zdHlsZT48L2F1

dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+TXlsb3BvdWxvcywgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNlcmFmaW5p

LCBMPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+WmFpaHJheWV1LCBJPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5EYXRhIE1hbmFnZW1lbnQgZm9y

IFBlZXItdG8tUGVlciBDb21wdXRpbmc6IEEgVmlzaW9uPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25hbCBXb3Jrc2hvcCBv

biB0aGUgV2ViIGFuZCBEYXRhYmFzZXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVz

PjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPjIwMDI8L3N0eWxlPjwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3Jl

Y29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9y

PjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10

eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1

dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwv

YXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhv

cnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIg

Q29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwv

dGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVs

bC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1l

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxs

YWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0

cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291

cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CZXJuc3RlaW48L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFy

PjxSZWNOdW0+MTUzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNTM8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE1Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJD

b25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9y

cz48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6

ZT0iMTAwJSI+QmVybnN0ZWluLCBQQTwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFj

ZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdpdW5jaGlnbGlh

LCBGPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+S2VtZW50c2lldHNpZGlzLCBBPC9zdHlsZT48L2F1

dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIg

c2l6ZT0iMTAwJSI+TXlsb3BvdWxvcywgSjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNlcmFmaW5p

LCBMPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+WmFpaHJheWV1LCBJPC9zdHlsZT48L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1h

bCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5EYXRhIE1hbmFnZW1lbnQgZm9y

IFBlZXItdG8tUGVlciBDb21wdXRpbmc6IEEgVmlzaW9uPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5Qcm9jZWVkaW5ncyBvZiB0aGUgRmlmdGggSW50ZXJuYXRpb25hbCBXb3Jrc2hvcCBv

biB0aGUgV2ViIGFuZCBEYXRhYmFzZXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVz

PjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPjIwMDI8L3N0eWxlPjwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3Jl

Y29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9y

PjxZZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44

PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZv

djJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10

eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1

dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwv

YXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhv

cnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIg

Q29udGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRh

cnktdGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXpl

PSIxMDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwv

dGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVs

bC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1l

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

MzY8L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGlt

ZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA0PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250

PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxs

YWJlbD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0

cDovL2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291

cmNlLW51bT48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [14, 77] proposes translations rules and semantic dependencies between the set of all data stored in peer-to-peer network. PIER PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5IdWVic2NoPC9BdXRob3I+PFllYXI+

MjAwMzwvWWVhcj48UmVjTnVtPjE1MjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTUyPC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xNTI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5

cGUgbmFtZT0iQ29uZmVyZW5jZSBQYXBlciI+NDc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1

dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPlJ5YW4gSHVlYnNjaDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkpvc2VwaCBN

LiBIZWxsZXJzdGVpbjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPk5pY2sgTGFuaGFtPC9zdHlsZT48

L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+Qm9vbiBUaGF1IExvbzwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNjb3R0

IFNoZW5rZXI8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Jb24gU3RvaWNhPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5RdWVyeWluZyB0aGUgSW50

ZXJuZXQgd2l0aCBQSUVSPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5n

cyBvZiB0aGUgMjl0aCBJbnRlcm5hdGlvbmFsIENvbmZlcmVuY2Ugb24gVmVyeSBMYXJnZSBEYXRh

IEJhc2VzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4zMjEtMzMyPC9z

dHlsZT48L3BhZ2VzPjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8L3N0eWxlPjwveWVhcj48cHViLWRhdGVzPjxk

YXRlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+Vm9sdW1lIDI5PC9zdHlsZT48L2RhdGU+PC9wdWItZGF0ZXM+PC9kYXRlcz48cHViLWxvY2F0

aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+QmVybGluLCBHZXJtYW55PC9zdHlsZT48L3B1Yi1sb2NhdGlvbj48cHVibGlzaGVyPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+VkxEQiBF

bmRvd21lbnQ8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+

PC9FbmROb3RlPgB=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5IdWVic2NoPC9BdXRob3I+PFllYXI+

MjAwMzwvWWVhcj48UmVjTnVtPjE1MjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTUyPC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xNTI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5

cGUgbmFtZT0iQ29uZmVyZW5jZSBQYXBlciI+NDc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1

dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPlJ5YW4gSHVlYnNjaDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkpvc2VwaCBN

LiBIZWxsZXJzdGVpbjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPk5pY2sgTGFuaGFtPC9zdHlsZT48

L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+Qm9vbiBUaGF1IExvbzwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNjb3R0

IFNoZW5rZXI8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Jb24gU3RvaWNhPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5RdWVyeWluZyB0aGUgSW50

ZXJuZXQgd2l0aCBQSUVSPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5n

cyBvZiB0aGUgMjl0aCBJbnRlcm5hdGlvbmFsIENvbmZlcmVuY2Ugb24gVmVyeSBMYXJnZSBEYXRh

IEJhc2VzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4zMjEtMzMyPC9z

dHlsZT48L3BhZ2VzPjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8L3N0eWxlPjwveWVhcj48cHViLWRhdGVzPjxk

YXRlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+Vm9sdW1lIDI5PC9zdHlsZT48L2RhdGU+PC9wdWItZGF0ZXM+PC9kYXRlcz48cHViLWxvY2F0

aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+QmVybGluLCBHZXJtYW55PC9zdHlsZT48L3B1Yi1sb2NhdGlvbj48cHVibGlzaGVyPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+VkxEQiBF

bmRvd21lbnQ8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+

PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbmRyb3V0c2VsbGlzLVRoZW90b2tpczwvQXV0aG9yPjxZ

ZWFyPjIwMDQ8L1llYXI+PFJlY051bT44PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj44PC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij44PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBl

IG5hbWU9IkpvdXJuYWwgQXJ0aWNsZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhv

cnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPkFuZHJvdXRzZWxsaXMtVGhlb3Rva2lzLCBTdGVwaGFub3M8L3N0eWxlPjwvYXV0

aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBz

aXplPSIxMDAlIj5TcGluZWxsaXMsIERpb21pZGlzPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+

PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0i

VGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5BIFN1cnZleSBvZiBQZWVyLXRvLVBlZXIgQ29u

dGVudCBEaXN0cmlidXRpb24gVGVjaG5vbG9naWVzPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnkt

dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIx

MDAlIj5BQ00gQ29tcHV0aW5nIFN1cnZleXM8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0

bGVzPjxwZXJpb2RpY2FsPjxmdWxsLXRpdGxlPkFDTSBDb21wdXRpbmcgU3VydmV5czwvZnVsbC10

aXRsZT48L3BlcmlvZGljYWw+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVz

IE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzM1LTM3MTwvc3R5bGU+PC9wYWdlcz48dm9sdW1lPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MzY8

L3N0eWxlPjwvdm9sdW1lPjxudW1iZXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj40PC9zdHlsZT48L251bWJlcj48ZGF0ZXM+PHllYXI+PHN0

eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4yMDA0

PC9zdHlsZT48L3llYXI+PC9kYXRlcz48aXNibj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjAzNjAtMDMwMDwvc3R5bGU+PC9pc2JuPjxsYWJl

bD5QMlA8L2xhYmVsPjx1cmxzPjwvdXJscz48ZWxlY3Ryb25pYy1yZXNvdXJjZS1udW0+aHR0cDov

L2RvaS5hY20ub3JnLzEwLjExNDUvMTA0MTY4MC4xMDQxNjgxPC9lbGVjdHJvbmljLXJlc291cmNl

LW51bT48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5IdWVic2NoPC9BdXRob3I+PFllYXI+

MjAwMzwvWWVhcj48UmVjTnVtPjE1MjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTUyPC9y

ZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJy

ZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xNTI8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5

cGUgbmFtZT0iQ29uZmVyZW5jZSBQYXBlciI+NDc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1

dGhvcnM+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4i

IHNpemU9IjEwMCUiPlJ5YW4gSHVlYnNjaDwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkpvc2VwaCBN

LiBIZWxsZXJzdGVpbjwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFs

IiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPk5pY2sgTGFuaGFtPC9zdHlsZT48

L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21h

biIgc2l6ZT0iMTAwJSI+Qm9vbiBUaGF1IExvbzwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5

bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPlNjb3R0

IFNoZW5rZXI8L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9u

dD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Jb24gU3RvaWNhPC9zdHlsZT48L2F1dGhv

cj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5v

cm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5RdWVyeWluZyB0aGUgSW50

ZXJuZXQgd2l0aCBQSUVSPC9zdHlsZT48L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5Qcm9jZWVkaW5n

cyBvZiB0aGUgMjl0aCBJbnRlcm5hdGlvbmFsIENvbmZlcmVuY2Ugb24gVmVyeSBMYXJnZSBEYXRh

IEJhc2VzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGFnZXM+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4zMjEtMzMyPC9z

dHlsZT48L3BhZ2VzPjxkYXRlcz48eWVhcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPjIwMDM8L3N0eWxlPjwveWVhcj48cHViLWRhdGVzPjxk

YXRlPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+Vm9sdW1lIDI5PC9zdHlsZT48L2RhdGU+PC9wdWItZGF0ZXM+PC9kYXRlcz48cHViLWxvY2F0

aW9uPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAw

JSI+QmVybGluLCBHZXJtYW55PC9zdHlsZT48L3B1Yi1sb2NhdGlvbj48cHVibGlzaGVyPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+VkxEQiBF

bmRvd21lbnQ8L3N0eWxlPjwvcHVibGlzaGVyPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+

PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA [14, 78] is a distributed query engine built on top of a peer-to-peer overlay network topology.Content Distribution: This category includes most of the existing peer -to-peer systems. They are intended to share of digital media and other data between users ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>;[14]. Peer-to-peer systems designed for content distribution range from simple direct file-sharing applications to more complex systems. The sophisticated peer-to-peer content sharing systems provides services of publishing, organizing, indexing, searching, updating, and retrieving data with security and efficiency ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Androutsellis-Theotokis</Author><Year>2004</Year><RecNum>8</RecNum><record><rec-number>8</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">8</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Androutsellis-Theotokis, Stephanos</style></author><author><style face="normal" font="Times New Roman" size="100%">Spinellis, Diomidis</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">A Survey of Peer-to-Peer Content Distribution Technologies</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">ACM Computing Surveys</style></secondary-title></titles><periodical><full-title>ACM Computing Surveys</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">335-371</style></pages><volume><style face="normal" font="Times New Roman" size="100%">36</style></volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2004</style></year></dates><isbn><style face="normal" font="Times New Roman" size="100%">0360-0300</style></isbn><label>P2P</label><urls></urls><electronic-resource-num>;[14]. There are a great number of systems and infrastructures fall into this category. Examples of such systems include the Napster ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>158</RecNum><record><rec-number>158</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>158</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>The Napster web site</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[79], Publius ADDIN EN.CITE <EndNote><Cite><Author>Waldman</Author><Year>2000</Year><RecNum>154</RecNum><record><rec-number>154</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">154</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Marc Waldman</author><author>Aviel D. Rubin</author><author>Lorrie Faith Cranor</author></authors></contributors><titles><title>Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System</title><secondary-title>Proceedings of the 9th Conference on USENIX Security Symposium</secondary-title></titles><pages>5-5</pages><volume>Volume 9</volume><dates><year>2000</year></dates><pub-location>Denver, Colorado</pub-location><publisher>USENIX Association</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Waldman</Author><Year>2000</Year><RecNum>154</RecNum><record><rec-number>154</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">154</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Marc Waldman</author><author>Aviel D. Rubin</author><author>Lorrie Faith Cranor</author></authors></contributors><titles><title>Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System</title><secondary-title>Proceedings of the 9th Conference on USENIX Security Symposium</secondary-title></titles><pages>5-5</pages><volume>Volume 9</volume><dates><year>2000</year></dates><pub-location>Denver, Colorado</pub-location><publisher>USENIX Association</publisher><urls></urls></record></Cite></EndNote>[80], Gnutella (RIP) ADDIN EN.CITE <EndNote><Cite><Author>Ripeanu</Author><Year>2001</Year><RecNum>20</RecNum><record><rec-number>20</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">20</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Ripeanu, M.</author></authors></contributors><titles><title>Peer-to-Peer Architecture Case Study: Gnutella network</title><secondary-title> Proceedings of First International Conference on Peer-to-Peer Computing</secondary-title></titles><pages>99-100</pages><keywords><keyword>4phd</keyword><keyword>file_sharing</keyword><keyword>overlay</keyword><keyword>p2p</keyword><keyword>replication</keyword><keyword>search</keyword><keyword>survey</keyword><keyword>unstructured</keyword></keywords><dates><year>2001</year></dates><accession-num>citeulike:785523</accession-num><label>P2P</label><urls><related-urls><url> </url></related-urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Ripeanu</Author><Year>2001</Year><RecNum>20</RecNum><record><rec-number>20</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">20</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Ripeanu, M.</author></authors></contributors><titles><title>Peer-to-Peer Architecture Case Study: Gnutella network</title><secondary-title> Proceedings of First International Conference on Peer-to-Peer Computing</secondary-title></titles><pages>99-100</pages><keywords><keyword>4phd</keyword><keyword>file_sharing</keyword><keyword>overlay</keyword><keyword>p2p</keyword><keyword>replication</keyword><keyword>search</keyword><keyword>survey</keyword><keyword>unstructured</keyword></keywords><dates><year>2001</year></dates><accession-num>citeulike:785523</accession-num><label>P2P</label><urls><related-urls><url> </url></related-urls></urls></record></Cite></EndNote>[81], Kazaa ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>140</RecNum><record><rec-number>140</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>140</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>The Kazaa web site</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[68], Freenet ADDIN EN.CITE <EndNote><Cite><Author>Clarke</Author><Year>2000</Year><RecNum>156</RecNum><record><rec-number>156</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">156</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Clarke, I</author><author>Sandberg, O</author><author>Wiley, B</author><author>Hong, TW</author></authors></contributors><titles><title>Freenet: A Distributed Anonymous Information Storage and Retrieval System in Designing Privacy Enhancing Technologies</title><secondary-title>Proceedings of ICSI Workshop on Design Issues in Anonymity and Unobservability</secondary-title></titles><dates><year>2000</year><pub-dates><date>June</date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Clarke</Author><Year>2000</Year><RecNum>156</RecNum><record><rec-number>156</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">156</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Clarke, I</author><author>Sandberg, O</author><author>Wiley, B</author><author>Hong, TW</author></authors></contributors><titles><title>Freenet: A Distributed Anonymous Information Storage and Retrieval System in Designing Privacy Enhancing Technologies</title><secondary-title>Proceedings of ICSI Workshop on Design Issues in Anonymity and Unobservability</secondary-title></titles><dates><year>2000</year><pub-dates><date>June</date></pub-dates></dates><urls></urls></record></Cite></EndNote>[82], MojoNation (RIP), Past ADDIN EN.CITE <EndNote><Cite><Author>Druschel</Author><Year>2001</Year><RecNum>159</RecNum><record><rec-number>159</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">159</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Druschel, P.</author><author>Rowstron, A.</author></authors></contributors><titles><title>PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility</title><secondary-title>Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on</secondary-title><alt-title>Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on</alt-title></titles><pages>75-80</pages><keywords><keyword>resource allocation</keyword><keyword>storage management</keyword><keyword>Internet-based global storage utility</keyword><keyword>PAST</keyword><keyword>Pastry location and routing scheme</keyword><keyword>client requests</keyword><keyword>high availability</keyword><keyword>load balancing</keyword><keyword>node additions</keyword><keyword>node failures</keyword><keyword>persistent peer-to-peer storage utility</keyword><keyword>scalability</keyword><keyword>storage access</keyword></keywords><dates><year>2001</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Druschel</Author><Year>2001</Year><RecNum>159</RecNum><record><rec-number>159</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">159</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Druschel, P.</author><author>Rowstron, A.</author></authors></contributors><titles><title>PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility</title><secondary-title>Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on</secondary-title><alt-title>Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on</alt-title></titles><pages>75-80</pages><keywords><keyword>resource allocation</keyword><keyword>storage management</keyword><keyword>Internet-based global storage utility</keyword><keyword>PAST</keyword><keyword>Pastry location and routing scheme</keyword><keyword>client requests</keyword><keyword>high availability</keyword><keyword>load balancing</keyword><keyword>node additions</keyword><keyword>node failures</keyword><keyword>persistent peer-to-peer storage utility</keyword><keyword>scalability</keyword><keyword>storage access</keyword></keywords><dates><year>2001</year></dates><urls></urls></record></Cite></EndNote>[83], Chord ADDIN EN.CITE <EndNote><Cite><Author>Stoica</Author><Year>2003</Year><RecNum>160</RecNum><record><rec-number>160</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">160</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Stoica, I.</author><author>Morris, R.</author><author>Liben-Nowell, D.</author><author>Karger, D. R.</author><author>Kaashoek, M. F.</author><author>Dabek, F.</author><author>Balakrishnan, H.</author></authors></contributors><titles><title>Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications</title><secondary-title>Networking, IEEE/ACM Transactions on</secondary-title></titles><periodical><full-title>Networking, IEEE/ACM Transactions on</full-title></periodical><pages>17-32</pages><volume>11</volume><number>1</number><keywords><keyword>Internet</keyword><keyword>file organisation</keyword><keyword>protocols</keyword><keyword>routing protocols</keyword><keyword>table lookup</keyword><keyword>Chord routing protocol</keyword><keyword>Internet applications</keyword><keyword>consistent hashing</keyword><keyword>data location</keyword><keyword>distributed protocol</keyword><keyword>lookup protocol</keyword><keyword>peer-to-peer applications</keyword></keywords><dates><year>2003</year></dates><isbn>1063-6692</isbn><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Stoica</Author><Year>2003</Year><RecNum>160</RecNum><record><rec-number>160</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">160</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Stoica, I.</author><author>Morris, R.</author><author>Liben-Nowell, D.</author><author>Karger, D. R.</author><author>Kaashoek, M. F.</author><author>Dabek, F.</author><author>Balakrishnan, H.</author></authors></contributors><titles><title>Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications</title><secondary-title>Networking, IEEE/ACM Transactions on</secondary-title></titles><periodical><full-title>Networking, IEEE/ACM Transactions on</full-title></periodical><pages>17-32</pages><volume>11</volume><number>1</number><keywords><keyword>Internet</keyword><keyword>file organisation</keyword><keyword>protocols</keyword><keyword>routing protocols</keyword><keyword>table lookup</keyword><keyword>Chord routing protocol</keyword><keyword>Internet applications</keyword><keyword>consistent hashing</keyword><keyword>data location</keyword><keyword>distributed protocol</keyword><keyword>lookup protocol</keyword><keyword>peer-to-peer applications</keyword></keywords><dates><year>2003</year></dates><isbn>1063-6692</isbn><urls></urls></record></Cite></EndNote>[84], FreeHaven ADDIN EN.CITE <EndNote><Cite><Author>Dingledine</Author><Year>2000</Year><RecNum>162</RecNum><record><rec-number>162</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">162</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Dingledine, R</author><author>Freedman, MJ</author><author>Molnar, D</author></authors></contributors><titles><title>The Free Haven Project: Distributed Anonymous Storage Service</title><secondary-title>Proceedings of the Workshop on Design Issues in Anonymity and Unobservability</secondary-title></titles><dates><year>2000</year><pub-dates><date>July</date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dingledine</Author><Year>2000</Year><RecNum>162</RecNum><record><rec-number>162</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">162</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Dingledine, R</author><author>Freedman, MJ</author><author>Molnar, D</author></authors></contributors><titles><title>The Free Haven Project: Distributed Anonymous Storage Service</title><secondary-title>Proceedings of the Workshop on Design Issues in Anonymity and Unobservability</secondary-title></titles><dates><year>2000</year><pub-dates><date>July</date></pub-dates></dates><urls></urls></record></Cite></EndNote>[85], BitTorrent ADDIN EN.CITE <EndNote><Cite><Author>Cohen</Author><Year>2007</Year><RecNum>59</RecNum><record><rec-number>59</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Cohen</Author><Year>2007</Year><RecNum>59</RecNum><record><rec-number>59</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url>;[86] and JXTA ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>163</RecNum><record><rec-number>163</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>163</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>The JXTA project web site</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[87].BitTorrentAll of these peer-to-peer systems are widely used applications, but the last technique, BitTorrent, deserves more attention because it has been gaining in popularity and gathering momentum since its first appearance. Before explaining the rationales behind its success, we present a brief overview of what BitTorrent is.BitTorrent is a peer-to-peer file sharing protocol like FTP in client/server paradigm. According to ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[88], “The key philosophy of BitTorrent is that users should upload (transmit outbound) at the same time they are downloading (receiving inbound.) In this manner, network bandwidth is utilized as efficiently as possible. BitTorrent is designed to work better as the number of people interested in a certain file increases, in contrast to other file transfer protocols”.Despite its peer-to-peer nature, there is still a central server (called a tracker) which is only responsible for coordination of peers connections without storing any information of the content of the files to be distributed. This feature enables tracker to support a large number of users with relatively limited tracker bandwidth ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[88]. The peer that has a complete copy of certain content and serves it is called seed. When a seed wants to share its file, first process executed by the seed is to create a small static metadata file (it ends in .torrent and called torrent file) which contains information about the file to be shared and the location of the tracker. Then the seed uploads this metadata file to tracker. This torrent file is vital for BitTorrent as all peers need to acquire it to start the download process. A peer is the opposite of the seed. In other word, it does not have the complete file and demands pieces of the file from seeds and other peers ADDIN EN.CITE <EndNote><Cite><Author>Cohen</Author><Year>2007</Year><RecNum>59</RecNum><record><rec-number>59</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url> on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Cohen</Author><Year>2007</Year><RecNum>59</RecNum><record><rec-number>59</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url> on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[86, 88]. A file is split into fixed-size pieces that are all the same size except for the last one. The length of pieces and its corresponding SHA1 hash are described in the torrent file. However, a peer requests a block (a portion of data and two or more blocks made up a whole piece) from a peer. The main reason behind wide acceptance of BitTorrent is that it defines a peer-to-peer content distribution protocol with very high data transfer speeds rather than offering another peer-to-peer application for end-users to share their contents such as movie and mp3 files. In addition, it not only separates content distribution medium from content discovery and access services, for instance, indexing and searching, but also ensures integrity of the file content and prevents free-riding PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BZGFyPC9BdXRob3I+PFllYXI+MjAwMDwvWWVhcj48UmVj

TnVtPjE2ODwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTY4PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij4xNjg8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5h

bCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkFk

YXIsIEU8L2F1dGhvcj48YXV0aG9yPkh1YmVybWFuLCBCQTwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5GcmVlIFJpZGluZyBvbiBHbnV0ZWxsYTwvdGl0bGU+

PHNlY29uZGFyeS10aXRsZT5GaXJzdCBNb25kYXk8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48

cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5GaXJzdCBNb25kYXk8L2Z1bGwtdGl0bGU+PC9wZXJpb2Rp

Y2FsPjxwYWdlcz4yLTEzPC9wYWdlcz48dm9sdW1lPjU8L3ZvbHVtZT48bnVtYmVyPjEwPC9udW1i

ZXI+PGRhdGVzPjx5ZWFyPjIwMDA8L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjxDaXRlPjxBdXRob3I+UmFtYXN3YW15PC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjE2NzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTY3PC9yZWMtbnVtYmVyPjxm

b3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRt

ZTJ0ejB2MmV3MDJ6Ij4xNjc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iQ29u

ZmVyZW5jZSBQcm9jZWVkaW5ncyI+MTA8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj5SYW1hc3dhbXksIEwuPC9hdXRob3I+PGF1dGhvcj5MaW5nLCBMaXU8L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+RnJlZSBSaWRpbmc6IEEgTmV3

IENoYWxsZW5nZSB0byBQZWVyLXRvLVBlZXIgRmlsZSBTaGFyaW5nIFN5c3RlbXM8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+U3lzdGVtIFNjaWVuY2VzLCAyMDAzLiBQcm9jZWVkaW5ncyBvZiB0aGUg

MzZ0aCBBbm51YWwgSGF3YWlpIEludGVybmF0aW9uYWwgQ29uZmVyZW5jZSBvbjwvc2Vjb25kYXJ5

LXRpdGxlPjxhbHQtdGl0bGU+U3lzdGVtIFNjaWVuY2VzLCAyMDAzLiBQcm9jZWVkaW5ncyBvZiB0

aGUgMzZ0aCBBbm51YWwgSGF3YWlpIEludGVybmF0aW9uYWwgQ29uZmVyZW5jZSBvbjwvYWx0LXRp

dGxlPjwvdGl0bGVzPjxwYWdlcz4xMCBwcC48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29yZD5JbnRl

cm5ldDwva2V5d29yZD48a2V5d29yZD5jb21wdXRlciBuZXR3b3Jrczwva2V5d29yZD48a2V5d29y

ZD5maWxlIGRvd25sb2FkIHNwZWVkPC9rZXl3b3JkPjxrZXl3b3JkPmZpbGUgbG9va3VwPC9rZXl3

b3JkPjxrZXl3b3JkPmZpbGUgcmVwbGljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+ZmlsZSBzaGFy

aW5nIGJlaGF2aW9yIHBhdHRlcm5zPC9rZXl3b3JkPjxrZXl3b3JkPmZpbGUgc2hhcmluZyBjb21t

dW5pdHk8L2tleXdvcmQ+PGtleXdvcmQ+ZnJlZSByaWRpbmc8L2tleXdvcmQ+PGtleXdvcmQ+cGVl

ci10by1wZWVyIGZpbGUgc2hhcmluZyBzeXN0ZW1zPC9rZXl3b3JkPjxrZXl3b3JkPnV0aWxpdHkg

ZnVuY3Rpb248L2tleXdvcmQ+PC9rZXl3b3Jkcz48ZGF0ZXM+PHllYXI+MjAwMzwveWVhcj48L2Rh

dGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5GZWxkbWFuPC9B

dXRob3I+PFllYXI+MjAwNjwvWWVhcj48UmVjTnVtPjE2NjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1u

dW1iZXI+MTY2PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0i

ZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xNjY8L2tleT48L2ZvcmVpZ24t

a2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRy

aWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkZlbGRtYW4sIE0uPC9hdXRob3I+PGF1dGhvcj5QYXBh

ZGltaXRyaW91LCBDLjwvYXV0aG9yPjxhdXRob3I+Q2h1YW5nLCBKLjwvYXV0aG9yPjxhdXRob3I+

U3RvaWNhLCBJLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRs

ZT5GcmVlLVJpZGluZyBhbmQgV2hpdGV3YXNoaW5nIGluIFBlZXItdG8tUGVlciBTeXN0ZW1zPC90

aXRsZT48c2Vjb25kYXJ5LXRpdGxlPlNlbGVjdGVkIEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJ

RUVFIEpvdXJuYWwgb248L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVs

bC10aXRsZT5TZWxlY3RlZCBBcmVhcyBpbiBDb21tdW5pY2F0aW9ucywgSUVFRSBKb3VybmFsIG9u

PC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48cGFnZXM+MTAxMC0xMDE5PC9wYWdlcz48dm9sdW1l

PjI0PC92b2x1bWU+PG51bWJlcj41PC9udW1iZXI+PGtleXdvcmRzPjxrZXl3b3JkPmluY2VudGl2

ZSBzY2hlbWVzPC9rZXl3b3JkPjxrZXl3b3JkPnBlZXItdG8tcGVlciBjb21wdXRpbmc8L2tleXdv

cmQ+PGtleXdvcmQ+ZnJlZS1yaWRpbmc8L2tleXdvcmQ+PGtleXdvcmQ+cGVlci10by1wZWVyIHN5

c3RlbTwva2V5d29yZD48a2V5d29yZD53aGl0ZXdhc2hpbmc8L2tleXdvcmQ+PGtleXdvcmQ+aW5j

ZW50aXZlczwva2V5d29yZD48a2V5d29yZD5wZWVyLXRvLXBlZXIgKFAyUCk8L2tleXdvcmQ+PC9r

ZXl3b3Jkcz48ZGF0ZXM+PHllYXI+MjAwNjwveWVhcj48L2RhdGVzPjxpc2JuPjA3MzMtODcxNjwv

aXNibj48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BZGFyPC9BdXRob3I+PFllYXI+MjAwMDwvWWVhcj48UmVj

TnVtPjE2ODwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTY4PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij4xNjg8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5h

bCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkFk

YXIsIEU8L2F1dGhvcj48YXV0aG9yPkh1YmVybWFuLCBCQTwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5GcmVlIFJpZGluZyBvbiBHbnV0ZWxsYTwvdGl0bGU+

PHNlY29uZGFyeS10aXRsZT5GaXJzdCBNb25kYXk8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48

cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5GaXJzdCBNb25kYXk8L2Z1bGwtdGl0bGU+PC9wZXJpb2Rp

Y2FsPjxwYWdlcz4yLTEzPC9wYWdlcz48dm9sdW1lPjU8L3ZvbHVtZT48bnVtYmVyPjEwPC9udW1i

ZXI+PGRhdGVzPjx5ZWFyPjIwMDA8L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjxDaXRlPjxBdXRob3I+UmFtYXN3YW15PC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjE2NzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTY3PC9yZWMtbnVtYmVyPjxm

b3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRt

ZTJ0ejB2MmV3MDJ6Ij4xNjc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iQ29u

ZmVyZW5jZSBQcm9jZWVkaW5ncyI+MTA8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj5SYW1hc3dhbXksIEwuPC9hdXRob3I+PGF1dGhvcj5MaW5nLCBMaXU8L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+RnJlZSBSaWRpbmc6IEEgTmV3

IENoYWxsZW5nZSB0byBQZWVyLXRvLVBlZXIgRmlsZSBTaGFyaW5nIFN5c3RlbXM8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+U3lzdGVtIFNjaWVuY2VzLCAyMDAzLiBQcm9jZWVkaW5ncyBvZiB0aGUg

MzZ0aCBBbm51YWwgSGF3YWlpIEludGVybmF0aW9uYWwgQ29uZmVyZW5jZSBvbjwvc2Vjb25kYXJ5

LXRpdGxlPjxhbHQtdGl0bGU+U3lzdGVtIFNjaWVuY2VzLCAyMDAzLiBQcm9jZWVkaW5ncyBvZiB0

aGUgMzZ0aCBBbm51YWwgSGF3YWlpIEludGVybmF0aW9uYWwgQ29uZmVyZW5jZSBvbjwvYWx0LXRp

dGxlPjwvdGl0bGVzPjxwYWdlcz4xMCBwcC48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29yZD5JbnRl

cm5ldDwva2V5d29yZD48a2V5d29yZD5jb21wdXRlciBuZXR3b3Jrczwva2V5d29yZD48a2V5d29y

ZD5maWxlIGRvd25sb2FkIHNwZWVkPC9rZXl3b3JkPjxrZXl3b3JkPmZpbGUgbG9va3VwPC9rZXl3

b3JkPjxrZXl3b3JkPmZpbGUgcmVwbGljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+ZmlsZSBzaGFy

aW5nIGJlaGF2aW9yIHBhdHRlcm5zPC9rZXl3b3JkPjxrZXl3b3JkPmZpbGUgc2hhcmluZyBjb21t

dW5pdHk8L2tleXdvcmQ+PGtleXdvcmQ+ZnJlZSByaWRpbmc8L2tleXdvcmQ+PGtleXdvcmQ+cGVl

ci10by1wZWVyIGZpbGUgc2hhcmluZyBzeXN0ZW1zPC9rZXl3b3JkPjxrZXl3b3JkPnV0aWxpdHkg

ZnVuY3Rpb248L2tleXdvcmQ+PC9rZXl3b3Jkcz48ZGF0ZXM+PHllYXI+MjAwMzwveWVhcj48L2Rh

dGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5GZWxkbWFuPC9B

dXRob3I+PFllYXI+MjAwNjwvWWVhcj48UmVjTnVtPjE2NjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1u

dW1iZXI+MTY2PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0i

ZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xNjY8L2tleT48L2ZvcmVpZ24t

a2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRy

aWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkZlbGRtYW4sIE0uPC9hdXRob3I+PGF1dGhvcj5QYXBh

ZGltaXRyaW91LCBDLjwvYXV0aG9yPjxhdXRob3I+Q2h1YW5nLCBKLjwvYXV0aG9yPjxhdXRob3I+

U3RvaWNhLCBJLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRs

ZT5GcmVlLVJpZGluZyBhbmQgV2hpdGV3YXNoaW5nIGluIFBlZXItdG8tUGVlciBTeXN0ZW1zPC90

aXRsZT48c2Vjb25kYXJ5LXRpdGxlPlNlbGVjdGVkIEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJ

RUVFIEpvdXJuYWwgb248L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVs

bC10aXRsZT5TZWxlY3RlZCBBcmVhcyBpbiBDb21tdW5pY2F0aW9ucywgSUVFRSBKb3VybmFsIG9u

PC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48cGFnZXM+MTAxMC0xMDE5PC9wYWdlcz48dm9sdW1l

PjI0PC92b2x1bWU+PG51bWJlcj41PC9udW1iZXI+PGtleXdvcmRzPjxrZXl3b3JkPmluY2VudGl2

ZSBzY2hlbWVzPC9rZXl3b3JkPjxrZXl3b3JkPnBlZXItdG8tcGVlciBjb21wdXRpbmc8L2tleXdv

cmQ+PGtleXdvcmQ+ZnJlZS1yaWRpbmc8L2tleXdvcmQ+PGtleXdvcmQ+cGVlci10by1wZWVyIHN5

c3RlbTwva2V5d29yZD48a2V5d29yZD53aGl0ZXdhc2hpbmc8L2tleXdvcmQ+PGtleXdvcmQ+aW5j

ZW50aXZlczwva2V5d29yZD48a2V5d29yZD5wZWVyLXRvLXBlZXIgKFAyUCk8L2tleXdvcmQ+PC9r

ZXl3b3Jkcz48ZGF0ZXM+PHllYXI+MjAwNjwveWVhcj48L2RhdGVzPjxpc2JuPjA3MzMtODcxNjwv

aXNibj48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BZGFyPC9BdXRob3I+PFllYXI+MjAwMDwvWWVhcj48UmVj

TnVtPjE2ODwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTY4PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij4xNjg8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5h

bCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkFk

YXIsIEU8L2F1dGhvcj48YXV0aG9yPkh1YmVybWFuLCBCQTwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5GcmVlIFJpZGluZyBvbiBHbnV0ZWxsYTwvdGl0bGU+

PHNlY29uZGFyeS10aXRsZT5GaXJzdCBNb25kYXk8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48

cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5GaXJzdCBNb25kYXk8L2Z1bGwtdGl0bGU+PC9wZXJpb2Rp

Y2FsPjxwYWdlcz4yLTEzPC9wYWdlcz48dm9sdW1lPjU8L3ZvbHVtZT48bnVtYmVyPjEwPC9udW1i

ZXI+PGRhdGVzPjx5ZWFyPjIwMDA8L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjxDaXRlPjxBdXRob3I+UmFtYXN3YW15PC9BdXRob3I+PFllYXI+MjAwMzwvWWVhcj48

UmVjTnVtPjE2NzwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MTY3PC9yZWMtbnVtYmVyPjxm

b3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRt

ZTJ0ejB2MmV3MDJ6Ij4xNjc8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iQ29u

ZmVyZW5jZSBQcm9jZWVkaW5ncyI+MTA8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+

PGF1dGhvcj5SYW1hc3dhbXksIEwuPC9hdXRob3I+PGF1dGhvcj5MaW5nLCBMaXU8L2F1dGhvcj48

L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+RnJlZSBSaWRpbmc6IEEgTmV3

IENoYWxsZW5nZSB0byBQZWVyLXRvLVBlZXIgRmlsZSBTaGFyaW5nIFN5c3RlbXM8L3RpdGxlPjxz

ZWNvbmRhcnktdGl0bGU+U3lzdGVtIFNjaWVuY2VzLCAyMDAzLiBQcm9jZWVkaW5ncyBvZiB0aGUg

MzZ0aCBBbm51YWwgSGF3YWlpIEludGVybmF0aW9uYWwgQ29uZmVyZW5jZSBvbjwvc2Vjb25kYXJ5

LXRpdGxlPjxhbHQtdGl0bGU+U3lzdGVtIFNjaWVuY2VzLCAyMDAzLiBQcm9jZWVkaW5ncyBvZiB0

aGUgMzZ0aCBBbm51YWwgSGF3YWlpIEludGVybmF0aW9uYWwgQ29uZmVyZW5jZSBvbjwvYWx0LXRp

dGxlPjwvdGl0bGVzPjxwYWdlcz4xMCBwcC48L3BhZ2VzPjxrZXl3b3Jkcz48a2V5d29yZD5JbnRl

cm5ldDwva2V5d29yZD48a2V5d29yZD5jb21wdXRlciBuZXR3b3Jrczwva2V5d29yZD48a2V5d29y

ZD5maWxlIGRvd25sb2FkIHNwZWVkPC9rZXl3b3JkPjxrZXl3b3JkPmZpbGUgbG9va3VwPC9rZXl3

b3JkPjxrZXl3b3JkPmZpbGUgcmVwbGljYXRpb248L2tleXdvcmQ+PGtleXdvcmQ+ZmlsZSBzaGFy

aW5nIGJlaGF2aW9yIHBhdHRlcm5zPC9rZXl3b3JkPjxrZXl3b3JkPmZpbGUgc2hhcmluZyBjb21t

dW5pdHk8L2tleXdvcmQ+PGtleXdvcmQ+ZnJlZSByaWRpbmc8L2tleXdvcmQ+PGtleXdvcmQ+cGVl

ci10by1wZWVyIGZpbGUgc2hhcmluZyBzeXN0ZW1zPC9rZXl3b3JkPjxrZXl3b3JkPnV0aWxpdHkg

ZnVuY3Rpb248L2tleXdvcmQ+PC9rZXl3b3Jkcz48ZGF0ZXM+PHllYXI+MjAwMzwveWVhcj48L2Rh

dGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5GZWxkbWFuPC9B

dXRob3I+PFllYXI+MjAwNjwvWWVhcj48UmVjTnVtPjE2NjwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1u

dW1iZXI+MTY2PC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0i

ZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xNjY8L2tleT48L2ZvcmVpZ24t

a2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRy

aWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkZlbGRtYW4sIE0uPC9hdXRob3I+PGF1dGhvcj5QYXBh

ZGltaXRyaW91LCBDLjwvYXV0aG9yPjxhdXRob3I+Q2h1YW5nLCBKLjwvYXV0aG9yPjxhdXRob3I+

U3RvaWNhLCBJLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRs

ZT5GcmVlLVJpZGluZyBhbmQgV2hpdGV3YXNoaW5nIGluIFBlZXItdG8tUGVlciBTeXN0ZW1zPC90

aXRsZT48c2Vjb25kYXJ5LXRpdGxlPlNlbGVjdGVkIEFyZWFzIGluIENvbW11bmljYXRpb25zLCBJ

RUVFIEpvdXJuYWwgb248L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVs

bC10aXRsZT5TZWxlY3RlZCBBcmVhcyBpbiBDb21tdW5pY2F0aW9ucywgSUVFRSBKb3VybmFsIG9u

PC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48cGFnZXM+MTAxMC0xMDE5PC9wYWdlcz48dm9sdW1l

