SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
Jini Technology
CONTENT
Introduction about JINI.
History
Goal of JINI.
Architecture.
Component of JINI.
Benefits of JINI.
Limitations of JINI.
Application of JINI.
Conclusion.
References.
INTRODUCTION
 Jini technology provides a simple infrastructure for
delivering services(application, database, printing,
storage etc) in a network and for creating an interaction
between programs that use these services regardless of
their hardware/software implementation.
 Services can be added or removed from the network and
new clients can find existing services.
HISTORY
 The idea of the Jini system was invented by Sun
cofounder Bill Joy at Sun Aspen Small works R&D lab
in 1994.
 Sun introduced Jini in July 1998. In November of 1998,
Sun announced that there were some firms supporting
Jini.
 The word 'jini' means "the devil" which is the origin of
the English word 'genie'. On January 25, 1999, Jini was
officially launched and the technology is available for
download.
GOAL OF JINI TECHNOLOGY
 To enable users to share services and resources over a
network.
 To provide users the ability to access resources anywhere
easily on the network, even though the network location
of the user may constantly change.
 To simplify the task of creating and managing network
devices, software services, and users.
JINI ARCHITECTURE
 Connects to a TCP/IP network.
 Use a discovery protocol to
find at least one lookup service.
 Register with the lookup
service.
 Continue to renew the
resource's releases, as long as
the service is available to the
network.
BENEFITS OF JINI
 It is easy to add and remove services.
 Services can be relocated on the network without
affecting users.
 JINI is open-source, meaning that the program code is
freely available on the Internet and there are no fees for
using it.
 The JINI architecture is scalable.
 Services are available immediately and are found
automatically.
 Everyone can access to same information & resources.
LIMITATIONS
 Depends on java/RMI or external mechanism for
security.
 Does not scale well to very large systems because jini
use lookup service as a broker between client & services.
COMPONENTS
 Services
 Lookup Services
 Discovery and Join
 Extended RMI
 Leasing
 Transactions
 Java Spaces
 Distributed Security
 Distributed Events
SERVICES
 A service can be anything that sits on the network
and is ready to perform a useful function. Hardware
devices, software, communications channels – even
human users themselves -- can be services
 Services may be added or withdrawn from a Jini
federation at any time
 Jini provides mechanisms for service registration,
lookup and use
 Services communicate by using a service protocol =
set of Java interfaces
 Set of services is open-ended
LOOKUP SERVICES
 Lookup Services are the central organizing
mechanism for Jini-based systems and provide
mapping of interfaces to objects. Lookup enables a
client to query a lookup service for services that can
help the client accomplish its goals
 Hierarchical Lookup: Lookup service may include
entry for other lookup services. When new services
become available on the network, they register
themselves with a lookup service
 When clients wish to locate a service to assist with
some task, they consult a lookup service
 The runtime infrastructure uses one network-level
protocol, called discovery, and two object-level
protocols, called join and lookup
DISCOVERY AND JOIN
 Discovery is the protocol by which Jini services register
themselves with a lookup service
 Discovery or Lookup is performed by doing a multicast
(to find all lookup services) or unicast (when you know
the machine on which the lookup service is running)
lookup. Jini™ enabled Object (representing a hardware
and/or software service) multicasts a packet with a
reference to itself
 The service receives RMI reference to Lookup service
(one or more)
 The service joins a federation by placing an object
representing capabilities into the Lookup service for
other clients and services to use for a period of time
 Discovery enables clients and services to locate lookup
services
