Monday, September 27, 2010

Find driving force behind IPv6


Editor's Note: In the course of further development of IPv6, the lack of impetus from the application of IPv6 will likely be a major obstacle to business - this is the recently held "2006 Global IPv6 Summit" to deliver us the most important information.

April 13, the annual global IPv6 event - the "2006 Global IPv6 Summit" in Beijing International Convention Centre. It was at this same location, the same event is already the fifth held. IPv6 Summit, and compared to previous years, this year's meeting site a lot of lonely, but experts and vendors still has had some exciting news: the domestic IPv6 network infrastructure of getting better, narrow the gap between domestic and foreign firms are the gap between manufacturers. More importantly, IPv6 will begin commercial service in 2008, attempts to provide a full range of services to the Beijing Olympics.

Has been the development of our country are based on the Government to promote IPv6-based. For example, the "Eleventh Five-Year Plan proposal" highlighted, to "strengthen the broadband communications network, Internet, digital television and next-generation information infrastructure"; National Development and Reform Commission also issued in 2003, "China Next Generation Internet Project ", which CNGI project. From the government to support and promote the development of IPv6 tremendous momentum.

However, with IPv6 network construction and application development to start, followed by some of the problems began: in the already completed and under construction IPv6 network, the application is still the main contents of the original IPv4; many users and operators investment in the IPv6 network is not out of business and applications. Originally, the business and application development should be the fundamental driving force for IPv6, but the current situation not the case. Some experts believe that with further development of IPv6, this lack of impetus from the application of IPv6 will likely be a major obstacle to business.

Getting better

IPv6 in addition to the IP address once and for all solve the shortage, but also considered bad IPv4 address various other issues, such as end to end IP connectivity, quality of service (QoS), mobility and so on. Based on strong technological advantages, IPv6 will become the mainstream of the field of data communication trends, and become the core technology of next generation network. At the summit, the Chinese project, said Wu Hequan clear: "development of the Internet has come to a crossroads, need a new starting point." In his view, the Internet is the new starting point for IPv6.

Back in 1998, China on the establishment of the first IPv6 trial network CERNET-IPv6. After that, IPv6 development concern, but the development of Debu bland. However, there are some new progress in the recent bear CNGI project six units, in addition to slightly lag China Netcom, China Telecom, China Unicom, China Mobile, China Railcom and Education Network CERNET2 other five have completed the equipment bidding. Which, CERNET2 is has completed the transformation of five key nodes, and smooth the overall translation of business.

All along, our cutting-edge technology on the Internet for research and development are mostly borne by the education industry, in the IPv6 research and development, the education sector also plays a very important role. According to the network director of the Center of Tsinghua University, CERNET Expert Committee Wu Jianping, director introduced, CERNET2's goal is to seize the opportunities the Internet replacement for the current Internet, the main technical issues of international cooperation in the design and construction of new generation Internet architecture.

The layout of the entire CNGI core objective is to connect 20 major cities located in the core nodes. In these 20 cities, 25 central universities to become a major node, high-speed connection of more than 100 research universities and qualified research institutions and R & D center, the minimum required bandwidth is 1G, and achieve the other core backbone network High-speed Internet. It also bears in North America, Europe, Asia-Pacific international next-generation high-speed Internet connectivity tasks.

CNGI project in assuming 6 units, the education network CERNET2 most significant achievements. According to reports, in March 2004, connecting Beijing, Shanghai and Guangzhou CERNET2 advancing slowly; in December 2004, connecting 20 cities in the CNGI-CERNET2 trunk advancing slowly, the network made a large-scale use of pure IPv6 routers present has been successfully running for over a year; the next step, CERNET2 plan the next generation of Internet technology for large-scale testing and application demonstration.

Wu Jianping, said: "China's CNGI backbone has been formed and the European Union, the United States about the size of the three major networks, the next generation of Internet research, network infrastructure, we have been going more toward the front of."

Mature domestic equipment

I remember a few years ago the global IPv6 Summit, the exhibition hall, almost all foreign manufacturers of display, there is no domestic manufacturers of the figure. However, in this conference, you can find Digital China, Huawei Technologies, CEC, good telecommunications and other domestic companies Snapshots show. After several years of development, domestic manufacturers and foreign manufacturers have narrowed the field in the IPv6 range.

