SlideShare a Scribd company logo
1 of 17
JINI Technology
presented
by:
sravya.s
14A81A05B1
Contents
Introduction to jini
Who developed jini?
What is jini?
Key concepts
How it works?
Advantages
Disadvantages
Conclusion
Introduction to jini
Any type of network made of services of clients of thoseAny type of network made of services of clients of those
services can be easily assembled,dissembled andservices can be easily assembled,dissembled and
maintained on the network using jini technology.maintained on the network using jini technology.
Jini technology provides a simple infrastructure forJini technology provides a simple infrastructure for
delivering services in a network and for creating andelivering services in a network and for creating an
interaction between programs that use these servicesinteraction between programs that use these services
regardless of their hardware/software implementationregardless of their hardware/software implementation
Who Developed JINI?
The idea of the jini system was invented by sunThe idea of the jini system was invented by sun
cofounder bill joy at sun aspen small works R&D lab incofounder bill joy at sun aspen small works R&D lab in
1994.1994.
In january 1999 download of jini realised from sunIn january 1999 download of jini realised from sun
website.website.
What is JINI?
 Jini is set of specifications that enables these services toJini is set of specifications that enables these services to
discover each other on a network and that provides adiscover each other on a network and that provides a
framework that allows those services to participate inframework that allows those services to participate in
certain type of operations.certain type of operations.
 Jini is all about services.Jini is all about services.
 It lets devices communicate immediately on a networkIt lets devices communicate immediately on a network
without human intervention.without human intervention.
 Jini client that loses contact with a server can recoverJini client that loses contact with a server can recover
and continue processing.and continue processing.
Key Concepts
ServicesServices
Lookup ServicesLookup Services
JRMIJRMI
TransactionsTransactions
LeasingLeasing
Java SpacesJava Spaces
 SecuritySecurity
Services
AA serviceservice can be anything that sits on the network andcan be anything that sits on the network and
is ready to perform a useful function. Hardware devices,is ready to perform a useful function. Hardware devices,
software, communications channels – even human userssoftware, communications channels – even human users
themselves -- can be servicesthemselves -- can be services
Services may be added or withdrawn from a Jini at anyServices may be added or withdrawn from a Jini at any
timetime
Services communicate by using a service protocol = set ofServices communicate by using a service protocol = set of
Java interfacesJava interfaces
Lookup Services
It is core of jini functionality.It is core of jini functionality.
It holds registrations of all services.It holds registrations of all services.
 Hierarchical LookupHierarchical Lookup: Lookup service may include: Lookup service may include
entry for other lookup services.entry for other lookup services.
When new services become available on the network,When new services become available on the network,
they register themselves with a lookup service.they register themselves with a lookup service.
Lookup service enables a client to query a lookup serviceLookup service enables a client to query a lookup service
for services.for services.
JRMI
Communication among services uses Java RMICommunication among services uses Java RMI
RMI providesRMI provides
 Distributed Garbage Collection.Distributed Garbage Collection.
 MulticastMulticast..
TransactionsTransactions
 Partial failure in distributed systems is a night mare.
 A series of operations ,either within a single service orA series of operations ,either within a single service or
multiple services can be wrapped in a transaction.multiple services can be wrapped in a transaction.
Leasing
A lease is a grant of guaranteed access over a timeA lease is a grant of guaranteed access over a time
period. Each lease is negotiated between the user of theperiod. Each lease is negotiated between the user of the
service and the provider of the service as part of theservice and the provider of the service as part of the
service protocol.service protocol.
Leases handle client and network failures, removal ofLeases handle client and network failures, removal of
services.services.
Leases in Jini is self-healing. Exclusive lease says serviceLeases in Jini is self-healing. Exclusive lease says service
cannot be shared.cannot be shared.
Security
The design of the security model for Jini technology is built on theThe design of the security model for Jini technology is built on the
twin notions:twin notions:
1)A principle.1)A principle.
2)An access control list.2)An access control list.
Security plays an important role in distributed systems. The JiniSecurity plays an important role in distributed systems. The Jini
security model is based on the JDK 1.2 security system.security model is based on the JDK 1.2 security system.
javaspacesjavaspaces
Javaspaces is a jini service that builds and maintains a database ofJavaspaces is a jini service that builds and maintains a database of
java objects.java objects.
Javaspaces provide communication through sharing java objects.Javaspaces provide communication through sharing java objects.
How it works
• To use a service, a person or a program locates the
service using the lookup service.
• The service's interface is copied from the lookup
service to the requesting device where it will be used.
• The lookup service acts as a switchboard to connect a
client looking for a service with that service.
• Once the connection is made, the lookup service is
not involved in any of the resulting interactions
between that client and that service
How it works
ADVANTAGES
Jini is open source.
Jini supports an extremely flexible network as services
and clients can move code to where it is needed.
New services are easy to program in java and can be
easily added to the network.
DISADVANTAGES
• Depends on java/RMI or external mechanism for
security.
• Does not scale well to very large systems because jini use
lookup service as a transmitter between client & services.
• One of the most restricting ones is not compatable with
the kilobyte virtual machines[sun99j],72 which is a very
limited VM.it is targeted to embedded devices with
approximately 128 kilobytes of available memory.
Conclusion
The overall goal is to turn the network in to flexible,
easily administered tool on which resources can be found
by human and computational clients.
Resources can be implemented as either hardware
devices , software program’s, or a combination of the
two. you can use the jini network technology to create
network technology systems that are scalable, evolvable
and flexible, in dynamic run time environments in a multi
faceted way.
Thank you
BbTHANK YOU

