A Scheme for Transfer and Execution of Architecture Independent Procedures
#1

[attachment=15242]
Abstract
Conventional Remote Procedure Call (RPC) mechanisms allows processes to pass argu-
ments to a procedure residing in a remote machine, execute it there and obtain results. I have
designed and implemented a scheme which will allow a process to send the arguments for a
procedure to a remote machine for execution. But unlike conventional RPC, the procedure
need not reside on the machine on which it is to be executed. The remote machine fetches
the procedure as and when required from the network (possibly from the client itself). The
procedures (called modules) are stored and transfered in an intermediate format, which is
independent of any specific architecture or operating system. They are translated on the fly
to machine code for execution. MD5 sums over the code of the module is used to identify
modules. These can be used by the remote machine to authenticate a module fetched from
the network. Security issues are handled by using a MD5 sums and a protected address space
provided by the operating system on the remote machine. The scheme also allows a process
to fetch a module from the network to be executed locally in its own address space. Caching
of modules is used to improve performance.
This scheme tremendously increases the flexibility of network applications. If this scheme is
implemented widely, an application will no longer be constrained to use the standard protocols
to communicate to other machines which does not have the application running. Whenever
a standard protocol is not suitable, the application developer can design a new protocol and
create a server program (a module) which can be remotely executed on the server machine.
Module caching ensures that the overheads involved are automatically reduced if the protocol
becomes widely used.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: questionnaire grievance handling procedures, right execution daily red, ca state fire training procedures, seminar topics related to hacking procedures, procedures of online recruitment, quality control procedures garment industry, spring testing procedures,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,045 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Cloud Computing with Service Oriented Architecture in Business Applications 1 891 15-02-2017, 11:55 AM
Last Post: jaseela123d
  Developing a web application to transfer image and patient information project report maker 2 3,643 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Image Transfer Protocol for Internt project topics 3 2,257 26-03-2013, 07:42 PM
Last Post: vvk chary
  Secure Multipart File Transfer projectsofme 4 3,741 07-03-2013, 05:16 PM
Last Post: Guest
  application projects in java and vb.net (titles and topics) project topics 1 5,463 28-11-2012, 01:11 PM
Last Post: seminar details
  Improved Offline Signature Verification Scheme Using Feature Point Extra ction Method seminar class 1 3,072 24-10-2012, 01:27 PM
Last Post: seminar details
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,162 24-10-2012, 01:09 PM
Last Post: seminar details
  Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobi Projects9 1 1,721 10-10-2012, 12:22 PM
Last Post: seminar details
  A DYNAMIC EN-ROUTE FILTERING SCHEME FOR DATA REPORTING IN WIRELESS SENSOR NETWORKS project topics 7 3,692 22-06-2012, 12:34 PM
Last Post: seminar details

Forum Jump: