O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

P2P Networking and Applications

Book Description

Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, the book explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models and also provides the means to improve upon these models with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practitioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.
  • Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability.
  • Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs.
  • Provides online access to the Overlay Weaver P2P emulator, an open-source tool that supports a number of peer-to-peer applications with which readers can practice.

Table of Contents

  1. Brief Table of Contents
  2. Table of Contents
  3. Dedication
  4. Preface
  5. About the Authors
  6. Chapter 1. Introduction
    1. P2P Emerges as a Mainstream Application
    2. P2P Networking and the Internet
    3. Motivation for P2P Applications
    4. P2P Economics
    5. Anatomy of Some P2P Business Models
    6. Social Impact
    7. Technology Trends Impacting P2p
    8. Summary
    9. Further Reading
  7. Chapter 2. Peer-to-Peer Concepts
    1. Operation of a P2P System
    2. Principles of the P2P Paradigm
    3. A Graph-Theoretic Perspective
    4. A Design Space Perspective
    5. A Routing Performance Perspective
    6. An Implementation Perspective: Overlayweaver
    7. Summary
    8. For Further Reading
  8. Chapter 3. Unstructured Overlays
    1. Connecting Peers on a Global Scale
    2. Basic Routing in Unstructured Overlays
    3. Unstructured Topology Considerations
    4. Early Systems
    5. Improving on Flooding and Random Walk
    6. Social Overlays
    7. Key-Based Routing in Unstructured Topologies
    8. Under the Hood: an Overlay Emulator
    9. Summary
    10. For Further Reading
  9. Chapter 4. Structured Overlays
    1. Structured Overlays
    2. Logarithmic Degree with Prefix Routing
    3. Ring with Embedded Logarithmic Degree Mesh
    4. Constant Degree
    5. Other Distance Metrics
    6. O(1)-Hop Routing
    7. Comparison and Evaluation
    8. Summary
    9. For Further Reading
  10. Chapter 5. Structured Overlays
    1. Peer Churn
    2. Approaches to Overlay Maintenance
    3. Overlay Maintenance Algorithms
    4. Stochastic Modeling of Peer Churn
    5. Federated Overlay Topologies
    6. Summary
    7. For Further Reading
  11. Chapter 6. Peer-to-Peer in Practice
    1. P2P Building Blocks
    2. Network Programming
    3. Overlay Protocol Design
    4. Network Address Translation and P2P Overlays
    5. Peer Capability Determination
    6. Bootstrapping and Partitions
    7. P2P Networking Support in Microsoft Windows
    8. Summary
    9. For Further Reading
  12. Chapter 7. Search
    1. Overview
    2. Centralized vs. Localized vs. Distributed Indexing
    3. Hashing-Based Indexing and Lookups
    4. Searching in Unstructured Overlays
    5. Keyword Search
    6. Range Queries
    7. Semantic Queries
    8. Advanced Topics
    9. Summary
    10. For Further Reading
  13. Chapter 8. Peer-to-Peer Content Delivery
    1. Content Delivery
    2. P2P Caching
    3. Content Pull and Content Push
    4. Case Study
    5. Hybrid CDN and P2P Architectures
    6. Summary
    7. For Further Reading
  14. Chapter 9. Peercasting and Overlay Multicasting
    1. Introduction
    2. Terminology
    3. P2p streaming
    4. Multicast Applications and P2P Overlay Multicast
    5. OM Design Considerations
    6. Improving OM Performance
    7. Summary
    8. For Further Reading
  15. Chapter 10. Measurement for P2P Overlays
    1. Motivation
    2. Network Embedding
    3. Internet Coordinate Systems
    4. Meridian
    5. Accuracy and Overhead
    6. Summary
    7. For Further Reading
  16. Chapter 11. Service Overlays
    1. Service Orientation and P2p Networking
    2. Service Overlay Concepts
    3. Serving DNS Records from an Overlay
    4. Resilient Overlay Networks
    5. QoS Aware Overlays
    6. Service Orientation
    7. Replication and Load Balancing
    8. Summary
    9. For Further Reading
  17. Chapter 12. Voice Over Peer-to-Peer
    1. From Voip to Vop2p
    2. VoP2P
    3. Application Relays
    4. Call Processing
    5. Case Study: Skype
    6. Case Study: Peer-to-Peer Sip
    7. Summary
    8. For Further Reading
  18. Chapter 13. Mobility and Heterogeneity
    1. Impact of Mobile Devices on P2p Overlays
    2. P2P Overlay Issues Caused by Mobility
    3. Mitigating Mobility Churn
    4. Multihomed Peers
    5. Variable-Hop Overlays
    6. P2P and Manets
    7. Summary
    8. For Further Reading
  19. Chapter 14. Security
    1. Introduction
    2. Security Risks and Attacks
    3. Security Mechanisms
    4. Trust and Privacy Issues
    5. Case Study: Groove
    6. Case Study: Pollution in File-Sharing Systems
    7. Summary
    8. For Further Reading
  20. Chapter 15. Managed Overlays
    1. Introduction
    2. Management of Overlays vs. Conventional Networks
    3. Managed Overlays and Overlay Operators
    4. Overlay Management Architecture
    5. Overlay Messaging for Management Operations
    6. Managing the Impact of the Overlay Traffic on the ISP Network
    7. Summary
    8. For Further Reading
  21. Glossary
  22. Bibliography
    1. References
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
    6. Chapter 6
    7. Chapter 7
    8. Chapter 8
    9. Chapter 9
    10. Chapter 10
    11. Chapter 11
    12. Chapter 12
    13. Chapter 13
    14. Chapter 14
    15. Chapter 15