P2P networking and applications:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Morgan Kaufmann
2009
|
Schriftenreihe: | The Morgan Kaufmann Series in Networking
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXI, 415 S. Ill., graph. Darst. 24cm |
ISBN: | 9780123742148 0123742145 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035475267 | ||
003 | DE-604 | ||
005 | 20091021 | ||
007 | t | ||
008 | 090507s2009 ad|| |||| 00||| eng d | ||
020 | |a 9780123742148 |c hbk |9 978-0-12-374214-8 | ||
020 | |a 0123742145 |c hbk |9 0-12-374214-5 | ||
035 | |a (OCoLC)267167232 | ||
035 | |a (DE-599)BSZ303631074 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-739 |a DE-83 |a DE-11 | ||
050 | 0 | |a TK5105.525 | |
082 | 0 | |a 004.652 |2 22 | |
082 | 0 | |a 004.65 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Koegel Buford, John F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a P2P networking and applications |c John F. Buford ; Heather Yu ; Eng Keong Lua |
264 | 1 | |a Amsterdam [u.a.] |b Morgan Kaufmann |c 2009 | |
300 | |a XXI, 415 S. |b Ill., graph. Darst. |c 24cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Morgan Kaufmann Series in Networking | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Peer-to-peer architecture (Computer networks) | |
650 | 0 | 7 | |a Peer-to-Peer-Netz |0 (DE-588)4343110-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Peer-to-Peer-Netz |0 (DE-588)4343110-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yu, Heather |e Verfasser |4 aut | |
700 | 1 | |a Lua, Eng Keong |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017394897&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017394897 |
Datensatz im Suchindex
_version_ | 1804138936418697216 |
---|---|
adam_text | Table
of Contents
Preface
..................................................................................................................xvii
About the Authors
.................................................................................................xxi
CHAPTER
1
Introduction
................................................................1
P2P Emerges as a Mainstream Application
.....................................1
The Rise of P2P File-Sharing Applications
..................................1
Voice over P2P (VoP2P)
...............................................................4
P2PTV
...........................................................................................5
P2P Networking and the Internet
...................................................8
P2P Overlays and Network Services
............................................8
Impact of P2P Traffic on the Internet
.......................................10
Motivation for P2P Applications
....................................................11
P2P from the End User s Perspective
........................................11
Is P2P
=
Piracy?
..........................................................................12
P2P Strengths and Benefits
........................................................12
P2POpen Issues
.........................................................................14
P2P Economics
...............................................................................14
The P2P Value Proposition
........................................................14
Barrier to Entry
...........................................................................15
Revenue Models and Revenue Collection
.................................15
P2P Application Critical Mass
....................................................16
Anatomy of Some P2P Business Models
........................................17
VoP2P
..........................................................................................17
File Sharing
.................................................................................19
Social Impact
..................................................................................21
Technology Trends Impacting P2P
................................................22
Summary
.........................................................................................23
Further Reading
..............................................................................23
CHAPTER
2
Peer-to-Peer Concepts
...............................................25
Operation of a P2P System
............................................................25
The User View
............................................................................25
P2P Beyond the Desktop Computer
.........................................26
Overlay View
..............................................................................28
Principles of the P2P Paradigm
.....................................................29
A Graph Theoretic Perspective
......................................................31
Overview
....................................................................................31
Overlay
........................................................................................31
Graph Properties
........................................................................33
Object Storage and Lookup
.......................................................34
VII
viii Table of
Contents
A
Design Space
Perspective
...........................................................35
A
Routing Performance
Perspective
..............................................36
Routing
Geometries and Resilience
..........................................36
Tradeoff Between Routing State and Path Distance
.................37
Churn and Maintaining the Overlay
..........................................37
Locality
........................................................................................39
An Implementation Perspective: OverlayWeaver
..........................41
Summary
.........................................................................................43
For Further Reading
........................................................................44
CHAPTER
3
Unstructured Overlays
................................................45
Connecting Peers on a Global Scale
..............................................45
Basic Routing in Unstructured Overlays
.......................................46
Flooding and Expanding Ring
....................................................46
Random Walk
..............................................................................49
Unstructured Topology Considerations
.........................................50
Types of Unstructured Graphs
..................................................50
Random Graphs
..........................................................................50
Power-Law Random Graphs
.......................................................51
Scale-Free Graphs and Self-Similarity
.........................................52
Social Networks and the Small-World Phenomenon
................54
Early Systems
..................................................................................55
Napster
........................................................................................55
Gnutella
.......................................................................................55
FastTrack
.....................................................................................55
Freenet........................................................................................56
Improving on Flooding and Random Walk
...................................61
Techniques
..................................................................................61
Metrics
........................................................................................62
Case Study: Gia
...........................................................................62
Social Overlays
................................................................................64
Using Similar Interests Among Peers
.........................................64
Tribler
..........................................................................................65
INGA...........................................................................................67
Key-based Routing in Unstructured Topologies
............................69
Overview
.....................................................................................69
Local Minima Search
...................................................................69
