Federation Federation and Threading
15.3.1 Federation
A federated architecture is one in which multiple servers all support the same set of interfaces and are linked to each other. The linking is done in a way that is essentially transparent to a client but enables the servers to route requests to the server best suited to respond to it. [ 2] [ 2] At least, thats what I think it means. One of the great benefits of writing a book like this is that you get to make up definitions for all the terms everybody uses but that dont have a canonical definition yet. That might seem like a mouthful, but we have a very simple illustration at hand. Weve already got the idea of a context, and its pretty obvious that a context will be a Java object in our implementation of a naming service. The next step is simple: lets make each context an RMI server. We already know that when the client passes in a path to the context, the context will find the appropriate subcontext and forward the request. Theres no reason why the request cant go to another server, running on another machine entirely. The ability to federate contexts, and to do so in a way thats transparent to the client, is a fairly impressive feature that can offer substantial benefits. Consider, for example, a company with four offices in Tokyo, Bangkok, San Francisco, and Reykjavik. Each office maintains a naming context with all the servers for that office, and the contexts are bound into each other as subcontexts. So, for example, the hierarchical structure for Reykjavik looks like Figur e 15- 5 . Figure 15-5. How things look from Reykjavic The hierarchical structure for Bangkok looks like Figur e 15- 6 . Figure 15-6. How things look from Bangkok This is helpful for several reasons: • The local contexts are managed locally by the local systems administrators and developers. Its much better if the naming-service information is maintained by people in a position to know when things go down or get moved to another server. • Each local context serves as a base context for its city. The anticipation is that most of the client applications running in Reykjavik will want to call servers running in Reykjavik. Because they are also using a naming service located in Reykjavik, it follows that when someone in Reykjavik wants to find a printer, if she uses the path printers, it will be resolved to a local printer she would have to use San Franciscoprinters to find a printer in San Francisco. Moreover, the same path, when used by a program running in San Francisco, will find printers in San Francisco. This is a great feature. The same program, performing the same lookup in different locations, will find the appropriate servers. • All servers worldwide are accessible, worldwide. Moreover, this accessibility is easily maintained since the local contexts have exactly three nonlocal references, and those nonlocal references are to naming services in the other cities. When Should a Subcontext Be Federated? Since weve already offered sidebars on designing hierarchies, and on when its appropriate to encode metadata as an attribute, its only reasonable to include a sidebar discussing when a subcontext should be federated. There are two basic tips for when a subcontext should be federated: • Contexts owned by different groups probably should be federated. The group responsible for the maintenance and upkeep of a set of servers ought to own the context in which the servers are registered. Otherwise, simple chores such as moving a server can become needlessly complex. • Federating by location, so that local requests are resolved locally, is often a useful technique. In addition, there are two negative guidelines: • Frequently accessed servers should be accessed via paths that stay inside a single naming service. • Servers that are frequently accessed together, or in a related sequence of operations, should be contained within the same naming service In both cases, the servers can be in different subcontexts. The guideline simply states that paths leading to the servers ought not to cross federation boundaries. The reason for these restrictions is simple: anytime a context forwards a request to a federated subcontext, a remote method call must be made. Anyone who deliberately puts a remote method in the lookup se quence for a commonly used server, or for servers that are accessed together, is simply looking for trouble. Of course, federation isnt just a feature of our naming service, nor does it really require contexts. DNS is an incredibly federated system there is no other way to scale a naming service to the Internet that doesnt support the idea of contexts at all. See DNS and Bind, Fourth Edition by Paul Albitz and Cricket Liu OReilly for more details on DNS.15.4 The Context Interface
Parts
» OReilly.Java.Rmi. 2313KB Mar 29 2010 05:03:49 AM
» Writing data Resource management
» Some Useful Intermediate Streams
» Revisiting the ViewFile Application
» Protocols Metadata Protocols and Metadata
» The accept method A Simple Web Server
» Customizing Socket Behavior Sockets
» Direct Stream Manipulation Subclassing Socket Is a Better Solution
» A Special-Purpose Socket Special-Purpose Sockets
» Factories Socket Factories Special-Purpose Sockets
» Registering providers Using SSL with JSSE
» Configuring SSLServerSocket Using SSL with JSSE
» A Network-Based Printer A Socket-Based Printer Server
» The Basic Objects A Socket-Based Printer Server
» DocumentDescription Encapsulation and Sending Objects
» ClientNetworkWrapper Network-Aware Wrapper Objects
» ServerNetworkWrapper Network-Aware Wrapper Objects
» Passing by Value Versus Passing by Reference
» The Architecture Diagram Revisited
» The Printer Interface Implementing the Basic Objects
» Examining the skeleton Implementing a Printer
» DocumentDescription The Data Objects
» The Client Application Summary
» The Bank Example Introducing the Bank Example
» Security Scalability Design Postponements
» The Basic Use Case A Distributed Architecturefor the Bank Example
» Partial Failures Problems That Arise in Distributed Applications
» Network Latency Problems That Arise in Distributed Applications
» Memory, in general, is not an issue here Sockets in RMI arent a limitation either
» Applying this to Bank versus Accounts
» Should We Implement Bank or Account?