As the starting point for the same R & D, coupled with technological homogeneity constraints, the field in the IPv6 routing, the overall performance of domestic and foreign manufacturers of equipment, not much difference. According to Wu Jianping introduction, completed five units of CNGI project tender, domestic equipment has become the biggest winner, with an average account for more than 80% share. This is known as the domestic equipment industry field in the IPv6 breakthrough achieved in one of the largest.

"As the number of foreign equipment vendors in the IPv4 and accumulated a considerable number of products and the advantages of technology, so IPv6 has not been able to become the focus of their development. While the domestic equipment manufacturers have an urgent need to seize this opportunity to catch up with IPv6 foreign companies, therefore, whether R & D or marketing strategies are extraordinarily positive. "Digital China Networks Limited Deputy General Manager and CTO, said the DPRK sunny. It is for this reason, Digital China IPv6 network in the field to speed up the pace, its self-developed DCRS-7600 Series IPv6 Gigabit Routing Switch product is a one-time through the "IPv6 Ready Phase-2" test. The Digital Network to help build the IPv6 Hainan Normal University, the summit also unveiled the campus network, and has attracted the concern of many participants.

IPv6 also some other areas of domestic manufacturers has made good results, although domestic manufacturers began research and development time IPv6 equipment later, but developing rapidly. According to reports, now the mainstream equipment manufacturers have been achieved in the core hardware support for IPv6, the forwarding of data has been relatively better. There are several models in RTNet laboratory model tests have reached the Ministry of Information Industry of the network license standards.

Currently, Juniper, Hitachi, Cisco and other companies have a full range of products to support the IPv6. In the domestic manufacturers, in addition to Digital China network, ZTE routers, switches, products also passed the IPv6 Forum IPv6_Ready test, and passed the China Telecom, China Mobile, China Netcom, China Unicom's IPv6 core network test equipment in interoperability testing. Huawei is also in the core routers and edge routers to provide full hardware support for IPv6.

However, while the functions of IPv6 equipment, better performance, but the stability of the equipment needs to be improved. IPv6 router device performance from the current point of view, its routing table capacity, hardware, wire-speed forwarding capability and strong, but these devices in the implementation of access control lists or unicast Reverse Path Forwarding strategies have an impact on the performance, extend the first performance poor stability of the equipment needs to be improved. In addition, the market switches with IPv6 functionality of three products less and IPv6 broadband access server, not much room for choice.

It is said that China-made equipment in the CNGI project bidding to become the biggest winner, not because of its leading edge technology, but for the policy of protection. Of course, affect the layout of future development of the Internet, CNGI tender protection of domestic equipment is understandable. But for domestic equipment makers, will undoubtedly further enhance the technological strength is the key.

Lack of killer applications

During this summit, Hainan Normal University, IPv6 IPv6 network construction as a typical case of high-profile appearance. The school through the construction of IPv6/IPv4 dual protocol network, to achieve large-scale IPv6 network, and the successful completion of large-scale migration of IPv4 to IPv6. However, this meeting shows most of the other cases also have stayed at the experimental stage.

Although this year has been to Hainan Normal University dormitory, library network access to the IPv6 network which, on the opening of a IPv6 network services to students, but most of the application and the application of the original IPv4 networks are not much different. IPv6 view of the whole building, such as VPN, home users online game, VOD, multicast, that require a large number of terminal equipment and address of the application and not universal, it also led to the needs of users of IPv6 is not so urgent. Wu Jianping appears in the current lack of innovative applications based on IPv6, IPv6 is impeding the development of one of the factors.

IGRS Information Technology Engineering Center, president of Sun Yuning, said: "In the next generation Internet development in China should be by the application to integrate, to bring the next generation of Internet application development." Vice president of China Telecom Beijing Research Hui-Ling Zhao, feels that the IPv6 development in technology, the barriers have been less obvious, its future development or market Xuqiu mainly face of the driving problems, it also requires a large number of innovative applications.

Currently, there are in the demonstration system and test the system in a very large number of IPv6 applications, has basically covered the range of people can imagine. Only in the home broadband demonstration network, there is a lot of applications: home appliances and terminals connected through a variety of networking technologies, through the living room media center experience of IPTV services, through the living room media center remote video phone, portable media center through the WLAN, USB, etc. from the PC to download content and play, home equipment, intelligent control. Moreover, the scientists also describe for us the broad prospects for the next generation Internet: support large-scale scientific computing, to support large-scale video conferencing, remote instrument control, real distance education.

