Applying Peer-to-Peer Technology to the Building of Distributed Educational Systems

By Leighton, Greg; Muldner, Tomasz | Journal of Interactive Learning Research, Fall 2005 | Go to article overview
Save to active project

Applying Peer-to-Peer Technology to the Building of Distributed Educational Systems


Leighton, Greg, Muldner, Tomasz, Journal of Interactive Learning Research


Existing educational systems built for cooperative and collaborative activities are most often based on the client/server paradigm of distributed computing. This article shows that a new model for distributed computing, Peer-to-Peer (P2P), provides new opportunities for building distributed educational applications. It begins by reviewing general aspects of distributed educational applications and the design requirements for building such systems. Then, the applicability of several existing collaborative P2P applications to educational settings is examined. The final portion of the article is devoted to a description of the features offered by Acadia P2P-based Educational eXchange (APEX), an application designed by the authors. APEX is based on the Project JXTA P2P Framework.

**********

With the increased availability of powerful personal computers and fast networks there is a growing trend towards distributed educational applications that emphasize interaction and team work. Groupware or computer-supported cooperative work (CSCW) refers to computer-based systems that provide an interface to a shared environment in order to support groups of people working towards a common goal (CSCW, 2003). One of the most popular models of distributed educational applications is the electronic classroom, in which every student and the teacher have access to a personal computer (Shneiderman, 1995). Another reason for the interest in this area of research is the growing number of universities which have built fully computerized campuses. For example, Acadia University (MacDougall, Muldner, & Tomek, 1998; Tomek & Muldner, 1999) provides each faculty member and full-time student with a laptop computer. In addition, each classroom and dormitory on the Acadia campus contains access points to the campus network. This provides many opportunities for various types of computer-supported interaction. There are two kinds of electronic classrooms using this technology: synchronous, face-to-face systems in which the teacher and students share the same room, and asynchronous, virtual classrooms in which students can be geographically dispersed as is the case with distance education.

Most known implementations of distributed educational applications use standard Java-based technologies (Muldner, 1998). The favored model for building such applications has been client/server, where numerous "thin" client systems containing little application logic interact with a much smaller number of "thick" server systems, which contain the bulk of the application logic (Leighton, 2003). The client/server model has several inherent weaknesses. First, a centralized server creates a bottleneck on the system's performance, scalability, and reliability. The reason for these problems is that the availability of a client/server-based application is entirely dependent on whether these servers are currently operational. Second, client/server applications tend to be monolithic in their design, which makes it difficult to extend an existing application without affecting the original functionality. As an example of a system that encounters these problems, consider an example-driven system, designed to allow students to share examples of programs in C (Muldner & Phang, 1999; Muldner & Shiv, 2000, 2001). In the client/server implementation, a student who wants to share examples with other students has to connect to the server, and leave a copy of these examples on the server, where other students can fetch them. This server creates a bottleneck in the sense mentioned.

Recent security attacks have increased the popularity of firewalls (Zwicky, Cooper, & Chapman, 2000), which provide a means of securing a network from outside attack by limiting the ability of computer systems located outside of the network to connect to computer systems inside the network. At the same time, since IP addresses are a scarce resource, most Internet Service Providers (ISPs) use dynamic IP addresses and network address translation (NAT) schemes (Network Address Translation FAQ, 2003), which provide a mapping between the internal network address of a computer system inside a subnetwork and the external network address that is reported to any systems located outside of the subnetwork.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Applying Peer-to-Peer Technology to the Building of Distributed Educational Systems
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?