 Join enables a service to register itself in a lookup
service
EXTENDED RMI
 Communication among services uses Java RMI
 Extended with leases
 RMI provides
 Activation
 Distributed Garbage Collection
 Multicast
 Replication
LEASING
 A lease is a grant of guaranteed access over a time period.
 Each lease is negotiated between the user of the service
and the provider of the service as part of the service
protocol
 A service is requested for some period; access is granted
for some period, presumably taking the request period into
account. Leases in term of duration (relative time)
– lookup service needs to use resource to maintain
registration
– device failure can cause error in the available service log
 If lease expires without renewal, user and provider can free
associated resource
 Leases handle client and network failures, removal of
services…
 Leases in Jini is self-healing. Exclusive lease says service
cannot be shared
TRANSACTIONS
 Partial failure in distributed systems is a nightmare
 A series of operations, either within a single service
or spanning multiple services, can be wrapped in a
transaction
 The Jini Transaction interfaces supply a service
protocol needed to coordinate a two-phase commit
– all results save in temporary storage
– move from temporary to permanent storage
 Insures changes made atomically- all or none
 The very semantics of the notion of a transaction is
left up to the service using the interfaces
JAVA SPACES
The JavaSpaces technology is written in the Java
language and is a simple, fast and unified mechanism for
dynamic communication, co-ordination and sharing of
objects
 In a distributed application, JavaSpaces technology
acts as a virtual space between providers and
requestors of network resources or objects
 participants in a distributed solution can exchange
tasks, requests information in the form of Java
technology-based objects
 JavaSpaces technology provides developers with the
ability to create and store objects with persistence
DISTRIBUTED SECURITY
 The design of the security model for Jini technology
is built on the twin notions of a principal and an
access control list.
 Jini services are accessed on behalf of some entity—
the principal, which generally traces back to a
particular user of the system.
 Services themselves may request access to other
services based on the identity of the object that
implements the service. Whether access to a service
is allowed depends on the contents of an access
control list that is associated with the object.
 Security plays an important role in distributed
systems. The Jini security model is based on the
JDK 1.2 security system.
DISTRIBUTED EVENTS
 Jini supports distributed events
 An object may allow other objects to register interest
in events in the object and receive a notification of
the occurrence of such an event
 Uses the Observer pattern and sensitive to network
issues – delays, disruptions etc
 Serializable and can be moved across a network
 Most useful in observing service changes – lookup
services going up or down etc
 Enables distributed event-based programs to be
written with a variety of reliability and scalability
guarantees
REQUIREMENTS OF JINI
 An infrastructure which operates as a dynamically
distributed
system
 A common language and implementation that
enables low-overhead communication between
distributed objects
 A lookup service which identifies objects that supply
those services
 An add-in protocol which is implemented on each
device—this is called the discovery/join protocol
 A subtract-out mechanism—providing resilience
when a device is unplugged which is called leasing
APPLICATION
 Managing a Printer:
APPLICATION (CONT…)
 Managing NT server:
CONCLUSION
 Jini's promise is not limited to the domain of network
devices.
 It can be expanded to scanners, printers, phones, radios
etc.
 Before Jini can become the basis for such mission-
critical applications, its ability to scale up to thousands of
network devices and maintain high levels of security
needs to be tested under stress and refined.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.oeclib.in
Thanks

