SlideShare a Scribd company logo
Peer to Peer Messaging System

(Synopsis)

1
ABSTRACT
The project titled

peer-to-peer Messaging presents the development

of an instant messaging application based on the concept of peer-topeer

networking

using

JXTA

platform.

P2P

(or

peer-to-peer)

networking is a network model where, depending on an operation's
context, any node can operate as either a server or a client. The P2P
architecture is a decentralized architecture, where neither client nor
server status exists in a network. Every entity in the network, referred
to as a peer, has equal status, meaning that an entity can either
request a service or provide a service. The main goal of this project is
to send instant messages to peers in the JXTA network using JXTA
relay.
JXTA defines a set of protocols to enable a framework for peerto-peer computing. All JXTA network users are peers to each other .
Peers communicate with each other to perform different tasks (such
as searching for new peers). Peer identifiers uniquely identify the peer
on the JXTA network The JXTA relay can accept client commands and
act upon the commands on the client's behalf. The relay acts as a
junction between the JXTA networks and peers.
JXTA has defined the data communication protocols that enable
messaging between a relay and a client. The JXTA relay receives
commands from a J2ME client, performs what's necessary on the
client's behalf, and represents a JXME client on the JXTA network. The
JXME client send messages to the relay. The relay discovers the peer
and route the messages to the destination.

2
INTRODUCTION
The traditional approach to information systems,
accessed by users by means of powerful devices (such as desktops
and laptops) with known features, will not be anymore significant in
the future years. Indeed, the current trend suggests that it will be
possible to offer continuous access to all information sources, from all
locations and through various kinds of devices, mainly small and
mobile (e.g., palmtops and PDAs, cellular phones). Therefore, the need
emerges for the design of applications for smart devices, which are
highly flexible, capable of exploiting in an optimal way the resources.
This Project analyzes the opportunity to design, develop and deploy
interactive applications running on smart cellular phones (commonly
referred to as smart phones), based on a peer-to-peer communication
model and GPRS technology.
PEER-TO-PEER (P2P) TECHNOLOGY enables any
network-aware device to provide services to another network-aware
device. A device in a P2P network can provide access to any type of
resource that it has at its disposal, whether documents, storage
capacity, computing power, or even its own human operator.
In the client/server architecture, clients request services and
servers provide those services. A variety of servers exist in today's
Internet -- Web servers, mail servers, FTP servers, and so on. The
client/server architecture is an example of a centralized architecture,
where the whole network depends on central points, namely servers,
to provide services. Regardless of the number of browsers or clients,
the network can exist only if a server exists.

3
CLIENT-SERVER MODEL

Like the client/server architecture, P2P is also a
distributed computing model, but there is an important difference. The
P2P architecture is a decentralized architecture where neither client
nor server status exists in a network. Every entity in the network,
referred to as a peer, has equal status, meaning that an entity can
either request a service (a client trait) or provide a service (a server
trait). Figure 2 illustrates a P2P network.

4
PEER-TO-PEER MODEL

Though peers all have equal status in the network, they don't all
necessarily have equal physical capabilities. A P2P network might
consist of peers with varying capabilities, from mobile devices to
mainframes. A mobile peer might not be able to act as a server due to
its intrinsic limitations, even though the network does not restrict it in
any way.
Although P2P might sound like a dot-com fad, the
technology is a natural extension of the Internet’s philosophy of
robustness through decentralization. In the same manner that the
5
Internet provides domain name lookup (DNS), World Wide Web, email,
and other services by spreading responsibility among millions of
servers, P2P has the capacity to power a whole new set of robust
applications by leveraging resources spread across all corners of the
Internet.
P2P networks shun the centralized organization of
the client/server architecture and instead employ a flat, highly
interconnected architecture. By allowing intermittently connected
computers to find each other, P2P enables these machines to act as
both clients and servers that can determine the services available on
the P2P network and engage those services in some application
specific manner. The main advantage of P2P networks is that they
distribute the responsibility of providing services among all peers on
the network; this eliminates service outage due to a single point of
failure and provides a more scalable solution for offering services. In
addition, P2P networks exploit
available bandwidth across the entire network by using a variety of
communication channels and by filling bandwidth to the “edge” of the
Internet. Unlike traditional client/server communications, P2P enables
communication via a variety of network routes, thereby reducing
network congestion.
P2P is the key to realizing this potential, giving
individual machines a mechanism for providing services to each other.
Unlike the client/server architecture, P2P networks don’t rely on a
centralized server to provide access to services, and they usually
operate outside the domain name system.