PjI0PC92b2x1bWU+PG51bWJlcj41PC9udW1iZXI+PGtleXdvcmRzPjxrZXl3b3JkPmluY2VudGl2

ZSBzY2hlbWVzPC9rZXl3b3JkPjxrZXl3b3JkPnBlZXItdG8tcGVlciBjb21wdXRpbmc8L2tleXdv

cmQ+PGtleXdvcmQ+ZnJlZS1yaWRpbmc8L2tleXdvcmQ+PGtleXdvcmQ+cGVlci10by1wZWVyIHN5

c3RlbTwva2V5d29yZD48a2V5d29yZD53aGl0ZXdhc2hpbmc8L2tleXdvcmQ+PGtleXdvcmQ+aW5j

ZW50aXZlczwva2V5d29yZD48a2V5d29yZD5wZWVyLXRvLXBlZXIgKFAyUCk8L2tleXdvcmQ+PC9r

ZXl3b3Jkcz48ZGF0ZXM+PHllYXI+MjAwNjwveWVhcj48L2RhdGVzPjxpc2JuPjA3MzMtODcxNjwv

aXNibj48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjwvRW5kTm90ZT5=

ADDIN EN.CITE.DATA [89-91], which is a major problem from which many peer-to-peer applications suffer. It uses an embedded set of incentive mechanisms, such as SHA1 hash and tit-for-tat-ish algorithm, in order to compel the participating peers to contribute. These features promote it as a suitable candidate for frameworks which provide storage service, for instance, Amazon Simple Storage Service ADDIN EN.CITE <EndNote><Cite><Year>Accessed on-line 2008</Year><RecNum>169</RecNum><record><rec-number>169</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">169</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Amazon Simple Storage Service (Amazon S3):</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Year>Accessed on-line 2008</Year><RecNum>169</RecNum><record><rec-number>169</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">169</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Amazon Simple Storage Service (Amazon S3):</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[92]. Notwithstanding the great features of BitTorrent, the widespread adoption of BitTorrent based peer-to-peer data transmission mechanism as an automatic choice in scientific community depends upon reducing the problems that lie on the way. First and foremost problem is the lack of security feature in BitTorrent. In standard BitTorrent implementation, it is impossible to authenticate, authorize the joining peers and to ensure the integrity of the data exchanged among peers.The second problem is that BitTorrent is designed for data sharing on networks having limited bandwidth capacity. On the other hand, usually high-performance networks are deployed in scientific community so bulk data transmission techniques should utilize the underlying network bandwidth as much as possible in order to achieve high-performance data transfer. Therefore, BitTorrent needs modifications such as multiple stream support to be adapted for high-performance networks. The third problem is the primitive tracker of BitTorrent ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[88] which is a simple HTTP/HTTPS service that responds to HTTP GET requests. Since HTTP is ubiquitous protocol in the Internet, it is conceivable that using HTTP protocol may be of great advantage to it. However, it is unsuitable for an environment that is very dynamic and requires complex services (explained in next sections) to coordinate participating nodes, and communications taking place not just between the GridTorrent Framework peers, but even between the users and their GridTorrent Framework peers. In BitTorrent, the communications taking place between peers and tracker are passive communications; in other words, the tracker only delivers a list of available seeds and peers of a requested file, and collects statistics of uploading and downloading processes from the peers. File downloading process is the only required responsibility of a general BitTorrent peer and each downloading task is independent from each other. After the initial communication, peer can continue its downloading process without the help of its tracker.The fourth problem is the dissimilarity between the characteristics of the users in scientific community and standard peer-to-peer community. In regular peer-to-peer community, there is no competition between users. In other words, there is one type of user, a passive user, and any user can access any data as long as he or she gets the torrent file. However, in the scientific community, due to expertise or research agenda and competition between institutions, only authorized users are permitted to access to pre-determined data sets with some access rights. While the passive user type in BitTorrent, the users in scientific community area very active and some of them cooperate on some files as a group. This creates diverse users’ and groups’ profile in scientific community.The final problem is stemmed from the importance of data and its access. As the current design of BitTorrent, by itself, does not provide a search facility to find files by name or by other keywords; a user must find the initial torrent file by other means, such as a exhaustive web search. Conversely, searching, finding and accessing to desired data are of paramount importance in scientific community, hence a reliable search service must be offered to scientific users. To enable to use BitTorrent based data sharing system in scientific community, a mechanism enforcing security and involving regulation for content access with pre-defined rights is needed in addition to integration of a content and collaboration framework with a search facility into BitTorrent because those services are is vital for a data sharing system designed for scientific community. To summarize, BitTorrent is especially useful for large, popular files; however, it cannot directly be utilized in scientific environment because of its limitations like lacking of security and integrated tools for data sharing and discovery and inflexibility of its existing tracker. On the other hand, the main advantage of BitTorrent is being designed for a clear separation between file transfer mechanism and file discovery and network maintenance components, which enables us to implement each of them as an independent service from other components. These characteristics render it as one of the ideal data transfer mechanisms for scientific communities, for example, Grid computing, if the above missing features are implemented and integrated with the tracker. The components of BitTorrent and GridTorrent Framework are summarized in REF _Ref231415662 \h Table 21.Table STYLEREF 1 \s 2 SEQ Table \* ARABIC \s 1 1 Summary of BitTorrent and GridTorrent Framework componentsBitTorrentGridTorrentReasonP2P data-sharing protocol P2P data-sharing protocol No modification Simple HTTP Client SOA-based Tracker Client To enable advanced operations exchange with WS-Tracker -Task ManagerTo enable execution of advanced operations in Client such as remote sharing and ACL Web Server based TrackerAdvanced SOA-based Tracker To allow the system to build and to handle complex actions required by scientific community - Security ManagerTo provide authentication and authorization mechanism - Collaboration and Content Manager To empower users to control access rights to their content and to start remote sharing, downloading processes and permit interactions between them - Parallel Streaming support To improve further data transmission performance Network-level Data Transfer TechniquesThe network-level solutions (i.e. NAS and SAN ADDIN EN.CITE <EndNote><Cite><Author>Gibson</Author><Year>2000</Year><RecNum>103</RecNum><record><rec-number>103</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">103</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gibson, GA</author><author>Van Meter, R</author></authors></contributors><titles><title>Network Attached Storage Architecture</title><secondary-title>Communications of the ACM</secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages>37-45</pages><volume>43</volume><number>11</number><dates><year>2000</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gibson</Author><Year>2000</Year><RecNum>103</RecNum><record><rec-number>103</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">103</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gibson, GA</author><author>Van Meter, R</author></authors></contributors><titles><title>Network Attached Storage Architecture</title><secondary-title>Communications of the ACM</secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages>37-45</pages><volume>43</volume><number>11</number><dates><year>2000</year></dates><urls></urls></record></Cite></EndNote>[24]) are low-level data transfer techniques designed to handle large data transfers. Systems such as WAN file systems and data storage systems are either built on top of network-level solutions or use them as data transfer layer. The prominent examples of SAN-based WAN file systems are GFS 5 (Sistina), Stornext (ADIC), SAN-FS (IBM), QFS (SUN), CXFS (SGI). Examples of data storage systems include the Storage Resource Broker (SRB) ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>170</RecNum><record><rec-number>170</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>170</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>SRB- &quot;The Storage Resource Broker&quot;</title></titles><dates></dates><urls><related-urls><url>;[93], the Distributed-Parallel Storage System (DPSS) ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>;[94], High Performance Storage System (HPSS) ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>;[95], and Hierarchical Data Format 5 (HDF5) ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>173</RecNum><record><rec-number>173</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>173</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>HDF5- &quot;Hierarchical Data Format 5&quot;</title></titles><dates></dates><urls><related-urls><url>;[96]. Even though those systems are classified as data storage systems, most of them usually entail data management systems to handle the large volumes of data. In traditional approach, in order to allow the end users and higher applications to access and modify the data stored in local storage devices, a local file system is used as mediator between them and disk subsystems. Nevertheless, this method is not very scalable and results in reliability and bottleneck problem. To circumvent this limitation, network-attached storage systems have been devised. In this paradigm, the system is composed of dedicated preconfigured file servers and network attached storage devices. Both Storage Area Network (SAN) and Network Attached Storage (NAS) provide network-based solutions. There are similarities between SAN and NAS, but there are differences as well. NAS describes a complete file-level storage system designed to be attached to a traditional network such Ethernet and TCP/IP. NAS does not allow direct access to individual storage. Clients uses higher-level protocols (i.e. Network File System (NFS), Common Internet File System (CIFS), File Transfer Protocol (FTP), and Secure CoPy (SCP)) built on top of TCP/IP. On the other hand, a SAN is a type of local area network (LAN) network to which storage devices are attached, and is designed to handle large data transfers. In contrast to NAS file-level access and TCP/IP support, SAN traditionally utilize low-level network protocols and supports high-speed block-level access to the storage devices. A SAN commonly uses Fibre Channel interconnection technology which provides better performance. In most cases, a NAS system is less expensive to purchase and less complex to operate than a SAN system. Wide Area Network (WAN) File systems are high-performance scalable file management solutions that provide shared, fast, reliable data access from a single computer to hundreds of systems ADDIN EN.CITE <EndNote><Cite><Author>Barkes</Author><RecNum>176</RecNum><record><rec-number>176</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">176</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Barkes, J</author><author>Barrios, MR</author><author>Cougard, F</author><author>Crumley, PG</author><author>Marin, D</author><author>Reddy, H</author><author>Thitayanun, T</author></authors></contributors><titles><title>GPFS: A Parallel File System</title><secondary-title>IBM Redbook SG</secondary-title></titles><periodical><full-title>IBM Redbook SG</full-title></periodical><pages>24-5165</pages><dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Barkes</Author><RecNum>176</RecNum><record><rec-number>176</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">176</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Barkes, J</author><author>Barrios, MR</author><author>Cougard, F</author><author>Crumley, PG</author><author>Marin, D</author><author>Reddy, H</author><author>Thitayanun, T</author></authors></contributors><titles><title>GPFS: A Parallel File System</title><secondary-title>IBM Redbook SG</secondary-title></titles><periodical><full-title>IBM Redbook SG</full-title></periodical><pages>24-5165</pages><dates></dates><urls></urls></record></Cite></EndNote>[97]. Despite the better performance of WAN file systems, they are very expensive systems since they serve the data over SAN which requires expensive FC-interfaces and SAN-switches. Storage Resource Broker (SRB) is a middleware software system developed by the San Diego Supercomputer Center (SDSC). It depends on other lower-level systems, for instance, archives, files systems, networks, a DBMS for the metadata catalog, etc , but, like other grid technologies, it can be integrated with higher-level software ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>170</RecNum><record><rec-number>170</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>170</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>SRB- &quot;The Storage Resource Broker&quot;</title></titles><dates></dates><urls><related-urls><url>;[93]. The main focus of the SRB is to provide a uniform client interface to heterogeneous data collections by connecting these repositories, and to provide metadata for use in discovering and locating data within the storage system ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>102</RecNum><record><rec-number>102</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>102</RecNum><record><rec-number>102</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[32]. Although it uses Sreplicate and Scp with parallel I/O to improve performance, it utilizes other data transfer techniques such as GridFTP, DPSS, and SAN/ NAS ADDIN EN.CITE <EndNote><Cite><Author>Tate</Author><Year>2006</Year><RecNum>174</RecNum><record><rec-number>174</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">174</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Tate, J.</author><author>Lucchese, F.</author><author>Moore, R.</author></authors></contributors><titles><title>Introduction to Storage Area Networks</title></titles><dates><year>2006</year></dates><publisher>IBM Corp.</publisher><urls></urls></record></Cite><Cite><Author>Gibson</Author><Year>2000</Year><RecNum>103</RecNum><record><rec-number>103</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">103</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gibson, GA</author><author>Van Meter, R</author></authors></contributors><titles><title>Network Attached Storage Architecture</title><secondary-title>Communications of the ACM</secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages>37-45</pages><volume>43</volume><number>11</number><dates><year>2000</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Tate</Author><Year>2006</Year><RecNum>174</RecNum><record><rec-number>174</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">174</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Tate, J.</author><author>Lucchese, F.</author><author>Moore, R.</author></authors></contributors><titles><title>Introduction to Storage Area Networks</title></titles><dates><year>2006</year></dates><publisher>IBM Corp.</publisher><urls></urls></record></Cite><Cite><Author>Gibson</Author><Year>2000</Year><RecNum>103</RecNum><record><rec-number>103</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">103</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gibson, GA</author><author>Van Meter, R</author></authors></contributors><titles><title>Network Attached Storage Architecture</title><secondary-title>Communications of the ACM</secondary-title></titles><periodical><full-title>Communications of the ACM</full-title></periodical><pages>37-45</pages><volume>43</volume><number>11</number><dates><year>2000</year></dates><urls></urls></record></Cite></EndNote>[24, 98] by integration of HPSS ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>;[95]. The Distributed-Parallel Storage System (DPSS), originally developed as part of the DARPA funded MAGIC Testbed, is a scalable, high-performance, distributed-parallel data storage system ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>;[94]. It is defined, according to its website ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>;[94], as “a data block server, which provides high-performance data handling and architecture for building high-performance storage systems from low-cost commodity hardware components. This technology has been quite successful in providing an economical, high-performance, widely distributed, and highly scalable architecture for caching large amounts of data that can potentially be used by many different users.” Similar to the SRB, the DPSS uses parallel data transfer streams or striping across multiple servers to improve performance ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[8], and its team is currently working on integrating the DPSS into SRB and Globus ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Tierney</Author><Year>1999</Year><RecNum>171</RecNum><record><rec-number>171</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">171</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Tierney, B. L.</author><author>Lee, J.</author><author>Crowley, B.</author><author>Holding, M.</author><author>Hylton, J.</author><author>Drake Jr, FL.</author></authors></contributors><titles><title>A Network-Aware Distributed Storage Cache for Data Intensive Environments</title><secondary-title>Proceedings of The Eighth International Symposium on High Performance Distributed Computing </secondary-title></titles><pages>185-193</pages><dates><year>1999</year></dates><urls><related-urls><url>;[94].High Performance Storage System (HPSS) is highly flexible and scalable hierarchical storage management software developed to manage petabytes of data on disk and robotic tape libraries ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>;[95]. In order to create a single virtual file system by aggregating the capacity and performance of many computers, disks, and tape drives, HPSS uses cluster, LAN and/or SAN technology ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>;[95]. This technique enables HPSS to eliminate the limitations resulting from total storage capacity, file sizes, data rates, and number of objects stored. A variety of user and file system interfaces such as VFS, FTP, PFTP, GridFTP, Samba, NFS, client API, local file mover and third party SAN (SAN3P) are supported by HPSS ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Watson</Author><Year>1995</Year><RecNum>172</RecNum><record><rec-number>172</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">172</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Watson, R. W.</author><author>Livermore, C.A.</author><author>Coyne, R. A.</author><author>Houston, T. X.</author></authors></contributors><titles><title>The Parallel I/O Architecture of the High-Performance Storage System (HPSS)</title><secondary-title>Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS&apos;95)</secondary-title></titles><volume>1051</volume><dates><year>1995</year></dates><urls><related-urls><url>;[95].Hierarchical Data Format 5 (HDF5) is defined by the HDF group as “technology suite is designed to organize, store, discover, access, analyze, share, and preserve diverse, complex data in continuously evolving heterogeneous computing and storage environments” ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>173</RecNum><record><rec-number>173</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>173</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>HDF5- &quot;Hierarchical Data Format 5&quot;</title></titles><dates></dates><urls><related-urls><url>;[96]. Unlike above-mentioned technologies, it focuses on the structure of data and provides interfaces that enables client to access structured data from a variety of underling storage systems ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%"> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2003</Year><RecNum>93</RecNum><record><rec-number>93</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">93</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, W. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%"> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">102</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Allcock, William E. </style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">GridFTP: Protocol Extensions to FTP for the Grid</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">April</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[8, 32].DiscussionAll of the systems we have discussed above have advantages and disadvantages. Network-level solutions deliver enhanced storage capacity and offer much greater performance than application or system level solutions, but they are still prohibitively expensive propositions for most organizations. In addition, despite their very high technologies and low-level protocols, they are in need of integration with application-level solutions (GridFTP) in order to be compatible with existing systems.Although system-level data transfer techniques can provide better performance than application-level solutions, they usually require modifications to the operating systems of the machine or network infrastructure, which hinders the prevailing usage of them. Application-level solutions can provide high-performance data transfer, yet they do not utilize network bandwidth as efficiently as possible since they only use receiving inbound –not transmit outbound. Moreover, they suffer from the drawbacks of data transferring protocols (FTP) based on client/server paradigm. Peer-to-peer solutions could propose solutions that use available systems’ resources including network bandwidth as efficiently as possible; nevertheless, only few of them are suitable file distribution for scientific community and lack of key features essential to scientific community such as security support, access right management, and collaboration framework. The work discussed in this thesis harnesses the advantages of peer-to-peer system to leverage the available resources of participating entities including network bandwidth efficiently by implementing features that are not supported by the selected peer-to-peer system (BitTorrent). Besides, as our proposed system is an application-level solution, it is so flexible and lightweight application that it can be deployed on any of existing operating systems and network infrastructures or can coexist with other data transfer techniques or data management frameworks. Furthermore, unlike other data transfer techniques, because of the architecture of our proposed model, it provides a simple and lightweight data management system that functions as collaboration framework as well. The GridTorrent Framework ArchitectureThe Overview of the GridTorrent FrameworkThe GridTorrent Framework (GTF) we have studied and implemented is a software system that provides high performance, secure data transferring and data sharing medium and collaborative environment with capability of efficient and optimum use of available resources of underlying system. Although, with the secure collaboration and content management environment, users of the scientific communities are the primary target users of the GTF, any communities that would gain from efficient and secure high-performance data transferring mechanism with the collaboration framework component can deploy it easily because of its lightweight structure and seamless integration to their existing systems. The main characteristics of applications in the scientific communities mentioned in chapter one and two have been evolved from computational behavior to informational behavior. As a result of that, unprecedented data volumes has been generated by computers, conducted experiments, and scientific instruments and gadgets ranging from tiny microscopes to enormous earth and space telescopes such as The Robert C. Byrd Green Bank Telescope (GBT) Lovell telescope at Green Bank ADDIN EN.CITE <EndNote><Cite ExcludeAuth="1"><Author>Yi Zhu</Author><Year>2007</Year><RecNum>82</RecNum><record><rec-number>82</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>82</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>Green Bank Telescope</title></titles><volume>2008</volume><number>March</number><dates><year>2008</year></dates><label>Examples</label><urls><related-urls><url>;[99], West Virginia, USA and NASA’s Hubble space telescope ADDIN EN.CITE <EndNote><Cite><Author>Yi Zhu</Author><Year>2007</Year><RecNum>83</RecNum><record><rec-number>83</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>83</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>Hubble Space Telescope</title></titles><volume>2008</volume><number>March</number><dates><year>2008</year></dates><label>Examples</label><urls><related-urls><url>;[100]. Besides the very large size of the produced data, participant are not only the members of the different institutions, organizations, universities or laboratories, but also scattered all around the world. Consequently, delivering data to geographically dispersed organizations over the wide area networks and managing it are of paramount importance, and it is proven that data management is the one of the hardest jobs to do in the distributed computing environment ADDIN EN.CITE <EndNote><Cite><Author>Stewart</Author><Year>2006</Year><RecNum>81</RecNum><record><rec-number>81</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">81</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Stewart, G.A.</author><author>McCance, G.</author></authors></contributors><titles><title>Grid Data Management: Reliable File Transfer Services&apos; Performance</title><secondary-title>Computing in High Energy and Nuclear Physics (CHEP&apos;06)</secondary-title></titles><dates><year>2006</year><pub-dates><date>13-17 February</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Management</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Stewart</Author><Year>2006</Year><RecNum>81</RecNum><record><rec-number>81</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">81</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Stewart, G.A.</author><author>McCance, G.</author></authors></contributors><titles><title>Grid Data Management: Reliable File Transfer Services&apos; Performance</title><secondary-title>Computing in High Energy and Nuclear Physics (CHEP&apos;06)</secondary-title></titles><dates><year>2006</year><pub-dates><date>13-17 February</date></pub-dates></dates><pub-location>Mumbai, India</pub-location><label>Data Management</label><urls></urls></record></Cite></EndNote>[101]. As explained in chapter two, there are many studies and works to address data management and transferring. There are several reasons for myriad of researches in this field:Each organization decides their data management schema, data transferring protocol, security policy, and data format that are suitable to characteristics and constraints, e.g. time, money, etc., of researches that they conduct, features of available resources such as human experience, technologies, and equipments. Those many and various requirements may result non-uniform data format. However, when there is collaboration between institutions, they attempt to standardize to tools, i.e. data management schema, data transferring protocols, the data format, which are going to be used among them.There is no one “fix all” perfect data management and transferring solution for all cases. Each study tries to solve the above-mentioned many and various requirements by either focusing on the most important issue or applying different techniques considered as better approach. Sometimes, emerging technologies either in software or hardware areas imposes substantial modifications on current systems in order to enhance the performance of the existing system or upgrade it, or exploit the available technologies. For instance, after Web Service appearance, the Grid community has adopted itself to conform to Web Service standards for harnessing the power of it. Another example is that Reliable File Transfer PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwNDwvWWVhcj48

UmVjTnVtPjE1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNTwvcmVjLW51bWJlcj48Zm9y

ZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUy

dHowdjJldzAyeiI+MTU8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iQ29uZmVy

ZW5jZSBQYXBlciI+NDc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj5B

bGxjb2NrLCBXLkUuPC9hdXRob3I+PGF1dGhvcj5Gb3N0ZXIsIEkuPC9hdXRob3I+PGF1dGhvcj5N

YWRkdXJpLCBSLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRs

ZT5SZWxpYWJsZSBEYXRhIFRyYW5zcG9ydDogQSBDcml0aWNhbCBTZXJ2aWNlIGZvciB0aGUgR3Jp

ZDwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5CdWlsZGluZyBTZXJ2aWNlIEJhc2VkIEdyaWRzIFdv

cmtzaG9wLCBHbG9iYWwgR3JpZCBGb3J1bTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRl

cz48eWVhcj4yMDA0PC95ZWFyPjxwdWItZGF0ZXM+PGRhdGU+MTEsIEp1bmUgMjAwNC48L2RhdGU+

PC9wdWItZGF0ZXM+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxB

dXRob3I+TWFkZHVyaTwvQXV0aG9yPjxZZWFyPjIwMDI8L1llYXI+PFJlY051bT4xMTQ8L1JlY051

bT48cmVjb3JkPjxyZWMtbnVtYmVyPjExNDwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkg

YXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTE0

PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUHJvY2VlZGlu

Z3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYWRkdXJpLCBS

Szwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkhvb2QsIENTPC9zdHlsZT48L2F1dGhvcj48YXV0aG9y

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

QWxsY29jaywgV0U8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPlJlbGlhYmxlIEZpbGUgVHJhbnNmZXIgaW4gR3JpZCBFbnZpcm9ubWVudHM8L3N0

eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkxvY2FsIENvbXB1dGVyIE5ldHdvcmtzLCAyMDAy

LiBQcm9jZWVkaW5ncy4gTENOIDIwMDIuIDI3dGggQW5udWFsIElFRUUgQ29uZmVyZW5jZSBvbjwv

c3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NzM3LTczODwvc3R5bGU+PC9w

YWdlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMDAyPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+

PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+U3Rld2FydDwvQXV0aG9yPjxZZWFyPjIwMDY8

L1llYXI+PFJlY051bT44MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+ODE8L3JlYy1udW1i

ZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0

dnB4ZG1lMnR6MHYyZXcwMnoiPjgxPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+U3Rld2FydCwgRy5BLjwvYXV0aG9yPjxhdXRob3I+TWNDYW5jZSwgRy48L2F1

dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+R3JpZCBEYXRhIE1h

bmFnZW1lbnQ6IFJlbGlhYmxlIEZpbGUgVHJhbnNmZXIgU2VydmljZXMmYXBvczsgUGVyZm9ybWFu

Y2U8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+Q29tcHV0aW5nIGluIEhpZ2ggRW5lcmd5IGFuZCBO

dWNsZWFyIFBoeXNpY3MgKENIRVAmYXBvczswNik8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48

ZGF0ZXM+PHllYXI+MjAwNjwveWVhcj48cHViLWRhdGVzPjxkYXRlPjEzLTE3IEZlYnJ1YXJ5PC9k

YXRlPjwvcHViLWRhdGVzPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5NdW1iYWksIEluZGlhPC9wdWIt

bG9jYXRpb24+PGxhYmVsPkRhdGEgTWFuYWdlbWVudDwvbGFiZWw+PHVybHM+PC91cmxzPjwvcmVj

b3JkPjwvQ2l0ZT48L0VuZE5vdGU+AG==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwNDwvWWVhcj48

UmVjTnVtPjE1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNTwvcmVjLW51bWJlcj48Zm9y

ZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUy

dHowdjJldzAyeiI+MTU8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iQ29uZmVy

ZW5jZSBQYXBlciI+NDc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj5B

bGxjb2NrLCBXLkUuPC9hdXRob3I+PGF1dGhvcj5Gb3N0ZXIsIEkuPC9hdXRob3I+PGF1dGhvcj5N

YWRkdXJpLCBSLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRs

ZT5SZWxpYWJsZSBEYXRhIFRyYW5zcG9ydDogQSBDcml0aWNhbCBTZXJ2aWNlIGZvciB0aGUgR3Jp

ZDwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5CdWlsZGluZyBTZXJ2aWNlIEJhc2VkIEdyaWRzIFdv

cmtzaG9wLCBHbG9iYWwgR3JpZCBGb3J1bTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRl

cz48eWVhcj4yMDA0PC95ZWFyPjxwdWItZGF0ZXM+PGRhdGU+MTEsIEp1bmUgMjAwNC48L2RhdGU+

PC9wdWItZGF0ZXM+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxB

dXRob3I+TWFkZHVyaTwvQXV0aG9yPjxZZWFyPjIwMDI8L1llYXI+PFJlY051bT4xMTQ8L1JlY051

bT48cmVjb3JkPjxyZWMtbnVtYmVyPjExNDwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkg

YXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTE0

PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUHJvY2VlZGlu

Z3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYWRkdXJpLCBS

Szwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkhvb2QsIENTPC9zdHlsZT48L2F1dGhvcj48YXV0aG9y

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

QWxsY29jaywgV0U8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPlJlbGlhYmxlIEZpbGUgVHJhbnNmZXIgaW4gR3JpZCBFbnZpcm9ubWVudHM8L3N0

eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkxvY2FsIENvbXB1dGVyIE5ldHdvcmtzLCAyMDAy

LiBQcm9jZWVkaW5ncy4gTENOIDIwMDIuIDI3dGggQW5udWFsIElFRUUgQ29uZmVyZW5jZSBvbjwv

c3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NzM3LTczODwvc3R5bGU+PC9w

YWdlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMDAyPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+

PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+U3Rld2FydDwvQXV0aG9yPjxZZWFyPjIwMDY8

L1llYXI+PFJlY051bT44MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+ODE8L3JlYy1udW1i

ZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0

dnB4ZG1lMnR6MHYyZXcwMnoiPjgxPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+U3Rld2FydCwgRy5BLjwvYXV0aG9yPjxhdXRob3I+TWNDYW5jZSwgRy48L2F1

dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+R3JpZCBEYXRhIE1h

bmFnZW1lbnQ6IFJlbGlhYmxlIEZpbGUgVHJhbnNmZXIgU2VydmljZXMmYXBvczsgUGVyZm9ybWFu

Y2U8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+Q29tcHV0aW5nIGluIEhpZ2ggRW5lcmd5IGFuZCBO

dWNsZWFyIFBoeXNpY3MgKENIRVAmYXBvczswNik8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48

ZGF0ZXM+PHllYXI+MjAwNjwveWVhcj48cHViLWRhdGVzPjxkYXRlPjEzLTE3IEZlYnJ1YXJ5PC9k

YXRlPjwvcHViLWRhdGVzPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5NdW1iYWksIEluZGlhPC9wdWIt

bG9jYXRpb24+PGxhYmVsPkRhdGEgTWFuYWdlbWVudDwvbGFiZWw+PHVybHM+PC91cmxzPjwvcmVj

b3JkPjwvQ2l0ZT48L0VuZE5vdGU+AG==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5BbGxjb2NrPC9BdXRob3I+PFllYXI+MjAwNDwvWWVhcj48

UmVjTnVtPjE1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xNTwvcmVjLW51bWJlcj48Zm9y

ZWlnbi1rZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUy

dHowdjJldzAyeiI+MTU8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iQ29uZmVy

ZW5jZSBQYXBlciI+NDc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj5B

bGxjb2NrLCBXLkUuPC9hdXRob3I+PGF1dGhvcj5Gb3N0ZXIsIEkuPC9hdXRob3I+PGF1dGhvcj5N

YWRkdXJpLCBSLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRs

ZT5SZWxpYWJsZSBEYXRhIFRyYW5zcG9ydDogQSBDcml0aWNhbCBTZXJ2aWNlIGZvciB0aGUgR3Jp

ZDwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5CdWlsZGluZyBTZXJ2aWNlIEJhc2VkIEdyaWRzIFdv

cmtzaG9wLCBHbG9iYWwgR3JpZCBGb3J1bTwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRl

cz48eWVhcj4yMDA0PC95ZWFyPjxwdWItZGF0ZXM+PGRhdGU+MTEsIEp1bmUgMjAwNC48L2RhdGU+

PC9wdWItZGF0ZXM+PC9kYXRlcz48dXJscz48L3VybHM+PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxB

dXRob3I+TWFkZHVyaTwvQXV0aG9yPjxZZWFyPjIwMDI8L1llYXI+PFJlY051bT4xMTQ8L1JlY051

bT48cmVjb3JkPjxyZWMtbnVtYmVyPjExNDwvcmVjLW51bWJlcj48Zm9yZWlnbi1rZXlzPjxrZXkg

YXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJldzAyeiI+MTE0

PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkNvbmZlcmVuY2UgUHJvY2VlZGlu

Z3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxlIGZh

Y2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5NYWRkdXJpLCBS

Szwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkhvb2QsIENTPC9zdHlsZT48L2F1dGhvcj48YXV0aG9y

PjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+

QWxsY29jaywgV0U8L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0

bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNp

emU9IjEwMCUiPlJlbGlhYmxlIEZpbGUgVHJhbnNmZXIgaW4gR3JpZCBFbnZpcm9ubWVudHM8L3N0

eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJU

aW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkxvY2FsIENvbXB1dGVyIE5ldHdvcmtzLCAyMDAy

LiBQcm9jZWVkaW5ncy4gTENOIDIwMDIuIDI3dGggQW5udWFsIElFRUUgQ29uZmVyZW5jZSBvbjwv

c3R5bGU+PC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBhZ2VzPjxzdHlsZSBmYWNlPSJub3Jt

YWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+NzM3LTczODwvc3R5bGU+PC9w

YWdlcz48ZGF0ZXM+PHllYXI+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJv

bWFuIiBzaXplPSIxMDAlIj4yMDAyPC9zdHlsZT48L3llYXI+PC9kYXRlcz48dXJscz48L3VybHM+

PC9yZWNvcmQ+PC9DaXRlPjxDaXRlPjxBdXRob3I+U3Rld2FydDwvQXV0aG9yPjxZZWFyPjIwMDY8

L1llYXI+PFJlY051bT44MTwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+ODE8L3JlYy1udW1i

ZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0

dnB4ZG1lMnR6MHYyZXcwMnoiPjgxPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9

IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRo

b3JzPjxhdXRob3I+U3Rld2FydCwgRy5BLjwvYXV0aG9yPjxhdXRob3I+TWNDYW5jZSwgRy48L2F1

dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+R3JpZCBEYXRhIE1h

bmFnZW1lbnQ6IFJlbGlhYmxlIEZpbGUgVHJhbnNmZXIgU2VydmljZXMmYXBvczsgUGVyZm9ybWFu

Y2U8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+Q29tcHV0aW5nIGluIEhpZ2ggRW5lcmd5IGFuZCBO

dWNsZWFyIFBoeXNpY3MgKENIRVAmYXBvczswNik8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48

