Interaction with Parameters Incorporating a Custom Socket into an Application
18.2.3.1 Failure handlers
There are two additional static methods defined in RMISocketFactory : getFailure - Handler and setFailureHandler . These methods enable you to get and set the RMIFailureHandler . The RMIFailureHandler is used by RMI when, for some reason, an instance of ServerSocket is required, but cannot be created e.g., when the socket factory that is supposed to create the ServerSocket throws an exception. RMIFailureHandler is an interface with a single method: public boolean failureException ex The boolean return value is used to tell RMI how to proceed. A return value of true tells RMI to try to create the instance of ServerSocket again; a return value of false tells RMI that the attempt to create a server socket has failed completely. RMIs default implementation of RMIFailureHandler simply returns true . This is a pretty reasonable default, and overriding it by calling setFailureHandler is rarely done. The typical reason for overriding this behavior is to log the failure.18.2.4 Interaction with Parameters
In Chapt er 16 , we discussed a number of transport layer parameters. These are global properties of the JVM used to configure RMIs behavior with respect to sockets. The transport layer parameters are sun.rmi.transport.connectionTimeout , sun.rmi.transport.tcp.readTimeout , and sun.rmi.transport.proxy.connectTimeout . Its reasonable to wonder how these interact with the definition of custom socket factories. RMIs Default Connection Strategy RMISocketFactory is an abstract class that defines five static methods. The default implementation of RMISocketFactory used by Suns implementation of RMI does not simply create instances of Socket and ServerSocket . Instead, it defines a three-tiered connection strategy. The problem is this: corporate computing environments often have firewalls in place between the corporate intranet and the Internet. These firewalls block most socket-level communication, typically on the basis of the port involved. For example, a firewall policy may involve blocking all packets that arent being sent to either a mail server or a web server. Such a policy would block any RMI server listening on a randomly assigned socket. In order to get around this, the default implementation of RMISocketFactory implements the following client-side connection strategy: 1. Attempt a direct socket connection using JRMP the default RMI protocol. 2. If that fails, wrap up the remote method invocation inside an HTTP POST command, and attempt to post the remote method invocation to the server port. 3. If that fails, wrap up the remote method invocation inside an HTTP POST command, and attempt to post the remote method invocation to the server port, but with a predefined proxy machine. 4. If that fails, wrap up the remote method invocation inside an HTTP POST command, and attempt to post the remote method invocation to port 80 using the predefined proxy machine. This strategy is both useful and dangerous. Its useful because it helps when users are outside a corporate firewall and need to connect to an RMI server. Its dangerous because, in essence, it breaches the firewall. To the extent that the firewall was necessary, RMIs default connection strategy is a security risk. Well discuss this in greater detail in Chapt er 22 . The answer is that RMI uses the custom socket factories to create sockets, and then calls methods on the sockets to configure them. The sequence RMI goes through to obtain a server socket is: 1. Use the RMIServerSocketFactory associated with the server to see if a server socket has already been allocated. If so, use the existing server socket. 2. If not, call createServerSocket on the RMIServerSocketFactory associated with the server and, after the socket has been created, configure the socket. This means that, in practice, you set defaults for custom sockets and then override the defaults using system properties. This is identical to what happens with ordinary sockets.Chapter 19. Dynamic Classloading
Deploying a distributed application can be rather difficult. All of the computers that run parts of the application must have the relevant parts installed. For a local area network, this is usually a time- consuming, but not particularly difficult, process. However, when applications are deployed on a larger scale, and updated frequently, the deployment process becomes far more difficult. Dynamic classloading is a technology, built into RMI, which attempts to make this deployment a little easier. At this point in the book, weve covered most of the basics of building a robust and scalable distributed application. Weve gone through the rules for designing interfaces, weve spent a lot of time discussing threads, weve covered testing a distributed application, and weve even discussed how to optimize the distributed garbage collector. Now its time to dig deep into the task of deploying and redeploying an application.19.1 Deploying Can Be Difficult