6
P2P has the capability of serving resources with
high availability at a much lower cost while maximizing the use of
resources from every peer connected to the P2P network. Whereas
client/server solutions rely on the addition of costly bandwidth,
equipment, and co-location facilities to maintain a robust solution, P2P
can offer a similar level of robustness by spreading network and
resource demands across the P2P network.
Unfortunately, P2P suffers from some disadvantages
due to the redundant nature of a P2P network’s structure. The
distributed form of communications channels in P2P networks results
in service requests that are nondeterministic in nature. For example,
clients requesting the exact same resource from the P2P network
might

connect

to

entirely

different

machines

via

different

communication routes, with different results. Requests sent via a P2P
network might not result in an immediate response and, in some
cases, might not result in any response. Resources on a P2P network
can disappear at times as the clients that host those resources
disconnect from the network; this is different from the services
provided by the traditional Internet, which have most resources
continuously available. P2P overcomes this disadvantage by providing
redundant access to a resource.

7
Existing System
In the client/server architecture, clients request services and
servers provide those services. Clients connect to a server using a
specific communications protocol, such as the File Transfer Protocol
(FTP), to obtain access to a specific resource. Most of the processing
involved in delivering a service usually occurs on the server, leaving
the client relatively unburdened.

The client in the client/server

architecture acts in a passive role, capable of demanding services from
servers but incapable of providing services to other clients. This model
of service delivery was developed at a time when most machines on
the Internet had a resolvable static IP address, meaning that all
machines on the Internet could find each other easily using a simple
name.
Limitations of the current system
The disadvantage of using client-server architecture is that
as the number of clients increases, the load and bandwidth demands
on the server also increase, eventually preventing the server from
handling additional clients.
Objective
The main objective of this project is to send instant messages
within a peer group in a decentralized network using JXTA technology.

8
Proposed System
The existing system operated on a client/server
mechanism

in

which

a

centralized

server

is

required.

While

communicating between the peer members in the JXTA network i.e.,
the proposed system, a peer name has to be given by the user in the
configurator window. The user is identified in the network using the
peer id. The peer member can secure his identification using the
password. The user should have an idea regarding the identification of
another person. Thorough knowledge of

identifying the members,

adding the peers in the network, deleting the members from the
network are required.

9
Hardware & Software Requirements
•

Pentium IV Processor – 2 GHZ

•

NIC – 32 Bit Ethernet Card

•

40 GB HDD

•

256 MB DDR RAM

•

Mobile Phone

•

JXTA Proxy Server

•

J2SDK 1.4.2_06

•

J2ME WTK 2.0

•

Windows 2000 Server

10
The project Peer-to-Peer Messaging is divided into three major
modules:
•

Element

•

Message

•

Peer Network

ELEMENT MODULE
The Element represents a single element of the JXME
message. The JXME implementation uses the Element to author JXME
messages. A pure P2P system does not require the existence of any
centralized servers or resources to operate. Therefore, a P2P system
must not rely on any centrally administered naming or addressing
system.
The first module of the project deals with entering the
member into the JXTA network and to enable them to chat with other
members of the group. Batch file called myjxta will be run first. In the
advanced settings tab, TCP option has to be enabled. Incoming and
outgoing connections has to be enabled. Port number of the system
has to be provided in the http settings. The peer who wants to become
the member of the JXTA group will enter with the peer name. Only
authenticated users can enter the network as password is required. In
the relay host, proxy id should be given for communicating with the
other peer. When all the settings are completed, the peer member has
entered the network and is ready to communicate with all members in
the NetPeerGroup.
MESSAGE MODULE
The message module is designed for the peer members to
communicate with each other in the network. JXME does not define

11
any special request message that explicitly asks the relay to send one
or more response messages it has for the JXME client. The JXME client
continues to send requests (for example, a peer group join request, a
pipe creation request, or a search query) or other outbound messages
to the relay. The relay avails these requests as opportunities to send
any incoming message to the JXME client in response to a request. The
JXME client uses the request Id element in the response message to
find out which request this response corresponds to.