ZGF0ZXM+PHllYXI+MjAwNjwveWVhcj48cHViLWRhdGVzPjxkYXRlPjEzLTE3IEZlYnJ1YXJ5PC9k

YXRlPjwvcHViLWRhdGVzPjwvZGF0ZXM+PHB1Yi1sb2NhdGlvbj5NdW1iYWksIEluZGlhPC9wdWIt

bG9jYXRpb24+PGxhYmVsPkRhdGEgTWFuYWdlbWVudDwvbGFiZWw+PHVybHM+PC91cmxzPjwvcmVj

b3JkPjwvQ2l0ZT48L0VuZE5vdGU+AG==

ADDIN EN.CITE.DATA [42, 43, 101] that is ADDIN EN.CITE <EndNote><Cite><Author>Sotomayor</Author><Year>2005</Year><RecNum>217</RecNum><record><rec-number>217</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">217</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Sotomayor, B</author></authors></contributors><titles><title>The Globus Toolkit 4 Programmer&apos;s Tutorial</title></titles><dates><year>2005</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Sotomayor</Author><Year>2005</Year><RecNum>217</RecNum><record><rec-number>217</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">217</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Sotomayor, B</author></authors></contributors><titles><title>The Globus Toolkit 4 Programmer&apos;s Tutorial</title></titles><dates><year>2005</year></dates><urls><related-urls><url>;[102]devised to address the shortcomings of GridFTP ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Bresnahan</Author><Year>2007</Year><RecNum>115</RecNum><record><rec-number>115</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">115</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Bresnahan, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Link, M</style></author><author><style face="normal" font="Times New Roman" size="100%">Khanna, G</style></author><author><style face="normal" font="Times New Roman" size="100%">Imani, Z</style></author><author><style face="normal" font="Times New Roman" size="100%">Kettimuthu, R</style></author><author><style face="normal" font="Times New Roman" size="100%">Foster, I</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Globus GridFTP: What&apos;s New in 2007</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007)</style></secondary-title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year><pub-dates><date><style face="normal" font="Times New Roman" size="100%">October</style></date></pub-dates></dates><urls></urls></record></Cite></EndNote>[49] by utilizing Web Service ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2004</Year><RecNum>15</RecNum><record><rec-number>15</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">15</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Allcock, W.E.</author><author>Foster, I.</author><author>Madduri, R.</author></authors></contributors><titles><title>Reliable Data Transport: A Critical Service for the Grid</title><secondary-title>Building Service Based Grids Workshop, Global Grid Forum</secondary-title></titles><dates><year>2004</year><pub-dates><date>11, June 2004.</date></pub-dates></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2004</Year><RecNum>15</RecNum><record><rec-number>15</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">15</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Allcock, W.E.</author><author>Foster, I.</author><author>Madduri, R.</author></authors></contributors><titles><title>Reliable Data Transport: A Critical Service for the Grid</title><secondary-title>Building Service Based Grids Workshop, Global Grid Forum</secondary-title></titles><dates><year>2004</year><pub-dates><date>11, June 2004.</date></pub-dates></dates><urls></urls></record></Cite></EndNote>[43] features. For this reason, it is very inevitable to have many and diverse systems in this area.In spite of the availability of a great number of systems, we consider that there are still some issues which have not been settled permanently –which is not possible, and new technologies which have been exploited to the full. It would better to say efficient use of underlying system’s resources by exploiting peer-to-peer technologies such as BitTorrent has not been experimented thoroughly in our opinion. Consequently, current systems are still lack of some important features from which scientific community benefited greatly. In this chapter, we describe our approach which not only provides above-mentioned missing features but also conforms to Web Service standards. Main Components of the GridTorrent FrameworkThe GridTorrent entails three major components because of distributed and collaborative requirements of scientific applications; The GridTorrent Peer (GTP) which provides the services required to data sharing among the peers,The WS-Tracker which is responsible for coordination between the GTPs,The Collaboration and Content Manager (CCM) which enables users to publish, subscribe, and manage their contents.Each of these components consists of several internal services for different objectives ranging from security to different data transfer protocols. We discuss the details of these components in the following chapters; in this section, we just give a brief overview of the architecture of the whole system and basic information about the interactions between components.Since each component depends on another component so as to perform correctly and successfully, every part of the GTF is as important as one another. REF _Ref193771320 \h Figure 31 presents the overall architecture of and interactions between GridTorrent components.A user is a real person who is interested in sharing and managing his/her contents through the CCM, initiates the GTP in order that the actual data transferring process can start. While there is no restriction imposed upon choosing the users’ accesses to their GTPs, they access the CCM through HTTP protocol similar to regular web site’s access. A user is permitted to own and manage more than one GTP if it is necessary. Figure STYLEREF 1 \s 3 SEQ Figure \* ARABIC \s 1 1 STYLEREF 1 \s 3 SEQ Figure \* ARABIC \s 1 1 GridTorrent Framework is composed of a peer, a Web Service Tracker, and a Collaboration and Content Manager. Each component communicates with another one via different protocols such as HTTP, TCP, and parallel TCP streamsThe first component is the GridTorrent Peer. It which is a software system that runsning on users’ computers and provides services to support transferring data among interested peers, enforcing security constraints, and delivering up-to-date information to WS-Tracker in order to help WS-Tracker to perform its coordinator task among the peers. Owing to massive data sets generated by scientific instruments or computer simulations, transmission of bulk data at high-speed across wide area networks is the major concern in scientific community. Accordingly, the GTP supports parallel streams to improve the performance or provide better system resources usage. As it is illustrated in REF _Ref228314650 \h Figure 31, whereas it communicates with other GTPs via single TCP stream or parallel TCP (PTCP) streams for data transfer, it interacts with the WS-Tracker as a traditional Web Service client and request and response SOAP messages over HTTP are exchanged with the WS-Tracker in order to update its current information. Details of the GTP are discussed in Chapter 4.The WS-Tracker is the second component of the GTF and a Web Service and advance version of a regular BitTorrent tracker by adding several vital features. A regular tracker is a simple HTTP/HTTPS service ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[88] which responds to HTTP GET requests and it is impossible to include additional features such as access control list feature which is generally vital and required for scientific data sharing in the view of security authorization. Additionally, because of the nature of Web Service feature, new functionalities and services can be deployed easily on WS-Tracker through WSDL interface which makes the WS-Tracker very adaptable for newly emerging cases and special requirements. As a result, we developed a Web Service version of tracker in our design. We explain its design in details in Chapter 6.Although other network protocols can be utilized for exchanging SOAP messages, the WS-Tracker uses only HTTP in prototype version. Security issues are addressed by integrating the Grid Security Infrastructure ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>;[103] and it is discussed in chapter 7.The settings of users’ contents for sharing are stored in to a database through the CCM. We use MySQL ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>120</RecNum><record><rec-number>120</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>120</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>MySQL</title></titles><dates><year>2007</year></dates><urls><related-urls><url>;[47] database server for this purpose. The WS-Tracker retrieves the stored information from MySQL through JDBC connections as in shown in REF _Ref228314650 \h Figure 31. The last unit is the Collaboration and Content Manager which is accessed by users via HTTP. It consists of several JSP based interfaces leveraging newly emerged AJAX ADDIN EN.CITE <EndNote><Cite><Author>Mahemoff</Author><Year>2006</Year><RecNum>181</RecNum><record><rec-number>181</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">181</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Mahemoff, M</author></authors></contributors><titles><title>Ajax Design Patterns</title></titles><dates><year>2006</year></dates><publisher>O&apos;Reilly Media, Inc.</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Mahemoff</Author><Year>2006</Year><RecNum>181</RecNum><record><rec-number>181</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">181</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Mahemoff, M</author></authors></contributors><titles><title>Ajax Design Patterns</title></titles><dates><year>2006</year></dates><publisher>O&apos;Reilly Media, Inc.</publisher><urls></urls></record></Cite></EndNote>[104] techniques, and is composed of two sub major components: Collaboration Manager and Content Manager. As their names denotes, Collaboration Manager provides a collaborative substratum to registered users to by permitting them to create their friend lists. This list is used to inform all the users in it when a new content is published by the owner of the list. The Content Manager offers services permitting users to do search on available contents, publish their contents, and subscribe to contents which are allowed them to download. All required information to achieve above services is stored into MySQL database, accessed by WS-Tracker as well, via JDBC connections. In Chapter 5, details of both Collaboration and Content Managers are discussed in detail. After reviewing briefly each component, we can summarize interactions between components. Users are the initiators of the whole system. They register to the CCM and start their GTPs. Additionally; they share their contents and collaborate with each other through the CCM.The CCM stores users’ information to database server using JDBC connections. The same information are retrieved and delivered to the GTP by the WS-Tracker via same database access protocol –JDBC. The GTPs start either a downloading or uploading process corresponding to messages delivered by the WS-Tracker. In addition data sharing task, it uploads its current statistical information into the WS-Tracker to help carry out its coordinator job successfully.SummaryIn this chapter, we have presented an overview of our GridTorrent Framework architecture. The GTF architecture consists of three major components in order to meet requirements of data sharing process of scientific community. We adopt open peer-to-peer standard for data sharing task and Web Service standards for implementing the coordinator of peers, WS-Tracker, so that new and complex features could be deployed easily without modifying the whole architecture. We also summarize briefly each component and their functionalities and the protocols used between them.The GridTorrent Peer ArchitectureIntroductionAs GridTorrent Framework is primarily designed for scientific communities, it offers a high performance data transfer and sharing technique with a collaboration framework. In the previous chapters, we explained the motivation and rationale for Grid Torrent Framework Architecture and provided a high-level overview and description of our design decisions and overall approach. In the previous chapters, we explained the motivation and rationale for GridTorrent Framework Architecture that offers a framework for high performance data transferring and sharing primarily for scientific communities, and provided a high-level overview and description of our design decisions and overall approach. In this chapter, we performed a detailed analysis ofextend more details about low level and architectural design decisions of the GridTorrent Framework Client that is responsible for actual data sharing and transferring and sharing processes amongbetween the peers. In addition, we present a thorough description of key components and their implementations. Available techniques for data movementtransferring are classified into two categories: client/server and peer-to-peer. In the former model, the client initiates data transferring process and the server delivers the requested data to the client. As shown in REF _Ref195444125 \h Figure 41, process and server delivers the requested data to client. As it is shown in REF _Ref195444125 \h Figure 41, this model could support a heterogeneous collection of clients which span a very wide spectrum that includes desktops, PDAs and other handheld devices, appliances, and other networked resources when the client service is kept very light service. However, this model has couple of disadvantages under a certain scenario nevertheless. For example, if there is more than one client and all of them are interested in the same data, the server must provide the demanded data to all demanding clients. In other words, none of the active clients involves themselves in any part of data transferring processes except the one taking place between the server and itself. As a result, first disadvantage of client/server model might cause a severe data access bottleneck because of a considerable demand for a particular data at the server that hosts the demanded data. Second drawback is the result of the bottleneck problem and that all the available computing power of, I/O and network bandwidth resources of the clients stand idle during the data transferring process unless there are other jobs keep them busy.In the second data transfer model, similar to client/server model, a client commences data transferring process. However, peer-to-peer model allows each peer to serve both as a client and a server at the same time by uniformly dividing all responsibilities among all participants. Therefore, a downloading peer (client) can deliver the downloaded segment of the downloading data to another peer (client) as a server. This model might address above-mentioned disadvantages caused by client/server model. Although, similar to client/server model as shown in REF _Ref195446328 \h Figure 42, it is possible that to support highly diverse collection of peers with different hardware features, it is very unpractical to use very tiny gadgets with limited memory and low computing power since each peer has to function both as a client and a server simultaneously. As a result of this, we have developed a novel data transfer layer which is based upon peer-to-peer data sharing algorithm of BitTorrent ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url>;[86, 88] with the underlying single TCP and parallel TCP ADDIN EN.CITE <EndNote><Cite><Author>Kaplan</Author><Year>2007</Year><RecNum>57</RecNum><record><rec-number>57</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">57</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Kaplan, A.</author><author>Fox, G. C.</author><author>von Laszewski, G.</author></authors></contributors><titles><title>GridTorrent Framework: A High-performance Data Transfer and Data Sharing Framework for Scientific Computing</title><secondary-title>GCE07 Workshop</secondary-title></titles><dates><year>2007</year><pub-dates><date>November 11-12 2007</date></pub-dates></dates><pub-location>Reno Nevada</pub-location><label>GridTorrent</label><urls></urls></record></Cite></EndNote>[105] streams as data delivery protocols in our current prototype. this model could support a heterogeneous collection of clients which span a very wide spectrum that includes desktops, PDAs and other handheld devices, appliances, and other networked resources when the client service is kept as a very light service.Figure STYLEREF 1 \s 4 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 1 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 1 Client/Server model However, this model has several disadvantages under certain scenarios. For example, when there is more than one client and all of them are interested in the same data, the server must provide the demanded data to all demanding clients. In other words, none of the active clients involves itself in any part of data transferring processes except the one taking place between the server and itself. Hence, the first disadvantage of client/server model might cause a severe data access bottleneck because of a considerable demand for a particular data at the server. Second drawback stems from the bottleneck problem and that all the available computing power, I/O and network bandwidth resources of the clients stand idle during the data transferring process unless there are other jobs keep them busy. On the other hand, in the second data transfer model, similar to client/server model, a client initiates the data transfer process. Here, the distinction between the peer-to-peer model and the client/server model is that the former allows each peer to serve both as a client and a server at the same time by uniformly dividing all responsibilities among all participants. Therefore, a downloading peer (client) can deliver the downloaded segment of the downloading data to another peer (client) as a server. This model might address the disadvantages of the client/server model. SimilarFigure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 2 Peer-to-peer modelto client/server model as shown in REF _Ref195446328 \h Figure 42, it is possible that to support highly diverse collection of peers with different hardware features. Yet it is very unpractical to use very tiny gadgets with limited memory and low computing power since each peer has to function as both a client and a server simultaneously. By realizing the shortcomings of both models, we have developed a novel data transfer layer that is based upon peer-to-peer data sharing algorithm of BitTorrent ADDIN EN.CITE <EndNote><Cite><Author>Brian</Author><Year>Accessed on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url>;[8, 12] with the underlying single or parallel TCP ADDIN EN.CITE <EndNote><Cite><Author>Kaplan</Author><Year>2007</Year><RecNum>57</RecNum><record><rec-number>57</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">57</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Kaplan, A.</author><author>Fox, G. C.</author><author>von Laszewski, G.</author></authors></contributors><titles><title>GridTorrent Framework: A High-performance Data Transfer and Data Sharing Framework for Scientific Computing</title><secondary-title>GCE07 Workshop</secondary-title></titles><dates><year>2007</year><pub-dates><date>November 11-12 2007</date></pub-dates></dates><pub-location>Reno Nevada</pub-location><label>GridTorrent</label><urls></urls></record></Cite></EndNote>[13] streams as data delivery protocols in our current prototype.Overview of the GridTorrent Framework Client ArchitectureThe motivation behind our work is to provide a peer-to-peer based, lightweight data transfer/management middleware that has a simple, extensible, easily modifiable architecture. Moreover, it can effortlessly be deployable in large numbers of distributed nodes and requires the least amount of possible central control or management tasks. TheFor this purpose, we have chosen layered architecture of for the GTFC design bears theby taking advantage of peer-to-peer infrastructure and service oriented architecture, and hence we have chosen layered architecture.. The layered architecture of and the components of the GTFC are illustrated in REF _Ref195445136 \h Figure 43. These layers are: security layer, core services layer, and data sharing algorithm layer. The services provided by these layers are described in the next sections of this Chapter. chapter. Each layer is built on top of another layer and uses the services offered by the lower layers or adjacent modules. To provide services pertinent to security, the GTFC’s layered architecture is developed a security framework on Java Security framework, JAAS (Java Authentication and Authorization Security), by following the design principles of Grid Security Infrastructure. GTFC’s security layer is extensible when it is necessary. It can be extended by the integration other security framework libraries such as Java CoG Kit and Java WS Security into GTFC’s security layerbased on Grid Interface which consists of Java CoG Kit and Java WS Security middleware as shown in the figure.Figure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 3 General architecture of a GridTorrent peer. Whereas solid-lined boxes denote current implemented and utilized components, dashed-lined boxes indicate third party components that might be integrated with GridTorrent for additional performance or security improvement. Figure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 3 GridTorrent Framework Client ArchitectureThe components of the GTFC can be organized in a layered architecture as in shown in the figure.. These five modules are: (1) Torrent Data Sharing Logic, (2) Task Manager, (3) WS-Tracker Client, (4) Data Transfer Modules, and (5) Security Manager. Torrent Data Sharing LogicData Sharing Algorithm layer is responsible for execution of and monitoring of rules and specifications that which are required for fair, efficient and high performance peer-to-peer data transfer and defined inby BitTorrent protocol. The services provided by Data Sharing Algorithm layer are as follows:Service of creating a .torrent metafile for a given content file or directory structure to be desired to share or download, i.e. content. Service of generating a bitfield map for a given contentService of allocating memory and disk space required for the content to be downloaded before the actual data downloading process is initiatedthem.Service of handling current peer connections for data transfer.Service of gathering statistical information about the uploading and downloading process of each transfer.file.Service of reporting statistical information to Task Manager in order to deliver it to WS-Tracker service. The GTFC It provides a data listener for each of the shared contents at each node. Before starting the actual data transfer process, it checks every incoming connection’s IP and port information with the ACL Registration Table (ACLRETAB) whether they have access right for the requested content. If their IP and port information are is not registered to ACLRETAB, they are rejected immediately andby closing terminating their incoming sockets are terminated. connections. As shown in REF _Ref197132347 \h Figure 44, Data Sharing Algorithm layer interacts with Data Transfer Modules, Task Manager and Security Manager in order to enforce secure communication (Refer Section 7.3)..Core Modules Layer This layer consists of two modules: Data Transfer Modules and Management Modules. Likewise, each of these modules comprises subcomponents as depicted in the figure. Data Transfer ModulesData transport is a very important task for data-intensive applications in scientific disciplines such as High Energy Physics, Astronomy, Earthquake Engineering, and Climate Modeling. Massive datasets must be transferred in the shortest time to a community of hundreds or thousands researches geographically distributed so as to enable the accomplishment of satisfactory performance ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2002</Year><RecNum>80</RecNum><record><rec-number>80</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">80</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Allcock, B.</author><author>Bester, J.</author><author>Bresnahan, J.</author><author>Chervenak, A. L.</author><author>Foster, I.</author><author>Kesselman, C.</author><author>Meder, S.</author><author>Nefedova, V.</author><author>Quesnel, D.</author><author>Tuecke, S.</author></authors></contributors><titles><title>Data Management and Transfer in High Performance Computational Grid Environments</title><secondary-title>Parallel Computing</secondary-title></titles><periodical><full-title>Parallel Computing</full-title></periodical><pages>749-771</pages><volume>28</volume><number>5</number><dates><year>2002</year><pub-dates><date>May</date></pub-dates></dates><label>Data Management</label><urls></urls></record></Cite></EndNote>[23].sFigure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 4 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 4 Simulation Architecturegeographically distributed so as to enable the accomplishment of satisfactory performance ADDIN EN.CITE <EndNote><Cite><Author>Allcock</Author><Year>2002</Year><RecNum>80</RecNum><record><rec-number>80</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">80</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Allcock, B.</author><author>Bester, J.</author><author>Bresnahan, J.</author><author>Chervenak, A. L.</author><author>Foster, I.</author><author>Kesselman, C.</author><author>Meder, S.</author><author>Nefedova, V.</author><author>Quesnel, D.</author><author>Tuecke, S.</author></authors></contributors><titles><title>Data Management and Transfer in High Performance Computational Grid Environments</title><secondary-title>Parallel Computing</secondary-title></titles><periodical><full-title>Parallel Computing</full-title></periodical><pages>749-771</pages><volume>28</volume><number>5</number><dates><year>2002</year><pub-dates><date>May</date></pub-dates></dates><label>Data Management</label><urls></urls></record></Cite></EndNote>[1423].Although TCP is the most widely used transport protocol onand is the de facto protocol of the Internet,, because of its window based congestion control mechanism, TCP it prevents ADDIN EN.CITE <EndNote><Cite><Author>Zhang</Author><Year>1998</Year><RecNum>32</RecNum><record><rec-number>32</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">32</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zhang, Y.</author><author>Yan, E.</author><author>Dao, S.</author></authors></contributors><titles><title>A Measurement of TCP over Long-Delay Network</title><secondary-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</secondary-title></titles><periodical><full-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</full-title></periodical><dates><year>1998</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zhang</Author><Year>1998</Year><RecNum>32</RecNum><record><rec-number>32</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">32</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zhang, Y.</author><author>Yan, E.</author><author>Dao, S.</author></authors></contributors><titles><title>A Measurement of TCP over Long-Delay Network</title><secondary-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</secondary-title></titles><periodical><full-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</full-title></periodical><dates><year>1998</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote>[1530] full-scale usage of high bandwidth-delay product.. In order to overcome this problem, researches have continually worked to improve TCP and proposed conceived several application level solutions. The application-level latter approach emerges as a favorite solution because it supports for easy development and seamless integration with legacy systems, whereas the former one suffers from deployment difficulties ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[16] ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2007</Year><RecNum>126</RecNum><record><rec-number>126</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">126</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, RL</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">UDT: UDP-based data transfer for high-speed wide area networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Computer Networks</style></secondary-title></titles><periodical><full-title>Computer Networks</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">1777-1799</style></pages><volume><style face="normal" font="Times New Roman" size="100%">51</style></volume><number><style face="normal" font="Times New Roman" size="100%">7</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls></urls></record></Cite></EndNote>[56].Using parallel TCP is the most common technique that is used in PSockets ADDIN EN.CITE <EndNote><Cite><Author>Sivakumar</Author><Year>2000</Year><RecNum>45</RecNum><record><rec-number>45</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">45</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Sivakumar, H.</style></author><author><style face="normal" font="Times New Roman" size="100%">Bailey, S.</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R. L.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</style></secondary-title></titles><periodical><full-title>Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</full-title></periodical><dates><year><style face="normal" font="Times New Roman" size="100%">2000</style></year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Sivakumar</Author><Year>2000</Year><RecNum>45</RecNum><record><rec-number>45</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">45</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Sivakumar, H.</style></author><author><style face="normal" font="Times New Roman" size="100%">Bailey, S.</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R. L.</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</style></secondary-title></titles><periodical><full-title>Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM)</full-title></periodical><dates><year><style face="normal" font="Times New Roman" size="100%">2000</style></year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote>[1751] and GridFTP ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><Year>2000</Year><RecNum>113</RecNum><record><rec-number>113</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">113</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>GridFTP: Universal Data Transfer for the Grid</title><secondary-title>Globus Project White Paper, University of Chicago</secondary-title></titles><periodical><full-title>Globus Project White Paper, University of Chicago</full-title></periodical><dates><year>2000</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="9">; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><Year>2000</Year><RecNum>113</RecNum><record><rec-number>113</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">113</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>GridFTP: Universal Data Transfer for the Grid</title><secondary-title>Globus Project White Paper, University of Chicago</secondary-title></titles><periodical><full-title>Globus Project White Paper, University of Chicago</full-title></periodical><dates><year>2000</year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="9">;[1840]. Using multiple TCP streams may increase the usage of network bandwidth, but its it is performance dependsdepend on many factors, such as the number of parallel streams and the buffer sizes of each flow ADDIN EN.CITE <EndNote><Cite><Author>GU</Author><Year>2005</Year><RecNum>182</RecNum><record><rec-number>182</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">182</key></foreign-keys><ref-type name="Thesis">32</ref-type><contributors><authors><author>Gu, Y</author></authors></contributors><titles><title>UDT: A High Performance Data Transport Protocol</title></titles><dates><year>2005</year></dates><publisher>University of Illinois</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>GU</Author><Year>2005</Year><RecNum>182</RecNum><record><rec-number>182</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">182</key></foreign-keys><ref-type name="Thesis">32</ref-type><contributors><authors><author>Gu, Y</author></authors></contributors><titles><title>UDT: A High Performance Data Transport Protocol</title></titles><dates><year>2005</year></dates><publisher>University of Illinois</publisher><urls></urls></record></Cite></EndNote>[19106]. Another approach is the use of using rate-based UDP to overcome TCP’s inefficiency in long fat pipe networks.. Some of ongoing works in this area are SABUL ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2003</Year><RecNum>127</RecNum><record><rec-number>127</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">127</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Gu, Y</style></author><author><style face="normal" font="Times New Roman" size="100%">Grossman, R</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">SABUL: A Transport Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Journal of Grid Computing</style></secondary-title></titles><periodical><full-title>Journal of Grid Computing</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">377-386</style></pages><volume>1</volume><number><style face="normal" font="Times New Roman" size="100%">4</style></number><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[2057], FOBS ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dickens</Author><Year>2003</Year><RecNum>128</RecNum><record><rec-number>128</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">128</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Dickens, PM</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">FOBS: A Lightweight Communication Protocol for Grid Computing</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Lecture Notes in Computer Science</style></secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages><style face="normal" font="Times New Roman" size="100%">938-946</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2003</style></year></dates><urls></urls></record></Cite></EndNote>[219], RBUP ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>He</Author><Year>2002</Year><RecNum>129</RecNum><record><rec-number>129</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">129</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">He, E</style></author><author><style face="normal" font="Times New Roman" size="100%">Leigh, J</style></author><author><style face="normal" font="Times New Roman" size="100%">Yu, O</style></author><author><style face="normal" font="Times New Roman" size="100%">Defanti, TA</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Reliable Blast UDP: Predictable High Performance Bulk Data Transfer</style></title><secondary-title><style face="normal" font="Times New Roman" size="100%">Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on</style></secondary-title></titles><pages><style face="normal" font="Times New Roman" size="100%">317-324</style></pages><dates><year><style face="normal" font="Times New Roman" size="100%">2002</style></year></dates><urls></urls></record></Cite></EndNote>[2258], FRTP ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Zheng</Author><Year>2004</Year><RecNum>96</RecNum><record><rec-number>96</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">96</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zheng, X.</author><author>Mudambi, A. P.</author><author>Veeraraghavan, M.</author></authors></contributors><titles><title>FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits</title><secondary-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</secondary-title></titles><periodical><full-title>Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks</full-title></periodical><dates><year>2004</year></dates><urls></urls></record></Cite></EndNote>[2362], and UDT ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2005</Year><RecNum>182</RecNum><record><rec-number>182</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">182</key></foreign-keys><ref-type name="Thesis">32</ref-type><contributors><authors><author>Gu, Y</author></authors></contributors><titles><title>UDT: A High Performance Data Transport Protocol</title></titles><dates><year>2005</year></dates><publisher>University of Illinois</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gu</Author><Year>2005</Year><RecNum>182</RecNum><record><rec-number>182</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">182</key></foreign-keys><ref-type name="Thesis">32</ref-type><contributors><authors><author>Gu, Y</author></authors></contributors><titles><title>UDT: A High Performance Data Transport Protocol</title></titles><dates><year>2005</year></dates><publisher>University of Illinois</publisher><urls></urls></record></Cite></EndNote>[19106]. Even though In spite of the fact that the UDP is a very simple protocol, its unreliableproviding reliable data streaming service to applications is an important disadvantage when compared toadvantage of TCP over UDP.Data Transfer Modules is accountable for sending and receiving actual data to/from other peers. As illustrated in the figure,, it only interacts with Data Sharing Algorithm layer. Although thereEven though we are many planning to use UDP based data transfer protocols available to use in our prototype, each of them has advantages and disadvantages over others. Thus, it is necessary to conduct comprehensive survey and test to select the one that performs best in a peer-to-peer based data transfer mechanism. Hencefuture, in our current prototype, for the time being, Data Transfer Modules consists of services that which use the Internet protocol TCP/IP to transfer data between physical locations. In order to enable our GTFC transfer data on any network and utilize the network more efficiently, we both employed both a single TCP flow and parallel TCP flows. In spite of the fact that Data Transfer Modules is depicted as an independent entity in the architecture figure, because of its job description it has very close relation with Torrent Data Sharing Algorithm Layer. GTFC uses two channels: data channel and security channel. The former is used solely for the purpose of data transfer in high bandwidth. The latter is for the security purpose and encrypted.Management ModulesThe Management Modules consists of sub-modules which provide services and tools that support the tasks management, monitoring of usage and availability statistical information such as percentage of upload and download information, and communication with the WS-Tracker.Task ManagerTask Manager is the first module in the GTFC to be executed when the user run the GTFC. After initializing the GTFC settings, it generates a unique ID, Unique Grid Torrent ID (UGTID). UGTID is essential for each of GTCs because it is used to identify each GTC during the data sharing and communication processes. Following UGTID creation, GTC stores it into an ID file for future utilization. The user has to register other required information with this UGTID by retrieving it from the ID file into Collaboration and Content Manager (CCM).Other important responsibility of Task Manager is to execute a task included in task list delivered by WS-Tracker service. Upon task list arrival, it parses the list and then, according to description of task, executes the appropriate services to perform a task or starts a proper module and passes it to that module to be handled. It acts as central control unit of the GTFC and interacts all the modules except Data Transfer Modules as shown in REF _Ref197132347 \h Figure 44. In order to create a scheduled request needing to be passed to WS-Tracker client and to be delivered WS-Tracker service eventually, it has a time-based scheduling service as well.WS-Tracker ClientWS-Tracker client behaves as a communication substrate between Task manager and WS-Tracker service. The relation between Task manager and WS-Tracker service is loosely coupled relation. This loose coupling feature enabled us to implement the management part of GTF as in service-oriented architecture (SOA). SOA is defined as following on a web page dedicated to service-oriented architecture and Web services ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>84</RecNum><record><rec-number>84</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>84</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>Service-oriented architecture (SOA) definition</title></titles><dates><year>2007</year></dates><label>Definition</label><urls><related-urls><url>;[24107].A service-oriented architecture is essentially a collection of services. These services communicate with each other. The communication can involve either simple data passing or it could involve two or more services coordinating some activity. Some means of connecting services to each other is needed.In other words, the service is the basic building block of SOA, and according to the same web page ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>84</RecNum><record><rec-number>84</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>84</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>Service-oriented architecture (SOA) definition</title></titles><dates><year>2007</year></dates><label>Definition</label><urls><related-urls><url>;[24107], a service is defined as “a function that is well-defined, self-contained, and does not depend on the context or state of other services.” Although, currently, the technology of Web services can be used to implement a service-oriented architecture, SOA is not a new idea and DCOM or Object Request Brokers (ORBs) might be considered as prior service-oriented architecture implementations ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>84</RecNum><record><rec-number>84</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>84</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>Service-oriented architecture (SOA) definition</title></titles><dates><year>2007</year></dates><label>Definition</label><urls><related-urls><url>;[24107].Similar to SOA, each task of the GTF is regarded as a service so all tasks in the system are implemented as traditional web services. Thus, WS-Tracker Client communicates with WS-Tracker service as a traditional Web service client, request and response SOAP messages are transported over HTTP. WS-Tracker service URL information is a vital piece of data since WS-Tracker Client communicates with the given WS-Tracker service during the whole data sharing process. Thus, in order to start a connection with WS-Tracker service, WS-Tracker's service URL information has to be notified GTFC by the user. This notification can be done in two ways; by updating GTFC's properties file either before, or after running it. If WS-Tracker's address information is updated after running it, GTC will receive it after a certain time, since it checks its properties file periodically. Security ManagerSecurity manager handles issues related to security, for instance exchanging certificates, encrypting and decrypting of messages. For this purpose, The GTFC’s layered architecture usesis implemented by using the Java Authentication and Authorization Service (JAAS) and the Java Secure Socket Extension (JSSE); however, otheruses third party securityparty security components such as: Java CoG Kit and Java WS Security middleware can be integrated as shown in REF _Ref195445136 \h Figure 43. The JAAS former is used to provide functionalities fortofor MyProxy ADDIN EN.CITE <EndNote><Cite><Author>Novotny</Author><Year>2001</Year><RecNum>185</RecNum><record><rec-number>185</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">185</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Jason Novotny</author><author>Steven Tuecke</author><author>Von Welch</author></authors></contributors><titles><title>An Online Credential Repository for the Grid: MyProxy</title><secondary-title>Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing</secondary-title></titles><dates><year>2001</year></dates><publisher>IEEE Computer Society</publisher><urls></urls></record></Cite></EndNote>[25108] security credentials. Since certificates, public and private keys, and secureity keyscredentials. The JSSE is utilized when the data exchange over TLS encrypted TCP channels is required. We employ the JAAS and JSSE in the security module of GTF peer because of simplicity, portability, and providing a set of flexible authentications and authorization mechanismsSince short-term connections are the general characteristics of connections between peers, using MyProxy not only is a ideal solution by delegating short-term credentials and providing a set of flexible authentications and authorization mechanisms, but also enables us to integrate the GTFC with many other systems, for it is used in many large grid data projects such as the Enabling Grids for E-science (EGEE), FusionGrid, the Large Hadron Collider (LHC) Computing Grid, Open Science Grid, and TeraGrid, just to name a few. The latter, as its name denotes, is used between and the Management modules and WS-Tracker service (Refer to Chapter 6) and ensures the secure conversation between them. (Refer Chapter 7 for further details about MyProxy and Java WS SecurityWSGTF peer sSecurity). Security Manager communicates with other peers through security channel whichthatwhich is independent of data channel, dedicated to exchange of security information such as certificates and proxypand secret keysroxy certificates, and encrypted. To authenticate incoming connections and their rights, the security manager checks provided info by them against the ACL Registration Table (ACLRETAB). Content hash code, IP, port and UGTID are pieces of information for identity verification process and the important fields of the (ACLRETAB). They are inserted into the ACLRETAB after the parsing process of the ACL messages received in share content request message or ACL message. Following a successful authentication and authorization process, it provides a session key that needs to be delivered to data part to prove itself authenticated to incoming connection.Task Generation and ExchangeA real user has to start the GTFC before initiating the process of task generation. After a successful registration, the user can login to Collaboration and Content Manager (CCM) to commence the sharing procedure of a content that is designated to be shared. First, a user inputs necessary data about the content into CCM. Then, he or she needs to set access control rights of the selected content. CCM stores this information and user's actions as future tasks into a database shared with CCM. When WS-Tracker Client communicates with WS-Tracker service, it pulls out the user’s actions from the database, converts each action into a task, and delivers those tasks in a task list to the task manager through WS-Tracker Client components so that they will be executed by the task manager module in the user's GTFC. Task list is a list in XML format and contains only two types of task created by the user: share content request and download content request. These tasks with the others will be explained in details in the next section.TasksA task is just simple metadata. Even though we could name it as “message”, since it triggers actions in the GTFC, we preferred to term it as “task”. It is exchanged between the GTFC and WS-Tracker service in order to instruct them what to do to carry out a specific action. It can be categorized into request, response, periodic, and non-periodic. REF _Ref197258638 \h Table 41provides a listing of task types used within the GTF.Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 1 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 1 Tasks OverviewNoTask NameCreatorSourceDestinationCategory1Task List RequestGTFCGTFCWS-Trackerrequest, periodic2Share Content RequestUserWS-TrackerGTFCrequest, nonperiodic3Share Content ResponseGTFCGTFCWS-TrackerResponse, nonperiodic4Download ContentRequestUserWS-TrackerGTFCRequest, nonperiodic5Download Content ResponseGTFCGTFCWS-Trackerresponse, periodic6ACL RequestGTFCGTFCWS-Trackerrequest, periodic7ACL ResponseUserWS-TrackerGTFCresponse8Update StatusGTFCGTFCWS-TrackerperiodicThere are six types of task available: task list request, share content request, share content action, download request, torrent request, ACL request, ACL and, lastly, update status task. As To formulate the different task types we created XML schema as illustrated in REF _Ref212149569 \h Figure 45. The Attributes of task are quite self-explanatory. As its name suggested, id attribute stores a unique number generated by DB. Name attribute’s value can be one of predefined task names and gtfc_id is used for UGTID (Unique GridTorrent ID). The name, path and type attributes of file are used to identify the content in local file-system. Type attribute’s value can only be either file or folder. File’s torrent element or Figure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 5 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 5 Representation of XML schema of TaskFigure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 6 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 6 Activity diagram of GTF’s taskstask’s torrent element is used to transfer binary data of the .torrent metafile content from GTC to WS-Tracker. Upload and download elements of file are utilized to provide statistical information to WS-Tracker about current transferring processes. Finally, WS-Tracker returns a list of peers that have access rights to given content in peer element of task. REF _Ref220608365 \h Figure 46 shows all interactions between the GTF tasks. The tasks displayed as in yellow boxes are periodical tasks that are executed repeatedly over a period of time. Non-periodic tasks just carried out as reactions to certain tasks are displayed with the green boxes as depicted in the figure. Task List Request TaskThe Task List Request Task falls into the category of request and periodical task. It is the first task generated by the task manager to initiate the communication between WS-Tracker client and WS-Tracker service. An example of Task List Request task is shown in REF _Ref212150254 \h Table 42. It flows from the GTFC to WS-Tracker service with the information of task id, task name, and UGTID. A list of task, which may contain some tasks or be empty, will be returned to task manager as a response to it.Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 2 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 2 Presentation of Task List Request Task in XML format<task id="56" name="TaskListREQ"></task>Share Content Request TaskThe Share Content Request Task is categorized as a request task and generated by the user when he/she publishes the content's metadata, file name, path, size, etc., for example, into CCM. It is exchanged between WS-Tracker service and the WS-Tracker client of source GTFC, that is, it has the whole content whose owner desires to share it, and emanates from WS-Tracker service to WS-Tracker client. When a WS-Tracker client contacts with the WS-Tracker service, it pulls available task lists from database and delivers it to designated client.Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 3 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 3 Illustration of Share Content Request Task in the XML message <task id="59" name="ShareContentREQ"><content id="content_id" name="test1.data" path="c:\test-results" type ="file" public ="0"></content ></task>Apart from task id and name information, the file name, path and type are the parameters transferred with this task as shown in REF _Ref212151197 \h Table 43. Upon its arrival, after the message and task handling processes, Task Manager starts a ConnectionListener object. Then, the ConnectionListener object locates the content, desired to be shared, by using information delivered via ShareContentREQ task and creates a .torrent metafile of the content and passes it to Task Manager in order to enable it to generate Share Content Response task (ShareContentRES Task) as illustrated in REF _Ref197180272 \h Figure 47.Figure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 7 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 7 Processes workflow of share content request task and share content action taskShare Content Response TaskThe Share Content Response Task is GTC’s reaction to the ShareContentREQ task when it is delivered to GTC by means of its WS-Tracker Client. GTC creates a .torrent file, i.e. a metafile, for the requested the content. Then it passes this metafile to WS-Tracker via its WS-Tracker Client. In other words, the Share Content Response Task flows into WS-Tracker from GTC. WS-Tracker stores incoming metafile into both memory and database. While the former is used for the performance purpose, the latter is employed for the persistency purpose. This task including the .torrent metafile, then, is passed to WS-Tracker client. Finally, it constructs a SOAP message of the Share Content Response Task and sends it to WS-Tracker service over HTTP. Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 4 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 4 Representation of Share Content Response Task in the form of XML message<task id="63" name="ShareContentRES" target="62"><file name="test1.data" path="c:\test-results" type="file"><torrent>TORRENT BINARY DATA IS HERE</torrent></file></task>Download Content Request TaskSimilar to the Share Content Request Task, the Download Request Task is a request type of task and generated by the user when the user picks any content which is available to the user and wants to download it. CCM stores this process into database asa Download Request Task. The same as Share Content Request Task does, it originates from WS-Tracker to WS-Tracker Client, and will be pulled from DB by WS-Tracker and delivered to the client when it communicates with WS-Tracker. Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 5 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 5 An example of Download Content Request Task in XML format<task id="67" name="DownloadContentREQ"><file name="test1.data" path="c:\test-results" type="file" source="GID"></file></task>Download Content Response TaskThe Download Content Response Task message generated by GTC is sent to WS-Tracker in reply to the Download Request Task message. It demands WS-Tracker to send .torrent metafile of the requested content. Upon receiving the Download Content Response Task, WS-Tracker checks whether the requested .torrent metafile is Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 6 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 6 Illustration of Download Content Response Task in the XML message<task id="70" name="DownloadContentRES"><file name="test1.data" path="c:\test-results" type="file" source="GID"></file></task>available. It is important to emphasis that requested .torrent metafile may not be ready for delivery when WS-Tracker receives Download Content Response Task message inasmuch as GTF message exchange mechanism is based on loose coupling design. In other words, the source of the content may send the .torrent metafile of the shared content after downloader’s request. Consequently, WS-Tracker has two options to reply incoming Download Content Response Task message.If .torrent metafile is accessible, then it delivers it to demanding client in the following message format. Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 7 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 7 Presentation of Torrent Data Task in XML format<task id="71" name="torrentDATA"><torrent> TORRENT BINARY DATA IS HERE </torrent></task>When the WS-Client receives the .torrent metafile, it parses the metafile to extract the encoded meta-data of the shared content. Next, it starts to actual data download process by asking pieces from the sources and leeches.If it is not ready yet, then it sends “torrent Not Available” message to the client. Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 8 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 8 Representation of Torrent No Data Task in the form of XML message<task id="71" name="torrentNODATA"></task>WS-Tracker Client will ask the same torrent file after some specified time, like 30 minutes. Until it obtains the metafile, it will ask for it periodically.Access Control List Request TaskThis message originates from WS-Tracker Client to WS-Tracker in order to update access control list (ACL) of a shared content. Similar to Download Content Request Task message, it is a periodical message. It demands to WS-Tracker to deliver given shared content’s ACL. The processes workflow of Access Control List Request Task is illustrated fully in REF _Ref197256992 \h Figure 48.Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 9 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 9 Illustration of Access Control List Request Task in the XML message<task id="83" name="ACLREQ"><file name="test1.data" path="c:\test-results" type="file" source="GID"></file></task>Figure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 8 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 8 Access Control List (ACL) request task's processes workflowAccess Control List Response TaskThe Access Control List Task message is a reply message to the Access Control List Request Task, and it emanates from WS-Tracker to WS-Tracker Client. It conveys IDs of peers which have a right to download stated content or an empty list. The owner of the content later approves or rejects incoming download connections associated with respect to a given content by checking their provided GIDs against the GIDs represented in this ACL response list.Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 10 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 10 An example of Access Control List Response Task in XML format<task id="89" name="ACLRES"><peer id="GID1"><peer id="GID2"><peer id="GID3">……………..<peer id="GIDN"></task>Update Status Task: (UPT)This message is used to collect Clients’ current statistical information, such as upload, download percentage, etc. Even though, in current prototype, we only provide upload and download information, new fields can effortlessly be added. It is a periodical message and sent from WS-Tracker Client to WS-Tracker. The message flow between various components and process workflow for the update status task is illustrated in REF _Ref197257309 \h Figure 49.Table STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 11 STYLEREF 1 \s 4 SEQ Table \* ARABIC \s 1 11 Presentation of Update Status Task in XML format<task id="" name="UpdateStatusCMD"><file name="test1.data" path="c:\test-results" type="file" source="GID"><upload percentage="0.25"/><download percentage="0.47"/></file></task>Figure STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 9 STYLEREF 1 \s 4 SEQ Figure \* ARABIC \s 1 9 Update status task (UST) is one of the important and periodic task that is used to inform WS-Tracker service about current status of the GTF clientsSummaryIn this chapter, we explained the architecture of the GridTorrent framework and motivations and design decisions behind it. Then, we presented a very detailed description of its components: data sharing algorithm layer, data transfer module, core modules responsible for management and task handling and processing, security manager, and finally all tasks. In the next chapter, we are going to explain Collaboration and Content Management which enables the GTF to provide a collaborative environment. Asynchronous Collaboration and Content Management ArchitectureIntroductionBhartrihari, one of the ancient Indian philosophers (c. 450-510 CE?), says “Knowledge grows when shared.” This is very true for science as well, when we consider our contemporary knowledge and its output, i.e. technology, as the accumulation of previous collaborative studies and works since the first appearance of ancient thinkers. In other words, the essence of science is analyzing, suggesting, and sharing ideas, data; to put it simply, exchange and communication. Christopher Surridge, editor of the Web-based journal, Public Library of Science On-Line Edition ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>187</RecNum><record><rec-number>187</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">187</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Plos One: Publishing science, accelerating research</title></titles><dates><year>2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>187</RecNum><record><rec-number>187</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">187</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Plos One: Publishing science, accelerating research</title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[26109] (PLoS ONE), enunciates it clearly as saying “Science happens not just because of people doing experiments, but because they're discussing those experiments,” according to ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>;[27110]. The collaborative projects can be as diverse as that it may be a work of two scientists or of many universities and intuitions scattered around the world. Therefore, there is a growing need for a framework which enables community groups, academics, and scientists to develop collaborative research projects between them. The concept of Asynchronous Collaboration and Content ManagementDefinition of term “Asynchronous Collaboration”Even though collaboration, content, and content management are the buzz-words of the Web 2.0, they have broader definitions in computer environment; therefore, we would like to clarify the use of terms content, content management and asynchronous collaboration as used in this dissertation before we discuss the aspects of asynchronous collaboration and content management. In addition, when we refer to asynchronous collaboration feature of our prototype we use collaboration and asynchronous collaboration interchangeably in the rest of this thesis since the asynchronous collaboration is the only type of the collaboration employed in this thesis. As collaboration has wider and prevalent usage in today’s computerized world, it is perfectly correct to regard email, video teleconferencing, Internet chat or the World Wide Web as collaboration. Therefore, collaboration can be defined “as the integration of many technologies in to a single environment to facilitate information sharing and information management” according to ADDIN EN.CITE <EndNote><Cite><Author>Rizzo</Author><Year>1999</Year><RecNum>189</RecNum><record><rec-number>189</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">189</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Rizzo, T</author></authors></contributors><titles><title>Programming Microsoft Outlook and Microsoft Exchange</title></titles><dates><year>1999</year></dates><publisher>Microsoft Press Redmond, Wash</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Rizzo</Author><Year>1999</Year><RecNum>189</RecNum><record><rec-number>189</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">189</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Rizzo, T</author></authors></contributors><titles><title>Programming Microsoft Outlook and Microsoft Exchange</title></titles><dates><year>1999</year></dates><publisher>Microsoft Press Redmond, Wash</publisher><urls></urls></record></Cite></EndNote>[28111]. The accesses of resources in collaborative systems are other aspect of collaboration and they can be synchronous or asynchronous. In synchronous collaborative systems –real-time collaboration, users work with others at the same moment taking turns communicating ideas and controlling resources. On the other hand, users does not required to be present to participate in asynchronous collaborative systems which allow users to collaborate with other people at their convenience ADDIN EN.CITE <EndNote><Cite><Author>Rizzo</Author><Year>1999</Year><RecNum>189</RecNum><record><rec-number>189</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">189</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Rizzo, T</author></authors></contributors><titles><title>Programming Microsoft Outlook and Microsoft Exchange</title></titles><dates><year>1999</year></dates><publisher>Microsoft Press Redmond, Wash</publisher><urls></urls></record></Cite></EndNote>[28] ADDIN EN.CITE <EndNote><Cite><Author>Rizzo</Author><Year>1999</Year><RecNum>189</RecNum><record><rec-number>189</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">189</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Rizzo, T</author></authors></contributors><titles><title>Programming Microsoft Outlook and Microsoft Exchange</title></titles><dates><year>1999</year></dates><publisher>Microsoft Press Redmond, Wash</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Rizzo</Author><Year>1999</Year><RecNum>189</RecNum><record><rec-number>189</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">189</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Rizzo, T</author></authors></contributors><titles><title>Programming Microsoft Outlook and Microsoft Exchange</title></titles><dates><year>1999</year></dates><publisher>Microsoft Press Redmond, Wash</publisher><urls></urls></record></Cite></EndNote>[111].Definition of term “Content” and “Content Management”The term of content is generally used to refer to various kinds of digital media and electronic text such as computer files, image, audio and video files, electronic documents, and Web contents. Content management refers to create, edit, manage, search and publish digital content. Although the content management term has similar meaning in our prototype, we used the content term with a broader definition in order to include any type of electronic data which is desired to be shared with other users by its owner and can be distributable on computer networks without concerning and processing according to what is stored in it.RequirementsA framework designed for collaborative research projects, in our opinion, should satisfy the following five important requirements. It should enable participants to share and exchange their ideas –a collaborative substrate. It should provide a basic content management service that allows users to publish and manage their content and search, find and access any data available in the system. It should be platform and scientific discipline independent, lightweight and simple as possible it can be. It should be customizable and extensible so that organizations with different needs could modify or add new features to it seamlessly. It should allow users to transfer their shared data from one location to another one in a high-performance, reliable and efficient way.Related WorkThere are great deals of commercial and academic products available for collaboration and content management. They are fall into three main categories: (1) systems aimed to deal with great variety of content on a website, (2) systems designed for handling distributed documents produced by office productivity programs (text processing, spreadsheet, etc.) in addition to web content and (3) systems dedicated to courseware management. Bittorrent, SharePoint ADDIN EN.CITE <EndNote><Cite><Author>Antonovich</Author><Year>2008</Year><RecNum>224</RecNum><record><rec-number>224</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">224</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Antonovich, MP</author></authors></contributors><titles><title>Office and SharePoint 2007 User&apos;s Guide: Integrating SharePoint with Excel, Outlook, Access and Word</title></titles><dates><year>2008</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Antonovich</Author><Year>2008</Year><RecNum>224</RecNum><record><rec-number>224</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">224</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Antonovich, MP</author></authors></contributors><titles><title>Office and SharePoint 2007 User&apos;s Guide: Integrating SharePoint with Excel, Outlook, Access and Word</title></titles><dates><year>2008</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote>[29112] from Microsoft, Drupal ADDIN EN.CITE <EndNote><Cite><Author>Vandyk</Author><Year>2007</Year><RecNum>222</RecNum><record><rec-number>222</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">222</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Vandyk, J</author><author>Westgate, M</author></authors></contributors><titles><title>Pro Drupal Development</title></titles><dates><year>2007</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Vandyk</Author><Year>2007</Year><RecNum>222</RecNum><record><rec-number>222</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">222</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Vandyk, J</author><author>Westgate, M</author></authors></contributors><titles><title>Pro Drupal Development</title></titles><dates><year>2007</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote>[30113] and Sakai ADDIN EN.CITE <EndNote><Cite><Author>Farmer</Author><Year>2005</Year><RecNum>221</RecNum><record><rec-number>221</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">221</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Farmer, J.,</author><author>Dolphin, I.</author></authors></contributors><titles><title>Sakai: eLearning and More</title><secondary-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</secondary-title></titles><periodical><full-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</full-title></periodical><dates><year>2005</year></dates><pub-location>Manchester, UK</pub-location><urls></urls></record></Cite></EndNote>[31] ADDIN EN.CITE <EndNote><Cite><Author>Farmer</Author><Year>2005</Year><RecNum>221</RecNum><record><rec-number>221</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">221</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Farmer, J.,</author><author>Dolphin, I.</author></authors></contributors><titles><title>Sakai: eLearning and More</title><secondary-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</secondary-title></titles><periodical><full-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</full-title></periodical><dates><year>2005</year></dates><pub-location>Manchester, UK</pub-location><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Farmer</Author><Year>2005</Year><RecNum>221</RecNum><record><rec-number>221</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">221</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Farmer, J.,</author><author>Dolphin, I.</author></authors></contributors><titles><title>Sakai: eLearning and More</title><secondary-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</secondary-title></titles><periodical><full-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</full-title></periodical><dates><year>2005</year></dates><pub-location>Manchester, UK</pub-location><urls></urls></record></Cite></EndNote>[114] from Indiana University are the prominent examples of their area. Bittorrent provides high performance data transfer techniques but it lacks of content management feature and does not meet requirements for scientific contents such as security, and reliable and comprehensive search feature (Refer Section REF _Ref218610606 \r \h 2.5.1). SharePoint was designed as the single portal and developed by Microsoft as an enterprise-level application solution for organizations seeking to deploy for their internet, intranet, and extranets with a consistent user experience ADDIN EN.CITE <EndNote><Cite><Author>Antonovich</Author><Year>2008</Year><RecNum>224</RecNum><record><rec-number>224</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">224</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Antonovich, MP</author></authors></contributors><titles><title>Office and SharePoint 2007 User&apos;s Guide: Integrating SharePoint with Excel, Outlook, Access and Word</title></titles><dates><year>2008</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Antonovich</Author><Year>2008</Year><RecNum>224</RecNum><record><rec-number>224</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">224</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Antonovich, MP</author></authors></contributors><titles><title>Office and SharePoint 2007 User&apos;s Guide: Integrating SharePoint with Excel, Outlook, Access and Word</title></titles><dates><year>2008</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote>[29112]. It includes browser-based collaboration and document management platform. Microsoft’s SharePoint consists of two products: Windows SharePoint Service 3.0 (WSS)Microsoft Office SharePoint Server 2007 (MOSS)While WSS provides platform services such as collaboration, storage, security, management, deployment, site model and APIs for extensibility, MOSS provides five server applications content management, portal, search, business intelligence, and business process management with shared services such as single sign-on (SOS), usage reporting, user profile store, business data catalog services ADDIN EN.CITE <EndNote><Cite><Author>Gilster</Author><Year>2007</Year><RecNum>225</RecNum><record><rec-number>225</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">225</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gilster, R</author></authors></contributors><titles><title>Microsoft? Office SharePoint? Server 2007: A Beginner&apos;s Guide (Beginner&apos;s Guide (Osborne Mcgraw Hill))</title></titles><dates><year>2007</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Gilster</Author><Year>2007</Year><RecNum>225</RecNum><record><rec-number>225</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">225</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Gilster, R</author></authors></contributors><titles><title>Microsoft? Office SharePoint? Server 2007: A Beginner&apos;s Guide (Beginner&apos;s Guide (Osborne Mcgraw Hill))</title></titles><dates><year>2007</year></dates><urls></urls></record></Cite></EndNote>[32115]. Although SharePoint offers wide range of collaboration and document management functionalities, it is not suitable for scientific community for several reasons. First of all, as SharePoint only runs on Windows based OS using Microsoft SQL server, it is platform dependent and integrated tightly with other Microsoft products and technologies, for example, , ISS and SQL Server. Secondly, due to its license issue and being a commercial product, it is an expensive solution and adding new capabilities entails daunting challenges. In addition, SharePoint is built on ; thus, customizations are done via .NET framework. The third reason is that it is difficult to utilized alternative data transfer mechanisms apart from HTTP and FTP. The final reason is that it is designed to serve small size files by storing and locating files in a central site and controlling them via central administration services, which makes SharePoint not suitable for scientific community since they are entirely independent organizations.Drupal is an open-source content management system implement in PHP.; it allows an individual or a community of users to easily publish, manage and organize a great variety of content on a website. The uses of Drupal ranges from community portal sites, news publishing, intranet/corporal web sites, to social networking sites and art, music and multimedia sites ADDIN EN.CITE <EndNote><Cite><Author>Mercer</Author><Year>2008</Year><RecNum>223</RecNum><record><rec-number>223</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">223</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Mercer, David</author></authors></contributors><titles><title>Building Powerful and Robust Websites with Drupal 6: Build your own professional blog, forum, portal or community website with Drupal 6</title></titles><section>380</section><dates><year>2008</year></dates><publisher>Packt Publishing</publisher><isbn>1847192971</isbn><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Mercer</Author><Year>2008</Year><RecNum>223</RecNum><record><rec-number>223</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">223</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Mercer, David</author></authors></contributors><titles><title>Building Powerful and Robust Websites with Drupal 6: Build your own professional blog, forum, portal or community website with Drupal 6</title></titles><section>380</section><dates><year>2008</year></dates><publisher>Packt Publishing</publisher><isbn>1847192971</isbn><urls></urls></record></Cite></EndNote>[33116]. According to ADDIN EN.CITE <EndNote><Cite><Author>Vandyk</Author><Year>2007</Year><RecNum>222</RecNum><record><rec-number>222</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">222</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Vandyk, J</author><author>Westgate, M</author></authors></contributors><titles><title>Pro Drupal Development</title></titles><dates><year>2007</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote>[30] ADDIN EN.CITE <EndNote><Cite><Author>Vandyk</Author><Year>2007</Year><RecNum>222</RecNum><record><rec-number>222</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">222</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Vandyk, J</author><author>Westgate, M</author></authors></contributors><titles><title>Pro Drupal Development</title></titles><dates><year>2007</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Vandyk</Author><Year>2007</Year><RecNum>222</RecNum><record><rec-number>222</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">222</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Vandyk, J</author><author>Westgate, M</author></authors></contributors><titles><title>Pro Drupal Development</title></titles><dates><year>2007</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote>[113] the Drupal core includes the following services but not limited to:Basic content managementUser managementSession managementLocalizationTemplatingSyndicationLoggingIn addition to core services, it has additional modules which enable Drupal to offer more functionality such as E-commerce, adsense, forums and workgroups. For scientific content and collaboration management, Drupal has several important advantages over Microsoft’s SharePoint due to being open-source and platform independent. However, it is impractical for scientific community because not only some of its important features (e.g. e-commerce and adsense) are barren, but also most of its functionalities were not designed to manage distributed large files belongs to different organizations scattered across the world. In fact, the Drupal’s primer focus is on managing small files related to websites and they reside on servers owned by a single organization. Similar to Microsoft’s SharePoint, Drupal does not provide any alternative data transfer technique as requested files are transferred directly by the web server over HTTP as a static file and Drupal is not involved at all ADDIN EN.CITE <EndNote><Cite><Author>Vandyk</Author><Year>2007</Year><RecNum>222</RecNum><record><rec-number>222</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">222</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Vandyk, J</author><author>Westgate, M</author></authors></contributors><titles><title>Pro Drupal Development</title></titles><dates><year>2007</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Vandyk</Author><Year>2007</Year><RecNum>222</RecNum><record><rec-number>222</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">222</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Vandyk, J</author><author>Westgate, M</author></authors></contributors><titles><title>Pro Drupal Development</title></titles><dates><year>2007</year></dates><publisher>Apress</publisher><urls></urls></record></Cite></EndNote>[30113]. The Sakai Collaboration and Learning Environment (CLS) is a free and open-source Courseware Management System. The Sakai project began January 2004 when four universities –Indiana University, Stanford University, the Massachusetts Institute of Technology, and the University of Michigan- decided to replace their learning systems by a common courseware management system developed together ADDIN EN.CITE <EndNote><Cite><Author>Farmer</Author><Year>2005</Year><RecNum>221</RecNum><record><rec-number>221</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">221</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Farmer, J.,</author><author>Dolphin, I.</author></authors></contributors><titles><title>Sakai: eLearning and More</title><secondary-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</secondary-title></titles><periodical><full-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</full-title></periodical><dates><year>2005</year></dates><pub-location>Manchester, UK</pub-location><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Farmer</Author><Year>2005</Year><RecNum>221</RecNum><record><rec-number>221</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">221</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Farmer, J.,</author><author>Dolphin, I.</author></authors></contributors><titles><title>Sakai: eLearning and More</title><secondary-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</secondary-title></titles><periodical><full-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</full-title></periodical><dates><year>2005</year></dates><pub-location>Manchester, UK</pub-location><urls></urls></record></Cite></EndNote>[31114]. As it is seen from some tools of Sakai listed in REF _Ref219007966 \h Table 51, the primary motivation behind the Sakai project is to accomplish a framework with rich functionality that will support pedagogies in all disciplines ADDIN EN.CITE <EndNote><Cite><Author>Farmer</Author><Year>2005</Year><RecNum>221</RecNum><record><rec-number>221</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">221</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Farmer, J.,</author><author>Dolphin, I.</author></authors></contributors><titles><title>Sakai: eLearning and More</title><secondary-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</secondary-title></titles><periodical><full-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</full-title></periodical><dates><year>2005</year></dates><pub-location>Manchester, UK</pub-location><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Farmer</Author><Year>2005</Year><RecNum>221</RecNum><record><rec-number>221</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">221</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>Farmer, J.,</author><author>Dolphin, I.</author></authors></contributors><titles><title>Sakai: eLearning and More</title><secondary-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</secondary-title></titles><periodical><full-title>EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World</full-title></periodical><dates><year>2005</year></dates><pub-location>Manchester, UK</pub-location><urls></urls></record></Cite></EndNote>[31114] and it does not provide a dedicated tools that manages and transfer geographically distributed large files stored on divergent systems. Currently, the Sakai CLE is used at over 160 educational institutions, in productions settings ranging from 200 to 200,000 users ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>226</RecNum><record><rec-number>226</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">226</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Sakai Project</title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[34] ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>226</RecNum><record><rec-number>226</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">226</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Sakai Project</title></titles><dates><year>2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>226</RecNum><record><rec-number>226</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">226</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Sakai Project</title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[117].Even though above-mentioned products have great features, as their services are sophisticated and comprehensive and they were designed for being a management framework instead of being a content management framework, they are heavyweight process and require considerable system resources such as computational power and memory; therefore, they alone are not suitable for scientific content management. Furthermore, they provide services to manage only web content or they lack of high performance data transfer capability by using simple HTTP or FTP as data transfer mechanism. However, due to their rich functionality and modular structure or sophisticated web content management systems such as portals, lightweight frameworks designed to manages distributed files, for instance The GridTorrent Asynchronous Collaboration and Content Management framework, can be integrated with them seamlessly. In addition to enterprise level solutions, a great deal of effort has been expended in studying this subject and many systems have been developed in order to satisfy the growing need to provide collaborative environment in scientific community. In Grid community, Replica Location Service (RLS) ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>179</RecNum><record><rec-number>179</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">179</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Replica Location Service (RLS)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>179</RecNum><record><rec-number>179</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">179</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author><style face="normal" font="Times New Roman" size="100%">Globus Alliance,</style></author></authors></contributors><titles><title><style face="normal" font="Times New Roman" size="100%">Replica Location Service (RLS)</style></title></titles><dates><year><style face="normal" font="Times New Roman" size="100%">2007</style></year></dates><urls><related-urls><url><style face="normal" font="Times New Roman" size="100%">;[3548] can be considered as collaborative tools in an aspect of finding where existing files are located in the Grid by providing a framework for keeping track of one or more replicas in a Grid environment. GridFTP is Table STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 1 STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 1 Partial List of Sakai 2.5 ToolsA set of generic collaboration toolsof the core of Sakai.The core tools can be augmented withtools designed for a particular application of Sakai.Teaching ToolsPortfolio ToolsAnnouncementsDrop BoxEmail ArchiveResourcesChat RoomForumsThreaded DiscussionMessage CenterMessage of the DayNews/RSSPreferencesPresentationProfile / RosterRepository SearchScheduleSearchWeb ContentWebDAVWikiSite SetupAssignmentsGradebookModule EditorQTI AuthoringQTI AssessmentSection ManagementSyllabusFormsEvaluationsGlossaryMatricesLayoutsTemplatesReportsWizardsanother example of collaboration tool of Grid community used for high-performance data transfer. In addition to previous studies and works, emerging technologies offers new tools suitable for scientific collaboration. For example, the technologies of Web 2.0 provide a new way of sharing and interacting to the end users by presenting user-oriented social networks, wikis, blogs, and information-tagging devices. Moreover, being not only more collegial than the traditional variety, but also considerably more productive is another attractiveness of the Web 2.0 based collaboration. Although, offered facilities are very important and it promotes the productivity, they address only the first requirement and are used a small but growing number of researchers, yet their efforts are still too scattered ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>;[27] ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>;[110].The OpenWetWare ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>188</RecNum><record><rec-number>188</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">188</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>OpenWetWare</title></titles><dates><year>2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>188</RecNum><record><rec-number>188</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">188</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>OpenWetWare</title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[36118] project at MIT is another example of collaboration project which harnessed Web 2.0. It is designed to collaborate on synthetic biology. OpenWetWare, a collaborative Web site, is based on wiki that can be edited by anyone who has access to it ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>;[27110]. A great deal of studies and efforts in this area are solutions either that deal with just some aspects of the collaboration issues instead of all aspects of them or, likewise OpenWetWare, clearly fall into the category of discipline specific studies which is almost impossible to use for another scientific discipline because of imposing data type germane to particular discipline . Even though some of them are very successful at their targeted field, they still suffer either from above-mentioned shortcomings or from not having been addressed some very important requites such as privacy and security issues. For example, the privacy issues are hotly debates in scientific communities whose members use the technologies of Web 2.0 ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>;[27] ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Waldrop</Author><Year>April, 2008</Year><RecNum>186</RecNum><record><rec-number>186</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">186</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Waldrop, M. Mitchell </author></authors></contributors><titles><title>Science 2.0 -- Is Open Access Science the Future? </title></titles><dates><year>April, 2008</year></dates><urls><related-urls><url>;[110].As a result, bearing in mind the deficiencies of previous works, we developed a system that is highly platform and scientific discipline independent and capable of high-performance data transfer technique and provides services in order to enable users to share, search, and find their contents in the system. In the previous chapters we explained the motivation and rationale for the GridTorrent Framework Client Architecture which is responsible for high performance data sending and receiving with acceptable level of security. In this chapter, we extend more details about low level and architectural design decisions of the Collaboration and Content Management (CCM) component of the GridTorrent framework which offers a collaborative environment. Users can share, search, access, and manage their contents by the tools provided by the CCM. In addition to explanation of high level overview of the CCM, we present a thorough description of key components and their implementation. Access Control SchemesIt is inevitable that distributed computer systems require at least one mechanism to restrict system access to authorized users. As collaborative systems permit their users to access other users’ resources, access control scheme is a vital requirement for collaborative systems as well. In this section we examine existing access control strategies for collaborative system. The simple access control mechanism is Access Control Matrix (ACM). In this scheme, current allowed accesses of the subjects, which are active protective entities such as users and processes, are controlled using a matrix which defines the access rights of each subject associated with each object in a system ADDIN EN.CITE <EndNote><Cite><Author>Lampson</Author><Year>1974</Year><RecNum>191</RecNum><record><rec-number>191</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">191</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Lampson, BW</author></authors></contributors><titles><title>Protection</title><secondary-title>ACM SIGOPS Operating Systems Review</secondary-title></titles><periodical><full-title>ACM SIGOPS Operating Systems Review</full-title></periodical><pages>18-24</pages><volume>8</volume><number>1</number><dates><year>1974</year></dates><urls></urls></record></Cite><Cite><Author>Bishop</Author><Year>2004</Year><RecNum>190</RecNum><record><rec-number>190</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">190</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Bishop, M</author></authors></contributors><titles><title>Introduction to Computer Security</title></titles><dates><year>2004</year></dates><publisher>Addison-Wesley Professional</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Lampson</Author><Year>1974</Year><RecNum>191</RecNum><record><rec-number>191</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">191</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Lampson, BW</author></authors></contributors><titles><title>Protection</title><secondary-title>ACM SIGOPS Operating Systems Review</secondary-title></titles><periodical><full-title>ACM SIGOPS Operating Systems Review</full-title></periodical><pages>18-24</pages><volume>8</volume><number>1</number><dates><year>1974</year></dates><urls></urls></record></Cite><Cite><Author>Bishop</Author><Year>2004</Year><RecNum>190</RecNum><record><rec-number>190</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">190</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Bishop, M</author></authors></contributors><titles><title>Introduction to Computer Security</title></titles><dates><year>2004</year></dates><publisher>Addison-Wesley Professional</publisher><urls></urls></record></Cite></EndNote>[37, 38119, 120]. Access Control Lists is the one of the implementation of access matrix model. Objects that associate with subjects and rights lists of a set of pairs –subjects and rights- are stored. Capability Lists is the another mechanism used to implement access matrix model. In this implementation, subjects that associate objects and rights with lists of a set of pairs -objects and rights- are stored. In Role Based Access Control PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5GZXJyYWlvbG88L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFy

PjxSZWNOdW0+MTk0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xOTQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE5NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJC

b29rIj42PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+RGF2aWQgRi4g

RmVycmFpb2xvPC9hdXRob3I+PGF1dGhvcj5SaWNoYXJkIEQuIEt1aG48L2F1dGhvcj48YXV0aG9y

PlJhbWFzd2FteSBDaGFuZHJhbW91bGk8L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+

PHRpdGxlcz48dGl0bGU+Um9sZS1CYXNlZCBBY2Nlc3MgQ29udHJvbCwgU2Vjb25kIEVkaXRpb248

L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHB1Ymxpc2hl

cj5BcnRlY2ggSG91c2UsIEluYy48L3B1Ymxpc2hlcj48aXNibj4xNTk2OTMxMTMyPC9pc2JuPjx1

cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5GZXJyYWlvbG88L0F1dGhv

cj48WWVhcj4xOTk1PC9ZZWFyPjxSZWNOdW0+MTk1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJl

cj4xOTU8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVm

OXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE5NTwva2V5PjwvZm9yZWlnbi1rZXlz

PjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNv

bnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkZlcnJhaW9sbywgRDwvYXV0aG9yPjxhdXRob3I+

Q3VnaW5pLCBKPC9hdXRob3I+PGF1dGhvcj5LdWhuLCBEUjwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5Sb2xlLUJhc2VkIEFjY2VzcyBDb250cm9sIChSQkFD

KTogRmVhdHVyZXMgYW5kIE1vdGl2YXRpb25zPC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPlByb2Nl

ZWRpbmdzIG9mIHRoZSBFbGV2ZW50aCBBbm51YWwgQ29tcHV0ZXIgU2VjdXJpdHkgQXBwbGljYXRp

b25zIENvbmZlcmVuY2U8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MTk5

NTwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhv

cj5MYW1wc29uPC9BdXRob3I+PFllYXI+MTk3NDwvWWVhcj48UmVjTnVtPjE5MTwvUmVjTnVtPjxy

ZWNvcmQ+PHJlYy1udW1iZXI+MTkxPC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9

IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xOTE8L2tl

eT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVm

LXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkxhbXBzb24sIEJXPC9hdXRob3I+

PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPlByb3RlY3Rpb248L3RpdGxl

PjxzZWNvbmRhcnktdGl0bGU+QUNNIFNJR09QUyBPcGVyYXRpbmcgU3lzdGVtcyBSZXZpZXc8L3Nl

Y29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5BQ00gU0lHT1BT

IE9wZXJhdGluZyBTeXN0ZW1zIFJldmlldzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2Vz

PjE4LTI0PC9wYWdlcz48dm9sdW1lPjg8L3ZvbHVtZT48bnVtYmVyPjE8L251bWJlcj48ZGF0ZXM+

PHllYXI+MTk3NDwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENp

dGU+PEF1dGhvcj5TYW5kaHU8L0F1dGhvcj48WWVhcj4xOTk2PC9ZZWFyPjxSZWNOdW0+MTkzPC9S

ZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xOTM8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48

a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoi

PjE5Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUi

PjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+UmF2aSBTLiBTYW5k

aHU8L2F1dGhvcj48YXV0aG9yPkVkd2FyZCBKLiBDb3luZTwvYXV0aG9yPjxhdXRob3I+SGFsIEwu

IEZlaW5zdGVpbjwvYXV0aG9yPjxhdXRob3I+Q2hhcmxlcyBFLiBZb3VtYW48L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+Um9sZS1CYXNlZCBBY2Nlc3MgQ29u

dHJvbCBNb2RlbHM8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+Q29tcHV0ZXI8L3NlY29uZGFyeS10

aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5Db21wdXRlcjwvZnVsbC10aXRs

ZT48L3BlcmlvZGljYWw+PHBhZ2VzPjM4LTQ3PC9wYWdlcz48dm9sdW1lPjI5PC92b2x1bWU+PG51

bWJlcj4yPC9udW1iZXI+PGRhdGVzPjx5ZWFyPjE5OTY8L3llYXI+PC9kYXRlcz48aXNibj4wMDE4

LTkxNjI8L2lzYm4+PHVybHM+PC91cmxzPjxlbGVjdHJvbmljLXJlc291cmNlLW51bT5odHRwOi8v

ZHguZG9pLm9yZy8xMC4xMTA5LzIuNDg1ODQ1PC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3Jl

Y29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5GZXJyYWlvbG88L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFy

PjxSZWNOdW0+MTk0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xOTQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE5NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJC

b29rIj42PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+RGF2aWQgRi4g

RmVycmFpb2xvPC9hdXRob3I+PGF1dGhvcj5SaWNoYXJkIEQuIEt1aG48L2F1dGhvcj48YXV0aG9y

PlJhbWFzd2FteSBDaGFuZHJhbW91bGk8L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+

PHRpdGxlcz48dGl0bGU+Um9sZS1CYXNlZCBBY2Nlc3MgQ29udHJvbCwgU2Vjb25kIEVkaXRpb248

L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHB1Ymxpc2hl

cj5BcnRlY2ggSG91c2UsIEluYy48L3B1Ymxpc2hlcj48aXNibj4xNTk2OTMxMTMyPC9pc2JuPjx1

cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5GZXJyYWlvbG88L0F1dGhv

cj48WWVhcj4xOTk1PC9ZZWFyPjxSZWNOdW0+MTk1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJl

cj4xOTU8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVm

OXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE5NTwva2V5PjwvZm9yZWlnbi1rZXlz

PjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNv

bnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkZlcnJhaW9sbywgRDwvYXV0aG9yPjxhdXRob3I+

Q3VnaW5pLCBKPC9hdXRob3I+PGF1dGhvcj5LdWhuLCBEUjwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5Sb2xlLUJhc2VkIEFjY2VzcyBDb250cm9sIChSQkFD

KTogRmVhdHVyZXMgYW5kIE1vdGl2YXRpb25zPC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPlByb2Nl

ZWRpbmdzIG9mIHRoZSBFbGV2ZW50aCBBbm51YWwgQ29tcHV0ZXIgU2VjdXJpdHkgQXBwbGljYXRp

b25zIENvbmZlcmVuY2U8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MTk5

NTwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhv

cj5MYW1wc29uPC9BdXRob3I+PFllYXI+MTk3NDwvWWVhcj48UmVjTnVtPjE5MTwvUmVjTnVtPjxy

ZWNvcmQ+PHJlYy1udW1iZXI+MTkxPC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9

IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xOTE8L2tl

eT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVm

LXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkxhbXBzb24sIEJXPC9hdXRob3I+

PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPlByb3RlY3Rpb248L3RpdGxl

PjxzZWNvbmRhcnktdGl0bGU+QUNNIFNJR09QUyBPcGVyYXRpbmcgU3lzdGVtcyBSZXZpZXc8L3Nl

Y29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5BQ00gU0lHT1BT

IE9wZXJhdGluZyBTeXN0ZW1zIFJldmlldzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2Vz

PjE4LTI0PC9wYWdlcz48dm9sdW1lPjg8L3ZvbHVtZT48bnVtYmVyPjE8L251bWJlcj48ZGF0ZXM+

PHllYXI+MTk3NDwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENp

dGU+PEF1dGhvcj5TYW5kaHU8L0F1dGhvcj48WWVhcj4xOTk2PC9ZZWFyPjxSZWNOdW0+MTkzPC9S

ZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xOTM8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48

a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoi

PjE5Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUi

PjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+UmF2aSBTLiBTYW5k

aHU8L2F1dGhvcj48YXV0aG9yPkVkd2FyZCBKLiBDb3luZTwvYXV0aG9yPjxhdXRob3I+SGFsIEwu

IEZlaW5zdGVpbjwvYXV0aG9yPjxhdXRob3I+Q2hhcmxlcyBFLiBZb3VtYW48L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+Um9sZS1CYXNlZCBBY2Nlc3MgQ29u

dHJvbCBNb2RlbHM8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+Q29tcHV0ZXI8L3NlY29uZGFyeS10

aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5Db21wdXRlcjwvZnVsbC10aXRs

ZT48L3BlcmlvZGljYWw+PHBhZ2VzPjM4LTQ3PC9wYWdlcz48dm9sdW1lPjI5PC92b2x1bWU+PG51

bWJlcj4yPC9udW1iZXI+PGRhdGVzPjx5ZWFyPjE5OTY8L3llYXI+PC9kYXRlcz48aXNibj4wMDE4

LTkxNjI8L2lzYm4+PHVybHM+PC91cmxzPjxlbGVjdHJvbmljLXJlc291cmNlLW51bT5odHRwOi8v

ZHguZG9pLm9yZy8xMC4xMTA5LzIuNDg1ODQ1PC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3Jl

Y29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5GZXJyYWlvbG88L0F1dGhvcj48WWVhcj4yMDA3PC9ZZWFy

PjxSZWNOdW0+MTk0PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xOTQ8L3JlYy1udW1iZXI+

PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4

ZG1lMnR6MHYyZXcwMnoiPjE5NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJC

b29rIj42PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+RGF2aWQgRi4g

RmVycmFpb2xvPC9hdXRob3I+PGF1dGhvcj5SaWNoYXJkIEQuIEt1aG48L2F1dGhvcj48YXV0aG9y

PlJhbWFzd2FteSBDaGFuZHJhbW91bGk8L2F1dGhvcj48L2F1dGhvcnM+PC9jb250cmlidXRvcnM+

PHRpdGxlcz48dGl0bGU+Um9sZS1CYXNlZCBBY2Nlc3MgQ29udHJvbCwgU2Vjb25kIEVkaXRpb248

L3RpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA3PC95ZWFyPjwvZGF0ZXM+PHB1Ymxpc2hl

cj5BcnRlY2ggSG91c2UsIEluYy48L3B1Ymxpc2hlcj48aXNibj4xNTk2OTMxMTMyPC9pc2JuPjx1

cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhvcj5GZXJyYWlvbG88L0F1dGhv

cj48WWVhcj4xOTk1PC9ZZWFyPjxSZWNOdW0+MTk1PC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJl

cj4xOTU8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVm

OXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjE5NTwva2V5PjwvZm9yZWlnbi1rZXlz

PjxyZWYtdHlwZSBuYW1lPSJDb25mZXJlbmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNv

bnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkZlcnJhaW9sbywgRDwvYXV0aG9yPjxhdXRob3I+

Q3VnaW5pLCBKPC9hdXRob3I+PGF1dGhvcj5LdWhuLCBEUjwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5Sb2xlLUJhc2VkIEFjY2VzcyBDb250cm9sIChSQkFD

KTogRmVhdHVyZXMgYW5kIE1vdGl2YXRpb25zPC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPlByb2Nl

ZWRpbmdzIG9mIHRoZSBFbGV2ZW50aCBBbm51YWwgQ29tcHV0ZXIgU2VjdXJpdHkgQXBwbGljYXRp

b25zIENvbmZlcmVuY2U8L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MTk5

NTwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENpdGU+PEF1dGhv

cj5MYW1wc29uPC9BdXRob3I+PFllYXI+MTk3NDwvWWVhcj48UmVjTnVtPjE5MTwvUmVjTnVtPjxy

ZWNvcmQ+PHJlYy1udW1iZXI+MTkxPC9yZWMtbnVtYmVyPjxmb3JlaWduLWtleXM+PGtleSBhcHA9

IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2MmV3MDJ6Ij4xOTE8L2tl

eT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRpY2xlIj4xNzwvcmVm

LXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPkxhbXBzb24sIEJXPC9hdXRob3I+

PC9hdXRob3JzPjwvY29udHJpYnV0b3JzPjx0aXRsZXM+PHRpdGxlPlByb3RlY3Rpb248L3RpdGxl

PjxzZWNvbmRhcnktdGl0bGU+QUNNIFNJR09QUyBPcGVyYXRpbmcgU3lzdGVtcyBSZXZpZXc8L3Nl

Y29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5BQ00gU0lHT1BT

IE9wZXJhdGluZyBTeXN0ZW1zIFJldmlldzwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PHBhZ2Vz

PjE4LTI0PC9wYWdlcz48dm9sdW1lPjg8L3ZvbHVtZT48bnVtYmVyPjE8L251bWJlcj48ZGF0ZXM+

PHllYXI+MTk3NDwveWVhcj48L2RhdGVzPjx1cmxzPjwvdXJscz48L3JlY29yZD48L0NpdGU+PENp

dGU+PEF1dGhvcj5TYW5kaHU8L0F1dGhvcj48WWVhcj4xOTk2PC9ZZWFyPjxSZWNOdW0+MTkzPC9S

ZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj4xOTM8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5cz48

a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcwMnoi

PjE5Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFydGljbGUi

PjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+UmF2aSBTLiBTYW5k

aHU8L2F1dGhvcj48YXV0aG9yPkVkd2FyZCBKLiBDb3luZTwvYXV0aG9yPjxhdXRob3I+SGFsIEwu

IEZlaW5zdGVpbjwvYXV0aG9yPjxhdXRob3I+Q2hhcmxlcyBFLiBZb3VtYW48L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+Um9sZS1CYXNlZCBBY2Nlc3MgQ29u

dHJvbCBNb2RlbHM8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+Q29tcHV0ZXI8L3NlY29uZGFyeS10

aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5Db21wdXRlcjwvZnVsbC10aXRs

ZT48L3BlcmlvZGljYWw+PHBhZ2VzPjM4LTQ3PC9wYWdlcz48dm9sdW1lPjI5PC92b2x1bWU+PG51

bWJlcj4yPC9udW1iZXI+PGRhdGVzPjx5ZWFyPjE5OTY8L3llYXI+PC9kYXRlcz48aXNibj4wMDE4

LTkxNjI8L2lzYm4+PHVybHM+PC91cmxzPjxlbGVjdHJvbmljLXJlc291cmNlLW51bT5odHRwOi8v

ZHguZG9pLm9yZy8xMC4xMTA5LzIuNDg1ODQ1PC9lbGVjdHJvbmljLXJlc291cmNlLW51bT48L3Jl

Y29yZD48L0NpdGU+PC9FbmROb3RlPgB=

ADDIN EN.CITE.DATA [37, 39-41119, 121-123](RBAC) model, access decisions are based on the roles predefined in organizations. Access rights are grouped by role name and subjects take on assigned roles. The access of system resources is authorized according to subjects’ roles not their individual identity. Privilege and Role Management Infrastructure Standard ADDIN EN.CITE <EndNote><Cite><Author>Chadwick</Author><Year>2003</Year><RecNum>72</RecNum><record><rec-number>72</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">72</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Chadwick, D. W.</author><author>Otenko, A.</author></authors></contributors><titles><title>The PERMIS X. 509 role based privilege management infrastructure</title><secondary-title>Future Generation Computer Systems</secondary-title></titles><periodical><full-title>Future Generation Computer Systems</full-title></periodical><pages>277-289</pages><volume>19</volume><number>2</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Chadwick</Author><Year>2003</Year><RecNum>72</RecNum><record><rec-number>72</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">72</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Chadwick, D. W.</author><author>Otenko, A.</author></authors></contributors><titles><title>The PERMIS X. 509 role based privilege management infrastructure</title><secondary-title>Future Generation Computer Systems</secondary-title></titles><periodical><full-title>Future Generation Computer Systems</full-title></periodical><pages>277-289</pages><volume>19</volume><number>2</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote>[42124] (PERMIS) , an implementation of RBAC model, is an authorization infrastructure based on the X.509 Attribute Certificate. Whereas RBAC scheme is very effective for collaboration systems because of simple administration and scalability issues, ACM scheme is efficient in flexibility and fine-grained control issues.As settings of ACM and RBAC based systems are relatively static, they are suitable for asynchronous collaborative environments which require no or little real-time interactions or access control settings. On the other hand, those systems lack to coordinate concurrent activities and to manage synchronous resources in synchronous collaborative systems. Floor control ADDIN EN.CITE <EndNote><Cite><Author>Dommel</Author><Year>1995</Year><RecNum>200</RecNum><record><rec-number>200</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">200</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Dommel, HP</author><author>Garcia-Luna-Aceves, JJ</author></authors></contributors><titles><title>Design Issues for Floor Control Protocols</title><secondary-title>Proceedings of SPIE Multimedia and Networking</secondary-title></titles><pages>305-16</pages><volume>2417</volume><dates><year>1995</year></dates><publisher>SPIE</publisher><urls></urls></record></Cite><Cite><Author>Dommel</Author><Year>1997</Year><RecNum>199</RecNum><record><rec-number>199</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">199</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Dommel, HP</author><author>Garcia-Luna-Aceves, JJ</author></authors></contributors><titles><title>Floor control for multimedia conferencing and collaboration</title><secondary-title>Multimedia Systems</secondary-title></titles><periodical><full-title>Multimedia Systems</full-title></periodical><pages>23-38</pages><volume>5</volume><number>1</number><dates><year>1997</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Dommel</Author><Year>1995</Year><RecNum>200</RecNum><record><rec-number>200</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">200</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Dommel, HP</author><author>Garcia-Luna-Aceves, JJ</author></authors></contributors><titles><title>Design Issues for Floor Control Protocols</title><secondary-title>Proceedings of SPIE Multimedia and Networking</secondary-title></titles><pages>305-16</pages><volume>2417</volume><dates><year>1995</year></dates><publisher>SPIE</publisher><urls></urls></record></Cite><Cite><Author>Dommel</Author><Year>1997</Year><RecNum>199</RecNum><record><rec-number>199</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">199</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Dommel, HP</author><author>Garcia-Luna-Aceves, JJ</author></authors></contributors><titles><title>Floor control for multimedia conferencing and collaboration</title><secondary-title>Multimedia Systems</secondary-title></titles><periodical><full-title>Multimedia Systems</full-title></periodical><pages>23-38</pages><volume>5</volume><number>1</number><dates><year>1997</year></dates><urls></urls></record></Cite></EndNote>[43, 44125, 126] scheme developed “to manage joint or exclusive access to shared resources” ADDIN EN.CITE <EndNote><Cite><Author>Koskelainen</Author><Year>2006</Year><RecNum>198</RecNum><record><rec-number>198</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">198</key></foreign-keys><ref-type name="Standard">58</ref-type><contributors><authors><author>Koskelainen, P</author><author>Ott, J</author><author>Schulzrinne, H</author><author>Wu, X. </author></authors></contributors><titles><title>Requirements for Floor Control Protocols</title><secondary-title>RFC Editor United States</secondary-title></titles><periodical><full-title>RFC Editor United States</full-title></periodical><dates><year>2006</year></dates><publisher>RFC 4376, February 2006</publisher><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Koskelainen</Author><Year>2006</Year><RecNum>198</RecNum><record><rec-number>198</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">198</key></foreign-keys><ref-type name="Standard">58</ref-type><contributors><authors><author>Koskelainen, P</author><author>Ott, J</author><author>Schulzrinne, H</author><author>Wu, X. </author></authors></contributors><titles><title>Requirements for Floor Control Protocols</title><secondary-title>RFC Editor United States</secondary-title></titles><periodical><full-title>RFC Editor United States</full-title></periodical><dates><year>2006</year></dates><publisher>RFC 4376, February 2006</publisher><urls><related-urls><url>;[45127] and to maintain shared state consistency in synchronous collaborative environments such as conference and media session setup, conference policy manipulation, and media control. As users of the Collaboration and Content Management framework are not required to collaborate with other users at the same moment, the CCM display more the characteristics of asynchronous collaborative systems than that of synchronous collaborative systems; thus, we used ACM and RBAC based access control models in our prototype.The Collaboration and Content ManagementThe CCM is a software application that provides a system capable of managing users, providing services to the users to govern their contents and access rights of their contents, building their collaborative team, and administering their teams. It has been developed mainly using Java, JavaServer Pages and Java Beans technologies. The human user is the sole actor of the CCM. He uses the services (Refer Section 5.2.2 for full list of services and detailed descriptions of them) offered by the system either to build a cyber collaborative environment for his work or to benefit from collaborative environment established beforehand. All actions of the users are recorded into storage server. We used MySQL ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>120</RecNum><record><rec-number>120</rec-number><foreign-keys><key app='EN' db-id='eref9pfvov2rdiedsstvpxdme2tz0v2ew02z'>120</key></foreign-keys><ref-type name='Web Page'>12</ref-type><contributors></contributors><titles><title>MySQL</title></titles><dates><year>2007</year></dates><urls><related-urls><url>;[1047] database server for the data storing purpose.MySQL is a high performance database library with Java bindings as well as for many other languages. It has a simple architecture and provides simple data access and management. Subsequently, some of these recorded actions are converted into a task format (Refer Section 4.6.1) by the WS-Tracker service later. The components of the GridTorrent Framework and communications taking place among them are shown in REF _Ref197799158 \h Figure 51.The CCM consists of two main modules: Collaboration Management Module and Content Management Module. REF _Ref197800463 \h Figure 52 illustrates the subcomponents of them. TheCCM interacts with the user and the database. In the following section, we clearly explicate objects and services that are used and offered by the system. Then, we explain the Collaboration and Content Management modules in details.Figure STYLEREF 1 \s 5 SEQ Figure \* ARABIC \s 1 1 STYLEREF 1 \s 5 SEQ Figure \* ARABIC \s 1 1 The interaction of Collaboration and Content Manager with other entities of the GridTorrent FrameworkObjects of the SystemWe refer to any entity that is either a subject of or an object of a service provided by the CCM. REF _Ref197807220 \h Table 52 lists the major objects, their brief descriptions, and the services interacted with them. The term ‘a user’ is frequently used in many systems, but not in our system, for an entity that can be either a machine or a human who uses the system. When we refer to a user, this term includes only a human user who interacts with the CCM and can be either a collaborative team administrator/member, or content publisher/subscriber, or all of them.Figure STYLEREF 1 \s 5 SEQ Figure \* ARABIC \s 1 2 STYLEREF 1 \s 5 SEQ Figure \* ARABIC \s 1 2 Anatomy of the Collaboration and Content Management moduleA Collaborative Team is a group of users who are usually geographically dispersed and share common interest for particular contents germane to their work or project. It is composed of collaborative team members.Table STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 2 STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 2 Overview of objects used in the Collaboration and Content ManagerObject NameDescriptionServices Usera human who interacts with the CCM registration, forming a team, disbanding a team, joining a team request, leaving a team request, searching/browsing contents, publishing/downloading contentsCollaborative Teama group of users usually geographically dispersed and share common interest for particular subjectinforming team members about newly published contentsCollaborative Team Administratora user initially builds a collaborative team and manages itapproving/rejecting requests, managing teamCollaborative Team Membera user works on a project relevant to or depends on other team members projectssearching, publishing contents, downloading contentsRequesta demand for joining a particular team-Contentmeta-info of any computerized data that can be a single file or a directory structure desired to be shared among users-Publishera user who owns contents and shares thempublishing contentsSubscribera user interested in other users’ contentsdownloading a contents Collaborative Team Member is a user who works on a project that is relevant to or depends on other team members projects. Therefore, a team member either publishes contents for the utilization of other team members or subscribes to contents published by the other team members in order to use them in his work. For example, in replication use case, both replica master and replica slaves are both team members; however, the former is a collaborative team administrator and a publisher, yet the latter is just a collaborative team member and a subscriber.A Collaborative Team Administrator is a user who initially builds a collaborative team and manages it. The management process involves approving or rejecting requests of group enrollment. A collaborative team administrator is a collaborative team member as well. A Request is a demand for being a member of a particular team. It is submitted by a user who desires to join a team related to his subject and approved or rejected by the administrator of that team.Content is a meta-info of any computerized data that can be a single file or a directory structure which is desired to be shared among users interested in it. It can be shared among all users without any restriction, the members of a particular collaborative team, or preselected users. To keep track of data and locations, with the file name, a file info hash created by a GTF client in order to distinguish files is mapped to the physical location where that file is stored. It needs to be clarified that the content object in the CCM is a mere meta-info and does not contain any actual data at all. A Publisher is a user who owns contents and shares his contents with others. A Subscriber is a user who is interested in the contents of other users’ and highly likely willing to download their contents.Services of the SystemServices are the actions that may change the status of objects of the CCM directly or indirectly. Services are initiated by either a user or another service. The major services, their brief descriptions, and the doers and subjects of those services are listed in REF _Ref197892272 \h Table 53. Table STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 3 STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 3 Summary of services used in the Collaboration and Content ManagerService NameSubjectObjectDescriptionRegistrationUserUserPermitting a user to enroll the CCMForming a teamCollaborative Team AdministratorCollaborative TeamPermitting a user to build a collaborative teamDisbanding a teamCollaborative Team AdministratorCollaborative TeamPermitting a user to remove a collaborative teamJoining a team requestUserCollaborative TeamEnabling a user to make a joining request for desired a teamLeaving a team requestCollaborative Team MemberCollaborative TeamEnabling a user to make a leaving request for desired a teamApproving a requestCollaborative Team AdministratorUserAllowing a team administrator to approve joining a team requestRejecting a requestCollaborative Team AdministratorUserAllowing a team administrator to refuse joining a team requestTeam managementCollaborative Team AdministratorCollaborative TeamAllowing a team administrator to assign access control rights to team members Publishing contentsUser / Collaborative Team MemberContent / Collaborative TeamEnabling a user to share his contentsDownloading contentsUser / Collaborative Team MemberContent / Collaborative TeamEnabling a user to download contentsSearching contentsUser / Collaborative Team MemberContent / Collaborative TeamEnabling a user to find contentsBrowsing contentsUser / Collaborative Team MemberContent / Collaborative TeamEnabling a user to find contentsRegistration service permits a user to enroll the CCM to access the features provided by the CCM. It is a service used only once at the outset. First and last name of the user, username, password, institution, and telephone number are the required information at the registration stage. It is the responsibility of the user to select his username and password. However, when he selects his username, he needs to complywith the rule that the selected username has to be unique in the CCM, since they are used for identifying users.Forming a team is a service used by a user, called as a collaborative team administrator, to build a collaborative team. The name of a team must be unique, similar to username. Disbanding a team service is the opposite of the forming a team service. It enables the team administrator to delete the team from the system. When a user desires to join or leave a particular team, he uses joining and leaving a team requests services. The administrator of the team, which the user wants to sing for or leave, either grants or refuses these requests by using approving or rejecting a request services. In addition to approving and rejecting a request services, the team administrator uses team management services to manage the team members and to assign access rights for them.Publishing contents service is utilized by any users who desire to share their content. Browsing and searching contents services are used to find a specific content. Finally, downloading contents services are employed to start actual data transferring process between the GTF clients.Collaboration Management ModuleCollaboration Management Module offers services that enable the end users to establish their collaborative environment by forming their teams and managing their teams and members of their teams. Collaboration Management module is composed of Collaborative Team Manager (CTM) and Collaborative Team Member Manger (CTMM) subcomponents as illustrated in REF _Ref197800463 \h Figure 52.The CTMM offers services (Refer Section 5.2.2) to the users to build or remove a collaborative team, and provides services to a collaborative team administrator to govern its members. The CTMM component allows the users to form their collaborative team member list without forming a group. An owner of contents can choose individual users by name either from a list of all known users or a self-maintained collaborative team member list. This unit is quite helpful for a small collaborative team which consists of very few people working on a small size project.After building a collaborative team, the process of a collaborative team membership is started either by the collaborative team owner or by the user who makes a request for a desired group. In both cases, team membership is activated after acceptance of both sides. During the joining a team process, the collaborative team administrator can assign a new member either an admin role or a user role. REF _Ref197996943 \h Figure 53 displays the possible roles and their hierarchy, and rights available for a new team member. After deciding the role of the new member, the permissions to perform publish or browse contents operation is assigned to user role.Following the team membership approval, the new member can publish or browse contents. If the right of publishing contents is granted, the member can publish his contents for the usage of whole team members. When a new content is published into the team, the system will generate a Download Request Task (DRT) (Refer Section 4.6.1.4) on behalf of a team member if that user authorizes auto-download option. Auto-download option is a particularly practical feature in the case of certain collaborative projects, in which automated data replication on different physical locations is required. Figure STYLEREF 1 \s 5 SEQ Figure \* ARABIC \s 1 3 STYLEREF 1 \s 5 SEQ Figure \* ARABIC \s 1 3 Possible roles and rights in the Collaboration and Content Management ModuleTeam members with browsing contents right can only download contents published to team. This feature is again very beneficial for read-only replication models such as the master-slave type. In this models slave replicas should always be identical to the master replica.Contrary to the process of a team membership application, the resignation of a team membership is a one-sided activity because it does not require endorsements of both sides. Either the group owner or the user can revoke it. Access Control Mechanism of CCMTo prevent unauthorized content access, we used the simplified and modified version of traditional role-based access control system. In our system, three roles are available for a user: ordinary user, collaborative team administrator, and collaborative team member. Collaborative administrator grants admin or user role for a new member with publish or browse access right as illustrated in REF _Ref197996943 \h Figure 53.Table STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 4 STYLEREF 1 \s 5 SEQ Table \* ARABIC \s 1 4 Access levels offered by the Collaboration and Content ManagerNameDescriptionPublic level accessContents with the public level access are visible to every user. They can be downloaded by any user without any restriction. All users have public access level rights.User level accessContents with the user level access are available for only users selected by the owner of contents. Content owners grant this right to user whoever they selected.Collaborative team level accessContents with the collaborative team level access are visible to every member of the team. Team members can download them without any restriction. Only Collaborative Team Administrators approve team level access to users.As listed in REF _Ref197997926 \h Table 54, three types of access level are supported; public level, collaborative team level, and user level access. While public access level permits users to make their contents available for all users, collaborative team access level permits users to share their contents with only members of that team. In user level access, content is offered to usages of users who are selected by the content publisher. The Publisher Manager takes the public level access as the default access level, unless the owner of the content sets something different.In order to avert unauthorized content access, user and the content must be on the same access level. One user can have more than one access level at the same time. Public level access is given to every user after a successful registration process. For example, any user can browse, search, and download any contents with the public level access. When a user is included in the collaborative team member list of another user, or joins a collaborative team, he is granted for user and collaborative team level access respectively.Content Management ModuleThe Content Manager module allows users to share their files with selected access control rights by providing services of publishing, downloading, browsing, and searching for contents. These services are explained in Section 5.2.2. As it is shown in REF _Ref197800463 \h Figure 52, the Content Manager module is comprised of Publisher and Subscriber Manager subcomponents.Publisher Manager Module empowers user to distribute their collaborative contents among other user. Every content must be published with an access level right; thus, the procedure of assigning an access level for every content file is an imperative operation.Subscriber Manager Module offers content access services; for instance, browsing contents and searching contents services. These services enable users to acquire to a particular content easily according to access level of contents. SummaryIn this chapter, we explained the architecture of the Collaboration and Content Manager component which provides a collaborative framework where users can create their collaborative team, share their contents, or download contents offered by other team members or other users by using the services provided by the CCM. Then, we provided very detailed description of its components: Collaboration Manager and Content Manager. We also discussed our access control system which restricts content access to authorized users. In the next chapter, we are going to describe the third major component of the GTF; WS-Tracker Service which assists in the communication taking place between the GTF clients. WS-Tracker ArchitectureIntroductionIn this chapter, we describe the architecture of the WS-Tracker Service and the motivations and goals behind it and argue its benefits. Moreover, we provide more details about low level and architectural design decisions, as well as a thorough description of key components and their implementation.As it was explained in previous chapters, the components of the GridTorrent Framework form a simple distrusted system. Each of its components is independent from each other, performs dissimilar purposes and being, hence they operate on a different physically located machines. However, there is still a need for a component that assists in the communication taking place between the GTF peers, and conveys the information that is generated by the users through the Collaboration and Content Manager to their GTF peers. In order to satisfy the need for a coordinator component in our system, we introduced WS-Tracker Service, a modified version of BitTorrent tracker with many added features. Notwithstanding some basic similarities, there are quite differences between them in regard to the functionalities of WS-Tracker Service. The tracker, in BitTorrent ADDIN EN.CITE <EndNote><Cite><Author>Cohen</Author><Year>2007</Year><RecNum>59</RecNum><record><rec-number>59</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url> on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Cohen</Author><Year>2007</Year><RecNum>59</RecNum><record><rec-number>59</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">59</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Cohen, B.</author></authors></contributors><titles><title>Bittorrent</title></titles><volume>2007</volume><number> </number><dates><year>2007</year></dates><label>Bittorrent</label><urls><related-urls><url> on-line 2008</Year><RecNum>164</RecNum><record><rec-number>164</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">164</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Dessent Brian</author></authors></contributors><titles><title>Brian&apos;s BitTorrent FAQ and Guide</title></titles><dates><year>Accessed on-line 2008</year></dates><urls><related-urls><url>;[86, 88], is a basic HTTP/HTTPS service that responds to HTTP GET requests. The main advantage of it is to use HTTP protocol, since HTTP is ubiquitous protocol. However, it is not suitable for an environment that is very dynamic and requires complex services (explained in next sections) to coordinate participating nodes, and communications taking place not just between the GridTorrent Framework peers, but even between the users and their GridTorrent Framework peers. In BitTorrent, the communication happening between peers and tracker is passive communication; in other words, the tracker only delivers a list of available seeds and peers of a requested file, and collects statistics of uploading and downloading processes from the peers. File downloading process is the only required responsibility of a general BitTorrent peer (Refer Chapter 4 for further details about comparison of GridTorrent Framework peer and BitTorrent peer) and each downloading task is independent from each other. After the initial communication, peer can continue its downloading process without the help of its tracker. However, in GridTorrent Framework, a tracker plays a maestro role between the Collaboration and Content Manager and the clients of the GridTorrent Framework, and among the clients of the GridTorrent Framework. Therefore, a GridTorrent peer needs a tracker not only to download a file but also to receive its future tasks assigned by its owner.Web Service We overcame the shortcoming of a BitTorrent’s tracker, which is a simple web application, with the help of Web Service technology that enables us to extend or add complex services for GTF tracker. The World Wide Web Consortium (W3C) defines a Web Service as following ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>201</RecNum><record><rec-number>201</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">201</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>W3C World Wide Web Consortium</title></titles><dates><year>2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>201</RecNum><record><rec-number>201</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">201</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>W3C World Wide Web Consortium</title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[128]:A Web service is a software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-processable format (specifically WSDL). Other systems interact with the Web service in a manner prescribed by its description using SOAP messages, typically conveyed using HTTP with an XML serialization in conjunction with other Web-related standards.In other words, it standardizes the interface, operations provided by Web-based applications, discovery of the operations, and the message format exchanged for delivering and receiving service. This standardization is being accomplished by using Extensible Markup Language (XML), defining Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL), and Universal Description, Discovery and Integration (UDDI), and using mainly Hypertext Transfer Protocol (HTTP), although supporting a variety of Internet protocols, such as Simple Mail Transfer Protocol (SMTP) and Multipurpose Internet Mail Extension (MIME). While XML is a general-purpose specification developed by the W3C and, in Web Service context, used to tag the data, SOAP is an XML-based messaging protocol and universally used to transfer data. WSDL is an XML-formatted language used to describe the services available and data types of exchanging messages. UDDI, sponsored by OASIS, is a Web-based distributed directory and used for Web Services registering themselves and discover each other ADDIN EN.CITE <EndNote><Cite><Author>Bellwood</Author><Year>2003</Year><RecNum>204</RecNum><record><rec-number>204</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">204</key></foreign-keys><ref-type name="Standard">58</ref-type><contributors><authors><author>Bellwood, T</author><author>Clement, L</author><author>von Riegen, C</author></authors></contributors><titles><title>UDDI Version 3.0. 1: UDDI Spec Technical Committee Specification</title></titles><dates><year>2003</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">203</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Francisco Curbera</author><author>Matthew Duftler</author><author>Rania Khalaf</author><author>William Nagy</author><author>Nirmal Mukhi</author><author>Sanjiva Weerawarana</author></authors></contributors><titles><title>Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI</title><secondary-title>IEEE Internet Computing</secondary-title></titles><periodical><full-title>IEEE Internet Computing</full-title></periodical><pages>86-93</pages><volume>6</volume><number>2</number><dates><year>2002</year></dates><isbn>1089-7801</isbn><urls></urls><electronic-resource-num>; ADDIN EN.CITE <EndNote><Cite><Author>Bellwood</Author><Year>2003</Year><RecNum>204</RecNum><record><rec-number>204</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">204</key></foreign-keys><ref-type name="Standard">58</ref-type><contributors><authors><author>Bellwood, T</author><author>Clement, L</author><author>von Riegen, C</author></authors></contributors><titles><title>UDDI Version 3.0. 1: UDDI Spec Technical Committee Specification</title></titles><dates><year>2003</year></dates><urls><related-urls><url> app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">203</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Francisco Curbera</author><author>Matthew Duftler</author><author>Rania Khalaf</author><author>William Nagy</author><author>Nirmal Mukhi</author><author>Sanjiva Weerawarana</author></authors></contributors><titles><title>Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI</title><secondary-title>IEEE Internet Computing</secondary-title></titles><periodical><full-title>IEEE Internet Computing</full-title></periodical><pages>86-93</pages><volume>6</volume><number>2</number><dates><year>2002</year></dates><isbn>1089-7801</isbn><urls></urls><electronic-resource-num>;[129, 130]. Because of the standardization, Web Services have many advantages but two of them are the most significant of them and deserve to be mentioned: being (1) loosely coupled and (2) platform independent. Loose coupling hides the implementation logic from the callers and puts an end to the overhead through making requirements and few assumptions about each end of the communication by sticking to provided service contract, i.e. programmatic interface, instead of the underlying implementation details. Because it is implementation of Service-oriented architecture (SOA) ADDIN EN.CITE <EndNote><Cite><Author>Erl</Author><Year>2004</Year><RecNum>183</RecNum><record><rec-number>183</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">183</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Erl, T</author></authors></contributors><titles><title>Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services</title></titles><dates><year>2004</year></dates><publisher>Prentice Hall PTR Upper Saddle River, NJ, USA</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Erl</Author><Year>2004</Year><RecNum>183</RecNum><record><rec-number>183</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">183</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Erl, T</author></authors></contributors><titles><title>Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services</title></titles><dates><year>2004</year></dates><publisher>Prentice Hall PTR Upper Saddle River, NJ, USA</publisher><urls></urls></record></Cite></EndNote>[131], it possible to build more complex services using collection of simple services. Using open standards that includes XML, SOAP, WDSL, UDDI, and HTTP and easier to implement allow any two Web-based applications communicate with each other without regard to their running hardware platforms and operating systems or programming languages. It is also major difference between Web Services and its competitors of object-model-specific protocols such as the industry standard Common Object Request Broker Architecture ADDIN EN.CITE <EndNote><Cite><Year>1995</Year><RecNum>209</RecNum><record><rec-number>209</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">209</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><secondary-authors><author>Ben-Natan, Ron</author></secondary-authors></contributors><titles><title>Corba: A Guide to Common Object Request Broker Architecture</title></titles><pages>353</pages><dates><year>1995</year></dates><publisher>McGraw-Hill, Inc.</publisher><isbn>0-07-005427-4</isbn><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Year>1995</Year><RecNum>209</RecNum><record><rec-number>209</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">209</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><secondary-authors><author>Ben-Natan, Ron</author></secondary-authors></contributors><titles><title>Corba: A Guide to Common Object Request Broker Architecture</title></titles><pages>353</pages><dates><year>1995</year></dates><publisher>McGraw-Hill, Inc.</publisher><isbn>0-07-005427-4</isbn><urls></urls></record></Cite></EndNote>[132] (CORBA) or Microsoft’s Distributed Component Object Model ADDIN EN.CITE <EndNote><Cite><Author>Redmond</Author><Year>1997</Year><RecNum>206</RecNum><record><rec-number>206</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">206</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Redmond, FE</author></authors></contributors><titles><title>Dcom: Microsoft Distributed Component Object Model with Cdrom</title></titles><dates><year>1997</year></dates><publisher>IDG Books Worldwide, Inc. Foster City, CA, USA</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Redmond</Author><Year>1997</Year><RecNum>206</RecNum><record><rec-number>206</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">206</key></foreign-keys><ref-type name="Book">6</ref-type><contributors><authors><author>Redmond, FE</author></authors></contributors><titles><title>Dcom: Microsoft Distributed Component Object Model with Cdrom</title></titles><dates><year>1997</year></dates><publisher>IDG Books Worldwide, Inc. Foster City, CA, USA</publisher><urls></urls></record></Cite></EndNote>[133] (DCOM) or Remote Method Invocation ADDIN EN.CITE <EndNote><Cite><Author>Sun Microsystems</Author><Year>1997</Year><RecNum>207</RecNum><record><rec-number>207</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">207</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Sun Microsystems,</author></authors></contributors><titles><title>Java Remote Method Invocation Specification</title><secondary-title>Sun Microsystems, Palo Alto, CA</secondary-title></titles><periodical><full-title>Sun Microsystems, Palo Alto, CA</full-title></periodical><pages>31</pages><volume>30</volume><dates><year>1997</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Sun Microsystems</Author><Year>1997</Year><RecNum>207</RecNum><record><rec-number>207</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">207</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Sun Microsystems,</author></authors></contributors><titles><title>Java Remote Method Invocation Specification</title><secondary-title>Sun Microsystems, Palo Alto, CA</secondary-title></titles><periodical><full-title>Sun Microsystems, Palo Alto, CA</full-title></periodical><pages>31</pages><volume>30</volume><dates><year>1997</year></dates><urls></urls></record></Cite></EndNote>[134] (RMI) or Internet Inter-Orb Protocol ADDIN EN.CITE <EndNote><Cite><Author>Kirtland</Author><Year>2001</Year><RecNum>208</RecNum><record><rec-number>208</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">208</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Kirtland, M</author></authors></contributors><titles><title>A Platform for Web Services</title><secondary-title>Microsoft Developer Network</secondary-title></titles><periodical><full-title>Microsoft Developer Network</full-title></periodical><dates><year>2001</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Kirtland</Author><Year>2001</Year><RecNum>208</RecNum><record><rec-number>208</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">208</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Kirtland, M</author></authors></contributors><titles><title>A Platform for Web Services</title><secondary-title>Microsoft Developer Network</secondary-title></titles><periodical><full-title>Microsoft Developer Network</full-title></periodical><dates><year>2001</year></dates><urls></urls></record></Cite></EndNote>[135], and gives Web Services a better chance of being widely implemented. For example, an application written in Java and running on Microsoft Windows OS can talk with one written in C++ and running on UNIX. Some of Web Services specifications have been developed or some of them are still under development to extend Web Services capabilities in order to meet the newly emerged requirements. These specifications have come from the W3C or OASIS or a coalition of vendors such as Sun Microsystems, IBM, Microsoft, BEA Systems, Oracle, and Tibco. Though there are many specifications associated with web services, we only provide a list of important ones ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>211</RecNum><record><rec-number>211</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">211</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>List of Web Service Specifications</title></titles><dates><year>2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>211</RecNum><record><rec-number>211</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">211</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>List of Web Service Specifications</title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[136] with short description here:WS-Security defines how to use XML encryption and Signature in SOAP message in order to provide end-to-end security. It is released by OASIS.WS-Reliability is specified by OASIS to address reliable messaging requirements that are critical to some Web Services applications. .WS-Reliable Messaging is, similar to WS-Reliability, addressing the reliability issues in Web Service Context and subsequent of WS-Reliability. It is produced by OASIS.WS-Addressing is developed by W3C and a specification of transport neutral mechanism to enable Web Services to communicate just using addressing information.WS-Resource Framework provides a set of operations to implement stateful Web Services. It is developed by OASIS with the major contribution of Globus Alliance and IBM.WS-Distributed Management is a standard for managing and monitoring the status of other services. It is approved as an OASIS standard.WS-Tracker ServiceWS-Tracker service is at the hub of the GridTorrent Framework’s communications taking place between the CCM and the peers of GTF, and between the peers. In order to provide services promised, it offers a set of operations implemented based on Web Service technology using Java and Axis 1.4.Figure STYLEREF 1 \s 6 SEQ Figure \* ARABIC \s 1 1 STYLEREF 1 \s 6 SEQ Figure \* ARABIC \s 1 1 The flow of information between a user and GTF Peer through Content and Collaboration Manager and WS-Tracker serviceAs it is illustrated in REF _Ref199238918 \h Figure 61, the user commences the flow of information between a user and his GTF Peer. The user inputs information regarding to shared or downloaded content through the CCM using operations offered by it. For example, a user makes one of his/her content available for public usage by using publishing contents’ service of the CCM. Then, the CCM saves this transaction into a database server accessible both the CCM and WS-Tracker Service. The CCM also retrieves information from the database server to display the status and statistical information of the user’s tasks. WS-Tracker Service obtains information from the database server to deliver task messages (Refer Section 4.6 for type of task messages and handling them) created by the users to corresponding peers. In order to increase performance of the task delivery, we use task cache. To maintain the task cache highly updated, in addition to peer request based database access, we provide a periodical database access taking places in a certain interval of time.When a GTF peer requests its task lists, WS-Tracker Service first checks the task cache to see whether any task is available for it. If there is no task in the task cache for requesting peer, then it sends a query to database about available tasks. According to the database server response, it updates its task cache and also returns a task list to the corresponding peers. After receiving task list, a GTF peer begins to process each task delivered in the list. Some of these tasks require additional interaction with either WS-Tracker Service or the other peers. When a task is successfully received or completed, an acknowledgement message is generated and sent back to WS-Tracker Service in order to notify to it.WS-Tracker Service provides a substrate where the clients exchange information about each other. The interaction between a GTF peer and another peer is initiated after receiving content downloading task message from WS-Tracker Service. If both peer is successfully authenticate themselves and have authorization to requested content, real data transferring process has been commenced. REF _Ref199251549 \h Figure 62 shows overview of this information flow between peers.Figure STYLEREF 1 \s 6 SEQ Figure \* ARABIC \s 1 2 STYLEREF 1 \s 6 SEQ Figure \* ARABIC \s 1 2 Message flow between GTF peers via WS-Tracker ServiceMultiple Trackers The WS-Trackers are passive components utilized to exchange task messages between users and their GTCs. In this sense, they are just mediums that do not store any important data not recorded in DB. In addition, all GTCs keep their internal state data in order to maintain their consistency. Moreover, the GTCs preserve their existing connections and they do not need to interact with WS-Trackers except for statistical information update which is not essential. Therefore, in summary, the only vital issue that WS-Trackers are responsible for is to provide a steady connection between users and their GridTorrent Clients. To achieve this goal, each GTC is provided with multiple addresses of WS-Trackers services. If the WS-Tracker service fails for any reason, GTCs connected with it receive timeout exception when they send their statistical information about their current upload and download status to it. In this case, a GTC select another WS-Tracker service from provided tracker service list and upload internal state to the new one if the current one fails.Fault Tolerance The failure of WS-Tracker can be categorized into single instance failure and multiple instances failure. By single instance failure, we meant that there is only one WS-Tracker Service functioning in the whole system and it fails. Unlike single instance failure, there are more than two instances serving to peers in the system and at least one of them successfully functions when the others fail. In the latter failure case, when theall trackers fail, it becomes similar to single instance failure case. In both cases, we presumed that the shared database is replicated in order to eliminate the issues that arise when it fails for any reason. In the same way, all the transactions that have taken place between the users and the CCM are recovered from the database server easily since they are recorded to database server immediately. The recovery process of multiple instances failure is relatively simple, since there is still at least one WS-Tracker Service serving to the GTF peers in the event of failure of all other trackers. An inconsistency between the running WS-Tracker Service runtime task list and active GTF peers runtime task list can be regarded as one major possible problem. However, this can be resolved straightforwardly since the state information on WS-Tracker Service runtime memory is regularly committed to database server. In addition to that, each peer sends an acknowledgement message back to WS-Tracker Service after a successful task receiving or completion process. A GTF peer provides its failure recovery mechanism by regularly saving its runtime task list into a file and using .torrent metafile to resolve any inconsistencies taking place when a downloading process is interrupted.When a new task list arrives and there is a discrepancy between the peer’s list and the received one, it just ignores the incoming one and sends its last acknowledgements to WS-Tracker Service. Thus, available WS-Tracker Service can detect failure effortlessly in a relative short amount of time and update its runtime task cache either with the help of this acknowledgement mechanism or with the help of periodic database access.For the case of single instance failure, although transactions of the users are stored into database server, the GTF peers cannot obtain their latest task list from the WS-Tracker Service since it is down. Our solution to this case is to start a new WS-Tracker Service and to provide its service address to the GTF peers with the help of their owners. The recovery process is similar to multiple instance failure case as the new tracker pulls data from the database server and creates its runtime task cache. If any inconsistencies emerge when the new tracker delivers task lists to the peers, they are resolved in a similar way explained in the recovery process of multiple instances failure case.Security Apart from requesting unique GridTorrent Framework ID of peers in order to deliver correct task list to inquiring peer, there is no other security mechanism is implemented in WS-Tracker Service. The main motivations behind our decision in favor of insecure tracker are:The performance issues the metadata characteristics of data delivered by WS-Tracker Service The performance issues arise as the direct result of encryption and decryption of a large of number of short messages in a short period of time. Apart from the UGTID of peers, IP addresses of peers and, and .torrent metadata file, data hosted atfrom WS-Tracker service contains no actual data of the content to be datashared. Hence,As a result of this, even if they are captured by an unauthorized user, they would be a piece of useless knowledge for him/her. However, due to its distributed system characteristic, it is still susceptible to several security threats such as but not limited to:Distributed Denial of service attacks (DDoS)Unauthorized users accessing resourceMan in the middle attack that impersonates an entityMalicious users modifying messages (such as when a messages passes over insecure intermediaries)There is no quick and easy way to secure against a DDoS. A simple and best solution is to secure computers from being hijacked ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>201</RecNum><record><rec-number>201</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">201</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>W3C World Wide Web Consortium</title></titles><dates><year>2008</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Year>2008</Year><RecNum>201</RecNum><record><rec-number>201</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">201</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>W3C World Wide Web Consortium</title></titles><dates><year>2008</year></dates><urls><related-urls><url>;[128].In order to receive their task lists from WS-Tracker Service, the peers must provide their UGTID generated randomly to WS-Tracker Service. Requiring their UGTIDs as an identity verification tool renders peers’ task lists acquisition very difficult for an unauthorized users. Even if he/she takes possession of the task list, that list is still worthless since it does not contain any actual data or security information. Furthermore, X.509 proxy certificates are used as proof of identity before starting actual data transfer process. Thus, asking proxy certificate at each peer eliminates any attacks result of false identity. Moreover, peers verify the hash code of every chunk of downloaded data with the one provided by its .torrent before writing it to file system. However, that torrent metafile can be used to validation process only if it is authentic file. In other words, it is obtained from the genuine WS-Tracker Service. Summary In this chapter, we explained the architecture of the WS-Tracker Service that is a Web Service and plays a maestro role between the Collaboration and Content Manager and the clients of the GridTorrent Framework, and among the peers of the GridTorrent Framework. Then, we provided our motivations and design decisions behind it. We also described the information flow between the users and their corresponding GTF peers, and between GTF peers. Fault tolerance and recovery, and security are the main issues we discussed for the rest of this chapter. In the next chapter, we are going to describe security issues in the GridTorrent Framework and how we addressed them.Security Modules and Issues of GridTorrent FrameworkIntroductionIt is important to realize the distinction between the characteristics of data shared in a standard BitTorrent peer-to-peer community and the characteristics of data shared in a scientific community. The first difference is the nature of shared data. The shared data among the standard BitTorrent peer-to-peer community is generally obtained –usually by infringing copyright- from other people’s works, like music or movie files. In contrast, in scientific community, every scientific data to be shared is generated conventionally by members of the scientific community who respect and acknowledge others’ work. Further, users usually do no attach importance to data integrity or authenticity in the former. For instance, it is not vital for a movie file that has different versions in size as long as it is playable, because people use it for entertainment and keep it private. On top of that, they do not build anything new on top it. On the other hand, every bit of information is important in the latter case. For example, the integrity and authenticity of the whole information obtained through a scientific experiment is of great importance since new theories, experiments, or technologies are established on it. In addition, despite the fact that the standard BitTorrent peer-to-peer community’s data can be shared either modified or unmodified without getting the permission of the content owner –in fact there is no rule about this, the scientific data is more sensitive and requires more complicated sharing rules. The second difference is the characteristics of users. In a standard BitTorrent peer-to-peer community, there is no competition between users. In other words, there is one type of user, a passive user, and any user can access any data as long as he or she gets the torrent file. However, in the scientific community, due to expertise or research agenda and competition between institutions, only authorized users are permitted to access to pre-determined data sets with some access rights. In contrast to the passive user type in BitTorrent, the users in scientific community area are usually very active and some of them cooperate on some files as a group. This creates diverse users’ and groups’ profiles in scientific community. Moreover, access to the resources of scientific community must be very strict because those resources such as computers and networks are dedicated for special purposes use, like performing scientific experiments to develop more efficient models for high-energy physics or analyzing terabytes even petabytes of data to simulate nuclear weapon tests. Therefore, it needs to be controlled at stringent level of security to ensure who is accessing to which resources with which rights for what purpose.The third difference stems from the importance of access methods to data in scientific community. As the current design of BitTorrent itself does not provide a search facility to find files by name or by other keywords; a user must find the initial torrent file by other means, such as a web search. On the other hand, searching, finding, and accessing to desired data are of paramount importance in scientific community, hence a reliable search service must be offered to scientific users. Therefore, in order to use peer-to-peer data sharing mechanism based on BitTorrent in scientific community, there is a need for integration of a content and collaboration framework with a search facility into BitTorrent. Thus, a security mechanism incorporating regulation for content access with pre-defined rights is vital for a data sharing system in scientific community. To build a security infrastructure for GridTorrent Framework in order to meet the security requirements of scientific community, we follow the most common scientific community standards –the Grid Security Infrastructure (GSI) ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>;[103] model, by adopting its principles. Besides, using a similar model with the GSI allows our data collaborative and sharing framework to be available to a larger scientific community, and our services to be compatible with others. In this section, first, we present an overview of the GSI. Then, we explain how we build the GridTorrent framework security infrastructure (GTFSI) by following the GSI model. We also elucidate our approach and give detailed descriptions of the services developed as part of this infrastructure. The Grid Security Infrastructure (GSI)History of the GSISecurity has been one of the widely studied fields in Grid community. Hence, the GSI has a rich history to meet new emerging requirements and cooperate with the arising technologies. While mainly message protection and authentication are supported in version 1 in 1998, X.509 proxy certificates and Community Authorization Service (CAS) ADDIN EN.CITE <EndNote><Cite><Author>Pearlman</Author><Year>2002</Year><RecNum>213</RecNum><record><rec-number>213</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">213</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>L. Pearlman</author><author>V. Welch</author><author>I. Foster</author><author>C. Kesselman</author><author>S. Tuecke</author></authors></contributors><titles><title>A Community Authorization Service for Group Collaboration</title><secondary-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</secondary-title></titles><periodical><full-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</full-title></periodical><dates><year>2002</year></dates><publisher>IEEE Computer Society</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Pearlman</Author><Year>2002</Year><RecNum>213</RecNum><record><rec-number>213</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">213</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>L. Pearlman</author><author>V. Welch</author><author>I. Foster</author><author>C. Kesselman</author><author>S. Tuecke</author></authors></contributors><titles><title>A Community Authorization Service for Group Collaboration</title><secondary-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</secondary-title></titles><periodical><full-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</full-title></periodical><dates><year>2002</year></dates><publisher>IEEE Computer Society</publisher><urls></urls></record></Cite></EndNote>[137] are introduced in version 2 in 2002. The CAS from Globus team functions as a trusted third party server which is responsible for enforcement of access policies within distributed virtual communities which govern access to a community’s resources The CAS serves maintain information about Certificate Authorities, users, servers and resources with access right lists granted to access resources to each users. When a user issues a request to the CAS server in user’s community, the CAS server provides a proxy credential with his or her capabilities to the user. Upon receiving the proxy credential, the user access the resources using his or her CAS credential.The Grid technology converged with the emerging Web service technology in release 3, and that convergence gave birth to Open Grid Services Architecture (OGSA) ADDIN EN.CITE <EndNote><Cite><Author>Foster</Author><Year>2002</Year><RecNum>69</RecNum><record><rec-number>69</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">69</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Foster, I.</author><author>Kesselman, C.</author><author>Nick, J.</author><author>Tuecke, S.</author></authors></contributors><titles><title>The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration, June 2002</title><secondary-title>Open Grid Service Infrastructure WG, Global Grid Forum</secondary-title></titles><periodical><full-title>Open Grid Service Infrastructure WG, Global Grid Forum</full-title></periodical><dates><year>2002</year></dates><label>Grid</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Foster</Author><Year>2002</Year><RecNum>69</RecNum><record><rec-number>69</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">69</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Foster, I.</author><author>Kesselman, C.</author><author>Nick, J.</author><author>Tuecke, S.</author></authors></contributors><titles><title>The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration, June 2002</title><secondary-title>Open Grid Service Infrastructure WG, Global Grid Forum</secondary-title></titles><periodical><full-title>Open Grid Service Infrastructure WG, Global Grid Forum</full-title></periodical><dates><year>2002</year></dates><label>Grid</label><urls></urls></record></Cite></EndNote>[3]. Finally, in the latest version –the 4 release, Web Services security specifications are implemented. Extensible Access Control Markup Language (XACML) and Security Assertion Markup Language (SAML) are the two important authorization related standards ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Naedele</Author><Year>2003</Year><RecNum>70</RecNum><record><rec-number>70</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">70</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Naedele, M.</author></authors></contributors><titles><title>Standards for XML and Web services security</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><pages>96-98</pages><volume>36</volume><number>4</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Naedele</Author><Year>2003</Year><RecNum>70</RecNum><record><rec-number>70</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">70</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Naedele, M.</author></authors></contributors><titles><title>Standards for XML and Web services security</title><secondary-title>Computer</secondary-title></titles><periodical><full-title>Computer</full-title></periodical><pages>96-98</pages><volume>36</volume><number>4</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote>[138] supported by current version of GSI ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Lang</Author><Year>2006</Year><RecNum>67</RecNum><record><rec-number>67</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">67</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Lang, B.</author><author>Foster, I.</author><author>Siebenlist, F.</author><author>Ananthakrishnan, R.</author><author>Freeman, T.</author></authors></contributors><titles><title>A Multipolicy Authorization Framework for Grid Security</title><secondary-title>Proc. Fifth IEEE Symposium on Network Computing and Application</secondary-title></titles><periodical><full-title>Proc. Fifth IEEE Symposium on Network Computing and Application</full-title></periodical><dates><year>2006</year></dates><label>Security</label><urls></urls></record></Cite><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Lang</Author><Year>2006</Year><RecNum>67</RecNum><record><rec-number>67</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">67</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Lang, B.</author><author>Foster, I.</author><author>Siebenlist, F.</author><author>Ananthakrishnan, R.</author><author>Freeman, T.</author></authors></contributors><titles><title>A Multipolicy Authorization Framework for Grid Security</title><secondary-title>Proc. Fifth IEEE Symposium on Network Computing and Application</secondary-title></titles><periodical><full-title>Proc. Fifth IEEE Symposium on Network Computing and Application</full-title></periodical><dates><year>2006</year></dates><label>Security</label><urls></urls></record></Cite><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>;[103, 139]. Of course, there are several as well authorization systems supported by Grid Computing, such as Kerberos ADDIN EN.CITE <EndNote><Cite><Author>Neuman</Author><Year>1994</Year><RecNum>216</RecNum><record><rec-number>216</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">216</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Neuman, B. C.</author><author>Ts&apos;o, T.</author></authors></contributors><titles><title>Kerberos: An Authentication Service for Computer Networks</title><secondary-title>Communications Magazine, IEEE</secondary-title></titles><periodical><full-title>Communications Magazine, IEEE</full-title></periodical><pages>33-38</pages><volume>32</volume><number>9</number><keywords><keyword>computer networks</keyword><keyword>cryptography</keyword><keyword>message authentication</keyword><keyword>Kerberos</keyword><keyword>Mosaic</keyword><keyword>authentication service</keyword><keyword>authentication technology</keyword><keyword>information retrieval</keyword><keyword>interactive services</keyword></keywords><dates><year>1994</year></dates><isbn>0163-6804</isbn><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Neuman</Author><Year>1994</Year><RecNum>216</RecNum><record><rec-number>216</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">216</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Neuman, B. C.</author><author>Ts&apos;o, T.</author></authors></contributors><titles><title>Kerberos: An Authentication Service for Computer Networks</title><secondary-title>Communications Magazine, IEEE</secondary-title></titles><periodical><full-title>Communications Magazine, IEEE</full-title></periodical><pages>33-38</pages><volume>32</volume><number>9</number><keywords><keyword>computer networks</keyword><keyword>cryptography</keyword><keyword>message authentication</keyword><keyword>Kerberos</keyword><keyword>Mosaic</keyword><keyword>authentication service</keyword><keyword>authentication technology</keyword><keyword>information retrieval</keyword><keyword>interactive services</keyword></keywords><dates><year>1994</year></dates><isbn>0163-6804</isbn><urls></urls></record></Cite></EndNote>[140], Akenti ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Thompson</Author><Year>2003</Year><RecNum>71</RecNum><record><rec-number>71</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">71</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Thompson, M. R.</author><author>Essiari, A.</author><author>Mudumbai, S.</author></authors></contributors><titles><title>Certificate-based authorization policy in a PKI environment</title><secondary-title>ACM Transactions on Information and System Security (TISSEC)</secondary-title></titles><periodical><full-title>ACM Transactions on Information and System Security (TISSEC)</full-title></periodical><pages>566-588</pages><volume>6</volume><number>4</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Thompson</Author><Year>2003</Year><RecNum>71</RecNum><record><rec-number>71</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">71</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Thompson, M. R.</author><author>Essiari, A.</author><author>Mudumbai, S.</author></authors></contributors><titles><title>Certificate-based authorization policy in a PKI environment</title><secondary-title>ACM Transactions on Information and System Security (TISSEC)</secondary-title></titles><periodical><full-title>ACM Transactions on Information and System Security (TISSEC)</full-title></periodical><pages>566-588</pages><volume>6</volume><number>4</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote>[141], PERMIS ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Chadwick</Author><Year>2003</Year><RecNum>72</RecNum><record><rec-number>72</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">72</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Chadwick, D. W.</author><author>Otenko, A.</author></authors></contributors><titles><title>The PERMIS X. 509 role based privilege management infrastructure</title><secondary-title>Future Generation Computer Systems</secondary-title></titles><periodical><full-title>Future Generation Computer Systems</full-title></periodical><pages>277-289</pages><volume>19</volume><number>2</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Chadwick</Author><Year>2003</Year><RecNum>72</RecNum><record><rec-number>72</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">72</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Chadwick, D. W.</author><author>Otenko, A.</author></authors></contributors><titles><title>The PERMIS X. 509 role based privilege management infrastructure</title><secondary-title>Future Generation Computer Systems</secondary-title></titles><periodical><full-title>Future Generation Computer Systems</full-title></periodical><pages>277-289</pages><volume>19</volume><number>2</number><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote>[124], Shibboleth ADDIN EN.CITE <EndNote><Cite><RecNum>214</RecNum><record><rec-number>214</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">214</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Shibboleth</title></titles><dates></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><RecNum>214</RecNum><record><rec-number>214</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">214</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors></contributors><titles><title>Shibboleth</title></titles><dates></dates><urls><related-urls><url>;[142] (GridShib ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>73</RecNum><record><rec-number>73</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">73</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Welch, V.</author><author>Barton, T.</author><author>Keahey, K.</author><author>Siebenlist, F.</author></authors></contributors><titles><title>Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration</title><secondary-title>4th Annual PKI R&amp;D Workshop</secondary-title></titles><periodical><full-title>4th Annual PKI R&amp;D Workshop</full-title></periodical><dates><year>2005</year></dates><label>Security</label><urls></urls></record></Cite><Cite><Author>Barton</Author><Year>2006</Year><RecNum>215</RecNum><record><rec-number>215</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">215</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Barton, T</author><author>Basney, J</author><author>Freeman, T</author><author>Scavo, T</author><author>Siebenlist, F</author><author>Welch, V</author><author>Ananthakrishnan, R</author><author>Baker, B</author><author>Goode, M</author><author>Keahey, K</author></authors></contributors><titles><title>Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, Gridshib, and MyProxy</title><secondary-title>Proceedings of 5th Annual PKI R&amp;D Workshop</secondary-title></titles><dates><year>2006</year></dates><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>73</RecNum><record><rec-number>73</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">73</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Welch, V.</author><author>Barton, T.</author><author>Keahey, K.</author><author>Siebenlist, F.</author></authors></contributors><titles><title>Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration</title><secondary-title>4th Annual PKI R&amp;D Workshop</secondary-title></titles><periodical><full-title>4th Annual PKI R&amp;D Workshop</full-title></periodical><dates><year>2005</year></dates><label>Security</label><urls></urls></record></Cite><Cite><Author>Barton</Author><Year>2006</Year><RecNum>215</RecNum><record><rec-number>215</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">215</key></foreign-keys><ref-type name="Conference Proceedings">10</ref-type><contributors><authors><author>Barton, T</author><author>Basney, J</author><author>Freeman, T</author><author>Scavo, T</author><author>Siebenlist, F</author><author>Welch, V</author><author>Ananthakrishnan, R</author><author>Baker, B</author><author>Goode, M</author><author>Keahey, K</author></authors></contributors><titles><title>Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, Gridshib, and MyProxy</title><secondary-title>Proceedings of 5th Annual PKI R&amp;D Workshop</secondary-title></titles><dates><year>2006</year></dates><urls></urls></record></Cite></EndNote>[143, 144]), VOMS ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Alfieri</Author><Year>2003</Year><RecNum>74</RecNum><record><rec-number>74</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">74</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Alfieri, R.</author><author>Cecchini, R.</author><author>Ciaschini, V.</author><author>Dell’Agnello, L.</author><author>Frohner, A.</author><author>Gianoli, A. </author><author>Lorentey, K.</author><author>Spataro,F.</author></authors></contributors><titles><title>VOMS, an Authorization System for Virtual Organizations</title><secondary-title>European Across Grids Conference</secondary-title></titles><periodical><full-title>European Across Grids Conference</full-title></periodical><pages>33–40</pages><volume>2970</volume><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Alfieri</Author><Year>2003</Year><RecNum>74</RecNum><record><rec-number>74</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">74</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Alfieri, R.</author><author>Cecchini, R.</author><author>Ciaschini, V.</author><author>Dell’Agnello, L.</author><author>Frohner, A.</author><author>Gianoli, A. </author><author>Lorentey, K.</author><author>Spataro,F.</author></authors></contributors><titles><title>VOMS, an Authorization System for Virtual Organizations</title><secondary-title>European Across Grids Conference</secondary-title></titles><periodical><full-title>European Across Grids Conference</full-title></periodical><pages>33–40</pages><volume>2970</volume><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote>[145]. The Shibboleth System developed by Internet2 outlines a proposed architecture to address web single sign-on across or within organization boundaries. The Shibboleth software implements SAML a product of the OASIS Security Services Technical Committee. GridShib is the project that integrates the Shibboleth SAML-based framework and Globus Toolkit’s PKI-based security infrastructure to provide attribute-based authorization for distributed scientific communities. With the aid of GridShib, a Globus Toolkit Service Provider can securely request user attributes from a Shibboleth Identity Provider. To enable Grid Computing to support both Web Service security standards and other authorization systems, Multipolicy Authorization framework has been introduced recently ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Lang</Author><Year>2006</Year><RecNum>67</RecNum><record><rec-number>67</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">67</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Lang, B.</author><author>Foster, I.</author><author>Siebenlist, F.</author><author>Ananthakrishnan, R.</author><author>Freeman, T.</author></authors></contributors><titles><title>A Multipolicy Authorization Framework for Grid Security</title><secondary-title>Proc. Fifth IEEE Symposium on Network Computing and Application</secondary-title></titles><periodical><full-title>Proc. Fifth IEEE Symposium on Network Computing and Application</full-title></periodical><dates><year>2006</year></dates><label>Security</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Lang</Author><Year>2006</Year><RecNum>67</RecNum><record><rec-number>67</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">67</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Lang, B.</author><author>Foster, I.</author><author>Siebenlist, F.</author><author>Ananthakrishnan, R.</author><author>Freeman, T.</author></authors></contributors><titles><title>A Multipolicy Authorization Framework for Grid Security</title><secondary-title>Proc. Fifth IEEE Symposium on Network Computing and Application</secondary-title></titles><periodical><full-title>Proc. Fifth IEEE Symposium on Network Computing and Application</full-title></periodical><dates><year>2006</year></dates><label>Security</label><urls></urls></record></Cite></EndNote>[139].Overview of the Grid Security InfrastructureAs Grid computing is concerned with the use of dynamic, diverse resources in distributed “virtual organizations” ADDIN EN.CITE <EndNote><Cite><Author>Alfieri</Author><Year>2003</Year><RecNum>74</RecNum><record><rec-number>74</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">74</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Alfieri, R.</author><author>Cecchini, R.</author><author>Ciaschini, V.</author><author>Dell’Agnello, L.</author><author>Frohner, A.</author><author>Gianoli, A. </author><author>Lorentey, K.</author><author>Spataro,F.</author></authors></contributors><titles><title>VOMS, an Authorization System for Virtual Organizations</title><secondary-title>European Across Grids Conference</secondary-title></titles><periodical><full-title>European Across Grids Conference</full-title></periodical><pages>33–40</pages><volume>2970</volume><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Alfieri</Author><Year>2003</Year><RecNum>74</RecNum><record><rec-number>74</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">74</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Alfieri, R.</author><author>Cecchini, R.</author><author>Ciaschini, V.</author><author>Dell’Agnello, L.</author><author>Frohner, A.</author><author>Gianoli, A. </author><author>Lorentey, K.</author><author>Spataro,F.</author></authors></contributors><titles><title>VOMS, an Authorization System for Virtual Organizations</title><secondary-title>European Across Grids Conference</secondary-title></titles><periodical><full-title>European Across Grids Conference</full-title></periodical><pages>33–40</pages><volume>2970</volume><dates><year>2003</year></dates><label>Security</label><urls></urls></record></Cite></EndNote>[145], identifying the users or services (authentication), providing secure communications, and who is permitted to perform what actions (authorization) are the primary issues and challenges in the GSI according to ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>60</RecNum><record><rec-number>60</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">60</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>The Globus Project</title></titles><number> </number><dates></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>60</RecNum><record><rec-number>60</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">60</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>The Globus Project</title></titles><number> </number><dates></dates><urls><related-urls><url>;[146]. The GSI development team summarized the above concerns as three prime motivations behind the GSI:The necessity of secure communication between the elements of Grid community.The necessity of supporting security across organizational boundaries to eliminate a centrally-managed security system.The necessity of supporting “single sign-on” for the Grid’s users.To realize the above requirements, Public Key cryptography and the certificate, namely standard X.509, are used as central concept in GSI authentication credentials ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Pearlman</Author><Year>2002</Year><RecNum>213</RecNum><record><rec-number>213</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">213</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>L. Pearlman</author><author>V. Welch</author><author>I. Foster</author><author>C. Kesselman</author><author>S. Tuecke</author></authors></contributors><titles><title>A Community Authorization Service for Group Collaboration</title><secondary-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</secondary-title></titles><periodical><full-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</full-title></periodical><dates><year>2002</year></dates><publisher>IEEE Computer Society</publisher><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite ExcludeYear="1"><Author>Pearlman</Author><Year>2002</Year><RecNum>213</RecNum><record><rec-number>213</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">213</key></foreign-keys><ref-type name="Conference Paper">47</ref-type><contributors><authors><author>L. Pearlman</author><author>V. Welch</author><author>I. Foster</author><author>C. Kesselman</author><author>S. Tuecke</author></authors></contributors><titles><title>A Community Authorization Service for Group Collaboration</title><secondary-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</secondary-title></titles><periodical><full-title>Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY&apos;02)</full-title></periodical><dates><year>2002</year></dates><publisher>IEEE Computer Society</publisher><urls></urls></record></Cite></EndNote>[137]. There are two type of certificates: (1) end entity certificates (EEC); (2) proxy certificates. Whereas the former is used to identify persistent entities such as users and servers, the latter is used to support the temporary delegation of privileges to other entities ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>60</RecNum><record><rec-number>60</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">60</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>The Globus Project</title></titles><number> </number><dates></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>60</RecNum><record><rec-number>60</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">60</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>The Globus Project</title></titles><number> </number><dates></dates><urls><related-urls><url>;[146]. Briefly, a GSI user or server has to obtain a public-private key pair and an X.509 certificate from a trusted entity called a Certificate Authority (CA). As a result, every service, server and user on the Grid is recognized by way of a certificate.Inasmuch as the GSI merged with Web Services security standards in the 4 release above-mentioned in section 7.1.1.1 and has legacy systems, it supports both WS and pre-WS authentication and authorization capabilities ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>60</RecNum><record><rec-number>60</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">60</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>The Globus Project</title></titles><number> </number><dates></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Globus Alliance</Author><RecNum>60</RecNum><record><rec-number>60</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">60</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Globus Alliance,</author></authors></contributors><titles><title>The Globus Project</title></titles><number> </number><dates></dates><urls><related-urls><url>;[146]. GT4 WS SecurityGSI offers two levels of security: (1) message- level security; (2) transport-level security. In addition to that, as depicted in REF _Ref202595000 \h Figure 71, GSI supports two message-level protection protocols to realize the different purposes: (a) WS-Security-compliant message-level security with X.509 credentials; (b) with usernames/passwords.Figure STYLEREF 1 \s 7 SEQ Figure \* ARABIC \s 1 1 GT4 security protocols from ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>;[103]Message-level security provides both protocols with the purpose of complying with the WS-Security, the WS-SecureConversation specification, and the WS-Interoperability Basic Security Profile. However, there are differences between these protocols. Whereas GSI SecureConverversation delivers the full security constraints, GSI Secure Message supports WS-I Base Security Profile, yet it is insecure. Even though, the latter has relatively better performance than the former does, there is a poor performance issue when their performances are compared to that of transport-level schema. Partly an implementation issue and partly a specification issues are the leading causes of this poor performance of message-level security ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>;[103]. As a result, GT4 uses transport-level security by default due to its best performance.The last schema, transport-level security, has one security schema providing authentication via TLS with support for X.509 proxy certificates ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>;[103]. The differences between these there protocols are highlighted in REF _Ref192201417 \h Table 71.Table STYLEREF 1 \s 7 SEQ Table \* ARABIC \s 1 1 Comparison of transport-level and message-level security from ADDIN EN.CITE <EndNote><Cite><Author>Sotomayor</Author><Year>2005</Year><RecNum>217</RecNum><record><rec-number>217</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">217</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Sotomayor, B</author></authors></contributors><titles><title>The Globus Toolkit 4 Programmer&apos;s Tutorial</title></titles><dates><year>2005</year></dates><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Sotomayor</Author><Year>2005</Year><RecNum>217</RecNum><record><rec-number>217</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">217</key></foreign-keys><ref-type name="Web Page">12</ref-type><contributors><authors><author>Sotomayor, B</author></authors></contributors><titles><title>The Globus Toolkit 4 Programmer&apos;s Tutorial</title></titles><dates><year>2005</year></dates><urls><related-urls><url>;[102]GSI Secure ConversationGSI Secure MessageGSI TransportTechnologyWS-SecureConversationWS-SecurityTLSPrivacy (Encrypted)YESYESYESIntegrity (Signed)YESYESYESAnonymous authenticationYESNOYESDelegationYESNONOPerformanceGOOD (if sending many messages)GOOD (if sending few messages)BESTGT4 Pre-WS SecurityThe pre-Web Service components use the same authentication mechanisms as the Web Services components described here, but implement application-specific protocols and message protection schemes that are beyond the scope of this document ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>; ADDIN EN.CITE <EndNote><Cite><Author>Welch</Author><Year>2005</Year><RecNum>78</RecNum><record><rec-number>78</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">78</key></foreign-keys><ref-type name="Report">27</ref-type><contributors><authors><author>Welch, V. </author></authors></contributors><titles><title>Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective</title></titles><dates><year>2005</year></dates><label>Security, GT4</label><urls><related-urls><url>;[103]. The GridTorrent Framework Security InfrastructureTaking into account the fact that GTF delivers data generated in scientific communities to scientists dispersed around the world, security issues are of great importance in GTF. We need to address several security issues, some of which are pertinent to content, and some of which are pertinent to peers. Firstly, authenticity of shared contents and verification of their authenticity need to be resolved because the genuineness of data is unessential in typical peer-to-peer file sharing systems. Secondly, protection of the content has to be guaranteed when it is transferred from a sender to a receiver. Thirdly, identification of the participated peers has to be resolved. Finally, authorization of the participated GTF peers for a specific shared content must be verified in order to avert accesses of unauthorized peers as almost all content in peer-to-peer file sharing networks violates copyright; thus, users always prefer to remain anonymous when they access to any content in the peer-to-peer network.We addressed these security issues in three places of GTF: (1) at Collaboration and Content Manager (CCM), (2) between WS-Tracker and the GTF Peer, and (3) among GTF Peers. All possible interactions requiring security measures are displayed in REF _Ref220608834 \h Figure 72. To fully clarify what type of the security services are needed at which interactions, all interactions that are required to fulfill a Figure STYLEREF 1 \s 7 SEQ Figure \* ARABIC \s 1 2 All possible interaction among components of GTF require security plete cycle of a content publishing and downloading are labeled with numbers from one to nine. We follow the execution time sequence of processes when we numbered them and used apostrophe to show the concurrent interactions. For example, a process labeled with number “3” is taken place before all processes labeled with numbers that are greater than number “3” and after all processes labeled with numbers that are smaller than number “3”. The processes tagged as 3 and 3’ indicate that they are independent of each other and may occur concurrently. We explain them in the next sections.As both a human user and a computer are considered as active system users, it is impossible to fulfill full-scale security requirements of GTF by ignoring human factor. Security risks originated by human fall into two categories: internal and external human elements. Our work for GTF security framework is intended to prevent malicious security attacks mainly caused by external human users. GTF has preventative security measures to eliminate some security treats engendered by internal human users from. However, GTF is sometimes unable to deal with some security issues pertinent to internal users. For instance, a legitimate user can insert malicious code into the content to be shared. Thus, for that kind of cases, we assume that every legitimate user interacts with each other or GTF by complying with the rules of academic and social etiquette because GTF is design mainly for scientific communities with the collaboration features. In addition, there should be other mechanisms that can be utilized to enforce users’ compliance with those rules. If we use the same example of a user who can insert malicious code into the content to be shared, it is, thus, other users’ responsibility to scan the downloaded content if it is suspicious or to verify the identity of a particular user when it is necessary because GTF does not provide any security mechanism for virus or malware code scanning or identity verification. Although these issues are related to security, they are outside the scope of this dissertation.There is always possibility of content authenticity problems due to human involvement since a content sharing process is initiated by a human user,. The possible emerging problems might be spurious content announcement or false meta-file generation at stage one and two. Stage one is in which content generation performed by a human user is taken place. In stage two, the GTF Client software generates a meta-file (.torrent file) of the content generated in stage one. When content is published by a user, it is presupposed that either it is consistent with its announcement, or other users have some mechanisms to verify its authenticity. Although the GTF Client software is responsible for generating meta-file (.torrent file) of a shared content at stage two, its correctness still depends on the correctness of content. In addition, it is possible to create false meta-file by the system owner, since the owner has complete access to whole system to do that. As a result, the rules of etiquette were used to ensure security at stage one and two.Security at Collaboration and Content Manager (CCM)After a successful registration process, users may publish or download contents at step 3 and 3’ by interacting with CCM. Possible security threats at these steps may be registering with fake identity, hacking registered users' identities (e.g. usernames and passwords), and unauthorized access of information (Refer Section REF _Ref220608668 \r \h 5.5). Similar to in stage one and two, the rules of academic and social etiquette were used in step 3 and 3’ to address those security threats. Or to put it another way, identity information declared by users are assumed truthful information since users are being members of respected institutions. Moreover, there should be some other communication mechanisms, such as email and telephone number, to verify users’ proclaimed information about their identities in order to eliminate possible false identity cases. Figure STYLEREF 1 \s 7 SEQ Figure \* ARABIC \s 1 3 Establishing security credentials at Collaboration and Content Manager M employs secure login mechanism to authenticate identity of people who try to log into CCM. Moreover, secure communication ensures reasonable protection from eavesdroppers and man-in-the-middle-attacks. Besides secure communication, CCM supports the access control mechanism (Section REF _Ref202232849 \r \h 5.5.4) in order to prevent unauthorized accesses to any user’s information.In CCM, similar to many computer operating systems, a user authenticates himself by entering a user login id and a secret password known solely him and the system. A unique ID, in addition to them, is essential for each of GTF peers. A unique ID is required to bind the user and their GTF peer machines and to identify each GTF peer during the data sharing and communication processes. Hence, we provide a mechanism in GTF to generate a unique Grid Torrent ID (UGTID). Following UGTID generation, a GTF peer stores it into an ID file for future utilization. By retrieving it from the ID file, the owner that GTF peer registers this UGTID for CCM as a CCM user with the afore-required information as in presented in REF _Ref192423639 \h Figure 73.We keep the security credentials of the user in a database and they are never exposed to public or system administrators in any way. The users are responsible to remember their passwords. On the other hand, CCM administrators may assign new passwords, or login ids, to users. After that, user himself can change the password but not the login id. Login id is the unique set of the characters identifying user in the system. This approach is very compatible with UNIX user authentication.Another requirement is providing secure communication medium between the user and CCM. Instead of implementing an encrypted data transfer protocol as our own, we used a completely proven Transport Layer Security (TLS) technology to meet that requirement.The events interacted between users and CCM are recorded into a database server. This recording process takes place between CCM and database server over JDBC connections at step 4. It is protected with username and password level access authorization.Security at WS-Tracker ServiceWS-Tracker service functions as a hub for the GridTorrent Framework’s communications occurring between the CCM and the peers of GTF, and between the peers. As a consequence, for communications taking place at stages 5, 6 and 6’ in the figure, there are several security issues that must be dealt effectively with. These issues can be can be classified as authentication, authorization and secure data movement –if needed- between the entities issues. A username/password level access authorization is used between WS-Tracker Service and database server at stage 5. This type of access is secure enough at our prototype mode. However, adding secure communication layer is an unchallenging task since many newer versions of database servers supports encrypted (secure) connections between database clients and their servers using SSL protocol. The communications at stage 6 and 6’ take place between GTF peers and WS-Tracker service. Authentication and authorization are the main security concerns in those stages. Having many solutions to provide security framework for Web services, we leave selection of security mechanism to users responsible for installation and maintenance of WS-Tracker to enable them to choose proper Web services security implementation. However, in order to identify an inquiring peer (authentication) and to deliver correct task list (authorization) to it, a basic approach that is requesting/delivering unique GridTorrent Framework ID of a peer is the only security mechanism that is deployed at steps 6 and 6’. Apart from requesting/delivering unique GridTorrent Framework ID of a peer, there is no other security mechanism against eavesdroppers or man-in-the-middle-attack between GTF peers and WS-Tracker due to the characteristics of the meta-data (the infohash of the .torrent file) delivered by WS-Tracker service (Refer REF _Ref202589731 \r \h 6.3.3).Security between GTF Clients A GTF peer interacts with other GTF peers and WS-Tracker. Similar to security issues at WS-Tracker Service, identifying GTF peers (authentication), deciding who is permitted to download/upload which content with which rights (authorization), and providing secure communications between the entities are the primary issues and challenges that we must face.To address those security challenges, we followed a security infrastructure model similar to GSI to build authentication, authorization, and secure data transmission services in a GTF peer. This security infrastructure is built on one-way hash function, security credentials, symmetric and asymmetric keys (i.e., certificates, public-private keys, and secure keys). When an owner of a GTF peer wishes to share their content, their GTF peer generates a checksum for each piece, using one-way hash function. All of these hash code for each piece are used by downloading peers to verify the integrity of the data they receive. To support authentication, integrity protection, and confidentiality controls, the security model of a GTF peer is implemented by using the Java Authentication and Authorization Service (JAAS) and the Java Secure Socket Extension (JSSE). We explained how the security issues between a GTF peer and the WS-Tracker service were handled in the previous section. To deal adequately with the security matters between GTF peers, a user needs to obtain both public-private key pair, and X.509 certificate. Nowadays because of availability of myriad software tools to generate public-private key pair, it is a simple process. As a result of this, it is user’s responsibility to generate their public-private key and initiate the X.509 certification request process. Upon user’s X.509 certification acquisition, it satisfies all the preconditions, as shown in REF _Ref231412862 \h Figure 74, for secure communications taking place among the GTC Clients and WS-Tracker. Figure STYLEREF 1 \s 7 SEQ Figure \* ARABIC \s 1 4 Security credentials and security mechanism between GTF PeersAlthough secure data transmission is optional, GTF peer utilizes symmetric block ciphers to encrypt every single block of data to send data over a secure channel. A common cipher key -secret key- is needed at both ends for encrypting and decrypting processes. Hence, a secret key, unique for each content, is generated by the original owner of content when the .torrent meta-file of the content is constructed. This secret key is distributed securely to other GTF peers interested in the same content via the TLS encrypted communication at which authentication and authorization activities take place. If secure data transmission is requested, GTF peers use the same key for the same content to encrypt and decrypt exchanged data. Note that protection of those credentials is user’s responsibility as well.As it is illustrated in REF _Ref220608834 \h Figure 72, following the step 6 or 6’, the downloading GTF peer B in organization B asks for and receives the metadata file (.torrent file) of the content since its owner scheduled that task at step 3 or 3’. Subsequently, it starts establishing connections with other GTF peers whose IP address and port number information is acquired from the .torrent file that is obtained from WS-Tracker. At Figure STYLEREF 1 \s 7 SEQ Figure \* ARABIC \s 1 5 Authentication, authorization and exchanging secret key processes between two GTF Peersstep 7, GTF Peer B initiates authentication and authorization procedures because each peer has to be authenticated and authorized before starting the content download process. Both GTF peers use their credentials to authenticate themselves to other party. Upon receiving the authentication request of GTF Peer B, GTF Peer A verifies the access rights of GTF Peer B by using the Access Control List Registration Table (ACLRETAB). GTF Peer A terminates the GTF Peer B’s connection promptly if either one of the authentication or authorization process fails. The internal mechanism of authentication, authorization, and exchange of secret key between two GTF peers is illustrated in REF _Ref231413000 \h Figure 75.Table STYLEREF 1 \s 7 SEQ Table \* ARABIC \s 1 2 Summary of security issues between GTF componentsSecurity IssuesUser The CCMThe GT Client The GT ClientAuthenticationUser uses username and password are to access the CCM.Credentials (certificates, public-private keys)AuthorizationContent owner decides who is authorized to whatIt enforces the authorization settings provided by owner through the CCM and the WS-Tracker serviceMessage IntegritySSL/TSL used during the communicationContent data transferred with/without encryption. Secret key is employed for secure data transfer. After a successful authentication and authorization operation, GTF Peer A allows GTF Peer B to start the process of actual data movement, occurring at step 9, by passing data port number, secret key, and pass-phrase. Secret key is used for data encryption and decryption if one of the peers requires the transmission of data over a secure channel. Pass-phrase is used to revalidate the identity of GTF Peer A on data port. Upon arrival of secret key and pass-phrase, GTF Peer B passes this information to its Data Sharing Module to commence the actual data transfer process. Then, the Data Sharing Module of GTF Peer B connects to the Data Sharing Module of GTF Peer A and starts downloading actual data. Finally, all downloaded data segments are coalesced at step 9’ after downloading all pieces successfully (Refer Section REF _Ref202594843 \r \h 4.5). We also summarized the major security concepts used in the GTF in REF _Ref212397031 \h Table 72. Dealing with Various Attack Scenarios In this section we explain the various attack scenarios that we try to cope with. As considering cryptographic attacks out of our research, we do not address it.Man-in-the-middle AttacksIn Man-in-the-middle (MITM) attacks, an attacker intercepts and replaces public keys of two communication parties with its own public key, which enables the attacker to decrypt communications using his or her private key. The initial key exchanges between the GridTorrent Clients (GTCs) are vulnerable to this kind of attack. We address this by requiring that all initial communications with between the GTCs be over SSL, which eliminates MITM attacks. MITM attacks are not a problem for content sharing, since their credentials have already been exchanged over SSL and content data can be encrypted and signed if it is necessary.Replay AttacksReplay attacks involve the attacker storing network packets and resending them at a later time. SSL/TLS defeats this during initial communications between the GTCs. Since each data chunk has its own SHA-1 hash code in its .torrent metafile, the downloader can easily verify the incoming data integrity. If it is compromised, the GTC just ignores it. Furthermore, if necessary, both parties can send the content data signed with their credentials.Denial of Service AttacksIn this type of attacks, the attacker may try to overload the system resources (CPU and network cycles) by generating a large number of spurious content data packet that are processed by the system. Since each peer needs to authenticate before the actual data transmission, unauthorized entities would be rejected at GTCs that receive them. The WS-Tracker service may be vulnerable to multiple bogus requests originating from a malicious entity. This particular vulnerability may be addressed in the implementation by rejecting socket connections from IP addresses that have made multiple bogus attempts. By their nature, distributed systems generally tend to be less susceptible to denial of service attacks.Non-RepudiationNon-repudiation is more of a system abuse than an attack. It can be taken place in two ways. In the first one, a user may claim his or her username and password hacked and abused by an attacker . The attacker is only able to change the user settings in the CCM which is mere metadata and does not contain any useful content data. This is defeated by SSL and mutual authentication in the transport layer during the communication between the user and the CCM. If the user’s CCM account is stolen by his or her mistake, then it becomes a legitimately stolen username/password and the CCM system admin provides a new username/password to the user. Other abuse is that the user publishes his/her malicious content through the CCM, and informs or allows other people to download his/her content using facilities provided by the CCM and then denies it. Again, the useful content data transferred only from users’ machine, so it is impossible for an outside attacker to know what resides on users’ machine unless he or she hacks them as well. Thus, the security of the users’ machines is the users responsibility and out of our research.Summary In this chapter, we explained the security infrastructure used in the GridTorrent framework and motivations and design decisions behind it. Then, we presented a very detailed description of interactions taking place between all components. Next, we mentioned what type of security issues arises at which step and how we addressed them. Performance EvaluationIntroductionIt is a well-known fact that TCP’s window based congestion control mechanism prevents ADDIN EN.CITE <EndNote><Cite><Author>Katabi</Author><Year>2002</Year><RecNum>29</RecNum><record><rec-number>29</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">29</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Katabi, D.</author><author>Handley, M.</author><author>Rohrs, C.</author></authors></contributors><titles><title>Internet Congestion Control for Future High Bandwidth-Delay Product Environments</title><secondary-title>Dina Katabi, Mark Handley, and Charles Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. ACM Sigcomm 2002, August 2002. URL Katabi, Mark Handley, and Charles Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. ACM Sigcomm 2002, August 2002. URL TCP PTCP</label><urls><related-urls><url>citeseer.ist.psu.edu/katabi02internet.html</url></related-urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Katabi</Author><Year>2002</Year><RecNum>29</RecNum><record><rec-number>29</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">29</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Katabi, D.</author><author>Handley, M.</author><author>Rohrs, C.</author></authors></contributors><titles><title>Internet Congestion Control for Future High Bandwidth-Delay Product Environments</title><secondary-title>Dina Katabi, Mark Handley, and Charles Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. ACM Sigcomm 2002, August 2002. URL Katabi, Mark Handley, and Charles Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. ACM Sigcomm 2002, August 2002. URL TCP PTCP</label><urls><related-urls><url>citeseer.ist.psu.edu/katabi02internet.html</url></related-urls></urls></record></Cite></EndNote>[147] full-scale usage of high bandwidth-delay product. Hence, transferring large data set across high-performance networks is suffering from limitations of the current TCP implementation PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5LYXRhYmk8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxS

