Download File - Department of Information Technology-SRIT

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
ENTERPRISE COMPUTING
UNIT- III
UNIT III - SERVICES FOR DISTRIBUTED ENTERPRISE SYSTEMS
TWO MARKS
1. Specify the use of naming service.
An object is a Java object class that is stored on the memory. The name of an
object is a string of character that is associated with the location of the object and name is
the key used to retrieve the object.
A naming service is used to relate an Object name to an object location and
enable a program to access the object by referring the object name.
(eg.,) Domain Name System, File system
2. Specify the use of JNDI in naming system
The Java Naming and Directory Interface (JNDI) provides a standard Java
interface-to naming system that can be used with various types of underlying naming
systems. JNDI can also be used to name and reference objects that lie outside of a
particular naming system. Furthermore, JNDI also provides interfaces for encapsulating
and handling events that can be generated from a naming service
3. What are the various packages present in JNDI
The JNDI class libraries are partitioned into the following packages:
 javax.naming
 javax.naming.directory
 javax.naming.event
 javax.naming.ldap
 javax.naming.spi
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
1
ENTERPRISE COMPUTING
UNIT- III
4. Define the term CORBA Naming
The OMG’s CORBA Naming Service (also called Object Naming Service and
CosNaming) presents the primary and standard way for mapping between names and
object in CORBA ORB.
5. Define the Naming Context in CORBA
Naming contexts in CORBA contain a list of names that are all unique to that
context in which each binding has a binding type indicating whether the name is bound to
either a CORBA object or another naming context. Even though a logical name can be
bound to a naming context, naming contexts do not need to be associated with logical
names.
6. What are the operations done using naming context.
Operations on naming contexts include binding and rebinding names to
objects,resolving objects given a name, unbinding objects, creating subcontexts, and
listing names associated with the context.
7. What is the need of DNS
The DNS is used on Internet / Intranet to relate domain name with IP address.
(for example, www.yahoo.com) to and from IP addresses (for example, 204.71.200.68).
DNS names have a syntax convention and map to IP addresses that are logical addresses
of network devices or hosts.
8. What are the various JNDI directory services available?
JNDI Directory Services
 NIS (Network Information System) as a Directory Service
 NDS (Novell Directory Service) as a Directory Service
 LDAP (Lightweight Directory Access Protocol) as a Directory Service
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
2
ENTERPRISE COMPUTING
UNIT- III
 CORBA as a Trading Service
 Jini as a Trading Service
 Microsoft Active Directory Services
9. Which service are mainly used in enterprise network resource
 The Novell Directory Service (NDS) is a popular directory service for
managing enterprise network resources and network user information.
 NDS's multiplatform support and its easy-to use GUI administration
toolkit have made it fairly popular with network administrators.
 NDS servers allow NDS clients to obtain access to such resources as
networks, file servers, print servers, and database servers from a centrally
managed location.
 Using NDS, administrators can enable access, limit access, and disable
access to such resources by users in an easily configurable fashion.
10. What are the basic functionalities present in LDAP?
The LDAP API supports most of the basic directory service functionality, include
 Bind (connect/authenticate) to an LDAP directory server.
 Unbind (disconnect) from an LDAP directory server session.
 Add a new directory object entry.
 Delete a directory object entry.
 Modify a directory object entry.
 Rename a directory object entry.
 Search for directory object entries.
 Compare an entry with particular attribute values to determine whether it
contains those values
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
3
ENTERPRISE COMPUTING
UNIT- III
11. Define Jini Services in Trading Services
 Jini is a collection of Java APIs and components for building
distributed systems.
 Jini is a lightweight layer of Java code that rests atop the Java 2 platform.
 Jini can run on top of the J2SE and J2EE, as well as the J2ME.
 Jini depends on Java's Remote Method Invocation (RMI) distributed
communications infrastructure.
 Jini and RMI together offer a set of APIs and infrastructure for building
distributed services.
12. What are the packages used in Jini?
 JSK (The Jini Software Kit)
 JXP (The Java eXtended Platform)
 JCP (The Jini Core Platform)
13. What are the basic steps to create Jini Services?
 Define Jini Service Interface
 Implement Jini Service Proxy
 Implement Remote Process Interface
 Implement the Jini Service Registrar
14. Define Activation Services.
An activation service is a component of software, responsible for bringing other
software from an inactive state into an active in-memory state.
(e.g.,) 1. Java class file become active when it is instantiated as an object.
2. Entire program become active when it generate its own process.
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
4
ENTERPRISE COMPUTING
UNIT- III
15. Diagrammatically represents the Activation service available
16. What are the sequences of process occurs during client request in RMI
activation framework?
1. RMI client attempts reference
2. Remote reference faults to activator reference
3. Activator looks up activation info
4. Activator accesses/spawns JVM process
5. Activator requests activated object
6. JVM process loads activatable class
7. JVM process instantiates activatable object
8. Activated remote reference is returned
9. RMI client has remote reference
17. What are the sequences of process occurs during client request in CORBA
activation framework?
1. CORBA client attempts reference
2. ORB obtains POA reference
3. POA obtains object ID
4. POA looks for cached object instance
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
5
ENTERPRISE COMPUTING
UNIT- III
5. POA requests servant from servant manager
6. Servant manager loads servant information
7. Servant manager instantiates servant
8. POA obtains servant handle
9. POA invokes servant
10. CORBA client request satisfied
18. What are the compound Life Cycle interfaces available
The compound life cycle service uses the same notation to enables copies, moves,
creations and deletions.
