When Are Naming Services Appropriate?
14.1.1.1 Installing a new printer
To illustrate this, consider our printer server. Look what happens in each case when we move an existing printer to a new location on the network: The client knows in advance where the server is. In this case, we need to update each client application or change the secondary resource to reflect the new information when we move the printer. If we were clever, and stored the list of printers in a single file to which all machines on the network had access, this might not be so bad. On the other hand, arranging to have a single machine mounted by all the client computers on a large network is a difficult chore. Moreover, having a single file with all the printers listed in it comes awfully close to having a form of centralized indirection and is a hint that we probably want to use a naming service anyway. The user tells the client application where the server is. In this scenario, when the user runs the application, the user enters the information about the new printer or the new location of the old printer. This is, more or less, an unworkable solution. End users dont want to do this, and a significant percentage of them will get it wrong. The client makes a query to a network service to find out where the server is. When the printer is installed or moved, the naming service is updated to reflect the new information. When clients launch, they query the naming service. The clients are always up-to- date, the client machines didnt need to be modified in any way, and the end users didnt have to do anything. 14.1.2 When Are Naming Services Appropriate? Each of the three approaches to the bootstrapping problem has advantages and disadvantages, depending on the application being written. Servers in a typical client-server application have many properties, which suggests that the flexibility provided by naming services is worth having. Among them are: Servers migrate. Servers sometimes overwhelm the machine on which theyre initially deployed. Sometimes, server hardware is retired or repurposed. Sometimes network administrators install a firewall, and the server applications must be moved to another machine. For whatever reason, server applications are often moved from machine to machine over the applications lifetime. There may be many servers. This is obvious in the case of network services such as printers. Every floor may have a printer. However, its also true for our bank example; there are thousands of servers, and each client needs to be able to access each one. Servers get partitioned and replicated. One response to overwhelming demand is to replicate servers. We discussed partitioning briefly in the bank example; the idea was to move some of the instances of Account to another machine if the server response time was unacceptable. In addition, read-only requests can be farmed out to any number of replicated servers. There may be many servers running on one machine. A single machine can run many servers. Some of these servers may have reserved well-known ports for example, port 80 is reserved for web servers. However, reserving ports is a risky strategy because the more ports that are reserved, the greater the chance of having reservations conflict. A much better strategy is for servers to randomly grab an available port number when it launches. Note that the bank example exhibits all of these properties. In contrast, consider the prototypical naming service. Its implemented once and reused. It never evolves. Theres usually only one, and it doesnt get partitioned. And its a simple enough piece of code that an implementation can usually handle large numbers of requests quite robustly. If you have to hardwire a servers location into your client or as a parameter in a configuration file, hardwiring the location of a naming service involves the least risk of having to update the client. All of the preceding points are arguments for indirection. If many of them apply to an application, then the design should include a level of indirection when clients connect to a server. A naming service provides this indirection in a very simple manner: clients call a stable and well-known server whose sole responsibility is to direct them to the server that they really need. That is: • Servers are registered bound into the naming service using logical names. • Clients know the location of the naming service and the logical names of the servers they require. From this information, they can find the servers at runtime.14.2 The RMI Registry
Weve done three things with the RMI registry: weve launched the actual registry server, weve bound objects into the registry using strings for names, and weve looked up objects in the registry. All of the code weve written has used static methods on the java.rmi.Naming class to accomplish these tasks. In particular, Naming defines the following five static methods: public static void bindString name, Remote obj public static void rebindString name, Remote obj public static void unbindString name public static String[] listString nameParts
» OReilly.Java.Rmi. 2313KB Mar 29 2010 05:03:49 AM
» Writing data Resource management
» Some Useful Intermediate Streams
» Revisiting the ViewFile Application
» Protocols Metadata Protocols and Metadata
» The accept method A Simple Web Server
» Customizing Socket Behavior Sockets
» Direct Stream Manipulation Subclassing Socket Is a Better Solution
» A Special-Purpose Socket Special-Purpose Sockets
» Factories Socket Factories Special-Purpose Sockets
» Registering providers Using SSL with JSSE
» Configuring SSLServerSocket Using SSL with JSSE
» A Network-Based Printer A Socket-Based Printer Server
» The Basic Objects A Socket-Based Printer Server
» DocumentDescription Encapsulation and Sending Objects
» ClientNetworkWrapper Network-Aware Wrapper Objects
» ServerNetworkWrapper Network-Aware Wrapper Objects
» Passing by Value Versus Passing by Reference
» The Architecture Diagram Revisited
» The Printer Interface Implementing the Basic Objects
» Examining the skeleton Implementing a Printer
» DocumentDescription The Data Objects
» The Client Application Summary
» The Bank Example Introducing the Bank Example
» Security Scalability Design Postponements
» The Basic Use Case A Distributed Architecturefor the Bank Example
» Partial Failures Problems That Arise in Distributed Applications
» Network Latency Problems That Arise in Distributed Applications
» Memory, in general, is not an issue here Sockets in RMI arent a limitation either
» Applying this to Bank versus Accounts
» Should We Implement Bank or Account?
