SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
Jini Technology
CONTENT
Introduction about JINI.
History
Goal of JINI.
Architecture.
Component of JINI.
Benefits of JINI.
Limitations of JINI.
Application of JINI.
Conclusion.
References.
INTRODUCTION
 Jini technology provides a simple infrastructure for
delivering services(application, database, printing,
storage etc) in a network and for creating an interaction
between programs that use these services regardless of
their hardware/software implementation.
 Services can be added or removed from the network and
new clients can find existing services.
HISTORY
 The idea of the Jini system was invented by Sun
cofounder Bill Joy at Sun Aspen Small works R&D lab
in 1994.
 Sun introduced Jini in July 1998. In November of 1998,
Sun announced that there were some firms supporting
Jini.
 The word 'jini' means "the devil" which is the origin of
the English word 'genie'. On January 25, 1999, Jini was
officially launched and the technology is available for
download.
GOAL OF JINI TECHNOLOGY
 To enable users to share services and resources over a
network.
 To provide users the ability to access resources anywhere
easily on the network, even though the network location
of the user may constantly change.
 To simplify the task of creating and managing network
devices, software services, and users.
JINI ARCHITECTURE
 Connects to a TCP/IP network.
 Use a discovery protocol to
find at least one lookup service.
 Register with the lookup
service.
 Continue to renew the
resource's releases, as long as
the service is available to the
network.
BENEFITS OF JINI
 It is easy to add and remove services.
 Services can be relocated on the network without
affecting users.
 JINI is open-source, meaning that the program code is
freely available on the Internet and there are no fees for
using it.
 The JINI architecture is scalable.
 Services are available immediately and are found
automatically.
 Everyone can access to same information & resources.
LIMITATIONS
 Depends on java/RMI or external mechanism for
security.
 Does not scale well to very large systems because jini
use lookup service as a broker between client & services.
COMPONENTS
 Services
 Lookup Services
 Discovery and Join
 Extended RMI
 Leasing
 Transactions
 Java Spaces
 Distributed Security
 Distributed Events
SERVICES
 A service can be anything that sits on the network
and is ready to perform a useful function. Hardware
devices, software, communications channels – even
human users themselves -- can be services
 Services may be added or withdrawn from a Jini
federation at any time
 Jini provides mechanisms for service registration,
lookup and use
 Services communicate by using a service protocol =
set of Java interfaces
 Set of services is open-ended
LOOKUP SERVICES
 Lookup Services are the central organizing
mechanism for Jini-based systems and provide
mapping of interfaces to objects. Lookup enables a
client to query a lookup service for services that can
help the client accomplish its goals
 Hierarchical Lookup: Lookup service may include
entry for other lookup services. When new services
become available on the network, they register
themselves with a lookup service
 When clients wish to locate a service to assist with
some task, they consult a lookup service
 The runtime infrastructure uses one network-level
protocol, called discovery, and two object-level
protocols, called join and lookup
DISCOVERY AND JOIN
 Discovery is the protocol by which Jini services register
themselves with a lookup service
 Discovery or Lookup is performed by doing a multicast
(to find all lookup services) or unicast (when you know
the machine on which the lookup service is running)
lookup. Jini™ enabled Object (representing a hardware
and/or software service) multicasts a packet with a
reference to itself
 The service receives RMI reference to Lookup service
(one or more)
 The service joins a federation by placing an object
representing capabilities into the Lookup service for
other clients and services to use for a period of time
 Discovery enables clients and services to locate lookup
services