Unstructured Distributed Hash Table
........................................70
Under the Hood: An Overlay Emulator
.........................................72
OverlayWeaver Routing Layer
....................................................72
Unstructured Overlays in OverlayWeaver
.................................73
Summary
.........................................................................................73
For Further Reading
.......................................................................73
Table
of Contents
ix
CHAPTER
4
Structured Overlays: Geometry and Routing
.................75
Structured Overlays
........................................................................75
Motivation and Categories
.........................................................75
Geometry and Routing
...............................................................77
Roadmap for the Chapter
..........................................................77
Logarithmic Degree with Prefix Routing
......................................79
PRR
..............................................................................................79
Tapestry
.......................................................................................82
P-Grid
..........................................................................................84
Pastry
...........................................................................................85
Other Prefix-Routing Overlays
...................................................86
Ring with Embedded Logarithmic Degree Mesh
..........................86
Chord
..........................................................................................86
DKSCN.k.f)
...................................................................................88
Chord*
........................................................................................89
Constant Degree
.............................................................................91
Features of Constant Degree Graphs
.........................................91
Koorde
.........................................................................................93
Ulysses
.........................................................................................93
Cycloid
........................................................................................94
Other Distance Metrics
..................................................................95
Content Addressable Network (CAN)
......................................95
Kademlia
.....................................................................................97
OCD-Hop Routing
...........................................................................99
Multihop Versus One-Hop
..........................................................99
Kelips
........................................................................................100
OneHop
.....................................................................................100
EpiChord
...................................................................................101
Comparison and Evaluation
.........................................................101
Analytical Performance Bounds
...............................................101
Measurement Through Simulation
...........................................103
Summary
.......................................................................................104
For Further Reading
.....................................................................104
Surveys and Frameworks
.........................................................104
History of Distributed Hash Tables
..........................................105
Other Structured Overlays
.......................................................105
Routing and Geometry in Computer Networks
.....................105
CHAPTER
5
Structured Overlays: Maintenance and Dynamics
......107
Peer Churn
....................................................................................107
Approaches to Overlay Maintenance
...........................................109
Active Maintenance
..................................................................109
Opportunistic Maintenance
.....................................................109
Table
of Contents
Overlay Maintenance Algorithms
.................................................110
Logarithmic Degree with Prefix Routing
................................110
Ring with Embedded Logarithmic Degree Mesh
....................114
Constant Degree
.......................................................................116
OCD-Hop Routing
...................................................................119
Stochastic Modeling of Peer Churn
.............................................123
The Network Model
.................................................................123
Stochastic Model for Long-range Connections
........................124
Maintenance of Short-range Connections
...............................125
Maintenance of Long-range Connections
................................125
Comparison with Existing DHT Overlay
.................................126
Federated Overlay Topologies
......................................................126
Universal Overlay
......................................................................128
Hierarchical Overlays
................................................................129
Summary
.......................................................................................133
For Further Reading
.....................................................................133
CHAPTER
6
Peer-to-Peer in Practice
..........................................135
P2P Building Blocks
.....................................................................135
Network Programming
.................................................................138
Overlay Protocol Design
..............................................................139
General Protocol Issues
............................................................139
Unstructured Overlay: Gnutella
...............................................140
BitTorrent
..................................................................................144
Structured Overlays
..................................................................146
Network Address Translation and P2P Overlays
.........................148
How NAT Effects P2P Connectivity
........................................148
NAT Traversal
............................................................................150
NAT Traversal with ICE
............................................................151
NAT Traversal in a P2P Overlay
...............................................153
Peer Capability Determination
.....................................................153
Overview
...................................................................................153
Network Capacity
.....................................................................154
Peer Lifetime
.............................................................................155
Bootstrapping and Partitions
........................................................155
Finding a Rendezvous Peer
......................................................155
Merging Partitions
....................................................................156
P2P Networking Support in Microsoft Windows
.......................157
Peer Identity
.............................................................................157
Peer Name Resolution Protocol
...............................................158
Peer Overlay
..............................................................................158
Grouping
...................................................................................159
Identity Management
................................................................160
Search
........................................................................................161
Table
of Contents
xi
Summary
.......................................................................................
l6l
For Further Reading
.....................................................................
l6l
CHAPTER
7
Search
....................................................................163
Overview
.......................................................................................
