Code Importing Techniques for Fast , Safe Client / Server Access by Joseph A . Bank
نویسندگان
چکیده
In client/server systems, server integrity can be maintained by disallowing direct client access to server data and requiring communication through well-defined interfaces. Typically, this communication requires expensive cross-domain calls, or even more expensive network communication. The main goal of this thesis is to create a system with fast, safe client/server access by allowing the server to import client code. Importing code allows the client to access the server through direct procedure calls, which are much faster than the indirect access that is typically used to maintain integrity. Server integrity is maintained by using a type-safe client language and by verifying imported code. To explore the benefit of allowing the server to import code for client/server communications, a Java interface to the Thor object-oriented database has been implemented, using code importing techniques for safe database access. Performance benchmarks indicate the use of code importing in the Java interface to Thor performs 50 times faster than the Java interface to Thor using standard communication techniques. These benchmarks also indicate that the Java interface to Thor outperforms by a factor of 3 a highly optimized C++ interface to Thor. However, since Java is interpreted, and thus an order of magnitude slower than most compiled languages, imported Java code is outperformed by code written in the language of the database itself. In the future, the use of just-in-time compilation should improve the performance of Java, making code-importing even more competitive. Thesis Supervisor: Barbara Liskov Title: NEC Professor of Software Science and Engineering
منابع مشابه
Enhancing NFS Cross-Administrative Domain Access
The access model of exporting NFS volumes to clients suffers from two problems. First, the server depends on the client to specify the user credentials to use and has no flexible mechanism to map or restrict the credentials given by the client. Second, when the server exports a volume, there is no mechanism to ensure that users accessing the server are only able to access their own files. We ad...
متن کاملFast Browsing of Large Scale Images Using Server Prefetching and Client Caching Techniques
To support fast browsing of large scale images in a client/server environment, we propose a prediction-based server prefetching and client caching algorithm. By prefetching the predicted data using available network resources, the system can eeectively reduce the size of data needed for the next access. While traditional browsing cache systems can not address both nonstationary and stationary b...
متن کاملSWORD, an Information Server for Juvenile Justice
Historically the juvenile justice system in southern Mississippi kept records on cards which had to be indexed, filed and then retrieved to move children through the system. University of Southern Mississippi's SWORD system is a client-server database which was developed to improve the quality and reliability of child information. SWORD currently serves six southern Mississippi counties with 16...
متن کاملAccessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads - INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies
AbstracrMirror sites enable client requests to be serviced by any of a number of servers, reducing load at individual servers and dispersing network load. Typically, a client requests service from a single mirror site. We consider enabling a client to access a file from multiple mirror sites in parallel to speed up the download. To eliminate complex client-server negotiations that a straightfor...
متن کاملSafe Region Techniques for Fast Spatial Alarm Evaluation
Spatial alarms are personalized location-based triggers installed by mobile users to serve as a reminder of a location of interest to be encountered in their future trips. Unlike continuous spatial queries, spatial alarms do not require immediate processing and periodic reevaluation upon installation. Thus, a critical challenge for efficient processing of spatial alarms is to determine when to ...
متن کامل