Abstract by anuja a sonalker on Asymmetric Key Distribution


Fig 4.1: JDK RMI Structure


Download 217.42 Kb.
Pdf ko'rish
bet29/43
Sana19.04.2023
Hajmi217.42 Kb.
#1365410
1   ...   25   26   27   28   29   30   31   32   ...   43
Bog'liq
etd

Fig 4.1: JDK RMI Structure 
All the RMI calls are made at the Java RMI level. Thus all native socket calls, the generic 
data and file streams methods associated with data transmissions in java are internal to 
RMI and transparent to the implementer. This not only reduces unnecessary complexity, 
but also gives better performance. Java RMI is optimized for serial data transmission as 
compared to a users implementation of the same methods using native sockets and 
subsequently manually going through all the layers shown above.


39 
A summary of the primary advantages of RMI as mentioned in [17]is:
• 
Object Oriented: RMI can pass full objects as arguments and return values, not 
just predefined data types. Complex types, such as a Java BigIntegers and hash of 
messages, can be passed as a single argument.
• 
Mobile Behavior: RMI can move behavior (class implementations) from client to 
server and server to client. When the policies change, the server will start 
returning a different implementation of that interface that uses new policies giving 
maximum flexibility. Since the Special Server and the Share servers essentially 
perform the same function of signing certificates, this functionality of RMI helps 
reduce the coding effort. 
• 
Design Patterns: Passing objects allows use of the full power of object-oriented 
technology in distributed computing, such as two- and three-tier systems. This is 
again very helpful in our case, as the secret components and the lookup number 
once generated by the Trusted Dealer need to be passed onto every server during 
signature share computation.
• 
Safe and Secure: RMI uses built-in Java security mechanisms that allow your 
system to be safe when users download implementations or work remotely on 
insecure infrastructure. RMI uses the security manager defined to protect systems 
from hostile applets to protect your systems and network from potentially hostile 
downloaded code.
• 
Ease of Use: RMI makes it simple to write remote Java servers and Java clients 
that access those servers. A remote interface is an actual Java interface. Since 
RMI programs are easy to write, they are also easy to maintain.
• 
Connects to Existing/Legacy Systems: RMI interacts with existing systems 
through Java's native method interface JNI.
• 
Write Once, Run Anywhere: RMI is part of Java's "Write Once, Run Anywhere" 
approach. Any RMI based system is 100% portable to any Java Virtual Machine,
• 
Distributed Garbage Collection: RMI uses its distributed garbage collection 
feature to collect remote server objects that are no longer referenced by any 
clients in the network.


40 
• 
Parallel Computing: RMI is multi-threaded, allowing your servers to exploit Java 
threads for better concurrent processing of client requests.
• 
The Java Distributed Computing Solution: RMI is part of the core Java platform 
starting with JDK1.1, so it exists on every 1.1 Java Virtual Machine. All RMI 
systems talk the same public protocol; so all Java systems can talk to each other 
directly, without any protocol translation overhead.

Download 217.42 Kb.

Do'stlaringiz bilan baham:
1   ...   25   26   27   28   29   30   31   32   ...   43




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling