Changes between Version 1 and Version 2 of VolunteerComputing


Ignore:
Timestamp:
Jul 31, 2007, 10:20:37 PM (17 years ago)
Author:
Nicolas
Comment:

Required manual changes to automatic conversion.

Legend:

Unmodified
Added
Removed
Modified
  • VolunteerComputing

    v1 v2  
    33
    44== What is volunteer computing? ==
    5  '''Volunteer computing''' is an arrangement in which people ('''volunteers''') provide computing resources to '''projects''', which use the resources to do distributed computing and/or storage.
     5'''Volunteer computing''' is an arrangement in which people ('''volunteers''') provide computing resources to '''projects''', which use the resources to do distributed computing and/or storage.
    66
    77
     
    1111Several aspects of the project/volunteer relationship are worth noting:
    1212
    13 
    1413 * Volunteers are effectively anonymous; although they may be required to register and supply email address or other information, there is no way for a project to link them to a real-world identity.
    1514 * Because of their anonymity, volunteers are not '''accountable''' to projects. If a volunteer misbehaves in some way (for example, by intentionally returning incorrect computational results) the project cannot prosecute or discipline the volunteer.
    16  * Volunteers must '''trust''' projects in several ways: 1) the volunteer trusts the project to provide applications that don't damage their computer or invade their privacy; 2) the volunteer trusts that the project is truthful about what work is being done by its applications, and how the resulting intellectual property will be used; 3) the volunteer trusts the project to follow proper security practices, so that hackers cannot use the project as a vehicle for malicious activities.
     15 * Volunteers must '''trust''' projects in several ways:
     16  * The volunteer trusts the project to provide applications that don't damage their computer or invade their privacy
     17  * The volunteer trusts that the project is truthful about what work is being done by its applications, and how the resulting intellectual property will be used
     18  * The volunteer trusts the project to follow proper security practices, so that hackers cannot use the project as a vehicle for malicious activities.
    1719
    1820The first volunteer computing project was GIMPS (Great Internet Mersenne Prime Search), which started in 1995. Other early projects include distributed.net, SETI@home, and Folding@home. Today there are at least 50 active projects.
    1921
     22== Why is volunteer computing important? ==
    2023
    21 == Why is volunteer computing important? ==
    22  It's important for several reasons:
    23 
     24It's important for several reasons:
    2425
    2526 * Because of the huge number of PCs in the world, volunteer computing can (and does) supply more computing power to science than does any other type of computing. This computing power enables scientific research that could not be done otherwise. This advantage will increase over time, because the laws of economics dictate that consumer electronics (PCs and game consoles) will advance faster than more specialized products, and that there will simply be more of them.
     
    2728 * Volunteer computing encourages public interest in science, and provides the public with voice in determining the directions of scientific research.
    2829
     30== How does it compare to 'Grid computing'? ==
     31It depends on how you define 'Grid computing'. The term generally refers to the sharing of computing resources within and between organizations, with the following properties:
    2932
    30 == How does it compare to 'Grid computing'? ==
    31  It depends on how you define 'Grid computing'. The term generally refers to the sharing of computing resources within and between organizations, with the following properties:
    32 
    33 
    34  * Each organization can act as either producer or consumer of resources (hence the anology with the electrical power grid, in which electric companies can buy and sell power to/from other companies, according to fluctuating demand).
     33 * Each organization can act as either producer or consumer of resources (hence the analogy with the electrical power grid, in which electric companies can buy and sell power to/from other companies, according to fluctuating demand).
    3534 * The organizations are mutually accountable. If one organization misbehaves, the others can respond by suing them or refusing to share resources with them.
    3635
     
    4342
    4443== Is it the same as 'peer-to-peer computing'? ==
    45  No. 'Peer-to-peer computing' describes systems such as Napster, Gnutella, and Freenet, in which files and other data are exchanged between 'peers' (i.e. PCs) without the involvement of a central server. This differs in several ways from volunteer computing:
    4644
     45No. 'Peer-to-peer computing' describes systems such as Napster, Gnutella, and Freenet, in which files and other data are exchanged between 'peers' (i.e. PCs) without the involvement of a central server. This differs in several ways from volunteer computing:
    4746
    4847 * Volunteer computing uses central servers. There is typically no peer-to-peer communication.
    4948 * Peer-to-peer computing benefits the participants (i.e. the people sharing files). There's no notion of a 'project' to which resources are donated.
    50  * Peer-to-peer computing actually involves storage and retrieval, not computing1.
    51 
    52 
    53 ----
    54 1 An exception: [http://gpu.sourceforge.net/ GPU] (Global Processing Unit) is a Gnutella client that allows users to share CPU resources.
     49 * Peer-to-peer computing usually involves storage and retrieval, not computing. ,,(There are exceptions: [http://gpu.sourceforge.net/ Global Processing Unit] is a Gnutella client that allows users to share CPU resources.)