Scheduled System Maintenance
On Tuesday, January 22, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Proceedings First International Conference on Peer-to-Peer Computing

27-29 Aug. 2001

Filter Results

Displaying Results 1 - 19 of 19
  • Proceedings First International Conference on Peer-to-Peer Computing

    Publication Year: 2001
    Request permission for reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Peer-to-peer implementations

    Publication Year: 2001, Page(s): 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Summary form only given, as follows. Distributed computing represents an extremely cost-effective way to gain supercomputer-scale power to run certain types of compute-intensive applications. Remarkably, the majority of a PC's time is spent doing nothing. The average PC is idle between 60 and 90%, even when it is being used. Distributed computing platforms split large computational problems into m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction to Gnougat

    Publication Year: 2001, Page(s):4 - 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Gnougat is an experimental system for the distribution of static file content using a fully decentralised peer-to-peer network on the Internet. The basic premise for the system is that a content-centred approach using hash keys to uniquely identify portions of files called chunks will provide more flexibility to each node in the system to act to benefit the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technologies for sharing and collaborating on the Net

    Publication Year: 2001, Page(s):13 - 28
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1356 KB) | HTML iconHTML

    This paper is an overview of the technologies that are needed for Peer-to-Peer (P2P) computing. It represent a high level overview of material covered in much greater detail in Barkai, (2001). P2P means different things to different people, and we start by defining P2P and categorizing applications that use P2P. Server-mediated P2P is included as a legitimate P2P architecture. The applications spa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewalls in a P2P world

    Publication Year: 2001, Page(s): 29
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (50 KB)

    Summary form only given, as follows. The past decade has seen a strong opening of company networks towards the Internet. Nearly every organization has some web presence, does some business by email (internally and externally) and many allow their employees access to the Internet from the office. Firewalls (acting as filter and proxy for network traffic) were supposed to be the magic all-encompassi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search in JXTA and other distributed networks

    Publication Year: 2001, Page(s):30 - 35
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    The goal of this paper is to review and classify the different approaches to search in peer-to-peer networks. We then describe the approach implemented in JXTA search. JXTA is an open peer-to-peer network environment. JXTA search is a network of hubs that index the content of a peer-topeer network. Finally, we propose an organization of the JXTA search hubs, which reduces the storage and communica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breaking the server and data communications barrier with serverless guaranteed quality of service (GQoS) compliant communications

    Publication Year: 2001, Page(s):36 - 44
    Cited by:  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    Imagine receiving a new software application that can be installed on any device enabling the secure, simultaneous exchange and distribution of media files, unrestricted by type, volume and number of users. All you need is a Java-enabled device and a network connection. There is no server, so there is no need to install any additional infrastructure. In this serverless world, conducting a telephon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable and secure peer-to-peer systems with support for QoS

    Publication Year: 2001, Page(s): 47
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (58 KB)

    Summary form only given. We present a solution for peer-to-peer secure communication that supports IS/DS based QoS as well as layer-7 switching. This is the first secure communication protocol that is scalable and at the same time solves the incompatibility problems of security protocols with other networking protocols, such as, NAT, ICMP, RED, etc. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-peer streaming media delivery

    Publication Year: 2001, Page(s):48 - 52
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Whatever definitions have been put upon it, peer-to-peer is an effective rallying cry for a new way of doing things. Streaming media delivery is particularly susceptible to a peer-to-peer architectural approach. Peer-to-peer systems have been shown to reduce the bandwidth cost and increase the scalability of on-demand and streaming content on the Internet. Similar techniques can be used to create ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-peer mobile network architecture

    Publication Year: 2001, Page(s):55 - 61
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    An individuals ultimate independence from unwanted ownership and control can be obtained in a Mobile Peer to Peer (MP2P) environment. This paper takes a historical view on the subject of mobile networks and underscores some of the main architectural principles enabling MP2P. The concept of local policy enforcement is introduced as a mental tool to define terminal centric control, as opposed to net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a content-based aggregation network

    Publication Year: 2001, Page(s):62 - 68
    Cited by:  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (589 KB) | HTML iconHTML

    We present an architecture for content-based aggregation in peer-to-peer filesharing networks. It is designed to significantly reduce the amount of nodes that have to be queried, by introducing a distributed index into the system. This index allows content to be located in a peer-to-peer network without using broadcast-style techniques. We also show how this index can be created and maintained in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XML-based middleware for peer-to-peer computing

    Publication Year: 2001, Page(s):69 - 74
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (572 KB) | HTML iconHTML

    An increasing number of distributed applications will be written for mobile hosts, such as laptop computers, third generation mobile phones, personal digital assistants, watches and the like, with focus on peer-to-peer collaboration. Application engineers have to deal with a new set of problems caused by mobility, such as low bandwidth, context changes or loss of connectivity. During disconnection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks

    Publication Year: 2001, Page(s):75 - 91
    Cited by:  Papers (27)  |  Patents (19)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1451 KB) | HTML iconHTML

    This paper motivates and describes the notion of mobile ad-hoc information systems. Such a system consists of a decentralized and self-organizing network of autonomous, mobile devices that interact as peers. Connectivity is determined by distance between devices; as hosts change their physical location they establish pair-wise communication links based on mutual proximity. We describe application ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Getting the most from accountability in P2P

    Publication Year: 2001, Page(s):95 - 96
    Cited by:  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    An important concern for P2P (peer-to-peer) developers is accountability. The few sources on P2P accountability define the term as a mechanism that makes the users accountable for their activity in the network. This general definition requires some refining to render it useful in the development of a P2P implementation. By 'accountability' we denote three general functions for the system: one is t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An initial approach of a scalable multicast-based pure peer-to-peer system

    Publication Year: 2001, Page(s):97 - 98
    Cited by:  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    There are always big question marks when implementing the pure peer-to-peer architecture. Our research is a short-term initiative to investigate the evolution of future architecture for pure peer-to-peer. Our first implementation is an infrastructure that supports a large number of Internet users by implementing IP multicast technology into the pure peer-to-peer architecture. The prototype of our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-peer architecture case study: Gnutella network

    Publication Year: 2001, Page(s):99 - 100
    Cited by:  Papers (102)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Despite recent excitement generated by the P2P paradigm and despite surprisingly fast deployment of some P2P applications, there are few quantitative evaluations of P2P system behavior. Due to its open architecture and achieved scale, Gnutella is an interesting P2P architecture case study. Gnutella, like most other P2P applications, builds at the application level a virtual network with its own ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications

    Publication Year: 2001, Page(s):101 - 102
    Cited by:  Papers (106)  |  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    This paper offers a definition for peer-to-peer networking and makes the differences to common so called client server-architectures clear. With this definition we are able to classifiy currently existing networking concepts in the Internet either as "pure" peer-to-peer, or "hybrid" peer-to-peer or client server architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peering the smart homes

    Publication Year: 2001, Page(s):103 - 104
    Cited by:  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    The concepts of Smart Home, Connected Home, Home Networking or Home Communication are quite well known through the media. This interest toward home automation and control leads to a new view for the future home, a new life style, with new services and applications. This paper points out the key features of P2P technology that can boost the optimization of home automation. With this technology in p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s): 105
    Request permission for reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE