|
|
|
|
LEADER |
00000cam a22000004a 4500 |
001 |
EBOOKCENTRAL_ocm56985875 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
041117s2004 nju ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCG
|d OCLCQ
|d CDN
|d DG1
|d MERUC
|d CCO
|d E7B
|d TEFOD
|d IDEBK
|d COCUF
|d DKDLA
|d FVL
|d OCLCQ
|d EBLCP
|d OCLCO
|d OCLCQ
|d OCLCA
|d OCLCF
|d DEBSZ
|d OCLCQ
|d UKDOC
|d OCLCQ
|d TEFOD
|d COO
|d OCLCQ
|d DEBBG
|d AZK
|d CNNLC
|d LOA
|d CNNOR
|d DG1
|d LIP
|d PIFBR
|d ZCU
|d OCLCQ
|d HEBIS
|d GBVCP
|d WY@
|d U3W
|d LUE
|d OCLCQ
|d STF
|d BRL
|d WRM
|d NRAMU
|d ICG
|d MOQ
|d INT
|d VT2
|d TOF
|d OCLCQ
|d WYU
|d G3B
|d TKN
|d OCLCQ
|d DKC
|d OCLCQ
|d HS0
|d SFB
|d AJS
|d VHC
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 56626770
|a 85820001
|a 439628606
|a 481657253
|a 559957328
|a 647473164
|a 704544604
|a 722437703
|a 728038429
|a 744646265
|a 814375021
|a 824545050
|a 835420868
|a 888510635
|a 961640738
|a 962603977
|a 992908973
|a 1037446519
|a 1132163220
|a 1162196377
|a 1290064312
|a 1303464122
|
020 |
|
|
|a 0471653799
|q (electronic bk.)
|
020 |
|
|
|a 9780471653790
|q (electronic bk.)
|
020 |
|
|
|a 0471463698
|q (Cloth)
|
020 |
|
|
|a 9780471463696
|q (Cloth)
|
020 |
|
|
|a 0471653780
|q (electronic bk.)
|
020 |
|
|
|a 9780471653783
|q (electronic bk.)
|
020 |
|
|
|a 1280368233
|
020 |
|
|
|a 9781280368233
|
020 |
|
|
|a 9786610368235
|
020 |
|
|
|a 6610368236
|
020 |
|
|
|a 0470243953
|
020 |
|
|
|a 9780470243954
|
024 |
7 |
|
|a 10.1002/0471653780
|2 doi
|
029 |
1 |
|
|a AU@
|b 000026236197
|
029 |
1 |
|
|a AU@
|b 000053230415
|
029 |
1 |
|
|a AU@
|b 000055607860
|
029 |
1 |
|
|a CHBIS
|b 004696844
|
029 |
1 |
|
|a CHNEW
|b 000927929
|
029 |
1 |
|
|a CHVBK
|b 480086869
|
029 |
1 |
|
|a DEBBG
|b BV043385096
|
029 |
1 |
|
|a DEBBG
|b BV044077167
|
029 |
1 |
|
|a DEBSZ
|b 396050158
|
029 |
1 |
|
|a DEBSZ
|b 400438879
|
029 |
1 |
|
|a DEBSZ
|b 44906056X
|
029 |
1 |
|
|a GBVCP
|b 482969393
|
029 |
1 |
|
|a GWDNB
|b 1064159168
|
029 |
1 |
|
|a HEBIS
|b 231483244
|
029 |
1 |
|
|a NZ1
|b 12032836
|
035 |
|
|
|a (OCoLC)56985875
|z (OCoLC)56626770
|z (OCoLC)85820001
|z (OCoLC)439628606
|z (OCoLC)481657253
|z (OCoLC)559957328
|z (OCoLC)647473164
|z (OCoLC)704544604
|z (OCoLC)722437703
|z (OCoLC)728038429
|z (OCoLC)744646265
|z (OCoLC)814375021
|z (OCoLC)824545050
|z (OCoLC)835420868
|z (OCoLC)888510635
|z (OCoLC)961640738
|z (OCoLC)962603977
|z (OCoLC)992908973
|z (OCoLC)1037446519
|z (OCoLC)1132163220
|z (OCoLC)1162196377
|z (OCoLC)1290064312
|z (OCoLC)1303464122
|
037 |
|
|
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 85AA94CC-FC6A-4F6D-9C15-E1AF48FD0F8C
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.525
|b .V37 2004eb
|
072 |
|
7 |
|a COM
|x 043000
|2 bisacsh
|
072 |
|
7 |
|a UTC
|2 bicssc
|
082 |
0 |
4 |
|a 004.6/5
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Verma, Dinesh C.
|
245 |
1 |
0 |
|a Legitimate applications of peer to peer networks /
|c Dinesh C. Verma.
|
260 |
|
|
|a Hoboken, N.J. :
|b Wiley-Interscience,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xv, 164 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
504 |
|
|
|a Includes bibliographical references (pages 157-160) and index.
