The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Simple Activation for Distributed Objects

Author

Ann Wollrath, Geoff Wyant, Jim Waldo

Entry type

inproceedings

Abstract

In order to support long-lived distributed objects, object activation is required. Activation allows an object to alternate between periods of activity, where the object implementation executes in a process; and periods of dormancy, where the object is on disk and utilizes no system resources. We describe an activation protocol for distributed object systems. The protocol features overall simplicity as well as applicability to several different activation models. We use the Modula-3 network object system as a base for our implementation; while we maike no changes to the marshalling of network object subsystem, we suggest a minor modifacation that could be made to the marshalling of network objects to assist in lazy activation, our preferred activation model.

Date

1995

Address

Mountain View, CA, USA

Key alpha

Wollrath

Organization

USENIX

Publisher

Sun Microsystems Laboratories

Affiliation

Sun Microsystems Laboratories

Publication Date

1995-00-00

Contents

1 Introduction 2 Activation Model 3 The Basic Activation Protocol 4 Implementation and Results 5 Related Work 6 Discussion 7 Availability 8 References

Copyright

1995

Language

English

Location

A hard-copy of this is in the Papers Cabinet

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.