JXTA peers use pipes to send messages to one another. Pipes
are an asynchronous and unidirectional message transfer mechanism
used for service communication. Pipes are indiscriminate; they support
the transfer of any object, including binary code, data strings, and
Java technology-based objects. The pipe endpoints are referred to as
the input pipe (the receiving end) and the output pipe (the sending
end). Pipe endpoints are dynamically bound to peer endpoints at
runtime.

Peer

endpoints

correspond

to

available

peer

network

interfaces (e.g., a TCP port and associated IP address) that can be
used to send and receive message. JXTA pipes can
have endpoints that are connected to different peers at different times,
or may not be connected at all.
PEER NETWORK MODULE
The Peer Network contains the methods to allow the JXME
communication

with

the

relay.

The

Peer

Network

is

like

a

communication module that internally uses different Message and
Element objects and handles all communication with the relay. Peer
Network has methods to perform the various tasks between the relay
and the mobile client. The Peer Network manages all the messages

12
and maintains the support tasks, maintaining the identity of various
messages exchanged between the relay and the client.

The third module deals with the implementation of communication
between JXTA peers in the midlet. Proxy id should be given and the
peer enters the group with a peer name. There are various options like
sending the message, reply, connect to the relay, Buddy list,
configuration

and

default

settings.

Using

the

various

options,

messages can be sent, reply can be sent to the received message and
connection can be established with the relay. Using the buddy list
menu, members can chat, new members can be added to the group
and the members can also leave the group.

13

More Related Content

What's hot

web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
FabMinds
 
ICD-10-CM - An Introduction
ICD-10-CM - An IntroductionICD-10-CM - An Introduction
ICD-10-CM - An Introduction
Venita Jones, BS, RHIT
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
sugandhi23
 
ER diagrams for blood bank management system
ER diagrams for blood bank management systemER diagrams for blood bank management system
ER diagrams for blood bank management system
Soham Nanekar
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
Thanachart Numnonda
 
Railways reservation system using socket programming
Railways reservation system using socket programmingRailways reservation system using socket programming
Railways reservation system using socket programming
Utkarsh Sharma
 
Normalization of Data Base
Normalization of Data BaseNormalization of Data Base
Normalization of Data Base
Ravinder Kamboj
 
online blood bank system design
online blood bank system designonline blood bank system design
online blood bank system design
Rohit Jawale
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
RANJIT SINGH
 
Blood Bank Project In Php&Java_Scrpt;s
Blood Bank Project In Php&Java_Scrpt;sBlood Bank Project In Php&Java_Scrpt;s
Blood Bank Project In Php&Java_Scrpt;s
Mahak Dhakad
 
The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...
The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...
The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...
Raj vardhan
 
Ordbms
OrdbmsOrdbms
History of medical coding
History of medical codingHistory of medical coding
History of medical coding
Indira Kandasamy
 
Desarrollando un API con REST
Desarrollando un API con RESTDesarrollando un API con REST
Desarrollando un API con REST
Alex Puig
 
IOT Reference Model.doc
IOT Reference Model.docIOT Reference Model.doc
IOT Reference Model.doc
venui2
 
SRS on blood bank
SRS on blood bankSRS on blood bank
SRS on blood bank
Hatim Baroodwala
 
OOP Unit 1 - Foundation of Object- Oriented Programming
OOP Unit 1 - Foundation of Object- Oriented ProgrammingOOP Unit 1 - Foundation of Object- Oriented Programming
OOP Unit 1 - Foundation of Object- Oriented Programming
dkpawar
 

What's hot (19)

web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
ICD-10-CM - An Introduction
ICD-10-CM - An IntroductionICD-10-CM - An Introduction
ICD-10-CM - An Introduction
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
ER diagrams for blood bank management system
ER diagrams for blood bank management systemER diagrams for blood bank management system
ER diagrams for blood bank management system
 
Introduction to Web Services
Introduction to Web ServicesIntroduction to Web Services
Introduction to Web Services
 
Railways reservation system using socket programming
Railways reservation system using socket programmingRailways reservation system using socket programming
Railways reservation system using socket programming
 
