Java remote method invocation (RMI) architecture, JAVA Programming

 

Java Remote Method Invocation (RMI):

It gives a way for a Java program on one machine to interact with objects residing in different JVMs. The important blocks of the RMI architecture are the stub class, the skeleton class and object serialization. RMI needs a layered architecture where each of the layers may be enhanced without affecting the other layers. The layers may be defined as given:

1. Application Layer: The server and client program

2. Skeleton & Stub Layer: Intercepts method invokes made by the client and redirects these calls to a remote RMI service.

3. Remote Reference Layer: Sets up connections to remote address spaces, understands, and manages connections how to manage and interpret references given from clients to the remote service objects.

4. Transport layer: Based on TCP/IP connections between operating systems in a network. It gives basic connectivity, as well as some firewall penetration goals.

RMI stub classes give a reference to a skeleton object located in a different address space on the different or same machine. That is a typical example of a proxy design pattern, which builds an object executing in another JVM seems like a local object. In JDK 5.0 and later, the RMI facility access dynamic proxies instead of generated stubs, which builds RMI easier to use.

 

30_Java Remote Method Invocation (RMI) architecture.png

Posted Date: 7/26/2012 6:48:25 AM | Location : United States







Related Discussions:- Java remote method invocation (RMI) architecture, Assignment Help, Ask Question on Java remote method invocation (RMI) architecture, Get Answer, Expert's Help, Java remote method invocation (RMI) architecture Discussions

Write discussion on Java remote method invocation (RMI) architecture
Your posts are moderated
Related Questions
SMTP (Simple Mail Transfer Protocol) permits two mail servers to communicate using a easy language, and gives a step-by-step protocol for exchanging information. SMTP delivers m

using polymorphism to write a program to display digital clock

The fancy new French restaurant La Food is very popular for its authentic cuisine and high prices. This restaurant does not take reservations. To help improve the efficiency of the

How DoS attack is a cyber crime? For what cyber crime can be used? DoS stands for Decline of Service and it is a cyber crime as it jams and within a few cases shut down the goa

What is the difference between Internet and Intranet ? Intranet and internet are 2 domains which are extremely a like but frequent segregated in order to manage security. Inter

Why are JSP pages the preferred API for creating a web-based client program? Because no plug-ins or security policy files are required on the client systems (applet does). Also,

Develop a Computer program and application. Project Description: I want a project done. It is a computer desktop application program. It is not very hard. If you need the det

Operator Functionality E x ample/Explanation = Sets one value equal to another counter=0  Sets the counter to equivale

Relate in brief - Microsoft vs Java Microsoft hates Java, as a Java program (portable) isn't tied to any particular operating system. If Java is popular, then programs written

SQLWarning objects are a subclass of SQLException that deal with database access warnings. Warnings do not stop the implementation of an application, as exceptions do; they easily