Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
|
|
- Christiana Burke
- 8 years ago
- Views:
Transcription
1 Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška 25, Ljubljana Slovenia ldos.fe.uni-lj.si, provide effective, secure, personalized way to search the multimedia content. Abstract In this paper we are going to present the architecture of peer-to-peer collaborative framework. The peer-to-peer technologies used in this research are based on java implementation of JXTA protocol. The communication services that are implemented on presented peer-to-peer network do not depend on centralized servers and are therefore immune to server infrastructure faults. Moreover an advantage of the presented approach is the ability to seamlessly establish communication through firewalls and proxy servers (e.g. NAT server). Index Terms peer-to-peer network, protocol JXTA, decentralized communication T HE I. INTRODUCTION growth of information available in internet network has reached the point, where no one can comprehend or manage all the information available, even with sophisticated search engines it is possible to get irrelevant information as a result of search. Services like DNS have created centralized dependencies and constrained the Internet s growth. Firewalls and NAT servers are creating partitioned domains that restrict the flow of information with the network, and are creating complex network topologies. A more decentralized and self-adapting computing has been proposed for addressing many of mentioned limitations and have taken advantage of the increasing bandwidth, processing, and storage available on devices connected at the edge of the Internet. These decentralized systems present environment where members propagate and share information in a decentralized, self-organized and open manner. The communication in such networks consists of direct peer-to-peer interactions without mediating servers. In this paper we propose the architecture of decentralized peer-to-peer network and the implementation of communication services that are running on decentralized way. We implemented communication services such as videoconferencing service, mail service, chat service, whiteboard service, file transfer service, file sharing service and screen sharing service, payment service, and services that II. BASIC IDEA OF PEER TO PEER COMMUNICATION Peer to peer networks are bringing in the relatively new concept of the network organization. Each peer is an equivalent partner in the network. The new concept does not rely on client - server network topology any more. Client server topology is common for the majority of the applications we are used to use today (see Figure 1). The new concept is based on an assumption, that all communication nodes within the network are equivalent. Each node can act, based on the requirements either as server or as client (see Figure 2). In peer to peer network there is no central node, therefore networks using this topology are much more resistant to failures of network, sub elements such as network nodes and especially server nodes, because there are none of them present in the system. Figure 1- Old, centralized, server client topology One of major advantages of peer-to-peer networks over centralized network is, besides of network stability, load distribution. The main load in the centralized network topology is loading the centralized node. This means, that in system with a lot of users this node must be designed in such a way that it is capable of handling such enormous load. In centralized system, traffic is often multiplied over same connection, since many clients are being served by the same content. This network loading is, by common sense unnecessary. In peer-to-peer networks the content and services are distributed among the whole network and when two peers from the same network subsection require the same content, it must be transferred only once. An example is transmission of video content file. Let us
2 predict, that someone downloads the content to his hard drive. The person, who downloaded that content, shares it, and makes it available for the other users. When other user, that is close to the current holder of the content requires that content, the content is the downloaded from the peer that is close to him. So the network load is more distributed along the whole network. computing platform that provides solutions in modern distributed computing, especially in the area of peer-to-peer computing, or peer-to-peer networking. Peer to peer technologies can adopt a network-based computing style that neither excludes nor depend on centralized control points. This approach that JXTA protocol supports, can enhance overall reliability and fault-tolerance of system and improves the performance of information discovery, content delivery and information processing. The main objective of JXTA protocol is to provide peerto-peer system that is platform independent and provides true interoperability. A. Architecture of JXTA protocol Figure 2 - Peer to peer network topology Since there is much cheaper to equip every node with weaker equipment and network connections, than to build one super node with super server that can handle all the requests, we can either save money with new network topology offering the same as much more expensive system, or we can, for the same price build a system, that is better. Of course there are services that still requires centralized network topology. But distributed network is suitable for solving many problems much more elegantly. Trade-off for peer-to-peer system to function as wanted is sharing resources of each peer. These resources are disk storage, processing power and network bandwidth. For exchange of resource sharing when not needed, peers can access and allocate