SlideShare a Scribd company logo
1 of 13
Technical Seminar - 2004 
JINI: New Technology FFoorr aa NNeettwwoorrkkeedd WWoorrlldd 
Under the guidance of 
Miss Ipshita Mishra 
Presented By 
Purnendu Mishra 
Roll no-CS200119100 
Presented By:- Purnendu Mishra(CS200119100)
Introduction 
Technical Seminar - 2004 
• Jini technology, announced by Sun Microsystems in January 1999, represents a 
fundamental shift in the way we do distributed computing. 
• Jini is a set of APIs and network protocols that can help you build and deploy 
distributed systems that are organized as federations of services. 
• Jini's architecture helps to raise the level of abstraction in distributed systems 
programming, effectively turning network programming into object-oriented 
programming. 
• Jini technology helps developers address the fundamental difficulties of distributed 
computing. 
• Jini technology is built on top of the Java 2 platform application environment. It 
uses core Java platform functionality to provide a reliable, portable, and ultimately 
simple-to-use distributed computing model. 
• Jini is an attempt to rethink computer architecture, given the rising importance of 
the network and the proliferation of processors in devices that have no disk drive. 
Presented By:- Purnendu Mishra(CS200119100)
Components of Jini 
Technical Seminar - 2004 
• CORBA & DCOM are the languages used in JINI technology. 
• EJB is used to build the business logic servers. 
• Three main parts:- 
 Service 
 Client 
 Look up Service 
• TCP/IP is the basic network used in JINI technology. 
Presented By:- Purnendu Mishra(CS200119100)
Technical Seminar - 2004 
The Discovery Process 
• As soon as the JINI enabled disk drive is connected to the network it broadcasts a 
presence announcement by dropping a multicast packet onto a well known port. 
• The lookup service monitors the well known port for presence announcement 
packets. After receiving the conformation it then it contacts the sender directly by 
making TCP connection. 
• Using RMI, the lookup service sends an object, called a service registrar, across the 
network to the originator of the packet. The service register facilitate further 
communication with the lookup service. After the communication the join process 
and the lookup process comes into action. 
Presented By:- Purnendu Mishra(CS200119100)
The Join process 
Technical Seminar - 2004 
• When a service provider has a service register object the end product is ready to do 
a join. 
• The service provider invokes the register on the service register object passing a 
parameter an object called a service item which describes the service. 
• The register sends a copy of the service item to the lookup service, where the 
service item is stored. 
• After the completion of the join process the service has been registered in the 
lookup service. 
Presented By:- Purnendu Mishra(CS200119100)
The Lookup Process 
Technical Seminar - 2004 
• Once a service has registered with a lookup service via the join process, that 
service is available for use by clients who query that lookup service. To build a 
distributed system of services that will work together to perform some task, a 
client must locate and enlist the help of the individual services. 
• The lookup() method sends the service template to the lookup service, which 
performs the query and sends back zero to many matching service objects. 
• The client gets a reference to the matching service objects as the return value of 
the lookup() method. 
• The client looks up a service by JAVA type, which is an interface. 
Presented By:- Purnendu Mishra(CS200119100)
Technical Seminar - 2004 
Presented By:- Purnendu Mishra(CS200119100)
Technical Seminar - 2004 
Separation of Interface & Implementation 
• Jini's architecture brings object-oriented programming to the network by enabling 
network services to take advantage of one of the fundamentals of object-oriented 
programming. 
• The Jini architecture has a property in which the network protocol that communicates 
between a proxy service object and a remote server has no link with the client. 
• A service can use specialized hardware to fulfill client requests, or it can do all its 
work in software. 
• To the client, a service looks like the well-known interface, regardless of how the 
service is implemented. 
Presented By:- Purnendu Mishra(CS200119100)
Support Services 
Technical Seminar - 2004 
• The three components of a Jini system are clients, services and service locators, 
which may run anywhere on the network. 
• These will be implemented using Java code running in Java Virtual Machines 
(JVM). 
• The ability to move objects across the network from one JVM to another, 
particular implementations must make use of support services such as RMI 
daemons and HTTP services. 
 A Java object running as a service has a proxy component exported to the service 
locators and then onto a client. It passes through one JVM in ``passive'' form and is 
activated ( brought to life) in the client's JVM. 
 The JAVA REMOTE METHOD INVOCATION system has two types: 
 The original UnicastRemoteObject. 
 The newer Activable class. 
Presented By:- Purnendu Mishra(CS200119100)
JINI at a Glance 
Technical Seminar - 2004 
• The different uses of Jini technology are:- 
 A printer can be connected to the network and the user can access the printer from 
another system without having it configured. 
 To reduce the maintenance cost the file on one system is made into the network so 
that all the clients can access it. 
 New capabilities extending existing ones can be added to a running system without 
disrupting existing services. 
• The different unique qualities are:- 
 Code mobility. 
 Protocol agonistic. 
 Leasing. 
Presented By:- Purnendu Mishra(CS200119100)
Technical Seminar - 2004 
Real World Example of Jini Technology 
• Jini technology gives real-world ease-of-use a boost for many types of 
networked devices. 
• As for an example let us consider to install and configure a new VCR. 
 The consumer plugs in the VCR. 
 The VCR announces its presence to the Jini network. 
 The TV automatically requests the VCR's interface and configures its channels 
accordingly. 
 The VCR automatically requests the clock interface provided by the home 
miniserver and sets its time. 
• Jini can automate a number of enterprise system administration duties, freeing 
sysadmins to do more interesting work. 
Presented By:- Purnendu Mishra(CS200119100)
Conclusion 
Technical Seminar - 2004 
• Jini technology is built on top of the Java 2 platform application environment and 
makes use of the core Java platform functionality to provide a distributed 
computing model that's reliable, portable, and easy to use. 
• The JavaOne conference offers a number of valuable opportunities to educate you 
on the ins and outs of Jini technology. 
• Jini technology will succeed to the extent that this new technology, combined with 
the now-in-progress community model of development, succeeds. 
Presented By:- Purnendu Mishra(CS200119100)
THANK U!!! 
Technical Seminar - 2004 
Presented By:- Purnendu Mishra(CS200119100)

