<p><P>Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. In addition, a large range of new applications are under developme
Legitimate Applications of Peer-to-Peer Networks
β Scribed by Dinesh C. Verma
- Publisher
- Wiley-Interscience
- Year
- 2004
- Tongue
- English
- Leaves
- 182
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The book examines the different legitimate applications used over a peer-to-peer network (p2p)The material examines the design and development of novel applications designed to leverage the distributed nature of peer-to-peer environmentsGoes beyond the most popular application of file-sharing (including sharing of video and audio files) and discusses the many different applicationsCompares traditional and peer-to-peer infrastructure and discusses merits and demerits of each approach from a business perspective
β¦ Table of Contents
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS......Page 3
CONTENTS......Page 9
Preface......Page 13
Who Will Benefit from This Book?......Page 14
Organization of the Book......Page 15
1.1 Distributed Applications......Page 19
1.1.1 A Distributed Computing Example......Page 20
1.1.2 Client-Server Architecture......Page 23
1.2 The Peer-to-Peer Software Structure......Page 25
1.2.1 Base Overlay Layer......Page 26
1.2.2 Middleware Functions......Page 27
1.2.3 Application Layer......Page 28
1.3 Comparison of Architectures......Page 29
1.3.2 Manageability......Page 30
1.3.3 Scalability......Page 31
1.3.5 Security......Page 33
1.3.6 Reliability......Page 34
2 Peer Discovery and Overlay Formation......Page 37
2.1.1 Static Configuration......Page 38
2.1.2 Centralized Directory......Page 39
2.1.3 Using the Domain Name Service......Page 41
2.1.4 Member Propagation Techniques with Initial Member Discovery......Page 42
2.1.4.2 Member Propagation with Partial Member List......Page 43
2.1.4.3 Member Propagation with a Hint Server......Page 44
2.2 Overlay Formation......Page 45
2.2.1.1 Communicating Across Firewalls......Page 46
2.2.1.2 Communicating Across Two Firewalls......Page 47
2.3 Topology Selection......Page 49
2.3.1 Random Mesh Formation......Page 50
2.3.2 Tiered Formation......Page 51
2.3.3 Ordered Lattices......Page 52
3 Application-Layer Multicast......Page 55
3.1 General Multicast Techniques......Page 56
3.1.1 Group Addressing......Page 57
3.1.2 Group Maintenance......Page 58
3.1.3 Message Forwarding Scheme......Page 60
3.1.4 Multicast Routing......Page 62
3.1.5 Secure Multicast......Page 63
3.1.6 Reliable Multicast......Page 64
3.1.7 Multicast Flow and Congestion Control......Page 65
3.2 Network-Layer MulticastβIP Multicast......Page 67
3.2.1 Problems with IP-Layer Multicast......Page 68
3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks......Page 70
3.3.2 Multicast in Peer-to-Peer Overlays......Page 71
4.1 File-Sharing Overview......Page 73
4.1.1 Disk Space Management......Page 74
4.1.2 File Indexing......Page 75
4.1.3 File Search/Retrieval......Page 76
4.1.5 Anonymous File Retrieval......Page 77
4.1.6 Search Acceleration Techniques......Page 79
4.1.7 Digital Rights Management......Page 80
4.2 Usage of File-Sharing Applications......Page 81
4.2.1 Limitations of File-Sharing Applications......Page 82
4.3 Preventing Unauthorized File Sharing......Page 84
4.3.1 Firewall-Based Techniques......Page 85
4.3.2 Asset Inventory......Page 88
4.3.3 Port Scanning......Page 89
4.3.4 Usage-Based Rate Control......Page 90
4.3.5 Malicious Participation......Page 91
5 File Storage Service......Page 95
5.1 Handle Management......Page 96
5.2 Retrieving Files with Handles......Page 98
5.2.1 Circular Ring Routing......Page 99
5.2.2 Plaxton Scheme......Page 100
5.2.3 CAN Routing Algorithm......Page 102
5.2.4 Modified Network Routing Schemes......Page 103
5.2.5 Modified Broadcast......Page 104
5.3.1 Access Control......Page 105
5.3.2 Availability and Reliability......Page 107
5.4 Usage Scenarios......Page 108
5.4.1 Distributed File Systems......Page 109
5.4.2 Anonymous Publishing......Page 110
6 Data Backup Service......Page 113
6.1 The Traditional Data Management System......Page 114
6.2 The Peer-to-Peer Data Management System......Page 116
6.2.1 The Backup/Restore Manager......Page 117
6.2.2 The Peer Searcher......Page 118
6.2.4 The Properties Manager......Page 119
6.2.5 The Data Manager......Page 120
6.3 Security Issues......Page 121
6.4 Hybrid Data Management Approach......Page 123
6.5 Feasibility of Peer-to-Peer Data Backup Service......Page 124
7 Peer-to-Peer Directory System......Page 127
7.1 LDAP Directory Servers......Page 128
7.2 Why Use Peer-to-Peer Directories?......Page 130
7.3 A Peer-to-Peer Directory System......Page 131
7.3.1 Schema Maintenance......Page 132
7.3.2 Operation Processing......Page 133
7.3.2.1 Local Placement of Records......Page 134
7.3.2.2 Name Space Partitioning......Page 136
7.3.3 Access Management......Page 138
7.4 Example Applications of Peer-to-Peer Directory......Page 139
8 Publish-Subscribe Middleware......Page 141
8.1 Overview of Publish-Subscribe Systems......Page 142
8.2 Server-Centric Publish-Subscribe Services......Page 143
8.3 Peer-to-Peer Publish-Subscribe Services......Page 145
8.3.1 Broadcast Scheme......Page 146
8.3.2 Multicast Group Approach......Page 147
8.4 Comparison of Approaches......Page 148
8.5 Example Application......Page 150
9 Collaborative Applications......Page 153
9.1 General Issues......Page 154
9.2 Instant Messaging......Page 156
9.3 IP Telephony......Page 158
9.4 Shared Collaboration Databases......Page 160
9.5 Collaborative Content Hosting......Page 163
9.6 Anonymous Web Surfing......Page 165
10 Related Topics......Page 169
10.1 Legacy Peer-to-Peer Applications......Page 170
10.2 Grid Computing......Page 172
References......Page 175
Index......Page 179
π SIMILAR VOLUMES
<p><P>Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. In addition, a large range of new applications are under developme
Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development
Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development
<p><P>Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. In addition, a large range of new applications are under developme
Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development