More Related Content

What's hot

Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security Akhila Param
 
Jini network technology
Jini  network   technologyJini  network   technology
Jini network technologyKeerthi Thomas
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelDr Neelesh Jain
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigmRipal Ranpara
 
Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corbaMayuresh Wadekar
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingShreyas Khare
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureMonishaNehkal
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computinggaurav jain
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingNalini Mehta
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 

What's hot (20)

14A81A05B1
14A81A05B114A81A05B1
14A81A05B1
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Jini network technology
Jini  network   technologyJini  network   technology
Jini network technology
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Virtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference ModelVirtualization in Cloud Computing and Machine reference Model
Virtualization in Cloud Computing and Machine reference Model
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Distributed objects & components of corba
Distributed objects & components of corbaDistributed objects & components of corba
Distributed objects & components of corba
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
IoT Protocol Stack.pdf
IoT Protocol Stack.pdfIoT Protocol Stack.pdf
IoT Protocol Stack.pdf
 

Similar to JINI Technology: A Guide to Dynamic Distributed Computing

Jini java protocol ppt by Mubeen
Jini java protocol  ppt by MubeenJini java protocol  ppt by Mubeen
Jini java protocol ppt by Mubeenmubeenm50
 
Mayur jini technology.pptx
Mayur jini technology.pptxMayur jini technology.pptx
Mayur jini technology.pptxmayurbankar2
 
jinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdfjinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdfPoojithaBollikonda
 
Jini new technology for a networked world
Jini new technology for a networked worldJini new technology for a networked world
Jini new technology for a networked worldSajan Sahu
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computingMandar Pathrikar
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
Chp11 infrastructure for ec
Chp11 infrastructure for ecChp11 infrastructure for ec
Chp11 infrastructure for ecEngr Razaque
 
HTTP Authorization using OPA
HTTP Authorization using OPAHTTP Authorization using OPA
HTTP Authorization using OPAKnoldus Inc.
 
Study of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudStudy of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudIOSR Journals
 
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...WSO2
 
Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...
Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...
Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...mfrancis
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
The elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioThe elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioInho Kang
 
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클Oracle Korea
 
Product positioning ss_v.1.03
Product positioning ss_v.1.03Product positioning ss_v.1.03
Product positioning ss_v.1.03Nimit Shishodia
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorCA API Management
 
What is the purpose of a bollard- It allows a security guard to examin.pdf
What is the purpose of a bollard- It allows a security guard to examin.pdfWhat is the purpose of a bollard- It allows a security guard to examin.pdf
What is the purpose of a bollard- It allows a security guard to examin.pdfanilagarwal8880432
 

