Skip to main content

Commercial Applications

  • Chapter
  • First Online:
Book cover Structured Peer-to-Peer Systems
  • 1395 Accesses

Abstract

This chapter describes several distributed databases for storing structured data in the Internet. They are known under a common name of NoSQL, to separate from traditional relational database management systems (RDBMSes). NoSQL databases are often built on top of classical DHT functionality with goals of high performance put and get operations for data using a key. Databases such as Cassandra power popular services including Facebook and therefore have to scale up to billions of users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://project-voldemort.com/design.php.

References

  1. Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: A distributed storage system for structured data. ACM Trans. Comput. Syst. 26, 4:1–4:26 (2008)

    Google Scholar 

  2. DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P., Vogels, W.: Dynamo: Amazon’s highly available key-value store. In: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, SOSP ’07, pp. 205–220. ACM, New York (2007)

    Google Scholar 

  3. Freedman, M.J., Laskhminarayanan, K., Mazières, D.: OASIS: Anycast for any service. In: Proceedings of the 3rd Symposium on Networked Systems Design and Implementation, San Jose, CA (2006)

    Google Scholar 

  4. Hewitt, E.: Cassandra: The Definitive Guide. O’Reilly Media, USA (2010)

    Google Scholar 

  5. Lakshman, A., Malik, P.: Cassandra: structured storage system on a P2P network. In: Proceedings of the 28th ACM symposium on Principles of distributed computing, PODC ’09. ACM, New York (2009)

    Google Scholar 

  6. Rhea, S., Godfrey, B., Karp, B., Kubiatowicz, J., Ratnasamy, S., Shenker, S., Stoica, I., Yu, H.: OpenDHT: A public DHT service and its uses. In: Proceedings of ACM SIGCOMM’05. ACM, New York (2005)

    Google Scholar 

  7. Sherman, A., Nieh, J., Stein, C.: FairTorrent: bringing fairness to peer-to-peer systems. In: CoNEXT ’09: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, pp. 133–144. ACM, Boston (2009). doi: http://doi.acm.org/10.1145/1658939.1658955

Download references

Author information

Authors and Affiliations

Authors

Summary of Part IV

Summary of Part IV

In this part we covered several architectures utilizing P2P concepts, as well as commercial systems using P2P algorithms. Secure lookup routing and privacy-preserving host rendezvous services are examples of advanced P2P architectures. Identifier-locator split appears as one of new fundamental trends of Future Internet, where P2P name resolution service will play a critical role. We also covered several popular content distribution and commercial key-value storage services that are of decentralized nature and use DHT algorithms internally.

Naturally, in a few chapters it is difficult to describe all versatile P2P applications in use in the Internet. For example, also such popular voice and video communication applications as Skype utilize P2P approach. Services such as Joost help users to enjoy streaming video and IP TV using P2P approach. A music listening service Spotify is also based on P2P. With ossification of Internet architecture on the IP layer, new overlay P2P applications play increasingly important role in implementing services such as peercasting for multicast delivery. Online gaming and virtual worlds is another example where players can benefit from lower latency of direct user-to-user communication.

Advanced P2P concepts such as cooperative web cashing and search, distributed scientific computation, online academic teaching all promise a bright future for P2P architectures, backup up by multi-million R & D investments in these area. In the presence of oppressive governments, citizens will have to increasingly rely on P2P technologies such as Tor to circumvent surveillance and censorship. For example, a web of trust for Pretty Good Privacy was established for P2P user email key certification and verification. In future, it is possible that centralized social networks such as Facebook are replaced by open-source, decentralized P2P services that give the users control over who and when can access their social data.

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Korzun, D., Gurtov, A. (2013). Commercial Applications. In: Structured Peer-to-Peer Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5483-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5483-0_13

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5482-3

  • Online ISBN: 978-1-4614-5483-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics