JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris
|
|
- Annabelle Miller
- 8 years ago
- Views:
Transcription
1 JXTA Overview Mathieu Jan IRISA Rennes Projet Paris
2 Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2
3 Why peer-to-peer (P2P)? Client Client Client Internet Cache Proxy Client Client server server Client -to-peer model Client Congestion zone Client Client Client/server model Client Client/ Server Client/ Server Client/ Server server server Client/ Server Client/ Server Client/ Server Congestion zone Client/ Server Client/ Server Client/ Server 3
4 P2P: a definition Goal: take advantage of resources available at the edges of Internet Computing power, storage, content Definition Larged distributed system Variable connectivity and temporary IP addresses Parity: each node can be client and server 4
5 P2P: features Dynamicity of the network Composition and topology Dynamic discovery of peers and resources Scalability More peers => more performance High availability Interchangeable peers (replication) 5
6 JXTA: a Generic Framework for P2P Computing Open platform for P2P programming Common functionalities Language, OS, network agnostic Set of interoperable protocols (XML) Open source project: 6
7 JXTA Services and Applications Distributed storage and data sharing Search, indexing and file sharing Large scale distributed computing P2P messaging and collaboration tools 7
8 JXTA Virtual Network ID ID ID ID ID ID ID ID Virtual Mapping Firewall TCP/IP HTTP Firewall Physical Network 8
9 s A peer Unique identifier (UUID) Adressable independently of its location (firewalls, NAT) Multiple endpoint address (TCP, HTTP, etc.) types Minimal edge : send/receive Full edge : + cache Rendezvous : + fwd requests Relay : +routing cache +firewall support 9
10 Groups Why Groups? Provide a group identity (common interest) Create secure & protected domains Scope peer operations (discovery, search, communications) Enable monitoring ID GroupA ID ID NetGroup ID ID ID ID GroupB ID 10
11 Advertisements Every resource is represented by an advertisement group Pipe Service Content status Group Advertisement: <?xml version="1.0"?> <!DOCTYPE jxta:pga> <jxta:pga> <GID> urn:jxta: uuid- BCBCDEABDBBBABEABBBABA </GID> <MSID> urn:jxta:uuid- BFEFDEDFBABAFRUDBACE </MSID> <Name> My Group </Name> <Desc> This group is to be used for my own testing </Desc> </jxta:pga> 11
12 Pipe: Virtual Communication Channel Non-localized communication channel between two or more peers Uni-directional Asynchronous Unreliable Input Pipe Output Pipe Propagate Receive Pipe Point-to-Point Pipe Send Propagate Group B Group A 12
13 Pipe Communication Model Connect to services independently of their peer locations Dynamic binding At pipe creation or for every message sent Build highly-available services Transparent fail-over by reconnecting pipe endpoints Pipeline multiple services to form complex service 13
14 Network Services Services Group Services Can be dynamically loaded 14
15 JXTA Protocol Stack Discovery Protocol Pipe Binding Protocol Info Protocol Resolver Protocol Endpoint Protocol Rendezvous Protocol 15
16 JXTA Protocol Stack 16
17 Discovery Protocol (JXTA 1.0) RdV 2 2 RdV RdV 17
18 JXTA: Architecture JXTA Applications Community JXTA Applications Sun JXTA Applications JXTA Services Community JXTA Services Sun JXTA Services Indexing Searching File sharing JXTA Shell Commands JXTA Core Groups Pipes Security Monitoring Any on the Expanded Web 18
19 JXTA: Core Services Discovery Service Info Service Pipe Service Resolver Service Membership Service Access Service 19
20 JXTA 2.0 J2SE Released Better performance Greater scalability More stable Wire protocol incompatible Mostly API compatible 20
21 New Rendezvous Network In JXTA 1.0, all peers were involved in the propagation of resolver, discovery, and propagate pipe messages within the Group In JXTA 2.0, resolution and propagation are done via two new concepts: Rendezvous super-peer network and Rendezvous Walker Service Shared Resource Distributed Index (SRDI) Service to distribute advertisement indexes throught the rendezvous network 21
22 New Propagation Queries only propagated among rendezvous peers Edge peers only receive direct queries for their own advertisements Rendezvous peers self organize Pluggable frameworks used to walk the Rendezvous web 22
23 Shared Ressource Distributed Index Edge peers publish indices of advertisements across Rdv network using Distributed Hash Tables (DHT) DHTs are maintained by Rendezvous peers Queries are directed to appropriate Rdv If not found, a walk of the Rdv web is performed Hash functions are pluggable 23
24 Loosely-Consistent DHT s have high churn rate Maintening a consistent distributed index outweight the advantages of having one Network crawling is expensive but does not have any maintenance cost 24
25 Rendezvous View (RPV) Each rendezvous peer maintains an ordered list of known rendezvous peer in the peergroup by their peer IDs No strong consistency mechanism is used to enforce the consistency of the RPV across all rendezvous Rendezvous periodically select random number of rendezvous from their RPV, and send them a random list of their known rendezvous 25
26 Publish advertisement 26
27 Search advertisement 27
28 Inconsistent view 28
29 Limited-range walker 29
30 Finding Rendezvous s Edge peers maintain lists of rendezvous peers Dynamic fail-over when connection fails Edge peers discover and cache Rdv advertiements Seeding Rdvs are used to bootstrap Auto-promotion to Rdv if none can be found in Group 30
31 JXTA Implementation Platforms JXTA-J2SE Implementation (J2SE 1.3.1) Full Implementation of JXTA Protocols Tutorials and Programmer Guide JXTA-C JXTA 1.0 Edge peer only Others: Objective-C, Perl, Ruby,.Net 31
32 Conclusion JXTA: open platform for P2P services and applications JXTA Concepts s Groups Advertisements Pipe JXTA protocol stack Loosely-Consitent DHT 32
JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks
JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and
More informationCommon P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype
Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration
More informationPeer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition
Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay
More informationPeer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
More informationExploiting peer group concept for adaptive and highly available services
Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,
More informationExtending JXTA for P2P File Sharing Systems
Extending JXTA for P2P File Sharing Systems Bhanu Krushna Rout(10506012) Smrutiranjan Sahu(10506034) Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769
More informationClassic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
More informationSecurity. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
More informationStoring and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman
Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman Cornell University {krzys ken}@cs.cornell.edu Agenda Agenda 1. A new, versacle storage abstraccon: Checkpointed Channel
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationXML Filtering in Peer-to-peer Systems
12/10/2003 Honguk Woo (honguk@cs.utexas.edu) Pilsung Kang (pilsungk@cs.utexas.edu) Computer Sciences University of Texas at Austin 1. Introduction 2. Publish/Subscribe Model 3. XML sharing application
More informationInteracting the Edutella/JXTA Peer-to-Peer Network with Web Services
Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl
More informationAn Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments
An Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments Michael Pirker 1, Michael Berger 2, Michael Watzke 2 1 Profactor Produktionsforschungs GmbH, Im Stadtgut A2, 4407 Steyr, Austria
More informationP2P File Sharing: BitTorrent in Detail
ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2
More informationRELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
More informationInformation Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
More informationSoftware design (Cont.)
Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java
More informationBridging the gap between peer-to-peer and conventional SIP networks
1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 hezekiah@rucus.ru.ac.za
More informationBit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
More informationApplication Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationExtensible Network Configuration and Communication Framework
Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis
More informationAdvertising Peer-to-Peer Networks over the Internet
Advertising Peer-to-Peer Networks over the Internet Matthieu Weber 1, Jarkko Vuori 2, and Mikko Vapa 3 1 University of Jyväskylä (mweber@mit.jyu.fi) 2 University of Jyväskylä (Jarkko.Vuori@jyu.fi) 3 University
More informationA P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt
A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach
More informationThis presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component.
This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component. Functional Overview of Gateway Topology, Gateway Configuration, and Gateway XML Structure Page
More informationArchitectures and protocols in Peer-to-Peer networks
Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P
More informationMobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This
More informationComputer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
More informationA Peer-to-peer Extension of Network-Enabled Server Systems
A Peer-to-peer Extension of Network-Enabled Server Systems Eddy Caron 1, Frédéric Desprez 1, Cédric Tedeschi 1 Franck Petit 2 1 - GRAAL Project / LIP laboratory 2 - LaRIA laboratory E-Science 2005 - December
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use TMG network templates Abstract In this article I will show
More informationapt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates
apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates authors: Cameron Dale, Jiangchuan Liu presented by: Cameron Dale Simon Fraser University Burnaby, BC, Canada camerond@cs.sfu.ca
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationDistriWiki: A Distributed Peer-to-Peer Wiki Network
DistriWiki: A Distributed Peer-to-Peer Wiki Network Joseph Morris Computer Science Department Ball State University Muncie, IN 47306, USA Chris Lüer Computer Science Department Ball State University Muncie,
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationContents. About the Author. List of Contributors
Contents Preface About the Author List of Contributors xiii xv xvii 1 Introduction 1 1.1 Mobile Middleware 1 1.2 Mobile Applications and Services 2 1.3 Middleware Services 3 1.4 Transparencies 5 1.5 Mobile
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationHow To Make A Network Overlay More Efficient
Corporate Technology Service Layer Components for Resource Management in Distributed Applications Fabian Stäber Siemens Corporate Technology, Information and Communications Copyright Siemens AG 2007. Alle
More informationA distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
More informationBorderWare Firewall Server 7.1. Release Notes
BorderWare Firewall Server 7.1 Release Notes BorderWare Technologies is pleased to announce the release of version 7.1 of the BorderWare Firewall Server. This release includes following new features and
More informationPlanning and Maintaining a Microsoft Windows Server Network Infrastructure
Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security
More informationJini and JXTA Based Lightweight Grids
CHAPTER 13 Jini and JXTA Based Lightweight Grids Kurt Vanmechelen,Jan Broeckhove, Gunther Stuer,Tom Dhaene Department of Mathematics and Computer Sciences, University of Antwerp, BE-2020 Antwerp, Belgium
More informationWindows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
More informationALTO and Content Delivery Networks dra7- penno- alto- cdn
ALTO and Content Delivery Networks dra7- penno- alto- cdn Stefano Previdi, sprevidi@cisco.com Richard Alimi, ralimi@google.com Jan Medved, jmedved@juniper.net Reinaldo Penno, rpenno@juniper.net Richard
More informationPeer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004
-to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is
More informationAutomatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
More informationInformation Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
More informationEssential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
More informationChapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
More informationSoftware Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
More informationIntroduction into Web Services (WS)
(WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?
More informationSANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
More informationThe Advantages of a decentralized Telephone Network
Voice Over Peer-to-Peer Telephony Service Darren Yeung Honor s Thesis 2005 Boston College Computer Science Department Professor Robert Signorile May 13, 2005 Abstract. The purpose of this project is to
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationThe p2pweb model: a glue for the Web
The p2pweb model: a glue for the Web Pedro García López, Marc Sánchez Artigas, Jordi Pujol Ahulló Universitat Rovira i Virgili Tarragona, Spain { pedro.garcia, marc.sanchez, jordi.pujol}@urv.cat Abstract
More informationDistributed Systems. REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1
Distributed Systems REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1 1 The Rise of Distributed Systems! Computer hardware prices are falling and power increasing.!
More informationHow Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations
How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations Jan van Doorn Distinguished Engineer VSS CDN Engineering 1 What is a CDN? 2 Content Router get customer
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationDEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager
DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database
More informationSecurity in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
More informationProject SailFin: Building and Hosting Your Own Communication Server.
FSFS Conference: Dec 9-11, Thiruvananthapuram Project SailFin: Building and Hosting Your Own Communication Server. Binod PG Senior Staff Engineer Sun Microsystems, Inc. 1 Agenda SailFin: Open Source Java
More informationIFIP TC6 Advanced Tutorials in Networking. Software Defined Networking! University of Kelaniya Kelaniya, Sri Lanka 23-25 June 2015
IFIP TC6 Advanced Tutorials in Networking Software Defined Networking! University of Kelaniya Kelaniya, Sri Lanka 23-25 June 2015 Marilia Curado University of Coimbra, Portugal (Slides adapted with permission
More information19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P
19531 - Telematics 14th Tutorial - Proxies, Firewalls, P2P Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 10. February, 2011 Institute of Computer Science Telematics
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationNetwork: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationSession Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
More informationDecentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
More informationSkype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
More informationEmergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 )
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 ) Contribution Title: Implementing ESMI with SIP and ESTP Contribution Number: Submission
More informationLAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
More informationbbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS
TECHNICAL ARTICLE Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO Adobe LiveCycle Enterprise Suite CONTENTS Introduction................................. 1 Edge server architecture......................
More informationMCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
More informationWSPeer - An Interface to Web Service Hosting and Invocation
WSPeer - An Interface to Web Service Hosting and Invocation Andrew Harrison School of Computer Science, Cardiff University Email: a.b.harrison@cs.cf.ac.uk Dr Ian J. Taylor School of Computer Science, Cardiff
More informationSocket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
More informationAnalisi di un servizio SRM: StoRM
27 November 2007 General Parallel File System (GPFS) The StoRM service Deployment configuration Authorization and ACLs Conclusions. Definition of terms Definition of terms 1/2 Distributed File System The
More informationAlfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationDisaster Recovery White Paper
Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase
More informationOutline. 15-744: Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture
Outline 15-744: Computer Networking L-15 Future Internet Architecture 2 Motivation and discussion Some proposals: CCN Nebula Mobility First XIA XIA overview AIP Scion 2 NSF Future Internet Architecture
More informationMicrosoft Office Communications Server 2007 R2
Microsoft Office Communications Server 2007 R2 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: Sept. 2009 For the most up-to-date version of the Scale to a Load Balanced
More informationThis presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.
This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. WASv61_SIP_overview.ppt Page 1 of 27 This presentation will provide an overview of
More informationDistrict of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationXML for Java Developers G22.3033-002
XML for Java Developers G22.3033-002 Session 4 Sub-Topic 3 Towards P2P Computing Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Part
More informationComputer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationSentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
More informationDesigning a Windows Server 2008 Network Infrastructure
Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure
More informationIndustrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
More informationPrinciples of Network Applications. Dr. Philip Cannata
Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationModule 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.
SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server
More informationProject 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationEnterprise Edge Communications Manager. Data Capabilities
Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications
More informationHow To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D
Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: zklebic@openinformatics.net Configuring a Vyatta 4.0 release
More information