|
505 |
0 |
|
|a Cover -- CONTENTS -- Preface -- Who Will Benefit from This Book? -- Who Is This Book Not For? -- Organization of the Book -- 1 The Peer-to-Peer Architecture -- 1.1 Distributed Applications -- 1.1.1 A Distributed Computing Example -- 1.1.2 Client-Server Architecture -- 1.1.3 Peer-to-Peer Architecture -- 1.2 The Peer-to-Peer Software Structure -- 1.2.1 Base Overlay Layer -- 1.2.2 Middleware Functions -- 1.2.3 Application Layer -- 1.3 Comparison of Architectures -- 1.3.1 Ease of Development -- 1.3.2 Manageability -- 1.3.3 Scalability -- 1.3.4 Administrative Domains -- 1.3.5 Security -- 1.3.6 Reliability -- 2 Peer Discovery and Overlay Formation -- 2.1 Discovery -- 2.1.1 Static Configuration -- 2.1.2 Centralized Directory -- 2.1.3 Using the Domain Name Service -- 2.1.4 Member Propagation Techniques with Initial Member Discovery -- 2.2 Overlay Formation -- 2.2.1 Creating an Overlay Link -- 2.3 Topology Selection -- 2.3.1 Random Mesh Formation -- 2.3.2 Tiered Formation -- 2.3.3 Ordered Lattices -- 3 Application-Layer Multicast -- 3.1 General Multicast Techniques -- 3.1.1 Group Addressing -- 3.1.2 Group Maintenance -- 3.1.3 Message Forwarding Scheme -- 3.1.4 Multicast Routing -- 3.1.5 Secure Multicast -- 3.1.6 Reliable Multicast -- 3.1.7 Multicast Flow and Congestion Control -- 3.2 Network-Layer Multicast"IP Multicast -- 3.2.1 Problems with IP-Layer Multicast -- 3.3 Application-Layer Multicast -- 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks -- 3.3.2 Multicast in Peer-to-Peer Overlays -- 4 File-Sharing Applications -- 4.1 File-Sharing Overview -- 4.1.1 Disk Space Management -- 4.1.2 File Indexing -- 4.1.3 File Search/Retrieval -- 4.1.4 Access Control and Security -- 4.1.5 Anonymous File Retrieval -- 4.1.6 Search Acceleration Techniques -- 4.1.7 Digital Rights Management -- 4.2 Usage of File-Sharing Applications -- 4.2.1 Limitations of File-Sharing Applications -- 4.3 Preventing Unauthorized File Sharing -- 4.3.1 Firewall-Based Techniques -- 4.3.2 Asset Inventory -- 4.3.3 Port Scanning -- 4.3.4 Usage-Based Rate Control -- 4.3.5 Malicious Participation -- 5 File Storage Service -- 5.1 Handle Management -- 5.2 Retrieving Files with Handles -- 5.2.1 Circular Ring Routing -- 5.2.2 Plaxton Scheme -- 5.2.3 CAN Routing Algorithm -- 5.2.4 Modified Network Routing Schemes -- 5.2.5 Modified Broadcast -- 5.3 Miscellaneous Functions -- 5.3.1 Access Control -- 5.3.2 Availability and Reliability -- 5.4 Usage Scenarios -- 5.4.1 Distributed File Systems -- 5.4.2 Anonymous Publishing -- 6 Data Backup Service -- 6.1 The Traditional Data Management System -- 6.2 The Peer-to-Peer Data Management System -- 6.2.1 The Backup/Restore Manager -- 6.2.2 The Peer Searcher -- 6.2.3 The File Searcher -- 6.2.4 The Properties Manager -- 6.2.5 The Data Manager -- 6.2.6 The Schedule Manager -- 6.3 Security Issues -- 6.4 Hybrid Data Management Approach -- 6.5 Feasibility of Peer-to-Peer Data Backup Service -- 7 Peer-to-Peer Directory System -- 7.1 LDAP Dir.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The book examines the different legitimate applications used over a peer-to-peer network (p2p)The material examines the design and development of novel applications designed to leverage the distributed nature of peer-to-peer environmentsGoes beyond the most popular application of file-sharing (including sharing of video and audio files) and discusses the many different applicationsCompares traditional and peer-to-peer infrastructure and discusses merits and demerits of each approach from a business perspective.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Peer-to-peer architecture (Computer networks)
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Electronic data processing
|x Distributed processing.
|
650 |
|
6 |
|a P2P (Réseaux d'ordinateurs)
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Traitement réparti.
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Application software
|x Development
|2 fast
|
650 |
|
7 |
|a Electronic data processing
|x Distributed processing
|2 fast
|
650 |
|
7 |
|a Peer-to-peer architecture (Computer networks)
|2 fast
|
653 |
|
|
|a Communication technology - networks.
|
655 |
|
0 |
|a Electronic books.
|
758 |
|
|
|i has work:
|a Legitimate applications of peer to peer networks (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGw4cFKWMjHCVvjrhhYDxC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Verma, Dinesh, 1964-
|t Legitimate applications of peer to peer networks.
|d Hoboken, N.J. : Wiley-Interscience, ©2004
|z 0471463698
|w (DLC) 2003023099
|w (OCoLC)53307690
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=176026
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 25895
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL176026
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10114006
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 106973
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 36823
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2298625
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2943038
|
994 |
|
|
|a 92
|b IZTAP
|