iiop

51
• IIOP https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and- online-course.html

Upload: jonah-joseph

Post on 27-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IIOP

• IIOP

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 2: IIOP

Application programming interface API and protocols

1 When an API implements a protocol it can be based on proxy methods for remote invocations that underneath rely on the communication protocol. The role of the API can be exactly to

hide the detail of the transport protocol. E.g.: RMI is an API that

implements the JRMP protocol or the IIOP as RMI-IIOP.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 3: IIOP

Application programming interface Object API and protocols

1 When a message is exchanged via a protocol between two different platforms using objects

on both sides, the object in a programming language can be transformed (marshalled and

unmarshalled) in an object in a remote and different language: so, e.g., a program written

in Java invokes a service via SOAP or IIOP written in C# both programs use APIs for

remote invocation (each locally to the machine where they are working) to (remotely) exchange

information that they both convert from/to an object in local memory.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 4: IIOP

SOAP - Transport methods

1 This is a major advantage over other distributed protocols like GIOP/IIOP or DCOM which are normally filtered by

firewalls. SOAP over AMQP is yet another possibility that some

implementations support.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 5: IIOP

Enterprise JavaBean - General responsibilities

1 * Remote procedure call|Interprocess Communication using RMI-IIOP and Web

services

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 6: IIOP

Data serialization - Consequences

1 To discourage competitors from making compatible products, publishers of proprietary

software often keep the details of their programs' serialization formats a trade secret.

Some deliberately obfuscated code|obfuscate or even encryption|encrypt the serialized data. Yet,

interoperability requires that applications be able to understand each other's serialization

formats. Therefore, RMI-IIOP|remote method call architectures such as CORBA define their

serialization formats in detail.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 7: IIOP

Service oriented architecture - Other SOA concepts

1 In SPOA, by contrast, a passive service description is registered (e.g., an XML

document in WSDL for Web services, or an interface description in IDL for CORBA); the requestor then has to

generate the proxy (a stub forwarding calls to a provider) based on a service

description and the fixed communication protocol (e.g., SOAP in

Web services, IIOP in CORBA)https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 8: IIOP

Java Platform, Enterprise Edition -

1 The Enterprise JavaBeans|Enterprise JavaBean (EJB) specification defines a set of

lightweight APIs that an object container (the EJB container) will support in order to

provide Transaction processing|transactions (using Java Transaction API|JTA), remote

procedure calls (using Java remote method invocation|RMI or RMI-IIOP), concurrency control, dependency injection and access

control for business objects

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 9: IIOP

Application programming interfaces - Object exchange API and protocols

1 When a message is exchanged via a protocol between two different platforms using objects on both sides, the object in a programming language

can be transformed (Marshalling (computer science)|marshalled and unmarshalled) in an object

in a remote and different language: so, e.g., a program written in Java language|Java invokes a

service via SOAP or IIOP written in C Sharp (programming language)|C# both programs use APIs

for remote invocation (each locally to the machine where they are working) to (remotely) exchange

information that they both convert from/to an object in local memory.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 10: IIOP

Spring Framework - Remote access framework

1 ** RMI-IIOP (Common Object Request Broker Architecture|CORBA): method

invocations using RMI-IIOP/CORBA

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 11: IIOP

Java.util - javax.rmi

1 The package provides the support for the remote communication

between applications, using the RMI over IIOP protocol. This protocol

combines RMI and CORBA features.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 12: IIOP

Java.util - javax.rmi

1 [http://java.sun.com/javase/technologies/core/corba/index.jsp

Java SE Core Technologies - CORBA / RMI-IIOP]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 13: IIOP

Java.util - org.omg.CORBA

1 The package provides the support for the remote communication between

applications using the General Inter-ORB Protocol and supports other features of

the CORBA|common object request broker architecture. Same as Java remote method invocation|RMI and RMI-IIOP, this package is for calling remote methods of

objects on other virtual machines (usually via network).

