Welcome!

Java IoT Authors: Pat Romanski, Zakia Bouachraoui, Elizabeth White, Mehdi Daoudi, Liz McMillan

Related Topics: Java IoT

Java IoT: Article

Accessing MBeans Through the Jini Service

Accessing MBeans Through the Jini Service

Network systems based on service discovery can provide a consistent view of their distributed components even during changing network conditions. The ability of a system to heal itself during a network catastrophe, including architectural change and system breakdown, will help the system to realign its content traversal route intelligently and swiftly. This ability can be obtained from various healing strategies like failure detection, consistency maintenance, and distributed service activation techniques.

A complete understanding of the interactions among self-healing strategies would provide architects of distributed systems with the knowledge necessary to build the most effective catastrophe-free network system with minimum overhead. A self-healing, manageable distributed system can be developed using a Jini federation. Since Jini is focused on service-oriented programming and supports the discovery of services, active or dormant, identifying service failure and recovering from a major disaster is possible.

As a rule of thumb, a network system is not complete if it's not manageable remotely. Hence there should exist a framework for exposing the application or Jini service for remote configuration. MBeans do just that.

Accessing MBeans from a different VM or a remote location can be done using a protocol adapter or connector. Connectors are similar to protocol adapters but they need the presence of a wrapper at both the server and the client sides; adapters are software, listening on the server side, built on a common protocol that the client is expected to understand and access. The JMX agent that starts the MBean server should let remote clients invoke methods on the MBeans registered in the MBean server.

The conventional way of accessing the MBean server from a different location is by using an RMI connector. RMI connectors are inherently MBeans registered in the MBean server. The remote client can access the MBean server using the RMI connector client. While this seems to be a neat solution for remotely accessing MBeans, the client needs to know the physical location of the MBean server. Even if the the MBean proxy is bound to a lookup, the client should know the lookup location. Even when using protocol adapters like the HTML and SNMP adapters, the client is expected to know the server location.

Consider a typical setup, such as a distributed content management system running on an agent framework, where the publishing server doesn't need to know where the content updating modules are running since it can be run by an editor, writer, or a designer in different locations. Implementing a simple connector does not solve this problem. This article explores the possibilities of using a discovery mechanism to find out where the JMX agent is running. This can be achieved by using a Jini connector, which is registered as an MBean with the MBean server.

However, we don't actually discover a running JMX agent but we discover the Jini lookup service that holds the proxy of the Jini service, which is also registered as an MBean with the MBean server. Figure 1 shows the MBean invocation process between two different VMs.

Management Through MBeans
An agent application is a piece of software written in Java that contains an MBean server and interfaces to access its functionality. This would be a minimal agent and anything less couldn't be managed. In our example of a minimal agent, we'll access the MBean server through the HTML protocol adapter from a Web browser and also through a Jini client running in a different VM. Jini is a Java-based network federation where the services that want to expose themselves to the clients register themselves with a lookup registry, and the client that needs to access the service discovers the service through the lookup registry and invokes its methods. Since MBean is not serializable, a Jini connector wrapper registers the proxy with the lookup service.

Discovering MBean Agents
A JMX client can access and manage MBeans exposed by the MBean agent running in a different VM through various known techniques. The JMX Remote API (JSR 160) proposes a viable solution to remotely access an MBean agent. Hence it's possible for a remote client to get a reference for the JMX Remote API Connector. But a JMX Remote API can be used only when you know where the MBean server is running. The standard does not provide any solution for discovering MBean agents. Instead, you can try traditional service discovery processes like Jini lookup and Service Location Protocol (SLP). SLP is an IETF standard that provides a framework for allowing networking applications to discover the existence, location, and configuration of networked services in the network. But the Java SLP Implementation (JSR 140) is still being tested.

Reggie for Discovering Agents
The Jini framework provides a reference implementation of a lookup ser- vice called "reggie" that holds service references and enables remote clients to discover it and get the remote service reference. It's very simple to discover a running Jini lookup service using API calls. The service, which intends to be a part of the Jini federation, registers a serializable object with the lookup service, enabling remote clients to use this object as a proxy. Another advantage of using Jini is that the classes required for instantiating the proxy objects can be downloaded dynamically from an HTTP server, and the Jini framework provides the necessary security for code download based on the RMI security manager. Figure 2 shows the classes being downloaded dynamically from the client in our example application.

Registering Services
In Jini the services can be registered through a serializable Java object or a stub. The stub provides a direct reference to the underlying Jini service. Since the Jini lookup service, which is based on RMI, automatically downloads from the server all the classes needed to deserialize the service object on the client, the server can register any class and the client can use the same class without having prior information of the class implementation. An easier way of registering services is by calling the JMXConnectorFactory .newConnector of the JMX Remote API.

Accessing Remote Agents
By using Jini, a JMX agent can be distributed the same way as an RMI connector, but without mandating that the clients know the location of the running agent. Hence, to access a JMX agent, the clients can just create a Jini connector and locate the nearest running agent. If multiple agents are running on the network, the clients can select which agent they want to access based on the lookup entry provided by the agent with the lookup service. The Jini connector can also advertise itself by using the default domain name of the MBean server in which it's registered.

In this article we'll build a simple Jini connector that registers itself with the MBean server and exposes the MBean agent for remote administration. Figure 3 shows the MBean list through an HTTP adapter showing the Jini connector and a configurable test string. The Jini connector is comprised of the service, which we want to register with the lookup service, the MBean, and a Jini client. Figure 4 shows the Jini lookup browser showing the Jini service class and the JiniWrapper registered with it. The MBean enables the agent to control the Jini service and, as you refer to the source code (which you can download from www.sys-con.com/java/sourcec.cfm), the MBean has a reference to the MBean server, which allows the Jini service to perform callbacks to the MBean server methods. The Jini client forwards its method invocation to the MBean server via the Jini service. The Jini client-side application discovers and uses the Jini connector service and therefore can use the agent.

An Example
The example source code provides a basic way of enabling the Jini client application to discover the lookup ser- vice running on the network and obtain the proxy of the Jini Connector service that enables the client to invoke the MBean server methods through callbacks. An excellent book to read, especially if you're new to Jini, is Jini in a Nutshell by Scott Oaks and Henry Wong; to learn the basics of JMX, read JMX in Action by Benjamin G. Sullins, Mark Whipple, and Ben G. Sullins.

The process of setting up a Jini environment can be frustrating at times. For this reason, I've provided some instructions (see sidebar). Though our service does not register with the RMI activation daemon, enabling auto-restart during crashes, the Jini lookup service, an activateable service, requires RMID running on the same VM. So make sure the lookup service and RMID are running in the same VM. The Jini connector service can be run in any VM as long as the correct server codebase is specified for dynamic classloading. When the client gets started, it finds out the lookup service and hence the agent, and tries to get the MBean registration information, MBean count, and the test string value. It also dynamically changes the value of the string that can be viewed in a browser (see Figure 2). The output of the client is shown in Figure 5.

Conclusion
MBean provides a powerful interface for managing services. Jini extends the functionality of MBeans by letting the client discover the JMX agent in a network on the fly. And since the agent is pulled into the Jini federation by the Jini connector service, other advantages like agent failure notification, event mailbox, and dynamic service reconfiguration are possible for attaining a true catastrophe free, self-healing, manageable, and intelligent network.

More Stories By Frank Jennings

Frank Jennings works in the Communication Designs Group of Pramati Technologies

Comments (2)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...