Efficient Late Binding of Dynamic Function Compositions

Total Page:16

File Type:pdf, Size:1020Kb

Efficient Late Binding of Dynamic Function Compositions Efficient Late Binding of Dynamic Function Compositions Lars Schütze Jeronimo Castrillon Chair for Compiler Construction Chair for Compiler Construction Technische Universität Dresden Technische Universität Dresden Dresden, Germany Dresden, Germany [email protected] [email protected] Abstract 1 Introduction Adaptive software becomes more and more important as Ubiquitous computing leads to new challenges where context- computing is increasingly context-dependent. Runtime adapt- dependent software is more and more important. Developing ability can be achieved by dynamically selecting and apply- such software requires approaches that focus on objects, their ing context-specific code. Role-oriented programming has context-dependent behavior and relations. Object-oriented been proposed as a paradigm to enable runtime adaptive soft- programming (OOP) is the de facto standard approach to ware by design. Roles change the objects’ behavior at run- those problems today. This is because of the comprehensi- time and thus allow adapting the software to a given context. bility of object-oriented models and code which enables an However, this increased variability and expressiveness has intuitive representation of aspects of the real world. That is a direct impact on performance and memory consumption. how classes, objects, functions and inheritance originated. We found a high overhead in the steady-state performance of For example, an aspect of the real world is that an object may executing compositions of adaptations. This paper presents appear in different roles at different times (i.e., contexts). To a new approach to use run-time information to construct a reflect the different roles of entities, design patterns have dispatch plan that can be executed efficiently by the JVM. been proposed to achieve separation of concerns [7, 15]. Be- The concept of late binding is extended to dynamic func- cause these approaches can only compose or decompose in a tion compositions. We evaluated the implementation with a single dimension by using delegation or inheritance, context- benchmark for role-oriented programming languages lever- dependent concerns are tangled with the application and aging context-dependent role semantics achieving a mean scattered over it. speedup of 2.79× over the regular implementation. With the advent of aspect-oriented programming (AOP) [33] and context-oriented programming (COP) [28] it was possi- CCS Concepts • Software and its engineering → Soft- ble to separate behavioral concerns in multiple dimensions. ware performance; Compilers; Context specific languages. However, the focus of these multi-dimensional separation of Keywords Role-Oriented Programming, Dispatch Optimiza- concerns (MDSOC) paradigms is on the cross-cutting nature tion, Virtual Machine of concerns and adaptation of classes. Role-oriented programming (ROP) has been proposed as ACM Reference Format: an extension to object-oriented programming to enable adap- Lars Schütze and Jeronimo Castrillon. 2019. Efficient Late Binding tive software by design [43, 47]. Classes represent the struc- of Dynamic Function Compositions. In Proceedings of the 12th ACM tural view of the program while context-dependent behavior SIGPLAN International Conference on Software Language Engineer- is encapsulated in separate entities called roles. To model ing (SLE ’19), October 20–22, 2019, Athens, Greece. ACM, New York, context-dependency compartments encapsulate roles and NY, USA, 11 pages. https://doi.org/10.1145/3357766.3359543 represent the context in which these roles can be active. Adaptation is achieved by attaching roles dynamically to Permission to make digital or hard copies of all or part of this work for objects to superimpose their behavior. Object Teams [23, 24] personal or classroom use is granted without fee provided that copies is one of the most mature role-oriented programming lan- are not made or distributed for profit or commercial advantage and that guages. It allows adapting Java programs available in source copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must code or binary form dynamically at runtime. be honored. Abstracting with credit is permitted. To copy otherwise, or It is common practice to lower MDSOC mechanisms to republish, to post on servers or to redistribute to lists, requires prior specific object-oriented mechanisms, which results in a verbose de- permission and/or a fee. Request permissions from [email protected]. scription that incurs high runtime overhead [3, 40]. The over- SLE ’19, October 20–22, 2019, Athens, Greece head is especially noticeable in the steady-state performance © 2019 Copyright held by the owner/author(s). Publication rights licensed of dynamic role-oriented programming languages as the be- to ACM. ACM ISBN 978-1-4503-6981-7/19/10...$15.00 havior of every object may be potentially adapted [46]. We https://doi.org/10.1145/3357766.3359543 argue that the major cause for the overhead is that current 141 SLE ’19, October 20–22, 2019, Athens, Greece Lars Schütze and Jeronimo Castrillon translation approaches have not been able to properly close have code for multiple concerns. This collaboration-scoped the semantic gap between role-oriented mechanisms and usage cannot be directly represented but is scattered over object-oriented machine models preventing many possible the program. While design patterns improve the quality of optimisationz. software architectures, they cannot solve the problem of To close the semantic gap and reduce verbosity the execu- tangling and scattering of concerns satisfactorily. To solve tion environment must understand the enhanced execution the problem, different approaches for separation of concerns semantics. We address this problem by applying the concept have been proposed with varying degree of granularity rang- of late binding of virtually dispatched functions to function ing from adapting single objects or functions to classes and compositions using exact runtime type information. Func- components. tions superimposed by role functions are by default virtual, but