Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
Presented By:Niharjyoti Sarangi
1. INTRODUCTION – WHAT & WHY 2. KEY FEATURES3. JXTA ARCHITECTURE4. JXTA LAYERS5. JXTA JARGONS6. JXTA PROTOCOLS7. JXTA SHELLS8. JXTA ADVANTAGES
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 2
AN OPEN P2P PROTOCOL IMPLEMENTATION ON ANY
NETWORED GADGET OPEN SOURCE PROJECT BEGUN BY SUN MICROSYSTEMS
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 3
MISSING STANDARD SET OF PROTOCOLSONLY P2P P/C TO WORK COLLABORATIVELY & INDEPENDENTLYLIMITATIONS OF IP
UNIQUE ID FOR EACH DEVICENATPATH OPTIMIZATIONCAN LEAP FIREWALLS
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 5
INFORMATION BANDWIDTH RESOURCES
INTER-OPERABILITY - powers of Napster, Gnutella & AIM integrated UBIQUITY PLATFORM INDEPENDENCE SECURITY
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 7
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 8
PLATFORM – MINIMAL & ESSENTIAL PRIMITIVES• Peer & Peer group discovery• Communication• Monitoring• Security
SERVICES – N/W & WEB SERVICES• Indexing & Searching• Distributed File System
APPLICATIONS• Instant messaging• Content Management• P2P email Service
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 9
PEERS Virtual Mailboxes
PEER GROUPS To create a secure , scoping & monitoring environment.
MESSAGES XML Datagram
Envelope having header, digest, source & destination endpoints
PIPES Virtual communication channels Unidirectional , Synchronous request response, Bulk
Transfer, Secure
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 10
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 11
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 12
OPTIMISED ROUTING MECHANISMMAINTAINS
RENDEZVOUS PEER VIEW (RPV)SHARED RESOURCES DISTRIBUTED INDEX
(SRDI)DISTRIBUTED HASH TABLE (DHT)RANDOM WALK
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 13
LAN-BASED DISCOVERY.DISCOVERY THROUGH INVITATION.CASCADED DISCOVERY.DISCOVERY VIA RENDEZVOUS POINTS.
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 14
SET OF SIX PROTOCOLS PEER MEMBERSHIP PROTOCOL PEER INFORMATION PROTOCOL PEER BINDING PROTOCOLPEER DISCOVERY PROTOCOL PEER RESOLVER PROTOCOL PEER ENDPOINT PROTOCOL
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 15
JXTA - TECHLOLOGY OVERVIEW
Transport
Peer MembershipProtocol
Peer EndpointProtocol
Peer ResolverProtocol
Peer DiscoveryProtocol
Peer BindingProtocol
Peer InformationProtocol
Peer
PeerGroup
Resolver
EndpointTransport
Peer MembershipProtocol
Peer EndpointProtocol
Peer ResolverProtocol
Peer DiscoveryProtocol
Peer BindingProtocol
Peer InformationProtocol
Peer
PeerGroup
Resolver
Endpoint
3 OCT 200716
Joining and leaving peer groups Actions:
Apply Join Renew Cancel
Authenticators and security credentials to provide desired level of protection
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 17
Learn about the CAPABILITIES and STATUS of other peers i.e. uptime, offtime, traffic etc QUERY FOR ID PEER INFO MESSAGES
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 18
Bind a pipe advertisement to a pipe endpoint Abstract operations i.e. create, open, close, delete, send, receive. JXTA HTTP, JXTA TCP etc.
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 19
Enables peers to discover peer resourcesPeers, peer groups, pipes, services, etc
Default discovery protocolBased on web-crawling and rendezvous peersRendezvous peers
Cache advertisementsForward requests
Discovery Request messagesUnicast Propagate
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 20
Enables a peer to send a generic query to another peer serviceEach service can register a handle in peer group resolverUnique service handler nameA peer is not required to respond to a Resolver Query request
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 21
Routing Information Auto update as N/W topology changes Router peers
Cache route informationBridge different logical and physical networks
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 22
Crypto Library Hashing functions (MD5) Symmetric encryption (RC4) Asymmetric encryption (DH and RSA)
Pluggable Authentication Module (PAM)Password based login schemeTransport security mechanism : CredentialsSimple access-control mechanismNAT/Firewalls – active research
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 23
Application built on top of Jxta PlatformNetworked command-line interfaceShell commands (similar to Unix)
Man Env Whoami Peers Importfile Mkpipe
Pipe operators: | and < >
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 24
SPEEDOPERATING SYSTEM INDEPENDENTTRAVERSE FIREWALLSUNIQUE IDENTIFIER FOR EACH PEERPATH OPTIMISATIONDECENTRALIZATON
Resource availabilityReliability
VERSATILE PROTOCOLSNo particular PL,OS,N/W topology , encryption or security
modelEasy to implement and integrate Independent of transport protocols
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 25
Project Jxta homepagehttp://www.jxta.org
Protocol Specification and whitepapershttp://www.jxta.org/white_papers.html
Jxta Shell homepagehttp://shell.jxta.org
CMS homepagehttp://cms.jxta.org
InstantP2P homepagehttp//instantp2p.jxta.org
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 26
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 27
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 28
THE JXTA TECHNOLOGY OUTLINEWHAT IS JXTA ?WHY JXTA?JXTA OVER IPSOLUTON TO MODERN COMPUTING KEY FEATURESARCHITECTURELAYERSJXTA JARGONSRELAY PEERSRENDEZVOUS PEERSCOMMUNICATIONDISCOVERY MECHANISMSJXTA PROTOCOLSJXTA PROTOCOLS Peer Membership ProtocolPeer Information ProtocolPeer Binding ProtocolPeer Discovery ProtocolPeer Resolver ProtocolPeer Endpoint Protocol SECURITYJXTA SHELLADVANTAGESREFERENCESTHANK YOU !!QUERIES ???