Peer To Peer

Overview

Leverage the power of peer-to-peer to achieve seamless personal and business communication and transactions. This easy-to-follow guide shows you,step-by-step,how to implement a peer-to-peer network. The book includes clear definitions,real world examples,practical technology explorations,and no-nonsense solutions.

Reach to the edge of the Internet—and discover a wealth of collaboration and entertainment possibilities Discover how millions of ...
See more details below
Paperback
$41.03
BN.com price
(Save 6%)$43.95 List Price
Other sellers (Paperback)
  • All (15) from $1.99   
  • New (5) from $16.62   
  • Used (10) from $1.99   
Sending request ...

Overview

Leverage the power of peer-to-peer to achieve seamless personal and business communication and transactions. This easy-to-follow guide shows you,step-by-step,how to implement a peer-to-peer network. The book includes clear definitions,real world examples,practical technology explorations,and no-nonsense solutions.

Reach to the edge of the Internet—and discover a wealth of collaboration and entertainment possibilities Discover how millions of existing personal computers connected to the Internet can be a source for the innovative exchange of information and services. This book provides you with both the background knowledge and the practical information you need to take advantage of the emerging world of peer-to-peer computing. Learn how to use P2P to overcome business obstacles such as remote locations and time constraints. You'll find details on all the critical factors and challenges of directly collaborating with small and large teams. But the book is not all business. It also contains complete instructions for exchanging music and video,allowing you to explore boundless P2P entertainment possibilities. You'll learn how you can safely offer P2P services and information to groups of various sizes—and also learn to run your own P2P radio and television station. This guide also contains prudent strategies that will protect you from potential dangers—including privacy and security leaks. Clearly written and logically organized,this insightful resource will help you understand and leverage the power of P2P.
  • Gain a clear understanding of the Internet's peer-to-peer network and how it functions
  • Explore the business and technical issuesassociated with current and future P2P implementations—naming,privacy,security,bandwidth,and availability
  • Discover how to identify and design a P2P architecture that is stable,secure,and successful
  • Get properly and safely connected through an identifiable P2P location
  • Integrate peer-to-peer solutions into a variety of business environments through real-world case studies
  • Explore the vast collection of music and videos available—and even start your own P2P radio or television station
  • Collaborate and exchange information directly with both small and large teams

Follow the step-by-step directions that allow you to tap into the power of P2P computing safely

Read More Show Less

Product Details

  • ISBN-13: 9780072192841
  • Publisher: McGraw-Hill Companies, The
  • Publication date: 11/28/2001
  • Pages: 364
  • Product dimensions: 0.75 (w) x 7.50 (h) x 9.25 (d)

