skip to main content
article

A wide-area Distribution Network for free software

Authors Info & Claims
Published:01 August 2006Publication History
Skip Abstract Section

Abstract

The Globe Distribution Network (GDN) is an application for the efficient, worldwide distribution of freely redistributable software packages. Distribution is made efficient by encapsulating the software into special distributed objects which efficiently replicate themselves near to the downloading clients. The Globe Distribution Network takes a novel, optimistic approach to stop the illegal distribution of copyrighted and illicit material via the network. Instead of having moderators check the packages at upload time, illegal content is removed and its uploader's access to the network permanently revoked only when the violation is discovered. Other protective measures defend the GDN against internal and external attacks to its availability. By exploiting the replication of the software and using fault-tolerant server software, the Globe Distribution Network achieves high availability. A prototype implementation of the GDN is available from http://www.cs.vu.nl/globe/.

References

  1. Agha, G., Ed. 2002. Comm. ACM (Special Section on Adaptive Middleware) 45, 6 (June).]] Google ScholarGoogle Scholar
  2. Bakker, A. 2002. An object-based software distribution network. Ph.D. thesis, Division of Mathematics and Computer Science, Faculty of Sciences, Vrije Universiteit, Amsterdam, The Netherlands.]]Google ScholarGoogle Scholar
  3. Bakker, A., Amade, E., Ballintijn, G., Kuz, I., Verkaik, P., Van der Wijk, I., Van Steen, M., and Tanenbaum, A. 2000. The Globe Distribution Network. In Proceedings of the USENIX Annual Technical Conference (FREENIX track). San Diego, CA. 141--152.]] Google ScholarGoogle Scholar
  4. Bakker, A., Van Steen, M., and Tanenbaum, A. 2001. A law-abiding peer-to-peer network for free-software distribution. In Proceedings of the IEEE Symposium on Network Computing and Applications (NCA'01). Cambridge, MA, IEEE Computer Society, 60--67.]] Google ScholarGoogle Scholar
  5. Bakker, A., Van Steen, M., and Tanenbaum, A. 2003. A wide-area distribution network for free software. Tech. rep. IR-CS-002, Department of Computer Science, Vrije Universiteit Amsterdam. The Netherlands.]]Google ScholarGoogle Scholar
  6. Bakker, A., Van Steen, M., Tanenbaum, A., and Verkaik, P. 2003. Design and implementation of the Globe middleware. Tech. rep. IR-CS-003, Department of Computer Science, Vrije Universiteit Amsterdam, The Netherlands.]]Google ScholarGoogle Scholar
  7. Ballintijn, G., Van Steen, M., and Tanenbaum, A. 1999. Simple crash recovery in a wide-area location service. In Proceedings of the 12th International Conference on Parallel and Distributed Computing Systems. Fort Lauderdale, FL. 87--93.]]Google ScholarGoogle Scholar
  8. Ballintijn, G., Van Steen, M., and Tanenbaum, A. 2001. Scalable user-friendly resource names. IEEE Internet Comput. 5, 5 (Sept.), 20--27.]] Google ScholarGoogle Scholar
  9. Burk, D. 2001. Copyrightable functions and patentable speech. Comm. ACM 44, 2 (Feb.), 69--75.]] Google ScholarGoogle Scholar
  10. Carmody, P. 2002. The world's first illegal prime number? http://www.utm.edu/research/primes/curios/485...443.html.]]Google ScholarGoogle Scholar
  11. Chen, P., Lee, E., Gibson, G., Katz, R., and Patterson, D. 1994. RAID: High-performance, reliable secondary storage. ACM Comput. Surv. 26, 2 (June), 145--185.]] Google ScholarGoogle Scholar
  12. Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2002. Choosing reputable servents in a P2P network. In Proceedings of the 11th International World Wide Web Conference. Honolulu, HI.]] Google ScholarGoogle Scholar
  13. Crispo, B., Popescu, B., and Tanenbaum, A. 2004. Symmetric key authentication services revisited. In Proceedings of the 9th Australasian Conference on Information Security and Privacy (ACISP'04). Sydney, Australia.]]Google ScholarGoogle Scholar
  14. Cristian, F. 1991. Understanding fault-tolerant distributed systems. Comm. ACM 34, 2 (Feb.), 56--78.]] Google ScholarGoogle Scholar
  15. Dean, D. and Stubblefield, A. 2001. Using client puzzles to protect TLS. In Proceedings of the 10th USENIX Security Symposium. Washington, DC.]] Google ScholarGoogle Scholar
  16. Dierks, T. and Allen, C. 1999. The TLS Protocol Version 1.0. RFC 2246.]] Google ScholarGoogle Scholar
  17. Dongarra, J. 2004. The Netlib. http://www.netlib.org/.]]Google ScholarGoogle Scholar
  18. Free Software Foundation, Inc. 1991. GNU General Public License Version 2. http://www.fsf.org/licenses/gpl.txt.]]Google ScholarGoogle Scholar
  19. Grosse, E. and Dongarra, J. 1995. Subject: Notes to Netlib contributors. ftp://ftp.netlib.org/misc/contrib.]]Google ScholarGoogle Scholar
  20. Katzenbeisser, S. and Petitcolas, F., Eds. 1999. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, Norwood, MA.]] Google ScholarGoogle Scholar
