Font Size: a A A

The Research And Application Of P2P Technology Based On JXTA

Posted on:2004-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:X N DengFull Text:PDF
GTID:2168360092492105Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the technology progress in the Computer and Network, the competence of computing and storage on a single point has been enhanced greatly, and the bandwidth is never a bottleneck of communication. But now, the network application model is becoming more and more clung to the "Super" points, which have super competence. Resultantly, people spend mostly their time in the "Explorer" and the "Email" environment. The contradiction between resource waste on the "edge" of network and the central application model will be more and more speculating.Peer to Peer (P2P) network technology hold the main idea that take the application to diffuse from centrality to edge of network. The main purposes are: make use of the "idleness" resource in edge network; lighten the load in backbone network; cooperate with today application model of network. No matter what the implementation type, P2P can upgrade the action level of network and make people initiatively take part in using network. P2P will be a new technology in search^ distribute-computing and cooperate-computing.JXTA(the abbreviation of Juxtapose) is an open P2P project of Sun beginning at Apr. 2001. The target is providing whole general base protocols of P2P, which try to aggregate all kinds of P2P using model and standardize the P2P Services. It's just a suite of protocol without any relationship with OS and language. Today there're more than 70 open projects and the edition is 2.0 .This thesis primarily discusses what I have done in the research and practice in JXTA. Beginning with security area, I designed and implemented a lightweight transportation system(P2PLT) based on JXTA. Firstly, the thesis introduces the P2P research complexion and my project background. Secondly, it describes JXTA protocol architecture and characteristic. Thirdly, it describes today cryptography and analyzes many algorithms and protocols to find some suite to adapt it. Fourthly, it shows particularly the design and implementation of P2PLT and some improvement by introducing the Poblano trust model into the system. Finally, it summarizes the research result and views the prospect of P2P and JXTA and gives the direction of the future work.
Keywords/Search Tags:P2P, JXTA, Advertisement, Pipe, TLS, Poblano, P2PLT
PDF Full Text Request
Related items