Legitimate Peer to Peer Network Applications : Beyond File and Music Swapping
Dinesh C. Verma
- 出版商: Wiley-Interscience
- 出版日期: 2004-03-18
- 定價: $2,550
- 售價: 5.0 折 $1,275
- 語言: 英文
- 頁數: 164
- 裝訂: Hardcover
- ISBN: 0471463698
- ISBN-13: 9780471463696
立即出貨 (庫存=1)
買這商品的人也買了...
-
$580$464Visual C++ 6 教學手冊 (Beginning Visual C++ 6)
-
$980$784C++ Primer, 3/e 中文版
-
$880$695LPI Linux 資格檢定 (LPI Linux Certification in a Nutshell)
-
$590$502ASP.NET 程式設計徹底研究
-
$990$842Windows 程式設計 (Programming Windows, 5/e)
-
$560$476鳥哥的 Linux 私房菜─基礎學習篇增訂版
-
$850$723SCJP‧SCJD 專業認證指南 (Sun Certified Programmer & Developer for Java 2 #310-305 與310-027)
-
$750$600JSP 2.0 技術手冊
-
$990$842Windows 程式設計使用 MFC (Programming Windows with MFC, 2/e)
-
$780$624Linux 程式設計教學手冊
-
$1,712$1,626Hardening Network Security
-
$590$460Struts 333個應用範例技巧大全集
-
$620$527Linux iptables 技術實務─防火牆、頻寬管理、連線管制
-
$580$452JBoss 入門與應用-EJB 與 Web Services 開發手冊
-
$880$695深入淺出 Java 程式設計, 2/e (Head First Java, 2/e)
-
$750$585Linux Kernel 完全剖析
-
$580$493Linux Mail Server 技術實務─架設、稽核、防毒、防垃圾信
-
$650$520Java 認證 SCJP 5.0 猛虎出閘
-
$780$663鳥哥的 Linux 私房菜基礎學習篇, 2/e
-
$450$351Ajax 與 Google Map API 入門實作
-
$850$723SQL Server 2005 SSIS 整合服務
-
$520$199Ruby on Rails 網路應用程式開發與建置
-
$720$576聖殿祭司的 ASP.NET 2.0 專家技術手冊-使用 VB
-
$580$493輕鬆打造我的網站─XOOPS2 深入使用手冊
-
$1,650$1,568Pragmatic Software Testing: Becoming an Effective and Efficient Test Professional
商品描述
Description:
Discover the true potential of peer-to-peer networks
Napster, Kazaa, ICQ–file- and music-sharing peer-to-peer (P2P) networks have revolutionized the use of the Internet, but have also brought bad press to peer-to-peer computer networking. Yet P2P offers a great many legitimate benefits. Just witness the recent discovery of the largest prime number, a poster child for distributed computing!
P2P is a class of applications that leverages previously unused Internet resources–storage, cycles, content, human presence. Instead of large, expensive servers and pricey storage networks, corporations and other organizations can share data and computing duties among their desktops through P2P.
Legitimate Applications of Peer-to-Peer Networks goes beyond file and music swapping to explore the true potential of P2P technology in business and other important applications, including:
- File sharing
- Data storage management
- Instant messaging
- IP telephony
- Collaborative content hosting
- Publish-subscribe systems
Considering the merits and disadvantages of both the P2P and traditional approaches from a business perspective, Legitimate Applications of Peer-to-Peer Networks will help technology and business professionals realize the genuine–and legitimate–potential of this misunderstood and often misused technology
Table of Contents:
Preface.
Who Will Benefit from This Book?
Who Is This Book Not For?
Organization of the Book.
