SlideShare a Scribd company logo
PRESENTATION ON
JINI Technology

SUBMITTED BY
Rachna
Introduction to JINI
• Jini is a way to do distributed computing that helps
you manage the dynamic nature of networks.
• Provides mechanisms to enable smooth adding,
removal, and finding of devices and services on the
network.
• Provides a programming model for reliable, secure
distributed services and makes it easier for
programmers to get their devices talking to each
other.
• Jini technology promises to be a reality in the
immediate future as an architecture to enable
connections between devices any time, anywhere.
Why Jini technology?
•
•
•
•
•
•

Today devices are unaware of their surroundings.
They are rigid and they can not adapt.
We expend a lot of efforts to install it.
We need an expert to do it for us.
In JINI, No system administrator required.
Everything on the network (hardware or software) is
a "service“.
• Each service represented by a mobile object.
Working Model
• The Java programming language is the key to
making Jini technology work. Built on top of Java,
object serialization, and Java Remote Method
Invocation (RMI), it enables objects to move around
the network from virtual machine to virtual machine.
Jini attempts to extend the benefits of objectoriented programming to the network.
• Jini is written in pure Java but the clients and the
services are not constrained to be in Java.
How Jini works? (Process)
• To use a service, a person or a program locates
the service using the lookup service.
• The service's interface is copied from the lookup
service to the requesting device where it will be
used.
• The lookup service acts as a switchboard to
connect a client looking for a service with that
service.
• Once the connection is made, the lookup service
is not involved in any of the resulting interactions
between that client and that service.

5
Where it can be placed?

6
Architectural Overview
• The whole technology can be segmented into :
– Infrastructure
– Programming Model
– Services
Infrastructure
• Set of components, includes the minimal JINI
technology core, that enables building of the system.
Lookup Service
• Central storage of services available within the
system
• It is the fundamental part of the infrastructure.
• It organizes services into groups.
– Service can be a member of multiple groups.
– Multiple Lookup Services can maintain the
same group.
– This helps to achieve fault tolerance.
How things work (Service Side)?
• When a new service is created, it register itself
with a Lookup Service (Join).
• It must first locate the appropriate Lookup service
(Discovery).
• This done using the Discovery/Join Protocol.
How things work (Client Side)?
• Client locate the appropriate Lookup Service
(Discovery).
• It locates a service by querying the Lookup Service
(Lookup)
• This done using the Discovery/Lookup Protocol.
• Then, Client and service can communicate
directly.
Discovery Protocol
• It can be :
– Multicast Discovery Protocol.
(looking for an appropriate Lookup Service)
– Unicast Discovery Protocol.
(looking for a specific Lookup Service or non-local
Lookup service)
– Multicast Announcement Protocol.
(Allow Lookup services to advertise their
presence)
Multicast Request Protocol
Unicast Discovery Protocol
Multicast Announcement Protocol
Join Protocol
• A service discovers the appropriate Lookup
Service.
• It connects via the Lookup Service registrar.
• The Service sends some info about itself.
• The Lookup Service stores the information
and associate it with the requested group, if
any.
Join Protocol
Lookup Protocol
• A Client discovers the appropriate Lookup
Service.
• It’ll query for the service.
• If found, the object reference of the
requested service will be loaded into the
client.
• Finally, client invoke the service.
Lookup Protocol
Distributed Security System
• Define how entities got the right to perform
actions on their behalf or on behalf of others.
• It extends JDK1.2 platform’s security model to
the world of distributed systems.
Leasing
• Access to many of the services in the Jini system
environment is lease based. A lease is a grant of
guaranteed access over a time period. Each lease is
negotiated between the user of the service and the
provider of the service as part of the service
protocol: A service is requested for some period;
access is granted for some period, presumably taking
the request period into account. If a lease is not
renewed before it is freed--either because the
resource is no longer needed, the client or network
fails, or the lease is not permitted to be renewed-then both the user and the provider of the resource
may conclude that the resource can be freed.
AR.2.1.6 Transactions
• A series of operations, either within a single
service or spanning multiple services, can be
wrapped in a transaction. The Jini transaction
interfaces supply a service protocol needed to
coordinate a two-phase commit. How
transactions are implemented--and indeed,
the very semantics of the notion of a
transaction--is left up to the service using
those interfaces.
• AR.2.1.7 Events
• The Jini architecture supports distributed
events. An object may allow other objects to
register interest in events in the object and
receive a notification of the occurrence of
such an event. This enables distributed eventbased programs to be written with a variety of
reliability and scalability guarantees.
Programming Model
• Set of interfaces that enables the construction
of reliable services.
• These interfaces make up the distributed
extension of Java.
• All interfaces are written in Java
• Free source code.
• Has no limit, and it can be extended.
Programming Model Cont..
• These interfaces include :
– Leasing interface
– Events interface
– Transaction interface
Leasing interface
• Access to many services in the JINI system is
lease based.
• Lease grant guaranteed access to the service
over a period of time.
• It is negotiable.
• Can be exclusive or non-exclusive.
• Can be renewed.
Example
• When a service registers with the lookup
service, it receives a lease.
• It need to renew periodically.
• When service failed or lease get expired,
service will be removed.
Distributed Events Interface
• It extends JavaBeans Event Model to the
world of Distributed Systems.
• One object, Event Listener, registers an
interest in event of another object, Event
Generator.
• Listener will be notified in a timely and
reliable fashion.
• Registration of interest is lease based
Transaction Interface
• Transactions enables operation grouping.
Either all Succeed or all Fail.
• The JINI’s Transaction Interface supply a
service protocol needed to coordinate 2Phase commit protocol.
Service
• Something that can be used by a person,
program or another service.
• It can be : Computational, Storage, Software,
Hardware or Communication Channel.
• It has an interface which define the operations
that can be requested.
Services Cont..
• Service objects can be written in any
language. Client does not care.
• But the interface has to be written in Java.
• One of them is JavaSpaces which can be used
for simple communication and storage of
related groups of objects.
Example
Advantages
• We no longer need a computer to act as an
intermediary between a cell phone and a printer
• These devices can take care of themselves-they are
flexible, they adapt
• Self configure
• Self diagnose
• Self install
• Reduce need for expert help
• Lower total cost
33
Disadvantages
• Communication overhead, so some time it’s
slow
• High Learning curve and some cost involve

