Title: Dissection of the internal workings of the RMI, possible enhancements and implementing authentication in standard Java RMI

Authors: Vipul K. Dabhi, Harshad B. Prajapati

Addresses: IT Department, Faculty of Technology, Dharmsinh Desai University, College Road, Nadiad – 387001, Gujarat, India. ' IT Department, Faculty of Technology, Dharmsinh Desai University, College Road, Nadiad – 387001, Gujarat, India

Abstract: The Java Remote Method Invocation (RMI) is a well-known solution for remote method call. However, the standard Java RMI lacks features like service availability, load sharing, authentication and authorisation of client, data security and asynchronous communication, which are desirable in any enterprise distributed application. To enhance or add any new functionality in the RMI runtime, a detailed study of its internal workings is required. We debug and analyse RMI programs to understand the internal workings of the RMI architecture. We present the components involved and their responsibilities, detailed internal communication process and feasible enhancements at different layers of the RMI architecture. We compare the RMI with other distributed computing technologies like Common Object Request Broker Architecture (CORBA) and web services. We also discuss possible enhancements in the RMI runtime, which could perfect it for a real enterprise application. As a proof of concept, we also discuss the implementation details of providing a client authentication functionality by modifying the RMI runtime. In addition to programmers, this contribution will also help the research community and the RMI runtime providers to enhance the RMI runtime.

Keywords: remote method invocation; Java RMI; RMI architecture; internal workings; RMI components; security; client authentication; remote method calls; CORBA; web services; RMI enhancements; enterprise applications; RMI runtime.

DOI: 10.1504/IJNVO.2010.035403

International Journal of Networking and Virtual Organisations, 2010 Vol.7 No.6, pp.514 - 534

Published online: 30 Sep 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article