Download Legitimate Applications of Peer-to-Peer Networks by Dinesh C. Verma PDF

By Dinesh C. Verma

The booklet examines the various valid functions used over a peer-to-peer community (p2p)The fabric examines the layout and improvement of novel functions designed to leverage the dispensed nature of peer-to-peer environmentsGoes past the preferred software of file-sharing (including sharing of video and audio documents) and discusses the numerous various applicationsCompares conventional and peer-to-peer infrastructure and discusses advantages and demerits of every process from a enterprise standpoint

Show description

Read or Download Legitimate Applications of Peer-to-Peer Networks PDF

Similar design & architecture books

SDL '97: Time for Testing

As Cavalli and Sarma astutely remarked within the advent to this quantity, it really is fairly notable that SDL '97 could have the 1st player more youthful than SDL itself. SDL '97 presents the chance to mirror the path SDL has taken and why it's been winning over 20 years the place different languages addressing an identical marketplace have failed.

Network-on-Chip Architectures: A Holistic Design Exploration

The ongoing aid of function sizes into the nanoscale regime has ended in dramatic raises in transistor densities. Integration at those degrees has highlighted the criticality of the on-chip interconnects. Network-on-Chip (NoC) architectures are seen as a potential method to burgeoning international wiring delays in many-core chips, and feature lately crystallized right into a major learn area.

Software and system development using virtual platforms : full-system simulation with Wind River Simics

Digital structures are discovering common use in either pre- and post-silicon software program and procedure improvement. They decrease time to marketplace, enhance procedure caliber, make improvement extra effective, and permit really concurrent hardware/software layout and bring-up. digital systems raise productiveness with extraordinary inspection, configuration, and injection features.

Extra resources for Legitimate Applications of Peer-to-Peer Networks

Example text

Each server can process the request in the same manner. In most cases, the dispatcher maintains the affinity between clients and servers, that is, the dispatcher remembers which client requests were forwarded to which server and forwards multiple requests from the same client to the same server. An increase in the number of servers helps the system handle a large volume of requests. More details can be found in [8]. In general, if one uses the same number of computers to solve the problem, using all of the computers as servers would provide a more scalable system than using the same number of computers in a distributed peer-to-peer manner.

Peer-to-peer applications use many computers to solve a problem and thus are likely to provide a more scalable solution than a server-centric solution, which relies on a single computer to perform the equivalent task. In general, using multiple computers would tend to improve the scalability of the application compared with using only a single computer. However, a server-centric solution could be developed that uses multiple computers as well. Most high-performance server sites typically deploy many computers with a load balancer or dispatcher in front of the servers to provide a scalable solution.

The advantage of this approach is that it exploits a stable and longstanding service of the Internet. The disadvantage of the approach lies in the fact that each new member must register its IP address with the DNS when it starts up. , typical peer-to-peer systems may have thousands of members), the DNS infrastructure would not be able to handle such a large number of addresses for a single domain name. Furthermore, security issues would arise when arbitrary computers are allowed to register their IP addresses as aliases for an existing domain name.

Download PDF sample

Rated 4.98 of 5 – based on 29 votes