I63
Centralized vs. Localized vs. Distributed Indexing
.....................164
Centralized Indexing
................................................................164
Localized Indexing
....................................................................166
Distributed Indexing
................................................................167
Hybrid Indexing
........................................................................167
Hashing-Based Indexing and Lookups
.........................................168
Searching in a Flat DHT
...........................................................168
Searching in Hierarchical DHTs
...............................................169
Discussion
.................................................................................169
Searching in Unstructured Overlays
............................................170
Flooding-Based Search
..............................................................170
Iterative Deepening
..................................................................171
Random Walk-Based Search
.....................................................171
Guided Search
...........................................................................171
Hybrid-Based Approaches
........................................................172
Keyword Search
............................................................................173
Range Queries
...............................................................................173
Non-DHT-Based Approaches
....................................................174
Range Queries in DHTs
............................................................174
Skip Graphs
..............................................................................175
Semantic Queries
..........................................................................176
Semantic Search in Structured Overlays
..................................176
Semantic Search in Unstructured Overlays
.............................178
Advanced Topics
..........................................................................179
Distributed Pattern Matching System (DPMS)
........................179
DiffSearch
..................................................................................179
Content-Based Search
...............................................................180
Summary
.......................................................................................181
For Further Reading
.....................................................................181
CHAPTER
8
Peer-to-Peer Content Delivery
..................................183
Content Delivery
..........................................................................183
Classification of P2P Content Delivery Schemes
....................184
Design Criteria
..........................................................................187
P2P Caching
..................................................................................187
Design Issues
............................................................................191
Example P2P Caching Systems
................................................193
Summary
...................................................................................195
xii
Table
of
Contents
Content Pull and Content Push
...................................................195
Case Study
.................................................................................196
Hybrid CDN and P2P Architectures
............................................198
Overview
...................................................................................199
Case Study
.................................................................................199
Summary
.......................................................................................201
For Further Reading
.....................................................................202
CHAPTER
9 Peercasting
and Overlay Multicasting
.......................203
Introduction
..................................................................................203
The Television Paradigm Shift
..................................................203
Popular
Peercasting
Applications
............................................203
Terminology
..................................................................................204
P2P Streaming
...............................................................................206
Multicast Applications and P2P Overlay
Multicast
........................................................................................209
Multicast Applications
..............................................................209
IP Multicast vs. Overlay Multicast
............................................209
Hybrid Multicast
.......................................................................213
Proxy-Based Overlay Multicast
.................................................214
OM Design Considerations
..........................................................215
Performance Metrics
................................................................215
OM Groups and OM Sessions
..................................................215
Group Management
..................................................................216
Message Dissemination
.............................................................218
Categorization of OM Systems
.................................................219
Improving OM performance
........................................................221
Summary
.......................................................................................227
For Further Reading
.....................................................................228
CHAPTER
10
Measurement for P2P Overlays
..............................229
Motivation
..................................................................................229
Network Embedding
..................................................................234
Basic Properties of Network Embedding
..............................234
Lipschitz Embedding
..............................................................236
Numerical Optimization Embedding
....................................237
Internet Coordinate Systems
.....................................................237
Systems using Lipschitz Embedding and
Matrix Factorization
...............................................................241
Systems using Numerical Optimization
................................242
Meridian
.....................................................................................246
Multiresolution Rings
.............................................................246
Ring Membership Management
.............................................247
Table
of
Contents
xiii
Gossip-based Node Discovery
...............................................248
Closest-Node Discovery
.........................................................248
Accuracy and Overhead
............................................................249
Summary
.....................................................................................252
For Further Reading
...................................................................253
CHAPTER
11
Service Overlays
...................................................255
Service Orientation and P2P Networking
.................................255
Service Overlay Concepts
..........................................................257
Resource Virtualization
..........................................................257
Service Orientation
................................................................257
Devices as Peers
.....................................................................258
Serving DNS Records From an Overlay
....................................258
Domain Name Service
...........................................................258
DDNS
......................................................................................259
Resilient Overlay Networks
.......................................................262
Internet Routing and ISP Peering
.........................................262
Resilient Overlay Network
....................................................262
Bandwidth-Aware RON
..........................................................264
QoS Aware Overlays
..................................................................266
Overview
................................................................................266
OverQoS
.................................................................................268
QRON
.....................................................................................269
Service Orientation
....................................................................270
Overview
................................................................................270
