Font Size: a A A

Construction Of Peer-to-Peer Application Based On JXTA In Intranet

Posted on:2008-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z LiFull Text:PDF
GTID:2178360215496494Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
The computing model of computer system has been directed fromcentralized model to distributed model. The original computing model ispeer-to-peer (P2P) which means all nodes are equal. Then with thedevelopment of web, more and more resources are centered on server, sothat the current mainstream model -client/server-appears. Since manykinds of web applications and physical nodes are developed, peer-to-peermodel once again attracts peoples' attention as its unique features.Among all methods to build P2P applications, JXTA is a very good choice.JXTA is a set of open, generalized peer-to-peer protocols that allow anyconnected device on the network-from cell phone to PDA, from PC to server-to communicate and collaborate as peers. JXTA is independent of anyprogramming language, and multiple implementations exist for differentenvironments.Intranet P2P System is a peer-to-peer based interactive system forintranet. It provides services, including instant Message, File Share,Event Notification, and Bulletin Board. Unlike other services availableon the market, this system has high reliability. And security as two ofits most important features. To satisfy the requirement of highavailability, we chose the hybrid peer-to-peer as networking model.The whole document consists of P2P technology. Chapter one introducesthe appearance and development of P2P technology. Chapter two introducesJXTA, including its structure, key concepts and protocols. Chapter threediscusses P2P network, and does abstract analysis on fire wall, NAT,etc. Chapter, components and is distributed seem features. Chapter fivedescribes the mechanisms to implement the P2P communication, chapter sixdiscusses he implementation of distributed system features, includingconstructing secure peer group environment, peer account management andencryption mechanism. Chapter seven summarizes the whole document andprospects the further development.
Keywords/Search Tags:Peer-to-Peer network, JXTA, peer group, security, reliability
PDF Full Text Request
Related items