"CNGI large-scale construction has started, but still no substantive commercial business, we hope that IPv6 can be driven CNGI application development." One expert as saying. Indeed, with the full roll out CNGI, IPv6 finally have our own place, and as a major hardware network routers have been able to achieve the hardware support for IPv6, the next step CNGI focus will be how to achieve and commercialization integration.

But good news is that, at the summit can be seen, the industry has begun to put more attention to IPv6 applications, covering the wireless devices, mobile multimedia terminals, monitors, home gateways and other fields. In the conference hall, there are also companies to bring video system based on IPv6. In addition, there is news that the application of standards for CNGI work is in progress. The above is undoubtedly conducive to promoting IPv6 commercial application.

Security issues still to be resolved
The summit demonstrated the many domestic manufacturers of equipment to support IPv6 and application.

In Wu Jianping view, only to replace IPv4 IPv6, only the problem of scalability issues, and security, many problems in real time now, and not well resolved. Wu Quan He also highlighted that, IPv6 encountered in improving the existing Internet security, scalability, quality assurance issues have some effect, but simply address the structural change can bring improvement is limited. "IPv6 Internet can fundamentally solve some of the existing fundamental issues. From this sense, IPv6 does not mean the next generation Internet."

Which, IPv6's security problems have raised concerns at the summit. IPv6 issue safety overseas experts warned that the next generation Internet architecture (IPv6), the hackers, viruses and other security issues will continue to plague the industry, even more serious.

Juniper Networks, Senior Network Architect Jeff Doyle said at the summit said that in IPv6, the security problem certainly exists, hackers, viruses and other problems will also exist, and there is no essential difference between the current Internet. "Some applications will be more attacks, such as the banking system will be more attacks for profit, this phenomenon may be very serious. In IPv6, the large number of P2P applications appear, it would increase attacks against the . "

Security experts believe, IPv6 is still unknown weaknesses. Foundstone Professional Services Security Advisor Cory Benninger previously said: "We believe in the IPv4 to IPv6 transition, the tunneling protocol may be vulnerable to attacks of weakness, and immaturity of IPv6 platform is the greatest weakness." For example, Cisco IOS IPv6 denial of service, Linux Kernel IPv6 Denial of Service, Windows operating system can easily become a target for IPv6 networks.

On the other hand, the transition from IPv4 to IPv6 implies the need to re-write software programs and install new hardware device, which also makes security issues become more apparent. Some experts said: "related to the safe operation of IPv6 network protocol conversion gateway and firewall products low, performance is also poor."

At present, no IPv6, security incidents do not know how to assess the safety topic IPv6 organization, but that does not mean that the future of the Internet more secure. Appear in the experts, IPv6 also provides more security for the user the opportunity, and along with the development of IPv6, there will be more security mechanisms to prevent this from happening. In addition, some equipment manufacturers have stepped up security in IPv6 input, such as Digital China network security by developing SAOP linkage agreement, with the agreement to ensure the controllability of the entire network, credible, evidence.

Judging from all the above, China's IPv6 building although getting better, but the whole industry is still in its infancy, Huan need government departments, research and development institutions, network operators, equipment manufacturers and service provider's full participation.






Recommended links:



MP4 to Flash



"Blue Screen" Hardware Reasons And Solutions



Expert Delphi



Types of Trojan horse



MP4 to 3GP



Design Reports 2



3GPP converter



Enhance THE "soft environment" out of the performance appraisal errors [1]



BRIEF Vehicles - Screen Savers



Wave escort firm in Hefei



How the Blaze was accompanied by low encirclement



Business Databases And Tools REVIEWS



Thought To Help In The Day To Enjoy From Under The Rising Voices



Fireworks In The Fade In Animation Production



A record OF random access Recordset



Friday, September 17, 2010

Carried out in the end to P2P: the story about the Jxta (2)



In Jxta 1.0 specification, a running service instance is always associated with an equivalent machine (you can imagine it is a peer "server" in charge of). In a peer group, only one service instance and the specified link on the other machine. This type of service is regarded as such services; If on the other services in charge of the machine when the machine on the other, then will not have access to the service. On the other hand, multiple instances of the same service to be installed in a redundant peer group multiple of the other machine, which is known as peer group services. Peer group service is Jxta network high-availability and fault tolerance of the key. Jxta application implementation is free to put any Jxta services such as services or as a peer group service for installation. Plumbing services, and other communications shall be provided on the abstract logic of the core Jxta pipeline services, often as a service to achieve peer group to ensure its always available.

