Legitimate Applications of Peer-to-Peer Networks
|
Contents
1 The PeertoPeer Architecture | 1 |
2 Peer Discovery and Overlay Formation | 19 |
3 ApplicationLayer Multicast | 37 |
4 FileSharing Applications | 55 |
5 File Storage Service | 77 |
6 Data Backup Service | 95 |
7 PeertoPeer Directory System | 109 |
Other editions - View all
Common terms and phrases
access control access control lists anonymous Applications of Peer-to-Peer backup copy backup server backup site bandwidth broadcast Chapter client-server architecture clients configuration connected created data management database digital rights management directory server directory system disk space distinguished name encryption enterprise entries example file handle file sharing file system file-sharing applications firewall functions Gnutella grid computing hash identifier identity instant messaging Internet IP address Kazaa large number LDAP Legitimate Applications machine maintain mechanism mesh message forwarding messaging servers middleware multicast addresses multicast communication multicast group multiple name space neighbors node obtain operation overlay network packets peer peer-to peer-to-peer applications peer-to-peer approach peer-to-peer directory peer-to-peer implementation peer-to-peer infrastructure peer-to-peer networks peer-to-peer systems port numbers publish-subscribe system query receive recipients records reliable requests router routing protocols routing table scalable sender specific stored techniques tion to-peer topic tree typically unicast unique update users WIKI