Abstract
Applications that use CORBA as communication layer often have some restrictions for multi-domain deployment. This is particularly true when they have to face firewall/NAT traversal. Furthermore, nowadays there isn’t a well-accepted unique or standardized solution adopted by all ORBs, compelling applications using this middleware to use proprietary solutions that sometimes do not address the environment restrictions in which they are deployed (e.g. impossibility to open firewall ports). This work presents and compares three solutions for firewall/NAT traversal by CORBA-based distributed applications, each one suitable for a specific situation and exploring its advantages. Examples of such situations are the possibility of opening firewall ports or the possibility of starting a TCP connection to the outside network.
This work is supported by a grant from CNPq, Brazil, proc. # 550094/2005-9.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bolton, F., Walshe, E.: Pure CORBA: A Code-Intensive Premium Reference. Sams (2001)
Brookshier, D., Govoni, D., Krishnan, N., Soto, J.C.: JXTA: Java P2P Programming. Sams (2002)
Brose, G.: Jacorb: Implementation and design of a java orb. In: Procs. of DAIS 1997, IFIP WG 6.1 International Working Conference on Distributed Aplications and Interoperable Systems, Cottbus, Germany (1997)
Cerqueira, R., Maia, R., Nogara, L., Mello, R.: Oil - (orb in lua). (2005), http://luaforge.net/projects/o-two/ , (Last Visited in 06/06/2005)
de Moura, A.L., Rodriguez, N., Ierusalimschy, R.: Coroutines in lua. Journal of Universal Computer Science 10(7), 910–925 (2004)
Goldchleger, A., Kon, F., Goldman, A., Finger, M.: Integrade: Object-oriented grid middleware leveraging idle computing power of desktop machines. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol. 2672. Springer, Heidelberg (2003)
Gradecki, J.D.: Mastering Jxta: Building Java Peer-to-Peer Applications. John Wiley & Sons, Inc., Chichester (2002)
Group, O.M.: Common object request broker architecture: Core specification (2004a), http://www.omg.org/docs/formal/04-03-01.pdf-Version3.0.3
Group, O.M.: Corba firewall traversal specification (2004b), http://www.omg.org/docs/ptc/04-03-01.pdf , Final Adopted Specification
Henning, M.: A new approach to object-oriented middleware. IEEE Internet Computing 8(1), 66–75 (2004)
Henning, M., Spruiell, M. (2005), Distributed programming with ice, http://www.zeroc.com/download/Ice/2.1/Ice-2.1.1.pdf , (Last Visited in 06/06/2005)
Henning, M., Vinoski, S.: Advanced CORBA programming with C++. Addison-Wesley Longman Publishing Co., Inc., Amsterdam (1999)
Ierusalimschy, R.: Programming in Lua. Ingram (US) and Bertram Books, UK (2003)
JacORB (2005), Jacorb: The free java implementation of the omg’s corba standard, http://www.jacorb.org , (Last Visited in 06/06/2005)
JXTA (2005), jxta.org, http://www.jxta.org , (Last Visited in 06/06/2005)
LUA (2005), The programming language lua., http://www.lua.org , (Last Visited in 06/06/2005)
Squid (2005), Squid web proxy cache, http://www.squid-cache.org/ , (Last Visited in 06/06/2005)
Stevens, W.R.: Unix Networking Programming, 2nd edn., vol. 1. Prentice-Hall, Englewood Cliffs (1998)
Tanenbaum, A.S.: Computer Networks, 4th edn. Prentice-Hall, Englewood Cliffs (2003)
Technologies, X.S.I. (2005), Iiop domain boundary controller - the corba an ejb firewall, http://www.xtradyne.com/documents/whitepapers/Xtradyne-I-DBC-WhitePaper.pdf , (Last Visited in 06/06/2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Costa, A.T., Endler, M., Cerqueira, R. (2005). Evaluation of Three Approaches for CORBA Firewall/NAT Traversal. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. OTM 2005. Lecture Notes in Computer Science, vol 3761. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11575801_1
Download citation
DOI: https://doi.org/10.1007/11575801_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29738-3
Online ISBN: 978-3-540-32120-0
eBook Packages: Computer ScienceComputer Science (R0)