DOC PREVIEW
SJSU CS 265 - Peer-to-Peer Networks & JXTA

This preview shows page 1-2-20-21 out of 21 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Peer-to-Peer Networks & JXTA by Madhurasmitha Chakravarthy & Priti SabadraScope of PresentationIntroduction to P2PP2P & Client-Server ModelFunction & TypesAdvantages & DisadvantagesAdvantages & Disadvantages (Cont’d)Where is it Today ?Project JXTA (Juxtapose)AgendaWhy JXTAJXTA’s GoalsJXTA ArchitectureJXTA Architecture (Cont’d)JXTA ProtocolJXTA SecurityOther TechnologiesAdvantages of JXTAJXTA Services and ApplicationThank YouPeer-to-Peer Networks & JXTAby Madhurasmitha Chakravarthy & Priti SabadraScope of PresentationIntroduction to P2PP2P & Client-Server ModelP2P - Function & TypesAdvantages & DisadvantagesWhere is it todayIntroduction to P2PHow many have used Napster*?How many are using Kazaa*?What is P2P?P2P & Client-Server ModelHow different from Client-server Model?Re-structuring Required? - NOFunction & TypesEvery Peer has an additional functional Layer to support Server type responsesPure – No Central ServerHybrid – Central Server (Some required functions)Advantages & DisadvantagesEnhanced load balancingDynamic information repositoriesInformation AvailabilityRedundancy and fault tolerance Improved SearchesAdvantages & Disadvantages (Cont’d)Spurious content, poor connections Traffic redistribution Free riders Cracker heavenWhere is it Today ?Two P2P Applications need to communicateTough – as each P2P has its own Plug-ins etcUsing a common set of services that provide functionality & interoperability - MiddlewareProject JXTA(Juxtapose)AgendaWhy JXTA?JXTA’s GoalsJXTA ArchitectureJXTA ProtocolJXTA SecurityDifferent TechnologiesAdvantages of JXTAJXTA Services and ApplicationsWhy JXTAComputing silos–non-interoperable, fragmented networksPC-to-PC–built-in dependencies on PC properties TCP/IP only–built-in dependency on IP-based transportJXTA’s GoalsInteroperability– Across different P2P systems and communitiesPlatform independence – Programming languages, system platforms, and networking platformsUbiquity– Every device with a digital heartbeatJXTA ArchitectureJXTA Architecture (Cont’d)JXTA Core layer:This provides the basic classes or methods that are necessary to develop a p2p application. JXTA Service Layer :This layer includes some services that may be used by the peers for some specific applications layer. JXTA Applications layer:These are the P2P applications, which are built using the core and service layer features.JXTA ProtocolPeer Discovery ProtocolPeer Resolver ProtocolPeer Information ProtocolPeer Membership ProtocolPipe Binding ProtocolEndpoint Routing ProtocolJXTA SecurityTransport layer Security(TLS)End-to-end transport independence of JXTA protocolsX509.V3 Digital certificates and certificate authoritiesOther TechnologiesMicrosoft.NetGroove TechnologyAdvantages of JXTAJXTA doesn’t need any specific language or Operating System.JXTA does not need knowledge of network topology.JXTA can be implemented using C, C++, Java, and Perl.  JXTA can be implemented on top of TCP/IP, HTTP,Blue tooth, HOME PNA and many other protocols.JXTA Services and ApplicationCollaboration toolsDistributed searching and indexingFile sharingDistributed storage & content deliveryPeer-to-peer messagingPeer monitoring and meteringJXTA ShellAnyThank


View Full Document

SJSU CS 265 - Peer-to-Peer Networks & JXTA

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Peer-to-Peer Networks & JXTA
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Peer-to-Peer Networks & JXTA and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Peer-to-Peer Networks & JXTA 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?