Project JXTA – Guide to a Peer-To-Peer Framework

Total Page:16

File Type:pdf, Size:1020Kb

Project JXTA – Guide to a Peer-To-Peer Framework Project JXTA – Guide to a peer-to-peer framework Ekaterina Chtcherbina Siemens AG, Corporate Technology Munich Thomas Wieland Siemens AG, Munich University of Applied Sciences, Coburg 1 High-level agenda ! Introduction ! Peer-to-Peer Computing ! The Project JXTA ! JXTA Concepts ! JXTA Protocols ! "Hello JXTA-World" 2 © Siemens CT, Chtcherbina/Wieland, 2002 Introduction: Benefits of Peer-to-Peer Computing 3 5 Myths about P2P ! It is always fully decentralized ! P2P is about People-to-People communication ! It is only about file sharing ! P2P is not secure ! P2P is not scalable 4 © Siemens CT, Chtcherbina/Wieland, 2002 Distributed Search 5 © Siemens CT, Chtcherbina/Wieland, 2002 Multi-user applications and games 6 © Siemens CT, Chtcherbina/Wieland, 2002 Auctions 7 © Siemens CT, Chtcherbina/Wieland, 2002 Collaboration 8 © Siemens CT, Chtcherbina/Wieland, 2002 Resource sharing 9 © Siemens CT, Chtcherbina/Wieland, 2002 Distributed storage and file sharing 10 © Siemens CT, Chtcherbina/Wieland, 2002 Blackboards 11 © Siemens CT, Chtcherbina/Wieland, 2002 Examples of P2P Applications ! Building facilities (sensor equipment) ! Collaboration work support (development tools, data sharing) ! Medicine (effective collaboration, file sharing, distributed data processing) ! Building site automatization ! Business & entertainment communication support ! Cars (driver support, location based services, car tracking) 12 © Siemens CT, Chtcherbina/Wieland, 2002 Peer-to-Peer Computing 13 What is Peer-to-Peer Networking? ! Traditional P2P network definition (comp. sc. encyclopedia): “A type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving others.” ! Our P2P network definition: “An adaptive, self-configuring network which does not rely on central servers. The peers in a P2P network are devices that can act as both servers and clients (servents).” 14 © Siemens CT, Chtcherbina/Wieland, 2002 Disadvantages of Client/Server Systems ! Central servers (or server clusters) are potential bottlenecks and single points of failure of distributed systems " P2P allows for efficient use of resources and robustness 15 © Siemens CT, Chtcherbina/Wieland, 2002 Peer-to-peer and Ad Hoc Networks ! Ad hoc networks require self- configuration ! Dynamic environment, unstable connectivity, infrastructureless ! Issues: addressing, service discovery & advertisement, dynamic service composition, connection mgt., routing " P2P enables self-configuration of dynamic distributed systems 16 © Siemens CT, Chtcherbina/Wieland, 2002 Messages in C/S and P2P Traditional traffic ClientPeer congestion zone ClientPeer Server Cache ClientPeer ClientPeer Server ClientPeer ClientPeer ClientPeer ClientPeer 17 © Siemens CT, Chtcherbina/Wieland, 2002 Centralized Distributed Computing ! Distributed networking technologies such as DCOM, CORBA and Web Services currently rely on a priori known directory servers (registry, naming server, UDDI, etc.) Database 1. 2. Service Client Server 3. 18 © Siemens CT, Chtcherbina/Wieland, 2002 Centralized Distributed Computing (2) ! Distributed auto-configuration technologies such as Jini also rely on directory servers " P2P plug and play technologies such as UPnP are more suitable for infrastructureless environments Peer Peer Peer Peer Peer 19 © Siemens CT, Chtcherbina/Wieland, 2002 Special Features ! Decentralized ☺ ! Scalability/Redundancy/Fault tolerance ! P2P networks scale well with increasing numbers of users ! Multiple distributed copies of of frequently accessed resources ! Nondeterministic ! Peers can appear and vanish spontaneously ! Behaviour is less predictable 20 © Siemens CT, Chtcherbina/Wieland, 2002 Requirements for P2P Systems ! Metadata/Interoperability ! When are they essentially independent ? ! Encapsulation? Privacy? Trust? ! Discovery ! Who is out there ? ! How do I reach them ? ! Messaging ! QoS Security Trust/Reputation ! Peer-to-peer interaction issues 21 © Siemens CT, Chtcherbina/Wieland, 2002 Security in P2P Networks 22 Security Issues ! Authentication ! The process of determining whether or not some entity is in fact who that entity declares itself to be. ! Authorization ! Process of giving an