Pipeline as Jxta specification defines, in the transmission of data between such machines, files, information, code or a way multimedia content is through the logical channel. Jxta pipeline used to send messages between machines on the other (which can take any content).

A pipe instance, logically, is such a resource within the group. The actual realization of pipeline instance is usually done through the pipe service. Traditional (like UNIX's) system of different, Jxta pipeline is one-way, asynchronous. Require two-way communication two equal machines will have to create two separate instances of the pipeline. Also with the traditional mechanisms like UNIX pipes or TCP / IP sockets different, Jxta end of pipe can be connected at different times to different on other machines, or do not connect. P2P networks for service providers to achieve redundancy, the only this one single concept is a revolutionary step. On the other machine at any point in time can be logically "pick up" channels. For example, imagine you want to use a spell checker service on the other machine. It can connect to a peer group's spell checker pipeline (the pipeline is used as redundancy to achieve peer group services) on. In this case, as long as at least one instance of the spelling checker in the peer group is still somewhere within the run, the machine will also be on other services.

Jxta 1.0 specification provides two general types of channels: point to point and broadcast (propagate).

On the other machine can use pipes to connect to another point on the other machine and one-way transmission message. On the other machine can use the radio channel connected to one or more other peer transmit a message to them all. In essence, the point is one to one message transmission pipeline system, radio channels is one to many message delivery mechanism. Jxta community-many message delivery mechanism is being efforts; this mechanism has been named Jxta conductor (wire). No matter what type of pipe, through a pipe containing the information pieces are sent as Jxta news. So, the exact format of these messages is like?

News Jxta message is piped from a peer to another peer transfer of data bundle. Here, Jxta standard once again in general to adapt themselves as much as possible, so as not to inadvertently introduce the definition of the message depends on the implementation of any strategy. Message is defined as the envelope and body composition of any size beam. Envelope is a standard format that includes:

Header
Source endpoint information (URI format)
Destination endpoint information (URI format)
Message Digest (optional for security purposes)
Message body length is arbitrary, the trust can include an optional form (for security purposes) and content.

Please note, Jxta very loose definition of news. Taking into account our daily generally are reliable, broadband TCP / IP network operations, the need to do so is not immediately clear. But Jxta message format must be flexible, good at adapting to the new environment, because it may have to achieve all types of networks, not just in the TCP / IP on. Envisaged in a 256-byte packet transmission network is not reliable (like a traditional packet-based wireless network) on a Jxta to achieve, you'll define a simple message on the Jxta how to adapt itself to such an adverse environment such as appreciated.

In order to provide a standard, easy to analyze syntax, common coding scheme, Jxta message XML document format currently used. Jxta advantage of XML's universal accessibility and ease of use, easy programming, which means Jxta can use most of the programming language in most of the platform is easy to achieve. As long as the XML parser, and generate database is available there. However, Jxta of the design was to write a message code is not dependent on the use of XML. While it's unlikely, but Jxta communities included in a future version of specification (or requirements) based on non-XML message is entirely possible.

Identifier from the potential of speaking on Jxta, on the whole peer group might be linked with the universe as large. In the name of such a large space for any matters that the only name is a challenge. To address this problem, Jxta to Jxta components can be set to address each instance is assigned an internal identifier. This identification is carried out by a UUID, UUID is used to ensure that time and space are very high probability of the algorithm to generate only 64 bytes of digital. Jxta identifier is a URN (Uniform Resource Name) format, and is embedded in the advertisement for internal use. Defines four types of identifiers currently used to identify peer group, on the other machine, pipe and code / data (code / data) (abbreviated as codat).

Advertisement
Advertising messages a bit like "cousin." Jxta ads using XML document format. Describe the content of advertising, such as peer, peer group, pipe or service Jxta component instance properties. For example, you can visit another ad on the other machine on the other machine can try to connect directly to the peer machines; can access a peer group of ads on other machines can join the peer group advertisement. The current Internet with ads similar to what is the DNS domain name and Web site records. Jxta specification does not stipulate how to create, disseminate, or destruction of advertising.

The basis for interoperability: Jxta protocol interoperability Another key is the fact that: the core Jxta peer interaction model is fully represented in the underlying network transmission of a simple protocol. In other words, since the protocol and message format is well-defined, then Jxta-based interoperability between systems are fully capable of Daoxian level reached.

For example, a simple PDA (8-bit processors, based on C language programming) can be a running packet-based wireless networks Jxta on the other machine, it can be the same peer group with a variety of systems, from PC servers to mainframes, to interact. If on the other machines to share a public network (Carrier) and is using Jxta communication protocol and message format, which can be done.

Sun has provided a preliminary Jxta Java language. Jxta community now has the reference implementation. The reference implementation for those who want to start the Java programmers to use Jxta things become simple. If you are non-Java platform to achieve Jxta, then the understanding of these agreements is very important. Table 2 briefly describes the core set of Jxta agreement, covering the discovery (on the other machine how to find each other), advertising (on the other machine on the other machine how to understand the other peer groups, pipes and other information), through the communication pipe and peer group membership handling. All of the following agreements are based on XML message exchange transmitter on the basis of. Similarly, they can use almost any programming language implemented on almost all platforms.

Table 2. Jxta core protocol

Jxta specification does not require such machines to achieve all of the above agreements. Any particular realization of the other machine only to those who actually use the protocol.

Jxta system based on some interesting properties
Now that you have a theoretical component of the Jxta platform have a basic understanding, we have to discuss the design results as Jxta some interesting properties.

"Electronic heart" of anything can become a Jxta on the other machine, theoretically, there is a text string generated the most simple equipment capacity can be added (although not in every P2P applications are necessary) to Jxta network. This is how it possible?

In P2P networks, over-simplified the equipment needs of the other agents. The agents can represent the simplified device (or more simplified device) implementation, the advertising and communications. Agent can be rigidly fixed in position simplified equipment. Thus, an agent with the help of simplified equipment on the network can be Jxta fully qualified peer. For example, a body tied to a turtle and to wirelessly send the location information with GPS Locator Jxta message, the network can be Jxta a peer.

Uncertain network topology in the order
Another typical Jxta network charming aspect is its inherent uncertainty of the topology / response structure. Computer users are often used to determine the nature, the synchronization of the computer system, and that this is a standard structure. For example, when we issued a Web page the browser requests a URL, we expect the output will appear immediately. We also hope that everyone in the world can use the same URL from the same Web server to retrieve the same page.

In Jxta world, not a specific request for resources in a few minutes, hours or even days to return; In fact, it may simply not return. In addition, request the same resources, people around the world are likely to get is completely different from the resources of the server copy. This raises a question: uncertainty system any good?

Inspiration from the grassroots software revolution
We only have to look like Napster and Gnutella P2P systems such as pop can find the answer. Here are some additional advantages of their features (which make the loss of synchronization and uncertainty have become worth):

Content availability.
On the other machine can access content from multiple servers, ideally close to boot from a server running gain. Original source of the other machines do not have a resource request for each service; In fact, it is not even switched on. The most optimal use of network bandwidth.
Typical of today's Web, local traffic congestion will not affect the concentration of lead in the P2P network.

Lower the cost of content distribution.
P2P networks can absorb the contents and copy it to make it easy to access.

From the network, each node of the computing power of balance.
Asynchronous operation, you can issue a number of resources or service requests, and then let the network for you to complete the work.

Unlimited scalability.
A well-designed P2P application can not affect the scalability limits which connects across the entire known universe; which is concentrated in any type model is completely impossible.

Jxta in perfect world, we will not perform asynchronous request deterministic networks. Weird do you think of this idea? Let us use an example to illustrate. Imagine a P2P network based on Jxta of running Web-based music request service. On the other machine submitted several requests for music files and some time to verify the group's request for such service is to find these files. When we check in for some time to music request service, some of the requested documents have been found, but others can not locate. Service response to those documents are: the choice and availability of music is constantly changing; Please try your request again later. This is an acceptable uncertainty of the results: Although the service could not find a file, but if we submit the same request again later, perhaps that file available, because we want the head of the file on other machines Then maybe a line.

