Cargando…

Legitimate applications of peer to peer networks /

The book examines the different legitimate applications used over a peer-to-peer network (p2p)The material examines the design and development of novel applications designed to leverage the distributed nature of peer-to-peer environmentsGoes beyond the most popular application of file-sharing (inclu...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Verma, Dinesh C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : Wiley-Interscience, ©2004.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • CONTENTS
  • Preface
  • Who Will Benefit from This Book?
  • Who Is This Book Not For?
  • Organization of the Book
  • 1 The Peer-to-Peer Architecture
  • 1.1 Distributed Applications
  • 1.1.1 A Distributed Computing Example
  • 1.1.2 Client-Server Architecture
  • 1.1.3 Peer-to-Peer Architecture
  • 1.2 The Peer-to-Peer Software Structure
  • 1.2.1 Base Overlay Layer
  • 1.2.2 Middleware Functions
  • 1.2.3 Application Layer
  • 1.3 Comparison of Architectures
  • 1.3.1 Ease of Development
  • 1.3.2 Manageability
  • 1.3.3 Scalability
  • 1.3.4 Administrative Domains
  • 1.3.5 Security
  • 1.3.6 Reliability
  • 2 Peer Discovery and Overlay Formation
  • 2.1 Discovery
  • 2.1.1 Static Configuration
  • 2.1.2 Centralized Directory
  • 2.1.3 Using the Domain Name Service
  • 2.1.4 Member Propagation Techniques with Initial Member Discovery
  • 2.2 Overlay Formation
  • 2.2.1 Creating an Overlay Link
  • 2.3 Topology Selection
  • 2.3.1 Random Mesh Formation
  • 2.3.2 Tiered Formation
  • 2.3.3 Ordered Lattices
  • 3 Application-Layer Multicast
  • 3.1 General Multicast Techniques
  • 3.1.1 Group Addressing
  • 3.1.2 Group Maintenance
  • 3.1.3 Message Forwarding Scheme
  • 3.1.4 Multicast Routing
  • 3.1.5 Secure Multicast
  • 3.1.6 Reliable Multicast
  • 3.1.7 Multicast Flow and Congestion Control
  • 3.2 Network-Layer Multicast"IP Multicast
  • 3.2.1 Problems with IP-Layer Multicast
  • 3.3 Application-Layer Multicast
  • 3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks
  • 3.3.2 Multicast in Peer-to-Peer Overlays
  • 4 File-Sharing Applications
  • 4.1 File-Sharing Overview
  • 4.1.1 Disk Space Management
  • 4.1.2 File Indexing
  • 4.1.3 File Search/Retrieval
  • 4.1.4 Access Control and Security
  • 4.1.5 Anonymous File Retrieval
  • 4.1.6 Search Acceleration Techniques
  • 4.1.7 Digital Rights Management
  • 4.2 Usage of File-Sharing Applications
  • 4.2.1 Limitations of File-Sharing Applications
  • 4.3 Preventing Unauthorized File Sharing
  • 4.3.1 Firewall-Based Techniques
  • 4.3.2 Asset Inventory
  • 4.3.3 Port Scanning
  • 4.3.4 Usage-Based Rate Control
  • 4.3.5 Malicious Participation
  • 5 File Storage Service
  • 5.1 Handle Management
  • 5.2 Retrieving Files with Handles
  • 5.2.1 Circular Ring Routing
  • 5.2.2 Plaxton Scheme
  • 5.2.3 CAN Routing Algorithm
  • 5.2.4 Modified Network Routing Schemes
  • 5.2.5 Modified Broadcast
  • 5.3 Miscellaneous Functions
  • 5.3.1 Access Control
  • 5.3.2 Availability and Reliability
  • 5.4 Usage Scenarios
  • 5.4.1 Distributed File Systems
  • 5.4.2 Anonymous Publishing
  • 6 Data Backup Service
  • 6.1 The Traditional Data Management System
  • 6.2 The Peer-to-Peer Data Management System
  • 6.2.1 The Backup/Restore Manager
  • 6.2.2 The Peer Searcher
  • 6.2.3 The File Searcher
  • 6.2.4 The Properties Manager
  • 6.2.5 The Data Manager
  • 6.2.6 The Schedule Manager
  • 6.3 Security Issues
  • 6.4 Hybrid Data Management Approach
  • 6.5 Feasibility of Peer-to-Peer Data Backup Service
  • 7 Peer-to-Peer Directory System
  • 7.1 LDAP Dir.