authenticated entity permissions to do some action or access some resource ! Encryption and confidentiality ! Integrity 23 © Siemens CT, Chtcherbina/Wieland, 2002 Challenges in P2P Systems ! Memberships and groups are dynamic ! People do not trust each other ! Each peer is untrusted ! Peers don't have trust relationships ! Unpredictable network latencies ! Firewalls and other barriers ! No central services (especially no directory) ! Individuals can cause local damage that spreads ! Every peer may run run different software ! Code may be mobile ! Complex systems: hard to understand 24 © Siemens CT, Chtcherbina/Wieland, 2002 Solutions ! Mostly based on "web of trust" ! A trusts B, B trusts C, so A can also trust C ! Users exchange their public keys and encrypt messages with their private keys ! Enrich by reputations • Assign reputations to entities • Allow others to retrieve reputations • Use reputation to build trust relationships • Example: eBay ! Alternative: centrally issued group membership certificates (PKI) ! Introduces dependencies from a server-like infrastructure component 25 © Siemens CT, Chtcherbina/Wieland, 2002 FurtherPossibleSecurity Tools ! Encryption ! Authentication ! Firewalls ! May be installed on each peer ! Drawbacks: Block all traffic on port, not application; generally static rulesets ! Sandboxes ! Essential for mobile code systems! ! E.g. in Java/JVM, .NET/CLR 26 © Siemens CT, Chtcherbina/Wieland, 2002 Search in P2P Networks 27 Distributed Search: Network Topology Based Centralized Decentralized (e.g. Napster) (e.g. Gnutella) !Relies on the organization of the peers within the network to route requests !Optimization focuses on the reduction of the diameter (no. of hops, round trip time) of the graph representing the distributed network 28 © Siemens CT, Chtcherbina/Wieland, 2002 Distributed Search: Content Mapping Based ! Content addressable networks: distributed hash table. Content (or pointer to content) is stored in assigned peers " not a practical approach for content described by multiple attributes ! Publish/subscribe networks: peers agree on a certain query and advertisement template. Content based routing. 29 © Siemens CT, Chtcherbina/Wieland, 2002 Hybrid Search Super Hybrid approach: Peer locally centralized + globally decentralized + publish/subscribe (e.g. JXTA Search) $ No perfect solution, choice depends on the application 30 © Siemens CT, Chtcherbina/Wieland, 2002 Support for Message Exchange ! Routing in multi-hop ad hoc networks ! Caching mechanism (relaying) for overcoming ! Disruptive connectivity Relay ! Firewalls Peer Peer C Firewall Peer Polling B Peer A Relay Mobile Peer Peer 31 © Siemens CT, Chtcherbina/Wieland, 2002 Peer-to-Peer Systems ! P2P platforms ! Messaging ! Sun Microsystems: frameworks JXTA ! Open Source: Jabber ! Distributed computing ! Collaboration ! SETI@home ! Engenia Software, Inc ! Entropia ! Others ! File sharing ! Magi: Endevors ! Freenet ! Gnutella ! KaZaA 32 © Siemens CT, Chtcherbina/Wieland, 2002 Project JXTA 33 What is JXTA? conceptual framework for Peer-to-Peer applications ! serves as a specification, an effort to create a common platform for building distributed services and applications ! neither a standalone Peer-to-Peer application nor a concrete framework implementation! ! But: Sun has provided a reference implementation (in Java) which incorporates the specified components ! Napster, Gnutella, Freenet & Co. provide users with limited ability to share resources and are unable to share data with other, similar applications 34 © Siemens CT, Chtcherbina/Wieland, 2002 The Project JXTA ! Started as a research project at Sun Microsystems by Chief Scientist Bill Joy ! First official release of a Java reference implementation in April 2001 ! Since then put under an open-source license The name JXTA is derived from the word juxtapose, meaning to place two entities side-by-side or in close proximity. By choosing this name, the development team at Sun recognized that P2P solutions would always exist alongside the current client/server solutions, rather than replacing them completely. Brendon Wilson 35 © Siemens CT, Chtcherbina/Wieland, 2002 Key Assumptions ! Platform Independence (any language, any OS, any hardware) ! But: JXTA dependence ! Allow for absolute heterogeneity