Subject: | |
From: | |
Reply To: | Dr. Clinton W. Smullen |
Date: | Wed, 22 Oct 2003 13:49:37 -0400 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Subject: Advanced Java Seminar Schedule
Schedule for the advanced Java seminar:
EMCS 339 CECA Lab
Attend as many as you can for as long as you can. If you would like to
attend and have not
contacted me, please email me at [log in to unmask]
Thursday 10/23 3PM - 4:30
Friday 10/24 3PM - 4 or 4:30
Tuesday 10/28 3PM - 4:30
Thursday 10/30 3PM - 4 or 4:30
Lab is available for hands-on work during other hours.
Target Audience:
This course is designed to be useful to Java programmers involved in
creating distributed
applications, and other programmers needing to get a high level
understanding of what
Jini has to offer.
Assumed Knowledge:
Object oriented programming (code is in Java but C++ programmers can easily
understand it)
Familiarity with client/server, and networking concepts
All needed software will be available in the CECA lab
Accompanying hands-on laboratory exercises will be provided for those
interested
Sun information on Jini:
http://wwws.sun.com/software/jini/
http://developer.java.sun.com/developer/products/jini/
http://www.jini.org/
Topics:
Introduction to Jini
Goals of the Technology
Notion of a Jini service
What makes a Jini Network unique
The New Protocols
Discovery and Join protocols
Supporting Technologies
The HTTP Server
Remote Method Invocation
Non-activatable RMI services
Activatable RMI services
The Lookup Service
Multicast and unicast discovery in detail
Role of the lookup service
JavaSpaces Service
Distributed Data Structures
Defining models of communication and control in JavaSpaces,
messaging systems
workflow control systems.
Transaction Service
Distributed Transactions
The Mahalo Implementation
The Helper Services
Disconnected Clients and Service Entities
The lookup discovery service
The lease renewal service
The event mailbox service
Service Administration
Service Administration
Client Administration
Security in Jini
Defining Security Requirements
Jini-Specific Requirements
Java Security
Configuring Basic Security with Policy Files
Additional Security Considerations and Alternative Techniques
|
|
|