34
Conclusion
• JINI is the feature of distributed systems.
• The dynamic nature of JINI allows resources
to be added, subtracted at anytime without
bothering other components.
• Open Source Code is available for
download. Thus it has no limit.
References
• The main JINI page at Sun:
http://java.sun.com/products/jini/
• JINI specifications:
http://java.sun.com/products/jini/specs/
• JINI-USERS mailing list archives:
http://archives.java.sun.com/archives/jini-users.html
• Bill Venners' JINI/JavaSpaces talk:
http://www.artima.com/javaseminars/modules/JINI/
Handout.html
• JINI Community Web Site, devoted to JINI
http://www.jinivision.com

More Related Content

What's hot

Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
MNM Jain Engineering College
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
MNM Jain Engineering College
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
Rajapriya82
 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
Harshana Madusanka Jayamaha
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
Kavya Barnadhya Hazarika
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
Amar Myana
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
mrzahidfaiz.blogspot.com
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
MNM Jain Engineering College
 
3. challenges
3. challenges3. challenges
3. challenges
AbDul ThaYyal
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
pradeepas7
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
Raj Raj
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
Rahul Hada
 
Process Management-Process Migration
Process Management-Process MigrationProcess Management-Process Migration
Process Management-Process Migration
MNM Jain Engineering College
 

What's hot (20)

Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
 
3. challenges
3. challenges3. challenges
3. challenges
 
Comet Cloud
Comet CloudComet Cloud
Comet Cloud
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Transport layer
Transport layer Transport layer
Transport layer
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Seven step model of migration into the cloud
Seven step model of migration into the cloudSeven step model of migration into the cloud
Seven step model of migration into the cloud
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Process Management-Process Migration
Process Management-Process MigrationProcess Management-Process Migration
Process Management-Process Migration
 

Similar to JINI Technology

jinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdfjinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdf
PoojithaBollikonda
 
Jini network technology
Jini  network   technologyJini  network   technology
Jini network technology
Keerthi Thomas
 
JINI
JINIJINI
Mayur jini technology.pptx
Mayur jini technology.pptxMayur jini technology.pptx
Mayur jini technology.pptx
mayurbankar2
 
Deployability
DeployabilityDeployability
Deployability
Len Bass
 
Jini new technology for a networked world
Jini new technology for a networked worldJini new technology for a networked world
Jini new technology for a networked world
Sajan Sahu
 
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
apidays
 
Jini network technology
Jini network technologyJini network technology
Jini network technology
Keerthi Thomas
 
What are microservices
What are microservicesWhat are microservices
What are microservices
Krunalkumar Rajdip
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
Rick Hightower
 
QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes
Abdul Basit Munda
 
Microservices-101
Microservices-101Microservices-101
Microservices-101
Subhashish Bhattacharjee
 
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
JSFestUA
 
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
jeetendra mandal
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?
NGINX, Inc.
 