of peers ! Highly unreliable & changing network environment ! Asynchronous,Unreliable,Uni-directional transport ! Idempotent protocol exchanges – No protocol state ! Applications to build their own security & encryption models 36 © Siemens CT, Chtcherbina/Wieland, 2002 Technology ! JXTA technology is based on XML, Java technology, and key concepts of UNIX operating system ! Transmitted information is packaged as messages ! Messages define an XML envelop to transfer any kind of data ! The use of Java language is not required ! JXTA protocols can be implemented in C, C++, Perl, or any other programming language 37 © Siemens CT, Chtcherbina/Wieland, 2002 JXTA Concepts 38 JXTA Architecture Application Level JXTA Services JXTA Platform Components pipes peers peer groups peer groups Core Services resolver pipe discovery membership propagation service router and relay services transports 39 © Siemens CT, Chtcherbina/Wieland, 2002 Key Aspects ! XML documents (advertisements) used to describe
Recommended publications
  • Security Distributed and Networking Systems (507 Pages)
    Security in ................................ i Distri buted and /Networking.. .. Systems, . .. .... SERIES IN COMPUTER AND NETWORK SECURITY Series Editors: Yi Pan (Georgia State Univ., USA) and Yang Xiao (Univ. of Alabama, USA) Published: Vol. 1: Security in Distributed and Networking Systems eds. Xiao Yang et al. Forthcoming: Vol. 2: Trust and Security in Collaborative Computing by Zou Xukai et al. Steven - Security Distributed.pmd 2 5/25/2007, 1:58 PM Computer and Network Security Vol. 1 Security in i Distri buted and /Networking . Systems Editors Yang Xiao University of Alabama, USA Yi Pan Georgia State University, USA World Scientific N E W J E R S E Y • L O N D O N • S I N G A P O R E • B E I J I N G • S H A N G H A I • H O N G K O N G • TA I P E I • C H E N N A I Published by World Scientific Publishing Co. Pte. Ltd. 5 Toh Tuck Link, Singapore 596224 USA office: 27 Warren Street, Suite 401-402, Hackensack, NJ 07601 UK office: 57 Shelton Street, Covent Garden, London WC2H 9HE British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. SECURITY IN DISTRIBUTED AND NETWORKING SYSTEMS Series in Computer and Network Security — Vol. 1 Copyright © 2007 by World Scientific Publishing Co. Pte. Ltd. All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any means, electronic or mechanical, including photocopying, recording or any information storage and retrieval system now known or to be invented, without written permission from the Publisher.
    [Show full text]
  • Distributed Computing Network System, Said to Be "Distributed" When the Computer Programming and the Data to Be Worked on Are Spread out Over More Than One Computer
    Praveen Balda et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.4, April- 2015, pg. 761-767 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 4, Issue. 4, April 2015, pg.761 – 767 RESEARCH ARTICLE Security Enhancement in Distributed Networking Praveen Balda, Sh. Matish Garg Distributed Networking is a distributed computing network system, said to be "distributed" when the computer programming and the data to be worked on are spread out over more than one computer. Usually, this is implemented over a network. Prior to the emergence of low-cost desktop computer power, computing was generally centralized to one computer. Although such centers still exist, distribution networking applications and data operate more efficiently over a mix of desktop workstations, local area network servers, regional servers, Web servers, and other servers. One popular trend is client/server computing. This is the principle that a client computer can provide certain capabilities for a user and request others from other computers that provide services for the clients. (The Web's Hypertext Transfer Protocol is an example of this idea.) Enterprises that have grown in scale over the years and those that are continuing to grow are finding it extremely challenging to manage their distributed network in the traditional client/server computing model. The recent developments in the field of cloud computing has opened up new possibilities. Cloud-based networking vendors have started to sprout offering solutions for enterprise distributed networking needs.
