Download P2P Networking and Applications Ebook PDF

P2P Networking and Applications

P2P Networking and Applications
A Book

by John Buford,Heather Yu,Eng Keong Lua

  • Publisher : Morgan Kaufmann
  • Release : 2009-03-11
  • Pages : 408
  • ISBN : 9780080921198
  • Language : En, Es, Fr & De
GET BOOK

Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, the book explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models and also provides the means to improve upon these models with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practitioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology. Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability. Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs. Provides online access to the Overlay Weaver P2P emulator, an open-source tool that supports a number of peer-to-peer applications with which readers can practice.

P2P Networking and Applications

P2P Networking and Applications
A Book

by John F. Koegel Buford,Hong Heather Yu,Eng Keong Lua

  • Publisher : Morgan Kaufmann
  • Release : 2009
  • Pages : 415
  • ISBN : 9780123742148
  • Language : En, Es, Fr & De
GET BOOK

Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of academic and clinical information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, Peer-to-Peer Networking and Applications explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models. The book also delineates the latest research directions, thereby providing not only a sophisticated understanding of current systems, but also the means to improve upon these systems with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology. Uses well-known commercial P2P systems as models, thus demonstrating real-world applicability. Discusses how current research trends in wireless networking, high-def content, DRM, etc. will intersect with P2P, allowing readers to account for future developments in their designs. Provides online access to the Overlay Weaver P2P emulator, an open-source tool that supports a number of peer-to-peer applications with which readers can practice.

Peer-to-Peer Systems and Applications

Peer-to-Peer Systems and Applications
A Book

by Ralf Steinmetz

  • Publisher : Springer Science & Business Media
  • Release : 2005-09-29
  • Pages : 629
  • ISBN : 354029192X
  • Language : En, Es, Fr & De
GET BOOK

Starting with Napster and Gnutella, peer-to-peer systems became an integrated part of the Internet fabric attracting millions of users. According to recent evaluations, peer-to-peer traffic now exceeds Web traffic, once the dominant traffic on the Internet. While the most popular peer-to-peer applications remain file sharing and content distribution, new applications such as Internet telephony are emerging. Within just a few years, the huge popularity of peer-to-peer systems and the explosion of peer-to-peer research have created a large body of knowledge, but this book is the first textbook-like survey to provide an up-to-date and in-depth introduction to the field. This state-of-the-art survey systematically draws together prerequisites from various fields, presents techniques and methodologies in a principled and coherent way, and gives a comprehensive overview on the manifold applications of the peer-to-peer paradigm. Leading researchers contributed their expert knowledge to this book, each in his/her own specific area. Lecturers can choose from the wide range of 32 tightly integrated chapters on all current aspects of P2P systems and applications, and thus individually tailor their class syllabi. R&D professionals active in P2P will appreciate this book as a valuable source of reference and inspiration.

Handbook of Peer-to-Peer Networking

Handbook of Peer-to-Peer Networking
A Book

by Xuemin (Sherman) Shen,Heather Yu,John Buford,Mursalin Akon

  • Publisher : Springer
  • Release : 2010-11-15
  • Pages : 1500
  • ISBN : 9780387561714
  • Language : En, Es, Fr & De
GET BOOK

Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development or being proposed. The - derlying architectures share features such as decentralizaton, sharing of end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. This handbook broadly addresses a large cross-section of c- rent research and state-of-the-art reports on the nature of this paradigm from a large number of experts in the ?eld. Several trends in information and network technology such as increased perf- mance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforcing the capabilities of the P2P paradigm. There is general expectation in the technical community that P2P networking will continue to be an important tool for networked applications and impact the evo- tion of the Internet. A large amount of research activity has resulted in a relatively short time, and a growing community of researchers has developed. The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications. This is a comprehensive book on P2P computing.

Handbook of Peer-to-Peer Networking

Handbook of Peer-to-Peer Networking
A Book

by Xuemin Shen,Heather Yu,John Buford,Mursalin Akon

  • Publisher : Springer Science & Business Media
  • Release : 2010-03-03
  • Pages : 1500
  • ISBN : 0387097511
  • Language : En, Es, Fr & De
GET BOOK

Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development or being proposed. The - derlying architectures share features such as decentralizaton, sharing of end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. This handbook broadly addresses a large cross-section of c- rent research and state-of-the-art reports on the nature of this paradigm from a large number of experts in the ?eld. Several trends in information and network technology such as increased perf- mance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforcing the capabilities of the P2P paradigm. There is general expectation in the technical community that P2P networking will continue to be an important tool for networked applications and impact the evo- tion of the Internet. A large amount of research activity has resulted in a relatively short time, and a growing community of researchers has developed. The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications. This is a comprehensive book on P2P computing.