Lets start by supposing that were deploying the latest version of the banking application. We need to do the following: • Configure the server machines. • Add the stub classes to the naming service classpath, along with any other classes, such as socket factories and value objects, that might need to be instantiated inside the naming service. • If this is a redeployment, as opposed to a first-time deployment, youll probably have to restart the naming service and reregister all the objects to get rid of the existing class objects in the naming services JVM. • Install and configure the application on every client machine. This includes tracking machines that are currently unavailable e.g., laptops out on loan or machines in for repair, so the application can be installed on them later. Compare this to the deployment procedure for the typical applet, in which we must: • Configure the server machines • Write web pages that have an APPLET tag in them. Put succinctly, deploying a web application doesnt involve changes to the client side or to a naming service. Instead, when a web browser downloads a web page containing an applet tag, it also downloads the Java class files necessary to run the applet. This way of deploying applications is much less time-consuming and much more likely to be done correctly.Parts
» OReilly.Java.Rmi. 2313KB Mar 29 2010 05:03:49 AM
» Writing data Resource management
» Some Useful Intermediate Streams
» Revisiting the ViewFile Application
» Protocols Metadata Protocols and Metadata
» The accept method A Simple Web Server
» Customizing Socket Behavior Sockets
» Direct Stream Manipulation Subclassing Socket Is a Better Solution
» A Special-Purpose Socket Special-Purpose Sockets
» Factories Socket Factories Special-Purpose Sockets
» Registering providers Using SSL with JSSE
» Configuring SSLServerSocket Using SSL with JSSE
» A Network-Based Printer A Socket-Based Printer Server
» The Basic Objects A Socket-Based Printer Server
» DocumentDescription Encapsulation and Sending Objects
» ClientNetworkWrapper Network-Aware Wrapper Objects
» ServerNetworkWrapper Network-Aware Wrapper Objects
» Passing by Value Versus Passing by Reference
» The Architecture Diagram Revisited
» The Printer Interface Implementing the Basic Objects
» Examining the skeleton Implementing a Printer
» DocumentDescription The Data Objects
» The Client Application Summary
» The Bank Example Introducing the Bank Example
» Security Scalability Design Postponements
» The Basic Use Case A Distributed Architecturefor the Bank Example
» Partial Failures Problems That Arise in Distributed Applications
» Network Latency Problems That Arise in Distributed Applications
» Memory, in general, is not an issue here Sockets in RMI arent a limitation either
» Applying this to Bank versus Accounts
» Should We Implement Bank or Account?
» Iterators, again Applying this to the Account interface
» Applying this to the Account interface
» Data Objects Dont Usually Have Functional Methods Interfaces Give You the Data Objects
» Accounting for Partial Failure
» A Server That Extends UnicastRemoteObject A Server That Does Not Extend UnicastRemoteObject
» The benefits of UnicastRemoteObject
» The costs of UnicastRemoteObject
» Getting Rid of the Skeletons
» Build Test Applications The Rest of the Application
» Dont Hold Connections to a Server Youre Not Using
» Validate Arguments on the Client Side Whenever Reasonable
» The Actual Client Application
» Deploying the Application The Rest of the Application
» Drilling Down on Object Creation
» The write methods ObjectOutputStream
» The stream manipulation methods Methods that customize the serialization mechanism
» The read methods ObjectInputStream
» Declaring transient fields Implementing writeObject and readObject
» Implement the Serializable Interface Make Sure That Superclass State Is Handled Correctly
» The Data Format The Serialization Algorithm
» Writing A Simplified Version of the Serialization Algorithm
» annotateClass replaceObject RMI Customizes the Serialization Algorithm
» Maintaining Direct Connections The Serialization Algorithm
» The Two Types of Versioning Problems
» How Serialization Detects When a Class Has Changed Implementing Your Own Versioning Scheme
» Serialization Depends on Reflection Serialization Has a Verbose Data Format
» It Is Easy to Send More Data Than Is Required
» Comparing Externalizable to Serializable
» The Calling Stack Basic Terminology
» The Heap Threads Basic Terminology
» Mutexes Applying This to the Printer Server
» Controlling Individual Threads Threading Concepts
» Coordinating Thread Activities Threading Concepts
» Cache Management Assigning Priorities to Threads
» The effects of synchronization on the threads local cache
» The wait methods The notify methods
» Starting a thread is easy Stopping a thread is harder
» Using Runnable instead of subclassing Thread Useful methods defined on the Thread class
» The Basic Task Implementing Threading
» Applying this to the bank example
» Synchronize around the smallest possible block of code
» Dont synchronize across device accesses
» Concurrent modification exceptions Be Careful When Using Container Classes
» Start with Code That Works Use Containers to Mediate Interthread Communication
» Immutable Objects Are Automatically Threadsafe Always Have a Safe Way to Stop Your Threads
» Pay Careful Attention to What You Serialize
» Use Threading to Reduce Response-Time Variance Limit the Number of Objects a Thread Touches
» Acquire Locks in a Fixed Order Use Worker Threads to Prevent Deadlocks
» The Idea of a Pool Two Interfaces That Define a Pool
» A First Implementation of Pooling
» Problems with SimplePool Pools: An Extended Example
» The Creation Thread Pools: An Extended Example
» Gradually Shrinking the Pool
» What Were Testing Testing the Bank Application
» When Are Naming Services Appropriate?
