{"title":"Some possible enhancements of P2P file transfer related to passive users and remote control of transfer","authors":"B. Milašinović, K. Fertalj","doi":"10.1109/ITI.2004.242575","DOIUrl":null,"url":null,"abstract":"The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"26th International Conference on Information Technology Interfaces, 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITI.2004.242575","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The paper describes possible enhancements of peer-to-peer (P2P) file transfer by providing users with a remote control system in order to initiate the start of file transfer on their machine(s). In addition, control and monitoring of the file transfer can be performed on their machine(s) even if users are logged off and regardless of possible technical limitations such as use of firewall. Users are able to obtain control and/or monitoring in a few various ways including the use of cell phones. The paper also describes a variety of authentication methods, work with more central servers, and work with firewalls and explains file transfer between peers that cannot establish a direct connection. Furthermore, the paper identifies a range of potential problems that could arise from building the system