Weitere ähnliche Inhalte

Ähnlich wie jinitechnologyppt-170905081653.pdf

Information Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud SystemInformation Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud Systemdbpublications
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDEditor IJCATR
 
Jini java protocol ppt by Mubeen
Jini java protocol  ppt by MubeenJini java protocol  ppt by Mubeen
Jini java protocol ppt by Mubeenmubeenm50
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
Microservice - Intro and Discussion
Microservice - Intro and DiscussionMicroservice - Intro and Discussion
Microservice - Intro and DiscussionSagarDevkota8
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudIJERA Editor
 
Microservice architecture
Microservice architectureMicroservice architecture
Microservice architectureTouraj Ebrahimi
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
Ijaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruIjaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruijaprr
 
Object and component based middleware for distributed system development
Object and component based middleware for distributed system developmentObject and component based middleware for distributed system development
Object and component based middleware for distributed system developmentektabhalwara
 

Ähnlich wie jinitechnologyppt-170905081653.pdf (20)

Jini
JiniJini
Jini
 
Jini
JiniJini
Jini
 
JINI TECH PPT
JINI TECH PPTJINI TECH PPT
JINI TECH PPT
 
Information Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud SystemInformation Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud System
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
 
jini technology
 jini technology jini technology
jini technology
 
Jini java protocol ppt by Mubeen
Jini java protocol  ppt by MubeenJini java protocol  ppt by Mubeen
Jini java protocol ppt by Mubeen
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
Microservice - Intro and Discussion
Microservice - Intro and DiscussionMicroservice - Intro and Discussion
Microservice - Intro and Discussion
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed Service
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
Microservice architecture
Microservice architectureMicroservice architecture
Microservice architecture
 
Gw3312111217
Gw3312111217Gw3312111217
Gw3312111217
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Ijaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruIjaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguru
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Object and component based middleware for distributed system development
Object and component based middleware for distributed system developmentObject and component based middleware for distributed system development
Object and component based middleware for distributed system development
 

Kürzlich hochgeladen

Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...ThinkInnovation
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxronsairoathenadugay
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Klinik kandungan
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Availablegargpaaro
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraGovindSinghDasila
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNKTimothy Spann
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...gajnagarg
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...HyderabadDolls
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...HyderabadDolls
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...kumargunjan9515
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...HyderabadDolls
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxchadhar227
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 

Kürzlich hochgeladen (20)

Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service AvailableVastral Call Girls Book Now 7737669865 Top Class Escort Service Available
Vastral Call Girls Book Now 7737669865 Top Class Escort Service Available
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
Kalyani ? Call Girl in Kolkata | Service-oriented sexy call girls 8005736733 ...
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
Diamond Harbour \ Russian Call Girls Kolkata | Book 8005736733 Extreme Naught...
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 

