![Cover image for Peer-to-peer : building secure, scalable, and manageable networks Cover image for Peer-to-peer : building secure, scalable, and manageable networks](/client/assets/5.0.0/ctx//client/images/no_image.png)
Title:
Peer-to-peer : building secure, scalable, and manageable networks
Personal Author:
Publication Information:
New York : McGraw-Hill, 2002
ISBN:
9780072192841
Added Author:
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010019014 | TK5105.525 M66 2002 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This text contains practical explorations of peer-to-peer technologies that enable the reader to quickly implement and leverage P2P. There are clear definitions, real-world examples, practical technology explorations, and no-nonsense solutions, along with 16 pages of blueprints that map out sample peer-to-peer network designs to help to place the information in a visual context for the reader.
Table of Contents
Acknowledgments | p. xv |
Introduction | p. xvii |
1 P2P Defined | p. 1 |
Direct Exchanges Between Peers | p. 2 |
P2P and the Internet | p. 3 |
A Concise P2P Definition | p. 4 |
Why Is P2P Important, and How Is It Implemented? | p. 8 |
The Value of P2P | p. 8 |
P2P Saves Time | p. 9 |
The Technical Value of P2P | p. 11 |
P2P Leverages Internet Openness | p. 11 |
P2P Leverages Technology Standards | p. 13 |
P2P Leverages Personal Computer Hardware | p. 13 |
P2P Leverages Personal Computer Information and Application Services | p. 14 |
P2P Offers a Fully Distributed Symmetric Architecture | p. 15 |
The P2P Value Proposition | p. 15 |
One-to-One P2P Value | p. 16 |
One-to-Many P2P Value | p. 16 |
Many-to-Many P2P Value | p. 16 |
P2P Context Value | p. 17 |
Real-World Examples | p. 18 |
SFLAN | p. 18 |
Roku | p. 19 |
Groove | p. 19 |
SETI@home | p. 19 |
Jabber | p. 20 |
Social Impacts of P2P | p. 21 |
A Part of the Woodwork | p. 21 |
Modes of Interaction | p. 21 |
Immediacy | p. 22 |
Intimacy | p. 23 |
Utility | p. 25 |
Control | p. 26 |
The Dark Side of P2P | p. 27 |
What Makes P2P Important to You | p. 28 |
Summary | p. 29 |
2 The P2P City Tour: Existing Solutions Ready Now | p. 31 |
The P2P City Tour: Existing Solutions Ready Now | p. 32 |
The P2P Safari: Possibilities and Promises | p. 32 |
What You'll Learn Along the Way | p. 33 |
The Current Landscape Map for P2P | p. 34 |
P2P Resource Product and Services | p. 36 |
File Sharing | p. 37 |
Distributed Computation | p. 40 |
Distributed Search | p. 41 |
P2P Collaboration Product and Services | p. 45 |
Basic Collaboration Product and Services | p. 46 |
Gaming | p. 52 |
Instant Messaging | p. 54 |
City Tour Summary | p. 57 |
3 A Safari into the Software Developer's World | p. 59 |
P2P Enablers | p. 60 |
Infrastructure | p. 62 |
Distributed Objects | p. 66 |
Development Frameworks | p. 70 |
Messaging Frameworks | p. 73 |
Open Source Software--What's It All About? | p. 77 |
Advantages and Disadvantages of Open Source Software | p. 78 |
Getting Involved | p. 78 |
In-the-Net P2P Services | p. 78 |
Jungle Tour Summary | p. 82 |
Tour Conclusions | p. 83 |
New Paradigms Require New Thinking | p. 83 |
New Paradigms Require Old Thinking | p. 84 |
New Paradigms Require Unconventional Wisdom | p. 86 |
4 Of Names and Addresses | p. 89 |
The Naming of Things | p. 90 |
Is There a Difference Between a Name and an Address? | p. 91 |
Telegraphy--The Victorian Internet | p. 92 |
The Telephone Age--Reach Out and Address Someone | p. 94 |
Finally, the Internet | p. 96 |
Alternative Namespaces | p. 97 |
What's Next? | p. 98 |
Dealing with Addressing | p. 99 |
The Role of Internet Protocol | p. 99 |
The Role of Hypertext Transfer Protocol | p. 100 |
Dynamic DNS Addressing | p. 100 |
Peering Through the Firewall | p. 102 |
Other Protocols | p. 103 |
Architectures for Connecting Resources | p. 103 |
The Content-Addressable Web for P2P | p. 108 |
Instant Messaging | p. 111 |
Instant Messaging: Just a New Kind of E-Mail? | p. 114 |
Instant Messaging Architecture | p. 115 |
Roaming Mobility: Part 1 | p. 119 |
Summary | p. 120 |
5 Supporting P2P: Architecture Matters | p. 121 |
Where Do You Start with Architecture? | p. 123 |
Putting the Architecture Team to Work | p. 126 |
Securing Your Peer (Featuring the Security Guard) | p. 126 |
The Security Guard's Security Acid Test | p. 129 |
Making Your Peer Almost Always Available (Featuring the Training Coach) | p. 130 |
Redundancy | p. 130 |
Loose Coupling | p. 131 |
Backup and Recovery | p. 133 |
The Training Coach's Availability Acid Test | p. 134 |
Making Your Peer Easy to Use, Administer, and Maintain (Featuring the User Advocate and the Administrator) | p. 135 |
The Making Your Peer Easy to Use, Administer, and Maintain Acid Test | p. 138 |
Distributing the Peer Workload (Featuring the Coach) | p. 138 |
Four Forms for Solution Distribution | p. 139 |
Dealing with Sometimes-Disconnected Peers | p. 144 |
The Training Coach's Distribution Acid Test | p. 145 |
Remembering Important Information: A True Sign of P2P Intelligence (Featuring the Accountant) | p. 145 |
Files and File Systems | p. 147 |
Databases | p. 147 |
Comparison of Information Storage Choices | p. 148 |
The Accountant's Information Management Acid Test | p. 149 |
Being a GOOD Peer by Adhering to Standards (Featuring the Inspector) | p. 149 |
Dealing with Disagreeable Peers | p. 153 |
Standards "Extensions" | p. 154 |
Standards Summary | p. 154 |
The Inspector's Standards Acid Test | p. 155 |
Establishing a Home for Your Peer (Featuring the Pilot) | p. 155 |
Avoiding Turbulence | p. 157 |
The Pilot's Portability Acid Test | p. 159 |
Architecture Approach | p. 159 |
Summary | p. 160 |
6 Getting P2P Enabled | p. 163 |
Getting Connected | p. 165 |
Connecting Your WAN | p. 165 |
Connecting Your LAN | p. 173 |
Getting Secure | p. 181 |
How Many Network Listeners Do You Have? | p. 182 |
Implementing System Security | p. 185 |
Monitoring Your Security | p. 189 |
Protecting Against Viruses | p. 190 |
Getting Known | p. 190 |
Getting Known with a Fixed IP Address | p. 191 |
Getting Known with a Variable IP Address | p. 192 |
Summary | p. 196 |
7 Getting Together: P2P Collaboration | p. 199 |
Why Is Collaboration a Critical Tool? | p. 200 |
The Groove Experience | p. 201 |
Installing Groove | p. 201 |
Exploring a Groove Space | p. 204 |
Mining Presence | p. 205 |
Staying Alert | p. 208 |
Sharing Documents | p. 208 |
Tooling Along | p. 210 |
Maintaining Your Identity | p. 211 |
Summarizing Groove | p. 215 |
The Magi Experience | p. 215 |
Gift of (the) Magi | p. 215 |
Installing Magi | p. 217 |
Using Magi with a NAT'd LAN | p. 221 |
Exploring the Magi User Experience | p. 222 |
Buddying Up | p. 224 |
Indicating Presence | p. 226 |
Sharing Folders and Establishing Collaboration Groups | p. 226 |
Using Mobile Magi | p. 227 |
Accessing Magi via a Remote WAP Phone | p. 230 |
Searching in a Magi Peer Group | p. 234 |
Working with Metadata Rather Than Actual Data | p. 240 |
Summarizing Magi | p. 241 |
Summary | p. 241 |
8 Getting Entertained: P2P Music and Video | p. 243 |
Music | p. 244 |
Getting Music | p. 244 |
Playing Music | p. 252 |
Broadcasting P2P Music: Your P2P Radio Station | p. 254 |
Music Summary | p. 262 |
Video | p. 263 |
Getting Video and Graphics | p. 264 |
Creating Video | p. 265 |
Broadcasting P2P Video: Your P2P TV Station | p. 271 |
P2P and Web Servers: The P2P Aggregator | p. 277 |
Video Summary | p. 278 |
Summary | p. 279 |
9 Getting to Tomorrow: The Future of P2P | p. 281 |
Home Gateways | p. 283 |
Going Wireless via LANs | p. 283 |
Going Wireless via Mobile Devices | p. 285 |
Designing for Mobile P2P | p. 285 |
A Mountain Won't Fit in a Teacup | p. 286 |
Product Simplicity Wins | p. 287 |
No Watch Cursor, No Modes | p. 289 |
Maximize Predictability | p. 290 |
Additional Rules for Mobile P2P Design | p. 290 |
Maintain Contextual Consistency | p. 290 |
Untrap Information | p. 290 |
Disintermediate Tools | p. 291 |
P2P Is Not the Web | p. 292 |
Searching Should Replace Synchronization | p. 294 |
Mobile Capabilities | p. 295 |
Who Will Win the Mobile P2P Prize? | p. 296 |
The Role of VUI (Voice User Interface) in P2P | p. 299 |
Agents and P2P | p. 300 |
P2P Agents Are Not Tools | p. 301 |
Peer-to-Peer Computing and Agent Technology | p. 306 |
The Importance of Context in P2P | p. 307 |
The Web Server Is Everywhere | p. 309 |
Web Services | p. 309 |
Creating a Personal Web Services Engine | p. 312 |
The True Cost of Information | p. 313 |
P2P as an Information Utility | p. 314 |
P2P and Warfighting | p. 317 |
Command and Control Vision | p. 317 |
Intelligence Analysis | p. 322 |
Summary | p. 322 |
Index | p. 325 |