other peers resources when needed. It is known fact, that majority of resources in our systems are being unused for the most of the time. They are present only for cowering peak loads. These resources can be shared for other users when not needed. But when some peer has a peak load, than it is possible to obtain help from other peers and their resources and solve problem more efficient and faster. There are many issues still existing in peer-to-peer networks. The main issue is generation of traffic and resources loading only by tasks that are necessary for the system to work. Since peers cannot know where other peers are or what services and content they poses, it is therefore necessary to constantly generate queries over whole network. Searching in peer-topeer organized networks also generates more traffic and is much more difficult to implement than searching in centralized organized networks. There are services, that still require centralized network topology, but many problems can be solved much more efficiently by using peer-to-peer network topology. III. JXTA PROTOCOL JXTA technology presents network programming and JXTA technology has been open sourced and as such, is still evolving. A typical peer-to-peer application breaks roughly into three layers (as shown on Figure 3). At bottom, core layer deals with peer establishment, communication management such as routing, and other low level operations. In the middle, a service layer handles higher-level concepts, such as indexing, searching and file sharing. These services, which make heavy use of all features provided by the core, are commonly included as components in overall peer-topeer system. At the top is the layer of applications (our P2PEOPLE platform). JXTA Applications JXTA Services JXTA core JXTA Applications JXTA Services Peer Groups Peer Pipes Security Any Peer Indexing Searching File Sharing Figure 3 peer-to-peer JXTA architecture Sun JXTA applications Peer Monitoring JXTA technology is designed to provide a layer on top of which services and applications are built. B. JXTA Technology Concepts JXTA technology provides a set of protocols that enables peer-to-peer communication. Each protocol is defined by one or more messages that are exchanged among participants in the protocol. JXTA technology concept is similar to TCP/IP protocol, which links Internet nodes together, while JXTA technology connects peer nodes with each other. JXTA defines the following six protocols: - Peer Discovery Protocol: enables a peer to find advertisement on other peer, - Peer Resolver Protocol: enables a peer to send and receive generic queries to search for peers, peer
3 groups and pipes, - Peer Information Protocol: allows a peer to learn about the capabilities and status of other peers, - Peer Membership Protocol: allows a peer to obtain group membership requirements, to apply for membership and receive membership credential along with a full group advertisement, - Pipe Binding Protocol: allows a peer to bind a pipe advertisement to a pipe endpoint, - Endpoint Routing Protocol: allows a peer to ask a peer router for available routers for sending a message to a destination peer, The JXTA technology defines number of elements that are used by mentioned protocols. These elements are: - Identifiers: 128-bit datum to refer an entity (a peer, an advertisement, a service, etc), - Advertisements: XML structured document that names, describes, and publishes the existence of a resource such as a peer, a peer group, a pipe or a service, - Peers: is any entity that can understand the protocols required of a peer, - Messages: - Peer groups: collection of cooperating peers providing a common set of services - Pipes are communication channels for sending and receiving messages and they are asynchronous. IV. PEER TO PEER TEST ENVIORMENT AND ARCHITECTURE OF THE SYSTEM A. Introduction In P2PEOPLE project we research and develop a peer to peer collaborative services with prototype application to allow people to form common interest groups that provide those group members with new ways to communicate, collaborate and make business together. Our work focuses on people, so we provided the mechanisms that connect the users that share a common interest and are easily found together. To fulfill this objective we had to solve the following problems: - The system provides a way to allow a user to publish information about his profile as a description of his interests and the way to communicate with others users, - The information of the user profile has to be kept in the local user computer rather than in central server to ensure higher degree of privacy, - The system has to offer the user enough security and provide him with tools to filter and stop non desired messages, - The system does not require the user s initiative to search compatible peers, instead the system search and negotiate peer relationship based on the rules defined in the user profile. B. Description of peer to peer collaborative framework Figure 4 - P2People test platform videoconferencing service P2People framework aims at providing a set of essential integrated services that provides to peer-to-peer users the ways to collaborate in a new business / cooperation processes. These services are: - A presence service, that provide information on which of the existing users in the P2P network are currently online - A messaging (mail) service, that allow for synchronous/asynchronous text and multimedia message exchange between users of the P2People platform - A chat service, that will allow users to join virtual chat rooms in which they can participate in a conference-like textual message exchange - A File Sharing service, that will provide file transfer functionality in the peer-to-peer network - A screen sharing service, that will allow users to make visible part of their display to remote users in the peer-to-peer network - A voice communication service which will telephone functionality in the peer-to-peer environment - A video communication service that will allow realtime video transmission and videoconferencing functionality in the peer-to-peer environment. - A Payment service, that will allow users to perform secure micro payments in order to pay for services that other users might be offering in the peer-to-peer network To implement the services that provide effective, secure,
