1 / 20

Web Services and Peer-to-Peer Networking

Web Services and Peer-to-Peer Networking. By Dushyant Bansal Shoshin Research Lab May 15, 2003. Why Web Services now?. Heterogeneous systems CORBA, DCOM, .NET Windows, Linux, Solaris Java, C++, C# 2-tiers to n-tiers; client-server to ? Business case Re-implement vs extend.

tova
Télécharger la présentation

Web Services and Peer-to-Peer Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Web Services and Peer-to-Peer Networking By Dushyant Bansal Shoshin Research Lab May 15, 2003

  2. Why Web Services now? • Heterogeneous systems • CORBA, DCOM, .NET • Windows, Linux, Solaris • Java, C++, C# • 2-tiers to n-tiers; client-server to ? • Business case • Re-implement vs extend

  3. Web Services – What? • “An architecture that allows applications to talk to each other” = A2A • Specifies protocol instead of API • Provides means for • Discovering Web services • Determining the description of the Web service – method names, args, returns • Specifying the data presentation format

  4. Components of Web Services • UDDI • Universal Description, Discovery and Integration • Service discovery • XML advertisements • WSDL • Web Service Description Language • Service description • Layout of accepted SOAP messages • Message format • SOAP • Data format • XML over HTTP

  5. Other WS Specs • WS-Routing • Specify the next intermediate node • Routing header contains logic • WS-Security • Access control – what and who • Logging • Monitoring

  6. Advantages of WS • Self-describing messages • Ease of control and routing • Varying loads • Loose coupling • XML and SOAP • Asynchrony • Messaging

  7. Web Services – What’s missing? • Fault tolerance • Centralized registry • Security • Can tunnel through port 80 • Port forwarding • Using ssh or https • Require “edge” security • Firewalls on workstations and servers • Close unused ports • Access restriction to functions and objects

  8. Web Services – What’s missing? • Poor performance • Lack of high-performance broadcast • Distributed garbage collection • WS processes run longer, more expensive • Killing processes and orphans • Queryable data structures

  9. The Transition to Peer-to-Peer • Said earlier • “2-tiers to n-tiers; client-server to ?” • “?” = P2P, amongst others • Protocols include JXTA, Pastry and Chord • Powerful machines on edge of network

  10. Edge Characteristics • Heterogeneity • Volatile connections • Entering, exiting physical network • Ad hoc networking • True Application-to-Application • Machine interpretable semantics • Interface changes • Wide range of protocols • Failure • changes • Implementation changes • Capacity planning

  11. JXTA • P2P framework made of 3 layers • Core layer • routing and peer establishment • Service layer • Higher-level concepts of indexing, searching and file sharing • Application layer • Applications such as email, auctioning, and storage systems

  12. JXTA • Node roles • Providers • Provide services to be consumed • Consumers • Look for services to consume • Search hubs • Mini UDDI registries of XML advertisements • Communicate using SOAP or arbitrary XML • Organized in groups

  13. JXTA

  14. JXTA • Set of protocols • Peer Discovery Protocol • Advertise and discover content • Peer Resolver Protocol • Send query, receive response • Rendezvous Protocol • Propagate messages in the network • Peer Endpoint Protocol • Find a route from one peer to another • Pipe Binding Protocol • Create a communication path • Peer Information Protocol • Obtain peer status information

  15. JXTA • Independent of • Computer language or operating system • Network transport or topology • Authentication, security or encryption model

  16. Pastry and PAST • Pastry • Scalable and distributed routing protocol for wide-area P2P • Specifies a routing table • PAST • File system on top of Pastry • Each node and data or service object has an ID • Node discovery • Expanding ring multicast • Content discovery • Hypercube routing • Messages move from hop to hop • Can take advantage of WS-Routing

  17. Pastry - Routing Table, b=2, l=8, base = 2b = 4

  18. Chord • Routing protocol for wide-area P2P overlays • Uses a “finger-table” to determine the next hop • Can also take advantage of WS-Routing

  19. Conclusions • Web Services and P2P are tackling very similar problems • Both can benefit from each other

  20. References • Mastering JXTA by Joseph D. Gradecki • ACM Queue, March 2003 • Reducing Bandwidth Utilization in P2P Networks, by Dushyant Bansal and Paul A.S. Ward

More Related