JXTA (Juxtapose)
Presented By: Anıl Gürsel
Mehmet Çatalgöl
Client-Server Architecture Clients
Server
Ex: Mail Server, Web Server, FTP Server
Centralized Architecture
Peer-to-Peer Architecture No specialized peers
Clients may be also servers
Decentralized Architecture
Advantages of P2P Model Unlike C/S, the performance increases when
the number of clients increases.
The system stops working only if there are no peers online at the system
Disadvantages of P2P Model
Difficult to control and manage the networking
Since the clients enter a network at will, there is an issue of performance problem
Not applicable to all kinds of devices. ( no ubiquity)
JXTA Structure Special form of P2P architecture. Produces a virtual network on top of the
physical network while processing. The number of these virtual networks may
vary in the system.
JXTA Structure (2) The structure is free from the programming
language. Free from the OS. Free from the method of service. Free from the network protocol. Free from device type.
Main Objectives Interoperability
Platfrom Independence
Ubiquity
Peers Edge Peers Rendezvous Peers Relay Peers
Peer Groups Virtualizes the topology of JXTA Network
The NetPeer Group User Groups
Pipes Virtualizes peer connections Abstraction of channels Protocol independent transfers
Advertisements JXTA resources are represented as
advertisements To exchange data, peers:
store publish exchange advertisements
Discovery Static Discovery
Rendezvous Peers
Dynamic Discovery Relay Peers
JXTA Protocols Absence of protocols in traditional P2P model
was a problem.
JXTA posseses them in order to standardize P2P model.
JXTA Protocols (2) JXTA protocols are classified into two
subclasses. Core Specification Protocols Standard Service Protocol
JXTA Protocols (3)
Core Specification Protocols Define the functional requirements of JXTA
Endpoint Routing Protocal (ERP) Peer Resolver Protocol (PRP)
Standard Service Protocols Optional but strongly recommended for an
effective interoperability. Rendezvous Protocol Peer Discovery Protocol Peer Information Protocol Pipe Binding Protocol
Security Libraries about encrytion
TLS along pipes
Peer Groups
Developers can plug new security choices
Why Java? Ease of development
Portability
Rich set of class libraries
References http://www.jxta.org http://www.javaworld.com http://en.wikipedia.org http://www.onjava.com Project JXTA Overview, Steve Krasinsky Project JXTA 2.0 Super-Peer Virtual Network,Bernard
Traversat, Ahkil Arora,Mohamed Abdelaziz, Mike Duigou, Carl Haywood, Jean-Christophe Hugly, Eric Pouyoul, Bill Yeager
Project JXTA: A Technology Overview, Li Gong JXTATM Technology: Creating Connected Communities