SlideShare a Scribd company logo
Submitted by:
HEENA MADAN
12/CS06
• Introduce by SunMicroSystem
• Managing Distributed Resource.
• Platform independent
• Web based GUI’S and Management
App
 Jiro is a Management Framework
infrastructure based on a distributed runtime
environment.
 It was standardized as JSR 9 by the Java
Community Process.
• Integrated and Automated Management
Software.
• A standard extension to the Java platform, is
specified by the Federated Management
Architecture (FMA).
• Jiro goes further than just platform
independence, however, and introduces Jini-
connection technology for distributed
management across a network.
 Jiro divides a management environment into
domains.
 Each domain only a shared management
server (a Java Virtual Machine running Jiro
services) that represents the domain as a
whole.
MANAGEMENT CONSOLE
STATIC
MANAGEMENT
SERVICES
DYNAMIC
MANAGEMENT
SERVICES
JIRO TECHNOLOGY
CIM
DEVICES
SNMP
DEVICES
OTHER DEVICES
Distributed
Management
logic
layer
• The requirements for this middle tier were
determined by an analysis of distributed
management and the resources that need to
be monitored and controlled.
• There may be several resources processing
the data as it moves from the application to
its eventual destination -- a disk drive, for
example
• Separating the control path from the data
path
 Jiro introduces a middle tier of management
between the client/GUI and other Java-based
agent technologies such as JMX and JDMK.
 This middle tier is where the automation of
management take place.
• Partition the Management environment
• private management servers can host management
services that are specific to their hosts
• The servers (including the shared server) can be
replicated to achieve higher availability.
• These servers form an intra domain federation for
the management domain. The shared management
servers can also communicate with each other.
STATIC
SERVICES
DYNAMIC
SERVICES
SERVICES
• known as FederatedBeans base services -- are a
guaranteed part of the environment in a
management domain. The base services include
transaction, controller, logging, events, and
scheduling.
• They are available for use by the clients and
services belonging to a management domain, and
do not depend on the dynamic services model.
• There is only one of each type of service available in
each management domain.
• These base services are located with the ServiceFinder
convenience class, as shown below:
 public final class ServiceFinder
 {
 private ServiceFinder() {}
 public static TransactionManager
 getTransactionService()
 throws ServiceNotFoundException;
 public static ControllerService
 getControllerService()
 throws ServiceNotFoundException;
 public static LogService
 getLogService()
 throws ServiceNotFoundException;
 public static EventService
 getEventService()
 throws ServiceNotFoundException;
 public static SchedulingService
 getSchedulingService()
 throws ServiceNotFoundException;
 ...}
• The Transaction service is a Jini transaction manager serving
a particular management domain.
• The Controller service provides for the reservation of
ownership within the management domain.
• Management software can use the Log service to log
decisions and state changes, as well as to maintain audit trails.
• The Event service provides a set of topics to which
management services can post and listen. This allows
management services to react to both changing conditions in
the environment and decisions that other management
services have made.
• The Scheduling service allows a management service to
perform periodic or scheduled operations, such as polling.
• The FederatedBeans dynamic services model
extends Java's Remote Method Invocation (RMI)
to support the higher level of abstraction
appropriate for management application.
• Additional management capabilities (security,
transaction, controller) that can be added to any
Jiro-based component
• Transactional persistence
• Remote class method (procedural) invocations
• Remote object instantiation
•The first set of Jiro components that need to be developed for
these situations are called Management Facades.
•The resource vendor typically develops the Management
Facades for its products that enable the products to be
managed by Jiro -based software.
•FederatedBeans components will typically use a standard
protocol, such as SNMP, to talk to the resource (in the case of
a device or system) or native library (in the case of software).
•We'll create two FederatedBeans components for this
example. The first component maintains a pool of spare disks
that can be used for multiple applications and hosts in the
storage network.
•The second FederatedBeans component will monitor file
system utilization and try to predict when the file system
will run out of space.
•It accesses usage information from the filesystem's
Management Facade and tracks its usage over time.
After predicting an out-of-space condition based on the
history of past usage, it then calls the Storage Pool Bean
to get a disk from its pool.
•When the Storage Pool Bean gets the request for the
disk, it calls the switch's Management Facade to change
the zone of the newly allocated disk to that of the host
• Jiro makes possible software that can
increase availability and help reduce the
cost and complexity of management.
• The new paradigm for management
software is multiple-vendor creation and
reuse of these FederatedBeans
components.
Jiro technology

More Related Content

What's hot

3D Password
3D Password3D Password
3D Password
Zishan Mohsin
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Tony Chew
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
Akshitha Chutke
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 
Iot
IotIot
Gesture recognition document
Gesture recognition documentGesture recognition document
Gesture recognition document
Nikhil Jha
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
Jeevan Kumar D
 