Wide-Area Service Discovery
.................................................270
INS/Twine
..............................................................................271
Location-Based Service Discovery
.........................................271
Other P2P Approaches to Service Discovery
.......................272
Replication and Load Balancing
................................................272
Churn and Index Availability
.................................................272
Index Load and Object Popularity
........................................274
Beehive
...................................................................................275
Service Composition
..................................................................276
Summary
.....................................................................................277
For Further Reading
...................................................................278
CHAPTER
12
Voice Over Peer-to-Peer
........................................279
From VoIP to VoP2P
..................................................................279
VoP2P
.........................................................................................280
VoIP Elements
........................................................................280
Mapping VoIP Elements to a VoP2P Overlay
.......................281
Application Relays
.....................................................................282
Types of Relays
......................................................................282
xiv
Table
of Contents
Relay Selection and Discovery
..............................................283
Dynamic Path Switching
........................................................285
Call Processing
...........................................................................285
Overview
................................................................................285
Assumptions
...........................................................................286
Dimensionality
.......................................................................286
Example Peer Features
..........................................................287
Case Study: Skype
......................................................................289
Case Study: Peer-to-peer SIP
......................................................291
Overview
................................................................................291
Hip-Hop
..................................................................................292
Address Settlement by Peer-to-Peer
......................................294
Reload
.....................................................................................295
Summary
.....................................................................................296
For Further Reading
...................................................................297
CHAPTER
13
Mobility and Heterogeneity
....................................299
Impact of Mobile Devices on P2P Overlays
.............................299
P2P Overlay Issues Caused by
Mobüity....................................300
Roaming and Node Lifetime
..................................................300
Growing Mobile Peer Frequency
..........................................302
Mitigating Mobility Churn
........................................................303
Mobile IP Support
..................................................................303
Stealth Nodes
.........................................................................304
Bristle
.....................................................................................305
Warp
.......................................................................................306
Multihomed Peers
......................................................................308
Variable-Hop Overlays
...............................................................309
Overview
................................................................................309
Accordion
...............................................................................309
P2P and
Manets
..........................................................................311
Overview
................................................................................311
Mobile Hash Table
.................................................................312
MADPastry
..............................................................................314
Other P2P MANET Designs
...................................................315
Summary
.....................................................................................317
For Further Reading
...................................................................317
CHAPTER
14
Security
................................................................319
Introduction
...............................................................................319
Security Risks and Attacks
.........................................................320
Classifications of Attacks
.......................................................320
The P2P Security Gap
............................................................322
Sample Attacks and Threats
..................................................323
Overlay Layer Attacks
............................................................326
Table
of Contents
xv
Security Mechanisms
.................................................................328
Cryptographic Solutions
........................................................328
DoS Countermeasures
...........................................................329
Secure Routing in Structured P2P
........................................330
Fairness in Resource Sharing
.................................................333
Trust and Privacy Issues
............................................................334
Architecture
...........................................................................335
Reputation
..............................................................................336
Privacy
....................................................................................337
Case Study: Groove
....................................................................338
Case Study: Pollution in File-Sharing Systems
..........................338
Summary
.....................................................................................339
For Further Reading
...................................................................340
CHAPTER
15
Managed Overlays
.................................................341
Introduction
...............................................................................341
Management of Overlays vs. Conventional Networks
.............343
Overlay Dimensions Impacting Manageability
.....................343
Managed Overlay Model
........................................................345
Managed Overlays and Overlay Operators
...............................346
Role of the Overlay Operator
................................................346
Examples
................................................................................348
Managing a Resilient Overlay Network
................................348
Managing a Distributed File Storage Service
........................350
Overlay Management Architecture
............................................352
Integration with Peer State and Event Detection
.................352
Security Considerations
.........................................................354
Generality for Various Types of Overlay
...............................354
Overlay Messaging for Management Operations
......................354
Reaching All Peers
.................................................................354
Aggregating Data Collection for Performance
Management
...........................................................................355
Multicast
.................................................................................357
Managing the Impact of the Overlay Traffic on
the ISP Network
.........................................................................357
P2P Traffic in the ISP Network
.............................................357
Approaches to Managing P2P Traffic
....................................358
P4P
..........................................................................................358
Summary
.....................................................................................359
For Further Reading
...................................................................359
Glossary
......................................................................................................361
References
..................................................................................................
