Académique Documents
Professionnel Documents
Culture Documents
Hoh In
Texas A&M University
1
CPSC608: CORBA Copyright © 2000 Hoh In
Goals of Today
• Understand
– CORBA technology: What, Why, How
• Discuss
– Issues of CORBA: promises and problems
2
CPSC608: CORBA Copyright © 2000 Hoh In
Contents
• Review
• What is CORBA?
• Why CORBA?
• How does CORBA work?
• What are considerations for using CORBA?
• Beyond CORBA
3
CPSC608: CORBA Copyright © 2000 Hoh In
What is CORBA?
5
CPSC608: CORBA Copyright © 2000 Hoh In
Some ORBs
• CORBA Software
(http://www.infosys.tuwien.ac.at/Research/Corba/software.html)
– Orbix (IONA)
– VisiBroker (Inprise)
– ObjectBroker (BEA)
– PowerBroker (Expersoft)
– ORB Plus (HP)
– ORBacus (Object-Oriented Concepts, Inc.)
– NEO/JavaIDL (SunSoft)
6
CPSC608: CORBA Copyright © 2000 Hoh In
Contents
• Review
• What is CORBA?
• Why CORBA?
• How does CORBA work?
• What are considerations for using CORBA?
• Beyond CORBA
7
CPSC608: CORBA Copyright © 2000 Hoh In
Why CORBA?
• Need to share information and resources
within and across diverse computing
enterprises
– CORBA is a Middleware Standard
– CORBA is a “Software Bus”
– CORBA is a Distributed Object Architecture
Object Transaction
Management
Transaction
Monitors
12
CPSC608: CORBA Copyright © 2000 Hoh In
How Does CORBA Work?
• Step 1: Write a specification for each object using IDL (Interface
Definition Language)
• Step 2: Compile the IDL to generate client stub and server
skeleton code
• Step 3: Write the client application code.
• Step 4: Write the server object code.
• Step 5: Compile the client and server code
• Step 6. Start the server
• Step 7: Run the client application
3
4
18
CPSC608: CORBA Copyright © 2000 Hoh In
Contents
• Review
• What is CORBA?
• Why CORBA?
• How does CORBA work?
• What are considerations for using CORBA?
• Beyond CORBA
19
CPSC608: CORBA Copyright © 2000 Hoh In
What are considerations for using
CORBA?
• Security
• Performance
• Fault-Tolerance
• Scalability
20
CPSC608: CORBA Copyright © 2000 Hoh In
How to Analyze Security in CORBA?
• The CORBA Security Service specification
– Identification and authentication: verify who they claim to be
– Authorization and access control: decide whether an object
can be accessed or not
– Security auditing: make users accountable for security
– Security of communication between objects
– Non-repudiation
• The CORBA ORB-SSL integration specification
• The CORBA/Firewall specification
– TCP/IP firewalls
– SOCKS v5.0 firewalls
– GIP proxy firewalls
21
CPSC608: CORBA Copyright © 2000 Hoh In
How to Analyze Performance in CORBA?
22
CPSC608: CORBA Copyright © 2000 Hoh In
Fault Tolerance in CORBA
• Failures caused by factors as diverse as:
– Loss of processing resources - hardware or software
– Loss of logical and physical communication paths -- network
and connectivity failures
– Both transient and permanent failures in the application itself
• Approaches
– Prevention is better than cure
– Accept the fact that processes don’t stay up for ever
– Complex heterogeneous applications are combined from
many tool components
• CORBA Support
– Cold replication model
– Warm standby model
– Hot standby model
23
CPSC608: CORBA Copyright © 2000 Hoh In
Cold Replication Model
28
CPSC608: CORBA Copyright © 2000 Hoh In
Beyond CORBA
• Unnecessary Heavy
Services
– Some application don’t
need all services that
CORBA provides. They
may degrade performance
without any gains.
– A solution approach:
Container = objects +
selected services
• Scalability of ORB
– global Naming protocol
– complex marshalling