Code Importing Techniques for Fast , Safe Client / Server Access by Joseph A . Bank

نویسندگان

  • Ron Bodkin
  • Andrew Myers
  • Quinton Zondervan
  • Miguel Castro
  • Sylvia Chen
چکیده

In client/server systems, server integrity can be maintained by disallowing direct client access to server data and requiring communication through well-defined interfaces. Typically, this communication requires expensive cross-domain calls, or even more expensive network communication. The main goal of this thesis is to create a system with fast, safe client/server access by allowing the server to import client code. Importing code allows the client to access the server through direct procedure calls, which are much faster than the indirect access that is typically used to maintain integrity. Server integrity is maintained by using a type-safe client language and by verifying imported code. To explore the benefit of allowing the server to import code for client/server communications, a Java interface to the Thor object-oriented database has been implemented, using code importing techniques for safe database access. Performance benchmarks indicate the use of code importing in the Java interface to Thor performs 50 times faster than the Java interface to Thor using standard communication techniques. These benchmarks also indicate that the Java interface to Thor outperforms by a factor of 3 a highly optimized C++ interface to Thor. However, since Java is interpreted, and thus an order of magnitude slower than most compiled languages, imported Java code is outperformed by code written in the language of the database itself. In the future, the use of just-in-time compilation should improve the performance of Java, making code-importing even more competitive. Thesis Supervisor: Barbara Liskov Title: NEC Professor of Software Science and Engineering

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing NFS Cross-Administrative Domain Access

The access model of exporting NFS volumes to clients suffers from two problems. First, the server depends on the client to specify the user credentials to use and has no flexible mechanism to map or restrict the credentials given by the client. Second, when the server exports a volume, there is no mechanism to ensure that users accessing the server are only able to access their own files. We ad...

متن کامل

Fast Browsing of Large Scale Images Using Server Prefetching and Client Caching Techniques

To support fast browsing of large scale images in a client/server environment, we propose a prediction-based server prefetching and client caching algorithm. By prefetching the predicted data using available network resources, the system can eeectively reduce the size of data needed for the next access. While traditional browsing cache systems can not address both nonstationary and stationary b...

متن کامل

SWORD, an Information Server for Juvenile Justice

Historically the juvenile justice system in southern Mississippi kept records on cards which had to be indexed, filed and then retrieved to move children through the system. University of Southern Mississippi's SWORD system is a client-server database which was developed to improve the quality and reliability of child information. SWORD currently serves six southern Mississippi counties with 16...

متن کامل

Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads - INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies

AbstracrMirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests service from a single mirror site. We consider enabling a client to access a file from multiple mirror sites in parallel to speed up the download. To eliminate complex client-server negotiations that a straightfor...

متن کامل

Safe Region Techniques for Fast Spatial Alarm Evaluation

Spatial alarms are personalized location-based triggers installed by mobile users to serve as a reminder of a location of interest to be encountered in their future trips. Unlike continuous spatial queries, spatial alarms do not require immediate processing and periodic reevaluation upon installation. Thus, a critical challenge for efficient processing of spatial alarms is to determine when to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007