More Related Content

What's hot

Jini network technology
Jini  network   technologyJini  network   technology
Jini network technologyKeerthi Thomas
 
Jini Network Technology
Jini Network TechnologyJini Network Technology
Jini Network TechnologyKwangshin Oh
 
Enabling Advanced Automation with Network-friendly Machine Learning
Enabling Advanced Automation with Network-friendly Machine LearningEnabling Advanced Automation with Network-friendly Machine Learning
Enabling Advanced Automation with Network-friendly Machine LearningLaurent Ciavaglia
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewLaurent Ciavaglia
 
Intent Driven Networks: Challenges and Enablers
Intent Driven Networks: Challenges and EnablersIntent Driven Networks: Challenges and Enablers
Intent Driven Networks: Challenges and EnablersLaurent Ciavaglia
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network AutomationLaurent Ciavaglia
 
Towards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsTowards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsLaurent Ciavaglia
 
Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?Cisco Service Provider
 
Deployment of scalable reliable and collaborative technology
Deployment of scalable reliable and collaborative technologyDeployment of scalable reliable and collaborative technology
Deployment of scalable reliable and collaborative technologyGGR Communications
 
מונחים טכנולוגים למנהלי הדרכה באמדוקס
מונחים טכנולוגים למנהלי הדרכה באמדוקסמונחים טכנולוגים למנהלי הדרכה באמדוקס
מונחים טכנולוגים למנהלי הדרכה באמדוקסSamuel Dratwa
 
OSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5G
OSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5GOSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5G
OSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5GLumina Networks
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...AllSeen Alliance
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...Real-Time Innovations (RTI)
 

What's hot (19)

Jini network technology
Jini  network   technologyJini  network   technology
Jini network technology
 
Jini Network Technology
Jini Network TechnologyJini Network Technology
Jini Network Technology
 
