Book Image

Distributed Computing in Java 9

Book Image

Distributed Computing in Java 9

Overview of this book

Distributed computing is the concept with which a bigger computation process is accomplished by splitting it into multiple smaller logical activities and performed by diverse systems, resulting in maximized performance in lower infrastructure investment. This book will teach you how to improve the performance of traditional applications through the usage of parallelism and optimized resource utilization in Java 9. After a brief introduction to the fundamentals of distributed and parallel computing, the book moves on to explain different ways of communicating with remote systems/objects in a distributed architecture. You will learn about asynchronous messaging with enterprise integration and related patterns, and how to handle large amount of data using HPC and implement distributed computing for databases. Moving on, it explains how to deploy distributed applications on different cloud platforms and self-contained application development. You will also learn about big data technologies and understand how they contribute to distributed computing. The book concludes with the detailed coverage of testing, debugging, troubleshooting, and security aspects of distributed applications so the programs you build are robust, efficient, and secure.
Table of Contents (17 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Customer Feedback
2
Communication between Distributed Applications
3
RMI, CORBA, and JavaSpaces

Security issues and concerns


Distributed computing is more about the collaboration of multiple different systems to work together in a shared environment. Hence, inter-system communication is prone to one of the following threats that is explained in detail here:

  • Passive Tap: This is a threat by an intruder to review application interaction and the data being exchanged between systems. It cannot change the data or harm the interaction directly, but it can steal any secured information with the access to view the network data; the intruder can use this information later for improper access. Passive Tap is an easy-to-attack threat for distributed systems.
  • Active Tap: This is a threat in which the actual message sent from a client to the server is being accessed to obtain secure information and steal or alter the information in the favor of the interloper.
  • Denial-of-Service: This is the scenario wherein the message in a wrong format is consistently trying to access application server that blocks...