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 14: IIOP

Common Object Request Broker Architecture - Overview

1 ;OMG trademarks : CORBA, IIOP and Object Management Group|OMG are the registered marks of the Object Management Group and should be

used with care. However, GIOP (General Inter-ORB Protocol) is not a registered OMG trademark. Hence in

some cases it may be more appropriate just to say that the

application uses or implements the GIOP-based architecture.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 15: IIOP

Common Object Request Broker Architecture - Objects By Value (OBV)

1 Apart from remote objects, the CORBA and RMI-IIOP define the concept of the OBV and

Valuetypes

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 16: IIOP

Common Object Request Broker Architecture - Portable interceptors

1 Portable interceptors are the hooks, used by CORBA and RMI-IIOP to

mediate the most important functions of the CORBA system. The

CORBA standard defines the following types of interceptors:

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 17: IIOP

Common Object Request Broker Architecture - General InterORB Protocol (GIOP)

1 # Internet InterORB Protocol (IIOP) mdash; The Internet Inter-Orb

Protocol is an implementation of the GIOP for use over the Internet, and provides a mapping between GIOP messages and the Internet protocol

suite|TCP/IP layer.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 18: IIOP

Common Object Request Broker Architecture - General InterORB Protocol (GIOP)

1 # SSL InterORB Protocol (SSLIOP) mdash; SSLIOP is IIOP over Secure

Sockets Layer|SSL, providing encryption and authentication.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 19: IIOP

Common Object Request Broker Architecture - Problems and criticism

1 :CORBA (more precisely, General Inter-ORB Protocol|IIOP) uses raw

TCP/IP connections in order to transmit data

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 20: IIOP

JMX - Architecture

1 # The Remote Management level enables remote applications to access the MBeanServer through connectors and adaptors. A connector

provides full remote access to the MBeanServer API using various communication (Java remote

method invocation|RMI, IIOP, Java Message Service|JMS, List of web service specifications|WS-* …), while an adaptor adapts the API to

another protocol (Simple Network Management Protocol|SNMP, …) or to Web-based GUI

(HTML/HTTP, Wireless Markup Language|WML/HTTP, …).

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 21: IIOP

Java remote method invocation

1 Usage of the term 'RMI' may denote solely the programming interface or may signify both the API and JRMP,

whereas the term RMI-IIOP (read: RMI over IIOP) denotes the RMI interface delegating most of the functionality

to the supporting CORBA implementation.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 22: IIOP

Java remote method invocation - Generalized code

1 The programmers of the original RMI API generalized the code somewhat to

support different implementations, such as a Hypertext Transfer Protocol|HTTP

transport. Additionally, the ability to pass arguments Call by value|by value was

added to CORBA in order to be compatible with the RMI interface. Still, the RMI-IIOP and JRMP implementations do not have fully identical interfaces.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 23: IIOP

RMI-IIOP

1 'RMI-IIOP' (read as RMI over IIOP) denotes the Java Remote Method

Invocation (RMI) interface over the Internet Inter-Orb Protocol (IIOP), which delivers Common Object

Request Broker Architecture (CORBA) distributed computing capabilities to

the Java platform. It was initially based on two specifications: the Java Language Mapping to OMG IDL, and

CORBA/IIOP 2.3.1.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 24: IIOP

RMI-IIOP - History

1 The Java RMI-IIOP specification was created to simplify the development

of CORBA applications, while preserving all major benefits. It was developed by Sun Microsystems and IBM, combining features of Java RMI technology with features of CORBA

technology.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 25: IIOP

RMI-IIOP - Specification

1 RMI-IIOP uses generated code for remote objects and does not require supplementary classes for non-trivial

data, unlike CORBA. This results in less complexity and a smaller

footprint. Both CORBA and RMI-IIOP utilize the General Inter-ORB Protocol

communication standard.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 26: IIOP

RMI-IIOP - Specification

1 However, it is possible to generate the Interface description language|IDL definitions for the involved RMI-IIOP data structures and use these definitions to exercise finer control

between RMI-IIOP and CORBA communicating partners.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 27: IIOP

RMI-IIOP - Specification

1 Recent versions of RMI-IIOP derive their servants from the standard Servant (CORBA)|Servant class.

Hence, it is possible to connect them to a CORBA ORB manually, involving

one or more of Portable Object Adapters, Portable Interceptors,

CORBA naming services, along with other standard CORBA features.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 28: IIOP

