Resource Management Factories and the Activation Framework
Chapter 17. Factories and the Activation Framework
In Chapt er 14 and Chapt er 15 , we discussed how to build a better naming service, one that has a great deal more flexibility than the RMI registry and enables easier lookup of specific servers. However, applications that could potentially have millions of servers still require more infrastructure to help them deal with resource management. In this chapter, well discuss the most common way of achieving this, the factory pattern, and how it is supported in RMI. To do this, well implement a basic factory directly, and then implement similar functionality using RMIs activation framework.17.1 Resource Management
Our bank example has so far been a small-scale application. While Account is a fairly flexible interface, and you may think you can support millions of accounts using our new naming service and one of the implementations of Account that weve discussed, the fact of the matter is that more infrastructure is required. To see why, consider the Bank of America advertisement quoted in Chapt er 5 : When traveling, take advantage of more than 13,000 Bank of America ATMs coast to coast. Were in 30 states and the District of Columbia. As a Bank of America Check Card or ATM cardholder, theres no ATM fee when you use an ATM displaying a Bank of America sign... ™Bank of America advertisement Thats 13,000 dedicated client machines. Plus, there are the client applications running inside each branch of the bank, the central reporting and analysis applications each division of the bank runs, and all the new Internet services that our hypothetical bank wants to roll out over the next few years. In short, we have the following situation: A potentially unbounded number of client applications running over a period of time. Practically speaking, there wont be many more clients running than there are accounts. So a good upper boundary on the number of clients is the number of open accounts. For a large bank, this can be over 10 million. Most servers will be active occasionally. Most people look at their account balances and information at least once a month. In addition, automatic bill-paying programs and other advanced services will probably require access to account information. Most servers will be inactive most of the time. Most people dont look at their account balances and information more than once a day. Since such usage, along with monthly and weekly reporting functionality, is the vast majority of anticipated use, it follows that most accounts will be inactive most of the time. Most clients want to access a small number of accounts for a short period of time. Were assuming our previous model of client-interaction is probably correct for most applications. We also know that each JVM has a limited number of available sockets and, as a practical matter, will run into problems supporting large numbers of clients. How many clients can a JVM support? It depends on the application, of course. The absolute limit, based on the number of sockets a process can open, is around 1,000 for most operating systems. But reports from the trenches occasionally suggest that a more reasonable limit for an RMI server is between 150 and 200 simultaneous client connections from distinct client computers. Once past t hat, the RMI runtime apparently bogs down. Suppose we take the current implementation and try to make it scale, using the following seat-of- the-pants assumptions: • There are 10 million accounts. • We launch 200 accounts per JVM. • We run 25 JVMs per machine on our server farm. Simple arithmetic leads us to conclude that we need 2,000 servers on our server farm, which is, quite honestly, a ridiculous number. Consuming vast amounts of resources to keep mostly idle servers available on a 247 basis is a bad idea. Moreover, 2,000 server computers, running 50,000 JVMs, would completely overwhelm any distributed garbage collection scheme based on a centralized naming service. The fact of the matter is, we cant take our existing architecture, move servers to different JVMs, and then scale to millions of servers. Looking at the numbers reveals a surprising assumption: our calculations assume that a server computer is capable of handling 5,000 clients 25 JVMS times 200 clients per JVM. This is quite a bit on the high side. However, this is good for a seat-of-the-pants estimate. Replacing our numbers with more reasonable ones only leads to an increase in the number of computers required. In Par t I , we used multiple instances of Account for our servers. The main reason for this decision was that, by and large, smaller servers are easier to write, maintain, and verify. However, the previous discussion may cause you to revisit that decision. After all, if we went with the bank option, servers wouldnt be account-specific. Instead, account identifiers would get passed in as arguments with each method call. This partially solves the resource problem weve been discussing. We can assume: • There are 10 million accountsbut this is irrelevant. • We launch 1 server per JVM. • We run 25 JVMs per machine on our server farm. Hence, the number of server machines we need is simply a function of our expected number of clients. Each computer in the server farm is capable of handling 5,000 simultaneous clients. [ 1] If we expect to handle 20,000 simultaneous client requests, then we need only 10 or so servers, building in a margin of error for peak activity. [ 1] Again, not really. See the note about unrealistic assumptions. This is a dilemma. As developers, wed like to go with the account servers. But, from a deployment point of view, the bank option looks compelling.17.2 Factories
Parts
» OReilly.Java.Rmi. 2313KB Mar 29 2010 05:03:49 AM
» Writing data Resource management
» Some Useful Intermediate Streams
» Revisiting the ViewFile Application
» Protocols Metadata Protocols and Metadata
» The accept method A Simple Web Server
» Customizing Socket Behavior Sockets
» Direct Stream Manipulation Subclassing Socket Is a Better Solution
» A Special-Purpose Socket Special-Purpose Sockets
» Factories Socket Factories Special-Purpose Sockets
» Registering providers Using SSL with JSSE
» Configuring SSLServerSocket Using SSL with JSSE
» A Network-Based Printer A Socket-Based Printer Server
» The Basic Objects A Socket-Based Printer Server
» DocumentDescription Encapsulation and Sending Objects
» ClientNetworkWrapper Network-Aware Wrapper Objects
» ServerNetworkWrapper Network-Aware Wrapper Objects
» Passing by Value Versus Passing by Reference
» The Architecture Diagram Revisited
» The Printer Interface Implementing the Basic Objects
» Examining the skeleton Implementing a Printer
» DocumentDescription The Data Objects
» The Client Application Summary
» The Bank Example Introducing the Bank Example
» Security Scalability Design Postponements
» The Basic Use Case A Distributed Architecturefor the Bank Example
» Partial Failures Problems That Arise in Distributed Applications
» Network Latency Problems That Arise in Distributed Applications
» Memory, in general, is not an issue here Sockets in RMI arent a limitation either
» Applying this to Bank versus Accounts
» Should We Implement Bank or Account?
» Iterators, again Applying this to the Account interface
» Applying this to the Account interface
» Data Objects Dont Usually Have Functional Methods Interfaces Give You the Data Objects
» Accounting for Partial Failure
» A Server That Extends UnicastRemoteObject A Server That Does Not Extend UnicastRemoteObject
» The benefits of UnicastRemoteObject
» The costs of UnicastRemoteObject
» Getting Rid of the Skeletons
» Build Test Applications The Rest of the Application
» Dont Hold Connections to a Server Youre Not Using
» Validate Arguments on the Client Side Whenever Reasonable
» The Actual Client Application
» Deploying the Application The Rest of the Application
» Drilling Down on Object Creation
» The write methods ObjectOutputStream
» The stream manipulation methods Methods that customize the serialization mechanism
» The read methods ObjectInputStream
» Declaring transient fields Implementing writeObject and readObject
» Implement the Serializable Interface Make Sure That Superclass State Is Handled Correctly
» The Data Format The Serialization Algorithm
» Writing A Simplified Version of the Serialization Algorithm
» annotateClass replaceObject RMI Customizes the Serialization Algorithm
» Maintaining Direct Connections The Serialization Algorithm
» The Two Types of Versioning Problems
» How Serialization Detects When a Class Has Changed Implementing Your Own Versioning Scheme
» Serialization Depends on Reflection Serialization Has a Verbose Data Format
» It Is Easy to Send More Data Than Is Required
» Comparing Externalizable to Serializable
» The Calling Stack Basic Terminology
» The Heap Threads Basic Terminology
» Mutexes Applying This to the Printer Server
» Controlling Individual Threads Threading Concepts
» Coordinating Thread Activities Threading Concepts
» Cache Management Assigning Priorities to Threads
» The effects of synchronization on the threads local cache
» The wait methods The notify methods
» Starting a thread is easy Stopping a thread is harder
» Using Runnable instead of subclassing Thread Useful methods defined on the Thread class
» The Basic Task Implementing Threading
» Applying this to the bank example
» Synchronize around the smallest possible block of code
» Dont synchronize across device accesses
» Concurrent modification exceptions Be Careful When Using Container Classes
» Start with Code That Works Use Containers to Mediate Interthread Communication
» Immutable Objects Are Automatically Threadsafe Always Have a Safe Way to Stop Your Threads
» Pay Careful Attention to What You Serialize
» Use Threading to Reduce Response-Time Variance Limit the Number of Objects a Thread Touches
» Acquire Locks in a Fixed Order Use Worker Threads to Prevent Deadlocks
» The Idea of a Pool Two Interfaces That Define a Pool
» A First Implementation of Pooling
» Problems with SimplePool Pools: An Extended Example
» The Creation Thread Pools: An Extended Example
» Gradually Shrinking the Pool
» What Were Testing Testing the Bank Application
» When Are Naming Services Appropriate?