Intro to Microservices Architecture
Intro to Microservices ArchitectureIntro to Microservices Architecture
Intro to Microservices Architecture
Peter Nijem
 
#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – Explored#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – Explored
Agile Testing Alliance
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
Raj Sarode
 
Microservice's in detailed
Microservice's in detailedMicroservice's in detailed
Microservice's in detailed
Mohammed Fazuluddin
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architecture
Faren faren
 

Similar to JINI Technology (20)

jinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdfjinitechnologyppt-170905081653.pdf
jinitechnologyppt-170905081653.pdf
 
Jini network technology
Jini  network   technologyJini  network   technology
Jini network technology
 
JINI
JINIJINI
JINI
 
Mayur jini technology.pptx
Mayur jini technology.pptxMayur jini technology.pptx
Mayur jini technology.pptx
 
Deployability
DeployabilityDeployability
Deployability
 
Jini new technology for a networked world
Jini new technology for a networked worldJini new technology for a networked world
Jini new technology for a networked world
 
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
apidays LIVE Jakarta - Building an Event-Driven Architecture by Harin Honesty...
 
Jini network technology
Jini network technologyJini network technology
Jini network technology
 
What are microservices
What are microservicesWhat are microservices
What are microservices
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
 
QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes QCon 2015 - Microservices Track Notes
QCon 2015 - Microservices Track Notes
 
Microservices-101
Microservices-101Microservices-101
Microservices-101
 
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
JS Fest 2019/Autumn. Anton Cherednikov. Choreographic or orchestral architect...
 
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?
 
Intro to Microservices Architecture
Intro to Microservices ArchitectureIntro to Microservices Architecture
Intro to Microservices Architecture
 
#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – Explored#ATAGTR2020 Presentation - Microservices – Explored
#ATAGTR2020 Presentation - Microservices – Explored
 
Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
 
Microservice's in detailed
Microservice's in detailedMicroservice's in detailed
Microservice's in detailed
 
Microservices architecture
Microservices architectureMicroservices architecture
Microservices architecture
 

Recently uploaded

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 

Recently uploaded (20)

