• Keine Ergebnisse gefunden

Workshop algorithms and protocols for efficient peer-to-peer applications

N/A
N/A
Protected

Academic year: 2022

Aktie "Workshop algorithms and protocols for efficient peer-to-peer applications"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Workshop

Algorithms and Protocols for Efficient Peer-to-Peer Applications

Peer-to-peer protocols and applications have attracted much attention recently. Especially file-sharing applications like Gnutella, Kazaa, and e-Donkey have become very popular.

But other areas in the field of communication networks and distributed systems have also begun to use peer-to-peer concepts. Meanwhile, peer-to-peer protocols are used in qui- te diverse areas, such as Internet telephony, multicast streaming of multimedia content, distributed databases, instant messaging services, and grid-computing middleware.

However, the algorithms and protocols that are based on peer-to-peer concepts are as di- verse as the applications are. In order to achieve efficient, scalable solutions, it is thus especially important to select a suitable peer-to-peer approach for the respective applica- tion. Following the overall motto of the conference Informatik verbindet, this workshop aims at bringing together researchers from all areas of informatics to discuss how the di- versity of peer-to-peer protocols and algorithms can be leveraged to create efficient and scalable solutions for all kinds of distributed systems. This breadth is reflected by the ten submissions for various areas of peer-to-peer research that we received in total. We se- lected six papers that we thought to be the most interesting for the expected attendants of this workshop. These are researchers from both, academia and industry who either have a peer-to-peer networking background, or have an interest in the application of peer-to-peer technology to other areas of distributed systems.

We thank all authors contributing to this workshop, all reviewers who helped us with our decisions on which submissions to accept, all our fellow program committee mem- bers, Ralf Steinmetz, Klaus Wehrle, Martina Zitterbart, and the organizers of the GI- Jahrestagung who provide us with the framework for this workshop.

Thomas Fuhrmann Hermann De Meer

213

Referenzen

ÄHNLICHE DOKUMENTE

Napster provided a service where they indexed and stored file information that users of Napster made available on their computers for others to download, and the files

ƒ Peer-to-Peer: Anwendungen, die Ressourcen am Rand des Internets ohne feste IP-Adressen ausnutzen Ressourcen: Speicherkapazität, CPU-Zeit, Inhalte, menschliche Präsenz.. Î

The most difficult challenge to peer- to-peer solutions, for all three of video broadcast, on-demand streaming, and file download applications, lies in the tussle among content

Skype uses its Global Index (GI) [6] technology to search for a user. Skype claims that search is distributed and is guaranteed to find a user if it exists and has logged in during

Moreover, it is very likely the design philosophy underlying P2P networks will gain importance in the development of mobile business and ubiquitous computing, particularly when the

Based on our recent experiments and simulations we present a common model, evaluation metrics, and data sets for semantic peer-to-peer networks.. Ideally, we like to encourage

To solve the problem of load balancing, several techniques have been developed to ensure an equal data distribution across DHT nodes: Virtual Servers [RLS + 03], Power of Two

It connects to each servent on this list and uses the Ping/Pong protocol with large TTLs to discover other Gnutella servents, which are added to the list, as well as edges in