    [Show full text]
  • Presentazione Di Powerpoint
    Fog Computing, its Applications in Industrial IoT, and its Implications for the Future of 5G Flavio Bonomi, CEO and Co-Founder, Nebbiolo Technologies IEEE 5G Summit, Honolulu, May 5th, 2017 Agenda • Fog Computing and 5G: High Level Introduction • Architectural Angles in “Fog” with Relevance to 5G • Fog Computing and 5G: Natural Partners for the Future of Industrial IoT, with Applications • Nebbiolo Technologies: Brief Introduction • Conclusions © Nebbiolo Technologies The Pendulum Swinging Back: A Renewed Focus on the Edge of the Network, Motivated by the Network Evolution, 5G and IoT Fog Computing Mobile Edge Computing (Modern, Real-Time Capable) Edge Computing Real-Time Edge Cloud © Nebbiolo Technologies 3 The Internet of Things: Information Technologies “Meet” Operational Technologies Public Clouds Private Clouds Information Technologies Today: 1. Clouds 2. Enterprise Datacenters 3. Traditional and Embedded Public and Private Endpoints Communications 4. Networking Infrastructure (Internet, Mobile, Enterprise Ethernet, WiFi) Enterprise Data Center The Internet of Things Brings Together Information Domain and Operations Domain through: Traditional ICT end-points Information Technologies 1. Connectivity 2. Data Sharing and Analysis 3. Technology Convergence Operational Technologies Machines, devices, sensors, actuators, things © Nebbiolo Technologies 4 The Future 5G Network and Industrial IoT Both Require More Distributed Computing Public Clouds Private Clouds The Future 5G networks and IoT require more virtualized, scalable, reliable,
    [Show full text]
  • The Raincore Distributed Session Service for Networking Elements
    The Raincore Distributed Session Service for Networking Elements Chenggong Charles Fan Jehoshua Bruck California Institute of Technology Mail-Stop 136-93 Pasadena, CA 91125 {fan, bruck}@paradise.caltech.edu Abstract devices naturally become key challenges facing the Internet infrastructure today. Motivated by the explosive growth of the Internet, we study efficient and fault-tolerant distributed session layer Networking protocols for networking elements. These protocols are elements Server2 Data designed to enable a network cluster to share the state information necessary for balancing network traffic and Server1 computation load among a group of networking elements. In addition, in the presence of failures, they allow Firewall network traffic to fail-over from failed networking Router elements to healthy ones. To maximize the overall network throughput of the networking cluster, we assume a unicast communication medium for these protocols. Router The Raincore Distributed Session Service is based on a fault-tolerant token protocol, and provides group Internet membership, reliable multicast and mutual exclusion Client Proxy Server services in a networking environment. We show that this service provides atomic reliable multicast with consistent ordering. We also show that Raincore token protocol Figure 1. An example of a traffic path consumes less overhead than a broadcast-based protocol between a client and a server farm. in this environment in terms of CPU task-switching. The Raincore technology was transferred to Rainfinity, a startup company that is focusing on software for Internet One promising way of improving the reliability and reliability and performance. Rainwall, Rainfinity’s first performance of the Internet is to cluster the networking product, was developed using the Raincore Distributed elements.
    [Show full text]
  • P2P Group Management Systems: a Conceptual Analysis
    P2P Group Management Systems: A Conceptual Analysis TIMO KOSKELA, OTSO KASSINEN, ERKKI HARJULA, and MIKA YLIANTTILA, University of Oulu Peer-to-Peer (P2P) networks are becoming eminent platforms for both distributed computing and interper- sonal communication. Their role in contemporary multimedia content delivery and communication systems is strong, as witnessed by many popular applications and services. Groups in P2P systems can originate from the relations between humans, or they can be defined with purely technical criteria such as proximity. In this article, we present a conceptual analysis of P2P group management systems. We illustrate how groups are formed using different P2P system architectures, and analyze the advantages and disadvantages of using each P2P system architecture for implementing P2P group management. The evaluation criteria in the analysis are performance, robustness, fairness, suitability for battery-powered devices, scalability, and security. The outcome of the analysis facilitates the selection of an appropriate P2P system architecture for implementing P2P group management in both further research and prototype development. Categories and Subject Descriptors: A.1 [Introductory and Survey]; C.2 [Computer-Communication Networks]: C.2.1 Network Architecture and Design—Network topology, C.2.4 Distributed Systems— Distributed databases;E.1[Data Structures]: Distributed Data Structures; H.3 [Information Storage and Retrieval]: H.3.4 Systems and Software—Distributed systems General Terms: Design, Management, Performance Additional Key Words and Phrases: Peer-to-peer, distributed hash table, overlay network, user community ACM Reference Format: Koskela, T., Kassinen, O., Harjula, E., and Ylianttila, M. 2013. P2P group management systems: A conceptual analysis. ACM Comput. Surv. 45, 2, Article 20 (February 2013), 25 pages.