4 personalized way to search the multimedia content we have to implement the following components: - Profile Manager. To allow user to define its personal profile, including interest description, rules or actions to execute, collaborative channels to use and business objectives. It also includes profile storage (in XML) and management components, semantic engines and other components related to profiles analysis. - Security layer. The basic layer to ensure security in all communication between peers. Security mechanisms from JXTA are used. - Search Agent. This autonomous agent works on the Search Engine layer. Instead of trying to match a profile with another at a central server, the search agents communicates with other P2PEOPLE peer Agents (Server Agents) available on the network and communicate with them in order to find a match between users interests. Once a match is found, a group or cluster is formed or grown (at both peers). One P2PEOPLE user is a potential member of many clusters, depending on the user interests. - Server Agent. It works on the Search Engine layer. It is the counterpart of the search agent in the communication. Server agents are always listening for requests from search agents. They also act as routers to other server agents to which they have reference, routing queries to these agents. - Rules & Negotiation Agent. This autonomous agent is called from the Server Agent and the Search Agent. Once both agents contact each other and find a common interest, they both authorize their own peer Rules Agent to start negotiation. Until now the communication is anonymous. The user can define for each interest a set of actions to perform. The Rules Agent executes those actions. Only depending on the actions type, the agent will give user information to the other peer agent. These actions can be from introducing each other user, with an , negotiate a communication channel like open a voice or video session, or negotiate a buy of a product or service, or automatically open a file share session to reach a desired song or game. - Message Filter. The user receives messages from two sources; other peers or their own P2PEOPLE application. Filters allow the user to receive or not messages from others on the basis of someone's particular identity. Filters are also used to decide the messages from its own P2PEOPLE application that the user wants to attend. - Reputation Filter. All peer communications include reputation messages. You can make statements about yourself, and others can sign those statements if they have reason to believe them. Third parties can use these statements to evaluate your reputation and you can do the same when looking at other people's reputations. The reputation filter allows the user stop messages from not good reputation peers and keep them off common interest clusters. - Graphic User Interface. P2PEOPLE have three graphic user applications. The main one is User Communication Manager Application. The user uses this application for all interactions with P2PEOPLE users. It has menus and lists of events and messages, options to start collaborative channels etc. This application is also the main window for the user interface of the collaborative channels. The collaborative service will be plugged in the User Communication Manager graphic application. This will be not only for the already existing channels but also for future ones. The main application also includes interface for e-business layer. The second application is the Profile Manager Application. It allows the user to define profiles, actions and rules in a simple way. It also provides advanced options for advanced users. The third application is the Filter Builder Application. With this application the user will set up filters for his/her own P2PEOPLE peer and for other peer messages. V. IMPLEMENTATION OF THE COLLABORATIVE SERVICES A. File transfer service Service transfers file given by filename and path from one peer to the given one. When the platform is started service creates input pipe and starts listening to the incoming events on that pipe. Service also publishes that pipe. When source peer wants to send a file to another peer, it searches for the incoming pipe advertisement of the target peer. When it discovers it, it creates output pipe based on this advertisement. Source peer than sends transfer initiation message to the target peer and starts transfer file thread. Transfer initiation message consists of the advertisement for bi-directional pipe, created and connected at the process of transfer initiation. It also contains filename of the file to be transferred. When target peer receives transfer initiation message it asks user if he want to accept the file. If the answer is positive and after user chooses the target folder it starts the thread, which creates and connects bi-directional pipe based on received advertisement. Threads on both sides than transfer the file via bi-directional pipe. Sender sends chunks of file equipped with serial numbers and CRC 32 control block. Receiver receives these chunks checks their integrity writes them to a file and acknowledges correct reception. If wrong chunk arrives receiver requests last known required block. GUI of the service can be seen on Figure 5.
5 VI. CONCLUSION In this paper we showed the benefits of peer to peer networking. We examined and tested communication applications that are working on decentralized peer-to-peer network (JXTA). Our peer-to-peer testing platform with all mentioned services represents very good environment for testing the behavior of data flows and management of true peer-to-peer systems. Our future work will mainly focus on testing this application in real environment. Figure 5 GUI of the file transfer service B. Screen sharing service This service enables user to share its screen by other user of the system. Both users can work with the desktop simultaneously. It enables user to remote control another computer. Communication initiation procedure is weary similar to the procedure described in the file transfer service. The service captures the screen of the remotely controlled computer, compresses the image as jpeg and sends it to the other peer. That peer than decompresses the image and shows it inside a window. It than captures all mouse and keyboard events within this window, timestamps them and sends them to the other peer. Thanks to the timestamps, other peer regenerates received events in same peace and order as they were captured. Than the screen capture is generated again and sent. Only peer that will be controlled can initiate remote control session. Other peer can than accept given control or rejects it. ACKNOWLEDGMENT The authors would like to thank to all members of the P2People Consortium for their cooperation. This includes the teams at Universidad Católica San Antonio de Murcia, Centre for Research and Technology Hellas and Quality Objects S.L. REFERENCES [1] B. Traversat, M. Abdelaziz: "Project JXTA Virtual Network", Sun Microsystems, Inc, [2] Li Gong: "JXTA: "A Network Programming Environment", IEEE Internet Computing, 2001 [3] Steve Waterhouse: "JXTA Search: Distributed Search for Distributed Networks, Sun Microsystems, Inc., 2001 [4] The JXTA project web page, [5] Brendon Wilson: JXTA, [6] P2people project homapage, [7] Open source of p2people project: C. Video service Video service enables communication between two users (two peers). In the video service the peer-to-peer network is used to find the user that we want to establish videoconference with. In the GUI all users that are active in the corresponding peer group are visible and the user can require the video communication with them. When we choose the user with whom we want to communicate, the system provides to both sides of the communication the information of IP address and port number, which is needed to start video/audio transmission and video/audio reception. All control messages (e.g. starting and stopping the video service) that are necessary in video/audio communication are transferred through JXTA based pipes. We implemented also interface that allows setting up the parameters of video and audio coding. Video and audio transmission and coding are implemented by java media framework.
JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks
JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and
More informationExploiting peer group concept for adaptive and highly available services
Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,
More informationJXTA Overview. Mathieu Jan IRISA Rennes Projet Paris
JXTA Overview Mathieu Jan IRISA Rennes Projet Paris Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2 Why peer-to-peer (P2P)?
