Advertisement

Multimedia Tools and Applications

, Volume 53, Issue 2, pp 371–389 | Cite as

Application of a JXTA-overlay P2P system for end-device control and e-learning

  • Vladi KoliciEmail author
  • Keita Matsuo
  • Leonard Barolli
  • Fatos Xhafa
  • Arjan Durresi
  • Rozeta Miho
Article

Abstract

This work is motivated by the need to develop decentralized P2P approaches for controlling end-devices in a wide-area network without changing the network security policy. Much of current research work on P2P systems is devoted to P2P networks of standard peers such as PCs. Due to improvements of connections capabilities of mobile devices and end-devices, there is an increasing interest to design, implement and deploy full featured P2P networks that integrate standard peers, mobile devices and end-devices. In this paper, we use the JXTA-Overlay for the control of end-devices and e-learning in a P2P network. We considered as end-devices the smart box (which is used for stimulating the learners in our implemented P2P e-learning system), robot, and room lightening. We also considered the control of a mobile car in order to prove the applicability of our approach in wireless environment. The proposed approach, due to the capabilities of JXTA protocols to overcome firewalls and NATs, is able to control devices without changing network security policies. We evaluate the proposed system by many experiments and have shown that the proposed system has a good performance and can be used successfully for the control of end-devices and in e-learning.

Keywords

JXTA P2P systems e-learning, Java applications End-device control Mobile device SmartBox 

References

  1. 1.
    Barolli L, Xhafa F, Durresi A, De Marco G (2006) M3PS: a JXTA-based multi-platform P2P system and its Web application tools. I J Web Inform Syst 2(3/4):187–196CrossRefGoogle Scholar
  2. 2.
    Brookshier D, Govoni D, Krishnan N, Soto JC (2002) JXTA: Java P2P programming. Sams, CarmelGoogle Scholar
  3. 3.
    Charas P (2001) Peer-to-peer mobile network architecture. In: First international conference on peer-to-peer computing (P2P-2001), pp 55–61Google Scholar
  4. 4.
    Gehlen G, Aijaz F, Zhu Y, Walke B (2007) Mobile P2P web services using SIP. Mobile Inform Syst 3(3–4):165–185Google Scholar
  5. 5.
    Hu Z (2008) NAT traversal techniques and peer-to-peer applications. In: Proc. of the New Zealand computer science research student conference, pp 242–245Google Scholar
  6. 6.
    Jung S, Chang A, Gerla M (2008) Peer to peer video streaming in Bluetooth overlays. Multimed Tools Appl 37(3):263–292CrossRefGoogle Scholar
  7. 7.
    Iwata T, Miyazaki S, Takemoto M, Ueda K, Sunaga H (2004) P2P platform implementation on PDAs organizing ad hoc wireless network. In: Proc. of workshops of the symposium on applications and the internet (SAINT-2004 Workshops), pp 568–573Google Scholar
  8. 8.
    Karagiannis T, Broido A, Faloutsos M, Claffy K (2004) Transport layer identification of P2P traffic. In: Proc. of the 4-th ACM SIGCOMM conference on internet measurement, pp 121–134Google Scholar
  9. 9.
    Kubo K, Murakami J, Hoshi T (2003) Hybrid peer-to-peer systems for network monitoring of field devices. In: Proc. of SICE annual conference in Fukui, Fukui University, JapanGoogle Scholar
  10. 10.
    Kumar P, Sridhar G, Sridhar V, Gadh R (2005) DMW—a middleware for digital rights management in peer-to-peer networks. In: Proc. of the workshops of 16th international workshops on database and expert systems applications (DEXA-2005), Denmark, pp 246–250Google Scholar
  11. 11.
    Kuramochi K, Kawamura T, Sugahara K (2008) NAT traversal for pure P2P e-learning system. In: Proc. of 3rd international conference on internet and web applications and services, pp 358–363Google Scholar
  12. 12.
    Oram A (2001) Peer-to-Peer: harnessing the power of disruptive technologies, 1st edn. O’Reilly, Sebastopol, 448 ppGoogle Scholar
  13. 13.
    Purvis MK, Garside N, Stephen C, Nowostawski M, Oliveira M (2005) Multi-agent system technology for P2P applications on small portable devices. In: Moro G, Bergamaschi S, Aberer K (eds) Agents and peer-to-peer computing, third international workshop. Lecture notes in computer science, vol 3601. Springer, Berlin, pp 153–160CrossRefGoogle Scholar
  14. 14.
    Tuisku M (2004) Wireless Java-enabled MIDP devices as peers in a Grid infrastructure. In: Lecture notes in computer science, vol 2970. Springer, Berlin, pp 273–281Google Scholar
  15. 15.
    Xhafa F, Barolli L, Daradoumis Th, Fernandez R, Caballé S (2008) JXTA-Overlay: an interface for efficient peer selection in P2P JXTA-based systems. Int J Comput Stand Interfac 31:886–893CrossRefGoogle Scholar
  16. 16.
    Xhafa F, Fernandez R, Daradoumis T, Barolli L, Caballé S (2007) Improvement of JXTA protocols for supporting reliable distributed applications in P2P Systems. In: Proc. of NBiS-2007, Regensburg, Germany. LNCS vol 4658, pp 345–354Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Vladi Kolici
    • 1
    Email author
  • Keita Matsuo
    • 2
  • Leonard Barolli
    • 2
  • Fatos Xhafa
    • 3
  • Arjan Durresi
    • 4
  • Rozeta Miho
    • 1
  1. 1.Polytechnic University of TiranaTiranaAlbania
  2. 2.Fukuoka Institute of TechnologyFukuokaJapan
  3. 3.Technical University of CataloniaBarcelonaSpain
  4. 4.Indiana University Purdue UniversityIndianapolisUSA

Personalised recommendations