Abstract
This chapter describes several distributed databases for storing structured data in the Internet. They are known under a common name of NoSQL, to separate from traditional relational database management systems (RDBMSes). NoSQL databases are often built on top of classical DHT functionality with goals of high performance put and get operations for data using a key. Databases such as Cassandra power popular services including Facebook and therefore have to scale up to billions of users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: A distributed storage system for structured data. ACM Trans. Comput. Syst. 26, 4:1–4:26 (2008)
DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P., Vogels, W.: Dynamo: Amazon’s highly available key-value store. In: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, SOSP ’07, pp. 205–220. ACM, New York (2007)
Freedman, M.J., Laskhminarayanan, K., Mazières, D.: OASIS: Anycast for any service. In: Proceedings of the 3rd Symposium on Networked Systems Design and Implementation, San Jose, CA (2006)
Hewitt, E.: Cassandra: The Definitive Guide. O’Reilly Media, USA (2010)
Lakshman, A., Malik, P.: Cassandra: structured storage system on a P2P network. In: Proceedings of the 28th ACM symposium on Principles of distributed computing, PODC ’09. ACM, New York (2009)
Rhea, S., Godfrey, B., Karp, B., Kubiatowicz, J., Ratnasamy, S., Shenker, S., Stoica, I., Yu, H.: OpenDHT: A public DHT service and its uses. In: Proceedings of ACM SIGCOMM’05. ACM, New York (2005)
Sherman, A., Nieh, J., Stein, C.: FairTorrent: bringing fairness to peer-to-peer systems. In: CoNEXT ’09: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 133–144. ACM, Boston (2009). doi: http://doi.acm.org/10.1145/1658939.1658955
Author information
Authors and Affiliations
Summary of Part IV
Summary of Part IV
In this part we covered several architectures utilizing P2P concepts, as well as commercial systems using P2P algorithms. Secure lookup routing and privacy-preserving host rendezvous services are examples of advanced P2P architectures. Identifier-locator split appears as one of new fundamental trends of Future Internet, where P2P name resolution service will play a critical role. We also covered several popular content distribution and commercial key-value storage services that are of decentralized nature and use DHT algorithms internally.
Naturally, in a few chapters it is difficult to describe all versatile P2P applications in use in the Internet. For example, also such popular voice and video communication applications as Skype utilize P2P approach. Services such as Joost help users to enjoy streaming video and IP TV using P2P approach. A music listening service Spotify is also based on P2P. With ossification of Internet architecture on the IP layer, new overlay P2P applications play increasingly important role in implementing services such as peercasting for multicast delivery. Online gaming and virtual worlds is another example where players can benefit from lower latency of direct user-to-user communication.
Advanced P2P concepts such as cooperative web cashing and search, distributed scientific computation, online academic teaching all promise a bright future for P2P architectures, backup up by multi-million R & D investments in these area. In the presence of oppressive governments, citizens will have to increasingly rely on P2P technologies such as Tor to circumvent surveillance and censorship. For example, a web of trust for Pretty Good Privacy was established for P2P user email key certification and verification. In future, it is possible that centralized social networks such as Facebook are replaced by open-source, decentralized P2P services that give the users control over who and when can access their social data.
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Korzun, D., Gurtov, A. (2013). Commercial Applications. In: Structured Peer-to-Peer Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5483-0_13
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5483-0_13
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5482-3
Online ISBN: 978-1-4614-5483-0
eBook Packages: Computer ScienceComputer Science (R0)