Legitimate Applications of Peer-to-Peer Networks

Legitimate Applications of Peer-to-Peer Networks
A Book

by Dinesh C. Verma

  • Publisher : John Wiley & Sons
  • Release : 2004-04-23
  • Pages : 164
  • ISBN : 0471653799
  • Language : En, Es, Fr & De
GET BOOK

The book examines the different legitimate applications used over a peer-to-peer network (p2p) The material examines the design and development of novel applications designed to leverage the distributed nature of peer-to-peer environments Goes beyond the most popular application of file-sharing (including sharing of video and audio files) and discusses the many different applications Compares traditional and peer-to-peer infrastructure and discusses merits and demerits of each approach from a business perspective

Peer-to-Peer Computing

Peer-to-Peer Computing
Principles and Applications

by Quang Hieu Vu,Mihai Lupu,Beng Chin Ooi

  • Publisher : Springer Science & Business Media
  • Release : 2009-10-20
  • Pages : 317
  • ISBN : 3642035140
  • Language : En, Es, Fr & De
GET BOOK

Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is called for. On the other hand, the increased computational power of such networks opens up completely new applications, such as in digital content sharing, scientific computation, gaming, or collaborative work environments. In this book, Vu, Lupu and Ooi present the technical challenges offered by P2P systems, and the means that have been proposed to address them. They provide a thorough and comprehensive review of recent advances on routing and discovery methods; load balancing and replication techniques; security, accountability and anonymity, as well as trust and reputation schemes; programming models and P2P systems and projects. Besides surveying existing methods and systems, they also compare and evaluate some of the more promising schemes. The need for such a book is evident. It provides a single source for practitioners, researchers and students on the state of the art. For practitioners, this book explains best practice, guiding selection of appropriate techniques for each application. For researchers, this book provides a foundation for the development of new and more effective methods. For students, it is an overview of the wide range of advanced techniques for realizing effective P2P systems, and it can easily be used as a text for an advanced course on Peer-to-Peer Computing and Technologies, or as a companion text for courses on various subjects, such as distributed systems, and grid and cluster computing.

Peer-to-Peer Computing

Peer-to-Peer Computing
Applications, Architecture, Protocols, and Challenges

by Yu-Kwong Ricky Kwok

  • Publisher : CRC Press
  • Release : 2011-08-17
  • Pages : 216
  • ISBN : 1439809348
  • Language : En, Es, Fr & De
GET BOOK

While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges provides comprehensive theoretical and practical coverage of the major features of contemporary P2P systems and examines the obstacles to further success. Setting the stage for understanding important research issues in P2P systems, the book first introduces various P2P network architectures. It then details the topology control research problem as well as existing technologies for handling topology control issues. The author describes novel and interesting incentive schemes for enticing peers to cooperate and explores recent innovations on trust issues. He also examines security problems in a P2P network. The final chapter addresses the future of the field. Throughout the text, the highly popular P2P IPTV application, PPLive, is used as a case study to illustrate the practical aspects of the concepts covered. Addressing the unique challenges of P2P systems, this book presents practical applications of recent theoretical results in P2P computing. It also stimulates further research on critical issues, including performance and security problems.

Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise
A Book

by Marcus Sachs,Paul Piccard

  • Publisher : Elsevier
  • Release : 2005-12-12
  • Pages : 650
  • ISBN : 9780080489698
  • Language : En, Es, Fr & De
GET BOOK

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic. * A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004 * The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time * The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics

Peer-to-Peer

Peer-to-Peer
Harnessing the Power of Disruptive Technologies

by Andy Oram

  • Publisher : "O'Reilly Media, Inc."
  • Release : 2001-02-26
  • Pages : 450
  • ISBN : 1491943211
  • Language : En, Es, Fr & De
GET BOOK

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users. While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it. This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field: Nelson Minar and Marc Hedlund of target="new">Popular Power, on a history of peer-to-peer Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users David Anderson of [email protected], on how [email protected] created the world's largest computer Jeremie Miller of Jabber, on the Internet as a collection of conversations Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies Adam Langley of Freenet, on Freenet's present and upcoming architecture Alan Brown of Red Rover, on a deliberately low-tech content distribution system Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems Roger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systems Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata Theodore Hong of Freenet, on performance Richard Lethin of Reputation Technologies, on how reputation can be built online Jon Udell ofBYTE and Nimisha Asthagiri andWalter Tuvell of Groove Networks, on security Brandon Wiley of Freenet, on gateways between peer-to-peer systems You'll find information on the latest and greatest systems as well as upcoming efforts in this book.