More informationClassic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
More informationGlossary of Terms and Acronyms for Videoconferencing
Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical
More informationAdvanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
More informationA Web Services Framework for Collaboration and Audio/Videoconferencing
A Web Services Framework for Collaboration and Audio/Videoconferencing Geoffrey Fox, Wenjun Wu, Ahmet Uyar, Hasan Bulut Community Grid Computing Laboratory, Indiana University gcf@indiana.edu, wewu@indiana.edu,
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationApplication Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
More informationInteracting the Edutella/JXTA Peer-to-Peer Network with Web Services
Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationWindows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
More informationAutomatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationOutline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]
Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within
More informationCommon P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype
Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration
More informationWhat communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationPeer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition
Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay
More informationSIP, Security and Session Border Controllers
SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers Executive Summary Rolling out a public SIP service brings with it several security issues. Both users and Service
More informationPDF hosted at the Radboud Repository of the Radboud University Nijmegen
PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is a publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/60933
More informationSIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
More informationSAM XFile. Trial Installation Guide Linux. Snell OD is in the process of being rebranded SAM XFile
SAM XFile Trial Installation Guide Linux Snell OD is in the process of being rebranded SAM XFile Version History Table 1: Version Table Date Version Released by Reason for Change 10/07/2014 1.0 Andy Gingell
More informationTalkShow Advanced Network Tips
TalkShow Advanced Network Tips NewTek Workflow Team TalkShow is a powerful tool to expand a live production. While connecting in a TalkShow unit is as simple as plugging in a network cord and an SDI cable,
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationMINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
More informationCisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
More informationMANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
More informationSharing @ The Edge: Secure Information Sharing
Sharing @ The Edge: Secure Information Sharing Tony White 1, Dwight Deugo 1, Steve Gutz 2 1 School of Computer Science, Carleton University 2 Texar Corporation {arpwhite@scs.carleton.ca, deugo@scs.carleton.ca,
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationMobile Devices: Server and Management Lesson 05 Service Discovery
Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)
More informationNeed for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
More informationSecurity. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
More informationDecentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
More informationInstalling Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
More informationDeploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks
Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Document Overview This document provides an overview of how to effectively and securely provide IP-based videoconferencing
More informationWeb Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
More informationPQoS Parameterized Quality of Service. White Paper
P Parameterized Quality of Service White Paper Abstract The essential promise of MoCA no new wires, no service calls and no interference with other networks or consumer electronic devices remains intact
More informationEvolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
More informationNETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
More informationAN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,
More informationNapster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
More informationDistriWiki: A Distributed Peer-to-Peer Wiki Network
DistriWiki: A Distributed Peer-to-Peer Wiki Network Joseph Morris Computer Science Department Ball State University Muncie, IN 47306, USA Chris Lüer Computer Science Department Ball State University Muncie,
More informationBorderWare Firewall Server 7.1. Release Notes
BorderWare Firewall Server 7.1 Release Notes BorderWare Technologies is pleased to announce the release of version 7.1 of the BorderWare Firewall Server. This release includes following new features and
More informationBridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
More informationThe changing face of global data network traffic
The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This
More informationBest Practices for Controlling Skype within the Enterprise. Whitepaper
Best Practices for Controlling Skype within the Enterprise Whitepaper INTRODUCTION Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by
More informationDissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationVIDEO CONFERENCE. Alessandro Benni & VIDEO COMMUNICATIONS. Bologna, 2007. Videorent srl - Video & Multimedia Branch
VIDEO CONFERENCE & VIDEO COMMUNICATIONS Alessandro Benni Videorent srl - Video & Multimedia Branch Bologna, 2007 Today s lesson will cover What is Video Conference? Why Video Conference? History of Video
More informationCampus Network Best Practices: Core and Edge Networks
Campus Network Best Practices: Core and Edge Networks Dale Smith Network Startup Resource Center dsmith@nsrc.org This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).