Normalization of Data Base
Normalization of Data BaseNormalization of Data Base
Normalization of Data Base
 
online blood bank system design
online blood bank system designonline blood bank system design
online blood bank system design
 
Copa new1
Copa new1Copa new1
Copa new1
 
XML Databases
XML DatabasesXML Databases
XML Databases
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
Blood Bank Project In Php&Java_Scrpt;s
Blood Bank Project In Php&Java_Scrpt;sBlood Bank Project In Php&Java_Scrpt;s
Blood Bank Project In Php&Java_Scrpt;s
 
The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...
The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...
The Relational Data Model and Relational Database Constraints Ch5 (Navathe 4t...
 
Ordbms
OrdbmsOrdbms
Ordbms
 
History of medical coding
History of medical codingHistory of medical coding
History of medical coding
 
Desarrollando un API con REST
Desarrollando un API con RESTDesarrollando un API con REST
Desarrollando un API con REST
 
IOT Reference Model.doc
IOT Reference Model.docIOT Reference Model.doc
IOT Reference Model.doc
 
SRS on blood bank
SRS on blood bankSRS on blood bank
SRS on blood bank
 
OOP Unit 1 - Foundation of Object- Oriented Programming
OOP Unit 1 - Foundation of Object- Oriented ProgrammingOOP Unit 1 - Foundation of Object- Oriented Programming
OOP Unit 1 - Foundation of Object- Oriented Programming
 

Similar to Peer peer messaging system (synopsis)

Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
Pankaj Gautam
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
Uvaraj Shan
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
DigitalThinkerHelp
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
Chandan Balachandra
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
Clement Robert Habimana
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
IJECEIAES
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Uvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
icanhasfay
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
shankars73
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
SanowerHossainRabbi
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13Uvaraj Shan
 

Similar to Peer peer messaging system (synopsis) (20)

Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!Peer to Peer Network with its Architecture, Types, and Examples!!
Peer to Peer Network with its Architecture, Types, and Examples!!
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
 
Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks Analysis of threats and security issues evaluation in mobile P2P networks
Analysis of threats and security issues evaluation in mobile P2P networks
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
 
10.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.1310.11648.j.ajnc.20130202.13
10.11648.j.ajnc.20130202.13
 

More from Mumbai Academisc

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
Mumbai Academisc
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
Mumbai Academisc
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
Mumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
Mumbai Academisc
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
Mumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
Mumbai Academisc
 
Spring ppt
Spring pptSpring ppt
Spring ppt
Mumbai Academisc
 
Ejb notes
Ejb notesEjb notes
Ejb notes
Mumbai Academisc
 
Java web programming
Java web programmingJava web programming
Java web programming
Mumbai Academisc
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
Mumbai Academisc
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
Mumbai Academisc
 
Web based development
Web based developmentWeb based development
Web based development
Mumbai Academisc
 
Jdbc
JdbcJdbc
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
Mumbai Academisc
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
Mumbai Academisc
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
Mumbai Academisc
 
Engineering
EngineeringEngineering
Engineering
Mumbai Academisc
 

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Peer peer messaging system (synopsis)

