Skip to content
Scan a barcode
Scan
Paperback Peer-To-Peer: Harnessing the Power of Disruptive Technologies Book

ISBN: 059600110X

ISBN13: 9780596001100

Peer-To-Peer: Harnessing the Power of Disruptive Technologies

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good*

*Best Available: (missing dust jacket)

$5.69
Save $24.30!
List Price $29.99
Almost Gone, Only 1 Left!

Book Overview

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users.While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting...

Customer Reviews

5 ratings

Excellent coverage of p2p

In 2000, O'Reilly surveyed the field of peer-to-peer computing, and published this book. It has an excellent description of the key concepts behind all the major p2p implementations then existing. Napster, of course, was the best known. But Seti@home, Gnutella, Jabber, Freenet, Free Haven and others are also explained. These are compared with each other, so that you can see the different emphases and strengths of each.Since the book's release, p2p usage has grown, and the attendant controversy about the downloading of copyrighted material, mainly music, has continued unabated. Napster in its original incarnation has gone. But other p2p networks, like Kazaa, have arisen. Another type of p2p network has also emerged - for social networks. Companies include Friendster, Tribe.net, Ryze and others. Of course, these aren't covered in the book, because they did not exist when it was written. But as a measure of how comprehensive the book is, one of its chapters describes the key work on social networks and encompasses this entire group of companies.The technical level is moderate throughout the book. While XML, SOAP and cryptography are described, you only need slight familiarity with these topics. The discussion involving them tends to be at a higher level of usage.

dasper

I've been a big fan of O'Reilly & Associates for years because of their consistent ability to provide highly readable and accurate technical books, often about technologies I find fascinating and useful. To me the editorial bias of most of those books is simply the love of the technology they describe. But O'Reilly has increasingly become a force in the organization and direction of new technologies. And it is that aspect of this book on P2P which has made the biggest impression on me. This book is different from the many other O'Reilly books I've read because it discusses the publisher's own ideas about P2P and involvement with it.

Excellent Overview of the Technology and Policy of P-2-P

I consider Peer-to-Peer to be one of the finest books on Internet issues that I have read. I highly recommend it to business and policy professionals, teachers, social scientists, and engineers.When I first picked up the book, I had modest expectations. I have been disappointed by technical experts treating topics from the social sciences -- and this book does just that. Different chapters focus on such issues as: incentives on users to cooperate, the vulnerability of computer networks to social control, strategies for reliable communications, and censorship. Yet in this volume each topic is treated clearly, intelligently, and insightfully.The authors not only summarize their topics well, they regularly offer sparkling insights. For example, in the chapter "The Cornucopia of the Commons," Dan Bricklin explains how certain peer-to-peer applications are enriched by consumption. The more that users consume from the electronic commons, the larger that electronic commons becomes. In the case of Napster, as users download files those files become part of the overall archive available to others. This turns the tragedy of the commons on its head: well-designed peer-to-peer applications can create explosive processes of value generation - an insight I find both provocative and profound.The book sits squarely at that most difficult spot on the intellectual spectrum: the place where technology and policy overlap. Is this a policy book? Yes, it is. The topics above are all policy-relevant, and for a technical expert many of them would be new. Is this a technology book? Yes, it is that, too. It talks about network architecture design, technical implementations of trust and reputation, name spaces, and searching. For social scientists, the book is an excellent introduction to computer networking.Peer-to-Peer is nearly 400 pages long and has 19 chapters. Amazingly, every chapter is worth reading. I can't say that about many edited volumes that I know! The editor also did a good job of integrating the different chapters so that the book has overall coherence. This book is perfect for a university-level class about the Internet. The chapters on name spaces are useful to study of ICANN and global governance. Chapters on Napster help when studying intellectual property, those on FreeNet are useful when studying free speech. In my Internet policy class, I sprinkle chapters from the book throughout the semester.Aside from teaching, the book is useful for anyone who wants to understand computer networking. It is accessible and readable, yet surveys a wide range of technical topics. Considering the importance of the Internet and of peer-to-peer networks, it can be surprising difficult to find good explanations of the issues. This book does just that. ###