Table of Contents

Acknowledgments xv
Introduction xvii
1 P2P Defined 1
Direct Exchanges Between Peers 2
P2P and the Internet 3
A Concise P2P Definition 4
Why Is P2P Important, and How Is It Implemented? 8
The Value of P2P 8
P2P Saves Time 9
The Technical Value of P2P 11
P2P Leverages Internet Openness 11
P2P Leverages Technology Standards 13
P2P Leverages Personal Computer Hardware 13
P2P Leverages Personal Computer Information and Application Services 14
P2P Offers a Fully Distributed Symmetric Architecture 15
The P2P Value Proposition 15
One-to-One P2P Value 16
One-to-Many P2P Value 16
Many-to-Many P2P Value 16
P2P Context Value 17
Real-World Examples 18
SFLAN 18
Roku 19
Groove 19
SETI@home 19
Jabber 20
Social Impacts of P2P 21
A Part of the Woodwork 21
Modes of Interaction 21
Immediacy 22
Intimacy 23
Utility 25
Control 26
The Dark Side of P2P 27
What Makes P2P Important to You 28
Summary 29
2 The P2P City Tour: Existing Solutions Ready Now 31
The P2P City Tour: Existing Solutions Ready Now 32
The P2P Safari: Possibilities and Promises 32
What You'll Learn Along the Way 33
The Current Landscape Map for P2P 34
P2P Resource Product and Services 36
File Sharing 37
Distributed Computation 40
Distributed Search 41
P2P Collaboration Product and Services 45
Basic Collaboration Product and Services 46
Gaming 52
Instant Messaging 54
City Tour Summary 57
3 A Safari into the Software Developer's World 59
P2P Enablers 60
Infrastructure 62
Distributed Objects 66
Development Frameworks 70
Messaging Frameworks 73
Open Source Software--What's It All About? 77
Advantages and Disadvantages of Open Source Software 78
Getting Involved 78
In-the-Net P2P Services 78
Jungle Tour Summary 82
Tour Conclusions 83
New Paradigms Require New Thinking 83
New Paradigms Require Old Thinking 84
New Paradigms Require Unconventional Wisdom 86
4 Of Names and Addresses 89
The Naming of Things 90
Is There a Difference Between a Name and an Address? 91
Telegraphy--The Victorian Internet 92
The Telephone Age--Reach Out and Address Someone 94
Finally, the Internet 96
Alternative Namespaces 97
What's Next? 98
Dealing with Addressing 99
The Role of Internet Protocol 99
The Role of Hypertext Transfer Protocol 100
Dynamic DNS Addressing 100
Peering Through the Firewall 102
Other Protocols 103
Architectures for Connecting Resources 103
The Content-Addressable Web for P2P 108
Instant Messaging 111
Instant Messaging: Just a New Kind of E-Mail? 114
Instant Messaging Architecture 115
Roaming Mobility: Part 1 119
Summary 120
5 Supporting P2P: Architecture Matters 121
Where Do You Start with Architecture? 123
Putting the Architecture Team to Work 126
Securing Your Peer (Featuring the Security Guard) 126
The Security Guard's Security Acid Test 129
Making Your Peer Almost Always Available (Featuring the Training Coach) 130
Redundancy 130
Loose Coupling 131
Backup and Recovery 133
The Training Coach's Availability Acid Test 134
Making Your Peer Easy to Use, Administer, and Maintain (Featuring the User Advocate and the Administrator) 135
The Making Your Peer Easy to Use, Administer, and Maintain Acid Test 138
Distributing the Peer Workload (Featuring the Coach) 138
Four Forms for Solution Distribution 139
Dealing with Sometimes-Disconnected Peers 144
The Training Coach's Distribution Acid Test 145
Remembering Important Information: A True Sign of P2P Intelligence (Featuring the Accountant) 145
Files and File Systems 147
Databases 147
Comparison of Information Storage Choices 148
The Accountant's Information Management Acid Test 149
Being a GOOD Peer by Adhering to Standards (Featuring the Inspector) 149
Dealing with Disagreeable Peers 153
Standards "Extensions" 154
Standards Summary 154
The Inspector's Standards Acid Test 155
Establishing a Home for Your Peer (Featuring the Pilot) 155
Avoiding Turbulence 157
The Pilot's Portability Acid Test 159
Architecture Approach 159
Summary 160
6 Getting P2P Enabled 163
Getting Connected 165
Connecting Your WAN 165
Connecting Your LAN 173
Getting Secure 181
How Many Network Listeners Do You Have? 182
Implementing System Security 185
Monitoring Your Security 189
Protecting Against Viruses 190
Getting Known 190
Getting Known with a Fixed IP Address 191
Getting Known with a Variable IP Address 192
Summary 196
7 Getting Together: P2P Collaboration 199
Why Is Collaboration a Critical Tool? 200
The Groove Experience 201
Installing Groove 201
Exploring a Groove Space 204
Mining Presence 205
Staying Alert 208
Sharing Documents 208
Tooling Along 210
Maintaining Your Identity 211
Summarizing Groove 215
The Magi Experience 215
Gift of (the) Magi 215
Installing Magi 217
Using Magi with a NAT'd LAN 221
Exploring the Magi User Experience 222
Buddying Up 224
Indicating Presence 226
Sharing Folders and Establishing Collaboration Groups 226
Using Mobile Magi 227
Accessing Magi via a Remote WAP Phone 230
Searching in a Magi Peer Group 234
Working with Metadata Rather Than Actual Data 240
Summarizing Magi 241
Summary 241
8 Getting Entertained: P2P Music and Video 243
Music 244
Getting Music 244
Playing Music 252
Broadcasting P2P Music: Your P2P Radio Station 254
Music Summary 262
Video 263
Getting Video and Graphics 264
Creating Video 265
Broadcasting P2P Video: Your P2P TV Station 271
P2P and Web Servers: The P2P Aggregator 277
Video Summary 278
Summary 279
9 Getting to Tomorrow: The Future of P2P 281
Home Gateways 283
Going Wireless via LANs 283
Going Wireless via Mobile Devices 285
Designing for Mobile P2P 285
A Mountain Won't Fit in a Teacup 286
Product Simplicity Wins 287
No Watch Cursor, No Modes 289
Maximize Predictability 290
Additional Rules for Mobile P2P Design 290
Maintain Contextual Consistency 290
Untrap Information 290
Disintermediate Tools 291
P2P Is Not the Web 292
Searching Should Replace Synchronization 294
Mobile Capabilities 295
Who Will Win the Mobile P2P Prize? 296
The Role of VUI (Voice User Interface) in P2P 299
Agents and P2P 300
P2P Agents Are Not Tools 301
Peer-to-Peer Computing and Agent Technology 306
The Importance of Context in P2P 307
The Web Server Is Everywhere 309
Web Services 309
Creating a Personal Web Services Engine 312
The True Cost of Information 313
P2P as an Information Utility 314
P2P and Warfighting 317
Command and Control Vision 317
Intelligence Analysis 322
Summary 322
Index 325
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)