Mobile Peer to Peer (P2P)

Mobile Peer to Peer (P2P)
A Tutorial Guide

by Frank H. P. Fitzek,Hassan Charaf

  • Publisher : John Wiley & Sons
  • Release : 2009-06-15
  • Pages : 264
  • ISBN : 9780470714652
  • Language : En, Es, Fr & De
GET BOOK

Explore the potential of mobile P2P networks Mobile Peer to Peer (P2P): A Tutorial Guide discusses the potential of wireless communication among mobile devices forming mobile peer to peer networks. This book provides the basic programming skills required to set up wireless communication links between mobile devices, offering a guide to the development process of mobile peer to peer networks. Divided into three sections, Part I briefly introduces the basics of wireless technologies, mobile architectures, and communication protocols. Detailed descriptions of Bluetooth, IEEE802.11, and cellular communication link are given and applied to potential communication architectures. Part II focuses on programming for individual wireless technologies, and gives an understanding of the programming environment for individual wireless technologies. In addition, Part III provides advanced examples for mobile peer to peer networks. Introduces the basics of short-range/wireless technologies (such as Bluetooth and IEEE 802.11 Wireless LAN), mobile architectures, and communication protocols Explains the basic programming environment and the basic wireless communication technologies such as Bluetooth, WiFi (IEEE802.11), and cellular communication examples Discusses the advancements in meshed networks, mobile social networks and cooperative networks Provides detailed examples of mobile peer to peer communication including, social mobile networking, cooperative wireless networking, network coding, and mobile gaming Includes an accompanying website containing programming examples as source code Mobile Peer to Peer (P2P): A Tutorial Guideis an invaluable reference for advanced students on wireless/mobile communications courses, and researchers in various areas of mobile communications (mashups, social mobile networks, network coding, etc.) Undergraduate students and practitioners wishing to learn how to build mobile peer to peer networks will also find this book of interest.

Learning Network Programming with Java

Learning Network Programming with Java
A Book

by Richard M Reese

  • Publisher : Packt Publishing Ltd
  • Release : 2015-12-22
  • Pages : 292
  • ISBN : 1785882562
  • Language : En, Es, Fr & De
GET BOOK

Harness the hidden power of Java to build network-enabled applications with lower network traffic and faster processes About This Book Learn to deliver superior server-to-server communication through the networking channels Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer Explore the issues that impact scalability, affect security, and allow applications to work in a heterogeneous environment Who This Book Is For Learning Network Programming with Java is oriented to developers who wish to use network technologies to enhance the utility of their applications. You should have a working knowledge of Java and an interest in learning the latest in network programming techniques using Java. No prior experience with network development or special software beyond the Java SDK is needed. Upon completion of the book, beginner and experienced developers will be able to use Java to access resources across a network and the Internet. What You Will Learn Connect to other applications using sockets Use channels and buffers to enhance communication between applications Access network services and develop client/server applications Explore the critical elements of peer-to-peer applications and current technologies available Use UDP to perform multicasting Address scalability through the use of core and advanced threading techniques Incorporate techniques into an application to make it more secure Configure and address interoperability issues to enable your applications to work in a heterogeneous environment In Detail Network-aware applications are becoming more prevalent and play an ever-increasing role in the world today. Connecting and using an Internet-based service is a frequent requirement for many applications. Java provides numerous classes that have evolved over the years to meet evolving network needs. These range from low-level socket and IP-based approaches to those encapsulated in software services. This book explores how Java supports networks, starting with the basics and then advancing to more complex topics. An overview of each relevant network technology is presented followed by detailed examples of how to use Java to support these technologies. We start with the basics of networking and then explore how Java supports the development of client/server and peer-to-peer applications. The NIO packages are examined as well as multitasking and how network applications can address practical issues such as security. A discussion on networking concepts will put many network issues into perspective and let you focus on the appropriate technology for the problem at hand. The examples used will provide a good starting point to develop similar capabilities for many of your network needs. Style and approach Each network technology's terms and concepts are introduced first. This is followed up with code examples to explain these technologies. Many of the examples are supplemented with alternate Java 8 solutions when appropriate. Knowledge of Java 8 is not necessary but these examples will help you better understand the power of Java 8.

Peer-to-peer Computing

Peer-to-peer Computing
The Evolution of a Disruptive Technology

by Ramesh Subramanian,Brian D. Goodman

  • Publisher : IGI Global
  • Release : 2005-01-01
  • Pages : 308
  • ISBN : 1591404290
  • Language : En, Es, Fr & De
GET BOOK

Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals to the needs of both researchers and practitioners who are trying to gain a more thorough understanding of current P2P technologies and their emerging ramifications.

Peer-to-Peer with VB .NET

Peer-to-Peer with VB .NET
A Book

by Matthew MacDonald

  • Publisher : Apress
  • Release : 2008-01-01
  • Pages : 440
  • ISBN : 1430208171
  • Language : En, Es, Fr & De
GET BOOK

The author explores how peer-to-peer design ideas can be integrated into existing .NET applications.