SOAP (protocol) - Transport methods

1 This is a major advantage over other distributed protocols like General Inter-ORB Protocol|GIOP/IIOP or

Distributed Component Object Model|DCOM which are normally filtered by

firewalls

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 29: IIOP

RM-ODP - RM-ODP standards

1 * ISO/IEC 19500-2:2003, General Inter-ORB Protocol (GIOP)/Internet Inter-ORB Protocol (IIOP).Copies of

the RM-ODP family of standards can be obtained either from

[http://www.iso.ch ISO] or from [http://www.itu.int/ ITU-T]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 30: IIOP

JRMP - Details

1 JRMP is a Java-specific, Stream (computing)|stream-based protocol for

Java-to-Java remote calls, requiring both clients and server to use Java objects.

RMI-IIOP is an alternative protocol which exposes Java objects to CORBA Object request broker|ORBs. Many application

server vendors have developed their own protocols for use with RMI which claim to offer advantages over both IIOP and JRMP.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 31: IIOP

Algebra - Prehistory of algebra

1 The Hellenistic civilization|Hellenistic mathematicians Hero of Alexandria and Diophantus

[http://library.thinkquest.org/25672/diiophan.htm Diophantus, Father of Algebra] as well as Indian

mathematics|Indian mathematicians such as Brahmagupta continued the traditions of Egypt and

Babylon, though Diophantus' Arithmetica and Brahmagupta's Brahmasphutasiddhanta are on a higher

level.[http://www.algebra.com/algebra/about/history/ History of Algebra] For example, the first complete

arithmetic solution (including zero and negative solutions) to quadratic equations was described by Brahmagupta in his book Brahmasphutasiddhanta

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 32: IIOP

2012 Wikipedia blackout - Post-protest

1 They're misleading their huge base.Alan Fram (2012-01-21),

[http://www.sfgate.com/cgi-bin/article.cgi?f=/n/a/2012/01/21/national/w092012S93.DTLao=2#ixzz1k8IiIOPL

INFLUENCE GAME: Online companies win piracy fight] Associated Press Recording Industry Association of

America President Cary Sherman noted that the major television networks supported the legislation but, unlike

Wikipedia and Google, did not use their platforms to try to shape public opinion: when Wikipedia and Google purport to be neutral sources of information that is not only not

neutral but affirmatively incomplete and misleading, they are duping their users into accepting as truth what are

merely self-serving political declarations.Cary H

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 33: IIOP

WebSphere Optimized Local Adapters - Technical Foundation

1 The architects of this solution chose to leverage an existing element of the WAS z/OS design called local communications, a cross-

memory mechanism used by WebSphere Application Server for z/OS since the V4.x days that optimized IIOP traffic between application servers on the same LPAR. OLA is essentially

an externalization of that existing cross-memory mechanism so that address spaces

outside WAS z/OS may connect and exchange messages across a shared memory space.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 34: IIOP

WebSphere Optimized Local Adapters - 8.0.0.0

1 * Support for inbound transaction classification of WOLA calls separate from

IIOP calls

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 35: IIOP

WebSphere Optimized Local Adapters - SMF 120.10 for WOLA Outbound Calls

1 In WAS z/OS V7 the WOLA support for SMF was limited to inbound calls

only. Inbound WOLA calls to target EJBs in the WAS z/OS container were identified as IIOP calls and captured

by SMF as IIOP calls, indistinguishable from any other IIOP call. The normal WAS z/OS SMF 120

subtype 9 record (or 120.9 in shorthand notation) was used to

capture the inbound call information.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 36: IIOP

WebSphere Optimized Local Adapters - SMF 120.10 for WOLA Outbound Calls

1 With WAS z/OS 8.0.0.0 the SMF 120.9 record and capture function was

modified to identify inbound WOLA calls separate from inbound IIOP

calls.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 37: IIOP

WebSphere Optimized Local Adapters - Proxy Support for Outbound Calls

1 The network flow from the application to the WAS z/OS system

is by way of IIOP. The WOLA connection factory is informed of this

IIOP flow to the proxy by way of several new custom properties to the

connection pool. The proxy application on WAS z/OS receives the

call and forwards it over an actual cross-memory WOLA connection to

the named target service.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 38: IIOP