Groundbreaking

Peer-to-peer technology is a buzzword today., mainly because of all the publicity about Napster. The picture people get about this technology is not pretty; the main benefits seem to be free music and anonimity, and the core competencies seem to be superdistribution and the lack of any control. On September 2000 O'Reilly organized a peer-to-peer summit with a number of experts (computer scientists from MIT and AT & T Labs, CTO's, architects, human rights activists). This book is basically an offspring of this summit, with contributions from many of those experts.One of the goals of this summit was to answer the question what peer-to-peer really is, and about what technologies we should think when we hear the term. There are also a lot of lessons to be learned from well known applications as Napster, Gnutella and Freenet. One of the outcomes is peer-to-peer is much more than file sharing; we also can think of projects regarding Web Services (Bluetooth, .NET, JINI), instant messaging, Web hyperlinking and networked devices. Core benefits include "more effective use of Internet resources through edge services" and "overcoming barriers to formation of ad-hoc communities and working groups". Peer-to-peer should be positioned as a natural next step in the development of the Internet.After setting the context the book continues with chapters about a number of systems (already developed or still on the drawing table): SETI@home , Jabber, Mixmaster Remailers, Gnutella, Freenet, Red Rover, Publius and Free Haven. The focus of these chapters is on high level requirements and design choices: what works, what does not work and why? The last part of the book contains descriptions of core technologies and research areas. These chapters deal with questions as performance and scalability, search strategies, accountability, trust, reputation and security. The approach of these topics is scientific: performances issues in Gnutella and Freenet are illustrated mathematically via graph theory. In the chapter about accountability several techniques for digital payments are described for ensuring accountable behavior amongst peers. These chapters also show that peer-to-peer is not an isolated area, many of the requirements also apply to other Internet related areas: think about encrypting e-mail or authentication of users by a server ("How do I make sure that only persons above 21 years old can look at my Website" or "How can I trust the person I am dealing with at an auction site").This book is clearly not meant for developers. This is a book for people who want to be up to date about developments in computer science. Hereby I am thinking about CTOs, architects and researchers. In my opinion this is a groundbreaking work about a new and important topic that has many people's attention. The level is high and academic, and many of the technologies actually would require a separate book. All the articles are well written and of good quality.I want to place one critica

The avalanche is coming ...

I expect this will be one of the really important computing books published this year.Five years ago, I proposed a filestore that would be impossible to censor because it was too widely distributed across the Internet. I called this `The Eternity Service' after the `Eternity circuits' described by Arthur C. Clarke in `The City and the Stars'. I had been alarmed by the Scientologists' success at closing down the Penet remailer in Finland; this showed that electronic publishing can make it easy for rich people with ruthless lawyers to suppress publications. Gutenberg's invention of print publishing made it impossible for princes and bishops to censor troublesome books, but might electronic publishing not make it possible once more? If there are only half a dozen servers containing a controversial document, then court orders can be purchased to close them down. Might not electronic publishing compromise the enormous gift that he gave mankind?I could never have imagined the effect my paper would have. Rather than sedition, blasphemy or pornography, the battle is being fought over music copyright. Thanks to the Recording Industry Association of America, and its lawsuit against Napster, the Eternity Service has spawned a host of peer-to-peer systems such as Gnutella, Mojonation and Publius that have become front page news. There are also less-well-known systems, such as Red Rover, whose goal is to enable dissidents in places like China remain in contact with each other and with the rest of us. Sometimes, I have felt a bit like a skier who sets off an avalanche, and can only watch in fascination as it thunders down the valley.So I eagerly awaited my advance copy of this book, and I have certainly not been disappointed. Although it has been put together rapidly by a number of different authors, this is not just a list of what systems X, Y and Z do, and how they work. The first chapters place the peer-to-peer movement in a broader context: the early Internet was peer-to-peer, as was usenet. More recently, IP address congestion has led the builders of systems such as ICQ to design their own namespaces; alternatives to DNS are one of the emerging features of peer-to-peer.After the introduction, there are chapters on a number of different systems: SETI@home, Jabber, Mixmaster, Gnutella, Freenet, Red Rover, Publius and Free Haven. Although many of these systems are relatively young and evolving quickly, their successes and failures to date help sketch a map of the peer-ro-peer space as of the beginning of 2001. They teach us what has worked, what hasn't, and what just might.The lessons learned are distilled in the last seven chapters of the book. The themes brought out here have mostly to do with how these services can be made predictably dependable. Performance and trust are intricately intertwined; only by having means to protect against a wide variety of flooding and other attacks can service be maintained in the face of hostile action. However, technical
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured