The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users.While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it.This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field:
"synopsis" may belong to another edition of this title.
The chief advantage of peer-to-peer networks is that large numbers of people share the burden of providing computing resources (processor time and disk space), administration effort, creativity, and--in more than a few cases--legal liability. Furthermore, it's relatively easy to be anonymous in such an environment, and it's harder for opponents of your peer-to-peer service to bring it down. The primary disadvantage of peer-to-peer systems, as anyone will attest who's had an MP3 download prematurely terminated when a dialup user went offline will attest, is the tendency of computers at the edge of the network to fade in and out of availability. Accountability for the actions of network participants is a potential problem, too.
This is a book about the idea of equipping ordinary Internet users' computers with mechanisms that enable them to connect, more or less automatically and without human attention, to other everyday Internet users' machines. By forming networks of computers at the so-called "edge" of the Internet, it's possible to offer valuable services without the burden of building and administering large, centralized computer systems of the sort that host traditional Web sites. Napster is the most successful example to date, though nerds will note that it's not a completely peer-to-peer system because users register their file libraries with a central server when they log on to the service.
Don't approach this book expecting to learn how to build the next Napster system. It's not a how-to book. It's not even much of a why-to book. Rather, it's a book that aims to get its readers thinking about what happens when information systems shift away from the client-server model and toward the peer-to-peer model (that's one of the book's points, by the way, that this is not a one-or-the-other architectural decision).
Mostly, Peer-to-Peer makes its point by letting experts in peer-to-peer take turns in the spotlight. Any other approach would be kind of ironic, wouldn't it? In any case, David Anderson explains how SETI@home puts space buffs' idle computing cycles to use in analyzing radio noise from outer space. Gene Kan explains how Gnutella (a truly serverless environment) works. The architects of Publius explain how distributed computing is especially resistant to censorship and denial-of-service attacks. Other contributors discuss peer-to-peer chat software, anonymous remailing services, and other applications of peer-to-peer design.
There's no one from Napster represented as an author in this collection of essays, but Clay Shirky presents an essay called "Listening to Napster." In that essay, Shirky gives an opinion on why Napster has succeeded: It focused on providing something consumers wanted, and bypassed Internet conventions (like the Domain Naming System) because they weren't the best way to provide the service. This is not an earth-shattering revelation, but it's true, and it's something developers of any new service (Internet-based or otherwise) need to keep in mind.
Some of the technical proposals presented here will get readers thinking. An example: Require that senders of e-mail solve a moderately complex math problem before recipients' mailboxes will accept their mail. The problem would be no big deal for a mailer to solve if he or she were sending messages one at a time, but the processor load would really add up for spammers who blast tens of thousands of unwanted emails onto the Internet in a single session. Another idea: mechanizing the concept of reputation so people know whose thoughts and whose creative works (like software) are worth using or believing.
More business-oriented readers might want to read more about the more subtle ways of incorporating peer-to-peer components into business models. Lots of traditional Web services--Amazon.com is an example--are supplementing their client-server activities with others that have peer-to-peer characteristics. Amazon.com, for example, lets operators of small Web sites promote goods and rely on the centralized resources for billing and fulfillment. There's no distributed software (other than a few links), but the company takes advantage of creativity and marketing efforts outside of its official core. Coverage of that sort of "soft" distributed computing might be a good supplement for the second edition of this book.
Peer-to-Peer is a thought-provoking book that will help its readers understand an exciting, still-emerging application architecture for the Internet. --David Wall
Topics covered: Peer-to-peer applications that run at the edges of the Internet, usually on home computers run by ordinary people. Much of this book comprises case studies on SETI@home, Gnutella, Freenet, Jabber, and other peer-to-peer services. Later chapters address technical issues, such as accountability, security, efficient use of limited bandwidth, and data cataloging.
Andy Oram is an editor at O'Reilly & Associates, specializing in books on Linux and programming. Most recently, he edited Peer-to-Peer: Harnessing the Power of Disruptive Technologies.
"About this title" may belong to another edition of this title.
Shipping:
US$ 2.99
Within U.S.A.
Book Description Hardcover. Condition: New. First Edition. Assumed First Printing. Seller Inventory # E4O--059600110X
Book Description Hardcover. Condition: new. Seller Inventory # 9780596001100
Book Description Paperback or Softback. Condition: New. Peer-To-Peer: Harnessing the Power of Disruptive Technologies 1.32. Book. Seller Inventory # BBS-9780596001100
Book Description Condition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!. Seller Inventory # OTF-Y-9780596001100
Book Description Condition: New. Seller Inventory # ABLIING23Feb2416190070663
Book Description Hardcover. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think059600110X
Book Description paperback. Condition: New. Language: ENG. Seller Inventory # 9780596001100
Book Description Book. Condition: New. New copy - Usually dispatched within 4 working days. Presenting the goals that drive the developers of the best-known peer-to-peer systems, this text explores the problems they've faced, and the technical solutions they've found. Topics include metadata, performance, trust, resource allocation, reputation, and security. Seller Inventory # B9780596001100
Book Description Condition: New. Presenting the goals that drive the developers of the best-known peer-to-peer systems, this text explores the problems they've faced, and the technical solutions they've found. Topics include metadata, performance, trust, resource allocation, reputation, and security. Num Pages: 431 pages, index. BIC Classification: UDB; UT; UYF. Category: (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (UU) Undergraduate. Dimension: 165 x 239 x 32. Weight in Grams: 792. . 2001. 1st Edition. Hardcover. . . . . Seller Inventory # V9780596001100
Book Description Hardcover. Condition: Brand New. 448 pages. 9.25x6.25x1.50 inches. In Stock. Seller Inventory # __059600110X