jinitechnologyppt-170905081653.pdf

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On Jini Technology
  • 2. CONTENT Introduction about JINI. History Goal of JINI. Architecture. Component of JINI. Benefits of JINI. Limitations of JINI. Application of JINI. Conclusion. References.
  • 3. INTRODUCTION  Jini technology provides a simple infrastructure for delivering services(application, database, printing, storage etc) in a network and for creating an interaction between programs that use these services regardless of their hardware/software implementation.  Services can be added or removed from the network and new clients can find existing services.
  • 4. HISTORY  The idea of the Jini system was invented by Sun cofounder Bill Joy at Sun Aspen Small works R&D lab in 1994.  Sun introduced Jini in July 1998. In November of 1998, Sun announced that there were some firms supporting Jini.  The word 'jini' means "the devil" which is the origin of the English word 'genie'. On January 25, 1999, Jini was officially launched and the technology is available for download.
  • 5. GOAL OF JINI TECHNOLOGY  To enable users to share services and resources over a network.  To provide users the ability to access resources anywhere easily on the network, even though the network location of the user may constantly change.  To simplify the task of creating and managing network devices, software services, and users.
  • 6. JINI ARCHITECTURE  Connects to a TCP/IP network.  Use a discovery protocol to find at least one lookup service.  Register with the lookup service.  Continue to renew the resource's releases, as long as the service is available to the network.
  • 7. BENEFITS OF JINI  It is easy to add and remove services.  Services can be relocated on the network without affecting users.  JINI is open-source, meaning that the program code is freely available on the Internet and there are no fees for using it.  The JINI architecture is scalable.  Services are available immediately and are found automatically.  Everyone can access to same information & resources.
  • 8. LIMITATIONS  Depends on java/RMI or external mechanism for security.  Does not scale well to very large systems because jini use lookup service as a broker between client & services.
  • 9. COMPONENTS  Services  Lookup Services  Discovery and Join  Extended RMI  Leasing  Transactions  Java Spaces  Distributed Security  Distributed Events
  • 10. SERVICES  A service can be anything that sits on the network and is ready to perform a useful function. Hardware devices, software, communications channels – even human users themselves -- can be services  Services may be added or withdrawn from a Jini federation at any time  Jini provides mechanisms for service registration, lookup and use  Services communicate by using a service protocol = set of Java interfaces  Set of services is open-ended
  • 11. LOOKUP SERVICES  Lookup Services are the central organizing mechanism for Jini-based systems and provide mapping of interfaces to objects. Lookup enables a client to query a lookup service for services that can help the client accomplish its goals  Hierarchical Lookup: Lookup service may include entry for other lookup services. When new services become available on the network, they register themselves with a lookup service  When clients wish to locate a service to assist with some task, they consult a lookup service  The runtime infrastructure uses one network-level protocol, called discovery, and two object-level protocols, called join and lookup
  • 12. DISCOVERY AND JOIN  Discovery is the protocol by which Jini services register themselves with a lookup service  Discovery or Lookup is performed by doing a multicast (to find all lookup services) or unicast (when you know the machine on which the lookup service is running) lookup. Jini™ enabled Object (representing a hardware and/or software service) multicasts a packet with a reference to itself  The service receives RMI reference to Lookup service (one or more)  The service joins a federation by placing an object representing capabilities into the Lookup service for other clients and services to use for a period of time  Discovery enables clients and services to locate lookup services  Join enables a service to register itself in a lookup service
  • 13. EXTENDED RMI  Communication among services uses Java RMI  Extended with leases  RMI provides  Activation  Distributed Garbage Collection  Multicast  Replication
  • 14. LEASING  A lease is a grant of guaranteed access over a time period.  Each lease is negotiated between the user of the service and the provider of the service as part of the service protocol  A service is requested for some period; access is granted for some period, presumably taking the request period into account. Leases in term of duration (relative time) – lookup service needs to use resource to maintain registration – device failure can cause error in the available service log  If lease expires without renewal, user and provider can free associated resource  Leases handle client and network failures, removal of services…  Leases in Jini is self-healing. Exclusive lease says service cannot be shared
  • 15. TRANSACTIONS  Partial failure in distributed systems is a nightmare  A series of operations, either within a single service or spanning multiple services, can be wrapped in a transaction  The Jini Transaction interfaces supply a service protocol needed to coordinate a two-phase commit – all results save in temporary storage – move from temporary to permanent storage  Insures changes made atomically- all or none  The very semantics of the notion of a transaction is left up to the service using the interfaces
  • 16. JAVA SPACES The JavaSpaces technology is written in the Java language and is a simple, fast and unified mechanism for dynamic communication, co-ordination and sharing of objects  In a distributed application, JavaSpaces technology acts as a virtual space between providers and requestors of network resources or objects  participants in a distributed solution can exchange tasks, requests information in the form of Java technology-based objects  JavaSpaces technology provides developers with the ability to create and store objects with persistence
  • 17. DISTRIBUTED SECURITY  The design of the security model for Jini technology is built on the twin notions of a principal and an access control list.  Jini services are accessed on behalf of some entity— the principal, which generally traces back to a particular user of the system.  Services themselves may request access to other services based on the identity of the object that implements the service. Whether access to a service is allowed depends on the contents of an access control list that is associated with the object.  Security plays an important role in distributed systems. The Jini security model is based on the JDK 1.2 security system.
  • 18. DISTRIBUTED EVENTS  Jini supports distributed events  An object may allow other objects to register interest in events in the object and receive a notification of the occurrence of such an event  Uses the Observer pattern and sensitive to network issues – delays, disruptions etc  Serializable and can be moved across a network  Most useful in observing service changes – lookup services going up or down etc  Enables distributed event-based programs to be written with a variety of reliability and scalability guarantees
  • 19. REQUIREMENTS OF JINI  An infrastructure which operates as a dynamically distributed system  A common language and implementation that enables low-overhead communication between distributed objects  A lookup service which identifies objects that supply those services  An add-in protocol which is implemented on each device—this is called the discovery/join protocol  A subtract-out mechanism—providing resilience when a device is unplugged which is called leasing
  • 22. CONCLUSION  Jini's promise is not limited to the domain of network devices.  It can be expanded to scanners, printers, phones, radios etc.  Before Jini can become the basis for such mission- critical applications, its ability to scale up to thousands of network devices and maintain high levels of security needs to be tested under stress and refined.