Delay Tolerant Networks

Delay Tolerant Networks
Protocols and Applications

by Athanasios V. Vasilakos,Yan Zhang,Thrasyvoulos Spyropoulos

  • Publisher : CRC Press
  • Release : 2016-04-19
  • Pages : 362
  • ISBN : 1439811121
  • Language : En, Es, Fr & De
GET BOOK

A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applicat

Performance Tools and Applications to Networked Systems

Performance Tools and Applications to Networked Systems
Revised Tutorial Lectures

by Maria Carla Calzarossa,Erol Gelenbe

  • Publisher : Springer Science & Business Media
  • Release : 2004-04-22
  • Pages : 384
  • ISBN : 3540219455
  • Language : En, Es, Fr & De
GET BOOK

This book presents revised versions of tutorial lectures given at the IEEE/CS Symposium on modeling, analysis, and simulation of computer and telecommunication systems held in Orlando, FL, USA in October 2003. The lectures are grouped into three parts on performance and QoS of modern wired and wireless networks, current advances in performance modeling and simulation, and other specific applications of these methodologies. This tutorial book is targeted to both practitioners and researchers. The practitioner will benefit from numerous pointers to performance and QoS issues; the pedagogical style and plenty of references will be of great use in solving practical problems. The researcher and advanced student are offered a representative set of topics not only for their research value but also for their novelty and use in identifying areas of active research.

Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications

Handbook of Research on P2P and Grid Systems for Service-Oriented Computing: Models, Methodologies and Applications
Models, Methodologies and Applications

by Antonopoulos, Nick,Exarchakos, Georgios,Li, Maozhen,Liotta, Antonio

  • Publisher : IGI Global
  • Release : 2010-01-31
  • Pages : 1342
  • ISBN : 1615206876
  • Language : En, Es, Fr & De
GET BOOK

Addresses the need for peer-to-peer computing and grid paradigms in delivering efficient service-oriented computing.

Journal on Data Semantics XV

Journal on Data Semantics XV
A Book

by Stefano Spaccapietra

  • Publisher : Springer Science & Business Media
  • Release : 2011-08-09
  • Pages : 193
  • ISBN : 3642226299
  • Language : En, Es, Fr & De
GET BOOK

The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics. The scope of the journal ranges from theories supporting the formal definition of semantic content to innovative domain-specific applications of semantic knowledge. The journal addresses researchers and advanced practitioners working on the semantic web, interoperability, mobile information services, data warehousing, knowledge representation and reasoning, conceptual database modeling, ontologies, and artificial intelligence. Volume XV results from a rigorous selection among 25 full papers received in response to two calls for contributions issued in 2009 and 2010. In addition, this volume contains a special report on the Ontology Alignment Evaluation Initiative, an event that has been held once a year in the last five years and has attracted considerable attention from the ontology community. This is the last LNCS transactions volume of the Journal on Data Semantics; the next issue will appear as a regular Springer Journal, published quarterly starting from 2012.

Skype

Skype
The Definitive Guide

by Harry Max,Taylor Ray

  • Publisher : Pearson Education
  • Release : 2006-05-05
  • Pages : 224
  • ISBN : 0132702134
  • Language : En, Es, Fr & De
GET BOOK

Learn how to make free phone calls to more than 75 million people, and dirt-cheap phone calls to practically everyone else, anywhere on Earth! You can do it with Skype. This book will help you get started fast, with any computer: Windows, Mac, Linux, even Pocket PC. Then, take Skype to the limit, with SkypeIn, SkypeOut, instant messaging, secure file transfer, even video calling. Set up and customize Skype in just minutes Take Skype on the road--avoid expensive hotel phones and international calls Transform your PC into a state-of-the-art Skype videophone Troubleshoot Skype connections and audio quality Discover even more ways to save money, simplify life, even build your business! Written by Skype insiders, this is the only official guide to Skype. It's up-to-date, easy-to-use, quick, simple . . . and above all, FUN! Bonus coverage for more experienced users: Skype architecture, security, and advanced configuration.

Managing Traffic Performance in Converged Networks

Managing Traffic Performance in Converged Networks
20th International Teletraffic Congress, ITC20 2007, Ottawa, Canada, June 17-21, 2007, Proceedings

by Lorne Mason,Tadeusz Drwiega,James Yan

  • Publisher : Springer
  • Release : 2007-09-04
  • Pages : 1196
  • ISBN : 3540729909
  • Language : En, Es, Fr & De
GET BOOK

This book constitutes the refereed proceedings of the 10th International Teletraffic Congress, ITC 2007, held in Ottawa, Canada, June 2007. Coverage includes IPTV planning and modeling, network performance, traffic engineering, end-to-end delay in converged networks, queuing models, impact of convergence and divergence forces on network performance, traffic management in wireless networks, and network design for capacity and performance.