    [Show full text]
  • UNIT- 1: Internet Basics 1.0 Objective 1.1 Concept of Internet
    UNIT- 1: Internet Basics UNIT STRUCTURE 1.0 Objective 1.1 Concept of Internet 1.2 Evolution of internet 1.3 Basic concepts 1.4 Communication on the Internet 1.5 Internet Domains 1.6 Internet Server Identities 1.7 Establishing Connectivity on Internet 1.8 Client IP Address 1.9 TCP/IP and its Services 1.10 Web Server 1.11 Web Client 1.12 Domain Registration 1.13 Summary 1.14 Question for Exercise 1.15 Suggested Readings 1.0 Objective Defense Advanced Research Project Agency (DARPA) of US initiated a research activity that eventually developed as a system for global data commmunication service known as the Internet. The internet, today, is being operated as a joint effort of many different organizations. In this unit, you will learn the basic concepts related to internet as well as the various mechanisms and technologies involved in the deployment of the internet. Upon completion of this unit, the readers shall be aware of the basic terms and terminologies, involved devices and mechnaisms and the applications of the Internet. 1.1 Concept of Internet The Internet is “the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.” It has changed the way we do our daily chores. The usual tasks that we perform like sending an email, looking up train schedules, social networking, paying a utility bill is possible due to the Internet. The strucure of internat has become quite complex and it cannot be reperented as it is changing instanteniously. Every now and then some resources are being added while some are being romvwd.
    [Show full text]
  • Decentralized SDN Control Plane for a Distributed Cloud-Edge Infrastructure: a Survey David Espinel Sarmiento, Adrien Lebre, Lucas Nussbaum, Abdelhadi Chari
    Decentralized SDN Control Plane for a Distributed Cloud-Edge Infrastructure: A Survey David Espinel Sarmiento, Adrien Lebre, Lucas Nussbaum, Abdelhadi Chari To cite this version: David Espinel Sarmiento, Adrien Lebre, Lucas Nussbaum, Abdelhadi Chari. Decentralized SDN Control Plane for a Distributed Cloud-Edge Infrastructure: A Survey. [Research Report] RR-9352, INRIA. 2020, pp.40. hal-02868984 HAL Id: hal-02868984 https://hal.inria.fr/hal-02868984 Submitted on 16 Jun 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Decentralized SDN Control Plane for a Distributed Cloud-Edge Infrastructure: A Survey David Espinel, Adrien Lebre, Lucas Nussbaum, Abdelhadi Chari RESEARCH REPORT N° 9352 June 2020 Project-Teams STACK ISSN 0249-6399 ISRN INRIA/RR--9352--FR+ENG Decentralized SDN Control Plane for a Distributed Cloud-Edge Infrastructure: A Survey David Espinel∗†, Adrien Lebre∗, Lucas Nussbaum∗, Abdelhadi Chari † Project-Teams STACK Research Report n° 9352 — June 2020 — 40 pages Abstract: Today’s emerging needs (Internet of Things applications, Network Function Virtual- ization services, Mobile Edge computing, etc.) are challenging the classic approach of deploying a few large data centers to provide cloud services. A massively distributed Cloud-Edge architecture could better fit the requirements and constraints of these new trends by deploying on-demand in- frastructure services in Point-of-Presences within backbone networks.
