Project JXTA By Jude Mercado.

Slides:



Advertisements
Similar presentations
peer-to-peer and agent-based computing
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Module 7: Configuring Access to Internal Resources.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Service Oriented Architectures in Heterogeneous Environments
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
JXTA P2P Platform Denny Chen Dai CMPT 771, Spring 08.
JXTA Protocol Introduction Student : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2005/11/22.
Peer to Peer Discovery Nate Thrasher. Peer to Peer Discovery ● 2 Basic Categories – Hardware Discovery – Information Discovery ● JXTA (
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
JXTA Selo TE Introduction What is JXTA ( pronounced Juxta ) What is JXTA ( pronounced Juxta ) Jxta – an open, network computing platform designed.
Peer-to-Peer Networks & JXTA by Madhurasmitha Chakravarthy & Priti Sabadra.
Fionn Murtagh Dimitri Zervas Pedro Contreras Royal Holloway, University of London Munich, 24 of June 2005 JXTA P2P, Web Services and WS-Talk.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
P2P Project Mark Kurman Nir Zur Danny Avigdor. Introduction ► Motivation:  Firewalls may allow TCP or UDP connections on several specific ports and block.
JXTA Lecture 1.JXTA Overview a) Background to Project JXTA b) Design Constraints c) Terminology d) Overview and Architecture e) Introducing the Concepts.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
MobileMAN Kickoff1 Prototype Development Kit & P2P Middleware Proposal Giovanni Turi IIT - CNR Pisa
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Mobile P2P - Creating a mobile file-sharing environment Johnny Biström, Ville Partanen.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Presented by Robert Zaremba.  Remote messages must be sent to a message queue so that components are decoupled  Both sides of a communication must be.
Sun’s Project JXTA Technical Overview Presented by Sergei Kovalenko Red Team: Janhavi James A. Davis Fernando D. Diaz.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
1 A P2P Collaborative System Using JXTA Hosei Graduation School ITPC 02R3315 Katsuhiro CHIBA.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Rev PA102/03/20041 Communication Between Peer Wireless Sensor Networks over 2.5G/3G Mobile Networks Srdjan Krco R&D Ericsson Ireland
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
2-1 JXTA Concepts. 2-1 Learning Objectives ● This module will help you... – Understand P2P principles – Learn about JXTA virtual network core building.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
3-1 JXTA Platforms. 3-1 Learning Objectives ● Learn about the different platform implementations of the JXTA protocols – Features provided by each implementation.
JXTA (Juxtapose) Presented By: Anıl Gürsel Mehmet Çatalgöl.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Dr. Ian Wang Cardiff University, U.K.. Ian Wang, Cardiff University Peer-to-Peer and Grids What does the Peer-to-Peer paradigm offer Grids? Scalable Decentralized.
Introduction to Sockets “A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
JXTAJXTA By Fawaz AlSulaiman
18-1 Summary (Day 2) Learning Summary – What is JXTA ? – Understand the fundamental concepts of JXTA – Learn about the various implementations of.
Module 10: Windows Firewall and Caching Fundamentals.
Computer Communication: An example What happens when I click on
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 4 Learning About Other Devices.
6-1 How to Write JXTA Applications. 6-1 Learning Objectives ● This module will help you... – Gain familiarity with guidelines and design conventions that.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
Project JXTA Kaarthik Sivashanmugam. JXTA..? JXTA is a set of open, generalized peer-to-peer (P2P) protocols that allow any connected device on the network.
Client-server communication Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Cisco Study Guide
Discovery Internetworking Module 9 JEOPARDY K. Martin.
Chapter 11 User Datagram Protocol
Data communication and Networks
Module 3: Enabling Access to Internet Resources
Building Distributed Educational Applications using P2P
Sabri Kızanlık Ural Emekçi
Client-Server Model and Sockets
Implementing Network Access Protection
Socket Programming Cal Poly Pomona Young CS380.
Lecture 6: TCP/IP Networking By: Adal Alashban
Chapter 3: Windows7 Part 4.
Cisco Real Exam Dumps IT-Dumps
IIS.
Goals Introduce the Windows Server 2003 family of operating systems
Network Hardware and Protocols
System Models and Networking Chapter 2,3
Data Communication Systems and Network
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Connecting to the Network
Computer Networks Protocols
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
Presentation transcript:

Project JXTA By Jude Mercado

Background Project JXTA started as a research project at Sun Microsystems, Inc. under the guidance of Bill Joy and Mike Clary Released to the community in April 2001 It is currently an ongoing open-source project to develop ad hoc, peer-to-peer computing

Project Goals Standardize a common set of protocols for building p2p applications Peer Discovery Protocol Peer Resolver Protocol Peer Membership Protocol Pipe Binding Protocol Endpoint Routing Protocol Peer Information Protocol

Project Goals (Cont’d.) Create platform independent applications Interoperability

JXTA Platform “insert picture”

JXTA Components Peers Pipes Services Peer Groups

1. PEERS Fundamental entities in a JXTA system Represented by unique Peer ID Can be associated with one or more physical networking endpoints TCP – IP address plus port number HTTP -- URL Wireless packet network – cell phone #

2. PIPES Provide communication channels for JXTA peers Dynamic Input Output Dynamic Not bound to a physical endpoint until just before communications occur

3. SERVICES Hosted by a peer Performs useful work on behalf of a remote peer Resembles client-server relationship

4. PEER GROUPS A security domain within which membership can be authenticated and managed Group with shared common services All peers belong to a default group “world peer group”

Platform Core Services Discovery Pipe Resolver Membership/Access Monitor

1. Discovery Service Allows peers to discover each other Also used to discover peer groups, services, pipes Discovery is performed via query for specific advertisements

2. Pipe Service Enables peers to bind to pipe endpoints Manages pipes created by a peer Facilitates passing of messages through pipes

3. Resolver Service Provides a propagation service to query requests within a peer group

4. Membership/Access Service Security service Can be used to control access to any service or resource

Monitor Service Allows for a peer to be monitored for uptime, traffic on each incoming and outgoing channel, and other information related to status

JXTA Virtual Network “insert picture”

References jxta.org java.sun.com JXTA Peer-to-Peer Computing with Java By Sing Li