WebSphere Optimized Local Adapters - Proxy Support for Outbound Calls

1 This topology has limitations compared to outbound WOLA calls on

the same z/OS LPAR: global transactions requiring two-phase commit can not be propagated

across the IIOP connection to the WOLA proxy, and the user identity on the WAS thread can not be asserted

into the target service on z/OS.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 39: IIOP

WebSphere Optimized Local Adapters - Proxy Support for Inbound Calls

1 This tells the local proxy application to treat requested service, which is specified as the JNDI name of the

target EJB, as a request to invoke the EJB using IIOP

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 40: IIOP

Java Interface Definition Language

1 The Java IDL enables distributed Web applications to transparently invoke

operations on remote network services using the industry standards Interface description language (IDL) and IIOP from Object Management

Group.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 41: IIOP

Interoperable Object Reference

1 An 'Interoperable Object Reference' ('IOR') is a CORBA or RMI-IIOP Reference (computer science)|

reference that uniquely identifies an object (computer science)|object on

a remote CORBA server.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 42: IIOP

WebSphere Application Server for z/OS - Version 8.0 z Differentiators

1 * 'request_timeout' -- provides a timeout, expressed in seconds, that applies to outbound IIOP requests to

an EJB located on another server.

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 43: IIOP

DSM CC

1 Objects are accessed using the internet inter-ORB protocol (IIOP), with some optional

extensions

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 44: IIOP

DSM CC

1 (The choice of download or IIOP protocols is embedded in the object's

IOR, so the means of access is transparent to the client application.)

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 45: IIOP

Nicholas Romanov, Prince of Russia - Title and style

1 xviiiOpfell, Olga S

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 46: IIOP

Jason Scott Lee - Career

1 Blaisdell Center|Blaisdell Concert Hall in Honolulu in February

2009.http://www.hawaiiopera.org/news_and_events/112108_jason_scoot_l

ee

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 47: IIOP

Mootness - U.S. state courts

1 They may also establish exceptions to the

doctrine.[http://hawaiiopinions.blogspot.com/2008/10/prejudice-pushes-

aside-mootness.html Prejudice Pushes Aside Mootness Doctrine

Hamilton v

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 48: IIOP

Hawaii Opera Theatre - Educational programs

1 This is a rare opportunity offered to students who may pursue careers in opera in the future, and is one of the programs that makes HOT unique.[http://www.hawaiiopera.org HOT

website]

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 49: IIOP

Jan Maxwell - Career

1 Sloane While Emery Stays at Abigail’s Party] playbill.com, December 16, 2005 Also in 2006, she reunited with her Sound of Music co-star

Richard Chamberlain in Hawaii Opera Theatre's production of Rodgers and Hammerstein's The King and I in Honolulu, Hawaii.

[http://hawaiiopera.org/about_hot/hot_history/ Hawaii Opera Theatre listing] hawaiiopera.org, retrieved May 24, 2010 In 2007, she starred

in the Broadway production of Coram Boy (play)|Coram Boy,Gans, Andrew.[http://www.playbill.com/news/article/107296-Orphans-Tale-Coram-Boy-Arrives-on-Broadway-April-16 Orphans' Tale: Coram Boy Arrives on Broadway April 16] playbill.com, April 16, 2007 for which she received her second Tony Award nomination, for Best Featured

Actress in a Play.Gans, Andrew.[http://www.playbill.com/news/article/108083-2006-2007-Tony-Nominations-Announced-Spring-Awakening-Garners-11-Noms

2006-2007 Tony Nominations Announced; Spring Awakening Garners 11 Noms] playbill.com, May 15, 2007

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html

Page 50: IIOP

Long double - Other specifications

1 In CORBA (from specification of 3.0, which uses IEEE 754-1985|ANSI/IEEE Standard 754-1985 as its reference), the long double data

type represents an IEEE double-extended floating-point number, which has an exponent

of at least 15 bits in length and a signed fraction of at least 64 bits, with GIOP/IIOP CDR, whose floating-point types exactly

follow the IEEE standard formats for floating point numbers, marshalling this as what

seems to be IEEE 754-2008 binary128 a.k.a

https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html