Scott Oaks is a Java Technologist at Sun Microsystems, where he has worked since 1987. While at Sun, he has specialized in many disparate technologies, from the SunOS kernel to network programming and RPCs. Since 1995, hes focused primarily on Java and bringing Java technology to end-users. Scott also authored OReillys Java Security, Java Threads and Jini in a Nutshell titles.
is one of the lead senior architect of Project JXTA at Sun Microsystems since the project started. Currently, he is acting as engineering manager leading the Sun core engineering team and evangilizing JXTA to the open source community and Sun customers and partners.
Li Gong is a well-known developer in the Java Community and an active member of the Project JXTA. Li is the JXTA Engineering Director for the JXTA CORE.
Preface | p. ix |
Introducing JXTA | |
Introduction to JXTA | p. 3 |
What Is JXTA? | p. 3 |
Why JXTA? | p. 5 |
JXTA Overview | p. 7 |
Getting Started with JXTA | p. 10 |
Setting Up a Java Environment | p. 10 |
Basic JXTA Concepts | p. 12 |
JXTA Peers | p. 13 |
Peergroups | p. 16 |
Discovery | p. 20 |
JXTA Application Configuration | p. 24 |
Pipes | p. 29 |
Advertisements | p. 36 |
A Hello World Example | p. 39 |
Peergroups | p. 40 |
Running JXTA Applications | p. 41 |
Advertisements | p. 41 |
Peergroup Services | p. 45 |
Service Advertisement and Discovery | p. 47 |
An Auctioning Example | p. 47 |
JXTA Discovery | p. 50 |
The Service Implementation | p. 53 |
The Application Implementation | p. 59 |
Running the Example | p. 62 |
Key Benefits of Discovery | p. 65 |
The Pipe API | p. 68 |
Creating Pipes | p. 68 |
Pipe Messages | p. 76 |
Pipe Discovery | p. 83 |
Running the Pipe Example | p. 93 |
Event-Based Programming | p. 94 |
JXTA Network Services | p. 102 |
JXTA Services | p. 103 |
JXTA Modules | p. 105 |
A Peer Service Example | p. 108 |
A Peergroup Service Example | p. 114 |
Integration with Other Network Services | p. 131 |
Security | p. 138 |
JXTA Security Framework | p. 138 |
JXTA Cryptography | p. 140 |
JXTA Keys | p. 141 |
The JxtaCrypto Interface | p. 144 |
Ciphers | p. 145 |
The Signature Class | p. 146 |
The Hash Class | p. 150 |
Secure JXTA Pipes | p. 151 |
User Credentials | p. 152 |
JXTA Authentication | p. 153 |
Quick Reference | |
How to Use This Quick Reference | p. 165 |
Finding a Quick-Reference Entry | p. 165 |
Reading a Quick-Reference Entry | p. 166 |
The net.jxta.* Packages | p. 173 |
The jxta.security.* Packages | p. 244 |
The jxta.security.impl.* Packages | p. 261 |
The JXTA Shell Reference | p. 275 |
The JXTA Protocol Specification | p. 297 |
Core Protocols | p. 298 |
Standard Services Protocols | p. 298 |
Endpoint Messages | p. 299 |
Requirements for JXTA Protocols | p. 300 |
JXTA Assumptions | p. 300 |
Why JXTA? | p. 302 |
The JXTA Three-Layer Cake | p. 303 |
Conceptual Overview | p. 304 |
JXTA Core Protocol Specification | p. 312 |
Endpoint Routing Protocol | p. 312 |
Peer Resolver Protocol | p. 320 |
The JXTA Advertisement Specification | p. 326 |
XML and JXTA Advertisements | p. 326 |
Rendezvous Advertisements | p. 334 |
The JXTA ID Specification | p. 335 |
Format of a JXTA ID URN | p. 335 |
Using JXTA IDs in Protocols | p. 336 |
Example JXTA ID URNs | p. 336 |
JXTA ID Properties | p. 337 |
JXTA ID Formats | p. 337 |
JXTA ID Types | p. 337 |
JXTA ID UUID Format Type | p. 339 |
The JXTA Message Specification | p. 343 |
Messages | p. 343 |
Elements | p. 343 |
Binary Message Format | p. 344 |
XML Message Format | p. 346 |
The JXTA Standard Services Protocol Specification | p. 348 |
Peer Discovery Protocol | p. 348 |
Rendezvous Protocol | p. 352 |
Pipe Binding Protocol | p. 357 |
The JXTA Standard Transport Bindings Specification | p. 359 |
TCP/IP Transport Binding | p. 359 |
HTTP Transport Binding | p. 360 |
Bibliography | p. 365 |
Class, Method, and Field Index | p. 367 |
Index | p. 377 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.