Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
JAVA Technology
Java Technology
Java technology is a portfolio of products that
are based on the power of networks and the
idea that the same software should run on
many different kinds of systems and devices
“Write Once Run Anywhere”
Subjects of Java Technology
J2SE (Core/Desktop)
J2EE (Enterprise/Server)
J2ME (Mobile/Wireless)
Java Card
Java Web Services
XML
Other Java Technologies
J2SE (Java 2 Standard Edition)
Core Technology
The essentials: Objects, strings, threads, numbers, input and output, data
structures, system properties, date and time, and so on.
Applets: The set of conventions used by applets.
Networking: URLs, TCP (Transmission Control Protocol), UDP (User
Datagram Protocol) sockets, and IP (Internet Protocol) addresses.
Internationalization: Help for writing programs that can be localized for
users worldwide. Programs can automatically adapt to specific locales and
be displayed in the appropriate language.
Security: Both low level and high level, including electronic signatures,
public and private key management, access control, and certificates.
Software components: Known as JavaBeansTM, can plug into existing
component architectures.
Object serialization: Allows lightweight persistence and communication
via Remote Method Invocation (RMI).
Java Database Connectivity (JDBC): Provides uniform access to a wide
range of relational databases.
What is included in the Java 2 SDK?
J2EE (Java 2 Enterprise Edition)
Web Application (e-commerce, e-learning, ebusiness, e-government, etc)
JSP (Java server Pages) & Servlets
JDBC (Java Database Connectivity)
EJB (Enterprise JavaBeans)
JavaMail
JMS (Java Message service)
Application Example :
Online Application (Book Store, library, internet Banking,
etc)
J2EE Example
J2ME – Java 2 Micro Edition
J2ME enables Java applications to run on small, resourceconstrained computing devices (mobile phone, PDA).
Java technology for handheld and embedded devices.
Compatibility with J2SE is maintained wherever feasible.
In fact, J2ME removes the parts of J2SE that are not applicable
to constrained devices, such as AWT and other features.
J2ME defines configurations and profiles.
2 Configuration
CLDC – Connected Limited Device Configuration,
CDC – Connected Device Configuration
Device with 160 – 512 KiloByte memory, Part of J2SE feature, prosesor
16 or 32 bit
Minimum memory 2 Mbyte, Full J2SE features, Prosesor 32 bit
Profile : MIDP, FP, Personal, RMI Profile, PDA Profile.
J2ME Appication Example
JAVA Card
Java Card technology provides a secure environment
for applications that run on smart cards and other
devices with very limited memory and processing
capabilities.
Multiple applications on a single card, and new ones
can be added to it even after it has been issued to the
end user.
Applications written in the Java programming
language can be executed securely on cards from
different vendors
Many used with Java Security
Others Java Technology
Jini Network Technology
JXTA Technology
OSS through Java Initiative
JSLEE and the JAIN Initiative
Java Dynamic Management Kit
Java Metadata Interface
JINI Network Technology
Jini network technology, which includes JavaSpaces
technology and Jini extensible remote invocation (Jini
ERI), is an open architecture that enables you to
create network-centric services--whether
implemented in hardware or software--that are highly
adaptive to change. You can use Jini technology to
build adaptive networks that are scalable, evolvable,
and flexible, as typically required in dynamic
computing environments
Network Controller
Example : Monitoring temperatur via web
JAIN & JSLEE
a set of Java technology APIs that enable the
rapid development of Java based next
generation communications products and
services for the Java platform
Java for Telecommunication
JAIN Service Logic Execution Environment
(JSLEE)
JXTA
You can use JXTA technology to create peer-to-peer
(P2P) applications based on Java technology.
JXTA technology is a set of open protocols that
enable any connected device on the network, ranging
from cell phones and wireless PDAs to PCs and
servers, to communicate and collaborate in a P2P
manner.
JXTA peers create a virtual network where any peer
can interact with other peers and resources directly,
even when some of the peers and resources are
behind firewalls and network address translations
(NATs) or on different network transports.
OSS & Java
The OSS through Java Initiative ("OSS" stands for
"Operations Support Systems") produces a standard set of Java
technology-based APIs to jump-start the implementation of
end-to-end services on next-generation wireless networks, and
leverage the convergence of telecommunications and Internetbased solutions.
OSS/J (www.ossj.org) focusing on the business needs of
Service Providers and the broader OSS/J community: ISVs,
NEPs, and system implementation providers, as well as
telecommunications analysts, consultants and associations.
This site (java.sun.com/products/oss) will remain focused on
meeting the needs of Java developers serving the
telecommunications industry.
Java DMK
Java Dynamic Management Kit (Java DMK) is a Java
technology based toolkit that allows developers to rapidly
create smart agents based on the Java Management Extensions
(JMX) specification. T
he power of the JMX framework is that it supports multiple
protocol access to management information residing in the
agent.
The latest release of Java DMK, conforms to JMX v.1.2 and
JMX Remote API 1.0. The JMX specification defines a threelevel management architecture:
The instrumentation level makes resources manageable as Java
objects
The agent level exposes these objects for management
The distributed services level allow remote access and security
Why use Java DMK
Device vendors and application developers can use
any technology they want: as long as management
applications communicate through a Java dynamic
management agent, they can access any resource
Management services deployed in agents can
interchange resources dynamically, allowing new
services to be downloaded and plugged into smart
agents as and when they become available