Download Peer-to-Peer: Harnessing the Power of Disruptive by Andy Oram PDF

By Andy Oram

The time period ''peer-to-peer'' has emerge as utilized to networks that count on finish clients to give a contribution their very own documents, computing time, or different assets to a few shared venture. much more attention-grabbing than the technology's technical underpinnings is its socially disruptive strength: in quite a few methods those structures go back content material, selection, and keep watch over to bland clients. This e-book provides the ambitions that force the builders of the best-known peer-to-peer structures, the issues they have confronted, and the technical suggestions they have chanced on. The members are top builders of famous peer-to-peer structures, together with well known strength, Jabber, Gnutella, FreeNet, SETI@Home, crimson Rover, Publius, unfastened Haven, and Groove Networks. themes comprise the net as a set of conversations, metadata, functionality, belief, responsibility, safeguard, and gateways among structures.

Show description

Read Online or Download Peer-to-Peer: Harnessing the Power of Disruptive Technologies PDF

Similar unix books

GCC.The complete reference

This can be the definitive connection with the GCC open-source compiler. Get up to date info at the newest features--including compiling Java code, development purposes utilizing a number of languages, utilizing the debugger, linking, libraries, and lots more and plenty extra.

DNS in Action: A detailed and practical guide to DNS implementation, configuration, and administration

An in depth and useful consultant to DNS implementation, configuration, and management Technically exact with useful ideas complete advisor to configuration and management of DNS servers Covers DNS Extensions, delegation, and registration intimately The area identify approach is likely one of the foundations of the net.

Pluggable Authentication Modules : the definitive guide to PAM for Linux sysadmins and C developers : a comprehensive and practical guide to PAM for Linux : how modules work and how to implement them

First this publication explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It exhibits intimately how PAM works and the way it's configured. Then eleven universal modules used throughout UNIX/Linux distributions are tested and defined, together with all their parameters. install of third-party modules is mentioned, and the advance of latest modules and PAM-aware functions is printed.

Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not As Hard As You Think

Simply Say No to Microsoft - starts via tracing Microsoft's upward thrust from tiny software program startup to monopolistic juggernaut and explains how the company's practices through the years have discouraged innovation, stunted pageant, and helped foster an atmosphere ripe for viruses, insects, and hackers. Readers learn the way they could unload Microsoft items - even the home windows working method - and stay efficient.

Extra info for Peer-to-Peer: Harnessing the Power of Disruptive Technologies

Example text

Both need to make it incredibly simple to participate. page 36 Peer to Peer: Harnessing the Power of Disruptive Technologies Finally, both Napster and SETI@Home have tried to exploit what Clay Shirky (who contributed Chapter 2, to this book) memorably called "the dark matter of the Internet" - the hundreds of millions of interconnected PCs that have hitherto been largely passive participants in the network. net/) are making a link between file sharing and distributed computation. In the end, both distributed file sharing and distributed computation are aspects of a new world where individual computer systems take on their most important role as part of a network - where the whole is much greater than the sum of its parts.

This will lead to additional centralization layers as unknown artists try to provide additional information to help users find their work. This is much the same thing that happened on the Web, as a class of portals such as Yahoo! grew up to categorize and market information about the peer-to-peer world of hyperlinked web pages. page 39 Peer to Peer: Harnessing the Power of Disruptive Technologies It's easy to see, then, how understanding and managing namespaces and other forms of metadata becomes central to peer-to-peer applications.

The Napster model breaks down in cases where more complex metadata is required to find a given piece of data. For example, in the case of classical music, an artist/song combination is often insufficient, since the same piece may be performed by various combinations of artists. " Without preexisting knowledge of song titles and artists, there is nothing for the Napster user to search for. This will lead to additional centralization layers as unknown artists try to provide additional information to help users find their work.

Download PDF sample

Rated 4.19 of 5 – based on 33 votes