Similar to JINI Technology: A Guide to Dynamic Distributed Computing (20)

JINI
JINIJINI
JINI
 
Jini java protocol ppt by Mubeen
Jini java protocol  ppt by MubeenJini java protocol  ppt by Mubeen
Jini java protocol ppt by Mubeen
 
Mayur jini technology.pptx
Mayur jini technology.pptxMayur jini technology.pptx
Mayur jini technology.pptx
 
jinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdfjinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdf
 
Jini+presentation
Jini+presentationJini+presentation
Jini+presentation
 
Jini new technology for a networked world
Jini new technology for a networked worldJini new technology for a networked world
Jini new technology for a networked world
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Chp11 infrastructure for ec
Chp11 infrastructure for ecChp11 infrastructure for ec
Chp11 infrastructure for ec
 
HTTP Authorization using OPA
HTTP Authorization using OPAHTTP Authorization using OPA
HTTP Authorization using OPA
 
Study of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudStudy of SaaS and its Application in Cloud
Study of SaaS and its Application in Cloud
 
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
 
What are
What areWhat are
What are
 
Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...
Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...
Using OSGi for Secure Service Discovery - Antonio Kung, Founder/Director, Tri...
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
The elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioThe elegant way of implementing microservices with istio
The elegant way of implementing microservices with istio
 
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
 
Product positioning ss_v.1.03
Product positioning ss_v.1.03Product positioning ss_v.1.03
Product positioning ss_v.1.03
 
Layer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public SectorLayer 7: Cloud Security For The Public Sector
Layer 7: Cloud Security For The Public Sector
 
What is the purpose of a bollard- It allows a security guard to examin.pdf
What is the purpose of a bollard- It allows a security guard to examin.pdfWhat is the purpose of a bollard- It allows a security guard to examin.pdf
What is the purpose of a bollard- It allows a security guard to examin.pdf
 

More from Chaitanya Ram (20)