These are the key Compound Life Cycle interfaces:
 Operations Factory
 Operations
 Node
 Relationship
 Role
19. Define Messaging Service in distributed application
Messaging Service is a software that provides support for passing messages
between distributed applications in a reliable, asynchronous, loosely coupled, languageindependent, platform independent and often configurable fashion.
A messaging service also provides an interface for messaging clients
20. What the two types of Message Service Implementations?
1. Using Messaging middleware software
2. Using software embedded into client (Thick Client Software)
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
6
ENTERPRISE COMPUTING
UNIT- III
Messaging middleware
Messaging thick client software
21. What are the various types of Messaging Services?
 Point-to-Point Messaging
 Publish-Subscribe Messaging
 Push and Pull Messaging Models
 Message Filtering, Synchronicity, and Quality
 Email Messaging
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
7
ENTERPRISE COMPUTING
UNIT- III
22. Define Message Oriented Middleware (MOM).
MOM API defines how distributed applications should utilize an underlying
MOM message channel or queue for communicating messages to one another. Messages
are passed between applications via MOM in a way that does not block the sender of that
message. That is, the sender can send a message and allow the MOM to ensure that it gets
to the intended receiver without waiting for a response from the receiver.
23. Define Java Message Service.
Java Message Service (JMS) is a Java API that defines how messaging clients can
interface with underlying messaging service. JMS also provides an interface that
underlying messaging service providers implement to provide JMS services to clients.
24. What is the use of CORBA Event Service?
The CORBA Event Service is a CORBA service that provides basic messaging
facilities via encapsulation of events that can be generated by objects and delivered to
other objects. The CORBA Event Service handles the mechanisms for delivering the
event from an event supplier object to an event consumer object after the event has been
generated.
25. What are the present for event communication?
Two models for event communication via the event channel are the "push model" and
the "pull model." The push model of events is used when a supplier pushes an event to
the event channel object, which is then passed onto the consumer by the event channel.
The pull model of events is used when a consumer attempts to pull an event from the
event channel object, which pulls events from suppliers.
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
8
ENTERPRISE COMPUTING
UNIT- III
26. What are the various Email messages present?
 JavaMail Generic Messages
 JavaMail Multipart Messages
 JavaMail MIME Messages
27. What are the various event/listener combinations present in Java mail?
The various event/listener combinations defined for JavaMail events are shown
 Connection Event Model: Manages mail session connection opening,
closing, and disconnect events.
 Folder Event Model: Manages mail folder creation, deletion ,and
renaming events.
 Store Event Model: Manages mail message notification events.
 Transport Event Model: Manages mail communication delivery,
non delivery, and partial-delivery events.
 Message Count Event Model: Manages message folder addition and
deletion events.
 Message Changed Event Model: Manages message content change
events.
28. Define Transaction Services for the middleware
Transaction services are middleware services that facilitate the provision of
transaction semantics and ACID principle behavior for your enterprise applications.
Transaction services provide an API for programmers to use that enables them to
encapsulate which operations should be contained within a transaction.
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
9
ENTERPRISE COMPUTING
UNIT- III
29. What are the steps involved in Two Phase Commit Protocol?
These are the two-phase commit protocol steps:
 Phase One—Commit Preparation: A prepare for commit message is first sent
to each resource manager with updated data involved in a transaction. Each
resource manager then persists a description of the updates it has made within the
context of the current transaction. Resource managers can also opt to abort the
transaction at this stage, and then the whole transaction can be aborted by the
transaction manager.
 Phase Two—Actual Commit: If the transaction was not aborted, the transaction
manager will send a commit message to all resource managers involved in the
transaction. The resource managers will then commit their updates.
30. Define Object Transaction Service (OTS).
CORBA Service is known as OTS, which defines the interface to implement
transaction for distributed CORBA objects. Distributed CORBA objects participate in the
transaction via ORB (Object Request Brokerage).
31. What is meant by the term assurance in an enterprise?
Providing assurance for an enterprise means providing secure, reliable, available,
maintainable and perhaps safe solutions.
32. List the general assurance process.
 Identify assurance problem
 Assess risk
 Generate risk reduction plan
 Assess residual risk
 Assess cost of risk reduction plan
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
10
ENTERPRISE COMPUTING
UNIT- III
General Assurance process
33. Draw the basic security model.
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
11
ENTERPRISE COMPUTING
UNIT- III
34. Define the term Cryptography.
Cryptography is the science of information security. The word is derived from the
Greek kryptos, meaning hidden. Cryptography is closely related to the disciplines of
cryptology and cryptanalysis. Cryptography includes techniques such as microdots,
merging words with images, and other ways to hide information in storage or transit.
However, in today's computer-centric world, cryptography is most often associated with
scrambling plaintext (ordinary text, sometimes referred to as cleartext) into cipher text (a
process called encryption), then back again (known as decryption). Individuals who
practice this field are known as cryptographers.
Modern cryptography concerns itself with the following four objectives:




Confidentiality
Integrity
Non-repudiation
Authentication
35. What are the various classes of Cryptography?
 Message Digest Cryptography (Algorithms: MD2, MD4, MD5,
SHA, SHA-I, MAC)
 Symmetric Key Cryptography (Algorithms: DES, Triple DES,
RC2, RC4,RC5)
 Asymmetric Key Cryptography (Algorithms: DSA, RSA, Diffie
Hellman)
36. List the various types of Authentication.
 Password-based identity and authentication
 Physical token–based identity and authentication
 Biometrics-based identity and authentication
 Certificate-based identity and authentication
37. What are the various Access Control available to provide assurance?
 Discretionary Access Control
 Role-Based Access Control
 Mandatory Access Control
 Firewall Access Control
SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
12