    [Show full text]
  • Aneris: a Mechanised Logic for Modular Reasoning About Distributed Systems
    Aneris: A Mechanised Logic for Modular Reasoning about Distributed Systems Morten Krogh-Jespersen, Amin Timany ?, Marit Edna Ohlenbusch, Simon Oddershede Gregersen , and Lars Birkedal Aarhus University, Aarhus, Denmark Abstract. Building network-connected programs and distributed sys- tems is a powerful way to provide scalability and availability in a digital, always-connected era. However, with great power comes great complexity. Reasoning about distributed systems is well-known to be difficult. In this paper we present Aneris, a novel framework based on separation logic supporting modular, node-local reasoning about concurrent and distributed systems. The logic is higher-order, concurrent, with higher- order store and network sockets, and is fully mechanized in the Coq proof assistant. We use our framework to verify an implementation of a load balancer that uses multi-threading to distribute load amongst multiple servers and an implementation of the two-phase-commit protocol with a replicated logging service as a client. The two examples certify that Aneris is well-suited for both horizontal and vertical modular reasoning. Keywords: Distributed systems · Separation logic · Higher-order logic · Concurrency · Formal verification 1 Introduction Reasoning about distributed systems is notoriously difficult due to their sheer complexity. This is largely the reason why previous work has traditionally focused on verification of protocols of core network components. In particular, in the context of model checking, where safety and liveness assertions [29] are consid- ered, tools such as SPIN [9], TLA+ [23], and Mace [17] have been developed. More recently, significant contributions have been made in the field of formal proofs of implementations of challenging protocols, such as two-phase-commit, lease-based key-value stores, Paxos, and Raft [7, 25, 30, 35, 40].
    [Show full text]
  • The Implementation of Intelligent Oos Networking by the Development
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2003 The Implementation of Intelligent QoS Networking by the Development and Utilization of Novel Cross-Disciplinary Soft Computing Theories and Techniques Ahmed Shawky Moussa Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES THE IMPLEMENTATION OF INTELLIGENT QoS NETWORKING BY THE DEVELOPMENT AND UTILIZATION OF NOVEL CROSS-DISCIPLINARY SOFT COMPUTING THEORIES AND TECHNIQUES By AHMED SHAWKY MOUSSA A Dissertation submitted to the Department of Computer Science In partial fulfillment of the requirements for The degree of Doctor of Philosophy Degree Awarded: Fall Semester, 2003 The members of the committee approve the dissertation of Ahmed Shawky Moussa Defended on September 19, 2003. ______________________ Ladislav Kohout Major Professor ______________________ Michael Kasha Outside Committee Member ______________________ Lois Wright Hawkes Committee Member ______________________ Ernest McDuffie Committee Member ______________________ Xin Yuan Committee Member The Office of Graduate Studies has verified and approved the above named committee members ii Optimization is not just a technique, or even a whole science; it is an attitude and a way of life. My mother’s life is a great example of optimization, making the best out of every thing, sometimes out of nothing. She has also been the greatest example of sacrifice, dedication, selfishness, and many other qualities, more than can be listed. I dedicate this work and all my past and future works to the strongest person I have ever known, the one who taught me, by example, what determination is, Fawkeya Ibrahim, my mother.
    [Show full text]
  • APPLICATION of BLOCKCHAIN NETWORK for the USE of INFORMATION SHARING by Linir Zamir
    APPLICATION OF BLOCKCHAIN NETWORK FOR THE USE OF INFORMATION SHARING by Linir Zamir A Thesis Submitted to the Faculty of The College of Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degree of Master of Science Florida Atlantic University Boca Raton, FL August 2019 Copyright 2019 by Linir Zamir ii ACKNOWLEDGEMENTS I would like to thank my committee members: Dr. Feng-Hao Liu, my commit- tee chair; Dr. Mehrdad Nojoumian and Dr. Elias Bou-Harb for their encouragement, insightful comments and hard questions. I would also like to thank my mother, who supported me with love and understanding. Without you, I could never have made it this far in my academical studies and generally in life. iv ABSTRACT Author: Linir Zamir Title: Application of Blockchain networkfor the use of Information Sharing Institution: Florida Atlantic University Thesis Advisor: Dr. Feng-Hao Liu Degree: Master of Science Year: 2019 The Blockchain concept was originally developed to provide security in the Bitcoin cryptocurrency network, where trust is achieved through the provision of an agreed-upon and immutable record of transactions between parties. The use of a Blockchain as a secure, publicly distributed ledger is applicable to fields beyond finance, and is an emerging area of research across many other fields in the industry. This thesis considers the feasibility of using a Blockchain to facilitate secured infor- mation sharing between parties, where a lack of trust and absence of central control are common characteristics. Implementation of a Blockchain Information Sharing system will be designed on an existing Blockchain network with as a communicative party members sharing secured information.
