Implementing Background Downloading on the Client Side
21.3.2 Implementing Background Downloading on the Client Side
The architecture for implementing background downloading isnt all that different from the architecture for polling. In both cases, the same general thing happens: the background thread on the client side repeatedly makes the same request of a server until the return value from the request indicates a stop condition. Assume our servers have the following two interfaces: public interface SalesHelper extends Remote { public QueryResponse getAllAccountsWithBalanceOverMoney amount throws RemoteException; } public interface AccountIterator extends Remote { public int getNumberOfRemainingAccounts throws RemoteException; public AccountList getNextint numberToFetch throws RemoteException; } This requires two value objects: AccountList and QueryResponse . AccountList encapsulates a set of accounts; it is the basic unit of information sent from the server to the client: public class AccountList implements Serializable { public int numberOfAccountsRequested; public int numberOfAccountsReturned; public boolean areThereMoreAccountsToFetch; public ArrayList accounts; } QueryResponse extends AccountList and adds a single attribute: public class QueryResponse extends AccountList { public AccountIterator accountIterator; } Given all of this, the clients implementation of background downloading looks something like the following: public abstract class AskServer implements Runnable { private AccountIterator _accountIterator; private String _salesHelperName; private Money _threshhold; private AccountList _currentAccounts; private int _fetchSize; protected abstract void handleResponseSetArrayList nextSetOfResponses; public AskServerString salesHelperName, Money threshhold, int fetchSize { _salesHelperName = salesHelperName; _threshhold = threshhold; _fetchSize = fetchSize; } public void performQuery { try { makeInitialRequest ; } catch Exception e { System.out.printlnError in connecting to server; e.printStackTrace ; return; } new Threadthis.start ; } public void run { while_currentAccounts.areThereMoreAccountsToFetch { try { _currentAccounts = _accountIterator.getNext_fetchSize; handleResponseSet_currentAccounts.accounts; } catch RemoteException e { insert exception handling here its fairly customary to break the loop at this point } } } private void makeInitialRequest throws Exception { SalesHelper salesHelper = SalesHelper Naming.lookup_salesHelperName; QueryResponse queryResponse = salesHelper.getAllAccountsWithBalanceOver_threshhold; _currentAccounts = queryResponse; _accountIterator = queryResponse.accountIterator; handleResponseSet_currentAccounts.accounts; } } This does exactly what youd expect: it establishes a connection in the main method and then delegates the background downloading to a secondary thread that it creates. In more complex systems, or for server-to-server communication, this secondary thread would probably be obtained from a pool of threads see Chapt er 12 . However, for a typical client, creating threads on the fly doesnt lead to a lot of overhead. There is an interesting point here, though. We didnt implement any exception handling inside the background-downloading loop. This code is rather tricky and application-specific. Ideally, wed like to detect what causes the error Was it a transient network failure? Did the server crash entirely? Was there a null pointer exception in that particular block of data? and work around it. However, without knowing more about the server, its hard to say what the correct behavior should be.21.4 Generalizing from These Examples
The point of this chapter is simple: when your architecture goes beyond request-response cycles, you need to think carefully about what exactly your client is doing. Many times the boundary between clients and servers gets a little fuzzy, and the client starts responding to remote method invocations. More frequently, the client becomes a fairly complex application with a lot of threads performing secondary interactions with the server. The three basic techniques presented in this chapter™polling, callbacks, and interator-based data acquisition™go a long way towards solving a wide variety of client-server interaction design problems.Chapter 22. HTTP Tunneling
One of the most pervasive problems in client-server computing is that servers are frequently inaccessible to clients. Sometimes this is because the server is down. More often, however, its because a firewall has been erected between the computer running the client and the computer running the server. In this chapter, well cover one widely used method, known as HTTP tunneling, that an RMI application can use to circumvent firewalls and enable your application to function. Before the Internet, corporate networks were isolated. Large companies frequently had multiple- computer networks, and computers on one network were often incapable of sending any information to computers on a different network. Now that the Internet has become a global network, the situation is quite different. Most computers are, at least occasionally, connected to the Internet. This situation, while making things like the World Wide Web possible, makes life very difficult for systems administrators. They are called upon to build robust networks that are fully connected to the Internet so companies can take full advantage of what it has to offer while simultaneously preventing unauthorized users from accessing corporate information.22.1 Firewalls
