Cargando…

Legitimate applications of peer to peer networks /

The book examines the different legitimate applications used over a peer-to-peer network (p2p)The material examines the design and development of novel applications designed to leverage the distributed nature of peer-to-peer environmentsGoes beyond the most popular application of file-sharing (inclu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Verma, Dinesh C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : Wiley-Interscience, ©2004.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000004a 4500
001 EBOOKCENTRAL_ocm56985875
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 041117s2004 nju ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCG  |d OCLCQ  |d CDN  |d DG1  |d MERUC  |d CCO  |d E7B  |d TEFOD  |d IDEBK  |d COCUF  |d DKDLA  |d FVL  |d OCLCQ  |d EBLCP  |d OCLCO  |d OCLCQ  |d OCLCA  |d OCLCF  |d DEBSZ  |d OCLCQ  |d UKDOC  |d OCLCQ  |d TEFOD  |d COO  |d OCLCQ  |d DEBBG  |d AZK  |d CNNLC  |d LOA  |d CNNOR  |d DG1  |d LIP  |d PIFBR  |d ZCU  |d OCLCQ  |d HEBIS  |d GBVCP  |d WY@  |d U3W  |d LUE  |d OCLCQ  |d STF  |d BRL  |d WRM  |d NRAMU  |d ICG  |d MOQ  |d INT  |d VT2  |d TOF  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d HS0  |d SFB  |d AJS  |d VHC  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 56626770  |a 85820001  |a 439628606  |a 481657253  |a 559957328  |a 647473164  |a 704544604  |a 722437703  |a 728038429  |a 744646265  |a 814375021  |a 824545050  |a 835420868  |a 888510635  |a 961640738  |a 962603977  |a 992908973  |a 1037446519  |a 1132163220  |a 1162196377  |a 1290064312  |a 1303464122 
020 |a 0471653799  |q (electronic bk.) 
020 |a 9780471653790  |q (electronic bk.) 
020 |a 0471463698  |q (Cloth) 
020 |a 9780471463696  |q (Cloth) 
020 |a 0471653780  |q (electronic bk.) 
020 |a 9780471653783  |q (electronic bk.) 
020 |a 1280368233 
020 |a 9781280368233 
020 |a 9786610368235 
020 |a 6610368236 
020 |a 0470243953 
020 |a 9780470243954 
024 7 |a 10.1002/0471653780  |2 doi 
029 1 |a AU@  |b 000026236197 
029 1 |a AU@  |b 000053230415 
029 1 |a AU@  |b 000055607860 
029 1 |a CHBIS  |b 004696844 
029 1 |a CHNEW  |b 000927929 
029 1 |a CHVBK  |b 480086869 
029 1 |a DEBBG  |b BV043385096 
029 1 |a DEBBG  |b BV044077167 
029 1 |a DEBSZ  |b 396050158 
029 1 |a DEBSZ  |b 400438879 
029 1 |a DEBSZ  |b 44906056X 
029 1 |a GBVCP  |b 482969393 
029 1 |a GWDNB  |b 1064159168 
029 1 |a HEBIS  |b 231483244 
029 1 |a NZ1  |b 12032836 
035 |a (OCoLC)56985875  |z (OCoLC)56626770  |z (OCoLC)85820001  |z (OCoLC)439628606  |z (OCoLC)481657253  |z (OCoLC)559957328  |z (OCoLC)647473164  |z (OCoLC)704544604  |z (OCoLC)722437703  |z (OCoLC)728038429  |z (OCoLC)744646265  |z (OCoLC)814375021  |z (OCoLC)824545050  |z (OCoLC)835420868  |z (OCoLC)888510635  |z (OCoLC)961640738  |z (OCoLC)962603977  |z (OCoLC)992908973  |z (OCoLC)1037446519  |z (OCoLC)1132163220  |z (OCoLC)1162196377  |z (OCoLC)1290064312  |z (OCoLC)1303464122 
037 |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 85AA94CC-FC6A-4F6D-9C15-E1AF48FD0F8C  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.525  |b .V37 2004eb 
072 7 |a COM  |x 043000  |2 bisacsh 
072 7 |a UTC  |2 bicssc 
082 0 4 |a 004.6/5  |2 22 
049 |a UAMI 
100 1 |a Verma, Dinesh C. 
245 1 0 |a Legitimate applications of peer to peer networks /  |c Dinesh C. Verma. 
260 |a Hoboken, N.J. :  |b Wiley-Interscience,  |c ©2004. 
300 |a 1 online resource (xv, 164 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
504 |a Includes bibliographical references (pages 157-160) and index. 
505 0 |a Cover -- CONTENTS -- Preface -- Who Will Benefit from This Book? -- Who Is This Book Not For? -- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir. 
588 0 |a Print version record. 
520 |a The book examines the different legitimate applications used over a peer-to-peer network (p2p)The material examines the design and development of novel applications designed to leverage the distributed nature of peer-to-peer environmentsGoes beyond the most popular application of file-sharing (including sharing of video and audio files) and discusses the many different applicationsCompares traditional and peer-to-peer infrastructure and discusses merits and demerits of each approach from a business perspective. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Peer-to-peer architecture (Computer networks) 
650 0 |a Application software  |x Development. 
650 0 |a Electronic data processing  |x Distributed processing. 
650 6 |a P2P (Réseaux d'ordinateurs) 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Traitement réparti. 
650 7 |a COMPUTERS  |x Networking  |x General.  |2 bisacsh 
650 7 |a Application software  |x Development  |2 fast 
650 7 |a Electronic data processing  |x Distributed processing  |2 fast 
650 7 |a Peer-to-peer architecture (Computer networks)  |2 fast 
653 |a Communication technology - networks. 
655 0 |a Electronic books. 
758 |i has work:  |a Legitimate applications of peer to peer networks (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGw4cFKWMjHCVvjrhhYDxC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Verma, Dinesh, 1964-  |t Legitimate applications of peer to peer networks.  |d Hoboken, N.J. : Wiley-Interscience, ©2004  |z 0471463698  |w (DLC) 2003023099  |w (OCoLC)53307690 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=176026  |z Texto completo 
938 |a 123Library  |b 123L  |n 25895 
938 |a EBL - Ebook Library  |b EBLB  |n EBL176026 
938 |a ebrary  |b EBRY  |n ebr10114006 
938 |a EBSCOhost  |b EBSC  |n 106973 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 36823 
938 |a YBP Library Services  |b YANK  |n 2298625 
938 |a YBP Library Services  |b YANK  |n 2943038 
994 |a 92  |b IZTAP