Bücher online kostenlos Kostenlos Online Lesen
Peer-to-Peer-Netzwerke: Algorithmen und Methoden

Peer-to-Peer-Netzwerke: Algorithmen und Methoden

Titel: Peer-to-Peer-Netzwerke: Algorithmen und Methoden Kostenlos Bücher Online Lesen
Autoren: Peter Mahlmann;Christian Schindelhauer
Vom Netzwerk:
S., Zhao, B.Y.: Distributed object location in a dynamic network. In: SPAA '02: Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures, New York, NY, USA, ACM Press (2002) 41-52
    13. Plaxton, C.G., Rajaraman, R., Richa, A.: Accessing nearby copies of replicated objects in a distributed environment. In: 9th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA '97), New York, Association for Computing Machinery (1997) 311-320

    14. Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In Druschel, P., Kaashoek, M.F., Rowstron, A.LT., eds.: Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Volume 2429 of Lecture Notes in Computer Science., Springer (2002)53-65
    15. Futey, D., Roos, L.: Peer-to-peer working group. http://p2p.intemet2.edu/ (2002)
    16. Lynch, D.C.: Historical Evolution. In Internet System Handbook,. Daniel C. Lynch and Marshall T. Rose, eds., Addison Wesley, Reading (1993)
    17. Stevens, W.R.: TCP/IP Illustrated, Volume 1; The Protocols. Addison Wesley, Reading (1995)
    18. Postel, J.: Internet Protocol. Network Information Center RFC 791 (1981) 1-45
    19. Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1 (1959)
    20. Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press/McGraw-Hill, Cambridge, Massachusetts (1990)
    21. Malkin, G.: RFC 2453: RIP version 2. http://www.apps.ietf.org/rfc/rfc2453.html (1998)
    22. R. Coltun, D. Ferguson, J.M.: OSPF for IPv6, RFC 2740. http://www.apps.ietf.org/ rfc/rfc2740.html (1999)
    23. Hedrick, C.L.: An introduction to IGRP. Cisco Systems, Inc, Document ID: 26825, The State University of New Jersey, Rutgers Center for Computers and Information Services, Laboratory for Computer Science Research (199 1)
    24. Cisco Systems, I.: Enhanced interior gateway routing protocol. White Paper, Document ID: 16406 (2005)
    25. Y. Rekhter, T. Li, S.H.: RFC 4271: A Border Gateway Protocol 4 (BGP-4). http:// www.apps.ietf.org/rfc/rfc4271.html (2006)
    26. Postel, J.: Transmission Control Protocol. Network Information Center RFC 793 (1981) 1-85
    27. Jacobson, V.: Congestion Avoidance and Control. In: ACM SIGCOMM '88. Volume 18, 4., ACM SIGCOMM, ACM Press (1988) 314-329 Stanford, CA.
    28. Karn, P., Partridge, C.: Improving round-trip time estimates in reliable transport protocols. Computer Communication Review 17 (1987) 2-7
    29. Braden, R.T.: RFC 1123: Requirements for Internet hosts - application and support. http://www.apps.ietf.org/rfc/rfcl 123.html (1989)
    30. Jacobson, V.: Modified TCP congestion avoidance algorithm. end2end-interest mailing list (1990)
    31. Chiu, D.M., Jain, R.: Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Computer Networks and ISDN Systems 17 (1989) 1-14
    32. Deering, S.E., Hinden, R.M.: Internet protocol, version 6 (IPv6) specification. Internet proposed standard RFC 1883 (1995)
    33. Jovanovic, M.A., Annexstein, F.S., Berman, K.A.: Scalability issues in large peerto-peer networks - a case study of Gnutella. Technical report, Technical Report, http://www.ececs.uc.edu/ mjovanov/Research/paper.html, University of Cincinnati (2001)
    34. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella- like P2P systems scalable. In Feldmann, A., Zitterbart, M., Crowcroft, J., Wetherall, D., eds.: Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany, ACM (2003) 407-418

    35. Cohen, E., Shenker, S.: Replication strategies in unstructured peer-to-peer networks. In: SIGCOMM '02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, New York, NY, USA, ACM Press (2002) 177-190
    36. Rivest, R.L.: The MD5 Message Digest algorithm, RFC 1321 (1992)
    37. Eastlake, D.E., Jones, P.E.: US secure hash algorithm 1 (SHA1). Internet informational RFC 3174 (2001)
    38. Hansen, T.: US secure hash algorithms (sha and hmac-sha). Internet informational RFC 4634(2006)
    39. Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M.F., Morris, R.: Designing a DHT for low latency and high throughput. In: NSDI, USENIX (2004) 85-98
    40. Gummadi, P.K., Gummadi, R., Gribble, S.D., Ratnasamy, S., Shenker, S., Stoica, I.: The impact

Weitere Kostenlose Bücher