This dilemma is frequently solved by using a firewall. A firewall is a combination of software and hardware that separates two logically distinct networks. If the firewall is removed, the two networks are no longer connected to each other. Because all traffic between the two networks must flow through the firewall, the firewall can screen all the packets sent between the two networks and throw away any packets that violate the firewalls security policy. For example, a company might place a firewall between its internal network and the Internet, and establish a policy such as:Parts
» OReilly.Java.Rmi. 2313KB Mar 29 2010 05:03:49 AM
» Writing data Resource management
» Some Useful Intermediate Streams
» Revisiting the ViewFile Application
» Protocols Metadata Protocols and Metadata
» The accept method A Simple Web Server
» Customizing Socket Behavior Sockets
» Direct Stream Manipulation Subclassing Socket Is a Better Solution
» A Special-Purpose Socket Special-Purpose Sockets
» Factories Socket Factories Special-Purpose Sockets
» Registering providers Using SSL with JSSE
» Configuring SSLServerSocket Using SSL with JSSE
» A Network-Based Printer A Socket-Based Printer Server
» The Basic Objects A Socket-Based Printer Server
» DocumentDescription Encapsulation and Sending Objects
» ClientNetworkWrapper Network-Aware Wrapper Objects
» ServerNetworkWrapper Network-Aware Wrapper Objects
» Passing by Value Versus Passing by Reference
» The Architecture Diagram Revisited
» The Printer Interface Implementing the Basic Objects
» Examining the skeleton Implementing a Printer
» DocumentDescription The Data Objects
» The Client Application Summary
» The Bank Example Introducing the Bank Example
» Security Scalability Design Postponements
» The Basic Use Case A Distributed Architecturefor the Bank Example
» Partial Failures Problems That Arise in Distributed Applications
» Network Latency Problems That Arise in Distributed Applications
» Memory, in general, is not an issue here Sockets in RMI arent a limitation either
» Applying this to Bank versus Accounts
» Should We Implement Bank or Account?
» Iterators, again Applying this to the Account interface
» Applying this to the Account interface
» Data Objects Dont Usually Have Functional Methods Interfaces Give You the Data Objects
» Accounting for Partial Failure
» A Server That Extends UnicastRemoteObject A Server That Does Not Extend UnicastRemoteObject
» The benefits of UnicastRemoteObject
» The costs of UnicastRemoteObject
» Getting Rid of the Skeletons
» Build Test Applications The Rest of the Application
» Dont Hold Connections to a Server Youre Not Using
» Validate Arguments on the Client Side Whenever Reasonable
» The Actual Client Application
» Deploying the Application The Rest of the Application
» Drilling Down on Object Creation
» The write methods ObjectOutputStream
» The stream manipulation methods Methods that customize the serialization mechanism
» The read methods ObjectInputStream
» Declaring transient fields Implementing writeObject and readObject
» Implement the Serializable Interface Make Sure That Superclass State Is Handled Correctly
» The Data Format The Serialization Algorithm
» Writing A Simplified Version of the Serialization Algorithm
» annotateClass replaceObject RMI Customizes the Serialization Algorithm
» Maintaining Direct Connections The Serialization Algorithm
» The Two Types of Versioning Problems
» How Serialization Detects When a Class Has Changed Implementing Your Own Versioning Scheme
» Serialization Depends on Reflection Serialization Has a Verbose Data Format
» It Is Easy to Send More Data Than Is Required
» Comparing Externalizable to Serializable
» The Calling Stack Basic Terminology
» The Heap Threads Basic Terminology
» Mutexes Applying This to the Printer Server
» Controlling Individual Threads Threading Concepts
» Coordinating Thread Activities Threading Concepts
» Cache Management Assigning Priorities to Threads
» The effects of synchronization on the threads local cache
» The wait methods The notify methods
» Starting a thread is easy Stopping a thread is harder
» Using Runnable instead of subclassing Thread Useful methods defined on the Thread class
» The Basic Task Implementing Threading
» Applying this to the bank example
» Synchronize around the smallest possible block of code
» Dont synchronize across device accesses
» Concurrent modification exceptions Be Careful When Using Container Classes
» Start with Code That Works Use Containers to Mediate Interthread Communication
» Immutable Objects Are Automatically Threadsafe Always Have a Safe Way to Stop Your Threads
» Pay Careful Attention to What You Serialize
» Use Threading to Reduce Response-Time Variance Limit the Number of Objects a Thread Touches
» Acquire Locks in a Fixed Order Use Worker Threads to Prevent Deadlocks
» The Idea of a Pool Two Interfaces That Define a Pool
» A First Implementation of Pooling
» Problems with SimplePool Pools: An Extended Example
» The Creation Thread Pools: An Extended Example
» Gradually Shrinking the Pool
» What Were Testing Testing the Bank Application
» When Are Naming Services Appropriate?
