Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

Buy

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users. While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it. This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found.

Peer-to-Peer is a book about an emerging idea. That idea is that the traditional model of participating in the Internet, in which a small computer operated by an everyday user (a "client") asks for and receives information from a big computer administered by a corporation or other large entity (a "server"), is beginning to give some ground to a new (new to the fringes of the Internet, anyway) model called peer-to-peer networking. In peer-to-peer networking, all participants in a network are approximately equal. Furthermore, the participants are usually ordinary computers run by everyday people. The ICQ chat service and the Napster music-sharing community are examples of what this book is about.

The chief advantage of peer-to-peer networks is that large numbers of people share the burden of providing computing resources (processor time and disk space), administration effort, creativity, and--in more than a few cases--legal liability. Furthermore, it's relatively easy to be anonymous in such an environment, and it's harder for opponents of your peer-to-peer service to bring it down. The primary disadvantage of peer-to-peer systems, as anyone will attest who's had an MP3 download prematurely terminated when a dialup user went offline will attest, is the tendency of computers at the edge of the network to fade in and out of availability. Accountability for the actions of network participants is a potential problem, too.

This is a book about the idea of equipping ordinary Internet users' computers with mechanisms that enable them to connect, more or less automatically and without human attention, to other everyday Internet users' machines. By forming networks of computers at the so-called "edge" of the Internet, it's possible to offer valuable services without the burden of building and administering large, centralized computer systems of the sort that host traditional Web sites. Napster is the most successful example to date, though nerds will note that it's not a completely peer-to-peer system because users register their file libraries with a central server when they log on to the service.

(HTML tags aren't allowed.)

PlayStation®Mobile Development Cookbook
PlayStation®Mobile Development Cookbook

Over 65 recipes that will help you create and develop amazing mobile applications!

Overview

  • Learn how you can create your own fantastic PlayStation®Mobile (PSM) applications
  • Develop 2D games quickly and easily, complete with graphics, audio, and input
  • Discover how to...
Vampire: The Requiem For Dummies
Vampire: The Requiem For Dummies

Includes tips on characters and storylines for storytellers

Develop your character, understand the World of Darkness, and play today!

Vampire lore has intrigued ordinary mortals for centuries. Sink your teeth into this book and find out how to slip into their mysterious, mystical world! Create the vampire of
...

Business in Action (6th Edition)
Business in Action (6th Edition)

An introduction to business text can be complete without being complex and overwhelming–and this text proves it!

Business in Action is uniquely positioned to help today’s readers become tomorrow’s focused, highly productive business professionals. It is the only introduction to business...


Linux Apache Web Server Administration (Linux Library)
Linux Apache Web Server Administration (Linux Library)
Authoratative Answers to All Your Apache Questions—Now Updated to Cover Apache 2.0

Linux Apache Web Server Administration is the most complete, most advanced guide to the Apache Web server you’ll find anywhere. Written by a leading Apache expert—and now updated to
...
Virtual Machines
Virtual Machines

This book offers a unique insight into the building of virtual machines for sequential, object-oriented and parallel languages, and uses comparisons of different VMs to provide actual, practical examples.

State transitions are used as a formal technique for the specification of virtual machines throughout and – in addition...

The Secret: What Great Leaders Know and Do
The Secret: What Great Leaders Know and Do
Written by the legendary bestselling author Ken Blanchard, The Secret (over 100,000 copies sold) answers a question most leaders ask at some point in their career, ?What do I need to do to be a great leader??...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy