By Topic

Transforming the reliability, security and scalability of IT communications through the pervasive deployment of serverless software infrastructure

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
King, M. ; Quick Com AG, Switzerland ; Muehlemann, M.

The degree of user empowerment enabled by present day peer-to-peer applications in the areas of content-brokerage, super-distribution and group collaboration is now bringing IT professionals to an awareness of the many new and useful applications for "P2P" technology today. As a result, P2P technology and applications are beginning to take root throughout the industry as a whole. But these applications have only started to scratch the surface. The pervasive deployment of P2P technology in a truly serverless environment brings new opportunities and exciting challenges capable of completely transforming the way society experiences IT and media communications. This paper reviews how P2P technology can be applied pervasively to provide a serverless infrastructure that lowers the cost of wide-scale private networking right through from narrow-band networking at 2,400 bps to full broadband communications. The paper presents a three-part serverless infrastructure model, covering "application", "connectivity" and "management" and describes techniques for user discovery, auto-population and Quality of Service control applied at the end-user level. It describes a fault-tolerant approach to administrating large groups of users and network resources and discusses security at the transport, data storage and LAN levels. The paper also sets out a telecommunications carrier solution that enables service providers to further exploit their existing network infrastructure and presents a low cost solution for operators faced with high network configuration costs.

Published in:

Peer-to-Peer Computing, 2002. (P2P 2002). Proceedings. Second International Conference on

Date of Conference:

2002