» bind , rebind , and unbind lookup and list
» Bootstrapping the Registry The RMI Registry Is an RMI Server
» Querying the Registry Launching an Application-Specific Registry
» Filesystems Yellow pages The general idea of directories and entries
» Security Issues The RMI Registry
» Operations on contexts Hierarchies
» Attributes are string-valued, name-value pairs
» Federation Federation and Threading
» Value Objects Represent Sets and Lists Paths, Names, and Attributes Are All Distinct
» AttributeSet The Value Objects
» Path and ContextList The Value Objects
» The Context Interface The Java Naming and Directory Interface JNDI
» Using JNDI with the Bank Example
» How RMI Solves the Bootstrapping Problem
» Ordinary Garbage Collection Distributed Garbage Collection
» Defining Network Garbage Distributed Garbage Collection
» Leasing Distributed Garbage Collection
» The Actual Distributed Garbage Collector The Unreferenced Interface
» The Standard Log RMIs Logging Facilities
» The Specialized Logs RMIs Logging Facilities
» java.rmi.server.randomIDs sun.rmi.server.exceptionTrace
» sun.rmi.dgc.client.gcInterval sun.rmi.dgc.server.gcInterval
» sun.rmi.dgc.checkInterval sun.rmi.dgc.cleanInterval
» Resource Management Factories and the Activation Framework
» A Basic Factory Implementing a Generic Factory
» The new factory Building on the Account-Locking Mechanism
» The new account The launch code and the client
» Persistence and the Server Lifecycle
» Making a server into an activatable object
» Deploying an Activatable System
» ActivationDesc, ActivationGroupDesc, and ActivationGroup in More Detail
» Shutting Down an Activatable Server
» -port -log rmid Command-Line Arguments
» sun.rmi.server.activation.debugExec
» A Final Word About Factories
» Implementing Serializable Implementing equals and hashCode
» Modifying Ordinary Servers Incorporating a Custom Socket into an Application
» Modifying Activatable Servers Incorporating a Custom Socket into an Application
» Interaction with Parameters Incorporating a Custom Socket into an Application
» A Redeployment Scenario How Dynamic Classloading Works
» A Multiple-Deployment Scenario How Dynamic Classloading Works
» Requesting a Class The Class Server
» Receiving a Class Handling JAR files
» Suns Class Server The Class Server
» Server-Side Changes Using Dynamic Classloadingin an Application
» Naming-Service Changes Using Dynamic Classloadingin an Application
» Client-Side Changes Disabling Dynamic Classloading Entirely
» A Different Kind of Security Problem
» AWT permissions The Types of Permissions
» File permissions Socket permissions
» Property permissions The Types of Permissions
» Installing an Instance of SecurityManager
» How a Security Manager Works java.security.debug
» Using Security Policies with RMI Policy Tool
» Printer-Type Methods Report-Type Methods
» Client-side polling Polling code in the printer application
» Server-side callbacks Define a client-side callback interface
» Implement the client-side interface
» Server-evaluation models Ch a pt e r 7
» Iterators on the client side
» Implementing Background Downloading on the Client Side
» The Common Gateway Interface Servlets
» Naming services and the server machine
» The Servlet Code A Servlet Implementationof HTTP Tunneling
» Modifying the Tunneling Mechanism
» Disabling HTTP Tunneling HTTP Tunneling
» Defining the Interface Generating Stubs and Skeletons
» The Server The Launch and Client Code
Show more