1 The Peer-to-Peer Architecture.
1.1 Distributed Applications.
1.1.1 A Distributed Computing Example.
1.1.2 Client-Server Architecture.
1.1.3 Peer-to-Peer Architecture.
1.2 The Peer-to-Peer Software Structure.
1.2.1 Base Overlay Layer.
1.2.2 Middleware Functions.
1.2.3 Application Layer.
1.3 Comparison of Architectures.
1.3.1 Ease of Development.
1.3.2 Manageability.
1.3.3 Scalability.
1.3.4 Administrative Domains.
1.3.5 Security.
1.3.6 Reliability.
2 Peer Discovery and Overlay Formation.
2.1 Discovery.
2.1.1 Static Configuration.
2.1.2 Centralized Directory.
2.1.3 Using the Domain Name Service.
2.1.4 Member Propagation Techniques with Initial Member Discovery.
2.1.4.1 Member Propagation with Full Member List.
2.1.4.2 Member Propagation with Partial Member List.
2.1.4.3 Member Propagation with a Hint Server.
2.2 Overlay Formation.
2.2.1 Creating an Overlay Link.
2.2.1.1 Communicating Across Firewalls.
2.2.1.2 Communicating Across Two Firewalls.
2.3 Topology Selection.
2.3.1 Random Mesh Formation.
2.3.2 Tiered Formation.
2.3.3 Ordered Lattices.
3 Application-Layer Multicast.
3.1 General Multicast Techniques.
3.1.1 Group Addressing.
3.1.2 Group Maintenance.
3.1.3 Message Forwarding Scheme.
3.1.4 Multicast Routing.
3.1.5 Secure Multicast.
3.1.6 Reliable Multicast.
3.1.7 Multicast Flow and Congestion Control.
3.2 Network-Layer Multicast—IP Multicast.
3.2.1 Problems with IP-Layer Multicast.
3.3 Application-Layer Multicast.
3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks.
3.3.2 Multicast in Peer-to-Peer Overlays.
4 File-Sharing Applications.
4.1 File-Sharing Overview.
4.1.1 Disk Space Management.
4.1.2 File Indexing.
4.1.3 File Search/Retrieval.
4.1.4 Access Control and Security.
4.1.5 Anonymous File Retrieval.
4.1.6 Search Acceleration Techniques.
4.1.7 Digital Rights Management.
4.2 Usage of File-Sharing Applications.
4.2.1 Limitations of File-Sharing Applications.
4.3 Preventing Unauthorized File Sharing.
4.3.1 Firewall-Based Techniques.
4.3.2 Asset Inventory.
4.3.3 Port Scanning.
4.3.4 Usage-Based Rate Control.
4.3.5 Malicious Participation.
5 File Storage Service.
5.1 Handle Management.
5.2 Retrieving Files with Handles.
5.2.1 Circular Ring Routing.
5.2.2 Plaxton Scheme.
5.2.3 CAN Routing Algorithm.
5.2.4 Modified Network Routing Schemes.
5.2.5 Modified Broadcast.
5.3 Miscellaneous Functions.
5.3.1 Access Control.
5.3.2 Availability and Reliability.
5.4 Usage Scenarios.
5.4.1 Distributed File Systems.
5.4.2 Anonymous Publishing.
6 Data Backup Service.
6.1 The Traditional Data Management System.
6.2 The Peer-to-Peer Data Management System.
6.2.1 The Backup/Restore Manager.
6.2.2 The Peer Searcher.
6.2.3 The File Searcher.
6.2.4 The Properties Manager.
6.2.5 The Data Manager.
6.2.6 The Schedule Manager.
6.3 Security Issues.
6.4 Hybrid Data Management Approach.
6.5 Feasibility of Peer-to-Peer Data Backup Service.
7 Peer-to-Peer Directory System.
7.1 LDAP Directory Servers.
7.2 Why Use Peer-to-Peer Directories?
7.3 A Peer-to-Peer Directory System.
7.3.1 Schema Maintenance.
7.3.2 Operation Processing.
7.3.2.1 Local Placement of Records.
7.3.2.2 Name Space Partitioning.
7.3.3 Access Management.
7.4 Example Applications of Peer-to-Peer Directory.
8 Publish-Subscribe Middleware.
8.1 Overview of Publish-Subscribe Systems.
8.2 Server-Centric Publish-Subscribe Services.
8.3 Peer-to-Peer Publish-Subscribe Services.
8.3.1 Broadcast Scheme.
8.3.2 Multicast Group Approach.
8.4 Comparison of Approaches.
8.5 Example Application.
9 Collaborative Applications.
9.1 General Issues.
9.2 Instant Messaging.
9.3 IP Telephony.
9.4 Shared Collaboration Databases.
9.5 Collaborative Content Hosting.
9.6 Anonymous Web Surfing.
10 Related Topics.
10.1 Legacy Peer-to-Peer Applications.
10.2 Grid Computing.
References.
Index.