Jini
JiniJini
Jini
 
jini technology
 jini technology jini technology
jini technology
 
Enabling Advanced Automation with Network-friendly Machine Learning
Enabling Advanced Automation with Network-friendly Machine LearningEnabling Advanced Automation with Network-friendly Machine Learning
Enabling Advanced Automation with Network-friendly Machine Learning
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside View
 
Intent Driven Networks: Challenges and Enablers
Intent Driven Networks: Challenges and EnablersIntent Driven Networks: Challenges and Enablers
Intent Driven Networks: Challenges and Enablers
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network Automation
 
Towards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsTowards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network Operations
 
Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?Is Network-based Mobility Management the Future?
Is Network-based Mobility Management the Future?
 
Deployment of scalable reliable and collaborative technology
Deployment of scalable reliable and collaborative technologyDeployment of scalable reliable and collaborative technology
Deployment of scalable reliable and collaborative technology
 
The Automation Continuum
The Automation ContinuumThe Automation Continuum
The Automation Continuum
 
מונחים טכנולוגים למנהלי הדרכה באמדוקס
מונחים טכנולוגים למנהלי הדרכה באמדוקסמונחים טכנולוגים למנהלי הדרכה באמדוקס
מונחים טכנולוגים למנהלי הדרכה באמדוקס
 
OSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5G
OSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5GOSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5G
OSN Bay Area Feb 2019 Meetup: The Kerton Group, Open Source & 5G
 
Who is ICC Networking
Who is ICC NetworkingWho is ICC Networking
Who is ICC Networking
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...
 
NGN & IMS
NGN & IMSNGN & IMS
NGN & IMS
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
 

Viewers also liked

Because i believe i can
Because i believe i canBecause i believe i can
Because i believe i cansaurabh gupta
 
Sekolah kebangsaan jalan raja syed alwi
Sekolah kebangsaan jalan raja syed alwiSekolah kebangsaan jalan raja syed alwi
Sekolah kebangsaan jalan raja syed alwiNorshida Shida
 
Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"
Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"
Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"PerformanceIN
 
Pour les enfants du monde entier
Pour les enfants du monde entierPour les enfants du monde entier
Pour les enfants du monde entiersatelite1
 
Dispositivos de entrada
Dispositivos de entradaDispositivos de entrada
Dispositivos de entradapatiluki
 
Class 2 unit 8 can you help me please
Class 2 unit 8 can you help me pleaseClass 2 unit 8 can you help me please
Class 2 unit 8 can you help me pleaseridahprasetio
 
Is talking the most effective and satisfying way of communicating with others?
Is talking the most effective and satisfying way of communicating with others?Is talking the most effective and satisfying way of communicating with others?
Is talking the most effective and satisfying way of communicating with others?Qiang Hao
 
360Gate Business Objects portal
360Gate Business Objects portal360Gate Business Objects portal
360Gate Business Objects portalSebastien Goiffon
 
Better Biz Dev – Music Startup Academy Denver - October 8, 2015
Better Biz Dev – Music Startup Academy Denver - October 8, 2015Better Biz Dev – Music Startup Academy Denver - October 8, 2015
Better Biz Dev – Music Startup Academy Denver - October 8, 2015Shawn Yeager
 
Thermal Management And Sd0802 C Presentation
Thermal Management And Sd0802 C PresentationThermal Management And Sd0802 C Presentation
Thermal Management And Sd0802 C Presentationsforman1
 
Caldwell recognition-2012
Caldwell recognition-2012Caldwell recognition-2012
Caldwell recognition-2012ryanatsofa
 
Rian vebrianto brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...
Rian vebrianto  brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...Rian vebrianto  brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...
Rian vebrianto brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...Rian vebrianto
 
Lecture 08: “two sides of the same coin”
Lecture 08: “two sides of the same coin”Lecture 08: “two sides of the same coin”
Lecture 08: “two sides of the same coin”Patrick Mooney
 

Viewers also liked (20)

Because i believe i can
Because i believe i canBecause i believe i can
Because i believe i can
 