Android Workshop PPT
Android Workshop PPTAndroid Workshop PPT
Android Workshop PPT
Appsthentic Technology
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
Mohammad Adil
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
Bhumivaghasiya
 
Internet of Things - Overview
Internet of Things - OverviewInternet of Things - Overview
Internet of Things - Overview
maha5960
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
Sunanda Bansal
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Voice browser
Voice browserVoice browser
Voice browser
Suman Bose
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
PrachiWadekar
 
screen less display documentation
screen less display documentationscreen less display documentation
screen less display documentation
mani akuthota
 
Full PPT On Sixth Sense Technology
Full PPT On Sixth Sense TechnologyFull PPT On Sixth Sense Technology
Full PPT On Sixth Sense Technology
Haribhajan Singh
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Java Ring
Java RingJava Ring
Java Ring
Abhishek Abhi
 
Desktop assistant
Desktop assistant Desktop assistant
Desktop assistant
PRASUNCHAKRABORTY21
 

What's hot (20)

3D Password
3D Password3D Password
3D Password
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Iot
IotIot
Iot
 
Gesture recognition document
Gesture recognition documentGesture recognition document
Gesture recognition document
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Android Workshop PPT
Android Workshop PPTAndroid Workshop PPT
Android Workshop PPT
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Rover Technology
Rover TechnologyRover Technology
Rover Technology
 
Internet of Things - Overview
Internet of Things - OverviewInternet of Things - Overview
Internet of Things - Overview
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Voice browser
Voice browserVoice browser
Voice browser
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
screen less display documentation
screen less display documentationscreen less display documentation
screen less display documentation
 
Full PPT On Sixth Sense Technology
Full PPT On Sixth Sense TechnologyFull PPT On Sixth Sense Technology
Full PPT On Sixth Sense Technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Java Ring
Java RingJava Ring
Java Ring
 
Desktop assistant
Desktop assistant Desktop assistant
Desktop assistant
 

Similar to Jiro technology

JMX Introduction
JMX IntroductionJMX Introduction
JMX Introduction
zeroproductionincidents
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
Sarmad Ibrahim
 
Genesys framework
Genesys frameworkGenesys framework
Genesys framework
Vishad Garg
 
OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...
OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...
OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...
mfrancis
 
Using and Customizing the Android Framework / part 4 of Embedded Android Work...
Using and Customizing the Android Framework / part 4 of Embedded Android Work...Using and Customizing the Android Framework / part 4 of Embedded Android Work...
Using and Customizing the Android Framework / part 4 of Embedded Android Work...
Opersys inc.
 
Monitoring and Tuning Oracle FMW 11g
Monitoring and Tuning Oracle FMW 11gMonitoring and Tuning Oracle FMW 11g
Monitoring and Tuning Oracle FMW 11g
Matthias Furrer
 
Id0115
Id0115Id0115
Id0115
FNian
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
Rachna Singh
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
Gouasmia Zakaria
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
jeronimored
 
Xandria datasheet
Xandria datasheet Xandria datasheet
Xandria datasheet
Ganesh Ravichandran
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
Alexander Decker
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
Yeonki Choi
 
Monitoring sytem.ppt
Monitoring sytem.pptMonitoring sytem.ppt
Monitoring sytem.ppt
AssadLeo1
 
Cloud Computing MechanismsChapter 7 – InfrastructureChapter .docx
Cloud Computing MechanismsChapter 7 – InfrastructureChapter .docxCloud Computing MechanismsChapter 7 – InfrastructureChapter .docx
Cloud Computing MechanismsChapter 7 – InfrastructureChapter .docx
mary772
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
Sathya Moorthy
 
Unit 2
Unit 2Unit 2
Unit 2
cheepusowmya
 
WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3
odedns
 
Integrated Services for Web Applications
Integrated Services for Web ApplicationsIntegrated Services for Web Applications
Integrated Services for Web Applications
Saltmarch Media
 

Similar to Jiro technology (20)

JMX Introduction
JMX IntroductionJMX Introduction
JMX Introduction
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Genesys framework
Genesys frameworkGenesys framework
Genesys framework
 
OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...
OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...
OSGi Technology Relationship to OMA Device Management Protocols and Mechanism...
 
Using and Customizing the Android Framework / part 4 of Embedded Android Work...
Using and Customizing the Android Framework / part 4 of Embedded Android Work...Using and Customizing the Android Framework / part 4 of Embedded Android Work...
Using and Customizing the Android Framework / part 4 of Embedded Android Work...
 