When placed in the context of a specific time, the concept of uncertainty in the network no longer seem so strange. In fact, most of us probably will accept and use such a music request service. Some of us are even willing to pay for such a little cost of the automatic proxy, such proxy will continue to monitor the availability of the selected file, and then for us to take and store a copy of them. P2P computing is one of the great charm: a balanced and shared all over the world the ability to connect with the resources, I hope is an orderly and civilized manner.

The talk is finished, but the first few commercial breakthrough Jxta/P2P application was probably because of the certainty and synchronization as the main features of their pride. This is a necessary transition, because the user's habits and market orientation will not change overnight. If there is no mandatory reason, then the future will not change. The new P2P model will slowly emerge, at first may be based on a mixture of forms. A current example: Edge Communication (edge-propagation-based) network caching technology, such as Akamai, is deterministic, centralized Web on the specification. These techniques use the concept of P2P-style centralized server in the world to achieve optimization of content delivery.

Sun does not set out strategy to achieve its Jxta decision to make it free to move on and eliminate these arguments, pass the buck on who pioneered the content delivery technology pioneer Jxta their shoulders. However, at this stage, Jxta technology is based on the potential of community development make it the global control of IP (intellectual property) owners and the public good balance. Open Jxta community could serve as a forum, IP (intellectual property) owners and technical experts in this forum to resolve their differences.

Perspective Jxta, it is how. Net and Jini contest
Since Jxta are introduced, and it has been brought, and each can imagine comparing the network technology. Even the prestigious business magazine, has inadvertently left out of this innovation, because it obviously does not and the main competitor's flagship product hype contest. Jxta project is a unique "monster." In discussing the time it will not have any ready reference. Therefore, it must be evaluated independently.

To be sure, Jxta XML-based messaging and Microsoft (Microsoft)'s. Net and SOAP technology is similar. However, this relatively weak basis for comparison. As more and more third-party agreements used XML, it is clear only XML as the message format for the actual network technology and can not show much. The high-level, policy-rich, Web-based services based structure. Net and essentially low-level, basic, neutral Jxta strategy compared to pieces of meaningless things.

Jxta works and Jini projects are fundamentally different. They are both at a high level of interaction have some similarities, are able to achieve truly distributed computing network. However, a parallel was there came to an end. Because the real future of distributed computing is still only an idea, so it is easy to underestimate the Jxta and the difference between the Jini project, despite the fact that we have established in the relatively more client / server or multi-server technology is not realized will do the same thing.

Both the clear differences in strategy are: Jxta at the outset to fully interoperable technologies (any platform, any programming language, any vendor) of the face appears. Sun is the only company engaged in the community. Jini is a Java-centric technologies as a strategy, Sun will integrate and apply it to provide products in the future. Sun Jini development will maintain a certain degree of control.

No Java platform (code flexibility, RMI, etc.) support, Jini's relevance will be limited; on the other hand, Jxta is completely independent of Java's decoration. From another perspective: Sun Jxta only in promoting the growth orientation, while the Sun and Jini is there between the growth of more interest. Over time, Jini will be Jxta's "increasingly inward-looking cousins"; it as an embedded technology is used to enable the deployment of many products. Jxta fate, on the other hand, will depend on the technology involved in the opening members of the community's enthusiasm and creativity.

Jxta versatility
Mechanism rather than requiring the provision of infrastructure strategy, Jxta foundation for many P2P applications are available and valuable. Here are three other common Case Study:

On the other machine's users to search and share files within the peer group, information and content
Peer to peer group to use only in this particular peer group can be used for specific services
Peer group on the other machine through the gateway and between peer groups through the instant messaging system
Of course, the possible applications are endless, many of which have yet to be developed or even conceived.






Recommended links:



"Storm the 1st" Crazy transmitted infections rose sharply to 100 000



Customize The "Send To" Menu



Best Religion



My favorite Java And JavaScript



10 tips to help you pass The interview off



avi to PS3



Jinshan Jinshan Nu Pi typing through repeated fake "Li GUI," poisonous pit Users



Macro and micro dogs the Difference between a dog



My favorite Web SERVERS



Ps3 Video Format



Good Efficacy Is The Man Manao Out



MicroStrategy to support Apple? IPhone?



mkv to divx



Cool song found the Dog's omnipotent tool



mts CONVERSION