» bind , rebind , and unbind lookup and list
» Bootstrapping the Registry The RMI Registry Is an RMI Server
» Querying the Registry Launching an Application-Specific Registry
» Filesystems Yellow pages The general idea of directories and entries
» Security Issues The RMI Registry
» Operations on contexts Hierarchies
» Attributes are string-valued, name-value pairs
» Federation Federation and Threading
» Value Objects Represent Sets and Lists Paths, Names, and Attributes Are All Distinct
» AttributeSet The Value Objects
» Path and ContextList The Value Objects
» The Context Interface The Java Naming and Directory Interface JNDI
» Using JNDI with the Bank Example
» How RMI Solves the Bootstrapping Problem
» Ordinary Garbage Collection Distributed Garbage Collection
» Defining Network Garbage Distributed Garbage Collection
» Leasing Distributed Garbage Collection
» The Actual Distributed Garbage Collector The Unreferenced Interface
» The Standard Log RMIs Logging Facilities
» The Specialized Logs RMIs Logging Facilities
» java.rmi.server.randomIDs sun.rmi.server.exceptionTrace
» sun.rmi.dgc.client.gcInterval sun.rmi.dgc.server.gcInterval
» sun.rmi.dgc.checkInterval sun.rmi.dgc.cleanInterval
» Resource Management Factories and the Activation Framework
» A Basic Factory Implementing a Generic Factory
» The new factory Building on the Account-Locking Mechanism
» The new account The launch code and the client
» Persistence and the Server Lifecycle
» Making a server into an activatable object
» Deploying an Activatable System
» ActivationDesc, ActivationGroupDesc, and ActivationGroup in More Detail
» Shutting Down an Activatable Server
» -port -log rmid Command-Line Arguments
» sun.rmi.server.activation.debugExec
» A Final Word About Factories
» Implementing Serializable Implementing equals and hashCode
» Modifying Ordinary Servers Incorporating a Custom Socket into an Application
» Modifying Activatable Servers Incorporating a Custom Socket into an Application
» Interaction with Parameters Incorporating a Custom Socket into an Application
» A Redeployment Scenario How Dynamic Classloading Works
» A Multiple-Deployment Scenario How Dynamic Classloading Works
» Requesting a Class The Class Server
» Receiving a Class Handling JAR files
» Suns Class Server The Class Server
» Server-Side Changes Using Dynamic Classloadingin an Application
» Naming-Service Changes Using Dynamic Classloadingin an Application
» Client-Side Changes Disabling Dynamic Classloading Entirely
» A Different Kind of Security Problem
» AWT permissions The Types of Permissions
» File permissions Socket permissions
» Property permissions The Types of Permissions
» Installing an Instance of SecurityManager
» How a Security Manager Works java.security.debug
» Using Security Policies with RMI Policy Tool
» Printer-Type Methods Report-Type Methods
» Client-side polling Polling code in the printer application
» Server-side callbacks Define a client-side callback interface
» Implement the client-side interface
» Server-evaluation models Ch a pt e r 7
» Iterators on the client side
» Implementing Background Downloading on the Client Side
» The Common Gateway Interface Servlets
» Naming services and the server machine
» The Servlet Code A Servlet Implementationof HTTP Tunneling
» Modifying the Tunneling Mechanism
» Disabling HTTP Tunneling HTTP Tunneling
» Defining the Interface Generating Stubs and Skeletons
» The Server The Launch and Client Code
Show more