Interceptors are an emerging middleware technology enabling the addition of specific network-oriented capabilities to distributed applications. By exploiting interceptors, developers can register code within interception points, extending the basic middleware mechanisms with specific functionality, e.g. authentication, flow control, caching, etc. Notably, these extensions can be achieved without modifying either the application or the middleware code. In this paper we report the results of our experiences with CORBA request portable interceptors. In particular, we point out (i) the basic mechanisms implementable by these interceptors, i.e. request redirection and piggybacking and (ii) we analyze their limitations. We then propose a proxy-based technique to overcome the interceptors' limitations. Successively, we present a performance analysis carried out on three Java-CORBA platforms currently implementing the portable interceptors specification. Finally, we conclude our work with a case study in which portable interceptors are used to implement the fault-tolerant CORBA client invocation semantic without impacting on the client application code and on the CORBA ORB. We also release fragments of Java code for implementing the described techniques. Copyright (C) 2003 John Wiley Sons, Ltd.

CORBA request portable interceptors: analysis and applications / Baldoni, Roberto; Carlo, Marchetti; L., Verde. - In: CONCURRENCY AND COMPUTATION. - ISSN 1532-0626. - 15:6(2003), pp. 551-579. (Intervento presentato al convegno 3rd International Symposium of Distributed Object Applications (DOA 01) tenutosi a ROME, ITALY nel SEP, 2001) [10.1002/cpe.716].

CORBA request portable interceptors: analysis and applications

BALDONI, Roberto;
2003

Abstract

Interceptors are an emerging middleware technology enabling the addition of specific network-oriented capabilities to distributed applications. By exploiting interceptors, developers can register code within interception points, extending the basic middleware mechanisms with specific functionality, e.g. authentication, flow control, caching, etc. Notably, these extensions can be achieved without modifying either the application or the middleware code. In this paper we report the results of our experiences with CORBA request portable interceptors. In particular, we point out (i) the basic mechanisms implementable by these interceptors, i.e. request redirection and piggybacking and (ii) we analyze their limitations. We then propose a proxy-based technique to overcome the interceptors' limitations. Successively, we present a performance analysis carried out on three Java-CORBA platforms currently implementing the portable interceptors specification. Finally, we conclude our work with a case study in which portable interceptors are used to implement the fault-tolerant CORBA client invocation semantic without impacting on the client application code and on the CORBA ORB. We also release fragments of Java code for implementing the described techniques. Copyright (C) 2003 John Wiley Sons, Ltd.
2003
corba; distributed object computing; fault-tolerant corba; interceptors; middleware; performance analysis
01 Pubblicazione su rivista::01a Articolo in rivista
CORBA request portable interceptors: analysis and applications / Baldoni, Roberto; Carlo, Marchetti; L., Verde. - In: CONCURRENCY AND COMPUTATION. - ISSN 1532-0626. - 15:6(2003), pp. 551-579. (Intervento presentato al convegno 3rd International Symposium of Distributed Object Applications (DOA 01) tenutosi a ROME, ITALY nel SEP, 2001) [10.1002/cpe.716].
File allegati a questo prodotto
File Dimensione Formato  
VE_2003_11573-46694.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 327.74 kB
Formato Adobe PDF
327.74 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/46694
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 17
  • ???jsp.display-item.citation.isi??? 10
social impact