Preview

Scja Java Technologies

Good Essays
Open Document
Open Document
651 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scja Java Technologies
Java Standard Edition (Java SE)(J2SE):
Java Development Kit:
Java Runtime Environment:
Java SE API
Java Virtual Machines (JVM)
Deployment Technologies
Utilities needed to compile, test, and debug applications
Operating Systems *
Java Micro Edition (Java ME)(J2ME):
Configurations:
Connected Device Configuration (CDC)
Standard Java Virtual Machine
Used on devices without extreme constraints of resources
Connected Limited Device Configuration (CLDC)
Small compact Java Virtual Machine (Sun’s K Virtual Machine)
Reduced set of class libraries
Profiles:
API’s which define the application’s life-cycle model, user interface, and device properties access
CDC Profiles:
Foundation Profile (FP)
Personal Profile (PP)
Personal Basic Profile (PBP)
CLDC Profiles:
Mobile Information Device Profile (MIDP)
Information Module Profile (IMP)
Optional Packages *
Java Enterprise Edition (Java EE)(J2EE):
Follows the Model-View-Controller (MVC) architecture
Servlets – work as the controller
JavaServer Pages – handle the view or presentation logic
Enterprise JavaBeans (EJBs) – business logic

* The Java Remote Method Invocation API
Contained in the java.rmi package
The RMI server maintains the remote objects
The RMI client maintains the client objects that invoke the remote methods.
This is done by implementing a remote interface through a client stub.
Stubs are created with the ‘rmic’
Stubs = client stubs
The client stub’s marshal method calls the name and arguments and sends them to the skeleton on the server side. After they receive the results from the sender, they return the result back to the method call invoker.
Skeletons = remote stubs
The server stub’s receive marshal method calls the name and arguments from the client stubs, performs the necessary operations, and returns the result back to the client stub.
Java Remote Method Protocol (JRMP)
The underlying protocol for the Java-only implementation of RMI
Benefits of

You May Also Find These Documents Helpful

  • Good Essays

    nt 2640 studyguide

    • 720 Words
    • 3 Pages

    What process is used by a DNS server to add a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what?…

    • 720 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 8: The source machine will process the ARP reply from destination, it store the Sender Hardware Address as the layer 2 address of the destination.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Sends frames to and from with flow control, error control and sync; also addresses topology and medias.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 1593 Words
    • 7 Pages

    Which of the following files defines how FTP connection requests are processed by the TCP Wrapper?…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    At this layer error recovery is also performed. The following are examples TCP, UDP, and SPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    It traces the routes packets from the user to the target, it shows a packets hops to the target, and they target the host address.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sunbeam Case Analysis

    • 914 Words
    • 3 Pages

    1. Analyze the changes that Al Dunlap had initiated at Sunbeam after being hired from a strategic perspective. Did the changes started by Dunlap allow him opportunities to manage earnings?…

    • 914 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    This course introduces students to object-oriented programming. It covers object-oriented tools for system analysis, design and development. The course teaches the significance of object-oriented programming, the keywords and constructs of the Java programming language, and the steps required to create simple Java technology programs.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.…

    • 694 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Lab 2.6.2: Using Wireshark

    • 2260 Words
    • 10 Pages

    Wireshark is programmed to recognize the structure of different network protocols. This enables it to display the encapsulation and individual fields of a PDU and interpret their meaning.…

    • 2260 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Osi Transport Model

    • 7553 Words
    • 31 Pages

    At the receiving host, each piece of data may be directed to the appropriate application. Additionally, these individual pieces of data must also be reconstructed into a complete data stream that is useful to the Application layer. The protocols at the Transport layer describe the how the Transport layer header information is used to reassemble the data pieces into streams to be passed to the Application layer.…

    • 7553 Words
    • 31 Pages
    Good Essays
  • Satisfactory Essays

    Client-Server Model

    • 296 Words
    • 2 Pages

    Clients and servers exchange messages in a request-response messaging pattern: The client sends a request, and the server returns a response. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a communications protocol. All client-server protocols operate in the application layer.…

    • 296 Words
    • 2 Pages
    Satisfactory Essays

Related Topics