14 599
14 59914 599
14 599
 
14 598
14 59814 598
14 598
 
14 595
14 59514 595
14 595
 
14 593
14 59314 593
14 593
 
14 587
14 58714 587
14 587
 
14 586
14 58614 586
14 586
 
14 585
14 58514 585
14 585
 
14 584
14 58414 584
14 584
 
14 583
14 58314 583
14 583
 
14 581
14 58114 581
14 581
 
14 577
14 57714 577
14 577
 
14 576
14 57614 576
14 576
 
14 575
14 57514 575
14 575
 
14A81A0574
14A81A057414A81A0574
14A81A0574
 
14 572
14 57214 572
14 572
 
14 571
14 57114 571
14 571
 
14 570
14 57014 570
14 570
 
14 569
14 569 14 569
14 569
 
14 568
14 56814 568
14 568
 
14 567
14 56714 567
14 567
 

Recently uploaded

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 

Recently uploaded (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 

JINI Technology: A Guide to Dynamic Distributed Computing

  • 2. Contents Introduction to jini Who developed jini? What is jini? Key concepts How it works? Advantages Disadvantages Conclusion
  • 3. Introduction to jini Any type of network made of services of clients of thoseAny type of network made of services of clients of those services can be easily assembled,dissembled andservices can be easily assembled,dissembled and maintained on the network using jini technology.maintained on the network using jini technology. Jini technology provides a simple infrastructure forJini technology provides a simple infrastructure for delivering services in a network and for creating andelivering services in a network and for creating an interaction between programs that use these servicesinteraction between programs that use these services regardless of their hardware/software implementationregardless of their hardware/software implementation
  • 4. Who Developed JINI? The idea of the jini system was invented by sunThe idea of the jini system was invented by sun cofounder bill joy at sun aspen small works R&D lab incofounder bill joy at sun aspen small works R&D lab in 1994.1994. In january 1999 download of jini realised from sunIn january 1999 download of jini realised from sun website.website.
  • 5. What is JINI?  Jini is set of specifications that enables these services toJini is set of specifications that enables these services to discover each other on a network and that provides adiscover each other on a network and that provides a framework that allows those services to participate inframework that allows those services to participate in certain type of operations.certain type of operations.  Jini is all about services.Jini is all about services.  It lets devices communicate immediately on a networkIt lets devices communicate immediately on a network without human intervention.without human intervention.  Jini client that loses contact with a server can recoverJini client that loses contact with a server can recover and continue processing.and continue processing.
  • 6. Key Concepts ServicesServices Lookup ServicesLookup Services JRMIJRMI TransactionsTransactions LeasingLeasing Java SpacesJava Spaces  SecuritySecurity
  • 7. Services AA serviceservice can be anything that sits on the network andcan be anything that sits on the network and is ready to perform a useful function. Hardware devices,is ready to perform a useful function. Hardware devices, software, communications channels – even human userssoftware, communications channels – even human users themselves -- can be servicesthemselves -- can be services Services may be added or withdrawn from a Jini at anyServices may be added or withdrawn from a Jini at any timetime Services communicate by using a service protocol = set ofServices communicate by using a service protocol = set of Java interfacesJava interfaces
  • 8. Lookup Services It is core of jini functionality.It is core of jini functionality. It holds registrations of all services.It holds registrations of all services.  Hierarchical LookupHierarchical Lookup: Lookup service may include: Lookup service may include entry for other lookup services.entry for other lookup services. When new services become available on the network,When new services become available on the network, they register themselves with a lookup service.they register themselves with a lookup service. Lookup service enables a client to query a lookup serviceLookup service enables a client to query a lookup service for services.for services.
  • 9. JRMI Communication among services uses Java RMICommunication among services uses Java RMI RMI providesRMI provides  Distributed Garbage Collection.Distributed Garbage Collection.  MulticastMulticast.. TransactionsTransactions  Partial failure in distributed systems is a night mare.  A series of operations ,either within a single service orA series of operations ,either within a single service or multiple services can be wrapped in a transaction.multiple services can be wrapped in a transaction.
  • 10. Leasing A lease is a grant of guaranteed access over a timeA lease is a grant of guaranteed access over a time period. Each lease is negotiated between the user of theperiod. Each lease is negotiated between the user of the service and the provider of the service as part of theservice and the provider of the service as part of the service protocol.service protocol. Leases handle client and network failures, removal ofLeases handle client and network failures, removal of services.services. Leases in Jini is self-healing. Exclusive lease says serviceLeases in Jini is self-healing. Exclusive lease says service cannot be shared.cannot be shared.
  • 11. Security The design of the security model for Jini technology is built on theThe design of the security model for Jini technology is built on the twin notions:twin notions: 1)A principle.1)A principle. 2)An access control list.2)An access control list. Security plays an important role in distributed systems. The JiniSecurity plays an important role in distributed systems. The Jini security model is based on the JDK 1.2 security system.security model is based on the JDK 1.2 security system. javaspacesjavaspaces Javaspaces is a jini service that builds and maintains a database ofJavaspaces is a jini service that builds and maintains a database of java objects.java objects. Javaspaces provide communication through sharing java objects.Javaspaces provide communication through sharing java objects.
  • 12. How it works • To use a service, a person or a program locates the service using the lookup service. • The service's interface is copied from the lookup service to the requesting device where it will be used. • The lookup service acts as a switchboard to connect a client looking for a service with that service. • Once the connection is made, the lookup service is not involved in any of the resulting interactions between that client and that service
  • 14. ADVANTAGES Jini is open source. Jini supports an extremely flexible network as services and clients can move code to where it is needed. New services are easy to program in java and can be easily added to the network.
  • 15. DISADVANTAGES • Depends on java/RMI or external mechanism for security. • Does not scale well to very large systems because jini use lookup service as a transmitter between client & services. • One of the most restricting ones is not compatable with the kilobyte virtual machines[sun99j],72 which is a very limited VM.it is targeted to embedded devices with approximately 128 kilobytes of available memory.
  • 16. Conclusion The overall goal is to turn the network in to flexible, easily administered tool on which resources can be found by human and computational clients. Resources can be implemented as either hardware devices , software program’s, or a combination of the two. you can use the jini network technology to create network technology systems that are scalable, evolvable and flexible, in dynamic run time environments in a multi faceted way.

Editor's Notes

  1. *