SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Empowering the RMI in
Java Approach
ABSTRACT




RMI is the action of invoking a method of a
remote interface on a remote object.
The three methods of RMI namely General ,
Activation and Custom Socket Factory are to
be evaluated empirically using parameters
like Round trip time , Latency and Packets
per Unit time. The graph plotted allows us to
gain an insight into the performance aspects
and other tradeoffs of RMI .
EXISTING SYSTEM








Invocation of a remote object can be achieved by means of the
existing methods namely: General, Activation and Custom
Socket factory methods.
In the General method, the server creates a number of remote
objects, makes references to those remote objects accessible,
and waits for clients to invoke methods on those remote objects.
The client gets a remote reference to one or more remote
objects in the server and then invokes methods on them.
The Activation method allows objects to begin execution on an
as-needed basis. This mechanism provides persistent
references to objects and manages the execution of object
implementations.
The Socket Factory method allows customized implementation
of sockets to cater to the user requirements. The amount and
the type of data that can be sent over the channel can be
specified.
PROPOSED SYSTEM


It is proposed to evaluate the performance of the
three methods (General, Activation and Custom
Socket Factory) by transferring different types of files
such as text, image and video .These files are
transferred using the three invocation methods and
their performance is evaluated by analyzing the
parameters: round trip time, latency and transmission
rate. The observations are tabulated and graphs are
drawn to facilitate the comparison of the three
methods of remote invocation. This offers the user an
insight into the best suitable method.


A Search mechanism is proposed to be
implemented to locate methods when the
host does not know where the method
actually resides. This system is categorized
into Keyword based search and Extension
based search. A user friendly GUI that will
hide the low level details is to be developed
which will provide easier access to the three
methods of invocation and will display the
results of the actions performed.
GENRAL METHOD


The General method deals with
invoking any method directly from
memory of the remote machine.
ACTIVATION METHOD


RMI Activation allows passive objects to
be brought into the active state by
instantiating it on an as needed basis.
CUSTOM SOCKET
FACTORY


Custom socket factory method allows
customization of socket depending on
the type and amount of data to be
transferred over the channel.
DESIGN
GENERAL

CLIENT

PARSER

ACTIVATION

CUSTOM
SOCKET FACTORY

REMOTE OBJECTS
CONCLUSION








The performance of the three methods of invocation (General
Method, Activation Method, Custom Socket Factory) are to be
evaluated using the parameters,

Round Trip Time (RTT)
The total time taken to download a file from the server
side to the client side
Latency
The time lag between beginning of a request for the
data and the moment it begins to be received.
Transmission Rate
The number of packets transferred per unit time




The evaluation was performed on a file of
size 3 MB. The file was transferred in each of
the three methods and the corresponding
values of RTT, Latency and Transmission
rate were observed and tabulated.
The graphs were plotted for each of these
performance parameters against constant file
size with 10 samples per method of
invocation

Weitere ähnliche Inhalte

Ähnlich wie Ppt

Ähnlich wie Ppt (20)

IRJET- Machine Learning Techniques to Seek Out Malicious Websites
IRJET- Machine Learning Techniques to Seek Out Malicious WebsitesIRJET- Machine Learning Techniques to Seek Out Malicious Websites
IRJET- Machine Learning Techniques to Seek Out Malicious Websites
 
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
 
RMI (Remote Method Invocation)
RMI (Remote Method Invocation)RMI (Remote Method Invocation)
RMI (Remote Method Invocation)
 
Concurrent Online Test of RFID Memories Using MBIST
Concurrent Online Test of RFID Memories Using MBISTConcurrent Online Test of RFID Memories Using MBIST
Concurrent Online Test of RFID Memories Using MBIST
 
Activation
ActivationActivation
Activation
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
Rmi
RmiRmi
Rmi
 
Rmi
RmiRmi
Rmi
 
Remote method invocation
Remote method invocationRemote method invocation
Remote method invocation
 
As4301234238
As4301234238As4301234238
As4301234238
 
Report on mini project(Student database handling using RMI)
Report on mini project(Student database handling using RMI)Report on mini project(Student database handling using RMI)
Report on mini project(Student database handling using RMI)
 
DS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdfDS R16 - UNIT-3.pdf
DS R16 - UNIT-3.pdf
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud Provisioning
 
Java RMI
Java RMIJava RMI
Java RMI
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method Invocation
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
 
Rmi
RmiRmi
Rmi
 
Remote method invocatiom
Remote method invocatiomRemote method invocatiom
Remote method invocatiom
 
Module 3 remote method invocation-2
Module 3   remote method  invocation-2Module 3   remote method  invocation-2
Module 3 remote method invocation-2
 
Rmi presentation
Rmi presentationRmi presentation
Rmi presentation
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Ppt

  • 1. Empowering the RMI in Java Approach
  • 2. ABSTRACT   RMI is the action of invoking a method of a remote interface on a remote object. The three methods of RMI namely General , Activation and Custom Socket Factory are to be evaluated empirically using parameters like Round trip time , Latency and Packets per Unit time. The graph plotted allows us to gain an insight into the performance aspects and other tradeoffs of RMI .
  • 3. EXISTING SYSTEM     Invocation of a remote object can be achieved by means of the existing methods namely: General, Activation and Custom Socket factory methods. In the General method, the server creates a number of remote objects, makes references to those remote objects accessible, and waits for clients to invoke methods on those remote objects. The client gets a remote reference to one or more remote objects in the server and then invokes methods on them. The Activation method allows objects to begin execution on an as-needed basis. This mechanism provides persistent references to objects and manages the execution of object implementations. The Socket Factory method allows customized implementation of sockets to cater to the user requirements. The amount and the type of data that can be sent over the channel can be specified.
  • 4. PROPOSED SYSTEM  It is proposed to evaluate the performance of the three methods (General, Activation and Custom Socket Factory) by transferring different types of files such as text, image and video .These files are transferred using the three invocation methods and their performance is evaluated by analyzing the parameters: round trip time, latency and transmission rate. The observations are tabulated and graphs are drawn to facilitate the comparison of the three methods of remote invocation. This offers the user an insight into the best suitable method.
  • 5.  A Search mechanism is proposed to be implemented to locate methods when the host does not know where the method actually resides. This system is categorized into Keyword based search and Extension based search. A user friendly GUI that will hide the low level details is to be developed which will provide easier access to the three methods of invocation and will display the results of the actions performed.
  • 6. GENRAL METHOD  The General method deals with invoking any method directly from memory of the remote machine.
  • 7. ACTIVATION METHOD  RMI Activation allows passive objects to be brought into the active state by instantiating it on an as needed basis.
  • 8. CUSTOM SOCKET FACTORY  Custom socket factory method allows customization of socket depending on the type and amount of data to be transferred over the channel.
  • 10. CONCLUSION     The performance of the three methods of invocation (General Method, Activation Method, Custom Socket Factory) are to be evaluated using the parameters, Round Trip Time (RTT) The total time taken to download a file from the server side to the client side Latency The time lag between beginning of a request for the data and the moment it begins to be received. Transmission Rate The number of packets transferred per unit time
  • 11.   The evaluation was performed on a file of size 3 MB. The file was transferred in each of the three methods and the corresponding values of RTT, Latency and Transmission rate were observed and tabulated. The graphs were plotted for each of these performance parameters against constant file size with 10 samples per method of invocation