Separating Presentation from Interface in RPC and IDLs
نویسندگان
چکیده
In RPC-based communication, we term the interface the set of remote procedures and the types of their arguments; the presentation is the way these procedures and types are mapped to the target language environment in a particular client or server, including semantic requirements. For example, presentation includes the local names assigned to RPC stubs, the physical representation of a logical block of data (e.g., in-line, out-of-line, linked blocks), and trust requirements (e.g., integrity, security). In existing systems, the presentation of a given RPC construct is largely fixed. Separating presentation from interface, both in the interface definition language (IDL) itself and in the RPC implementation, is the key to interoperability, with many benefits in the area of elegance, as well. This separation and resulting cleanliness makes it manageable to generate specialized kernel code paths for each type of clientserver pair. This is a key element of end-to-end optimization. The separation should also allow the integration of disparate RPC optimization techniques, such as those applied in LRPC[2] and fbufs[6], into a single system, in a uniform and fully interoperable way. In initial work we demonstrate a variant of threaded code generation and two presentation-based optimizations, transparently activated by the RPC system. Each of these optimizations speeds up local RPC by approximately 25%.1
منابع مشابه
Alexandros Karakasidis Assignment 4
RPC based mechanisms assumed a heterogeneous environment consisting of machines with different operating systems. Proxies are used in order to deal with heterogeneity: their client side is called stub, and the server side is called skeleton. Marshalling and unmarshaling was necessary in order to adapt the different message representations to a neutral data representation. These proxies were imp...
متن کاملPEPt - A Minimal RPC Architecture
We present a high-level RPC architecture. Although RPC systems seem quite varied they actually share the same fundamental building blocks. We examine the operation of several technologies (e.g., SOAP/HTTP, RMIIIOP) to show what they have in common, namely four main blocks that we call PEPt: Presentation, Encoding, Protocol and transport. Presentation encompasses the data types and APIs availabl...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملReflection and Transmission of Longitudinal Wave at Micropolar Viscoelastic Solid/Fluid Saturated Incompressible Porous Solid Interface
In this paper, the reflection and refraction of longitudinal wave from a plane surface separating a micropolar viscoelastic solid half space and a fluid saturated incompressible half space is studied. A longitudinal wave (P-wave) impinges obliquely at the interface. Amplitude ratios for various reflected and transmitted waves have been obtained. Then these amplitude ratios have been computed nu...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کامل