Download presentation
Presentation is loading. Please wait.
Published byJoanna Carpenter Modified over 9 years ago
1
Introduction to 學校:大同大學 班級: GI1 學號: 69606026 姓名:李奕銳 教師:葉慶隆 Jabber 1
2
Content 1 ﹑ Introduction 2 ﹑ What is Jabber 3 ﹑ Jabber Architecture 4 ﹑ Jabber technical 5 ﹑ Jabber message delivery process 6 ﹑ Jabber development 7 ﹑ Jabber advantages 8 ﹑ Conclusion 2
3
Introduction 1 ﹑ Jabber is the trade name of the XMPP Instant Messaging (IM) protocol. 2 ﹑ Extensible Messaging and Presence Protocol (XMPP) is an open source IM protocol designed to facilitate email using similar resource. 3 ﹑ As the Jabber is open source, Jabber instant messaging clients have been developed for all major operating systems, including Linux, Windows and Macintosh, as well as mobile solutions for PDAs, cellphones and even telephone interface. 3
4
What is Jabber 1 ﹑ Jabber is a free, open, XML-based protocol for real time message exchange. 2 ﹑ Jabber is similar to legacy instant messaging systems such as ICQ and MSN, but it is open extensible and decentralized. 3 ﹑ The Jabber protocol was approved to as a standard by the Internet Engineering Task Force in early 2004. 4 ﹑ Unlike other IM protocols, Jabber don’t have central server regulating it’s use. 4
5
Jabber architecture 1 ﹑ Jabber is a client-server architecture, not a direct peer-to-peer as some other messaging systems do. 2 ﹑ This means, that all Jabber data sent from one client to another must pass through at least one Jabber server. 3 ﹑ A Jabber client connects to a Jabber on a TCP socket over port 5222. 4 ﹑ The server keeps track of whether you are online or not, and when you go offline it stores any messages sent to you for delivery when you connect again. 5
6
Jabber Technical 1 ﹑ Jabber technologies started in the open-source community with the Jabberd server and client for windows, MacOS and Linux. 2 ﹑ As part of its work, the original Jabber team defined an open protocol for streaming XML over the wire. 3 ﹑ This protocol continues to grow in depth and breadth. 4 ﹑ Jabber technologies all use an open protocol, anyone may implement the protocol and they may use any code license. 6
7
Jabber Message Delivery Process 1 ﹑ Suppose juliet@capulet.com want to chat with romeo@montague.net. Juliet and Romeo each respectively have accounts on the capulet.com and montague.net servers.juliet@capulet.comromeo@montague.net 7
8
Jabber Message Delivery Process (cont.) 1 ﹑ Juliet’s client sends her message to the capulet.com server. 2 ﹑ If montague.net is blocked on capulet.com the message is dropped. 3 ﹑ The capulet.com server opens a connection to the montague.net server. 4 ﹑ The montague.net server delivers the message to Romeo. 5 ﹑ If capulet.com is blocked on montague.net, the message is droped. 6 ﹑ If Romeo is not currently connected, the message is stored for later delivery. 8
9
Jabber Development The IETF working group has produced a number of RFC protocol document: 1 ﹑ RFC 3920, Extensible Messaging and Presence Protocol (XMPP):Core which describes client-server messaging using two open ended XML streams. 2 ﹑ RFC 3921, Extensible Messaging and Presence Protocol:Instant Messaging and Presence describes instant message (IM), the most common application of XMPP. 9
10
Jabber Development (cont.) 3 ﹑ RFC 3922, Mapping the Extensible Messaging and Presence Protocol to Common Presence and Instant Messaging (CIPM) relates XMPP and the CPIM specifications. 4 ﹑ RFC 3923, End-to-End Signing and Object Encryption for the Extensible Messaging and Presence Protocol describes end to end encryption of XMPP messages using S/MIME. 10
11
Jabber advantages 1 ﹑Open 2 ﹑Standard 3 ﹑Proven 4 ﹑Decentralized 5 ﹑Secure 6 ﹑Extensible 7 ﹑Flexible 8 ﹑Divers 11
12
Open 1﹑ The Jabber protocols are free, open, public, and easily understandable. 12
13
Standard 1﹑ The Internet Engineering Task Force (IETF) has formalized the core XML streaming protocols as an approved instant messaging and presence technology under the name of XMPP. 13
14
Proven 1﹑ The first Jabber technologies were developed by “Jeremie Miller” in 1998 and are now quite stable. 14
15
Decentralized 1﹑ The architecture of the Jabber network is similar to email. 15
16
Secure 1﹑ Any Jabber server may be isolated from the public Jabber network. 16
17
Extensible 1﹑ Using the power of XML namespace, anyone can build custom functionality on top of the core protocol, to maintain interoperability, common extensions are managed by the Jabber software fundation. 17
18
Flexible 1﹑ Jabber applications beyond IM include network management, content syndication, collaboration tools, file sharing and remote system monitoring. 18
19
Divers 1﹑ A wide range of companies and open- source project use the Jabber protocols to build and deploy real-time applications and services. 19
20
Conclusion 1 ﹑ Jabber protocols and technologies provide a true open alternative to the closed, proprietary services offered by legacy IM venders such as AIM and MSN. 2 ﹑ Jabber’s IETF pedigree and XML foundation enable developers to create robust, near-real-time messaging and presence solutions for IM 20
21
THE END 21
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.