Skip to main content

Evaluation of Three Approaches for CORBA Firewall/NAT Traversal

  • Conference paper
On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE (OTM 2005)

Abstract

Applications that use CORBA as communication layer often have some restrictions for multi-domain deployment. This is particularly true when they have to face firewall/NAT traversal. Furthermore, nowadays there isn’t a well-accepted unique or standardized solution adopted by all ORBs, compelling applications using this middleware to use proprietary solutions that sometimes do not address the environment restrictions in which they are deployed (e.g. impossibility to open firewall ports). This work presents and compares three solutions for firewall/NAT traversal by CORBA-based distributed applications, each one suitable for a specific situation and exploring its advantages. Examples of such situations are the possibility of opening firewall ports or the possibility of starting a TCP connection to the outside network.

This work is supported by a grant from CNPq, Brazil, proc. # 550094/2005-9.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bolton, F., Walshe, E.: Pure CORBA: A Code-Intensive Premium Reference. Sams (2001)

    Google Scholar 

  2. Brookshier, D., Govoni, D., Krishnan, N., Soto, J.C.: JXTA: Java P2P Programming. Sams (2002)

    Google Scholar 

  3. Brose, G.: Jacorb: Implementation and design of a java orb. In: Procs. of DAIS 1997, IFIP WG 6.1 International Working Conference on Distributed Aplications and Interoperable Systems, Cottbus, Germany (1997)

    Google Scholar 

  4. Cerqueira, R., Maia, R., Nogara, L., Mello, R.: Oil - (orb in lua). (2005), http://luaforge.net/projects/o-two/ , (Last Visited in 06/06/2005)

  5. de Moura, A.L., Rodriguez, N., Ierusalimschy, R.: Coroutines in lua. Journal of Universal Computer Science 10(7), 910–925 (2004)

    Google Scholar 

  6. Goldchleger, A., Kon, F., Goldman, A., Finger, M.: Integrade: Object-oriented grid middleware leveraging idle computing power of desktop machines. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol. 2672. Springer, Heidelberg (2003)

    Google Scholar 

  7. Gradecki, J.D.: Mastering Jxta: Building Java Peer-to-Peer Applications. John Wiley & Sons, Inc., Chichester (2002)

    Google Scholar 

  8. Group, O.M.: Common object request broker architecture: Core specification (2004a), http://www.omg.org/docs/formal/04-03-01.pdf-Version3.0.3

  9. Group, O.M.: Corba firewall traversal specification (2004b), http://www.omg.org/docs/ptc/04-03-01.pdf , Final Adopted Specification

  10. Henning, M.: A new approach to object-oriented middleware. IEEE Internet Computing 8(1), 66–75 (2004)

    Article  Google Scholar 

  11. Henning, M., Spruiell, M. (2005), Distributed programming with ice, http://www.zeroc.com/download/Ice/2.1/Ice-2.1.1.pdf , (Last Visited in 06/06/2005)

  12. Henning, M., Vinoski, S.: Advanced CORBA programming with C++. Addison-Wesley Longman Publishing Co., Inc., Amsterdam (1999)

    Google Scholar 

  13. Ierusalimschy, R.: Programming in Lua. Ingram (US) and Bertram Books, UK (2003)

    Google Scholar 

  14. JacORB (2005), Jacorb: The free java implementation of the omg’s corba standard, http://www.jacorb.org , (Last Visited in 06/06/2005)

  15. JXTA (2005), jxta.org, http://www.jxta.org , (Last Visited in 06/06/2005)

  16. LUA (2005), The programming language lua., http://www.lua.org , (Last Visited in 06/06/2005)

  17. Squid (2005), Squid web proxy cache, http://www.squid-cache.org/ , (Last Visited in 06/06/2005)

  18. Stevens, W.R.: Unix Networking Programming, 2nd edn., vol. 1. Prentice-Hall, Englewood Cliffs (1998)

    Google Scholar 

  19. Tanenbaum, A.S.: Computer Networks, 4th edn. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  20. Technologies, X.S.I. (2005), Iiop domain boundary controller - the corba an ejb firewall, http://www.xtradyne.com/documents/whitepapers/Xtradyne-I-DBC-WhitePaper.pdf , (Last Visited in 06/06/2005)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Costa, A.T., Endler, M., Cerqueira, R. (2005). Evaluation of Three Approaches for CORBA Firewall/NAT Traversal. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. OTM 2005. Lecture Notes in Computer Science, vol 3761. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11575801_1

Download citation

  • DOI: https://doi.org/10.1007/11575801_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29738-3

  • Online ISBN: 978-3-540-32120-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics