Legitimate Peer to Peer Network Applications : Beyond File and Music Swapping
Dinesh C. Verma
- 出版商: Wiley
- 出版日期: 2004-03-18
- 定價: $2,550
- 售價: 5.0 折 $1,275
- 語言: 英文
- 頁數: 164
- 裝訂: Hardcover
- ISBN: 0471463698
- ISBN-13: 9780471463696
-
相關分類:
大數據 Big-data、Web-crawler 網路爬蟲
立即出貨 (庫存=1)
買這商品的人也買了...
-
$580$458 -
$980$774 -
$880$695 -
$590$466 -
$990$782 -
$560$504 -
$850$723 -
$750$593 -
$990$782 -
$780$616 -
$1,870$1,777 -
$590$460 -
$620$527 -
$580$452 -
$880$581 -
$750$585 -
$580$493 -
$650$514 -
$780$702 -
$450$351 -
$850$723 -
$520$406 -
$720$569 -
$580$522 -
$1,960$1,862
相關主題
商品描述
Description:
Discover the true potential of peer-to-peer networks
Napster, Kazaa, ICQ–file- and music-sharing peer-to-peer (P2P) networks have revolutionized the use of the Internet, but have also brought bad press to peer-to-peer computer networking. Yet P2P offers a great many legitimate benefits. Just witness the recent discovery of the largest prime number, a poster child for distributed computing!
P2P is a class of applications that leverages previously unused Internet resources–storage, cycles, content, human presence. Instead of large, expensive servers and pricey storage networks, corporations and other organizations can share data and computing duties among their desktops through P2P.
Legitimate Applications of Peer-to-Peer Networks goes beyond file and music swapping to explore the true potential of P2P technology in business and other important applications, including:
- File sharing
- Data storage management
- Instant messaging
- IP telephony
- Collaborative content hosting
- Publish-subscribe systems
Considering the merits and disadvantages of both the P2P and traditional approaches from a business perspective, Legitimate Applications of Peer-to-Peer Networks will help technology and business professionals realize the genuine–and legitimate–potential of this misunderstood and often misused technology
Table of Contents:
Preface.
Who Will Benefit from This Book?
Who Is This Book Not For?
Organization of the Book.
