Legitimate Applications of Peer-to-Peer Networks by Dinesh C. Verma

By Dinesh C. Verma

The publication examines the several valid purposes used over a peer-to-peer community (p2p)The fabric examines the layout and improvement of novel purposes designed to leverage the allotted nature of peer-to-peer environmentsGoes past the most well-liked program of file-sharing (including sharing of video and audio documents) and discusses the numerous diversified applicationsCompares conventional and peer-to-peer infrastructure and discusses advantages and demerits of every process from a enterprise viewpoint

Show description

Read Online or Download Legitimate Applications of Peer-to-Peer Networks PDF

Best design & architecture books

Operational Amplifiers: Theory and Design

Operational Amplifiers – conception and layout, moment version provides a scientific circuit layout of operational amplifiers. Containing state of the art fabric in addition to the necessities, the publication is written to entice either the circuit dressmaker and the process clothier. it's proven that the topology of all operational amplifiers should be divided into 9 major total configurations.

Computer and Information Security Handbook

The second edition of this complete instruction manual of computing device and data security provides the main entire view of desktop protection and privateness on hand. It deals in-depth insurance of safety conception, expertise, and perform as they relate to proven applied sciences in addition to contemporary advances.

Languages, Design Methods, and Tools for Electronic System Design: Selected Contributions from FDL 2015

This booklet brings jointly a variety of the easiest papers from the eighteenth version of the discussion board on specification and layout Languages convention (FDL), which came about on September 14-16, 2015, in Barcelona, Spain. FDL is a well-established foreign discussion board dedicated to dissemination of analysis effects, functional reports and new rules within the software of specification, layout and verification languages to the layout, modeling and verification of built-in circuits, advanced hardware/software embedded structures, and mixed-technology structures.

Additional resources for Legitimate Applications of Peer-to-Peer Networks

Example text

The participant would connect to some members of this subset and thus be able to communicate directly to them. Messages exchanged between participants that are not directly connected are forwarded by the other participants until they reach the desired recipient. A logical interconnection is created among the different participants for this forwarding. This logical interconnection provides for a smaller network of the peers that is overlaid onto the global Internet. This overlay network provides the basic communication mechanism for peer-to-peer networks.

To build a server-centric solution, one would typically need to procure dedicated computers and host them at a facility. , workstations and laptops) that are not always heavily used. This enables a peer-to-peer infrastructure to harness many more computers at very little cost and thus allows a more scalable solution at a lower cost. A fair criticism of the low-cost aspect of peer-to-peer systems such as gnutella or kazaa is that they are getting a free ride on the costly infrastructure paid for and supported by users and Internet service providers (ISPs).

In Chapter 3, we look at the use of the overlays formed in peerto-peer networks to implement application-level multicast. qxd 1/27/2004 12:47 PM Page 37 3 APPLICATION-LAYER MULTICAST All computing machines that make up a distributed systems need to communicate with each other in order to perform their function. The most common type of communication among machines is unicast communication, in which two machines communicate with each other by sending messages addressed to the other. Other types of communications can prove very useful in other contexts.

Download PDF sample

Rated 4.89 of 5 – based on 34 votes