Transforming the reliability, security and scalability of IT communications through the pervasive deployment of serverless software infrastructure
The degree of user empowerment enabled by present day peer-to-peer applications in the areas of content-brokerage, super-distribution and group collaboration is now bringing IT professionals to an awareness of the many new and useful applications for "P2P" technology today. As a result, P2...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The degree of user empowerment enabled by present day peer-to-peer applications in the areas of content-brokerage, super-distribution and group collaboration is now bringing IT professionals to an awareness of the many new and useful applications for "P2P" technology today. As a result, P2P technology and applications are beginning to take root throughout the industry as a whole. But these applications have only started to scratch the surface. The pervasive deployment of P2P technology in a truly serverless environment brings new opportunities and exciting challenges capable of completely transforming the way society experiences IT and media communications. This paper reviews how P2P technology can be applied pervasively to provide a serverless infrastructure that lowers the cost of wide-scale private networking right through from narrow-band networking at 2,400 bps to full broadband communications. The paper presents a three-part serverless infrastructure model, covering "application", "connectivity" and "management" and describes techniques for user discovery, auto-population and Quality of Service control applied at the end-user level. It describes a fault-tolerant approach to administrating large groups of users and network resources and discusses security at the transport, data storage and LAN levels. The paper also sets out a telecommunications carrier solution that enables service providers to further exploit their existing network infrastructure and presents a low cost solution for operators faced with high network configuration costs. |
---|---|
DOI: | 10.1109/PTP.2002.1046291 |