28
Presented By: Niharjyoti Sarangi

Presented By: Niharjyoti Sarangi · 2012. 12. 25. · niharjyoti sarangi. 1. introduction – what & why 2. key features 3. jxta architecture 4. jxta layers 5. jxta jargons 6. jxta

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

  • Presented By:Niharjyoti Sarangi

  • 1. INTRODUCTION – WHAT & WHY 2. KEY FEATURES3. JXTA ARCHITECTURE4. JXTA LAYERS5. JXTA JARGONS6. JXTA PROTOCOLS7. JXTA SHELLS8. JXTA ADVANTAGES

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 2

  • AN OPEN P2P PROTOCOL IMPLEMENTATION ON ANY

    NETWORED GADGET OPEN SOURCE PROJECT BEGUN BY SUN MICROSYSTEMS

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 3

  • MISSING STANDARD SET OF PROTOCOLSONLY P2P P/C TO WORK COLLABORATIVELY & INDEPENDENTLYLIMITATIONS OF IP

  • UNIQUE ID FOR EACH DEVICENATPATH OPTIMIZATIONCAN LEAP FIREWALLS

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 5

  • INFORMATION BANDWIDTH RESOURCES

  • INTER-OPERABILITY - powers of Napster, Gnutella & AIM integrated UBIQUITY PLATFORM INDEPENDENCE SECURITY

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 7

  • 3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 8

  • PLATFORM – MINIMAL & ESSENTIAL PRIMITIVES• Peer & Peer group discovery• Communication• Monitoring• Security

    SERVICES – N/W & WEB SERVICES• Indexing & Searching• Distributed File System

    APPLICATIONS• Instant messaging• Content Management• P2P email Service

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 9

  • PEERS Virtual Mailboxes

    PEER GROUPS To create a secure , scoping & monitoring environment.

    MESSAGES XML Datagram

    Envelope having header, digest, source & destination endpoints

    PIPES Virtual communication channels Unidirectional , Synchronous request response, Bulk

    Transfer, Secure

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 10

  • 3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 11

  • 3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 12

    OPTIMISED ROUTING MECHANISMMAINTAINS

    RENDEZVOUS PEER VIEW (RPV)SHARED RESOURCES DISTRIBUTED INDEX

    (SRDI)DISTRIBUTED HASH TABLE (DHT)RANDOM WALK

  • 3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 13

  • LAN-BASED DISCOVERY.DISCOVERY THROUGH INVITATION.CASCADED DISCOVERY.DISCOVERY VIA RENDEZVOUS POINTS.

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 14

  • SET OF SIX PROTOCOLS PEER MEMBERSHIP PROTOCOL PEER INFORMATION PROTOCOL PEER BINDING PROTOCOLPEER DISCOVERY PROTOCOL PEER RESOLVER PROTOCOL PEER ENDPOINT PROTOCOL

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 15

  • JXTA - TECHLOLOGY OVERVIEW

    Transport

    Peer MembershipProtocol

    Peer EndpointProtocol

    Peer ResolverProtocol

    Peer DiscoveryProtocol

    Peer BindingProtocol

    Peer InformationProtocol

    Peer

    PeerGroup

    Resolver

    EndpointTransport

    Peer MembershipProtocol

    Peer EndpointProtocol

    Peer ResolverProtocol

    Peer DiscoveryProtocol

    Peer BindingProtocol

    Peer InformationProtocol

    Peer

    PeerGroup

    Resolver

    Endpoint

    3 OCT 200716

  • Joining and leaving peer groups Actions:

    Apply Join Renew Cancel

    Authenticators and security credentials to provide desired level of protection

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 17

  • Learn about the CAPABILITIES and STATUS of other peers i.e. uptime, offtime, traffic etc QUERY FOR ID PEER INFO MESSAGES

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 18

  • Bind a pipe advertisement to a pipe endpoint Abstract operations i.e. create, open, close, delete, send, receive. JXTA HTTP, JXTA TCP etc.

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 19

  • Enables peers to discover peer resourcesPeers, peer groups, pipes, services, etc

    Default discovery protocolBased on web-crawling and rendezvous peersRendezvous peers

    Cache advertisementsForward requests

    Discovery Request messagesUnicast Propagate

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 20

  • Enables a peer to send a generic query to another peer serviceEach service can register a handle in peer group resolverUnique service handler nameA peer is not required to respond to a Resolver Query request

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 21

  • Routing Information Auto update as N/W topology changes Router peers

    Cache route informationBridge different logical and physical networks

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 22

  • Crypto Library Hashing functions (MD5) Symmetric encryption (RC4) Asymmetric encryption (DH and RSA)

    Pluggable Authentication Module (PAM)Password based login schemeTransport security mechanism : CredentialsSimple access-control mechanismNAT/Firewalls – active research

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 23

  • Application built on top of Jxta PlatformNetworked command-line interfaceShell commands (similar to Unix)

    Man Env Whoami Peers Importfile Mkpipe

    Pipe operators: | and < >

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 24

  • SPEEDOPERATING SYSTEM INDEPENDENTTRAVERSE FIREWALLSUNIQUE IDENTIFIER FOR EACH PEERPATH OPTIMISATIONDECENTRALIZATON

    Resource availabilityReliability

    VERSATILE PROTOCOLSNo particular PL,OS,N/W topology , encryption or security

    modelEasy to implement and integrate Independent of transport protocols

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 25

  • Project Jxta homepagehttp://www.jxta.org

    Protocol Specification and whitepapershttp://www.jxta.org/white_papers.html

    Jxta Shell homepagehttp://shell.jxta.org

    CMS homepagehttp://cms.jxta.org

    InstantP2P homepagehttp//instantp2p.jxta.org

    3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 26

  • 3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 27

  • 3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 28

    THE JXTA TECHNOLOGY OUTLINEWHAT IS JXTA ?WHY JXTA?JXTA OVER IPSOLUTON TO MODERN COMPUTING KEY FEATURESARCHITECTURELAYERSJXTA JARGONSRELAY PEERSRENDEZVOUS PEERSCOMMUNICATIONDISCOVERY MECHANISMSJXTA PROTOCOLSJXTA PROTOCOLS Peer Membership ProtocolPeer Information ProtocolPeer Binding ProtocolPeer Discovery ProtocolPeer Resolver ProtocolPeer Endpoint Protocol SECURITYJXTA SHELLADVANTAGESREFERENCESTHANK YOU !!QUERIES ???