» Iterators, again Applying this to the Account interface
» Applying this to the Account interface
» Data Objects Dont Usually Have Functional Methods Interfaces Give You the Data Objects
» Accounting for Partial Failure
» A Server That Extends UnicastRemoteObject A Server That Does Not Extend UnicastRemoteObject
» The benefits of UnicastRemoteObject
» The costs of UnicastRemoteObject
» Getting Rid of the Skeletons
» Build Test Applications The Rest of the Application
» Dont Hold Connections to a Server Youre Not Using
» Validate Arguments on the Client Side Whenever Reasonable
» The Actual Client Application
» Deploying the Application The Rest of the Application
» Drilling Down on Object Creation
» The write methods ObjectOutputStream
» The stream manipulation methods Methods that customize the serialization mechanism
» The read methods ObjectInputStream
» Declaring transient fields Implementing writeObject and readObject
» Implement the Serializable Interface Make Sure That Superclass State Is Handled Correctly
» The Data Format The Serialization Algorithm
» Writing A Simplified Version of the Serialization Algorithm
» annotateClass replaceObject RMI Customizes the Serialization Algorithm
» Maintaining Direct Connections The Serialization Algorithm
» The Two Types of Versioning Problems
» How Serialization Detects When a Class Has Changed Implementing Your Own Versioning Scheme
» Serialization Depends on Reflection Serialization Has a Verbose Data Format
» It Is Easy to Send More Data Than Is Required
» Comparing Externalizable to Serializable
» The Calling Stack Basic Terminology
» The Heap Threads Basic Terminology
» Mutexes Applying This to the Printer Server
» Controlling Individual Threads Threading Concepts
» Coordinating Thread Activities Threading Concepts
» Cache Management Assigning Priorities to Threads
» The effects of synchronization on the threads local cache
» The wait methods The notify methods
» Starting a thread is easy Stopping a thread is harder
» Using Runnable instead of subclassing Thread Useful methods defined on the Thread class
» The Basic Task Implementing Threading
» Applying this to the bank example
» Synchronize around the smallest possible block of code
» Dont synchronize across device accesses
» Concurrent modification exceptions Be Careful When Using Container Classes
» Start with Code That Works Use Containers to Mediate Interthread Communication
» Immutable Objects Are Automatically Threadsafe Always Have a Safe Way to Stop Your Threads
» Pay Careful Attention to What You Serialize
» Use Threading to Reduce Response-Time Variance Limit the Number of Objects a Thread Touches
» Acquire Locks in a Fixed Order Use Worker Threads to Prevent Deadlocks
» The Idea of a Pool Two Interfaces That Define a Pool
» A First Implementation of Pooling
» Problems with SimplePool Pools: An Extended Example
» The Creation Thread Pools: An Extended Example
» Gradually Shrinking the Pool
» What Were Testing Testing the Bank Application
» When Are Naming Services Appropriate?
» bind , rebind , and unbind lookup and list
» Bootstrapping the Registry The RMI Registry Is an RMI Server
» Querying the Registry Launching an Application-Specific Registry
» Filesystems Yellow pages The general idea of directories and entries
» Security Issues The RMI Registry
» Operations on contexts Hierarchies
» Attributes are string-valued, name-value pairs
» Federation Federation and Threading
» Value Objects Represent Sets and Lists Paths, Names, and Attributes Are All Distinct
» AttributeSet The Value Objects
» Path and ContextList The Value Objects
» The Context Interface The Java Naming and Directory Interface JNDI
» Using JNDI with the Bank Example
» How RMI Solves the Bootstrapping Problem
» Ordinary Garbage Collection Distributed Garbage Collection
» Defining Network Garbage Distributed Garbage Collection
» Leasing Distributed Garbage Collection
» The Actual Distributed Garbage Collector The Unreferenced Interface
» The Standard Log RMIs Logging Facilities
» The Specialized Logs RMIs Logging Facilities
» java.rmi.server.randomIDs sun.rmi.server.exceptionTrace
» sun.rmi.dgc.client.gcInterval sun.rmi.dgc.server.gcInterval
» sun.rmi.dgc.checkInterval sun.rmi.dgc.cleanInterval
» Resource Management Factories and the Activation Framework
» A Basic Factory Implementing a Generic Factory
» The new factory Building on the Account-Locking Mechanism
» The new account The launch code and the client
» Persistence and the Server Lifecycle
» Making a server into an activatable object
» Deploying an Activatable System
» ActivationDesc, ActivationGroupDesc, and ActivationGroup in More Detail
» Shutting Down an Activatable Server
» -port -log rmid Command-Line Arguments
» sun.rmi.server.activation.debugExec
» A Final Word About Factories
» Implementing Serializable Implementing equals and hashCode
» Modifying Ordinary Servers Incorporating a Custom Socket into an Application
» Modifying Activatable Servers Incorporating a Custom Socket into an Application
» Interaction with Parameters Incorporating a Custom Socket into an Application
» A Redeployment Scenario How Dynamic Classloading Works
» A Multiple-Deployment Scenario How Dynamic Classloading Works
» Requesting a Class The Class Server
» Receiving a Class Handling JAR files
» Suns Class Server The Class Server
» Server-Side Changes Using Dynamic Classloadingin an Application
» Naming-Service Changes Using Dynamic Classloadingin an Application
» Client-Side Changes Disabling Dynamic Classloading Entirely
» A Different Kind of Security Problem
» AWT permissions The Types of Permissions
» File permissions Socket permissions
» Property permissions The Types of Permissions
» Installing an Instance of SecurityManager
» How a Security Manager Works java.security.debug
» Using Security Policies with RMI Policy Tool
» Printer-Type Methods Report-Type Methods
» Client-side polling Polling code in the printer application
» Server-side callbacks Define a client-side callback interface
» Implement the client-side interface
» Server-evaluation models Ch a pt e r 7
» Iterators on the client side
» Implementing Background Downloading on the Client Side
» The Common Gateway Interface Servlets
» Naming services and the server machine
» The Servlet Code A Servlet Implementationof HTTP Tunneling
» Modifying the Tunneling Mechanism
» Disabling HTTP Tunneling HTTP Tunneling
» Defining the Interface Generating Stubs and Skeletons
» The Server The Launch and Client Code
Show more