» Iterators, again Applying this to the Account interface
» Applying this to the Account interface
» Data Objects Dont Usually Have Functional Methods Interfaces Give You the Data Objects
» Accounting for Partial Failure
» A Server That Extends UnicastRemoteObject A Server That Does Not Extend UnicastRemoteObject
» The benefits of UnicastRemoteObject
» The costs of UnicastRemoteObject
» Getting Rid of the Skeletons
» Build Test Applications The Rest of the Application
» Dont Hold Connections to a Server Youre Not Using
» Validate Arguments on the Client Side Whenever Reasonable
» The Actual Client Application
» Deploying the Application The Rest of the Application
» Drilling Down on Object Creation
» The write methods ObjectOutputStream
» The stream manipulation methods Methods that customize the serialization mechanism
» The read methods ObjectInputStream
» Declaring transient fields Implementing writeObject and readObject
» Implement the Serializable Interface Make Sure That Superclass State Is Handled Correctly
» The Data Format The Serialization Algorithm
» Writing A Simplified Version of the Serialization Algorithm
» annotateClass replaceObject RMI Customizes the Serialization Algorithm
» Maintaining Direct Connections The Serialization Algorithm
» The Two Types of Versioning Problems
» How Serialization Detects When a Class Has Changed Implementing Your Own Versioning Scheme
» Serialization Depends on Reflection Serialization Has a Verbose Data Format
» It Is Easy to Send More Data Than Is Required
» Comparing Externalizable to Serializable
» The Calling Stack Basic Terminology
» The Heap Threads Basic Terminology
» Mutexes Applying This to the Printer Server
» Controlling Individual Threads Threading Concepts
» Coordinating Thread Activities Threading Concepts
» Cache Management Assigning Priorities to Threads
» The effects of synchronization on the threads local cache
» The wait methods The notify methods
» Starting a thread is easy Stopping a thread is harder
» Using Runnable instead of subclassing Thread Useful methods defined on the Thread class
» The Basic Task Implementing Threading
» Applying this to the bank example
» Synchronize around the smallest possible block of code
» Dont synchronize across device accesses
» Concurrent modification exceptions Be Careful When Using Container Classes
» Start with Code That Works Use Containers to Mediate Interthread Communication
» Immutable Objects Are Automatically Threadsafe Always Have a Safe Way to Stop Your Threads
» Pay Careful Attention to What You Serialize
» Use Threading to Reduce Response-Time Variance Limit the Number of Objects a Thread Touches
» Acquire Locks in a Fixed Order Use Worker Threads to Prevent Deadlocks
» The Idea of a Pool Two Interfaces That Define a Pool
» A First Implementation of Pooling
» Problems with SimplePool Pools: An Extended Example
» The Creation Thread Pools: An Extended Example
» Gradually Shrinking the Pool
» What Were Testing Testing the Bank Application
» When Are Naming Services Appropriate?
» bind , rebind , and unbind lookup and list
» Bootstrapping the Registry The RMI Registry Is an RMI Server
» Querying the Registry Launching an Application-Specific Registry
» Filesystems Yellow pages The general idea of directories and entries
» Security Issues The RMI Registry
» Operations on contexts Hierarchies
» Attributes are string-valued, name-value pairs
» Federation Federation and Threading
» Value Objects Represent Sets and Lists Paths, Names, and Attributes Are All Distinct
» AttributeSet The Value Objects
» Path and ContextList The Value Objects
» The Context Interface The Java Naming and Directory Interface JNDI
» Using JNDI with the Bank Example
» How RMI Solves the Bootstrapping Problem
» Ordinary Garbage Collection Distributed Garbage Collection
» Defining Network Garbage Distributed Garbage Collection
» Leasing Distributed Garbage Collection
» The Actual Distributed Garbage Collector The Unreferenced Interface
» The Standard Log RMIs Logging Facilities
» The Specialized Logs RMIs Logging Facilities
» java.rmi.server.randomIDs sun.rmi.server.exceptionTrace
» sun.rmi.dgc.client.gcInterval sun.rmi.dgc.server.gcInterval
» sun.rmi.dgc.checkInterval sun.rmi.dgc.cleanInterval
» Resource Management Factories and the Activation Framework
» A Basic Factory Implementing a Generic Factory
» The new factory Building on the Account-Locking Mechanism
» The new account The launch code and the client
» Persistence and the Server Lifecycle
» Making a server into an activatable object
» Deploying an Activatable System
» ActivationDesc, ActivationGroupDesc, and ActivationGroup in More Detail
» Shutting Down an Activatable Server
» -port -log rmid Command-Line Arguments
» sun.rmi.server.activation.debugExec
» A Final Word About Factories
» Implementing Serializable Implementing equals and hashCode
» Modifying Ordinary Servers Incorporating a Custom Socket into an Application
» Modifying Activatable Servers Incorporating a Custom Socket into an Application
» Interaction with Parameters Incorporating a Custom Socket into an Application
» A Redeployment Scenario How Dynamic Classloading Works
» A Multiple-Deployment Scenario How Dynamic Classloading Works
» Requesting a Class The Class Server
» Receiving a Class Handling JAR files
» Suns Class Server The Class Server
» Server-Side Changes Using Dynamic Classloadingin an Application
» Naming-Service Changes Using Dynamic Classloadingin an Application
» Client-Side Changes Disabling Dynamic Classloading Entirely
» A Different Kind of Security Problem
» AWT permissions The Types of Permissions
» File permissions Socket permissions
» Property permissions The Types of Permissions
» Installing an Instance of SecurityManager
» How a Security Manager Works java.security.debug
» Using Security Policies with RMI Policy Tool
» Printer-Type Methods Report-Type Methods
» Client-side polling Polling code in the printer application
» Server-side callbacks Define a client-side callback interface
» Implement the client-side interface
» Server-evaluation models Ch a pt e r 7
» Iterators on the client side
» Implementing Background Downloading on the Client Side
» The Common Gateway Interface Servlets
» Naming services and the server machine
» The Servlet Code A Servlet Implementationof HTTP Tunneling
» Modifying the Tunneling Mechanism
» Disabling HTTP Tunneling HTTP Tunneling
» Defining the Interface Generating Stubs and Skeletons
» The Server The Launch and Client Code
Show more