Amit PPT
Amit PPTAmit PPT
Amit PPT
 
Sekolah kebangsaan jalan raja syed alwi
Sekolah kebangsaan jalan raja syed alwiSekolah kebangsaan jalan raja syed alwi
Sekolah kebangsaan jalan raja syed alwi
 
Li & fung ltd
Li & fung ltdLi & fung ltd
Li & fung ltd
 
Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"
Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"
Create - Day 2 - 11:15 - "Six Secrets to Overcoming Social Marketing Hurdles"
 
Pour les enfants du monde entier
Pour les enfants du monde entierPour les enfants du monde entier
Pour les enfants du monde entier
 
Dispositivos de entrada
Dispositivos de entradaDispositivos de entrada
Dispositivos de entrada
 
Unit 1 the universe
Unit 1 the universeUnit 1 the universe
Unit 1 the universe
 
Class 2 unit 8 can you help me please
Class 2 unit 8 can you help me pleaseClass 2 unit 8 can you help me please
Class 2 unit 8 can you help me please
 
Is talking the most effective and satisfying way of communicating with others?
Is talking the most effective and satisfying way of communicating with others?Is talking the most effective and satisfying way of communicating with others?
Is talking the most effective and satisfying way of communicating with others?
 
The engineer’s licensing guidance document ELGD 2007
The engineer’s licensing guidance document ELGD 2007The engineer’s licensing guidance document ELGD 2007
The engineer’s licensing guidance document ELGD 2007
 
AdVoice
AdVoiceAdVoice
AdVoice
 
360Gate Business Objects portal
360Gate Business Objects portal360Gate Business Objects portal
360Gate Business Objects portal
 
R.T_article pdf
R.T_article pdfR.T_article pdf
R.T_article pdf
 
Bebepolis
BebepolisBebepolis
Bebepolis
 
Better Biz Dev – Music Startup Academy Denver - October 8, 2015
Better Biz Dev – Music Startup Academy Denver - October 8, 2015Better Biz Dev – Music Startup Academy Denver - October 8, 2015
Better Biz Dev – Music Startup Academy Denver - October 8, 2015
 
Thermal Management And Sd0802 C Presentation
Thermal Management And Sd0802 C PresentationThermal Management And Sd0802 C Presentation
Thermal Management And Sd0802 C Presentation
 
Caldwell recognition-2012
Caldwell recognition-2012Caldwell recognition-2012
Caldwell recognition-2012
 
Rian vebrianto brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...
Rian vebrianto  brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...Rian vebrianto  brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...
Rian vebrianto brunai (PEMBANGUNAN MEDIA PENGAJARAN: MODUL DAN MULTIMEDIA DA...
 
Lecture 08: “two sides of the same coin”
Lecture 08: “two sides of the same coin”Lecture 08: “two sides of the same coin”
Lecture 08: “two sides of the same coin”
 

Similar to Jini new technology for a networked world

Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesOpen Networking Summit
 
Network function virtualization
Network function virtualizationNetwork function virtualization
Network function virtualizationSatish Chavan
 
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...WSO2
 
Comparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesComparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesMirantis
 
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningAutomating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningHitesh Mohapatra
 
Leading the way to an intelligent network
Leading the way to an intelligent networkLeading the way to an intelligent network
Leading the way to an intelligent networkRamrao Desai
 
IBM SmartCloud Orchestration
IBM SmartCloud OrchestrationIBM SmartCloud Orchestration
IBM SmartCloud OrchestrationIBM Danmark
 
Deployability
DeployabilityDeployability
DeployabilityLen Bass
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?NGINX, Inc.
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...apidays
 
Net-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platformNet-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platformyurid79
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxNayanrai14
 
SCF Partners' Day: Technologies for Densification
SCF Partners' Day: Technologies for DensificationSCF Partners' Day: Technologies for Densification
SCF Partners' Day: Technologies for DensificationSmall Cell Forum
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 

Similar to Jini new technology for a networked world (20)

2 vm provisioning
2 vm provisioning2 vm provisioning
2 vm provisioning
 
vm provisioning
vm provisioningvm provisioning
vm provisioning
 
Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and Services
 
Network function virtualization
Network function virtualizationNetwork function virtualization
Network function virtualization
 
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
[APIdays Paris 2019] API Management in Service Mesh Using Istio and WSO2 API ...
 
