Peer-to-peer computing : applications, architecture, protocols, and challenges /
"While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols,...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press,
©2012.
|
Colección: | Chapman & Hall/CRC computational science series.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn759209543 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 111101s2012 flua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d COO |d E7B |d UPM |d OTZ |d OCLCQ |d VLB |d DEBSZ |d OCLCQ |d CRCPR |d OCLCQ |d OCLCF |d IDEBK |d UMI |d EBLCP |d OCLCQ |d MERUC |d OCLCQ |d UAB |d STF |d OCLCQ |d CEF |d NLE |d OCLCQ |d UKMGB |d TKN |d YDX |d TYFRS |d OCLCQ |d UKAHL |d OCLCQ |d LEAUB |d U3W |d K6U |d LVT |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d SFB |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBB7A8619 |2 bnb | ||
016 | 7 | |a 018389774 |2 Uk | |
019 | |a 760054926 |a 816868349 |a 861183804 |a 899156632 |a 1015209075 |a 1086555234 |a 1135517991 |a 1135834938 |a 1152829228 | ||
020 | |a 9781439809358 |q (electronic bk.) | ||
020 | |a 1439809356 |q (electronic bk.) | ||
020 | |a 1283311518 | ||
020 | |a 9781283311519 | ||
020 | |a 9781466547445 |q (e-book) | ||
020 | |a 1466547448 | ||
020 | |z 9781439809341 | ||
020 | |z 1439809348 | ||
024 | 8 | |a 9786613311511 | |
029 | 1 | |a AU@ |b 000052162251 | |
029 | 1 | |a AU@ |b 000055776768 | |
029 | 1 | |a DEBBG |b BV041433137 | |
029 | 1 | |a DEBSZ |b 372705324 | |
029 | 1 | |a DEBSZ |b 398291012 | |
029 | 1 | |a DEBSZ |b 431627576 | |
029 | 1 | |a DEBSZ |b 463017188 | |
029 | 1 | |a NZ1 |b 14167249 | |
029 | 1 | |a NZ1 |b 14562477 | |
029 | 1 | |a UKMGB |b 018389774 | |
035 | |a (OCoLC)759209543 |z (OCoLC)760054926 |z (OCoLC)816868349 |z (OCoLC)861183804 |z (OCoLC)899156632 |z (OCoLC)1015209075 |z (OCoLC)1086555234 |z (OCoLC)1135517991 |z (OCoLC)1135834938 |z (OCoLC)1152829228 | ||
037 | |a CL0500000324 |b Safari Books Online | ||
050 | 4 | |a TK5105.525 |b .K87 2012eb | |
072 | 7 | |a COM |x 043000 |2 bisacsh | |
072 | 7 | |a UT |2 bicssc | |
082 | 0 | 4 | |a 004.6/52 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Kwok, Yu-Kwong Ricky. | |
245 | 1 | 0 | |a Peer-to-peer computing : |b applications, architecture, protocols, and challenges / |c Yu-Kwong Ricky Kwok. |
260 | |a Boca Raton, FL : |b CRC Press, |c ©2012. | ||
300 | |a 1 online resource (xvi, 200 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Chapman & Hall/CRC computational science series | |
520 | |a "While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges provides comprehensive theoretical and practical coverage of the major features of contemporary P2P systems and examines the obstacles to further success. Setting the stage for understanding important research issues in P2P systems, the book first introduces various P2P network architectures. It then details the topology control research problem as well as existing technologies for handling topology control issues. The author describes novel and interesting incentive schemes for enticing peers to cooperate and explores recent innovations on trust issues. He also examines security problems in a P2P network. The final chapter addresses the future state of the field. Throughout the text, the highly popular P2P IPTV application, PPLive, is used as a case study to illustrate the practical aspects of the concepts covered. Addressing the unique challenges of P2P systems, this book presents practical applications of recent theoretical results in P2P computing. It also stimulates further research on critical issues, including performance and security problems"-- |c Provided by publisher | ||
520 | |a "Preface Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift--intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development culture, and abundant information at our fingertips, computing power and user competence at the edge of the network has risen to an unprecedented level. Thus, devices at the edge (not restricted to desktop PCs) can congregate and share their resources (computing power, file data, etc.) to provide services to participating users in a self-sufficient manner, without the need of dedicated servers. With potentially up to millions of machines participating simultaneously (e.g., when some hot events are occurring), the aggregated computing resources can dwarf any powerful server farm. Well, well, well ... these are "conceptual level" thinking as of now. There are still many road-blocks to such a vision, even though we do see millions of machines working together in a P2P manner (e.g., streaming live video events). Again, as the old saying goes, the devils are in the details. Thinking of such gigantic scale of sharing computing resources is one thing, while implementing the idea is definitely another. Road-blocks to the grand vision of truly global P2P sharing include architectural maintenance problems arising from the sheer scale of the system, incentives for truthful cooperation, trust among peers when they need to accept data from remote sources, security issues caused by the inevitable existence of malicious users, etc"-- |c Provided by publisher | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a 1. Introduction -- 2. P2P applications -- 3. P2P network architectures -- 4. Topology control -- 5. Incentives -- 6. Trust -- 7. Security issues -- 8. Conclusions. | |
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Peer-to-peer architecture (Computer networks) | |
650 | 6 | |a P2P (Réseaux d'ordinateurs) | |
650 | 7 | |a COMPUTERS |x Networking |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Engineering. |2 bisacsh | |
650 | 7 | |a MATHEMATICS |x General. |2 bisacsh | |
650 | 7 | |a Peer-to-peer architecture (Computer networks) |2 fast | |
758 | |i has work: |a Peer-to-peer computing (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGrM7yvVmgKwM9TfRkvwfm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Kwok, Yu-Kwong Ricky. |t Peer-to-peer computing. |d Boca Raton, FL : CRC Press, ©2012 |z 9781439809341 |w (DLC) 2011030494 |w (OCoLC)746316022 |
830 | 0 | |a Chapman & Hall/CRC computational science series. | |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1633604 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781439809358/?ar |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH24073536 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1633604 | ||
938 | |a ebrary |b EBRY |n ebr10502501 | ||
938 | |a EBSCOhost |b EBSC |n 398414 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 331151 | ||
938 | |a Taylor & Francis |b TAFR |n 9780429092374 | ||
938 | |a Taylor & Francis |b TAFR |n CRC0KE10436PDF | ||
938 | |a YBP Library Services |b YANK |n 15917044 | ||
938 | |a YBP Library Services |b YANK |n 3347489 | ||
994 | |a 92 |b IZTAP |