Muutke küpsiste eelistusi

E-raamat: Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges [Taylor & Francis e-raamat]

(The University of Hong Kong)
  • Taylor & Francis e-raamat
  • Hind: 133,87 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 191,24 €
  • Säästad 30%
"Preface Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift--intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development culture, and abundant information at our fingertips, computing power and user competence at the edge of the network has risen to an unprecedented level. Thus, devices at the edge (not restricted to desktop PCs) can congregate and share their resources (computing power, file data, etc.) to provide services to participating users in a self-sufficient manner, without the need of dedicated servers. With potentially up to millions of machines participating simultaneously (e.g., when some hot events are occurring), the aggregated computing resources can dwarf any powerful server farm. Well, well, well, ...these are "conceptual level" thinking as of now. There are still many road-blocks to such a vision, even though we do see millions of machines working together in a P2P manner (e.g., streaming live video events). Again, as the old saying goes, the devils are in the details. Thinking of such gigantic scale of sharing computing resources is one thing, while implementing the idea is definitely another. Road-blocks to the grand vision of truly global P2P sharing include architectural maintenance problems arising from the sheer scale of the system, incentives for truthful cooperation, trust among peers when they need to accept data from remote sources, security issues caused by the inevitable existence of malicious users, etc"--

"While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges provides comprehensive theoretical and practical coverage of the major features of contemporary P2P systems and examines the obstacles to further success.Setting the stage for understanding important research issues in P2P systems, the book first introduces various P2P network architectures. It then details the topology control research problem as well as existing technologies for handling topology control issues. The author describes novel and interesting incentive schemes for enticing peers to cooperate and explores recent innovations on trust issues. He also examines security problems in a P2P network. The final chapter addresses the future state of the field. Throughout the text, the highly popular P2P IPTV application, PPLive, is used as a case study to illustrate the practical aspects of the concepts covered.Addressing the unique challenges of P2P systems, this book presents practical applications of recent theoretical results in P2P computing. It also stimulates further research on critical issues, including performance and security problems"--