ZWNOdW0+Mjk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjI5PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij4yOTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFs

IEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+S2F0

YWJpLCBELjwvYXV0aG9yPjxhdXRob3I+SGFuZGxleSwgTS48L2F1dGhvcj48YXV0aG9yPlJvaHJz

LCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5JbnRl

cm5ldCBDb25nZXN0aW9uIENvbnRyb2wgZm9yIEZ1dHVyZSBIaWdoIEJhbmR3aWR0aC1EZWxheSBQ

cm9kdWN0IEVudmlyb25tZW50czwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5EaW5hIEthdGFiaSwg

TWFyayBIYW5kbGV5LCBhbmQgQ2hhcmxlcyBSb2hycywgSW50ZXJuZXQgQ29uZ2VzdGlvbiBDb250

cm9sIGZvciBGdXR1cmUgSGlnaCBCYW5kd2lkdGgtRGVsYXkgUHJvZHVjdCBFbnZpcm9ubWVudHMu

IEFDTSBTaWdjb21tIDIwMDIsIEF1Z3VzdCAyMDAyLiBVUkwgaHR0cDovL2FuYS5sY3MubWl0LmVk

dS9kaW5hL1hDUC8uPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwt

dGl0bGU+RGluYSBLYXRhYmksIE1hcmsgSGFuZGxleSwgYW5kIENoYXJsZXMgUm9ocnMsIEludGVy

bmV0IENvbmdlc3Rpb24gQ29udHJvbCBmb3IgRnV0dXJlIEhpZ2ggQmFuZHdpZHRoLURlbGF5IFBy

b2R1Y3QgRW52aXJvbm1lbnRzLiBBQ00gU2lnY29tbSAyMDAyLCBBdWd1c3QgMjAwMi4gVVJMIGh0

dHA6Ly9hbmEubGNzLm1pdC5lZHUvZGluYS9YQ1AvLjwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+

PGRhdGVzPjx5ZWFyPjIwMDI8L3llYXI+PC9kYXRlcz48bGFiZWw+TmV0d29yayBUQ1AgUFRDUDwv

bGFiZWw+PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPmNpdGVzZWVyLmlzdC5wc3UuZWR1L2thdGFi

aTAyaW50ZXJuZXQuaHRtbDwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5GbG95ZDwvQXV0aG9yPjxZZWFyPjIwMDA8L1llYXI+PFJlY051bT4z

MDwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MzA8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5

cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcw

MnoiPjMwPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNs

ZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj5GbG95ZCwgUy48

L2F1dGhvcj48YXV0aG9yPkhhbmRsZXksIE0uPC9hdXRob3I+PGF1dGhvcj5QYWRoeWUsIEouPC9h

dXRob3I+PGF1dGhvcj5XaWRtZXIsIEouPC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3Jz

Pjx0aXRsZXM+PHRpdGxlPkVxdWF0aW9uLWJhc2VkIGNvbmdlc3Rpb24gY29udHJvbCBmb3IgdW5p

Y2FzdCBhcHBsaWNhdGlvbnM8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+UHJvY2VlZGluZ3Mgb2Yg

dGhlIGNvbmZlcmVuY2Ugb24gQXBwbGljYXRpb25zLCBUZWNobm9sb2dpZXMsIEFyY2hpdGVjdHVy

ZXMsIGFuZCBQcm90b2NvbHMgZm9yIENvbXB1dGVyIENvbW11bmljYXRpb248L3NlY29uZGFyeS10

aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5Qcm9jZWVkaW5ncyBvZiB0aGUg

Y29uZmVyZW5jZSBvbiBBcHBsaWNhdGlvbnMsIFRlY2hub2xvZ2llcywgQXJjaGl0ZWN0dXJlcywg

YW5kIFByb3RvY29scyBmb3IgQ29tcHV0ZXIgQ29tbXVuaWNhdGlvbjwvZnVsbC10aXRsZT48L3Bl

cmlvZGljYWw+PHBhZ2VzPjQzLTU2PC9wYWdlcz48ZGF0ZXM+PHllYXI+MjAwMDwveWVhcj48L2Rh

dGVzPjxsYWJlbD5OZXR3b3JrIFRDUCBQVENQPC9sYWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5LYXRhYmk8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxS

ZWNOdW0+Mjk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjI5PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij4yOTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFs

IEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+S2F0

YWJpLCBELjwvYXV0aG9yPjxhdXRob3I+SGFuZGxleSwgTS48L2F1dGhvcj48YXV0aG9yPlJvaHJz

LCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5JbnRl

cm5ldCBDb25nZXN0aW9uIENvbnRyb2wgZm9yIEZ1dHVyZSBIaWdoIEJhbmR3aWR0aC1EZWxheSBQ

cm9kdWN0IEVudmlyb25tZW50czwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5EaW5hIEthdGFiaSwg

TWFyayBIYW5kbGV5LCBhbmQgQ2hhcmxlcyBSb2hycywgSW50ZXJuZXQgQ29uZ2VzdGlvbiBDb250

cm9sIGZvciBGdXR1cmUgSGlnaCBCYW5kd2lkdGgtRGVsYXkgUHJvZHVjdCBFbnZpcm9ubWVudHMu

IEFDTSBTaWdjb21tIDIwMDIsIEF1Z3VzdCAyMDAyLiBVUkwgaHR0cDovL2FuYS5sY3MubWl0LmVk

dS9kaW5hL1hDUC8uPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwt

dGl0bGU+RGluYSBLYXRhYmksIE1hcmsgSGFuZGxleSwgYW5kIENoYXJsZXMgUm9ocnMsIEludGVy

bmV0IENvbmdlc3Rpb24gQ29udHJvbCBmb3IgRnV0dXJlIEhpZ2ggQmFuZHdpZHRoLURlbGF5IFBy

b2R1Y3QgRW52aXJvbm1lbnRzLiBBQ00gU2lnY29tbSAyMDAyLCBBdWd1c3QgMjAwMi4gVVJMIGh0

dHA6Ly9hbmEubGNzLm1pdC5lZHUvZGluYS9YQ1AvLjwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+

PGRhdGVzPjx5ZWFyPjIwMDI8L3llYXI+PC9kYXRlcz48bGFiZWw+TmV0d29yayBUQ1AgUFRDUDwv

bGFiZWw+PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPmNpdGVzZWVyLmlzdC5wc3UuZWR1L2thdGFi

aTAyaW50ZXJuZXQuaHRtbDwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5GbG95ZDwvQXV0aG9yPjxZZWFyPjIwMDA8L1llYXI+PFJlY051bT4z

MDwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MzA8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5

cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcw

MnoiPjMwPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNs

ZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj5GbG95ZCwgUy48

L2F1dGhvcj48YXV0aG9yPkhhbmRsZXksIE0uPC9hdXRob3I+PGF1dGhvcj5QYWRoeWUsIEouPC9h

dXRob3I+PGF1dGhvcj5XaWRtZXIsIEouPC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3Jz

Pjx0aXRsZXM+PHRpdGxlPkVxdWF0aW9uLWJhc2VkIGNvbmdlc3Rpb24gY29udHJvbCBmb3IgdW5p

Y2FzdCBhcHBsaWNhdGlvbnM8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+UHJvY2VlZGluZ3Mgb2Yg

dGhlIGNvbmZlcmVuY2Ugb24gQXBwbGljYXRpb25zLCBUZWNobm9sb2dpZXMsIEFyY2hpdGVjdHVy

ZXMsIGFuZCBQcm90b2NvbHMgZm9yIENvbXB1dGVyIENvbW11bmljYXRpb248L3NlY29uZGFyeS10

aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5Qcm9jZWVkaW5ncyBvZiB0aGUg

Y29uZmVyZW5jZSBvbiBBcHBsaWNhdGlvbnMsIFRlY2hub2xvZ2llcywgQXJjaGl0ZWN0dXJlcywg

YW5kIFByb3RvY29scyBmb3IgQ29tcHV0ZXIgQ29tbXVuaWNhdGlvbjwvZnVsbC10aXRsZT48L3Bl

cmlvZGljYWw+PHBhZ2VzPjQzLTU2PC9wYWdlcz48ZGF0ZXM+PHllYXI+MjAwMDwveWVhcj48L2Rh

dGVzPjxsYWJlbD5OZXR3b3JrIFRDUCBQVENQPC9sYWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5LYXRhYmk8L0F1dGhvcj48WWVhcj4yMDAyPC9ZZWFyPjxS

ZWNOdW0+Mjk8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjI5PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij4yOTwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFs

IEFydGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+S2F0

YWJpLCBELjwvYXV0aG9yPjxhdXRob3I+SGFuZGxleSwgTS48L2F1dGhvcj48YXV0aG9yPlJvaHJz

LCBDLjwvYXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5JbnRl

cm5ldCBDb25nZXN0aW9uIENvbnRyb2wgZm9yIEZ1dHVyZSBIaWdoIEJhbmR3aWR0aC1EZWxheSBQ

cm9kdWN0IEVudmlyb25tZW50czwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT5EaW5hIEthdGFiaSwg

TWFyayBIYW5kbGV5LCBhbmQgQ2hhcmxlcyBSb2hycywgSW50ZXJuZXQgQ29uZ2VzdGlvbiBDb250

cm9sIGZvciBGdXR1cmUgSGlnaCBCYW5kd2lkdGgtRGVsYXkgUHJvZHVjdCBFbnZpcm9ubWVudHMu

IEFDTSBTaWdjb21tIDIwMDIsIEF1Z3VzdCAyMDAyLiBVUkwgaHR0cDovL2FuYS5sY3MubWl0LmVk

dS9kaW5hL1hDUC8uPC9zZWNvbmRhcnktdGl0bGU+PC90aXRsZXM+PHBlcmlvZGljYWw+PGZ1bGwt

dGl0bGU+RGluYSBLYXRhYmksIE1hcmsgSGFuZGxleSwgYW5kIENoYXJsZXMgUm9ocnMsIEludGVy

bmV0IENvbmdlc3Rpb24gQ29udHJvbCBmb3IgRnV0dXJlIEhpZ2ggQmFuZHdpZHRoLURlbGF5IFBy

b2R1Y3QgRW52aXJvbm1lbnRzLiBBQ00gU2lnY29tbSAyMDAyLCBBdWd1c3QgMjAwMi4gVVJMIGh0

dHA6Ly9hbmEubGNzLm1pdC5lZHUvZGluYS9YQ1AvLjwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+

PGRhdGVzPjx5ZWFyPjIwMDI8L3llYXI+PC9kYXRlcz48bGFiZWw+TmV0d29yayBUQ1AgUFRDUDwv

bGFiZWw+PHVybHM+PHJlbGF0ZWQtdXJscz48dXJsPmNpdGVzZWVyLmlzdC5wc3UuZWR1L2thdGFi

aTAyaW50ZXJuZXQuaHRtbDwvdXJsPjwvcmVsYXRlZC11cmxzPjwvdXJscz48L3JlY29yZD48L0Np

dGU+PENpdGU+PEF1dGhvcj5GbG95ZDwvQXV0aG9yPjxZZWFyPjIwMDA8L1llYXI+PFJlY051bT4z

MDwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+MzA8L3JlYy1udW1iZXI+PGZvcmVpZ24ta2V5

cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVkc3N0dnB4ZG1lMnR6MHYyZXcw

MnoiPjMwPC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5hbWU9IkpvdXJuYWwgQXJ0aWNs

ZSI+MTc8L3JlZi10eXBlPjxjb250cmlidXRvcnM+PGF1dGhvcnM+PGF1dGhvcj5GbG95ZCwgUy48

L2F1dGhvcj48YXV0aG9yPkhhbmRsZXksIE0uPC9hdXRob3I+PGF1dGhvcj5QYWRoeWUsIEouPC9h

dXRob3I+PGF1dGhvcj5XaWRtZXIsIEouPC9hdXRob3I+PC9hdXRob3JzPjwvY29udHJpYnV0b3Jz

Pjx0aXRsZXM+PHRpdGxlPkVxdWF0aW9uLWJhc2VkIGNvbmdlc3Rpb24gY29udHJvbCBmb3IgdW5p

Y2FzdCBhcHBsaWNhdGlvbnM8L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+UHJvY2VlZGluZ3Mgb2Yg

dGhlIGNvbmZlcmVuY2Ugb24gQXBwbGljYXRpb25zLCBUZWNobm9sb2dpZXMsIEFyY2hpdGVjdHVy

ZXMsIGFuZCBQcm90b2NvbHMgZm9yIENvbXB1dGVyIENvbW11bmljYXRpb248L3NlY29uZGFyeS10

aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10aXRsZT5Qcm9jZWVkaW5ncyBvZiB0aGUg

Y29uZmVyZW5jZSBvbiBBcHBsaWNhdGlvbnMsIFRlY2hub2xvZ2llcywgQXJjaGl0ZWN0dXJlcywg

YW5kIFByb3RvY29scyBmb3IgQ29tcHV0ZXIgQ29tbXVuaWNhdGlvbjwvZnVsbC10aXRsZT48L3Bl

cmlvZGljYWw+PHBhZ2VzPjQzLTU2PC9wYWdlcz48ZGF0ZXM+PHllYXI+MjAwMDwveWVhcj48L2Rh

dGVzPjxsYWJlbD5OZXR3b3JrIFRDUCBQVENQPC9sYWJlbD48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjwvRW5kTm90ZT4A

ADDIN EN.CITE.DATA [147, 148] as it prevents the use of maximum bandwidth. Thus, throughput efficiency is one of the major motivations of GridTorrent, which is supposed to utilize the high bandwidth efficiently, that is, utilize as much bandwidth as possible. GridTorrent accomplishes this goal by aggregating throughput of all concurrent incoming TCP streams from distinct sources. As a matter of fact, using parallel TCP implementations ADDIN EN.CITE <EndNote><Cite><Author>Floyd</Author><Year>2000</Year><RecNum>30</RecNum><record><rec-number>30</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">30</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Floyd, S.</author><author>Handley, M.</author><author>Padhye, J.</author><author>Widmer, J.</author></authors></contributors><titles><title>Equation-based congestion control for unicast applications</title><secondary-title>Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication</secondary-title></titles><periodical><full-title>Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication</full-title></periodical><pages>43-56</pages><dates><year>2000</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite><Cite><Author>Zhang</Author><Year>1998</Year><RecNum>32</RecNum><record><rec-number>32</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">32</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zhang, Y.</author><author>Yan, E.</author><author>Dao, S.</author></authors></contributors><titles><title>A Measurement of TCP over Long-Delay Network</title><secondary-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</secondary-title></titles><periodical><full-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</full-title></periodical><dates><year>1998</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Floyd</Author><Year>2000</Year><RecNum>30</RecNum><record><rec-number>30</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">30</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Floyd, S.</author><author>Handley, M.</author><author>Padhye, J.</author><author>Widmer, J.</author></authors></contributors><titles><title>Equation-based congestion control for unicast applications</title><secondary-title>Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication</secondary-title></titles><periodical><full-title>Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication</full-title></periodical><pages>43-56</pages><dates><year>2000</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite><Cite><Author>Zhang</Author><Year>1998</Year><RecNum>32</RecNum><record><rec-number>32</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">32</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Zhang, Y.</author><author>Yan, E.</author><author>Dao, S.</author></authors></contributors><titles><title>A Measurement of TCP over Long-Delay Network</title><secondary-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</secondary-title></titles><periodical><full-title>Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis</full-title></periodical><dates><year>1998</year></dates><label>Network TCP PTCP</label><urls></urls></record></Cite></EndNote>[30, 148] is one common solution utilized by numerous bulk data transfer protocols in order to boost network throughput efficiency at the application level.Although GridTorrent and parallel TCP have built on different architecture paradigm peer-to-peer and client/server respectively, they share common goal: better bandwidth utilization. However, unlike parallel TCP model, GridTorrent offers, due to its peer-to-peer architecture, other great features such utilizing idle network, computational and storage resources. In other words, in addition to extra features of GridTorrent, if GridTorrent display better or same performance than/as parallel TCP, there would be strong evidence for using GridTorrent for high-performance bulk data transfer in scientific community. Therefore, it is of great importance to compare GridTorrent performance results with that of parallel TCP. In the next section, we are going to present briefly the architecture of our Java-based implemented PTCP PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5MaW08L0F1dGhvcj48WWVhcj4yMDA1PC9ZZWFyPjxSZWNO

dW0+NDM8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjQzPC9yZWMtbnVtYmVyPjxmb3JlaWdu

LWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2

MmV3MDJ6Ij40Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFy

dGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxl

IGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5MaW0sIFMu

IEIuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Rm94LCBHLjwvc3R5bGU+PC9hdXRob3I+PGF1dGhv

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PkthcGxhbiwgQS48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5QYWxsaWNrYXJhLCBTLjwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPlBpZXJjZSwgTS48L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdyaWRGVFAgYW5kIFBhcmFsbGVsIFRDUCBTdXBwb3J0

IGluIE5hcmFkYUJyb2tlcmluZzwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGlzdHJp

YnV0ZWQgQW5kIFBhcmFsbGVsIENvbXB1dGluZzogNnRoIEludGVybmF0aW9uYWwgQ29uZmVyZW5j

ZSBvbiBBbGdvcml0aG1zIGFuZCBBcmNoaXRlY3R1cmVzIGZvciBQYXJhbGxlbCBQcm9jZXNzaW5n

LCBJQ0EzUFAsIE1lbGJvdXJuZSwgQXVzdHJhbGlhLCBPY3RvYmVyIDItMywgMjAwNTogUHJvY2Vl

ZGluZ3M8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxs

LXRpdGxlPkRpc3RyaWJ1dGVkIEFuZCBQYXJhbGxlbCBDb21wdXRpbmc6IDZ0aCBJbnRlcm5hdGlv

bmFsIENvbmZlcmVuY2Ugb24gQWxnb3JpdGhtcyBhbmQgQXJjaGl0ZWN0dXJlcyBmb3IgUGFyYWxs

ZWwgUHJvY2Vzc2luZywgSUNBM1BQLCBNZWxib3VybmUsIEF1c3RyYWxpYSwgT2N0b2JlciAyLTMs

IDIwMDU6IFByb2NlZWRpbmdzPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA1PC9zdHlsZT48L3llYXI+PC9kYXRlcz48bGFiZWw+R3JpZEZUUDwvbGFiZWw+PHVybHM+PC91

cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJ1cm5hcDwvQXV0aG9yPjxZZWFyPjIw

MDU8L1llYXI+PFJlY051bT40NDwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+NDQ8L3JlYy1u

dW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVk

c3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjQ0PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5h

bWU9IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxh

dXRob3JzPjxhdXRob3I+QnVybmFwLCBQLiwgQnVsdXQsIEguLCBQYWxsaWNrYXJhLCBTLiwgRm94

LCBHLiwgV2Fsa2VyLCBELiwgQS4gS2FwbGFuLCBCLiBZaWxkaXosIGFuZCBOYWNhciwgTS4gQTwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5Xb3JsZHdpZGUg

TWVzc2FnaW5nIFN1cHBvcnQgZm9yIEhpZ2ggUGVyZm9ybWFuY2UgUmVhbC10aW1lIENvbGxhYm9y

YXRpb248L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+VGhlIFVLIGUtU2NpZW5jZSBBbGwgSGFuZHMg

TWVldGluZzwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA1PC95ZWFy

PjxwdWItZGF0ZXM+PGRhdGU+U2VwdGVtYmVyLCAyMDA1PC9kYXRlPjwvcHViLWRhdGVzPjwvZGF0

ZXM+PHB1Yi1sb2NhdGlvbj5Ob3R0aW5naGFtLCBVSzwvcHViLWxvY2F0aW9uPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5MaW08L0F1dGhvcj48WWVhcj4yMDA1PC9ZZWFyPjxSZWNO

dW0+NDM8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjQzPC9yZWMtbnVtYmVyPjxmb3JlaWdu

LWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2

MmV3MDJ6Ij40Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFy

dGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxl

IGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5MaW0sIFMu

IEIuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Rm94LCBHLjwvc3R5bGU+PC9hdXRob3I+PGF1dGhv

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PkthcGxhbiwgQS48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5QYWxsaWNrYXJhLCBTLjwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPlBpZXJjZSwgTS48L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdyaWRGVFAgYW5kIFBhcmFsbGVsIFRDUCBTdXBwb3J0

IGluIE5hcmFkYUJyb2tlcmluZzwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGlzdHJp

YnV0ZWQgQW5kIFBhcmFsbGVsIENvbXB1dGluZzogNnRoIEludGVybmF0aW9uYWwgQ29uZmVyZW5j

ZSBvbiBBbGdvcml0aG1zIGFuZCBBcmNoaXRlY3R1cmVzIGZvciBQYXJhbGxlbCBQcm9jZXNzaW5n

LCBJQ0EzUFAsIE1lbGJvdXJuZSwgQXVzdHJhbGlhLCBPY3RvYmVyIDItMywgMjAwNTogUHJvY2Vl

ZGluZ3M8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxs

LXRpdGxlPkRpc3RyaWJ1dGVkIEFuZCBQYXJhbGxlbCBDb21wdXRpbmc6IDZ0aCBJbnRlcm5hdGlv

bmFsIENvbmZlcmVuY2Ugb24gQWxnb3JpdGhtcyBhbmQgQXJjaGl0ZWN0dXJlcyBmb3IgUGFyYWxs

ZWwgUHJvY2Vzc2luZywgSUNBM1BQLCBNZWxib3VybmUsIEF1c3RyYWxpYSwgT2N0b2JlciAyLTMs

IDIwMDU6IFByb2NlZWRpbmdzPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA1PC9zdHlsZT48L3llYXI+PC9kYXRlcz48bGFiZWw+R3JpZEZUUDwvbGFiZWw+PHVybHM+PC91

cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJ1cm5hcDwvQXV0aG9yPjxZZWFyPjIw

MDU8L1llYXI+PFJlY051bT40NDwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+NDQ8L3JlYy1u

dW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVk

c3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjQ0PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5h

bWU9IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxh

dXRob3JzPjxhdXRob3I+QnVybmFwLCBQLiwgQnVsdXQsIEguLCBQYWxsaWNrYXJhLCBTLiwgRm94

LCBHLiwgV2Fsa2VyLCBELiwgQS4gS2FwbGFuLCBCLiBZaWxkaXosIGFuZCBOYWNhciwgTS4gQTwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5Xb3JsZHdpZGUg

TWVzc2FnaW5nIFN1cHBvcnQgZm9yIEhpZ2ggUGVyZm9ybWFuY2UgUmVhbC10aW1lIENvbGxhYm9y

YXRpb248L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+VGhlIFVLIGUtU2NpZW5jZSBBbGwgSGFuZHMg

TWVldGluZzwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA1PC95ZWFy

PjxwdWItZGF0ZXM+PGRhdGU+U2VwdGVtYmVyLCAyMDA1PC9kYXRlPjwvcHViLWRhdGVzPjwvZGF0

ZXM+PHB1Yi1sb2NhdGlvbj5Ob3R0aW5naGFtLCBVSzwvcHViLWxvY2F0aW9uPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5MaW08L0F1dGhvcj48WWVhcj4yMDA1PC9ZZWFyPjxSZWNO

dW0+NDM8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjQzPC9yZWMtbnVtYmVyPjxmb3JlaWdu

LWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0ejB2

MmV3MDJ6Ij40Mzwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJKb3VybmFsIEFy

dGljbGUiPjE3PC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxhdXRob3JzPjxhdXRob3I+PHN0eWxl

IGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5MaW0sIFMu

IEIuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRp

bWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+Rm94LCBHLjwvc3R5bGU+PC9hdXRob3I+PGF1dGhv

cj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUi

PkthcGxhbiwgQS48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIg

Zm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5QYWxsaWNrYXJhLCBTLjwvc3R5bGU+

PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9t

YW4iIHNpemU9IjEwMCUiPlBpZXJjZSwgTS48L3N0eWxlPjwvYXV0aG9yPjwvYXV0aG9ycz48L2Nv

bnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkdyaWRGVFAgYW5kIFBhcmFsbGVsIFRDUCBTdXBwb3J0

IGluIE5hcmFkYUJyb2tlcmluZzwvc3R5bGU+PC90aXRsZT48c2Vjb25kYXJ5LXRpdGxlPjxzdHls

ZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+RGlzdHJp

YnV0ZWQgQW5kIFBhcmFsbGVsIENvbXB1dGluZzogNnRoIEludGVybmF0aW9uYWwgQ29uZmVyZW5j

ZSBvbiBBbGdvcml0aG1zIGFuZCBBcmNoaXRlY3R1cmVzIGZvciBQYXJhbGxlbCBQcm9jZXNzaW5n

LCBJQ0EzUFAsIE1lbGJvdXJuZSwgQXVzdHJhbGlhLCBPY3RvYmVyIDItMywgMjAwNTogUHJvY2Vl

ZGluZ3M8L3N0eWxlPjwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxwZXJpb2RpY2FsPjxmdWxs

LXRpdGxlPkRpc3RyaWJ1dGVkIEFuZCBQYXJhbGxlbCBDb21wdXRpbmc6IDZ0aCBJbnRlcm5hdGlv

bmFsIENvbmZlcmVuY2Ugb24gQWxnb3JpdGhtcyBhbmQgQXJjaGl0ZWN0dXJlcyBmb3IgUGFyYWxs

ZWwgUHJvY2Vzc2luZywgSUNBM1BQLCBNZWxib3VybmUsIEF1c3RyYWxpYSwgT2N0b2JlciAyLTMs

IDIwMDU6IFByb2NlZWRpbmdzPC9mdWxsLXRpdGxlPjwvcGVyaW9kaWNhbD48ZGF0ZXM+PHllYXI+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj4y