More informationAdvertising Peer-to-Peer Networks over the Internet
Advertising Peer-to-Peer Networks over the Internet Matthieu Weber 1, Jarkko Vuori 2, and Mikko Vapa 3 1 University of Jyväskylä (mweber@mit.jyu.fi) 2 University of Jyväskylä (Jarkko.Vuori@jyu.fi) 3 University
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationImplementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
More informationModule 6. Designing and Deploying External Access. MVA Jump Start
Module 6 Designing and Deploying External Access MVA Jump Start Module Overview Conferencing and External Capabilities of Lync Server 2013 Planning for IM and Presence Federation Designing Edge Services
More informationGiving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
More informationApplication Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationBroadCloud PBX Customer Minimum Requirements
BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service
More informationTELESKILL VIDEO CONFERENCE LIVE
TELESKILL VIDEO CONFERENCE LIVE Professional Interactive On-line Video communication pres-tvcol-v3.0 Teleskill Video Conference Live Synchronous interactive audiovisual communication amongst several remote
More informationGlobal Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
More informationResearch on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
More informationApplication Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
More informationWindows Server 2008 Essentials. Installation, Deployment and Management
Windows Server 2008 Essentials Installation, Deployment and Management Windows Server 2008 Essentials First Edition. This ebook is provided for personal use only. Unauthorized use, reproduction and/or
More informationEmergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 )
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 ) Contribution Title: Implementing ESMI with SIP and ESTP Contribution Number: Submission
More informationComputer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
More informationNiagara IT Manager s Guide
3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common
More informationDesign of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
More informationService Name Startup Type Log On As. ActiveX Installer (AxInstSV) Manual Local System. Adaptive Brightness Manual Local Service
Did you tweak the Services configuration incorrectly, resulting in a system slowdown or leading to other catastrophe? And you don t remember the original configuration to revert back? You may find the
More informationTo ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
More informationCable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
More informationNetwork Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...3 Connecting the projector with your computer...3 Wired connection... 3 Wireless connection (for selective models)... 4 QPresenter...7
More informationFatPipe Networks Network optimisation and link redundancy for satellite communications
FatPipe Networks Network optimisation and link redundancy for satellite communications Next generation WAN acceleration Version 01 rev 05 Gregory Fedyk Regional Director UK/IRE, France and Benelux Isik
More informationFirst Midterm for ECE374 02/25/15 Solution!!
1 First Midterm for ECE374 02/25/15 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationNAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
More informationMANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:
More information2 6th December 2012 Copyright Eddie Obeng 2010 Pentacle 2011 All rights reserved
Table of Contents 1 Introduction 2 System Requirements 3 Technical service / support 4 Administration 5 Data storage / location 6 Security 7 Ports/ firewalls/ network impact 8 Performance 9 Standards/interoperability
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationCompellent Source Book
Source Book Remote Instant Replay Thin Replication Compellent Corporate Office Compellent Technologies 12982 Valley View Road Eden Prairie, Minnesota 55344 www.compellent.com Contents Contents...2 Document
More informationIntroducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More information2.1.2.2.2 Variable length subnetting
2.1.2.2.2 Variable length subnetting Variable length subnetting or variable length subnet masks (VLSM) allocated subnets within the same network can use different subnet masks. Advantage: conserves the
More informationAnalyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
More informationSession Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
More informationState of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
More informationN6Lookup( title ) Client
CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding
More informationCom.X IP PBX The complete communications solution in a box
IP PBX Utilising VPN security when extending PBX services to remote users Virtual Private Network It is not uncommon for a single company to occupy more than one set of premises. Individual users on geographically
More informationConnect your Control Desk to the SIP world
Connect your Control Desk to the SIP world Systems in
More informationThe Advantages of a decentralized Telephone Network
Voice Over Peer-to-Peer Telephony Service Darren Yeung Honor s Thesis 2005 Boston College Computer Science Department Professor Robert Signorile May 13, 2005 Abstract. The purpose of this project is to
More informationSoftware evaluation criteria and terminology REPORT # : R07/0203 AUTHOR(S) : Diane Belyk & David Feist DATE : March 2002
Athabasca University CENTRE FOR DISTANCE EDUCATION Online Software Evaluation Report TITLE : Software evaluation criteria and terminology REPORT # : R07/0203 AUTHOR(S) : Diane Belyk & David Feist DATE
More informationInternet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationTRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
More information