Monitoring and Tuning Oracle FMW 11g
Monitoring and Tuning Oracle FMW 11gMonitoring and Tuning Oracle FMW 11g
Monitoring and Tuning Oracle FMW 11g
 
Id0115
Id0115Id0115
Id0115
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
Xandria datasheet
Xandria datasheet Xandria datasheet
Xandria datasheet
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Dynamic datacenter planning and design
Dynamic datacenter   planning and designDynamic datacenter   planning and design
Dynamic datacenter planning and design
 
Monitoring sytem.ppt
Monitoring sytem.pptMonitoring sytem.ppt
Monitoring sytem.ppt
 
Cloud Computing MechanismsChapter 7 – InfrastructureChapter .docx
Cloud Computing MechanismsChapter 7 – InfrastructureChapter .docxCloud Computing MechanismsChapter 7 – InfrastructureChapter .docx
Cloud Computing MechanismsChapter 7 – InfrastructureChapter .docx
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Unit 2
Unit 2Unit 2
Unit 2
 
WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3WebSphere 6.1 admin Course 3
WebSphere 6.1 admin Course 3
 
Integrated Services for Web Applications
Integrated Services for Web ApplicationsIntegrated Services for Web Applications
Integrated Services for Web Applications
 

Recently uploaded

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Jiro technology

  • 2. • Introduce by SunMicroSystem • Managing Distributed Resource. • Platform independent • Web based GUI’S and Management App
  • 3.  Jiro is a Management Framework infrastructure based on a distributed runtime environment.  It was standardized as JSR 9 by the Java Community Process.
  • 4. • Integrated and Automated Management Software. • A standard extension to the Java platform, is specified by the Federated Management Architecture (FMA). • Jiro goes further than just platform independence, however, and introduces Jini- connection technology for distributed management across a network.
  • 5.  Jiro divides a management environment into domains.  Each domain only a shared management server (a Java Virtual Machine running Jiro services) that represents the domain as a whole.
  • 7. • The requirements for this middle tier were determined by an analysis of distributed management and the resources that need to be monitored and controlled. • There may be several resources processing the data as it moves from the application to its eventual destination -- a disk drive, for example • Separating the control path from the data path
  • 8.  Jiro introduces a middle tier of management between the client/GUI and other Java-based agent technologies such as JMX and JDMK.  This middle tier is where the automation of management take place.
  • 9. • Partition the Management environment • private management servers can host management services that are specific to their hosts • The servers (including the shared server) can be replicated to achieve higher availability. • These servers form an intra domain federation for the management domain. The shared management servers can also communicate with each other.
  • 11. • known as FederatedBeans base services -- are a guaranteed part of the environment in a management domain. The base services include transaction, controller, logging, events, and scheduling. • They are available for use by the clients and services belonging to a management domain, and do not depend on the dynamic services model. • There is only one of each type of service available in each management domain.
  • 12. • These base services are located with the ServiceFinder convenience class, as shown below:  public final class ServiceFinder  {  private ServiceFinder() {}  public static TransactionManager  getTransactionService()  throws ServiceNotFoundException;  public static ControllerService  getControllerService()  throws ServiceNotFoundException;  public static LogService  getLogService()  throws ServiceNotFoundException;  public static EventService  getEventService()  throws ServiceNotFoundException;  public static SchedulingService  getSchedulingService()  throws ServiceNotFoundException;  ...}
  • 13. • The Transaction service is a Jini transaction manager serving a particular management domain. • The Controller service provides for the reservation of ownership within the management domain. • Management software can use the Log service to log decisions and state changes, as well as to maintain audit trails. • The Event service provides a set of topics to which management services can post and listen. This allows management services to react to both changing conditions in the environment and decisions that other management services have made. • The Scheduling service allows a management service to perform periodic or scheduled operations, such as polling.
  • 14. • The FederatedBeans dynamic services model extends Java's Remote Method Invocation (RMI) to support the higher level of abstraction appropriate for management application. • Additional management capabilities (security, transaction, controller) that can be added to any Jiro-based component • Transactional persistence • Remote class method (procedural) invocations • Remote object instantiation
  • 15. •The first set of Jiro components that need to be developed for these situations are called Management Facades. •The resource vendor typically develops the Management Facades for its products that enable the products to be managed by Jiro -based software. •FederatedBeans components will typically use a standard protocol, such as SNMP, to talk to the resource (in the case of a device or system) or native library (in the case of software). •We'll create two FederatedBeans components for this example. The first component maintains a pool of spare disks that can be used for multiple applications and hosts in the storage network.
  • 16. •The second FederatedBeans component will monitor file system utilization and try to predict when the file system will run out of space. •It accesses usage information from the filesystem's Management Facade and tracks its usage over time. After predicting an out-of-space condition based on the history of past usage, it then calls the Storage Pool Bean to get a disk from its pool. •When the Storage Pool Bean gets the request for the disk, it calls the switch's Management Facade to change the zone of the newly allocated disk to that of the host
  • 17. • Jiro makes possible software that can increase availability and help reduce the cost and complexity of management. • The new paradigm for management software is multiple-vendor creation and reuse of these FederatedBeans components.