Зб7
Index
...........................................................................................................399
|
any_adam_object | 1 |
author | Koegel Buford, John F. Yu, Heather Lua, Eng Keong |
author_facet | Koegel Buford, John F. Yu, Heather Lua, Eng Keong |
author_role | aut aut aut |
author_sort | Koegel Buford, John F. |
author_variant | b j f k bjf bjfk h y hy e k l ek ekl |
building | Verbundindex |
bvnumber | BV035475267 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.525 |
callnumber-search | TK5105.525 |
callnumber-sort | TK 45105.525 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)267167232 (DE-599)BSZ303631074 |
dewey-full | 004.652 004.65 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.652 004.65 |
dewey-search | 004.652 004.65 |
dewey-sort | 14.652 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01635nam a2200421 c 4500</leader><controlfield tag="001">BV035475267</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091021 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090507s2009 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123742148</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-12-374214-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123742145</subfield><subfield code="c">hbk</subfield><subfield code="9">0-12-374214-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)267167232</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ303631074</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.525</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.652</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.65</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Koegel Buford, John F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">P2P networking and applications</subfield><subfield code="c">John F. Buford ; Heather Yu ; Eng Keong Lua</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Morgan Kaufmann</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 415 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Morgan Kaufmann Series in Networking</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Peer-to-peer architecture (Computer networks)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Peer-to-Peer-Netz</subfield><subfield code="0">(DE-588)4343110-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Peer-to-Peer-Netz</subfield><subfield code="0">(DE-588)4343110-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yu, Heather</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lua, Eng Keong</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017394897&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017394897</subfield></datafield></record></collection> |
id | DE-604.BV035475267 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:36:06Z |
institution | BVB |
isbn | 9780123742148 0123742145 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017394897 |
oclc_num | 267167232 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-739 DE-83 DE-11 |
owner_facet | DE-473 DE-BY-UBG DE-739 DE-83 DE-11 |
physical | XXI, 415 S. Ill., graph. Darst. 24cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Morgan Kaufmann |
record_format | marc |
series2 | The Morgan Kaufmann Series in Networking |
spelling | Koegel Buford, John F. Verfasser aut P2P networking and applications John F. Buford ; Heather Yu ; Eng Keong Lua Amsterdam [u.a.] Morgan Kaufmann 2009 XXI, 415 S. Ill., graph. Darst. 24cm txt rdacontent n rdamedia nc rdacarrier The Morgan Kaufmann Series in Networking Includes bibliographical references and index Peer-to-peer architecture (Computer networks) Peer-to-Peer-Netz (DE-588)4343110-0 gnd rswk-swf Peer-to-Peer-Netz (DE-588)4343110-0 s DE-604 Yu, Heather Verfasser aut Lua, Eng Keong Verfasser aut Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017394897&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Koegel Buford, John F. Yu, Heather Lua, Eng Keong P2P networking and applications Peer-to-peer architecture (Computer networks) Peer-to-Peer-Netz (DE-588)4343110-0 gnd |
subject_GND | (DE-588)4343110-0 |
title | P2P networking and applications |
title_auth | P2P networking and applications |
title_exact_search | P2P networking and applications |
title_full | P2P networking and applications John F. Buford ; Heather Yu ; Eng Keong Lua |
title_fullStr | P2P networking and applications John F. Buford ; Heather Yu ; Eng Keong Lua |
title_full_unstemmed | P2P networking and applications John F. Buford ; Heather Yu ; Eng Keong Lua |
title_short | P2P networking and applications |
title_sort | p2p networking and applications |
topic | Peer-to-peer architecture (Computer networks) Peer-to-Peer-Netz (DE-588)4343110-0 gnd |
topic_facet | Peer-to-peer architecture (Computer networks) Peer-to-Peer-Netz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017394897&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT koegelbufordjohnf p2pnetworkingandapplications AT yuheather p2pnetworkingandapplications AT luaengkeong p2pnetworkingandapplications |