[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/511446.511492acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

YouServ: a web-hosting and content sharing tool for the masses

Published: 07 May 2002 Publication History

Abstract

YouServ is a system that allows its users to pool existing desktop computing resources for high availability web hosting and file sharing. By exploiting standard web and internet protocols (e.g. HTTP and DNS), YouServ does not require those who access YouServ-published content to install special purpose software. Because it requires minimal server-side resources and administration, YouServ can be provided at a very low cost. We describe the design, implementation, and a successful intranet deployment of the YouServ system, and compare it with several alternatives.

References

[1]
Agrawal, R.; Bayardo, R.; Gruhl, D.; and Papadimitriou, S. Vinci: A Service-Oriented Architecture for Rapid Development of Web Applications. In Proc. of the Tenth International World Wide Web Conference (WWW10). http://www10.org/cdrom/papers/506/index.html, 2001.]]
[2]
Albitz, P. and Liu, C., DNS and BIND, 4th edition. O'Reilly & Associates, 2001.]]
[3]
Apache HTTP Server Project home page. http://httpd.apache.org/.]]
[4]
Apple Computer Corp., Personal Web Sharing description page. http://www.apple.com/macosx/whatyoucando/websharing.html.]]
[5]
Bolosky, W. J.; Douceur, J. R.; Ely, D.; and Theimer, M., Feasibility of a Serverless Distributed File System Deployed on an Existing Set of Desktop PCs. In Proc. of the Int'l Conf. on Measurement and Modeling of Computer Systems (SIGMETRICS-2000), pp. 34--43, 2000.]]
[6]
Box, D.; Ehnebuske, D.; Kakivaya, G.; Layman, A.; Mendelsohn, N.; Nielsen, H. F.; Thatte, S.; and Winer, D., Simple Object Access Protocol. http://www.w3.org/TR/SOAP/, May 2000.]]
[7]
Clarke, I.; Sandberg, O.; Wiley, B.; Hong., T. W., Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, ed. by H. Federrath. Springer: New York, 2001.]]
[8]
Dynamic DNS Network Services home page. http://www.dyndns.org/.]]
[9]
Fielding, R.; Gettys, J.; Mogul, J.; Frystyk, H.; Mastiner, L.; Leach, P.; and Berners-Lee, T., Hypertext Transfer Protocol -- HTTP/1.1 - Draft Standard RFC 2616. http://www.ietf.org/rfc/rfc2616.txt, June 1999.]]
[10]
Franks, J.; Hallam-Baker, P.; Hostetler, J.; Lawrence, S.; Leach, P.; Luotonen, A.; and Stewart, L., HTTP Authentication: Basic and Digest Access Authentication - Draft Standard RFC 2617. http://www1.ics.uci.edu/pub/ietf/http/rfc2617.txt, June 1999.]]
[11]
Clip2 Distributed Search Services, The Gnutella Protocol Specification v0.4. http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf.]]
[12]
Groove Networks, Inc., Groove Product Backgrounder. Corporate whitepaper, 2001.]]
[13]
ICQ home page. http://web.icq.com.]]
[14]
Lotus Notes. http://www.notes.net/.]]
[15]
Lotus QuickPlace. http://www.lotus.com/home.nsf/welcome/quickplace.]]
[16]
Mozilla.org, netlib documentation. http://www.mozilla.org/docs/netlib/ (netlib preferences section).]]
[17]
Microsoft Corp. Microsoft Passport Technical Whitepaper, http://www.passport.com/downloads/ TechnicalWhitePaper.doc, March 2001.]]
[18]
Mockapetris, P., Domain Names - Implementation and Specification -- STD 13, RCF 1035. http://www.ietf.org/rfc/rfc1035.txt, November 1987.]]
[19]
Mojo Nation, Mojo Nation Technical Overview. Feb. 14, 2000.]]
[20]
Napster home page. http://www.napster.com/.]]
[21]
Open Source Napster Server project. http://opennap.sourceforge.net/.]]
[22]
Permio Technologies, Inc., SOCKS home page. http://www.socks.nec.com/.]]
[23]
Rescorla, E., HTTP Over TLS, IETF Internet Draft. http://www.ietf.org/rfc/rfc2818.txt, Sept. 1999.]]
[24]
Rose, M. The Blocks Extensible Exchange Protocol Core. IETF Network Working Group request for comments: 3080. http://www.ietf.org/rfc/rfc3080.txt, March 2001.]]
[25]
SafeWeb, Inc. Triangle Boy Network (Technical Whitepaper). http://fugu.safeweb.com/sjws/solutions/white_papers_triangle_boy.html, 2001.]]
[26]
Senie, D., NAT-Friendly Application Design Guidelines. IETF Network Working Group RFC: 3235. http://www.faqs.org/rfcs/ rfc3235.html, Jan. 2002.]]
[27]
Sun Microsystems, Inc., Project JXTA: An Open, Innovative Collaboration. http://www.jxta.org/project/www/docs/OpenInnovative.pdf, April 25, 2001.]]
[28]
Whitehead, J. and Goland, Y. Y., WebDAV: A Network Protocol for Remote Collaborative Authoring on the Web. In Proc. of the European Computer Supported Cooperative Work Conference (ECSCW'99), 1999. Available at http://www.webdav.org.]]
[29]
Working Resources, Inc., BadBlue website and product description. http://www.badblue.com, 2001.]]
[30]
XDegrees, Inc., Introducing XDegrees Technology. Corporate whitepaper, 2001.]]
[31]
Yang, B. and Garcia-Molina, H., Comparing Hybrid Peer-to-Peer Systems. In Proc. of the 27th Int'l Conf. on Very Large Data Bases, 561--570, 2001.]]

Cited By

View all
  • (2023)A Study On Decentralized Web Hosting Using Peer-To-Peer ArchitectureData Analytics and Artificial Intelligence10.46632/daai/3/2/63:2(26-29)Online publication date: 1-Jan-2023
  • (2020)Attribute based Encryption for Improved Multi-Keyword Search in Information Network2020 5th International Conference on Communication and Electronics Systems (ICCES)10.1109/ICCES48766.2020.9138046(692-696)Online publication date: Jun-2020
  • (2016)Performance models for hierarchy of cachesPerformance Evaluation10.1016/j.peva.2016.01.00197:C(57-82)Online publication date: 1-Mar-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '02: Proceedings of the 11th international conference on World Wide Web
May 2002
754 pages
ISBN:1581134495
DOI:10.1145/511446
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 May 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. decentralized systems
  2. p2p
  3. peer-to-peer networks
  4. web hosting

Qualifiers

  • Article

Conference

WWW02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,068 of 6,946 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Study On Decentralized Web Hosting Using Peer-To-Peer ArchitectureData Analytics and Artificial Intelligence10.46632/daai/3/2/63:2(26-29)Online publication date: 1-Jan-2023
  • (2020)Attribute based Encryption for Improved Multi-Keyword Search in Information Network2020 5th International Conference on Communication and Electronics Systems (ICCES)10.1109/ICCES48766.2020.9138046(692-696)Online publication date: Jun-2020
  • (2016)Performance models for hierarchy of cachesPerformance Evaluation10.1016/j.peva.2016.01.00197:C(57-82)Online publication date: 1-Mar-2016
  • (2013)Modeling modern DNS cachesProceedings of the 7th International Conference on Performance Evaluation Methodologies and Tools10.4108/icst.valuetools.2013.254416(184-193)Online publication date: 10-Dec-2013
  • (2013)Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing NetworkProceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference10.1109/COMPSAC.2013.37(220-225)Online publication date: 22-Jul-2013
  • (2013)Lightweight End-User Software SharingEnd-User Development10.1007/978-3-642-38706-7_20(241-246)Online publication date: 2013
  • (2009)Secure Web 2.0 Content Sharing Beyond Walled GardensProceedings of the 2009 Annual Computer Security Applications Conference10.1109/ACSAC.2009.45(409-418)Online publication date: 7-Dec-2009
  • (2009)Privacy-preserving indexing of documents on the networkThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-008-0129-718:4(837-856)Online publication date: 1-Aug-2009
  • (2008)Privacy-enhanced sharing of personal content on the webProceedings of the 17th international conference on World Wide Web10.1145/1367497.1367564(487-496)Online publication date: 21-Apr-2008
  • (2007)The p2pWeb Model: A Glue for the Web16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007)10.1109/WETICE.2007.4407143(153-158)Online publication date: Jun-2007
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media