  • 1. Peer to Peer Messaging System (Synopsis) 1
  • 2. ABSTRACT The project titled peer-to-peer Messaging presents the development of an instant messaging application based on the concept of peer-topeer networking using JXTA platform. P2P (or peer-to-peer) networking is a network model where, depending on an operation's context, any node can operate as either a server or a client. The P2P architecture is a decentralized architecture, where neither client nor server status exists in a network. Every entity in the network, referred to as a peer, has equal status, meaning that an entity can either request a service or provide a service. The main goal of this project is to send instant messages to peers in the JXTA network using JXTA relay. JXTA defines a set of protocols to enable a framework for peerto-peer computing. All JXTA network users are peers to each other . Peers communicate with each other to perform different tasks (such as searching for new peers). Peer identifiers uniquely identify the peer on the JXTA network The JXTA relay can accept client commands and act upon the commands on the client's behalf. The relay acts as a junction between the JXTA networks and peers. JXTA has defined the data communication protocols that enable messaging between a relay and a client. The JXTA relay receives commands from a J2ME client, performs what's necessary on the client's behalf, and represents a JXME client on the JXTA network. The JXME client send messages to the relay. The relay discovers the peer and route the messages to the destination. 2
  • 3. INTRODUCTION The traditional approach to information systems, accessed by users by means of powerful devices (such as desktops and laptops) with known features, will not be anymore significant in the future years. Indeed, the current trend suggests that it will be possible to offer continuous access to all information sources, from all locations and through various kinds of devices, mainly small and mobile (e.g., palmtops and PDAs, cellular phones). Therefore, the need emerges for the design of applications for smart devices, which are highly flexible, capable of exploiting in an optimal way the resources. This Project analyzes the opportunity to design, develop and deploy interactive applications running on smart cellular phones (commonly referred to as smart phones), based on a peer-to-peer communication model and GPRS technology. PEER-TO-PEER (P2P) TECHNOLOGY enables any network-aware device to provide services to another network-aware device. A device in a P2P network can provide access to any type of resource that it has at its disposal, whether documents, storage capacity, computing power, or even its own human operator. In the client/server architecture, clients request services and servers provide those services. A variety of servers exist in today's Internet -- Web servers, mail servers, FTP servers, and so on. The client/server architecture is an example of a centralized architecture, where the whole network depends on central points, namely servers, to provide services. Regardless of the number of browsers or clients, the network can exist only if a server exists. 3
  • 4. CLIENT-SERVER MODEL Like the client/server architecture, P2P is also a distributed computing model, but there is an important difference. The P2P architecture is a decentralized architecture where neither client nor server status exists in a network. Every entity in the network, referred to as a peer, has equal status, meaning that an entity can either request a service (a client trait) or provide a service (a server trait). Figure 2 illustrates a P2P network. 4
  • 5. PEER-TO-PEER MODEL Though peers all have equal status in the network, they don't all necessarily have equal physical capabilities. A P2P network might consist of peers with varying capabilities, from mobile devices to mainframes. A mobile peer might not be able to act as a server due to its intrinsic limitations, even though the network does not restrict it in any way. Although P2P might sound like a dot-com fad, the technology is a natural extension of the Internet’s philosophy of robustness through decentralization. In the same manner that the 5
  • 6. Internet provides domain name lookup (DNS), World Wide Web, email, and other services by spreading responsibility among millions of servers, P2P has the capacity to power a whole new set of robust applications by leveraging resources spread across all corners of the Internet. P2P networks shun the centralized organization of the client/server architecture and instead employ a flat, highly interconnected architecture. By allowing intermittently connected computers to find each other, P2P enables these machines to act as both clients and servers that can determine the services available on the P2P network and engage those services in some application specific manner. The main advantage of P2P networks is that they distribute the responsibility of providing services among all peers on the network; this eliminates service outage due to a single point of failure and provides a more scalable solution for offering services. In addition, P2P networks exploit available bandwidth across the entire network by using a variety of communication channels and by filling bandwidth to the “edge” of the Internet. Unlike traditional client/server communications, P2P enables communication via a variety of network routes, thereby reducing network congestion. P2P is the key to realizing this potential, giving individual machines a mechanism for providing services to each other. Unlike the client/server architecture, P2P networks don’t rely on a centralized server to provide access to services, and they usually operate outside the domain name system. 6
