scholarly journals Design of P2P-SIP System Network Structure Based on JXTA

CONVERTER ◽  
2021 ◽  
pp. 59-64
Author(s):  
Lei Shi, Chen Shi, Hongying Wang

Session Initiation Protocol (SIP) is one of the most important signaling connection protocols in the field of VoIP (Voice over Internet Protocol). However, the existing SIP network has some problems such as manual configuration, difficult maintenance and poor scalability. With the development of P2P (Peer-to-Peer) technology, the combination of SIP and P2P has become a trend. JXTA is an open peer-to-peer platform, which provides basic application services for building P2P network. The topic chooses JXTA development platform to build P2P network, and then constructs SIP soft terminal on it. Based on the in-depth study of JXTA structured network and SIP protocol, a P2P SIP system is designed and implemented. The system can maintain normal SIP communication without maintaining the central server. In this paper, the detailed design and implementation process of P2P-SIP system are given, including node join and leave, user join, user search and session establishment. This paper focuses on the implementation process of user search, that is, the collaborative process of discovery service, resolution service, aggregation service and endpoint routing service. Finally, the feasibility of the system is verified by functional test.

CONVERTER ◽  
2021 ◽  
pp. 627-634
Author(s):  
Wang Fei, Dong Yu

The network structure of P2P-SIP system based on JXTA is one of the core technologies in industrial intelligent Internet.JXTA is an open peer-to-peer platform, which provides basic application services for building P2P network. This paper chooses JXTA development platform to build P2P network, and then constructs SIP soft terminal on it. Firstly, it introduces the background knowledge, related research, P2P network technology, JXTA technology and SIP protocol. Then, the feasibility of p2p sip system is analyzed, including the combination of P2P and sip, network structure and framework structure. Then the routing mechanism of JXTA is deeply studied, including distributed index of shared resources, limited range traversal, dynamic view of sink node and loose and consistent distributed hash table (DHT). At the same time, this paper proposes an improvement strategy to overcome the shortcomings of JXTA routing mechanism such as limited range traversal and loose consistent DHT, that is, introducing the chord ring of consistent hash algorithm in the aggregation network layer. Based on the in-depth study of JXTA structured network and SIP protocol, a P2P SIP system is designed and implemented. The experimental results show that the system can maintain normal SIP communication without maintaining the central server.


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Federica Paganelli ◽  
David Parlanti

Current trends towards the Future Internet are envisaging the conception of novel services endowed with context-aware and autonomic capabilities to improve end users’ quality of life. The Internet of Things paradigm is expected to contribute towards this ambitious vision by proposing models and mechanisms enabling the creation of networks of “smart things” on a large scale. It is widely recognized that efficient mechanisms for discovering available resources and capabilities are required to realize such vision. The contribution of this work consists in a novel discovery service for the Internet of Things. The proposed solution adopts a peer-to-peer approach for guaranteeing scalability, robustness, and easy maintenance of the overall system. While most existing peer-to-peer discovery services proposed for the IoT support solely exact match queries on a single attribute (i.e., the object identifier), our solution can handle multiattribute and range queries. We defined a layered approach by distinguishing three main aspects: multiattribute indexing, range query support, peer-to-peer routing. We chose to adopt an over-DHT indexing scheme to guarantee ease of design and implementation principles. We report on the implementation of a Proof of Concept in a dangerous goods monitoring scenario, and, finally, we discuss test results for structural properties and query performance evaluation.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 1051
Author(s):  
Gera Jaideep ◽  
Bhanu Prakash Battula

Peer to Peer (P2P) network in the real world is a class of systems that are made up of thousands of nodes in distributed environments. The nodes are decentralized in nature. P2P networks are widely used for sharing resources and information with ease. Gnutella is one of the well known examples for such network. Since these networks spread across the globe with large scale deployment of nodes, adversaries use them as a vehicle to launch DDoS attacks. P2P networks are exploited to make attacks over hosts that provide critical services to large number of clients across the globe. As the attacker does not make a direct attack it is hard to detect such attacks and considered to be high risk threat to Internet based applications. Many techniques came into existence to defeat such attacks. Still, it is an open problem to be addressed as the flooding-based DDoS is difficult to handle as huge number of nodes are compromised to make attack and source address spoofing is employed. In this paper, we proposed a framework to identify and secure P2P communications from a DDoS attacks in distributed environment. Time-to-Live value and distance between source and victim are considered in the proposed framework. A special agent is used to handle information about nodes, their capacity, and bandwidth for efficient trace back. A Simulation study has been made using NS2 and the experimental results reveal the significance of the proposed framework in defending P2P network and target hosts from high risk DDoS attacks.  


Author(s):  
Federico Franzoni ◽  
Xavier Salleras ◽  
Vanesa Daza

AbstractOver the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.


Author(s):  
Rajendra G. Singh ◽  
Margaret A. Bernard

In this research, improving on the quality of Reusable Learning Objects (RLOs) on a Peer-To-Peer (P2P) network is considered. The RLO was first redesigned to have a fundamentally inherent pedagogical structure, which gave it an immediate foundational level of quality in terms of opportunities related to reusability. Applying the Learning Object Review Instrument 1.5 (LORI 1.5) demonstrated that some of the elements are inherent in this new RLO design, so there was no need to constantly have such features evaluated with LORI. A modified LORI was therefore developed in order to evaluate the remaining features of the RLO. The research identified these remaining elements to produce a Review Rubric for scoring the RLO’s quality. In addition, an algorithm is given which considers one or more subject-matter experts as part of a review process. Utilizing the subject-matter experts in a P2P network involved the creation of special nodes to ensure data integrity and post-availability of the review scores for RLOs. The research concludes that the redesigned RLOs along with the corresponding Review Rubric and scoring algorithm produces a system suitable for a P2P network, where for the first time, RLOs can be shared of assured quality to promote eLearning within P2P networks.


2013 ◽  
Vol 664 ◽  
pp. 1076-1081
Author(s):  
Xin Chen

Recently, some proposals suggest to use a peer-to-peer network instead of servers to facilitate SIP user registration and location in IMS communication systems. Due to the lack of central authority, security issue becomes one of the main problems in such P2P IMS systems. In this paper, we propose a novel security architecture for P2P IMS system. By using this architecture, our P2P IMS system becomes a fully distributed secure system in which there is not a central server indeed. Furthermore, our system is a scalable system which is capable of anonymous yet accountable real time communication based on SIP protocol which enables the system compatible with any existing IMS systems.


Sign in / Sign up

Export Citation Format

Share Document