Comparison of Current Service Mesh Architectures
Comparison of Current Service Mesh ArchitecturesComparison of Current Service Mesh Architectures
Comparison of Current Service Mesh Architectures
 
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine ProvisioningAutomating the Cloud: A Deep Dive into Virtual Machine Provisioning
Automating the Cloud: A Deep Dive into Virtual Machine Provisioning
 
Leading the way to an intelligent network
Leading the way to an intelligent networkLeading the way to an intelligent network
Leading the way to an intelligent network
 
IBM SmartCloud Orchestration
IBM SmartCloud OrchestrationIBM SmartCloud Orchestration
IBM SmartCloud Orchestration
 
Deployability
DeployabilityDeployability
Deployability
 
Mini Project- Virtual Network Project
Mini Project- Virtual Network ProjectMini Project- Virtual Network Project
Mini Project- Virtual Network Project
 
Do You Need A Service Mesh?
Do You Need A Service Mesh?Do You Need A Service Mesh?
Do You Need A Service Mesh?
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...
APIdays Paris 2019 - Cloud native API Management for Microservices on a Servi...
 
Net-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platformNet-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platform
 
Unit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptxUnit 2 Virtualization Part I.pptx
Unit 2 Virtualization Part I.pptx
 
SCF Partners' Day: Technologies for Densification
SCF Partners' Day: Technologies for DensificationSCF Partners' Day: Technologies for Densification
SCF Partners' Day: Technologies for Densification
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
14A81A05B1
14A81A05B114A81A05B1
14A81A05B1
 

More from Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middlewareSajan Sahu
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoySajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memorySajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraftSajan Sahu
 
Data compretion
Data compretionData compretion
Data compretionSajan Sahu
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseingSajan Sahu
 
Information system
Information systemInformation system
Information systemSajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatSajan Sahu
 
Database system
Database systemDatabase system
Database systemSajan Sahu
 
Internet telephony
Internet telephonyInternet telephony
Internet telephonySajan Sahu
 

More from Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Dna computing
Dna computingDna computing
Dna computing
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Jini new technology for a networked world