 Join enables a service to register itself in a lookup
service
EXTENDED RMI
 Communication among services uses Java RMI
 Extended with leases
 RMI provides
 Activation
 Distributed Garbage Collection
 Multicast
 Replication
LEASING
 A lease is a grant of guaranteed access over a time period.
 Each lease is negotiated between the user of the service
and the provider of the service as part of the service
protocol
 A service is requested for some period; access is granted
for some period, presumably taking the request period into
account. Leases in term of duration (relative time)
– lookup service needs to use resource to maintain
registration
– device failure can cause error in the available service log
 If lease expires without renewal, user and provider can free
associated resource
 Leases handle client and network failures, removal of
services…
 Leases in Jini is self-healing. Exclusive lease says service
cannot be shared
TRANSACTIONS
 Partial failure in distributed systems is a nightmare
 A series of operations, either within a single service
or spanning multiple services, can be wrapped in a
transaction
 The Jini Transaction interfaces supply a service
protocol needed to coordinate a two-phase commit
– all results save in temporary storage
– move from temporary to permanent storage
 Insures changes made atomically- all or none
 The very semantics of the notion of a transaction is
left up to the service using the interfaces
JAVA SPACES
The JavaSpaces technology is written in the Java
language and is a simple, fast and unified mechanism for
dynamic communication, co-ordination and sharing of
objects
 In a distributed application, JavaSpaces technology
acts as a virtual space between providers and
requestors of network resources or objects
 participants in a distributed solution can exchange
tasks, requests information in the form of Java
technology-based objects
 JavaSpaces technology provides developers with the
ability to create and store objects with persistence
DISTRIBUTED SECURITY
 The design of the security model for Jini technology
is built on the twin notions of a principal and an
access control list.
 Jini services are accessed on behalf of some entity—
the principal, which generally traces back to a
particular user of the system.
 Services themselves may request access to other
services based on the identity of the object that
implements the service. Whether access to a service
is allowed depends on the contents of an access
control list that is associated with the object.
 Security plays an important role in distributed
systems. The Jini security model is based on the
JDK 1.2 security system.
DISTRIBUTED EVENTS
 Jini supports distributed events
 An object may allow other objects to register interest
in events in the object and receive a notification of
the occurrence of such an event
 Uses the Observer pattern and sensitive to network
issues – delays, disruptions etc
 Serializable and can be moved across a network
 Most useful in observing service changes – lookup
services going up or down etc
 Enables distributed event-based programs to be
written with a variety of reliability and scalability
guarantees
REQUIREMENTS OF JINI
 An infrastructure which operates as a dynamically
distributed
system
 A common language and implementation that
enables low-overhead communication between
distributed objects
 A lookup service which identifies objects that supply
those services
 An add-in protocol which is implemented on each
device—this is called the discovery/join protocol
 A subtract-out mechanism—providing resilience
when a device is unplugged which is called leasing
APPLICATION
 Managing a Printer:
APPLICATION (CONT…)
 Managing NT server:
CONCLUSION
 Jini's promise is not limited to the domain of network
devices.
 It can be expanded to scanners, printers, phones, radios
etc.
 Before Jini can become the basis for such mission-
critical applications, its ability to scale up to thousands of
network devices and maintain high levels of security
needs to be tested under stress and refined.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.oeclib.in
Thanks