Provided by publisher.
List of Figures ix
List of Tables xiii
Preface xv
1 Introduction 1(4)
1.1 Overview
1(3)
1.2 Road Map
4(1)
2 P2P Applications 5(24)
2.1 Introduction
5(3)
2.2 Distributed Processing
8(3)
2.2.1 Internet Computing
8(1)
2.2.2 Wireless Sensor Networks
9(2)
2.3 File Sharing
11(3)
2.4 Voice over IP and Instant Messaging
14(3)
2.5 Video Streaming
17(8)
2.6 Discussion
25(2)
2.7 Case Study: PPLive
27(1)
2.8 Summary
27(1)
2.9 Review Questions
28(1)
3 P2P Network Architectures 29(26)
3.1 Introduction
29(1)
3.2 Structured P2P Systems
30(9)
3.2.1 Chord
32(3)
3.2.2 CAN (Content Addressable Network)
35(2)
3.2.3 Other Structured Approaches
37(2)
3.3 Unstructured (Mesh) P2P Systems
39(2)
3.4 Hybrid P2P Systems
41(2)
3.5 Network Architecture with QoS Provisioning
43(6)
3.5.1 AAA Tasks
47(1)
3.5.2 Charging
47(1)
3.5.3 Dynamic QoS
47(1)
3.5.4 Service Brokerage
48(1)
3.5.5 Discussion
48(1)
3.6 Video Streaming Network Architecture
49(2)
3.7 Case Study: PPLive
51(1)
3.8 Summary
52(1)
3.9 Review Questions
53(2)
4 Topology Control 55(20)
4.1 Introduction
55(3)
4.2 A General Framework for Distributed Topology Control
58(1)
4.3 Structured Topology Control
59(4)
4.4 Unstructured Topology Control
63(6)
4.5 Network-Coding-Based Distributed Topology Control
69(1)
4.6 Energy Efficient Distributed Topology Control in a Wireless P2P System
70(2)
4.7 Case Study: PPLive
72(1)
4.8 Summary
72(1)
4.9 Review Questions
73(2)
5 Incentives 75(54)
5.1 Introduction
75(3)
5.2 Incentive Issues in P2P Systems on the Internet
78(48)
5.2.1 File Sharing Systems
78(17)
5.2.1.1 BitTorrent
79(1)
5.2.1.2 Hierarchical P2P Systems
80(1)
5.2.1.3 Payment-Based Systems
80(2)
5.2.1.4 Cost of Sharing
82(2)
5.2.1.5 Reciprocity and Reputation-Based Systems
84(2)
5.2.1.6 Penalty-Based Approaches
86(1)
5.2.1.7 Game Theoretic Modeling
87(4)
5.2.1.8 Auction-Based Approaches
91(2)
5.2.1.9 Exchange-Based Systems
93(2)
5.2.2 Media Streaming Systems
95(15)
5.2.2.1 Layered Many-to-One Streaming
95(4)
5.2.2.2 Multicast One-to-Many Streaming
99(6)
5.2.2.3 Coalition-Based Media Streaming
105(5)
5.3 Incentive Issues in Wireless P2P Systems
110(7)
5.3.1 Routing and Data Forwarding
110(2)
5.3.2 Wireless Information Sharing Systems
112(3)
5.3.3 Network Access Sharing
115(2)
5.3.4 Wireless P2P Media Streaming
117(12)
5.3.4.1 System Model
117(4)
5.3.4.2 Two Neighboring Clients
121(2)
5.3.4.3 Three Neighboring Clients
123(2)
5.3.4.4 The General Scenario
125(1)
5.4 Discussion
126(1)
5.5 Case Study: PPLive
127(1)
5.6 Summary
128(1)
5.7 Review Questions
128(1)
6 Trust 129(30)
6.1 Introduction
129(3)
6.1.1 Trust Modeling
129(3)
6.2 EigenTrust
132(3)
6.3 PeerTrust
135(2)
6.4 Trust-x
137(2)
6.5 FuzzyTrust
139(5)
6.6 Game Theoretic Analysis on Trust Management
144(2)
6.7 SuperTrust
146(2)
6.8 PowerTrust
148(1)
6.9 GossipTrust
149(1)
6.10 Trust Establishment in Wireless Sensor Networks
150(5)
6.10.1 Symmetric Key-Based Approaches
150(3)
6.10.1.1 Deterministic Key Pre-Distribution Schemes
150(1)
6.10.1.2 Probabilistic Key Pre-Distribution Schemes
151(2)
6.10.2 Asymmetric Key-Based Approaches
153(2)
6.11 Case Study: PPLive
155(1)
6.12 Summary
155(1)
6.13 Review Questions
156(3)
7 Security Issues 159(12)
7.1 Overview
159(1)
7.2 Content Pollution
159(4)
7.3 Buffer Map Cheating
163(1)
7.4 Sybil Attacks
164(2)
7.5 DDoS Attacks
166(1)
7.6 P2P Worm Propagation
167(1)
7.7 P2P SIP
168(1)
7.8 Collusive Piracy
168(1)
7.9 Case Study: PPLive
169(1)
7.10 Summary
169(1)
7.11 Review Questions
170(1)
8 Conclusions 171(4)
8.1 Where Are We Now?
171(1)
8.2 Peer into the Future
172(3)
Bibliography 175(22)
Index 197
Yu-Kwong Ricky Kwok is a professor at the University of Hong Kong, where he is also the chairman of the Departmental Curriculum Review and Development Committee (DCRDC). A senior member of ACM and IEEE, Dr. Kwok has held positions at Colorado State University, the University of Southern California, and Purdue University. He has co-authored two books and published more than 180 technical papers. His research focuses on designing efficient communication protocols and secure resources management algorithms toward enabling large scale distributed mobile computing.