  • 1. Technical Seminar - 2004 JINI: New Technology FFoorr aa NNeettwwoorrkkeedd WWoorrlldd Under the guidance of Miss Ipshita Mishra Presented By Purnendu Mishra Roll no-CS200119100 Presented By:- Purnendu Mishra(CS200119100)
  • 2. Introduction Technical Seminar - 2004 • Jini technology, announced by Sun Microsystems in January 1999, represents a fundamental shift in the way we do distributed computing. • Jini is a set of APIs and network protocols that can help you build and deploy distributed systems that are organized as federations of services. • Jini's architecture helps to raise the level of abstraction in distributed systems programming, effectively turning network programming into object-oriented programming. • Jini technology helps developers address the fundamental difficulties of distributed computing. • Jini technology is built on top of the Java 2 platform application environment. It uses core Java platform functionality to provide a reliable, portable, and ultimately simple-to-use distributed computing model. • Jini is an attempt to rethink computer architecture, given the rising importance of the network and the proliferation of processors in devices that have no disk drive. Presented By:- Purnendu Mishra(CS200119100)
  • 3. Components of Jini Technical Seminar - 2004 • CORBA & DCOM are the languages used in JINI technology. • EJB is used to build the business logic servers. • Three main parts:-  Service  Client  Look up Service • TCP/IP is the basic network used in JINI technology. Presented By:- Purnendu Mishra(CS200119100)
  • 4. Technical Seminar - 2004 The Discovery Process • As soon as the JINI enabled disk drive is connected to the network it broadcasts a presence announcement by dropping a multicast packet onto a well known port. • The lookup service monitors the well known port for presence announcement packets. After receiving the conformation it then it contacts the sender directly by making TCP connection. • Using RMI, the lookup service sends an object, called a service registrar, across the network to the originator of the packet. The service register facilitate further communication with the lookup service. After the communication the join process and the lookup process comes into action. Presented By:- Purnendu Mishra(CS200119100)
  • 5. The Join process Technical Seminar - 2004 • When a service provider has a service register object the end product is ready to do a join. • The service provider invokes the register on the service register object passing a parameter an object called a service item which describes the service. • The register sends a copy of the service item to the lookup service, where the service item is stored. • After the completion of the join process the service has been registered in the lookup service. Presented By:- Purnendu Mishra(CS200119100)
  • 6. The Lookup Process Technical Seminar - 2004 • Once a service has registered with a lookup service via the join process, that service is available for use by clients who query that lookup service. To build a distributed system of services that will work together to perform some task, a client must locate and enlist the help of the individual services. • The lookup() method sends the service template to the lookup service, which performs the query and sends back zero to many matching service objects. • The client gets a reference to the matching service objects as the return value of the lookup() method. • The client looks up a service by JAVA type, which is an interface. Presented By:- Purnendu Mishra(CS200119100)
  • 7. Technical Seminar - 2004 Presented By:- Purnendu Mishra(CS200119100)
  • 8. Technical Seminar - 2004 Separation of Interface & Implementation • Jini's architecture brings object-oriented programming to the network by enabling network services to take advantage of one of the fundamentals of object-oriented programming. • The Jini architecture has a property in which the network protocol that communicates between a proxy service object and a remote server has no link with the client. • A service can use specialized hardware to fulfill client requests, or it can do all its work in software. • To the client, a service looks like the well-known interface, regardless of how the service is implemented. Presented By:- Purnendu Mishra(CS200119100)
  • 9. Support Services Technical Seminar - 2004 • The three components of a Jini system are clients, services and service locators, which may run anywhere on the network. • These will be implemented using Java code running in Java Virtual Machines (JVM). • The ability to move objects across the network from one JVM to another, particular implementations must make use of support services such as RMI daemons and HTTP services.  A Java object running as a service has a proxy component exported to the service locators and then onto a client. It passes through one JVM in ``passive'' form and is activated ( brought to life) in the client's JVM.  The JAVA REMOTE METHOD INVOCATION system has two types:  The original UnicastRemoteObject.  The newer Activable class. Presented By:- Purnendu Mishra(CS200119100)
  • 10. JINI at a Glance Technical Seminar - 2004 • The different uses of Jini technology are:-  A printer can be connected to the network and the user can access the printer from another system without having it configured.  To reduce the maintenance cost the file on one system is made into the network so that all the clients can access it.  New capabilities extending existing ones can be added to a running system without disrupting existing services. • The different unique qualities are:-  Code mobility.  Protocol agonistic.  Leasing. Presented By:- Purnendu Mishra(CS200119100)
  • 11. Technical Seminar - 2004 Real World Example of Jini Technology • Jini technology gives real-world ease-of-use a boost for many types of networked devices. • As for an example let us consider to install and configure a new VCR.  The consumer plugs in the VCR.  The VCR announces its presence to the Jini network.  The TV automatically requests the VCR's interface and configures its channels accordingly.  The VCR automatically requests the clock interface provided by the home miniserver and sets its time. • Jini can automate a number of enterprise system administration duties, freeing sysadmins to do more interesting work. Presented By:- Purnendu Mishra(CS200119100)
  • 12. Conclusion Technical Seminar - 2004 • Jini technology is built on top of the Java 2 platform application environment and makes use of the core Java platform functionality to provide a distributed computing model that's reliable, portable, and easy to use. • The JavaOne conference offers a number of valuable opportunities to educate you on the ins and outs of Jini technology. • Jini technology will succeed to the extent that this new technology, combined with the now-in-progress community model of development, succeeds. Presented By:- Purnendu Mishra(CS200119100)
  • 13. THANK U!!! Technical Seminar - 2004 Presented By:- Purnendu Mishra(CS200119100)