ebook img

Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security PDF

389 Pages·2012·3.618 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

Structured Peer-to-Peer Systems Dmitry Korzun • Andrei Gurtov Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security Foreword by Ion Stoica 123 DmitryKorzun AndreiGurtov HelsinkiInstituteforInformation CentreforWireless Technology Communications AaltoUniversity UniversityofOulu Aalto,Finland Oulu,Finland DepartmentofComputerScience PetrozavodskStateUniversity Russia ISBN978-1-4614-5482-3 ISBN978-1-4614-5483-0(eBook) DOI10.1007/978-1-4614-5483-0 SpringerNewYorkHeidelbergDordrechtLondon LibraryofCongressControlNumber:2012950412 ©SpringerScience+BusinessMediaNewYork2013 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerptsinconnection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’slocation,initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer. PermissionsforusemaybeobtainedthroughRightsLinkattheCopyrightClearanceCenter.Violations areliabletoprosecutionundertherespectiveCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. While the advice and information in this book are believed to be true and accurate at the date of publication,neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityfor anyerrorsoromissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,with respecttothematerialcontainedherein. Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) To myparentsAntoninaandZhorzh. DK To mydaughtersJuliaandSofia,and wife Anastasia.AG Foreword Intheshortspanofafewyears,peer-to-peertechnologieshaveirreversiblychanged thefieldsofnetworkinganddistributedsystems.Today,thetrafficdeliveredbypeer- to-peersystems, suchas Bittorrent,PPLive,andeDonkey,dominatesthe trafficof manyInternetServiceProviders.Thestructuredpeer-to-peersystems,intheformof distributedhashtables(DHTs),havebeenatthecoreofthemodernlarge-scalekey- valuestoragesystems,includingAmazon’sDynamoDB,Facebook’sCassandra,and LinkedIn’sVoldemort. Thisbookgivesacomprehensivetreatmentofthestructuredpeer-to-peersystems by covering their architecture, protocol design, and security properties. The book providesanexcellentoverviewofthelatestdevelopmentsinthefieldandincludes several recent contributions of the authors themselves. By using extensive and detailed examples, the authors succeed in making some of the most complex protocolsaccessibletoalargeaudience. Thisbookisagreatresourceforbothacademicswhoare,orwishtostart,doing research in the peer-to-peer field and practitioners who want to design and build large-scaledistributedsystemsandprotocols. IonStoica vii Preface Themain goalofthis bookis tocoverimportantissuesin optimizationof present large-scale P2P systems as well as help in designing future systems. The book containsacomprehensivesurveyandsummaryofresearchresultscomplementedby authors’owncontributionstothefieldintherecentyears.Thebookisextensively illustrated by examplesto help the understandingas wellas includesan extensive listofreferencesonP2Particlesandresources. EvolutionofP2PSystems The field of structured P2P systems has seen a fast growth and evolution upon introduction of first distributed hash tables (DHTs) in the early 2000s. The first proposals including Chord, CAN, Pastry, and Tapestry were gradually improved to cope with scalability, locality,and security issues. Deployableas an overlayon the application layer without the need to change the network infrastructure, the P2P approach had opened great opportunities for innovation for developers. By utilizingtheprocessingandbandwidthresourcesofendusers,P2Papproachenables high performance of data distribution which is hard to achieve with traditional client–server architectures. That enables commercial use of P2P systems such as distributing updates to the World-of-Warcraft virtual world, where patches over 100MBytes are applied simultaneously to all users using P2P technology. Many popular social networks, such as Facebook, utilize the DHT internally to store tremendousnumbersofkey-valuepairs. Now P2P computing is a vast research field with multiple conferences and research groups in the area. The P2P computing is being actively utilized in the Internetfor software updates, P2PSIP VoIP, video-on-demand,and distributed backups.Recentintroductionofidentifier–locatorsplitproposalforFutureInternet architectures poses another important application for DHTs, namely mapping betweenhostpermanentidentityandchangingIPaddress.Thegrowingcomplexity andscaleofmodernP2Psystemsrequiresintroductionofhierarchyandintelligence ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.