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 

JINI Technology

  • 2. Introduction to JINI • Jini is a way to do distributed computing that helps you manage the dynamic nature of networks. • Provides mechanisms to enable smooth adding, removal, and finding of devices and services on the network. • Provides a programming model for reliable, secure distributed services and makes it easier for programmers to get their devices talking to each other. • Jini technology promises to be a reality in the immediate future as an architecture to enable connections between devices any time, anywhere.
  • 3. Why Jini technology? • • • • • • Today devices are unaware of their surroundings. They are rigid and they can not adapt. We expend a lot of efforts to install it. We need an expert to do it for us. In JINI, No system administrator required. Everything on the network (hardware or software) is a "service“. • Each service represented by a mobile object.
  • 4. Working Model • The Java programming language is the key to making Jini technology work. Built on top of Java, object serialization, and Java Remote Method Invocation (RMI), it enables objects to move around the network from virtual machine to virtual machine. Jini attempts to extend the benefits of objectoriented programming to the network. • Jini is written in pure Java but the clients and the services are not constrained to be in Java.
  • 5. How Jini works? (Process) • To use a service, a person or a program locates the service using the lookup service. • The service's interface is copied from the lookup service to the requesting device where it will be used. • The lookup service acts as a switchboard to connect a client looking for a service with that service. • Once the connection is made, the lookup service is not involved in any of the resulting interactions between that client and that service. 5
  • 6. Where it can be placed? 6
  • 7. Architectural Overview • The whole technology can be segmented into : – Infrastructure – Programming Model – Services
  • 8. Infrastructure • Set of components, includes the minimal JINI technology core, that enables building of the system.
  • 9. Lookup Service • Central storage of services available within the system • It is the fundamental part of the infrastructure. • It organizes services into groups. – Service can be a member of multiple groups. – Multiple Lookup Services can maintain the same group. – This helps to achieve fault tolerance.
  • 10. How things work (Service Side)? • When a new service is created, it register itself with a Lookup Service (Join). • It must first locate the appropriate Lookup service (Discovery). • This done using the Discovery/Join Protocol.
  • 11. How things work (Client Side)? • Client locate the appropriate Lookup Service (Discovery). • It locates a service by querying the Lookup Service (Lookup) • This done using the Discovery/Lookup Protocol. • Then, Client and service can communicate directly.
  • 12. Discovery Protocol • It can be : – Multicast Discovery Protocol. (looking for an appropriate Lookup Service) – Unicast Discovery Protocol. (looking for a specific Lookup Service or non-local Lookup service) – Multicast Announcement Protocol. (Allow Lookup services to advertise their presence)
  • 16. Join Protocol • A service discovers the appropriate Lookup Service. • It connects via the Lookup Service registrar. • The Service sends some info about itself. • The Lookup Service stores the information and associate it with the requested group, if any.
  • 18. Lookup Protocol • A Client discovers the appropriate Lookup Service. • It’ll query for the service. • If found, the object reference of the requested service will be loaded into the client. • Finally, client invoke the service.
  • 20. Distributed Security System • Define how entities got the right to perform actions on their behalf or on behalf of others. • It extends JDK1.2 platform’s security model to the world of distributed systems.
  • 21. Leasing • Access to many of the services in the Jini system environment is lease based. A lease is a grant of guaranteed access over a time period. Each lease is negotiated between the user of the service and the provider of the service as part of the service protocol: A service is requested for some period; access is granted for some period, presumably taking the request period into account. If a lease is not renewed before it is freed--either because the resource is no longer needed, the client or network fails, or the lease is not permitted to be renewed-then both the user and the provider of the resource may conclude that the resource can be freed.
  • 22. AR.2.1.6 Transactions • A series of operations, either within a single service or spanning multiple services, can be wrapped in a transaction. The Jini transaction interfaces supply a service protocol needed to coordinate a two-phase commit. How transactions are implemented--and indeed, the very semantics of the notion of a transaction--is left up to the service using those interfaces.
  • 23. • AR.2.1.7 Events • The Jini architecture supports distributed events. An object may allow other objects to register interest in events in the object and receive a notification of the occurrence of such an event. This enables distributed eventbased programs to be written with a variety of reliability and scalability guarantees.
  • 24. Programming Model • Set of interfaces that enables the construction of reliable services. • These interfaces make up the distributed extension of Java. • All interfaces are written in Java • Free source code. • Has no limit, and it can be extended.
  • 25. Programming Model Cont.. • These interfaces include : – Leasing interface – Events interface – Transaction interface
  • 26. Leasing interface • Access to many services in the JINI system is lease based. • Lease grant guaranteed access to the service over a period of time. • It is negotiable. • Can be exclusive or non-exclusive. • Can be renewed.
  • 27. Example • When a service registers with the lookup service, it receives a lease. • It need to renew periodically. • When service failed or lease get expired, service will be removed.
  • 28. Distributed Events Interface • It extends JavaBeans Event Model to the world of Distributed Systems. • One object, Event Listener, registers an interest in event of another object, Event Generator. • Listener will be notified in a timely and reliable fashion. • Registration of interest is lease based
  • 29. Transaction Interface • Transactions enables operation grouping. Either all Succeed or all Fail. • The JINI’s Transaction Interface supply a service protocol needed to coordinate 2Phase commit protocol.
  • 30. Service • Something that can be used by a person, program or another service. • It can be : Computational, Storage, Software, Hardware or Communication Channel. • It has an interface which define the operations that can be requested.
  • 31. Services Cont.. • Service objects can be written in any language. Client does not care. • But the interface has to be written in Java. • One of them is JavaSpaces which can be used for simple communication and storage of related groups of objects.
  • 33. Advantages • We no longer need a computer to act as an intermediary between a cell phone and a printer • These devices can take care of themselves-they are flexible, they adapt • Self configure • Self diagnose • Self install • Reduce need for expert help • Lower total cost 33
  • 34. Disadvantages • Communication overhead, so some time it’s slow • High Learning curve and some cost involve 34
  • 35. Conclusion • JINI is the feature of distributed systems. • The dynamic nature of JINI allows resources to be added, subtracted at anytime without bothering other components. • Open Source Code is available for download. Thus it has no limit.
  • 36. References • The main JINI page at Sun: http://java.sun.com/products/jini/ • JINI specifications: http://java.sun.com/products/jini/specs/ • JINI-USERS mailing list archives: http://archives.java.sun.com/archives/jini-users.html • Bill Venners' JINI/JavaSpaces talk: http://www.artima.com/javaseminars/modules/JINI/ Handout.html • JINI Community Web Site, devoted to JINI http://www.jinivision.com