1 The Peer-to-Peer Architecture.
1.1 Distributed Applications.
1.1.1 A Distributed Computing Example.
1.1.2 Client-Server Architecture.
1.1.3 Peer-to-Peer Architecture.
1.2 The Peer-to-Peer Software Structure.
1.2.1 Base Overlay Layer.
1.2.2 Middleware Functions.
1.2.3 Application Layer.
1.3 Comparison of Architectures.
1.3.1 Ease of Development.
1.3.2 Manageability.
1.3.3 Scalability.
1.3.4 Administrative Domains.
1.3.5 Security.
1.3.6 Reliability.
2 Peer Discovery and Overlay Formation.
2.1 Discovery.
2.1.1 Static Configuration.
2.1.2 Centralized Directory.
2.1.3 Using the Domain Name Service.
2.1.4 Member Propagation Techniques with Initial Member Discovery.
2.1.4.1 Member Propagation with Full Member List.
2.1.4.2 Member Propagation with Partial Member List.
2.1.4.3 Member Propagation with a Hint Server.
2.2 Overlay Formation.
2.2.1 Creating an Overlay Link.
2.2.1.1 Communicating Across Firewalls.
2.2.1.2 Communicating Across Two Firewalls.
2.3 Topology Selection.
2.3.1 Random Mesh Formation.
2.3.2 Tiered Formation.
2.3.3 Ordered Lattices.
3 Application-Layer Multicast.
3.1 General Multicast Techniques.
3.1.1 Group Addressing.
3.1.2 Group Maintenance.
3.1.3 Message Forwarding Scheme.
3.1.4 Multicast Routing.
3.1.5 Secure Multicast.
3.1.6 Reliable Multicast.
3.1.7 Multicast Flow and Congestion Control.
3.2 Network-Layer Multicast—IP Multicast.
3.2.1 Problems with IP-Layer Multicast.
3.3 Application-Layer Multicast.
3.3.1 Broadcast Mechanisms in Peer-to-Peer Networks.
3.3.2 Multicast in Peer-to-Peer Overlays.
4 File-Sharing Applications.
4.1 File-Sharing Overview.
4.1.1 Disk Space Management.
4.1.2 File Indexing.
4.1.3 File Search/Retrieval.
4.1.4 Access Control and Security.
4.1.5 Anonymous File Retrieval.
4.1.6 Search Acceleration Techniques.
4.1.7 Digital Rights Management.
4.2 Usage of File-Sharing Applications.
4.2.1 Limitations of File-Sharing Applications.
4.3 Preventing Unauthorized File Sharing.
4.3.1 Firewall-Based Techniques.
4.3.2 Asset Inventory.
4.3.3 Port Scanning.
4.3.4 Usage-Based Rate Control.
4.3.5 Malicious Participation.
5 File Storage Service.
5.1 Handle Management.
5.2 Retrieving Files with Handles.
5.2.1 Circular Ring Routing.
5.2.2 Plaxton Scheme.
5.2.3 CAN Routing Algorithm.
5.2.4 Modified Network Routing Schemes.
5.2.5 Modified Broadcast.
5.3 Miscellaneous Functions.
5.3.1 Access Control.
5.3.2 Availability and Reliability.
5.4 Usage Scenarios.
5.4.1 Distributed File Systems.
5.4.2 Anonymous Publishing.
6 Data Backup Service.
6.1 The Traditional Data Management System.
6.2 The Peer-to-Peer Data Management System.
6.2.1 The Backup/Restore Manager.
6.2.2 The Peer Searcher.
6.2.3 The File Searcher.
6.2.4 The Properties Manager.
6.2.5 The Data Manager.
6.2.6 The Schedule Manager.
6.3 Security Issues.
6.4 Hybrid Data Management Approach.
6.5 Feasibility of Peer-to-Peer Data Backup Service.
7 Peer-to-Peer Directory System.
7.1 LDAP Directory Servers.
7.2 Why Use Peer-to-Peer Directories?
7.3 A Peer-to-Peer Directory System.
7.3.1 Schema Maintenance.
7.3.2 Operation Processing.
7.3.2.1 Local Placement of Records.
7.3.2.2 Name Space Partitioning.
7.3.3 Access Management.
7.4 Example Applications of Peer-to-Peer Directory.
8 Publish-Subscribe Middleware.
8.1 Overview of Publish-Subscribe Systems.
8.2 Server-Centric Publish-Subscribe Services.
8.3 Peer-to-Peer Publish-Subscribe Services.
8.3.1 Broadcast Scheme.
8.3.2 Multicast Group Approach.
8.4 Comparison of Approaches.
8.5 Example Application.
9 Collaborative Applications.
9.1 General Issues.
9.2 Instant Messaging.
9.3 IP Telephony.
9.4 Shared Collaboration Databases.
9.5 Collaborative Content Hosting.
9.6 Anonymous Web Surfing.
10 Related Topics.
10.1 Legacy Peer-to-Peer Applications.
10.2 Grid Computing.
References.
Index.
商品描述(中文翻譯)
描述:
探索點對點網絡的真正潛力
Napster、Kazaa、ICQ等文件和音樂共享的點對點(P2P)網絡已經革新了互聯網的使用方式,但也給點對點計算機網絡帶來了負面評價。然而,P2P提供了許多合法的好處。只需看看最近發現的最大質數,這是分散計算的典範!
P2P是一類應用程序,利用以前未使用的互聯網資源-存儲、計算、內容、人的存在。企業和其他組織可以通過P2P在他們的桌面之間共享數據和計算任務,而不是使用大型昂貴的服務器和昂貴的存儲網絡。
《合法的點對點網絡應用》不僅僅是探索文件和音樂共享,還探索了P2P技術在商業和其他重要應用中的真正潛力,包括:
- 文件共享
- 數據存儲管理
- 即時通訊
- IP電話
- 協作內容托管
- 發布-訂閱系統
從商業角度考慮P2P和傳統方法的優點和缺點,《合法的點對點網絡應用》將幫助技術和商業專業人士實現這種被誤解和常常被誤用的技術的真正和合法的潛力。
目錄:
前言。
誰會從這本書中受益?
這本書不適合誰?
本書的組織。
1 點對點架構。
1.1 分散應用。
1.1.1 分散計算示例。
1.1.2 客戶端-服務器架構。
1.1.3 點對點架構。
1.2 點對點軟件結構。
1.2.1 基礎覆蓋層。
1.2.2 中間件功能。
1.2.3 應用層。
1.3 架構比較。
1.3.1 開發的便利性。
1.3.2 可管理性。
1.3.3 可擴展性。
1.3.4 管理域。
1.3.5 安全性。
1.3.6 可靠性。
2 尋找對等體和覆蓋層形成。
2.1 尋找。
2.1.1 靜態配置。
2.1.2 集中式目錄。
2.1.3 使用域名服務。
2.1.4 使用初始成員發現的成員傳播技術。
2.1.4.1 使用完整成員列表的成員傳播。
2.1.4.2 使用部分成員列表的成員傳播。
2.1.4.3 使用提示服務器的成員傳播。
2.2 覆蓋層形成。
2.2.1 創建覆蓋層連接。
2.2.1.1 跨防火牆通信。
2.2.1.2 跨兩個防火牆通信。
2.3 拓撲選擇。
2.3.1 隨機網格形成。
2.3.2 分層形成。
2.3.3 有序格子。
3 應用層組播。
3.1 通用組播技術。
3.1.1 群組地址。
3.1.2 群組維護。
3.1.3 消息轉發方案。
3.1.4 組播路由。
3.1.5 安全組播。
3.1.6 可靠組播。
3.1.7 組播流量和擁塞控制。
3.2 網絡層組播-IP組播。
3.2.1 IP層組播的問題。
3.3 應用層組播。
3.3.1 點對點網絡中的廣播機制。
3.3.2 點對點覆蓋中的組播。
4 文件共享應用。
4.1 文件共享概述。
4.1.1 磁盤空間管理。
4.1.2 文件索引。
4.1.3 文件搜索/檢索。
4.1.4 訪問控制和安全性。
4.1.5 匿名文件檢索。
4.1.6 搜索加速技術。
4.1.7 數字版權管理。
4.2 文件共享應用的使用。
4.2.1 文件共享應用的限制。
4.3 防止未經授權的文件共享。
4.3.1 基於防火牆的技術。
4.3.2 資產清單。
4.3.3 端口掃描。
4.3.4 使用-Ba