  21. Kuz, I., Van Steen, M., and Sips, H. 2002. The Globe infrastructure directory service. Comput. Comm. 25, 9 (June). Elsevier Science, Amsterdam, The Netherlands. 835--845.]]Google ScholarGoogle Scholar
  22. Lethin, R. 2001. Reputation. In Peer-to-Peer: Harnessing the Power of Disruptive Technologies. A. Oram, Ed. O'Reilly and Associates, Sebastopol, CA. Chapter 17, 341--353.]]Google ScholarGoogle Scholar
  23. Neuman, B. C. 1994. Scale in distributed systems. In Readings in Distributed Computing Systems. T. Casavant and M. Singhal, Eds. IEEE Computer. Society.]]Google ScholarGoogle Scholar
  24. Nielsen, J. 1995. Multimedia and Hypertext: The Internet and Beyond. AP Professional, Boston, MA.]] Google ScholarGoogle Scholar
  25. Open Source Development Network. 2004a. SourceForge.net open source software development Web site. http://www.sf.net/.]]Google ScholarGoogle Scholar
  26. Open Source Development Network. 2004b. SourceForge.net terms and conditions of use. http://sourceforge.net/docman/display_doc.php?docid=6048&group_id=1.]]Google ScholarGoogle Scholar
  27. Oram, A., Ed. 2001. Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly and Associates, Sebastopol, CA.]] Google ScholarGoogle Scholar
  28. Pierre, G., Van Steen, M., and Tanenbaum, A. 2002. Dynamically selecting optimal distribution strategies for Web documents. IEEE Trans. Comput. 51, 6 (June), 637--651.]] Google ScholarGoogle Scholar
  29. Plank, J., Beck, M., Kingsley, G., and Li, K. 1995. Libckpt: Transparent checkpointing under unix. In Proceedings of the USENIX Winter Technical Conference. New Orleans, LA. 213--223.]] Google ScholarGoogle Scholar
  30. Popescu, B., Crispo, B., and Tanenbaum, A. 2003a. A certificate revocation scheme for a large-scale highly replicated distributed system. In Proceedings of the 8th IEEE International Symposium on Computers and Communications (ISCC'03). Kemer-Antalya, Turkey, 225--232.]] Google ScholarGoogle Scholar
  31. Popescu, B., Crispo, B., Tanenbaum, A., and Zeeman, M. 2003b. Expressing security policies for distributed objects applications. In Proceedings of the 11th Cambridge International Workshop on Security Protocols. Cambridge, U.K.]]Google ScholarGoogle Scholar
  32. Popescu, B., Van Steen, M., and Tanenbaum, A. 2002. A security architecture for object-based distributed systems. In Proceedings of the 18th Annual Computer Security Applications Conference. Las Vegas, NV. 161--171.]] Google ScholarGoogle Scholar
  33. Saltzer, J., Reed, D., and Clark, D. 1984. End-to-end arguments in system design. ACM Trans. Comput. Syst. 2, 4 (Nov.), 277--288.]] Google ScholarGoogle Scholar
  34. Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38--47.]] Google ScholarGoogle Scholar
  35. Simons, B. 2000. From the President: To DVD or not to DVD. Comm. ACM 43, 5 (May), 31--32.]] Google ScholarGoogle Scholar
  36. Sivasubramanian, S., Pierre, G., and Van Steen, M. 2003. A case for dynamic selection of replication and caching strategies. In Proceedings of the 8th International Workshop on Web Content Caching and Distribution (WCW'03). Hawthorne, NY.]]Google ScholarGoogle Scholar
  37. Software in the Public Interest, Inc. 2004a. Debian GNU/Linux---Step 2: Identification. http://www.debian.org/devel/join/nm-step2.]]Google ScholarGoogle Scholar
  38. Software in the Public Interest, Inc. 2004b. Debian GNU/Linux---The Universal Operating System. http://www.debian.org/.]]Google ScholarGoogle Scholar
  39. Stelling, P., Foster, I., Kesselman, C., Lee, C., and von Laszewski, G. 1998. A fault detection service for wide area distributed computations. In Proceedings of the 7th IEEE Symposium on High Performance Distributed Computing. Chicago, IL. 268--278.]] Google ScholarGoogle Scholar
  40. Tridgell, A. 2000. Efficient algorithms for sorting and synchronization. Ph.D. thesis, Australian National University, Canberra, Australia.]]Google ScholarGoogle Scholar
  41. United States Government. 1998. Digital Millennium Copyright Act. United States Public Law No. 105-304.]]Google ScholarGoogle Scholar
  42. Van Steen, M., Hauck, F., and Tanenbaum, A. 1998. Locating objects in wide-area systems. IEEE Communications, 104--109.]]Google ScholarGoogle Scholar
  43. Van Steen, M., Homburg, P., and Tanenbaum, A. 1999. Globe: A wide-area distributed system. IEEE Concurrency 7, 1 (Jan.), 70--78.]] Google ScholarGoogle Scholar
  44. World Intellectual Property Organization. 1996. WIPO Copyright Treaty. In WIPO Diplomatic Conference on Certain Copyright and Neighbouring Rights Questions. Geneva, Switzerland. http://www.wipo.int/treaties/en/ip/wct/.]]Google ScholarGoogle Scholar

Index Terms

  1. A wide-area Distribution Network for free software

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Article Metrics

                  • Downloads (Last 12 months)1
                  • Downloads (Last 6 weeks)1

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader
                About Cookies On This Site

                We use cookies to ensure that we give you the best experience on our website.

                Learn more

                Got it!