Solved

RMI Problem - Urgent

Posted on 2002-04-02
7
254 Views
Last Modified: 2008-03-06
hi experts,

I'm writing an RMI application. The ServerRMI has been started successfully. When running the ClientRMI I get the following exception:

java.rmi.RemoteException: java.net.ConnectException: Connection refused; nested exception is:
        java.net.ConnectException: Connection refused
java.net.ConnectException: Connection refused
        at java.net.PlainSocketImpl.socketConnect(Native Method)
        at java.net.PlainSocketImpl.doConnect(PlainSocketImpl.java:301)
        at java.net.PlainSocketImpl.connectToAddress(PlainSocketImpl.java:121)
        at java.net.PlainSocketImpl.connect(PlainSocketImpl.java:108)
        at java.net.Socket.<init>(Socket.java:265)
        at java.net.Socket.<init>(Socket.java:94)
        at com.objectspace.voyager.LightProxy.newSocket(LightProxy.java:634)
        at com.objectspace.voyager.LightProxy.getCnxOS(LightProxy.java:588)
        at com.objectspace.voyager.LightProxy.osinv(LightProxy.java:453)
        at com.objectspace.voyager.LightProxy.osinvHC(LightProxy.java:406)
        at com.objectspace.voyager.LightProxy.inv(LightProxy.java:389)
        at com.objectspace.voyager.LightProxy.vI(LightProxy.java:294)
        at com.i2.iba.session.SessionServer_IProxy__Proxy__LightProxy.test(Unknown Source)
        at com.i2.iba.session.I2Session.main(I2Session.java:25)

I have already created and open a port(8888) for it and create the stubs and the skeletons using rmic tool. Do I need to set any security policy? I have already added two policy into java.policy.

permission java.net.SocketPermission "*:1024-65535", "connect,accept";
permission java.net.SocketPermission "*:8888", "connect";

It still doesn't work. Please give me help. Thanks!!
0
Comment
Question by:wilsontang
7 Comments
 
LVL 9

Expert Comment

by:Venci75
ID: 6912828
It looks that your client tries to connect to a wrong port or this host (port) is not accessible from the client machine. May the problem is that you can't connect to the RMI registry. To check this, try to establish a connection with the telnet application from the client host:
telnet <registry host> <registry port>
0
 

Author Comment

by:wilsontang
ID: 6914836
hi Venci75,
     I tried to run "nmap" command and the output as follows:
Port       State       Service
21/tcp     open        ftp
25/tcp     open        smtp
135/tcp    open        loc-srv
139/tcp    open        netbios-ssn
465/tcp    open        smtps
1433/tcp   open        ms-sql-s
5800/tcp   open        vnc
5900/tcp   open        vnc
8888/tcp   open        sun-answerbook

So port 8888 is already open. I think the telnet service doesn't care. It uses tcp to make a connection via port 8888, right? How about rmi registry? Do i need to set it using a command "rmiregistry"? How can I check this table?
Thanks a lot!!
 
0
 

Author Comment

by:wilsontang
ID: 6914854
hi Venci75,
     I tried to run "nmap" command and the output as follows:
Port       State       Service
21/tcp     open        ftp
25/tcp     open        smtp
135/tcp    open        loc-srv
139/tcp    open        netbios-ssn
465/tcp    open        smtps
1433/tcp   open        ms-sql-s
5800/tcp   open        vnc
5900/tcp   open        vnc
8888/tcp   open        sun-answerbook

So port 8888 is already open. I think the telnet service doesn't care. It uses tcp to make a connection via port 8888, right? How about rmi registry? Do i need to set it using a command "rmiregistry"? How can I check this table?
Thanks a lot!!
 
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 9

Expert Comment

by:Venci75
ID: 6915155
In addition to the client and the server you have to start the rmi registry (rmiregistry from the java bin directory).
0
 
LVL 1

Expert Comment

by:Moondancer
ID: 6961434
ADMINISTRATION WILL BE CONTACTING YOU SHORTLY.  Moderators Computer101 or Netminder will return to finalize these if they are still open in 14 days.  Please post closing recommendations before that time.

Below are your open questions as of today.  Questions which have been inactive for 21 days or longer are considered to be abandoned and for those, your options are:
1. Accept a Comment As Answer (use the button next to the Expert's name).
2. Close the question if the information was not useful to you, but may help others. You must tell the participants why you wish to do this, and allow for Expert response.  This choice will include a refund to you, and will move this question to our PAQ (Previously Asked Question) database.  If you found information outside this question thread, please add it.
3. Ask Community Support to help split points between participating experts, or just comment here with details and we'll respond with the process.
4. Delete the question (if it has no potential value for others).
   --> Post comments for expert of your intention to delete and why
   --> YOU CANNOT DELETE A QUESTION with comments; special handling by a Moderator is required.

For special handling needs, please post a zero point question in the link below and include the URL (question QID/link) that it regards with details.
http://www.experts-exchange.com/jsp/qList.jsp?ta=commspt
 
Please click this link for Help Desk, Guidelines/Member Agreement and the Question/Answer process.  http://www.experts-exchange.com/jsp/cmtyHelpDesk.jsp

Click you Member Profile to view your question history and please keep them updated. If you are a KnowledgePro user, use the Power Search option to find them.  

Questions which are LOCKED with a Proposed Answer but do not help you, should be rejected with comments added.  When you grade the question less than an A, please comment as to why.  This helps all involved, as well as others who may access this item in the future.  PLEASE DO NOT AWARD POINTS TO ME.

To view your open questions, please click the following link(s) and keep them all current with updates.
http://www.experts-exchange.com/questions/Q.11835018.html
http://www.experts-exchange.com/questions/Q.20006582.html
http://www.experts-exchange.com/questions/Q.20108618.html
http://www.experts-exchange.com/questions/Q.20130444.html
http://www.experts-exchange.com/questions/Q.20248693.html
http://www.experts-exchange.com/questions/Q.20268938.html
http://www.experts-exchange.com/questions/Q.20269858.html
http://www.experts-exchange.com/questions/Q.20284003.html


To view your locked questions, please click the following link(s) and evaluate the proposed answer.
http://www.experts-exchange.com/questions/Q.20131149.html

*****  E X P E R T S    P L E A S E  ******  Leave your closing recommendations if this item remains inactive another seven (7) days.  If you are interested in the cleanup effort, please click this link http://www.experts-exchange.com/jsp/qManageQuestion.jsp?ta=commspt&qid=20274643
POINTS FOR EXPERTS awaiting comments are listed here -> http://www.experts-exchange.com/commspt/Q.20277028.html
 
Moderators will finalize this question if in @14 days Asker has not responded.  This will be moved to the PAQ (Previously Asked Questions) at zero points, deleted or awarded.
 
Thank you everyone.
 
Moondancer
Moderator @ Experts Exchange
0
 
LVL 9

Expert Comment

by:Venci75
ID: 7932516
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
PAQ'd and pts refunded
Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Venci75
EE Cleanup Volunteer
0
 

Accepted Solution

by:
SpideyMod earned 0 total points
ID: 7984153
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

An old method to applying the Singleton pattern in your Java code is to check if a static instance, defined in the same class that needs to be instantiated once and only once, is null and then create a new instance; otherwise, the pre-existing insta…
Java functions are among the best things for programmers to work with as Java sites can be very easy to read and prepare. Java especially simplifies many processes in the coding industry as it helps integrate many forms of technology and different d…
Viewers will learn one way to get user input in Java. Introduce the Scanner object: Declare the variable that stores the user input: An example prompting the user for input: Methods you need to invoke in order to properly get  user input:
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now