MDA1PC9zdHlsZT48L3llYXI+PC9kYXRlcz48bGFiZWw+R3JpZEZUUDwvbGFiZWw+PHVybHM+PC91

cmxzPjwvcmVjb3JkPjwvQ2l0ZT48Q2l0ZT48QXV0aG9yPkJ1cm5hcDwvQXV0aG9yPjxZZWFyPjIw

MDU8L1llYXI+PFJlY051bT40NDwvUmVjTnVtPjxyZWNvcmQ+PHJlYy1udW1iZXI+NDQ8L3JlYy1u

dW1iZXI+PGZvcmVpZ24ta2V5cz48a2V5IGFwcD0iRU4iIGRiLWlkPSJlcmVmOXBmdm92MnJkaWVk

c3N0dnB4ZG1lMnR6MHYyZXcwMnoiPjQ0PC9rZXk+PC9mb3JlaWduLWtleXM+PHJlZi10eXBlIG5h

bWU9IkNvbmZlcmVuY2UgUHJvY2VlZGluZ3MiPjEwPC9yZWYtdHlwZT48Y29udHJpYnV0b3JzPjxh

dXRob3JzPjxhdXRob3I+QnVybmFwLCBQLiwgQnVsdXQsIEguLCBQYWxsaWNrYXJhLCBTLiwgRm94

LCBHLiwgV2Fsa2VyLCBELiwgQS4gS2FwbGFuLCBCLiBZaWxkaXosIGFuZCBOYWNhciwgTS4gQTwv

YXV0aG9yPjwvYXV0aG9ycz48L2NvbnRyaWJ1dG9ycz48dGl0bGVzPjx0aXRsZT5Xb3JsZHdpZGUg

TWVzc2FnaW5nIFN1cHBvcnQgZm9yIEhpZ2ggUGVyZm9ybWFuY2UgUmVhbC10aW1lIENvbGxhYm9y

YXRpb248L3RpdGxlPjxzZWNvbmRhcnktdGl0bGU+VGhlIFVLIGUtU2NpZW5jZSBBbGwgSGFuZHMg

TWVldGluZzwvc2Vjb25kYXJ5LXRpdGxlPjwvdGl0bGVzPjxkYXRlcz48eWVhcj4yMDA1PC95ZWFy

PjxwdWItZGF0ZXM+PGRhdGU+U2VwdGVtYmVyLCAyMDA1PC9kYXRlPjwvcHViLWRhdGVzPjwvZGF0

ZXM+PHB1Yi1sb2NhdGlvbj5Ob3R0aW5naGFtLCBVSzwvcHViLWxvY2F0aW9uPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [149, 150] data transfer mechanism. For the sake of fairness, that is, to provide same testing environment for both GridTorrent and PTCP, we used version of GridTorrent without security module, as security component has to send and receive several packets in order to perform handshake, authorization and authentication before starting the actual data transfer process and the data can be sent in encrypted form. That overhead could have an adverse impact on actual data transfer performance. In this chapter, we will investigate and discuss how well our GridTorrent Framework’s data transfer mechanism architecture is performing. To observe influence of the underlying networks over its performances, we have set three scenarios and conducted their tests in LAN and WAN type of computer networks. REF _Ref214944101 \h Table 81 shows technical features of machines used in different locations. Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 1 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 1 Server and client machines’ descriptions and their locationsNameSpecificationsNetworkInstitutionLocationAIntel(R) Quad-Core Xeon(TM) 4x2.33GHz CPU with 8GB of RAM on Red Hat Enterprise Linux 4.0Broadcom NetXtreme II BCM5708 1000 Base-T EthernetIndiana UniversityBloomington, INBSun Fire V880 8x1.2GHz UltraSPARC III processors with 16GB of RAM on Solaris 9. It has 6x72GB 10K rpm internal HDGigabit Ethernet and 10/100-BaseT EthernetIndiana UniversityIndianapolis, INCDual Pentium III 731MHz CPU with 512MB of RAM on GNU/Linux 2.6.20-1.2316.fc5Gigabit Ethernet and 10/100-BaseT EthernetFlorida State UniversityTallahassee, FLIn each scenario, to compare the performances of PTCP and GridTorrent, we used both PTCP and GridTorrent test cases. We chose 300 MB for file size because the study ADDIN EN.CITE <EndNote><Cite><Author>Al-Kiswany</Author><Year>2007</Year><RecNum>46</RecNum><record><rec-number>46</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">46</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Al-Kiswany, S.</author><author>Ripeanu, M.</author><author>Iamnitchi, A.</author><author>Vazhkudai, S.</author></authors></contributors><titles><title>Are P2P Data-Dissemination Techniques Viable in Today&apos;s Data-Intensive Scientific Collaborations?</title><secondary-title>Lecture Notes in Computer Science</secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages>404</pages><volume>4641</volume><dates><year>2007</year></dates><label>Critique</label><urls></urls></record></Cite></EndNote> ADDIN EN.CITE <EndNote><Cite><Author>Al-Kiswany</Author><Year>2007</Year><RecNum>46</RecNum><record><rec-number>46</rec-number><foreign-keys><key app="EN" db-id="eref9pfvov2rdiedsstvpxdme2tz0v2ew02z">46</key></foreign-keys><ref-type name="Journal Article">17</ref-type><contributors><authors><author>Al-Kiswany, S.</author><author>Ripeanu, M.</author><author>Iamnitchi, A.</author><author>Vazhkudai, S.</author></authors></contributors><titles><title>Are P2P Data-Dissemination Techniques Viable in Today&apos;s Data-Intensive Scientific Collaborations?</title><secondary-title>Lecture Notes in Computer Science</secondary-title></titles><periodical><full-title>LECTURE NOTES IN COMPUTER SCIENCE</full-title></periodical><pages>404</pages><volume>4641</volume><dates><year>2007</year></dates><label>Critique</label><urls></urls></record></Cite></EndNote>[151] has shown that only more than 5% are larger than 1 GB and the mean file size generated in scientific computation community is larger than 300MB.To measure the practical maximum available bandwidth capacity of the underlying network, we used Iperf, a tool to measure maximum TCP bandwidth, allowing the tuning of various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, datagram loss. To assess the maximum TCP bandwidth, we tried several TCP window size along with the parallel stream number. In LAN and WAN tests, TCP window size was set to maximum value allowed by the underlying operating system. Note that since the operating systems are not same on test machines, TCP window size used for LAN and WAN are not the same.PTCP ArchitectureA Parallel TCP stream consists of three basic steps; splitting of data into sub packets at the sender side, sending these sub packets over the network by using multiple streams in parallel, and coalescing of received sub packets at the receiver side. Using multiple parallel TCP streams gives high throughput by aggregating each socket bandwidth, although the default socket buffer size is not set to value of the bandwidth-delay product.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 1 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 1 A parallel TCP socket architecture REF _Ref214951609 \h Figure 81 depicts the architecture of the Java-based PTCP framework. PTCPSocket derived from .Socket can handle multiple sockets’ input and output streams. It is comprised of packet splitter, packet merger, senders, receivers, and TCP sockets, and has two type of channels; communication and data channels. All control information and negotiations are sent over the communication channel which stays open till the end of entire data transfer, and actual data are sent over the data channels. For instance, the number of parallel streams to be used is determined by the sender and is communicated to the receiver before initiating the actual data transfer through the communication channel.After the setting the number of parallel streams, the packet splitter divides user’s data into smaller sub packets. These sub-packets are then passed on by the senders to the receivers while writing out these packets into data channels utilizing TCP sockets. The number of senders and receivers has to be same as the number of parallel streams. Receivers read packets from the data channels and pass them to the upper layer packet merger at the receiver’s side. The Packet Merger merges smaller sub packets into one packet. It combines the incoming packets by checking their packet number assigned by the packet splitter. There is no need to check data integrity at the packet merger layer again, since TCP uses a checksum computed over the whole packet to verify that the protocol header and the data in each received packet have not been corrupted.LAN TestLAN test was conducted between two Indiana University’s machines which reside on Ethernet networks and are nearly 10 miles apart from each other. Theoretical available bandwidth capacity is the maximum data transfer rate which the underlying network interface card permits. Yet, in reality, the useful bandwidth is lower than this value because, in TCP/IP network protocol, every layer adds its header as an overhead to the data received from upper-layer protocol of TCP, UDP and IP. Additionally, an Ethernet frame has to conform to Ethernet’s maximum transmission unit (MTU) of 1500 bytes. For data transmission over TCP connections, a packet consists of a 20 byte TCP and a 20 byte IP header which leaves 1460 bytes for the payload data. In addition to that, an Ethernet frame needs an extra 38 byte preamble on top the Ethernet’s MTU which is 1500 bytes. Taking into consideration all of these overheads, the maximum achieved bandwidth of TCP connection is of the theoretical available bandwidth capacity. The maximum useful bandwidth of TCP still remains as theoretical throughput as it does not take account of packet loss and retransmission due to network congestion or failure. Therefore, we utilized Iperf, which is commonly used memory-to-memory network performance testing tool, to measure the available bandwidth capacity attained by real application. Theoretical Available Bandwidth: 1000 MbpsTheoretical Available Bandwidth for TCP connections: 949.3 MbpsMeasured Available Bandwidth: 885 MbpsRTT = 0.34 msBandwidth Delay Product (BDP) = 1000x0.34=42.5KBIn addition, it is important to bear in mind that though the nodes used in our tests as servers/seeds are dedicated machines, the underlying network resource has been shared with other nodes connected to same network structure. Thus, network traffics caused by other nodes may have impact on our test results but this is not important because we repeated our tests many times on different time frames to minimize the impacts of network traffic generated by other nodes and our primary goal is to observe the GridTorrent and PTCP behaviors according as different streams and seeds.Scenario I: TestbedThe purpose of this scenario is to evaluate the performances of PTCP and GridTorrent on local area network. Therefore, both server and client machines reside on Indiana University (IU) computer network and they are located nearly 10 miles away from each other. For the performance test of PTCP, we used one client and one server. The number of parallel TCP streams between server and client has been increased from one to sixty-four. REF _Ref215794663 \h Figure 82 demonstrates the network connection diagram of PTCP test case.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 2 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 2 Client and server configuration for PTCP test case. Server, machine A, is located at Bloomington, IN, whereas client, machine B, is at Indianapolis, IN.The connections topology between GTF client and seeds are displayed in REF _Ref215794739 \h Figure 83. Similar to PTCP test case, both seeds and client are located on IU LAN and we also used different multiple streams -1, 2, 4, 8 and 16 parallel streams- between each seed and the peer to observe the performance behavior of GridTorrent according to parallel stream number. In addition to using parallel streams, we increased the number of seeds is during the testing; the test has been initiated into one seed and the number of seeds was increased up to thirty-two.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 3 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 3 GridTorrent test case configuration for LAN test. Unlike PTCP test case configuration, regular single Java sockets are used for data transfer in GridTorrent test case. However, server and client’s configuration and location is same as that of PTCP test case.Scenario I: LAN Test Result REF _Ref233075077 \h Table 82 shows average transmission rates between client/peer. REF _Ref228166987 \h Table 83 displays the bandwidth utilization of GridTorrent with multiple streams and seeds on LAN part of Indiana University computer network without overhead. These numbers were obtained by transferring different files in size –between 300 MB to 1800 MB. On LAN, whereas we conducted two type of tests for PTCP; memory-to-memory and disk-to-disk data transfer tests, we performed only disk-to-disk data transfer test for GridTorrent since GridTorrent has very complex data transmission algorithm.For PTCP’s memory-to-memory data transfer, there is no significant improvement in bandwidth usage while using multiple parallel streams PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CdXJuYXA8L0F1dGhvcj48WWVhcj4yMDA1PC9ZZWFyPjxS

ZWNOdW0+NDQ8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjQ0PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij40NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJl

bmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0

aG9yPkJ1cm5hcCwgUC4sIEJ1bHV0LCBILiwgUGFsbGlja2FyYSwgUy4sIEZveCwgRy4sIFdhbGtl

ciwgRC4sIEEuIEthcGxhbiwgQi4gWWlsZGl6LCBhbmQgTmFjYXIsIE0uIEE8L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+V29ybGR3aWRlIE1lc3NhZ2luZyBT

dXBwb3J0IGZvciBIaWdoIFBlcmZvcm1hbmNlIFJlYWwtdGltZSBDb2xsYWJvcmF0aW9uPC90aXRs

ZT48c2Vjb25kYXJ5LXRpdGxlPlRoZSBVSyBlLVNjaWVuY2UgQWxsIEhhbmRzIE1lZXRpbmc8L3Nl

Y29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MjAwNTwveWVhcj48cHViLWRhdGVz

PjxkYXRlPlNlcHRlbWJlciwgMjAwNTwvZGF0ZT48L3B1Yi1kYXRlcz48L2RhdGVzPjxwdWItbG9j

YXRpb24+Tm90dGluZ2hhbSwgVUs8L3B1Yi1sb2NhdGlvbj48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjxDaXRlPjxBdXRob3I+TGltPC9BdXRob3I+PFllYXI+MjAwNTwvWWVhcj48UmVjTnVt

PjQzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj40MzwvcmVjLW51bWJlcj48Zm9yZWlnbi1r

ZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJl

dzAyeiI+NDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRp

Y2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TGltLCBTLiBC

Ljwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkZveCwgRy48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5L

YXBsYW4sIEEuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+UGFsbGlja2FyYSwgUy48L3N0eWxlPjwv

YXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5QaWVyY2UsIE0uPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj5HcmlkRlRQIGFuZCBQYXJhbGxlbCBUQ1AgU3VwcG9ydCBp

biBOYXJhZGFCcm9rZXJpbmc8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkRpc3RyaWJ1

dGVkIEFuZCBQYXJhbGxlbCBDb21wdXRpbmc6IDZ0aCBJbnRlcm5hdGlvbmFsIENvbmZlcmVuY2Ug

b24gQWxnb3JpdGhtcyBhbmQgQXJjaGl0ZWN0dXJlcyBmb3IgUGFyYWxsZWwgUHJvY2Vzc2luZywg

SUNBM1BQLCBNZWxib3VybmUsIEF1c3RyYWxpYSwgT2N0b2JlciAyLTMsIDIwMDU6IFByb2NlZWRp

bmdzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10

aXRsZT5EaXN0cmlidXRlZCBBbmQgUGFyYWxsZWwgQ29tcHV0aW5nOiA2dGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEFsZ29yaXRobXMgYW5kIEFyY2hpdGVjdHVyZXMgZm9yIFBhcmFsbGVs

IFByb2Nlc3NpbmcsIElDQTNQUCwgTWVsYm91cm5lLCBBdXN0cmFsaWEsIE9jdG9iZXIgMi0zLCAy

MDA1OiBQcm9jZWVkaW5nczwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PGRhdGVzPjx5ZWFyPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAw

NTwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWRGVFA8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE ADDIN EN.CITE PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CdXJuYXA8L0F1dGhvcj48WWVhcj4yMDA1PC9ZZWFyPjxS

ZWNOdW0+NDQ8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjQ0PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij40NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJl

bmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0

aG9yPkJ1cm5hcCwgUC4sIEJ1bHV0LCBILiwgUGFsbGlja2FyYSwgUy4sIEZveCwgRy4sIFdhbGtl

ciwgRC4sIEEuIEthcGxhbiwgQi4gWWlsZGl6LCBhbmQgTmFjYXIsIE0uIEE8L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+V29ybGR3aWRlIE1lc3NhZ2luZyBT

dXBwb3J0IGZvciBIaWdoIFBlcmZvcm1hbmNlIFJlYWwtdGltZSBDb2xsYWJvcmF0aW9uPC90aXRs

ZT48c2Vjb25kYXJ5LXRpdGxlPlRoZSBVSyBlLVNjaWVuY2UgQWxsIEhhbmRzIE1lZXRpbmc8L3Nl

Y29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MjAwNTwveWVhcj48cHViLWRhdGVz

PjxkYXRlPlNlcHRlbWJlciwgMjAwNTwvZGF0ZT48L3B1Yi1kYXRlcz48L2RhdGVzPjxwdWItbG9j

YXRpb24+Tm90dGluZ2hhbSwgVUs8L3B1Yi1sb2NhdGlvbj48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjxDaXRlPjxBdXRob3I+TGltPC9BdXRob3I+PFllYXI+MjAwNTwvWWVhcj48UmVjTnVt

PjQzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj40MzwvcmVjLW51bWJlcj48Zm9yZWlnbi1r

ZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJl

dzAyeiI+NDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRp

Y2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TGltLCBTLiBC

Ljwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkZveCwgRy48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5L

YXBsYW4sIEEuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+UGFsbGlja2FyYSwgUy48L3N0eWxlPjwv

YXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5QaWVyY2UsIE0uPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj5HcmlkRlRQIGFuZCBQYXJhbGxlbCBUQ1AgU3VwcG9ydCBp

biBOYXJhZGFCcm9rZXJpbmc8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkRpc3RyaWJ1

dGVkIEFuZCBQYXJhbGxlbCBDb21wdXRpbmc6IDZ0aCBJbnRlcm5hdGlvbmFsIENvbmZlcmVuY2Ug

b24gQWxnb3JpdGhtcyBhbmQgQXJjaGl0ZWN0dXJlcyBmb3IgUGFyYWxsZWwgUHJvY2Vzc2luZywg

SUNBM1BQLCBNZWxib3VybmUsIEF1c3RyYWxpYSwgT2N0b2JlciAyLTMsIDIwMDU6IFByb2NlZWRp

bmdzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10

aXRsZT5EaXN0cmlidXRlZCBBbmQgUGFyYWxsZWwgQ29tcHV0aW5nOiA2dGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEFsZ29yaXRobXMgYW5kIEFyY2hpdGVjdHVyZXMgZm9yIFBhcmFsbGVs

IFByb2Nlc3NpbmcsIElDQTNQUCwgTWVsYm91cm5lLCBBdXN0cmFsaWEsIE9jdG9iZXIgMi0zLCAy

MDA1OiBQcm9jZWVkaW5nczwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PGRhdGVzPjx5ZWFyPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAw

NTwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWRGVFA8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA PEVuZE5vdGU+PENpdGU+PEF1dGhvcj5CdXJuYXA8L0F1dGhvcj48WWVhcj4yMDA1PC9ZZWFyPjxS

ZWNOdW0+NDQ8L1JlY051bT48cmVjb3JkPjxyZWMtbnVtYmVyPjQ0PC9yZWMtbnVtYmVyPjxmb3Jl

aWduLWtleXM+PGtleSBhcHA9IkVOIiBkYi1pZD0iZXJlZjlwZnZvdjJyZGllZHNzdHZweGRtZTJ0

ejB2MmV3MDJ6Ij40NDwva2V5PjwvZm9yZWlnbi1rZXlzPjxyZWYtdHlwZSBuYW1lPSJDb25mZXJl

bmNlIFByb2NlZWRpbmdzIj4xMDwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0

aG9yPkJ1cm5hcCwgUC4sIEJ1bHV0LCBILiwgUGFsbGlja2FyYSwgUy4sIEZveCwgRy4sIFdhbGtl

ciwgRC4sIEEuIEthcGxhbiwgQi4gWWlsZGl6LCBhbmQgTmFjYXIsIE0uIEE8L2F1dGhvcj48L2F1

dGhvcnM+PC9jb250cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+V29ybGR3aWRlIE1lc3NhZ2luZyBT

dXBwb3J0IGZvciBIaWdoIFBlcmZvcm1hbmNlIFJlYWwtdGltZSBDb2xsYWJvcmF0aW9uPC90aXRs

ZT48c2Vjb25kYXJ5LXRpdGxlPlRoZSBVSyBlLVNjaWVuY2UgQWxsIEhhbmRzIE1lZXRpbmc8L3Nl

Y29uZGFyeS10aXRsZT48L3RpdGxlcz48ZGF0ZXM+PHllYXI+MjAwNTwveWVhcj48cHViLWRhdGVz

PjxkYXRlPlNlcHRlbWJlciwgMjAwNTwvZGF0ZT48L3B1Yi1kYXRlcz48L2RhdGVzPjxwdWItbG9j

YXRpb24+Tm90dGluZ2hhbSwgVUs8L3B1Yi1sb2NhdGlvbj48dXJscz48L3VybHM+PC9yZWNvcmQ+

PC9DaXRlPjxDaXRlPjxBdXRob3I+TGltPC9BdXRob3I+PFllYXI+MjAwNTwvWWVhcj48UmVjTnVt

PjQzPC9SZWNOdW0+PHJlY29yZD48cmVjLW51bWJlcj40MzwvcmVjLW51bWJlcj48Zm9yZWlnbi1r

ZXlzPjxrZXkgYXBwPSJFTiIgZGItaWQ9ImVyZWY5cGZ2b3YycmRpZWRzc3R2cHhkbWUydHowdjJl

dzAyeiI+NDM8L2tleT48L2ZvcmVpZ24ta2V5cz48cmVmLXR5cGUgbmFtZT0iSm91cm5hbCBBcnRp

Y2xlIj4xNzwvcmVmLXR5cGU+PGNvbnRyaWJ1dG9ycz48YXV0aG9ycz48YXV0aG9yPjxzdHlsZSBm

YWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+TGltLCBTLiBC

Ljwvc3R5bGU+PC9hdXRob3I+PGF1dGhvcj48c3R5bGUgZmFjZT0ibm9ybWFsIiBmb250PSJUaW1l

cyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkZveCwgRy48L3N0eWxlPjwvYXV0aG9yPjxhdXRob3I+

PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFuIiBzaXplPSIxMDAlIj5L

YXBsYW4sIEEuPC9zdHlsZT48L2F1dGhvcj48YXV0aG9yPjxzdHlsZSBmYWNlPSJub3JtYWwiIGZv

bnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+UGFsbGlja2FyYSwgUy48L3N0eWxlPjwv

YXV0aG9yPjxhdXRob3I+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMgTmV3IFJvbWFu