» bind , rebind , and unbind lookup and list
» Bootstrapping the Registry The RMI Registry Is an RMI Server
» Querying the Registry Launching an Application-Specific Registry
» Filesystems Yellow pages The general idea of directories and entries
» Security Issues The RMI Registry
» Operations on contexts Hierarchies
» Attributes are string-valued, name-value pairs
» Federation Federation and Threading
» Value Objects Represent Sets and Lists Paths, Names, and Attributes Are All Distinct
» AttributeSet The Value Objects
» Path and ContextList The Value Objects
» The Context Interface The Java Naming and Directory Interface JNDI
» Using JNDI with the Bank Example
» How RMI Solves the Bootstrapping Problem
» Ordinary Garbage Collection Distributed Garbage Collection
» Defining Network Garbage Distributed Garbage Collection
» Leasing Distributed Garbage Collection
» The Actual Distributed Garbage Collector The Unreferenced Interface
» The Standard Log RMIs Logging Facilities
» The Specialized Logs RMIs Logging Facilities
» java.rmi.server.randomIDs sun.rmi.server.exceptionTrace
» sun.rmi.dgc.client.gcInterval sun.rmi.dgc.server.gcInterval
» sun.rmi.dgc.checkInterval sun.rmi.dgc.cleanInterval
» Resource Management Factories and the Activation Framework
» A Basic Factory Implementing a Generic Factory
» The new factory Building on the Account-Locking Mechanism
» The new account The launch code and the client
» Persistence and the Server Lifecycle
» Making a server into an activatable object
» Deploying an Activatable System
» ActivationDesc, ActivationGroupDesc, and ActivationGroup in More Detail
» Shutting Down an Activatable Server
» -port -log rmid Command-Line Arguments
» sun.rmi.server.activation.debugExec
» A Final Word About Factories
» Implementing Serializable Implementing equals and hashCode
» Modifying Ordinary Servers Incorporating a Custom Socket into an Application
» Modifying Activatable Servers Incorporating a Custom Socket into an Application
» Interaction with Parameters Incorporating a Custom Socket into an Application
» A Redeployment Scenario How Dynamic Classloading Works
» A Multiple-Deployment Scenario How Dynamic Classloading Works
» Requesting a Class The Class Server
» Receiving a Class Handling JAR files
» Suns Class Server The Class Server
» Server-Side Changes Using Dynamic Classloadingin an Application
» Naming-Service Changes Using Dynamic Classloadingin an Application
» Client-Side Changes Disabling Dynamic Classloading Entirely
» A Different Kind of Security Problem
» AWT permissions The Types of Permissions
» File permissions Socket permissions
» Property permissions The Types of Permissions
» Installing an Instance of SecurityManager
» How a Security Manager Works java.security.debug
» Using Security Policies with RMI Policy Tool
» Printer-Type Methods Report-Type Methods
» Client-side polling Polling code in the printer application
» Server-side callbacks Define a client-side callback interface
» Implement the client-side interface
» Server-evaluation models Ch a pt e r 7
» Iterators on the client side
» Implementing Background Downloading on the Client Side
» The Common Gateway Interface Servlets
» Naming services and the server machine
» The Servlet Code A Servlet Implementationof HTTP Tunneling
» Modifying the Tunneling Mechanism
» Disabling HTTP Tunneling HTTP Tunneling
» Defining the Interface Generating Stubs and Skeletons
» The Server The Launch and Client Code
Show more