Contenu connexe

Similaire à jinitechnologyppt-170905081653.pdf

Information Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud SystemInformation Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud Systemdbpublications
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDEditor IJCATR
 
Jini java protocol ppt by Mubeen
Jini java protocol  ppt by MubeenJini java protocol  ppt by Mubeen
Jini java protocol ppt by Mubeenmubeenm50
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
Microservice - Intro and Discussion
Microservice - Intro and DiscussionMicroservice - Intro and Discussion
Microservice - Intro and DiscussionSagarDevkota8
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceCSCJournals
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudIJERA Editor
 
Microservice architecture
Microservice architectureMicroservice architecture
Microservice architectureTouraj Ebrahimi
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
Ijaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruIjaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruijaprr
 
Object and component based middleware for distributed system development
Object and component based middleware for distributed system developmentObject and component based middleware for distributed system development
Object and component based middleware for distributed system developmentektabhalwara
 

Similaire à jinitechnologyppt-170905081653.pdf (20)

Jini
JiniJini
Jini
 
Jini
JiniJini
Jini
 
JINI TECH PPT
JINI TECH PPTJINI TECH PPT
JINI TECH PPT
 
Information Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud SystemInformation Flow Control as a Service on Cloud System
Information Flow Control as a Service on Cloud System
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
 
jini technology
 jini technology jini technology
jini technology
 
Jini java protocol ppt by Mubeen
Jini java protocol  ppt by MubeenJini java protocol  ppt by Mubeen
Jini java protocol ppt by Mubeen
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
Microservice - Intro and Discussion
Microservice - Intro and DiscussionMicroservice - Intro and Discussion
Microservice - Intro and Discussion
 
Implementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed ServiceImplementation of Agent Based Dynamic Distributed Service
Implementation of Agent Based Dynamic Distributed Service
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
Microservice architecture
Microservice architectureMicroservice architecture
Microservice architecture
 
Gw3312111217
Gw3312111217Gw3312111217
Gw3312111217
 
Cc unit 2 updated
Cc unit 2 updatedCc unit 2 updated
Cc unit 2 updated
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Ijaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruIjaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguru
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Object and component based middleware for distributed system development
Object and component based middleware for distributed system developmentObject and component based middleware for distributed system development
Object and component based middleware for distributed system development
 

Dernier

Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 

Dernier (20)

Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 

jinitechnologyppt-170905081653.pdf

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On Jini Technology
  • 2. CONTENT Introduction about JINI. History Goal of JINI. Architecture. Component of JINI. Benefits of JINI. Limitations of JINI. Application of JINI. Conclusion. References.
  • 3. INTRODUCTION  Jini technology provides a simple infrastructure for delivering services(application, database, printing, storage etc) in a network and for creating an interaction between programs that use these services regardless of their hardware/software implementation.  Services can be added or removed from the network and new clients can find existing services.
  • 4. HISTORY  The idea of the Jini system was invented by Sun cofounder Bill Joy at Sun Aspen Small works R&D lab in 1994.  Sun introduced Jini in July 1998. In November of 1998, Sun announced that there were some firms supporting Jini.  The word 'jini' means "the devil" which is the origin of the English word 'genie'. On January 25, 1999, Jini was officially launched and the technology is available for download.
  • 5. GOAL OF JINI TECHNOLOGY  To enable users to share services and resources over a network.  To provide users the ability to access resources anywhere easily on the network, even though the network location of the user may constantly change.  To simplify the task of creating and managing network devices, software services, and users.
  • 6. JINI ARCHITECTURE  Connects to a TCP/IP network.  Use a discovery protocol to find at least one lookup service.  Register with the lookup service.  Continue to renew the resource's releases, as long as the service is available to the network.
  • 7. BENEFITS OF JINI  It is easy to add and remove services.  Services can be relocated on the network without affecting users.  JINI is open-source, meaning that the program code is freely available on the Internet and there are no fees for using it.  The JINI architecture is scalable.  Services are available immediately and are found automatically.  Everyone can access to same information & resources.
  • 8. LIMITATIONS  Depends on java/RMI or external mechanism for security.  Does not scale well to very large systems because jini use lookup service as a broker between client & services.
  • 9. COMPONENTS  Services  Lookup Services  Discovery and Join  Extended RMI  Leasing  Transactions  Java Spaces  Distributed Security  Distributed Events
  • 10. SERVICES  A service can be anything that sits on the network and is ready to perform a useful function. Hardware devices, software, communications channels – even human users themselves -- can be services  Services may be added or withdrawn from a Jini federation at any time  Jini provides mechanisms for service registration, lookup and use  Services communicate by using a service protocol = set of Java interfaces  Set of services is open-ended
  • 11. LOOKUP SERVICES  Lookup Services are the central organizing mechanism for Jini-based systems and provide mapping of interfaces to objects. Lookup enables a client to query a lookup service for services that can help the client accomplish its goals  Hierarchical Lookup: Lookup service may include entry for other lookup services. When new services become available on the network, they register themselves with a lookup service  When clients wish to locate a service to assist with some task, they consult a lookup service  The runtime infrastructure uses one network-level protocol, called discovery, and two object-level protocols, called join and lookup
  • 12. DISCOVERY AND JOIN  Discovery is the protocol by which Jini services register themselves with a lookup service  Discovery or Lookup is performed by doing a multicast (to find all lookup services) or unicast (when you know the machine on which the lookup service is running) lookup. Jini™ enabled Object (representing a hardware and/or software service) multicasts a packet with a reference to itself  The service receives RMI reference to Lookup service (one or more)  The service joins a federation by placing an object representing capabilities into the Lookup service for other clients and services to use for a period of time  Discovery enables clients and services to locate lookup services  Join enables a service to register itself in a lookup service
  • 13. EXTENDED RMI  Communication among services uses Java RMI  Extended with leases  RMI provides  Activation  Distributed Garbage Collection  Multicast  Replication
  • 14. LEASING  A lease is a grant of guaranteed access over a time period.  Each lease is negotiated between the user of the service and the provider of the service as part of the service protocol  A service is requested for some period; access is granted for some period, presumably taking the request period into account. Leases in term of duration (relative time) – lookup service needs to use resource to maintain registration – device failure can cause error in the available service log  If lease expires without renewal, user and provider can free associated resource  Leases handle client and network failures, removal of services…  Leases in Jini is self-healing. Exclusive lease says service cannot be shared
  • 15. TRANSACTIONS  Partial failure in distributed systems is a nightmare  A series of operations, either within a single service or spanning multiple services, can be wrapped in a transaction  The Jini Transaction interfaces supply a service protocol needed to coordinate a two-phase commit – all results save in temporary storage – move from temporary to permanent storage  Insures changes made atomically- all or none  The very semantics of the notion of a transaction is left up to the service using the interfaces
  • 16. JAVA SPACES The JavaSpaces technology is written in the Java language and is a simple, fast and unified mechanism for dynamic communication, co-ordination and sharing of objects  In a distributed application, JavaSpaces technology acts as a virtual space between providers and requestors of network resources or objects  participants in a distributed solution can exchange tasks, requests information in the form of Java technology-based objects  JavaSpaces technology provides developers with the ability to create and store objects with persistence
  • 17. DISTRIBUTED SECURITY  The design of the security model for Jini technology is built on the twin notions of a principal and an access control list.  Jini services are accessed on behalf of some entity— the principal, which generally traces back to a particular user of the system.  Services themselves may request access to other services based on the identity of the object that implements the service. Whether access to a service is allowed depends on the contents of an access control list that is associated with the object.  Security plays an important role in distributed systems. The Jini security model is based on the JDK 1.2 security system.
  • 18. DISTRIBUTED EVENTS  Jini supports distributed events  An object may allow other objects to register interest in events in the object and receive a notification of the occurrence of such an event  Uses the Observer pattern and sensitive to network issues – delays, disruptions etc  Serializable and can be moved across a network  Most useful in observing service changes – lookup services going up or down etc  Enables distributed event-based programs to be written with a variety of reliability and scalability guarantees
  • 19. REQUIREMENTS OF JINI  An infrastructure which operates as a dynamically distributed system  A common language and implementation that enables low-overhead communication between distributed objects  A lookup service which identifies objects that supply those services  An add-in protocol which is implemented on each device—this is called the discovery/join protocol  A subtract-out mechanism—providing resilience when a device is unplugged which is called leasing
  • 22. CONCLUSION  Jini's promise is not limited to the domain of network devices.  It can be expanded to scanners, printers, phones, radios etc.  Before Jini can become the basis for such mission- critical applications, its ability to scale up to thousands of network devices and maintain high levels of security needs to be tested under stress and refined.