IiBzaXplPSIxMDAlIj5QaWVyY2UsIE0uPC9zdHlsZT48L2F1dGhvcj48L2F1dGhvcnM+PC9jb250

cmlidXRvcnM+PHRpdGxlcz48dGl0bGU+PHN0eWxlIGZhY2U9Im5vcm1hbCIgZm9udD0iVGltZXMg

TmV3IFJvbWFuIiBzaXplPSIxMDAlIj5HcmlkRlRQIGFuZCBQYXJhbGxlbCBUQ1AgU3VwcG9ydCBp

biBOYXJhZGFCcm9rZXJpbmc8L3N0eWxlPjwvdGl0bGU+PHNlY29uZGFyeS10aXRsZT48c3R5bGUg

ZmFjZT0ibm9ybWFsIiBmb250PSJUaW1lcyBOZXcgUm9tYW4iIHNpemU9IjEwMCUiPkRpc3RyaWJ1

dGVkIEFuZCBQYXJhbGxlbCBDb21wdXRpbmc6IDZ0aCBJbnRlcm5hdGlvbmFsIENvbmZlcmVuY2Ug

b24gQWxnb3JpdGhtcyBhbmQgQXJjaGl0ZWN0dXJlcyBmb3IgUGFyYWxsZWwgUHJvY2Vzc2luZywg

SUNBM1BQLCBNZWxib3VybmUsIEF1c3RyYWxpYSwgT2N0b2JlciAyLTMsIDIwMDU6IFByb2NlZWRp

bmdzPC9zdHlsZT48L3NlY29uZGFyeS10aXRsZT48L3RpdGxlcz48cGVyaW9kaWNhbD48ZnVsbC10

aXRsZT5EaXN0cmlidXRlZCBBbmQgUGFyYWxsZWwgQ29tcHV0aW5nOiA2dGggSW50ZXJuYXRpb25h

bCBDb25mZXJlbmNlIG9uIEFsZ29yaXRobXMgYW5kIEFyY2hpdGVjdHVyZXMgZm9yIFBhcmFsbGVs

IFByb2Nlc3NpbmcsIElDQTNQUCwgTWVsYm91cm5lLCBBdXN0cmFsaWEsIE9jdG9iZXIgMi0zLCAy

MDA1OiBQcm9jZWVkaW5nczwvZnVsbC10aXRsZT48L3BlcmlvZGljYWw+PGRhdGVzPjx5ZWFyPjxz

dHlsZSBmYWNlPSJub3JtYWwiIGZvbnQ9IlRpbWVzIE5ldyBSb21hbiIgc2l6ZT0iMTAwJSI+MjAw

NTwvc3R5bGU+PC95ZWFyPjwvZGF0ZXM+PGxhYmVsPkdyaWRGVFA8L2xhYmVsPjx1cmxzPjwvdXJs

cz48L3JlY29yZD48L0NpdGU+PC9FbmROb3RlPn==

ADDIN EN.CITE.DATA [149, 150] because not only modern LAN connections are very fast but also TCP/IP connection Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 2 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 2 Performance characteristics of Iperf, PTCP disk-to-disk and PTCP memory-to-memory with various parallel streams or sources on LANNumber of StreamsEnd-to-end Mean Bandwidth (Mbps)IperfPTCP-DiskPTCP-Memory1810.00329.35564.062857.00340.75505.704885.00312.80427.748884.00260.24305.6112883.00276.69290.9416866.00254.48325.3920866.00265.23345.0924864.00289.60374.0028861.00276.16392.6432861.00267.06415.7564801.00274.92472.77Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 3 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 3 Bandwidth utilization of GridTorrent with various parallel streams and seeds for useful data transmission on LANNumber of SeedsEnd-to-end Mean Bandwidth (Mbps)GT1GT2GT4GT8G161220.35236.21215.49212.57198.952225.54218.49214.82211.50212.074223.65210.07212.58211.59206.478217.04211.37211.89209.81202.0012208.51210.51207.05204.50200.7716213.59207.05204.92202.28194.6720211.68208.51203.29207.90189.3524210.00206.86206.76197.39191.5428208.99208.02205.17206.76180.6332210.19206.83206.88206.46179.58using multiple parallel streams yields better result in long fat pipe networks that have large bandwidth, but high latency.On LAN, as the transmission time is smaller than overhead time, any overhead process has significant adverse effect on data transmission rate. This detrimental effect continues until 12 parallel streams, after that parallel streaming positive effect dominates and the data transmission performance starts to improve. For disk-to-disk transfer, even though the disk write speed, around 350Mbps, is the main limiting factor, we observed the adverse effect of the parallel streams but it has little impact on the average throughput in contrast to memory-to-memory transfer. Overall, as it is seen from REF _Ref233075134 \h Figure 84 Achieved average data transfer rate of Iperf, PTCP and GridTorrent with various parallel flows versus the number of seeds on LAN type computer network (IU-IU settings), both memory-to-memory and disk-to-disk data transfer rates are lower than Iperf’s result.Although GridTorrent displays a lower level of performance, REF _Ref228169227 \h Figure 85 illustrates that the similar pattern but to a lesser extent has been detected in GridTorrent Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 4 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 4 Achieved average data transfer rate of Iperf, PTCP and GridTorrent with various parallel flows versus the number of seeds on LAN type computer network (IU-IU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 5 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 5 Achieved average useful data throughput of GridTorrent with various parallel flows versus the number of seeds on LAN type computer network (IU-IU settings)tests; the performance reduces according as the number of seeds increases. OverheadBoth parallel TCP and GridTorrent have overhand due to nature of multiple parallel connections. Data splitting and coalescing taking place for the entire data transfer are common overhead processes in both PTCP and GridTorrent. In addition to that, GridTorrent has to fragment files into chuck when to be shared file has been created. It is a one-time process, in contrast to data splitting and merging processes. Moreover, there is an inevitable bandwidth waste in GridTorrent. Allowing the peer to make multiple requests for the same data from different seeds/peers block is the leading cause of the dissipation of network throughput because when the seeds/peers send the requested data block to the peer on request, it only uses the first arriving response and discards the other responses. On LAN, using different number of parallel streams in GridTorrent does not have any positive effect but only the increase in overhead.The other cause of the bandwidth waste in GridTorrent is that control messages exchanged between peers to ensure Bittorrent protocol rules strictly enforced to all participating peers. The wasted bandwidth ratio increases in direct proportion to the number of the seeds and streams. However, as shown in REF _Ref228196077 \h Figure 86, the ratio of wasted bandwidth fluctuates between 0.80%-1.60%.By taking into account of all overheads, REF _Ref228166993 \h Table 84 displays bandwidth utilization of GridTorrent with multiple streams and seeds on IU LAN. Figures from 8-7 to 8-11 display the achieved average throughput of GridTorrent with different parallel streams. Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 6 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 6 The ratio of wasted throughput of GridTorrent with various parallel streams versus the number of seeds on LAN (IU-IU settings)Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 4 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 4 Bandwidth utilization of GridTorrent including overhead with various parallel streams and seeds on LANNumber of SeedsEnd-to-end Mean Bandwidth (Mbps)GT1-OHGT2-OHGT4-OHGT8-OHG16-OH1220.47236.61225.64228.60211.042225.71225.92229.59224.06226.624232.55224.48221.54224.48222.918228.74220.21221.72220.50213.8812218.72219.76217.00215.73213.6816222.80216.59214.98213.82208.7420220.99218.11214.30221.08205.2124219.18217.03218.70210.15208.2028218.26218.06214.52215.73195.3232219.88217.85216.07215.90194.66Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 7 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 7 Achieved average throughput of GridTorrent with and without overhead using one stream with various number of seeds on LAN type computer network (IU-IU settings) Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 8 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 8 Achieved average throughput of GridTorrent with and without overhead using two parallel streams with various number of seeds on LAN type computer network (IU-IU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 9 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 9 Attained average throughput of GridTorrent with and without overhead using four parallel streams with various number of seeds on LAN type computer network (IU-IU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 10 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 10 Achieved average throughput of GridTorrent with and without overhead using eight parallel streams with various number of seeds on LAN type computer network (IU-IU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 11 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 11 Achieved average throughput of GridTorrent with and without overhead using sixteen parallel streams with various number of seeds on LAN type computer network (IU-IU settings)Continental WAN TestIn this test, to evaluate the performance of GridTorrent and PTCP on wide area network (WAN), nodes of the Quarry cluster located at Indiana University at Bloomington, IN is used as servers/seeds and a Teragrid node residing on Louisiana State University computer network at Baton Rouge, LA is used as a client/peer. Similar to LAN test, we used Iperf to measure the maximum available TCP throughput of the underlying network at application level. Following is the available network bandwidth capacities for different criteria:Theoretical Available Bandwidth: 1000 MbpsTheoretical Available Bandwidth for TCP connections: 949.3 MbpsMeasured Available Bandwidth: 560 MbpsRTT = 45 msBandwidth Delay Product (BDP) = 1000x45=5,625KBSimilar to LAN test, it is important to keep in mind that though the nodes used in our tests as servers/seeds are dedicated machines, the underlying network resource has been shared with other nodes connected to same network structure. Thus, network traffics caused by other nodes may have impact on our test results but this is not important because we repeated our tests many times on different time frames to minimize the impacts of network traffic generated by other nodes and our primary goal is to observe the GridTorrent and PTCP behaviors according as different streams and seeds.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 12 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 12 Client and server layout for PTCP test case. Parallel TCP streams were used for data transfer. Server is located at Bloomington, IN, whereas client is at Baton Rouge, LA.Scenario II: TestbedThe setup and procedures used in this scenario are very similar to scenario I, except the location of servers/seeds and client/peer machines. Similarly, a pair of client and server has been used for PTCP performance test, and the number of parallel TCP stream was increased from one to thirty-two. REF _Ref228175530 \h Figure 812 illustrates the connections diagram of PTCP test case. The test configuration of GridTorrent in this scenario, similar to PTCP, is same as that of GridTorrent in the scenario I as depicted in REF _Ref228198833 \h Figure 813.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 13 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 13 GridTorrent test case topology for wide area network test. Similar to PTCP test case configuration, parallel Java sockets are used for data transfer in GridTorrent test case. Seeds and peer’s configurations and locations are same as that of PTCP test case.Scenario II: Test ResultAs WAN is usually called long fat pipes, the expected gains in terms of accomplished data transmission rate should be substantial when the multiple parallel streams used in long-distance data transfer. Test results were agreed with the above premise. REF _Ref228183890 \h Table 85 and REF _Ref228183890 \h Table 85 list the achieved average data transmission rate of PTCP and GridTorrent. End-to-end achieved bandwidths in REF _Ref228191097 \h Table 87 includes the bandwidth waste caused by multiple requests for the same data block in GridTorrent. As seen in REF _Ref228185798 \h Figure 814, bandwidth usage is significantly improved in both GridTorrent and PTCP. The results show that Iperf achieved better throughput than both GridTorrent and PTCP. This is the expected result because Iperf’s primary goal is to measure the end-to-end achievable bandwidth, it transfers data from memory to memory and it uses optimum length of buffers to read or write to avoid the fragmentation. On the other hand, current GridTorrent implementation allows only disk-to-disk data transfer as its data-sharing algorithm is very complex. Thus, we see that disk write speed, around 350Mbps, is the limiting factor for GridTorrent in long-distance data transfer. Yet, it delivers better performance than PTCP’s disk-to-disk version.In contrast to GridTorrent’s performance on local area network, GridTorrent with parallel streams is more effective than using single stream; however, using the fixed high number of parallel streams with any number of seeds/peers is not a good solution because it is not scalable where the swarm, the group of machines that are collectively connected for a particular file, consists of more than eight or twelve seeds or peers as shown in REF _Ref228188990 \h Figure 815. The Figure shows that GridTorrent with sixteen parallel streams reaches the highest bandwidth utilization if there are six seeds, but its performances starts to decrease after that. REF _Ref228188990 \h Figure 815 demonstrates that GridTorrent with sixteen parallel streams yields the poorest performance when there are 32 seeds. Therefore, adjusting the number of parallel streams numbers according to the number of the swarm is the best solution to attain highest performance.Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 5 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 5 Performance characteristics of Iperf, PTCP disk-to-disk and PTCP memory-to-memory with various parallel streams or sources on WANNumber of StreamsEnd-to-end Mean Bandwidth (Mbps)IperfPTCP-DiskPTCP-Memory110.809.549.48220.4715.8814.42327.7019.8520.65435.7023.8226.87546.9024.5329.06658.0036.8043.59879.7049.7860.311096.8051.5661.5912107.0053.3562.8714110.0065.0576.4316146.0076.7589.9820163.00102.0592.8824197.00121.87127.0728248.00126.14127.2032250.00131.82139.2764356.00208.37225.4080470.00286.53287.3996524.00295.23344.47128560.00300.93344.64160488.00331.37369.21192436.00317.74378.78224402.00296.02402.04Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 6 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 6 Bandwidth utilization of GridTorrent with various parallel streams and seeds for useful data transmission on WANNumber of SeedsEnd-to-end Mean Bandwidth (Mbps)GT1GT2GT4GT8G16111.0221.6841.5182.96143.66222.4846.1083.51169.16281.41443.9581.66147.10262.69322.35554.02106.39184.14284.75322.36659.68132.07217.59314.91332.26880.85162.60273.21321.17329.141097.52197.56318.14319.22322.9712127.42237.16320.54324.66313.0814140.85274.58332.12327.65309.0616171.00294.93333.46333.68290.8020211.84318.82336.02327.52287.8924249.49319.66323.16314.91281.3728278.35331.60327.96310.05265.2532280.23314.08327.37299.48257.61For disk-to-disk data transfer, PTCP’s bandwidth utilization rate rises steadily and it reaches its peak value of 331 Mbps at 160th parallel stream. Just after the 160th parallel stream, its data transfer rate starts falling. On the other hand, PTCP’s throughput increases gradually for memory-to-memory transfer. However, it exhibits slightly lower performance than Iperf at the same stream numbers because our PTCP uses only parallel streams to increase.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 14 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 14 Achieved average data transfer rate of Iperf, PTCP and GridTorrent with various parallel flows or seeds on wide area network (IU-LSU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 15 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 15 Achieved average useful data throughput of GridTorrent with various parallel flows or seeds on WAN (IU-LSU settings)OverheadThe overheads of GridTorrent on WAN are similar to the overheads on LAN; the wasted bandwidth ratio increases in direct proportion to the number of the seeds and streams. However, as shown in REF _Ref228201613 \h Figure 816, the ratio of wasted bandwidth recorded on WAN is higher than that of LAN.By taking into account of all overheads, REF _Ref228191097 \h Table 87 displays bandwidth utilization of GridTorrent with multiple streams and seeds on WAN. Figures from 8-17 to 8-21 display the achieved average throughput of GridTorrent with different parallel streams. Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 16 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 16 The ratio of wasted throughput of GridTorrent with various parallel streams versus the number of seeds on WAN (IU-LSU settings)Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 7 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 7 Bandwidth utilization of GridTorrent including overhead with various parallel streams and seeds on WANNumber of SeedsEnd-to-end Mean Bandwidth (Mbps)GT1-OHGT2-OHGT4-OHGT8-OHGT16-OH111.0321.7741.8184.22146.49222.5646.2784.25172.06299.72444.2682.06149.36278.52340.31554.25107.20188.75302.53341.90659.97133.65223.56329.78353.23881.39165.36289.33336.14352.601098.40201.96331.19335.89348.8212129.14244.24336.46342.53338.5714142.67282.86348.46346.96335.7016173.35305.82348.45355.44314.2820216.03333.03351.30355.51315.8224254.81332.16341.42339.90307.3328290.09346.89347.38339.50290.5832297.52328.87351.04334.12284.64Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 17 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 17 Achieved average throughput of Iperf vs GridTorrent with and without overhead using one stream with various number of seeds on WAN (IU-LSU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 18 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 18 Achieved average throughput of Iperf vs GridTorrent with and without overhead using two parallel streams with various number of seeds on WAN (IU-LSU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 19 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 19 Achieved average throughput of Iperf vs GridTorrent with and without overhead using four parallel streams with various number of seeds on WAN (IU-LSU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 20 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 20 Achieved average throughput of Iperf vs GridTorrent with and without overhead using eight parallel streams with various number of seeds on WAN (IU-LSU settings)Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 21 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 21 Achieved average throughput of Iperf vs GridTorrent with and without overhead using sixteen parallel streams with various number of seeds on WAN (IU-LSU settings)Multi-nodesThe strength of GridTorrent emerges from its ability to utilize the idle system resources, particularly network bandwidth, in an effective way, while other bulk data transfer techniques built-on client/server paradigm only focus on the resources between the client and server. This feature renders GridTorrent as ideal candidate for replica systems where there is only one source and multiple clients interested in the same data sets.In this section, we investigate advantage and performance of GridTorrent resulting from the interaction of multiple-nodes. First, we perform theoretical analysis of GridTorrent’s performance with multiple-nodes. Then, we present our tests results which support the theoretical analysis.Another advantage of GridTorrent over PTCP, besides yielding better performance than PTCP on WAN, is the feature of load balancing. Whereas the whole data is sent from a single source in PTCP setup, the approximate amount of data sent from a single seed in GridTorrent setup is:AverageAmountofData=The whole dataNumber of seedsThis feature will help to relieve the bottleneck problem of a single source under a great many requests of data transmission. In fact, if there are multiple peers requesting the same data set, the overall performances of all participating peers in GridTorrent should be better than the performance achieved in client/server model. In other words, GridTorrent’s aggregated network bandwidth should be greater than the network bandwidth between the server and client. We define the aggregated bandwidth as follows:In order to simplify our theoretical analysis of GridTorrent’s performance with multiple-nodes for simulation, we make the following assumptions:Identical resources: All the machines have identical configurations and systems resources such as computation power, memory and storage disk speed, and network bandwidth capacity.Dedicated network resources: All network resources are dedicated to single data transmission process at a time. The influences of other networks traffics are ignored.Identical half-duplex connections: Each connection allows traffic either way, but only one way at a time. Although, the connections of real networks are full-duplex connections, we chosen this case for worst case scenario since peer-to-peer data transfer performs better then PTCP on full-duplex connections.One server/seed and three clients (peers) is illustrated in REF _Ref219442428 \h Figure 822. Whereas client machines can only download data from server in PTCP model, clients (peers) can download from other clients as long as they have any data to offer in GridTorrent model. For the simplicity, we assume that the size of file to be downloaded is 3xN Mb since we have only three clients. We list the sequences matrices of data transmission from server to client or client to client in PTC and GridTorrent in REF _Ref219442467 \h Table 88 and REF _Ref219442469 \h Table 89 respectively. Unlike PTCP clients, if two GridTorrent clients are idle and one of them has data which is required by others, they can send data between them.As seen in REF _Ref219442467 \h Table 88 and REF _Ref219442469 \h Table 89, Client1 (C1) completes its downloading at the end of 3rd second, Client2 (C2) finishes at the end of 6th second and Client3 (C3) receives last segment of data from the server at the end of the 9th second. However, the overall downloading completion time for all clients takes only 5 seconds in GridTorrent data transmission since idle clients helping each other whenever they can. As a result of this simulation, when the number of participating nodes increases, GridTorrent should exhibit better performance than other data transfer techniques which use parallel TCP streams since GridTorrent utilizes the idle network resources between the peers because of its peer-to-peer architecture.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 22 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 22 Multiple nodes representation for GridTorrent and PTCPTable STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 8 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 8 Transmission sequence matrix of PTCPTime (sec)S-C1S-C2S-C3C1C2C31N1N12N2N1,N23N3N1,N2,N34N1N15N2N1,N26N3N1,N2,N37N1N18N2N1,N29N3N1,N2,N3Table STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 9 STYLEREF 1 \s 8 SEQ Table \* ARABIC \s 1 9 Transmission sequence matrix of GridTorrentTime (sec)S-C1S-C2S-C3C1-C2C2-C3C1-C3C1C2C31N1N12N2N1N1N2N13N3N1N1N1,N2N1,N34N2N2N1,N2N1,N2N1,N2,N35N3N3N1,N2,N3N1,N2,N3To investigate the validity of theoretical analysis, we conducted an experiment in which there is one seed and multiple peers and repeated the test on both LAN and WAN. We started with one peer and then increased the number of peers up to twenty. GTxx represents the aggregated bandwidth of GridTorrent with xx parallel streams including all the overheads, whereas GTxx-R illustrates the real bandwidth usage at the seed at given xx parallel streams. The experimental results attest our theoretical analyses both on LAN and WAN. On LAN, as depicted in REF _Ref228208016 \h Figure 823, the aggregated bandwidth of GridTorrent surpasses the bandwidth achieved by Iperf’s at twelve peers. Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 23 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 23 Achieved average aggregated bandwidth of GridTorrent with various parallel streams versus the number of peers on LAN (IU-IU settings)However, Iperf’s maximum achieved bandwidth is exceeded after five peers on WAN as illustrated in REF _Ref228208134 \h Figure 824. For both on LAN and WAN, our test results confirm the load balancing feature of GridTorrent. The average amount of data delivered by the seed remains at the same level as the network utilization of seeds stays around 200 Mbps. In both cases, the aggregated bandwidth increases in direct proportion to the number of the peers and streams.Figure STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 24 STYLEREF 1 \s 8 SEQ Figure \* ARABIC \s 1 24 Achieved average aggregated bandwidth of GridTorrent with various parallel streams versus the number of peers on WAN (IU-LSU settings)SummaryIn this chapter, we evaluated and compared GridTorrent’s performance with that of PTCP both on LAN and WAN. The tests indicate that both GridTorrent and PTCP do not provide any performance gain on LAN type of computer networks. However, on WAN, the performance of GTF is better or not worse than that of parallel TCP. This outcome is important since parallel streaming is used in many scientific computing data transfer tools such as GridFTP. Additionally, using Java socket and parallel TCP indicates that GTF can exploit other high performance data transfer protocols like GridFTP or UDT in traditional low BDP environments at the same time.Conclusions and Future WorkConclusionIn this thesis, we have presented a novel approach for collaboration framework with high performance data transmission capability for scientific community. Contrary to many existing data transfer solutions, based on client-server paradigm (i.e. FTP, HTTP or other type of client-server solutions), we have chosen peer-to-peer paradigm for data transfer mechanism that enable us to employ a service-oriented architecture and make our framework extensible with Web services features. A proof of concept implementation on data management and collaboration was demonstrated. Unlike other heavyweight, platform dependent and cumbersome data catalog and management solutions whose administration tasks require a great deal of the knowledge systems, our prototype of CCM is lightweight, platform independent and it requires minimum system resources, and management and maintenance overhead. In addition, it provides all the basic and major facilities such as search, browse, publish and share capabilities in a simple structure.Furthermore, on the contrary to existing data movement approaches, GridTorrent client uses data transfer technique built on peer-to-peer architecture, which has two contributions:Performance improvementEfficient utilization of available system resourcesOur test results showed that GridTorrent can be faster than or as fast as data movement solutions using parallel TCP streams to improve data transfer speed. Although improving the performance is generally considered the major achievement, we believe that reducing or eliminating waste of available system resources is as important contribution as performance improvement, especially when efficiency and sparingness are becoming a critical issue for every resources of world. Finally, as WS-Tracker is built on Web service architecture, it brings flexibility, extensibility, and scalability to GridTorrent framework. This feature allows GridTorrent framework to be customizable with regard dynamic needs or emerging requirements.Summary of Answers for Research QuestionsHere we summarize the answers for the research questions presented in this thesis.How can we build a peer-to-peer data transfer mechanism which utilizes SOA for scientific community? Which one of available peer-to-peer system is best for this purpose and what type of modifications and new features are needed to be added to it?There are two distinct types of peer-to-peer system architecture. First type of peer-to-peer system architecture is established on non-modular structure in which they integrate all the facilities such as file searching and peer discovery into one system. Second type of peer-to-peer system architecture is built on modular pattern by establishing a clear borderline between data transport algorithm and other required services (e.g. peer discovery and file search services). The former leads a complicated system which is less modular and customizable. Further, it is very difficult to utilize facilities provided by SOA. On the other hand, the latter enable us not only to harness the benefits of SOA, but also to modify services not pertinent to data transfer algorithm according to our needs. This step was very important since our choice will have impact on all the aspects of our design. Therefore, as BitTorrent was the best candidate that falls into second category, we have chosen it as base peer-to-peer data transfer layer. How can we provide a medium that allows participants to manage, share, discover, and download their contents and integrate it with data transfer mechanism?As explained in the previous question, there needs to be a system with modular structure. In BitTorrent, there is no built-in framework which provides content management, sharing, discovery services. However, it provides a simple tracking component used for initial the communication between peers. We developed a separate component aimed to perform services related to the content management and then we converted the basic tracker into a Web service based tracker which capacitates us to add or remove new services. With the help of WS-Tracker Service, we integrated the separated content management module into data transfer layer by permitting them to communicate each other.Is the data transfer mechanism scalable?There are two places involved in data transfer process: WS-Tracker Service and GridTorrent client. Since WS-Tracker Service is built on Web service technology and does not participate actual data transfer operation at all, it should not suffer from scalability issues or it has the same problems that a regular Web service provider encounters.As explained in chapter 4, due to its peer-to-peer nature, GridTorrent client hosting data transfer layer is a basic server with simultaneous upload and download capability. From this aspect, therefore, it can be considered as a regular data server such as an FTP server. However, unlike standard FTP server, the downloaders of a GridTorrent client differ from that of FTP server in three respects: downloading data size, bandwidth usage, and session duration. If, therefore, there are any scalability issues, since scalability of the system is by design, they stemmed from characteristics of the data not the design of GridTorrent. An FTP server, for example, may throttle download size to a certain degree in order to increase the number of downloaders. However, unlike an FTP server, the GridTorrent aims to scientific community which generates very large set of data set and is designed to maximize bandwidth usage as reducing data transmission time is the main concern not the number of simultaneous downloaders. In addition, BitTorrent has proven than it is very scalable and successful data transfer protocol, it was deployed as peer-to-peer file transfer protocol by many commercial enterprises such as Amazon and Warner Brothers.How is the performance of data transfer mechanism and it is acceptable?In chapter 8, we evaluated and compared GridTorrent’s performance with that of PTCP both on LAN and WAN. The tests indicate that both GridTorrent and PTCP do not provide any performance gain on LAN type of computer networks. However, on WAN, the performance of GTF is better or not worse than that of parallel TCP. This outcome is important since parallel streaming is used in many scientific computing data transfer tools such as GridFTP. Additionally, using Java socket and parallel TCP indicates that GTF can exploit other high performance data transfer protocols like GridFTP or UDT in traditional low BDP environments at the same time.What is the overhead of this system and is it reasonable?As explained in chapter 8, our testing results demonstrated that the total size of overhead messages resulted from the communications between the GridTorrent client and WS-Tracker Service is between 148KB to 169 KB. Furthermore, the duration of communications are very short and they do not have any adverse effect on performance even though they takes place during the downloading activity. Therefore, the overhead can be acceptable. Indeed, the overhead size can be ignored when it is compared to file size of 300 MB. How can we make it enough secure for scientific community as security is not a concern in peer-to-peer to networks for non-scientific community?Similar to content management component, BitTorrent does not provide any security mechanism for authentication and authorization. Therefore, we designed and implemented a security framework with access control list capability (ACL) to meet the moderate security requirements and integrated it with GridTorrent framework. TLS is utilized at Asynchronous Collaboration and Content Management module. There is no security implementation between GridTorrent client and WS-Tracker Service as data exchanged between them has no critical information. ACL is deployed at GridTorrent clients to ensure only allowed clients download the particular content. The unique GridTorrent ID over TLS communication is used for authentication and authorization processes. ContributionsNeither high-performance nor peer-to-peer data transfer techniques are not new technologies. They have been around more than couple of decades; however, since techniques used for transferring bulk data in high-speed wide area networks are usually built on FTP or HTTP, utilizing peer-to-peer file transferring protocol for scientific community and integrating it with a framework which enables collaboration and content management is a new approach. This approach has several contributions. The foremost important one is that harnessing power of peer-to-peer file sharing in wide area networks by utilizing unused system resources, particularly network resources. As GridTorrent has many good features because of its design and underlying peer-to-peer file sharing protocol, it provides many useful and vital services from out-of-box. These features are offered as separate services or products in other widely used high-performance data transfer techniques such as GridTorrent. Checking available disk space before starting download process, reliable file transfer, third party data transfer, for example, are some of those featuresAnother contribution is being data structure, system and platform independent. This feature enable our work to be deployable any existing system without changing its data format as an underlying data transfer layer. For instance, one of the goal of the THREDDS (Thematic Realtime Environmental Distributed Data Services) project is to simplify the discovery and use of scientific data between data providers and data users. In this project, data has to be in particular format and are delivered via HTTP. As our work is data format neutral, it can be deployed both as discovery server and as data transfer layer in its existing system.In addition, GridTorrent components are lightweight processes so that they are easily deployable and can require less system resources contrast to other high-performance data transfer solutions. This is important as there are many scientific communities with diverse resource capacity can use GridTorrent without modifying their hardware structure.Finally, Web service based WS-Tracker Service not only exploits benefits of SOA, but also makes it adaptable to future requirement change by allowing to add a new service or to remove an existing one a seamless process.Limitations and Future Research DirectionData Transfer ComponentData transfer algorithm built on BitTorrent algorithm has demonstrated that it performs well both on LAN and WAN even though the basic BitTorrent algorithm was implemented in our prototype. However, there has been great deal of research and effort on BitTorrent in order to eliminate its overhead and improve its performance. Future work can further investigate the BitTorrent algorithm to deliver a higher level of performance. Due to performance issues stemmed from very large data, data is sent over unsecured socket connection in our prototype. If a secure data transmission is required, investigating secure data transfer with acceptable/without performance loss would be good research topic. In addition, in order to further performance improvement, sending and receiving data by compression and decompression can be another good candidate for future investigation and work. Now it supports static content, future work can investigate real-time stream or dynamically changes file content.WS-Tracker ServiceAs WS-Tracker Service exploits benefits of SOA, adding a new service or removing an existing one would be a seamless process. The security framework of GridTorrent framework was designed for moderate security requirements; we have not implemented any security structure for the WS-Tracker Service. However, in particular circumstances where secure communication is necessary, a suitable one among available WS-Security products can be implemented as future work. Asynchronous Collaboration and Content ManagementThe design concepts of the Asynchronous Collaboration and Content Management are to keep it simple, to make it customizable, and to make it lightweight framework. Therefore, only basic features are provided. Adding synchronous more and sophisticated collaboration tools, advanced search techniques are left for future work.Bibliography ADDIN EN.REFLIST 1.Bell, G., J. Gray, and A. Szalay, Petascale Computational Systems. Computer, 2006. 39(1): p. 110-112.2.Foster, I. and C. Kesselman, The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufiuiann, San Francisco, CA. Vol. 211. 1999.3.Foster, I., et al., The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration, June 2002. Open Grid Service Infrastructure WG, Global Grid Forum, 2002.4.Foster, I., et al., A Security Architecture for Computational Grids, in Proceedings of the 5th ACM conference on Computer and communications security. 1998, ACM: San Francisco, California, United States.5.Foster, I., C. Kesselman, and S. Tuecke, The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications, 2001. 15(3): p. 200–222.6.Graham, S.L., M. Snir, and C.A. Patterson, Getting Up To Speed: The Future Of Supercomputing. 2005: National Academy Press.7.Adams, P., et al., Science-Driven Network Requirements for ESnet. 2006, LBNL--61832, Ernest Orlando Lawrence Berkeley NationalLaboratory, Berkeley, CA (US).8.Allcock, W., GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20). 2003.9.Dickens, P., FOBS: A Lightweight Communication Protocol for Grid Computing. Lecture Notes in Computer Science, 2003: p. 938-946.10.Booth, D., et al., Web Services Architecture. W3C Working Group Note, 2004. 11: p. 2005-1.11.Channabasavaiah, K., K. Holley, and E. Tuggle, Migrating to a Service-oriented Architecture. IBM White Paper, 2004.12.Werthimer, D., et al. A New Major SETI Project Based on Project Serendip Data and 100,000 Personal Computers. in Proceedings of the Fifth International Conference on Bioastronomy. 1997.13.The seti@home project web site. Accessed on-line 2008; Available from: HYPERLINK "" , S. and D. Spinellis, A Survey of Peer-to-Peer Content Distribution Technologies. ACM Computing Surveys, 2004. 36(4): p. 335-371.15.Larson, S.M., C. Snow, and V. Pande, Modern Methods in Computational Biology. 2003, Horizon Press.16.The genome@home project web site. Accessed on-line 2008; Available from: HYPERLINK "" , A., et al., GridTorrent: Optimizing data transfers in the Grid with collaborative sharing. 11th Panhellenic Conference on Informatics (Patras, Greece, May 2007). PCI2007, 2007.18.McNab, A., S. Kaushal, and Y. Li, Web servers for bulk file transfer and storage in CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing). 2006: Mumbai, India.19.Voyager, The Interstellar Mission:. 2008; Available from: HYPERLINK "" I. Available from: HYPERLINK "" Program. Available from: HYPERLINK "" , Y., et al., Mechanisms for High Volume Data Transfer in Grids. 2007.23.Allcock, B., et al., Data Management and Transfer in High Performance Computational Grid Environments. Parallel Computing, 2002. 28(5): p. 749-771.24.Gibson, G. and R. Van Meter, Network Attached Storage Architecture. Communications of the ACM, 2000. 43(11): p. 37-45.25.Anglano, C. and M. Canonico, A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications, in Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 2004, IEEE Computer Society.26.Mathis, M., et al., RFC2018: TCP Selective Acknowledgement Options. RFC Editor United States, 1996.27.Floyd, S., RFC3649: HighSpeed TCP for Large Congestion Windows. Internet RFCs, 2003.28.Kelly, T. Scalable TCP: Improving Performance in High Speed Wide Area Networks. in of First International Workshop on Protocols for Fast Long-Distance Networks. 2003. CERN, Geneva, Switzerland.29.Wu, R.X. and A.A. Chien. GTP: Group Transport Protocol for Lambda-Grids. in Cluster Computing and the Grid, 2004. CCGrid 2004. IEEE International Symposium on. 2004.30.Zhang, Y., E. Yan, and S. Dao, A Measurement of TCP over Long-Delay Network. Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis, 1998.31.Postel, J. and J. Reynolds, File Transfer Protocol (FTP), in RFC Editor United States. 1985, STD 9, RFC 959, October 1985.32.Allcock, W.E., GridFTP: Protocol Extensions to FTP for the Grid. 2003.33.bbFTP --Large files transfer protocol 2005; Available from: HYPERLINK "" Copy-. 2007; Available from: HYPERLINK "" , A., Peer-to-Peer Computing for Secure High Performance Data Copying, in Computing in High Energy Phyasics. 2001: Beijing.36.Allcock, W., et al. The Globus Striped GridFTP Framework and Server. 2005.37.Allcock, B., et al., Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing. IEEE Mass Storage Conference, 2001. 20.38.Horowitz, M. and S. Lunt, FTP Security Extensions, in RFC Editor United States. 1997.39.What is GridFTP ? . 2004; Available from: HYPERLINK "" Alliance, GridFTP: Universal Data Transfer for the Grid, in Globus Project White Paper, University of Chicago. 2000.41.Globus Alliance. Reliable File Transfer Service (RFT). 2007; Available from: HYPERLINK "" , R., C. Hood, and W. Allcock. Reliable File Transfer in Grid Environments. in Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on. 2002.43.Allcock, W.E., I. Foster, and R. Madduri, Reliable Data Transport: A Critical Service for the Grid, in Building Service Based Grids Workshop, Global Grid Forum. 2004.44.Globus Alliance. globus-url-copy Documentation. 2007; Available from: HYPERLINK "" 45.Globus Alliance. Moving Data Fast on the TeraGrid. 2007; Available from: HYPERLINK "" , M. and I. Foster, A Decentralized, Adaptive Replica Location Mechanism, in Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing. 2002, IEEE Computer Society.47.MySQL. 2007; Available from: HYPERLINK "" Alliance. Replica Location Service (RLS). 2007; Available from: HYPERLINK "" , J., et al. Globus GridFTP: What's New in 2007. in Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007). 2007.50.GridSite Team. Grid Security for the Web, Web platforms for Grids. 2008; Available from: HYPERLINK "" , H., S. Bailey, and R.L. Grossman, PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks. Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM), 2000.52.Mattmann, C.A., et al. A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products. in Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park. 2006. Maryland, USA.53.Web Maintenance Team of cc.. Off-Site File Transfer Facilities. 2008; Available from: HYPERLINK "" , D. and S. McPeak, SafeTP: Transparently Securing FTP Network Services. Computer, 2001.55.Bonachea, D. and S. McPeak. SafeTP: Secure FTP Transparently. 2008; Available from: HYPERLINK "" , Y. and R. Grossman, UDT: UDP-based data transfer for high-speed wide area networks. Computer Networks, 2007. 51(7): p. 1777-1799.57.Gu, Y. and R. Grossman, SABUL: A Transport Protocol for Grid Computing. Journal of Grid Computing, 2003. 1(4): p. 377-386.58.He, E., et al. Reliable Blast UDP: Predictable High Performance Bulk Data Transfer. in Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on. 2002.59.Meiss, M., Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer. 2002, Indiana University.60.Wallace, S. Tsunami File Transfer Protocol. in Proceedings of First Int. Workshop on Protocols for Fast Long-Distance Networks. 2003. CERN, Geneva, Switzerland.61.Bush, D. UFTP - UDP Based FTP with Multicast. 2001 July 29, 2008; Available from: HYPERLINK "" , X., A.P. Mudambi, and M. Veeraraghavan, FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits. Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks, 2004.63.Gu, Y., et al., Using UDP for Reliable Data Transfer over High Bandwidth-Delay Product Networks. Laboratory for Advanced Computing, University of Illinois at Chicage, 2003.64.Dickens, P.M. and V. Kannan, Application-Level Congestion Control Mechanisms for Large Scale Data Transfers Across Computational Grids. the Proceedings of The International Conference on High Performance Distributed Computing and Applications, 2003.65.Ansari, S. Tsunami—A Study. Available from: HYPERLINK "" , D., K. Fischbach, and C. Schmitt, Core Concepts in Peer-to-Peer Networking, in Peer-to-Peer Computing: The Evolution of a Disruptive Technology, R. Subramanian and B.D. Goodman, Editors. 2005, Idea Group Publishing. p. 300 pages.67.Schoder, D. and K. Fischbach, Peer-to-Peer Prospects. Communications of the ACM, 2003. 46(2): p. 27-29.68.The Kazaa web site. Accessed on-line 2008; Available from: HYPERLINK "" , A., Peer-to-Peer: Harnessing the Power of Disruptive Technologies. First ed. 2001: O'Reilly & Associates, Inc. 432.70.The Jabber web site. Accessed on-line 2008; Available from: HYPERLINK "" Renesse, R., et al. Heterogeneity-Aware Peer-to-Peer Multicast. in Proceedings of the 17th International Symposium on Distributed Computing (DISC2003). 2003.72.Castro, M., et al., Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure. Selected Areas in Communications, IEEE Journal on, 2002. 20(8): p. 1489-1499.73.Stoica, I., et al., Internet Indirection Infrastructure. IEEE/ACM Trans. Netw., 2004. 12(2): p. 205-218.74.Janakiraman, R., M. Waldvogel, and Q. Zhang, Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention, in Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. 2003, IEEE Computer Society. p. 226.75.Keromytis, A.D., V. Misra, and D. Rubenstein, SOS: Secure Overlay Services, in Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications. 2002, ACM: Pittsburgh, Pennsylvania, USA. p. 61-72.76.Vlachos, V., S. Androutsellis-Theotokis, and D. Spinellis, Security Applications of Peer-to-Peer Networks. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2004. 45(2): p. 195-205.77.Bernstein, P., et al. Data Management for Peer-to-Peer Computing: A Vision. in Proceedings of the Fifth International Workshop on the Web and Databases. 2002.78.Huebsch, R., et al., Querying the Internet with PIER, in Proceedings of the 29th International Conference on Very Large Data Bases. 2003, VLDB Endowment: Berlin, Germany. p. 321-332.79.The Napster web site. Accessed on-line 2008; Available from: HYPERLINK "" , M., A.D. Rubin, and L.F. Cranor, Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System, in Proceedings of the 9th Conference on USENIX Security Symposium. 2000, USENIX Association: Denver, Colorado. p. 5-5.81.Ripeanu, M. Peer-to-Peer Architecture Case Study: Gnutella network. in Proceedings of First International Conference on Peer-to-Peer Computing. 2001.82.Clarke, I., et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System in Designing Privacy Enhancing Technologies. in Proceedings of ICSI Workshop on Design Issues in Anonymity and Unobservability. 2000.83.Druschel, P. and A. Rowstron. PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility. in Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on. 2001.84.Stoica, I., et al., Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. Networking, IEEE/ACM Transactions on, 2003. 11(1): p. 17-32.85.Dingledine, R., M. Freedman, and D. Molnar. The Free Haven Project: Distributed Anonymous Storage Service. in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. 2000.86.Cohen, B. Bittorrent. 2007 [cited 2007 ]; Available from: HYPERLINK "" JXTA project web site. Accessed on-line 2008; Available from: , D. Brian's BitTorrent FAQ and Guide. Accessed on-line 2008; Available from: HYPERLINK "" , E. and B. Huberman, Free Riding on Gnutella. First Monday, 2000. 5(10): p. 2-13.90.Ramaswamy, L. and L. Ling. Free Riding: A New Challenge to Peer-to-Peer File Sharing Systems. in System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on. 2003.91.Feldman, M., et al., Free-Riding and Whitewashing in Peer-to-Peer Systems. Selected Areas in Communications, IEEE Journal on, 2006. 24(5): p. 1010-1019.92.Amazon Simple Storage Service (Amazon S3):. Accessed on-line 2008; Available from: HYPERLINK "" "The Storage Resource Broker". Available from: HYPERLINK "" , B.L., et al. A Network-Aware Distributed Storage Cache for Data Intensive Environments. in Proceedings of The Eighth International Symposium on High Performance Distributed Computing 1999.95.Watson, R.W., et al. The Parallel I/O Architecture of the High-Performance Storage System (HPSS). in Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS'95). 1995.96.HDF5- "Hierarchical Data Format 5". Available from: HYPERLINK "" , J., et al., GPFS: A Parallel File System. IBM Redbook SG: p. 24-5165.98.Tate, J., F. Lucchese, and R. Moore, Introduction to Storage Area Networks. 2006: IBM Corp.99.Green Bank Telescope. 2008 [cited 2008 March]; Available from: HYPERLINK "" Space Telescope. 2008 [cited 2008 March]; Available from: HYPERLINK "" , G.A. and G. McCance. Grid Data Management: Reliable File Transfer Services' Performance. in Computing in High Energy and Nuclear Physics (CHEP'06). 2006. Mumbai, India.102.Sotomayor, B. The Globus Toolkit 4 Programmer's Tutorial. 2005; Available from: HYPERLINK "" , V., Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective. 2005.104.Mahemoff, M., Ajax Design Patterns. 2006: O'Reilly Media, Inc.105.Kaplan, A., G.C. Fox, and G. von Laszewski, GridTorrent Framework: A High-performance Data Transfer and Data Sharing Framework for Scientific Computing, in GCE07 Workshop. 2007: Reno Nevada.106.Gu, Y., UDT: A High Performance Data Transport Protocol. 2005, University of Illinois.107.Service-oriented architecture (SOA) definition. 2007; Available from: HYPERLINK "" , J., S. Tuecke, and V. Welch, An Online Credential Repository for the Grid: MyProxy, in Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing. 2001, IEEE Computer Society.109.Plos One: Publishing science, accelerating research. 2008; Available from: HYPERLINK "" , M.M. Science 2.0 -- Is Open Access Science the Future? . April, 2008; Available from: HYPERLINK "" , T., Programming Microsoft Outlook and Microsoft Exchange. 1999: Microsoft Press Redmond, Wash.112.Antonovich, M., Office and SharePoint 2007 User's Guide: Integrating SharePoint with Excel, Outlook, Access and Word. 2008: Apress.113.Vandyk, J. and M. Westgate, Pro Drupal Development. 2007: Apress.114.Farmer, J. and I. Dolphin, Sakai: eLearning and More, in EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World. 2005: Manchester, UK.115.Gilster, R., Microsoft? Office SharePoint? Server 2007: A Beginner's Guide (Beginner's Guide (Osborne Mcgraw Hill)). 2007.116.Mercer, D., Building Powerful and Robust Websites with Drupal 6: Build your own professional blog, forum, portal or community website with Drupal 6. 2008: Packt Publishing.117.Sakai Project. 2008; Available from: HYPERLINK "" . 2008; Available from: HYPERLINK "" , B., Protection. ACM SIGOPS Operating Systems Review, 1974. 8(1): p. 18-24.120.Bishop, M., Introduction to Computer Security. 2004: Addison-Wesley Professional.121.Ferraiolo, D.F., R.D. Kuhn, and R. Chandramouli, Role-Based Access Control, Second Edition. 2007: Artech House, Inc.122.Ferraiolo, D., J. Cugini, and D. Kuhn. Role-Based Access Control (RBAC): Features and Motivations. in Proceedings of the Eleventh Annual Computer Security Applications Conference. 1995.123.Sandhu, R.S., et al., Role-Based Access Control Models. Computer, 1996. 29(2): p. 38-47.124.Chadwick, D.W. and A. Otenko, The PERMIS X. 509 role based privilege management infrastructure. Future Generation Computer Systems, 2003. 19(2): p. 277-289.125.Dommel, H. and J. Garcia-Luna-Aceves. Design Issues for Floor Control Protocols. in Proceedings of SPIE Multimedia and Networking. 1995: SPIE.126.Dommel, H. and J. Garcia-Luna-Aceves, Floor control for multimedia conferencing and collaboration. Multimedia Systems, 1997. 5(1): p. 23-38.127.Koskelainen, P., et al., Requirements for Floor Control Protocols, in RFC Editor United States. 2006, RFC 4376, February 2006.128.W3C World Wide Web Consortium. 2008; Available from: HYPERLINK "" , T., L. Clement, and C. von Riegen, UDDI Version 3.0. 1: UDDI Spec Technical Committee Specification. 2003.130.Curbera, F., et al., Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI. IEEE Internet Computing, 2002. 6(2): p. 86-93.131.Erl, T., Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services. 2004: Prentice Hall PTR Upper Saddle River, NJ, USA.132.Corba: A Guide to Common Object Request Broker Architecture, ed. R. Ben-Natan. 1995: McGraw-Hill, Inc. 353.133.Redmond, F., Dcom: Microsoft Distributed Component Object Model with Cdrom. 1997: IDG Books Worldwide, Inc. Foster City, CA, USA.134.Sun Microsystems, Java Remote Method Invocation Specification. Sun Microsystems, Palo Alto, CA, 1997. 30: p. 31.135.Kirtland, M., A Platform for Web Services. Microsoft Developer Network, 2001.136.List of Web Service Specifications. 2008; Available from: HYPERLINK "" , L., et al., A Community Authorization Service for Group Collaboration, in Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02). 2002, IEEE Computer Society.138.Naedele, M., Standards for XML and Web services security. Computer, 2003. 36(4): p. 96-98.139.Lang, B., et al., A Multipolicy Authorization Framework for Grid Security. Proc. Fifth IEEE Symposium on Network Computing and Application, 2006.140.Neuman, B.C. and T. Ts'o, Kerberos: An Authentication Service for Computer Networks. Communications Magazine, IEEE, 1994. 32(9): p. 33-38.141.Thompson, M.R., A. Essiari, and S. Mudumbai, Certificate-based authorization policy in a PKI environment. ACM Transactions on Information and System Security (TISSEC), 2003. 6(4): p. 566-588.142.Shibboleth. Available from: HYPERLINK "" , V., et al., Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration. 4th Annual PKI R&D Workshop, 2005.144.Barton, T., et al. Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, Gridshib, and MyProxy. in Proceedings of 5th Annual PKI R&D Workshop. 2006.145.Alfieri, R., et al., VOMS, an Authorization System for Virtual Organizations. European Across Grids Conference, 2003. 2970: p. 33–40.146.Globus Alliance. The Globus Project. ]; Available from: HYPERLINK "" , D., M. Handley, and C. Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. Dina Katabi, Mark Handley, and Charles Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. ACM Sigcomm 2002, August 2002. URL HYPERLINK "" . 2002.148.Floyd, S., et al., Equation-based congestion control for unicast applications. Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2000: p. 43-56.149.Lim, S.B., et al., GridFTP and Parallel TCP Support in NaradaBrokering. Distributed And Parallel Computing: 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005: Proceedings, 2005.150.Burnap, P., Bulut, H., Pallickara, S., Fox, G., Walker, D., A. Kaplan, B. Yildiz, and Nacar, M. A. Worldwide Messaging Support for High Performance Real-time Collaboration. in The UK e-Science All Hands Meeting. 2005. Nottingham, UK.151.Al-Kiswany, S., et al., Are P2P Data-Dissemination Techniques Viable in Today's Data-Intensive Scientific Collaborations? Lecture Notes in Computer Science, 2007. 4641: p. 404.1.Bell, G., J. Gray, and A. Szalay, Petascale Computational Systems. Computer, 2006. 39(1): p. 110-112.2.Foster, I. and C. Kesselman, The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufiuiann, San Francisco, CA. Vol. 211. 1999.3.Foster, I., et al., The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration, June 2002. Open Grid Service Infrastructure WG, Global Grid Forum, 2002.4.Foster, I., et al., A Security Architecture for Computational Grids, in Proceedings of the 5th ACM conference on Computer and communications security. 1998, ACM: San Francisco, California, United States.5.Foster, I., C. Kesselman, and S. Tuecke, The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications, 2001. 15(3): p. 200–222.6.Graham, S.L., M. Snir, and C.A. Patterson, Getting Up To Speed: The Future Of Supercomputing. 2005: National Academy Press.7.Adams, P., et al., Science-Driven Network Requirements for ESnet. 2006, LBNL--61832, Ernest Orlando Lawrence Berkeley NationalLaboratory, Berkeley, CA (US).8.Allcock, W., GridFTP Protocol Specification (Global Grid Forum Recommendation GFD.20). 2003.9.Dickens, P., FOBS: A Lightweight Communication Protocol for Grid Computing. Lecture Notes in Computer Science, 2003: p. 938-946.10.Booth, D., et al., Web Services Architecture. W3C Working Group Note, 2004. 11: p. 2005-1.11.Channabasavaiah, K., K. Holley, and E. Tuggle, Migrating to a Service-oriented Architecture. IBM White Paper, 2004.12.Werthimer, D., et al. A New Major SETI Project Based on Project Serendip Data and 100,000 Personal Computers. in Proceedings of the Fifth International Conference on Bioastronomy. 1997.13.The seti@home project web site. Accessed on-line 2008; Available from: HYPERLINK "", S. and D. Spinellis, A Survey of Peer-to-Peer Content Distribution Technologies. ACM Computing Surveys, 2004. 36(4): p. 335-371.15.Larson, S.M., C. Snow, and V. Pande, Modern Methods in Computational Biology. 2003, Horizon Press.16.The genome@home project web site. Accessed on-line 2008; Available from: HYPERLINK "", A., et al., GridTorrent: Optimizing data transfers in the Grid with collaborative sharing. 11th Panhellenic Conference on Informatics (Patras, Greece, May 2007). PCI2007, 2007.18.McNab, A., S. Kaushal, and Y. Li, Web servers for bulk file transfer and storage in CHEP 06 Computing in High Energy and Nuclear Physics (Distributed Event production and processing). 2006: Mumbai, India.19.Voyager, The Interstellar Mission:. 2008; Available from: HYPERLINK "" I. Available from: HYPERLINK "" Program. Available from: HYPERLINK "", Y., et al., Mechanisms for High Volume Data Transfer in Grids. 2007.23.Allcock, B., et al., Data Management and Transfer in High Performance Computational Grid Environments. Parallel Computing, 2002. 28(5): p. 749-771.24.Gibson, G. and R. Van Meter, Network Attached Storage Architecture. Communications of the ACM, 2000. 43(11): p. 37-45.25.Anglano, C. and M. Canonico, A Comparative Evaluation of High-Performance File Transfer Systems for Data-Intensive Grid Applications, in Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 2004, IEEE Computer Society.26.Mathis, M., et al., RFC2018: TCP Selective Acknowledgement Options. RFC Editor United States, 1996.27.Floyd, S., RFC3649: HighSpeed TCP for Large Congestion Windows. Internet RFCs, 2003.28.Kelly, T. Scalable TCP: Improving Performance in High Speed Wide Area Networks. in of First International Workshop on Protocols for Fast Long-Distance Networks. 2003. CERN, Geneva, Switzerland.29.Wu, R.X. and A.A. Chien. GTP: Group Transport Protocol for Lambda-Grids. in Cluster Computing and the Grid, 2004. CCGrid 2004. IEEE International Symposium on. 2004.30.Zhang, Y., E. Yan, and S. Dao, A Measurement of TCP over Long-Delay Network. Proceedings of 6th Int’l Conference on Telecommunication Systems, Modelling, and Analysis, 1998.31.Postel, J. and J. Reynolds, File Transfer Protocol (FTP), in RFC Editor United States. 1985, STD 9, RFC 959, October 1985.32.Allcock, W.E., GridFTP: Protocol Extensions to FTP for the Grid. 2003.33.bbFTP --Large files transfer protocol 2005; Available from: HYPERLINK "" Copy-. 2007; Available from: HYPERLINK "", A., Peer-to-Peer Computing for Secure High Performance Data Copying, in Computing in High Energy Phyasics. 2001: Beijing.36.Allcock, W., et al. The Globus Striped GridFTP Framework and Server. 2005.37.Allcock, B., et al., Secure, Efficient Data Transport and Replica Management for High-Performance Data-Intensive Computing. IEEE Mass Storage Conference, 2001. 20.38.Horowitz, M. and S. Lunt, FTP Security Extensions, in RFC Editor United States. 1997.39.What is GridFTP ? . 2004; Available from: HYPERLINK "" Alliance, GridFTP: Universal Data Transfer for the Grid, in Globus Project White Paper, University of Chicago. 2000.41.Globus Alliance. Reliable File Transfer Service (RFT). 2007; Available from: HYPERLINK "", R., C. Hood, and W. Allcock. Reliable File Transfer in Grid Environments. in Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on. 2002.43.Allcock, W.E., I. Foster, and R. Madduri, Reliable Data Transport: A Critical Service for the Grid, in Building Service Based Grids Workshop, Global Grid Forum. 2004.44.Globus Alliance. globus-url-copy Documentation. 2007; Available from: HYPERLINK "" 45.Globus Alliance. Moving Data Fast on the TeraGrid. 2007; Available from: HYPERLINK "", M. and I. Foster, A Decentralized, Adaptive Replica Location Mechanism, in Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing. 2002, IEEE Computer Society.47.MySQL. 2007; Available from: HYPERLINK "" Alliance. Replica Location Service (RLS). 2007; Available from: HYPERLINK "", J., et al. Globus GridFTP: What's New in 2007. in Proceedings of the First International Conference on Networks for Grid Applications (GridNets 2007). 2007.50.GridSite Team. Grid Security for the Web, Web platforms for Grids. 2008; Available from: HYPERLINK "", H., S. Bailey, and R.L. Grossman, PSockets: The Case for Application-level Network Striping for Data Intensive Applications using High Speed Wide Area Networks. Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM), 2000.52.Mattmann, C.A., et al. A Classification and Evaluation of Data Movement Technologies for the Delivery of Highly Voluminous Scientific Data Products. in Proceedings of the NASA/IEEE Conference on Mass Storage Systems and Technologies College Park. 2006. Maryland, USA.53.Web Maintenance Team of cc.. Off-Site File Transfer Facilities. 2008; Available from: HYPERLINK "", D. and S. McPeak, SafeTP: Transparently Securing FTP Network Services. Computer, 2001.55.Bonachea, D. and S. McPeak. SafeTP: Secure FTP Transparently. 2008; Available from: HYPERLINK "", Y. and R. Grossman, UDT: UDP-based data transfer for high-speed wide area networks. Computer Networks, 2007. 51(7): p. 1777-1799.57.Gu, Y. and R. Grossman, SABUL: A Transport Protocol for Grid Computing. Journal of Grid Computing, 2003. 1(4): p. 377-386.58.He, E., et al. Reliable Blast UDP: Predictable High Performance Bulk Data Transfer. in Cluster Computing, 2002. Proceedings. 2002 IEEE International Conference on. 2002.59.Meiss, M., Tsunami: A High-Speed Rate-Controlled Protocol for File Transfer. 2002, Indiana University.60.Wallace, S. Tsunami File Transfer Protocol. in Proceedings of First Int. Workshop on Protocols for Fast Long-Distance Networks. 2003. CERN, Geneva, Switzerland.61.Bush, D. UFTP - UDP Based FTP with Multicast. 2001 July 29, 2008; Available from: HYPERLINK "", X., A.P. Mudambi, and M. Veeraraghavan, FRTP: Fixed rate transport protocol-a modified version of sabul for end-to-end circuits. Proceedings of the 1 stInternational Workshop on Provisioning and Transport for Hybrid Networks (PATHNETS), in conjunction with the 1 stInternational Conference on Broadband Networks, 2004.63.Gu, Y., et al., Using UDP for Reliable Data Transfer over High Bandwidth-Delay Product Networks. Laboratory for Advanced Computing, University of Illinois at Chicage, 2003.64.Dickens, P.M. and V. Kannan, Application-Level Congestion Control Mechanisms for Large Scale Data Transfers Across Computational Grids. the Proceedings of The International Conference on High Performance Distributed Computing and Applications, 2003.65.Ansari, S. Tsunami—A Study. Available from: HYPERLINK "", D., K. Fischbach, and C. Schmitt, Core Concepts in Peer-to-Peer Networking, in Peer-to-Peer Computing: The Evolution of a Disruptive Technology, R. Subramanian and B.D. Goodman, Editors. 2005, Idea Group Publishing. p. 300 pages.67.Schoder, D. and K. Fischbach, Peer-to-Peer Prospects. Communications of the ACM, 2003. 46(2): p. 27-29.68.The Kazaa web site. Accessed on-line 2008; Available from: HYPERLINK "", A., Peer-to-Peer: Harnessing the Power of Disruptive Technologies. First ed. 2001: O'Reilly & Associates, Inc. 432.70.The Jabber web site. Accessed on-line 2008; Available from: HYPERLINK "" Renesse, R., et al. Heterogeneity-Aware Peer-to-Peer Multicast. in Proceedings of the 17th International Symposium on Distributed Computing (DISC2003). 2003.72.Castro, M., et al., Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure. Selected Areas in Communications, IEEE Journal on, 2002. 20(8): p. 1489-1499.73.Stoica, I., et al., Internet Indirection Infrastructure. IEEE/ACM Trans. Netw., 2004. 12(2): p. 205-218.74.Janakiraman, R., M. Waldvogel, and Q. Zhang, Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention, in Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. 2003, IEEE Computer Society. p. 226.75.Keromytis, A.D., V. Misra, and D. Rubenstein, SOS: Secure Overlay Services, in Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications. 2002, ACM: Pittsburgh, Pennsylvania, USA. p. 61-72.76.Vlachos, V., S. Androutsellis-Theotokis, and D. Spinellis, Security Applications of Peer-to-Peer Networks. Computer Networks: The International Journal of Computer and Telecommunications Networking, 2004. 45(2): p. 195-205.77.Bernstein, P., et al. Data Management for Peer-to-Peer Computing: A Vision. in Proceedings of the Fifth International Workshop on the Web and Databases. 2002.78.Huebsch, R., et al., Querying the Internet with PIER, in Proceedings of the 29th International Conference on Very Large Data Bases. 2003, VLDB Endowment: Berlin, Germany. p. 321-332.79.The Napster web site. Accessed on-line 2008; Available from: HYPERLINK "", M., A.D. Rubin, and L.F. Cranor, Publius: A Robust, Tamper-Evident, Censorship-Resistant Web Publishing System, in Proceedings of the 9th Conference on USENIX Security Symposium. 2000, USENIX Association: Denver, Colorado. p. 5-5.81.Ripeanu, M. Peer-to-Peer Architecture Case Study: Gnutella network. in Proceedings of First International Conference on Peer-to-Peer Computing. 2001.82.Clarke, I., et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System in Designing Privacy Enhancing Technologies. in Proceedings of ICSI Workshop on Design Issues in Anonymity and Unobservability. 2000.83.Druschel, P. and A. Rowstron. PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility. in Hot Topics in Operating Systems, 2001. Proceedings of the Eighth Workshop on. 2001.84.Stoica, I., et al., Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. Networking, IEEE/ACM Transactions on, 2003. 11(1): p. 17-32.85.Dingledine, R., M. Freedman, and D. Molnar. The Free Haven Project: Distributed Anonymous Storage Service. in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability. 2000.86.Cohen, B. Bittorrent. 2007 [cited 2007 ]; Available from: HYPERLINK "" JXTA project web site. Accessed on-line 2008; Available from: , D. Brian's BitTorrent FAQ and Guide. Accessed on-line 2008; Available from: HYPERLINK "", E. and B. Huberman, Free Riding on Gnutella. First Monday, 2000. 5(10): p. 2-13.90.Ramaswamy, L. and L. Ling. Free Riding: A New Challenge to Peer-to-Peer File Sharing Systems. in System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on. 2003.91.Feldman, M., et al., Free-Riding and Whitewashing in Peer-to-Peer Systems. Selected Areas in Communications, IEEE Journal on, 2006. 24(5): p. 1010-1019.92.Amazon Simple Storage Service (Amazon S3):. Accessed on-line 2008; Available from: HYPERLINK "" "The Storage Resource Broker". Available from: HYPERLINK "", B.L., et al. A Network-Aware Distributed Storage Cache for Data Intensive Environments. in Proceedings of The Eighth International Symposium on High Performance Distributed Computing 1999.95.Watson, R.W., et al. The Parallel I/O Architecture of the High-Performance Storage System (HPSS). in Proceedings of the Fourteenth IEEE Symposium on Mass Storage Systems (MSS'95). 1995.96.HDF5- "Hierarchical Data Format 5". Available from: HYPERLINK "", J., et al., GPFS: A Parallel File System. IBM Redbook SG: p. 24-5165.98.Tate, J., F. Lucchese, and R. Moore, Introduction to Storage Area Networks. 2006: IBM Corp.99.Green Bank Telescope. 2008 [cited 2008 March]; Available from: HYPERLINK "" Space Telescope. 2008 [cited 2008 March]; Available from: HYPERLINK "", G.A. and G. McCance. Grid Data Management: Reliable File Transfer Services' Performance. in Computing in High Energy and Nuclear Physics (CHEP'06). 2006. Mumbai, India.102.Sotomayor, B. The Globus Toolkit 4 Programmer's Tutorial. 2005; Available from: HYPERLINK "", V., Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective. 2005.104.Mahemoff, M., Ajax Design Patterns. 2006: O'Reilly Media, Inc.105.Kaplan, A., G.C. Fox, and G. von Laszewski, GridTorrent Framework: A High-performance Data Transfer and Data Sharing Framework for Scientific Computing, in GCE07 Workshop. 2007: Reno Nevada.106.Gu, Y., UDT: A High Performance Data Transport Protocol. 2005, University of Illinois.107.Service-oriented architecture (SOA) definition. 2007; Available from: HYPERLINK "", J., S. Tuecke, and V. Welch, An Online Credential Repository for the Grid: MyProxy, in Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing. 2001, IEEE Computer Society.109.Plos One: Publishing science, accelerating research. 2008; Available from: HYPERLINK "", M.M. Science 2.0 -- Is Open Access Science the Future? . April, 2008; Available from: HYPERLINK "", T., Programming Microsoft Outlook and Microsoft Exchange. 1999: Microsoft Press Redmond, Wash.112.Antonovich, M., Office and SharePoint 2007 User's Guide: Integrating SharePoint with Excel, Outlook, Access and Word. 2008: Apress.113.Vandyk, J. and M. Westgate, Pro Drupal Development. 2007: Apress.114.Farmer, J. and I. Dolphin, Sakai: eLearning and More, in EUNIS 2005-Leadership and Strategy in a Cyber-Infrastructure World. 2005: Manchester, UK.115.Gilster, R., Microsoft? Office SharePoint? Server 2007: A Beginner's Guide (Beginner's Guide (Osborne Mcgraw Hill)). 2007.116.Mercer, D., Building Powerful and Robust Websites with Drupal 6: Build your own professional blog, forum, portal or community website with Drupal 6. 2008: Packt Publishing.117.Sakai Project. 2008; Available from: HYPERLINK "". 2008; Available from: HYPERLINK "", B., Protection. ACM SIGOPS Operating Systems Review, 1974. 8(1): p. 18-24.120.Bishop, M., Introduction to Computer Security. 2004: Addison-Wesley Professional.121.Ferraiolo, D.F., R.D. Kuhn, and R. Chandramouli, Role-Based Access Control, Second Edition. 2007: Artech House, Inc.122.Ferraiolo, D., J. Cugini, and D. Kuhn. Role-Based Access Control (RBAC): Features and Motivations. in Proceedings of the Eleventh Annual Computer Security Applications Conference. 1995.123.Sandhu, R.S., et al., Role-Based Access Control Models. Computer, 1996. 29(2): p. 38-47.124.Chadwick, D.W. and A. Otenko, The PERMIS X. 509 role based privilege management infrastructure. Future Generation Computer Systems, 2003. 19(2): p. 277-289.125.Dommel, H. and J. Garcia-Luna-Aceves. Design Issues for Floor Control Protocols. in Proceedings of SPIE Multimedia and Networking. 1995: SPIE.126.Dommel, H. and J. Garcia-Luna-Aceves, Floor control for multimedia conferencing and collaboration. Multimedia Systems, 1997. 5(1): p. 23-38.127.Koskelainen, P., et al., Requirements for Floor Control Protocols, in RFC Editor United States. 2006, RFC 4376, February 2006.128.W3C World Wide Web Consortium. 2008; Available from: HYPERLINK "", T., L. Clement, and C. von Riegen, UDDI Version 3.0. 1: UDDI Spec Technical Committee Specification. 2003.130.Curbera, F., et al., Unraveling the Web Services Web: An Introduction to SOAP, WSDL, and UDDI. IEEE Internet Computing, 2002. 6(2): p. 86-93.131.Erl, T., Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services. 2004: Prentice Hall PTR Upper Saddle River, NJ, USA.132.Corba: A Guide to Common Object Request Broker Architecture, ed. R. Ben-Natan. 1995: McGraw-Hill, Inc. 353.133.Redmond, F., Dcom: Microsoft Distributed Component Object Model with Cdrom. 1997: IDG Books Worldwide, Inc. Foster City, CA, USA.134.Sun Microsystems, Java Remote Method Invocation Specification. Sun Microsystems, Palo Alto, CA, 1997. 30: p. 31.135.Kirtland, M., A Platform for Web Services. Microsoft Developer Network, 2001.136.List of Web Service Specifications. 2008; Available from: HYPERLINK "", L., et al., A Community Authorization Service for Group Collaboration, in Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02). 2002, IEEE Computer Society.138.Naedele, M., Standards for XML and Web services security. Computer, 2003. 36(4): p. 96-98.139.Lang, B., et al., A Multipolicy Authorization Framework for Grid Security. Proc. Fifth IEEE Symposium on Network Computing and Application, 2006.140.Neuman, B.C. and T. Ts'o, Kerberos: An Authentication Service for Computer Networks. Communications Magazine, IEEE, 1994. 32(9): p. 33-38.141.Thompson, M.R., A. Essiari, and S. Mudumbai, Certificate-based authorization policy in a PKI environment. ACM Transactions on Information and System Security (TISSEC), 2003. 6(4): p. 566-588.142.Shibboleth. Available from: HYPERLINK "", V., et al., Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration. 4th Annual PKI R&D Workshop, 2005.144.Barton, T., et al. Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, Gridshib, and MyProxy. in Proceedings of 5th Annual PKI R&D Workshop. 2006.145.Alfieri, R., et al., VOMS, an Authorization System for Virtual Organizations. European Across Grids Conference, 2003. 2970: p. 33–40.146.Globus Alliance. The Globus Project. ]; Available from: HYPERLINK "", D., M. Handley, and C. Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. Dina Katabi, Mark Handley, and Charles Rohrs, Internet Congestion Control for Future High Bandwidth-Delay Product Environments. ACM Sigcomm 2002, August 2002. URL HYPERLINK "". 2002.148.Floyd, S., et al., Equation-based congestion control for unicast applications. Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2000: p. 43-56.149.Lim, S.B., et al., GridFTP and Parallel TCP Support in NaradaBrokering. Distributed And Parallel Computing: 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005: Proceedings, 2005.150.Burnap, P., Bulut, H., Pallickara, S., Fox, G., Walker, D., A. Kaplan, B. Yildiz, and Nacar, M. A. Worldwide Messaging Support for High Performance Real-time Collaboration. in The UK e-Science All Hands Meeting. 2005. Nottingham, UK.151.Al-Kiswany, S., et al., Are P2P Data-Dissemination Techniques Viable in Today's Data-Intensive Scientific Collaborations? Lecture Notes in Computer Science, 2007. 4641: p. 404. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download