  • 7. P2P has the capability of serving resources with high availability at a much lower cost while maximizing the use of resources from every peer connected to the P2P network. Whereas client/server solutions rely on the addition of costly bandwidth, equipment, and co-location facilities to maintain a robust solution, P2P can offer a similar level of robustness by spreading network and resource demands across the P2P network. Unfortunately, P2P suffers from some disadvantages due to the redundant nature of a P2P network’s structure. The distributed form of communications channels in P2P networks results in service requests that are nondeterministic in nature. For example, clients requesting the exact same resource from the P2P network might connect to entirely different machines via different communication routes, with different results. Requests sent via a P2P network might not result in an immediate response and, in some cases, might not result in any response. Resources on a P2P network can disappear at times as the clients that host those resources disconnect from the network; this is different from the services provided by the traditional Internet, which have most resources continuously available. P2P overcomes this disadvantage by providing redundant access to a resource. 7
  • 8. Existing System In the client/server architecture, clients request services and servers provide those services. Clients connect to a server using a specific communications protocol, such as the File Transfer Protocol (FTP), to obtain access to a specific resource. Most of the processing involved in delivering a service usually occurs on the server, leaving the client relatively unburdened. The client in the client/server architecture acts in a passive role, capable of demanding services from servers but incapable of providing services to other clients. This model of service delivery was developed at a time when most machines on the Internet had a resolvable static IP address, meaning that all machines on the Internet could find each other easily using a simple name. Limitations of the current system The disadvantage of using client-server architecture is that as the number of clients increases, the load and bandwidth demands on the server also increase, eventually preventing the server from handling additional clients. Objective The main objective of this project is to send instant messages within a peer group in a decentralized network using JXTA technology. 8
  • 9. Proposed System The existing system operated on a client/server mechanism in which a centralized server is required. While communicating between the peer members in the JXTA network i.e., the proposed system, a peer name has to be given by the user in the configurator window. The user is identified in the network using the peer id. The peer member can secure his identification using the password. The user should have an idea regarding the identification of another person. Thorough knowledge of identifying the members, adding the peers in the network, deleting the members from the network are required. 9
  • 10. Hardware & Software Requirements • Pentium IV Processor – 2 GHZ • NIC – 32 Bit Ethernet Card • 40 GB HDD • 256 MB DDR RAM • Mobile Phone • JXTA Proxy Server • J2SDK 1.4.2_06 • J2ME WTK 2.0 • Windows 2000 Server 10
  • 11. The project Peer-to-Peer Messaging is divided into three major modules: • Element • Message • Peer Network ELEMENT MODULE The Element represents a single element of the JXME message. The JXME implementation uses the Element to author JXME messages. A pure P2P system does not require the existence of any centralized servers or resources to operate. Therefore, a P2P system must not rely on any centrally administered naming or addressing system. The first module of the project deals with entering the member into the JXTA network and to enable them to chat with other members of the group. Batch file called myjxta will be run first. In the advanced settings tab, TCP option has to be enabled. Incoming and outgoing connections has to be enabled. Port number of the system has to be provided in the http settings. The peer who wants to become the member of the JXTA group will enter with the peer name. Only authenticated users can enter the network as password is required. In the relay host, proxy id should be given for communicating with the other peer. When all the settings are completed, the peer member has entered the network and is ready to communicate with all members in the NetPeerGroup. MESSAGE MODULE The message module is designed for the peer members to communicate with each other in the network. JXME does not define 11
  • 12. any special request message that explicitly asks the relay to send one or more response messages it has for the JXME client. The JXME client continues to send requests (for example, a peer group join request, a pipe creation request, or a search query) or other outbound messages to the relay. The relay avails these requests as opportunities to send any incoming message to the JXME client in response to a request. The JXME client uses the request Id element in the response message to find out which request this response corresponds to. JXTA peers use pipes to send messages to one another. Pipes are an asynchronous and unidirectional message transfer mechanism used for service communication. Pipes are indiscriminate; they support the transfer of any object, including binary code, data strings, and Java technology-based objects. The pipe endpoints are referred to as the input pipe (the receiving end) and the output pipe (the sending end). Pipe endpoints are dynamically bound to peer endpoints at runtime. Peer endpoints correspond to available peer network interfaces (e.g., a TCP port and associated IP address) that can be used to send and receive message. JXTA pipes can have endpoints that are connected to different peers at different times, or may not be connected at all. PEER NETWORK MODULE The Peer Network contains the methods to allow the JXME communication with the relay. The Peer Network is like a communication module that internally uses different Message and Element objects and handles all communication with the relay. Peer Network has methods to perform the various tasks between the relay and the mobile client. The Peer Network manages all the messages 12
  • 13. and maintains the support tasks, maintaining the identity of various messages exchanged between the relay and the client. The third module deals with the implementation of communication between JXTA peers in the midlet. Proxy id should be given and the peer enters the group with a peer name. There are various options like sending the message, reply, connect to the relay, Buddy list, configuration and default settings. Using the various options, messages can be sent, reply can be sent to the received message and connection can be established with the relay. Using the buddy list menu, members can chat, new members can be added to the group and the members can also leave the group. 13