The Jxta Technology

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 28

Presented By:

Niharjyoti Sarangi
1. INTRODUCTION – WHAT & WHY
2. KEY FEATURES
3. JXTA ARCHITECTURE
4. JXTA LAYERS
5. JXTA JARGONS
6. JXTA PROTOCOLS
7. JXTA SHELLS
8. JXTA ADVANTAGES

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 2


 AN OPEN P2P PROTOCOL
 IMPLEMENTATION ON ANY
NETWORED GADGET
 OPEN SOURCE PROJECT
 BEGUN BY SUN MICROSYSTEMS

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 3


MISSING STANDARD SET OF
PROTOCOLS
ONLY P2P P/C TO WORK
COLLABORATIVELY &
INDEPENDENTLY
LIMITATIONS OF IP
UNIQUE ID FOR EACH DEVICE
NAT
PATH OPTIMIZATION
CAN LEAP FIREWALLS

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 5


 INFORMATION
 BANDWIDTH
 RESOURCES
 INTER-OPERABILITY - powers of
Napster, Gnutella & AIM integrated
 UBIQUITY
 PLATFORM INDEPENDENCE
 SECURITY

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 7


3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 8
PLATFORM – MINIMAL & ESSENTIAL PRIMITIVES
• Peer & Peer group discovery
• Communication
• Monitoring
• Security
SERVICES – N/W & WEB SERVICES
• Indexing & Searching
• Distributed File System
APPLICATIONS
• Instant messaging
• Content Management
• P2P email Service

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 9


 PEERS
 Virtual Mailboxes
 PEER GROUPS
 To create a secure , scoping & monitoring environment.

 MESSAGES
 XML
 Datagram
 Envelope having header, digest, source & destination
endpoints
 PIPES
 Virtual communication channels
 Unidirectional , Synchronous request response, Bulk
Transfer, Secure

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 10


3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 11
OPTIMISED ROUTING MECHANISM
MAINTAINS
 RENDEZVOUS PEER VIEW (RPV)
 SHARED RESOURCES DISTRIBUTED INDEX
(SRDI)
 DISTRIBUTED HASH TABLE (DHT)
 RANDOM WALK

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 12


3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 13
LAN-BASED DISCOVERY.
DISCOVERY THROUGH
INVITATION.
CASCADED DISCOVERY.
DISCOVERY VIA RENDEZVOUS
POINTS.
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 14
SET OF SIX PROTOCOLS

 PEER MEMBERSHIP PROTOCOL


 PEER INFORMATION PROTOCOL
 PEER BINDING PROTOCOL
PEER DISCOVERY PROTOCOL
 PEER RESOLVER PROTOCOL
 PEER ENDPOINT PROTOCOL

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 15


Peer Membership Peer Membership
Protocol Protocol
PeerGroup PeerGroup
Peer Information Peer Information
Protocol Protocol
Peer Binding Peer Binding
Protocol Protocol
Peer Discovery Peer Discovery
Peer Protocol Peer Protocol

Peer Resolver Peer Resolver


Protocol Protocol
Resolver Resolver
Peer Endpoint Peer Endpoint
Endpoint Protocol Endpoint Protocol

Transport Transport
16
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW
 Joining and leaving peer groups
 Actions:
 Apply
 Join
 Renew
 Cancel

 Authenticators and security credentials


to provide desired level of protection

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 17


 Learn about the CAPABILITIES and
STATUS of other peers i.e. uptime,
offtime, traffic etc
 QUERY FOR ID
 PEER INFO MESSAGES

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 18


 Bind a pipe advertisement to a pipe
endpoint
 Abstract operations i.e. create, open,
close, delete, send, receive.
 JXTA HTTP, JXTA TCP etc.

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 19


Enables peers to discover peer resources
 Peers, peer groups, pipes, services, etc
Default discovery protocol
Based on web-crawling and rendezvous peers
Rendezvous peers
 Cache advertisements
 Forward requests
Discovery Request messages
 Unicast
 Propagate
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 20
Enables a peer to send a generic query to
another peer service
Each service can register a handle in peer
group resolver
Unique service handler name
A peer is not required to respond to a
Resolver Query request

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 21


 Routing Information
 Auto update as N/W topology changes
 Router peers
Cache route information
Bridge different logical and physical networks

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 22


Crypto Library
 Hashing functions (MD5)
 Symmetric encryption (RC4)
 Asymmetric encryption (DH and RSA)

Pluggable Authentication Module (PAM)


Password based login scheme
Transport security mechanism : Credentials
Simple access-control mechanism
NAT/Firewalls – active research

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 23


Application built on top of Jxta Platform
Networked command-line interface
Shell commands (similar to Unix)
 Man
 Env
 Whoami
 Peers
 Importfile
 Mkpipe

Pipe operators: | and < >

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 24


SPEED
OPERATING SYSTEM INDEPENDENT
TRAVERSE FIREWALLS
UNIQUE IDENTIFIER FOR EACH PEER
PATH OPTIMISATION
DECENTRALIZATON
 Resource availability
 Reliability
VERSATILE PROTOCOLS
 No particular PL,OS,N/W topology , encryption or
security model
 Easy to implement and integrate
 Independent of transport protocols

3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 25


Project Jxta homepage
http://www.jxta.org
Protocol Specification and whitepapers
http://www.jxta.org/white_papers.html
Jxta Shell homepage
http://shell.jxta.org
CMS homepage
http://cms.jxta.org
InstantP2P homepage
http//instantp2p.jxta.org
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 26
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 27
3 OCT 2007 JXTA - TECHLOLOGY OVERVIEW 28

You might also like