    [Show full text]
  • A Review of Multimedia Networking
    A Review of Multimedia Networking Alan Taylor and Madjid Merabti Contents 1. INTRODUCTION 1.1. Networked Multimedia Applications 1.2. An Example 1.3. Report Structure 2. USER REQUIREMENTS FOR MULTIMEDIA 2.1. Human - Computer Interface 2.2. Access, Delivery, Scheduling and Recording 2.3. Interactivity 2.4. Educational requirements 2.5. Cost 3. ISSUES FOR USERS 3.1. Characteristics of multimedia 3.2. Compression 3.3. Storage 3.4. Bandwidth 3.5. Quality of Service 3.6. Platform Support 3.7. Inter-operability 4. COMPRESSION STANDARDS 4.1. JPEG Compression 4.2. MPEG Compression 4.3. ITU-T H.261 Compression 4.4. AVI, CDI and Quicktime 5. TRANSMISSION MEDIA 5.1. Copper Conductors 5.2. Coaxial Cable 5.3. Optical Fibre 5.4. Radio Systems 6. SERVICE PROVIDERS 6.1. Public Telecommunication Operators (PTO) 6.2. Cable TV Providers 7. LAN NETWORK TECHNOLOGIES 7.1. Ethernet at 10 Mbps 7.2. Fast Ethernet 7.3. FDDI 7.4. Iso-Ethernet 7.5. Proprietary LANs 7.6. Local ATM 8. WAN NETWORK SERVICES 8.1. Frame Relay 8.2. SMDS 8.3. The Integrated Services Digital Network (ISDN) 8.4. ATM 9. MULTIMEDIA AND INTERNET PROTOCOLS 9.1. Existing Internet Protocols 9.2. New Internet Protocols 9.3. Internet Protocols and ATM 9.4. ITU-T Standards 10. MULTIMEDIA PROGRAMMING INTERFACES 10.1. Design Issues 10.2. Multimedia Communication Models 10.3. First Implementations 11. NETWORKED MULTIMEDIA APPLICATION DESIGN 11.1. Real Time Multimedia Applications 11.1.1. Desk Top Conferencing 11.1.2. Video Conferencing or Videophone products 11.1.3.
    [Show full text]
  • Locating Political Power in Internet Infrastructure by Ashwin Jacob
    Where in the World is the Internet? Locating Political Power in Internet Infrastructure by Ashwin Jacob Mathew A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Information in the Graduate Division of the University of California, Berkeley Committee in charge: Professor John Chuang, Co-chair Professor Coye Cheshire, Co-chair Professor Paul Duguid Professor Peter Evans Fall 2014 Where in the World is the Internet? Locating Political Power in Internet Infrastructure Copyright 2014 by Ashwin Jacob Mathew This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.1 1The license text is available at http://creativecommons.org/licenses/by-nc-sa/4.0/. 1 Abstract Where in the World is the Internet? Locating Political Power in Internet Infrastructure by Ashwin Jacob Mathew Doctor of Philosophy in Information University of California, Berkeley Professor John Chuang, Co-chair Professor Coye Cheshire, Co-chair With the rise of global telecommunications networks, and especially with the worldwide spread of the Internet, the world is considered to be becoming an information society: a society in which social relations are patterned by information, transcending time and space through the use of new information and communications technologies. Much of the popular press and academic literature on the information society focuses on the dichotomy between the technologically-enabled virtual space of information, and the physical space of the ma- terial world. However, to understand the nature of virtual space, and of the information society, it is critical to understand the politics of the technological infrastructure through which they are constructed.
    [Show full text]