may become static until superimposition is released re- Aspect-Oriented Programming AOP decomposes cross- sulting in no subsequent lookups. The runtime provides cutting concerns to encapsulate each concern separately. As- exact instructions to the execution environment about how pects encapsulate such concerns and provide expressions to to find and execute role functions by composing a directed define interceptors, class extensions (inter-type declarations) acyclic graph (DAG) of function calls. This not only allows and its own properties [12]. An aspect can alter the behav- optimizing role dispatch in the sense of Just-in-Time (JIT) ior of non-aspect parts of the program called base classes compilation by the execution environment but also improves by applying advices which define the additional behavior. the runtime and generated code in terms of lookup and reuse. Alternative behavior can be applied at join points in the We demonstrate our approach by extending the static com- base program including function calls and property access. piler, dynamic compiler and the runtime of Object Teams [23, Pointcuts provide predicates that quantify over the set of 24]. We used a typical synthetic benchmark already reported existing join points and choose the set of join points where in the literature to compare different language implementa- the execution of the advice is desired. Aspects are woven tions of the role-oriented concept [46]. The benchmark uses into the application using special compilers called weavers. many demanding role-oriented programming features such Join points where advice invocation code may be woven in as multiple active contexts, deep roles (i.e., roles play roles), are called join point shadows [27]. and exchanged function bodies that are not easily built with A compiler for the aspect-oriented language consists of object-oriented design patterns. Our evaluation features a a module for evaluating pointcuts and the aforementioned mean speedup of 2.79× over the original implementation weaver, beside the elements of a traditional compiler. After when callsites can be reused and a mean slowdown of 9.76× evaluating a pointcut, the join point shadows are forwarded if there is no possible reuse ever. to the weaver. But at weave-time it cannot be decided for all The paper introduces in Section2 concepts similar to join point shadows whether pointcuts apply or not. Thus, roles that could also benefit from the approach and gives an for some join points advice invocation logic and guards are overview of how Object Teams implements roles. In Section3 compiled into the application called residuals. late binding for function compositions of role functions is Since virtual machine does not understand aspect seman- presented and how a directed acyclic graph (DAG) can be tics, the aspect compiler produces a verbose description of built from that composition. The approach is evaluated in aspects in an object-oriented paradigm which incurs high Section4. Related approaches are discussed in Section5. In overhead [19]. The reason is, that function invocations and Section6 a conclusion is drawn and future work is high- member accesses are typical locations for join point shad- lighted. ows that will be decorated with advice invocation logic (i.e., residues). Standard object-oriented optimizations such as late 2 Background
Recommended publications
  • Continuation Join Points
    Continuation Join Points Yusuke Endoh, Hidehiko Masuhara, Akinori Yonezawa (University of Tokyo) 1 Background: Aspects are reusable in AspectJ (1) Example: A generic logging aspect can log user inputs in a CUI program by defining a pointcut Login Generic Logging id = readLine(); Aspect Main CUI Aspect cmd = readLine(); pointcut input(): call(readLine()) logging return value 2 Background: Aspects are reusable in AspectJ (2) Example: A generic logging aspect can also log environment variable by also defining a pointcut Q. Now, if we want to log environment variable (getEnv) …? Generic Logging Aspect A. Merely concretize an aspect additionally Env Aspect CUI Aspect pointcut input(): pointcut input(): Aspect reusability call(getEnv()) call(readLine()) 3 Problem: Aspects are not as reusable as expected Example: A generic logging aspect can NOT log inputs in a GUI program by defining a pointcut Login Generic Logging void onSubmit(id) Aspect { … } Main void onSubmit(cmd) GUI Aspect { … } pointcut Input(): call(onSubmit(Str)) logging arguments 4 Why can’t we reuse the aspect? Timing of advice execution depends on both advice modifiers and pointcuts Logging Aspect (inner) Generic Logging abstract pointcut: input(); Aspect after() returning(String s) : input() { Log.add(s); } unable to change to before 5 Workaround in AspectJ is awkward: overview Required changes for more reusable aspect: generic aspect (e.g., logging) two abstract pointcuts, two advice decls. and an auxiliary method concrete aspects two concrete pointcuts even if they are not needed 6 Workaround in AspectJ is awkward: how to define generic aspect Simple Logging Aspect 1. define two pointcuts abstract pointcut: inputAfter(); for before and after abstract pointcut: inputBefore(); after() returning(String s) : inputAfter() { log(s); } 2.
    [Show full text]
  • Aspectmaps: a Scalable Visualization of Join Point Shadows
    AspectMaps: A Scalable Visualization of Join Point Shadows Johan Fabry ∗ Andy Kellens y Simon Denier PLEIAD Laboratory Software Languages Lab Stephane´ Ducasse Computer Science Department (DCC) Vrije Universiteit Brussel RMoD, INRIA Lille - Nord Europe University of Chile Belgium France http://pleiad.cl http://soft.vub.ac.be http://rmod.lille.inria.fr of join points. Second, the specification of the implicit invocations is made through a pointcut that selects at which join points the Abstract aspect executes. The behavior specification of the aspect is called the advice. An aspect may contain various pointcuts and advices, When using Aspect-Oriented Programming, it is sometimes diffi- where each advice is associated with one pointcut. cult to determine at which join point an aspect will execute. Simi- The concepts of pointcuts and advices open up new possibil- larly, when considering one join point, knowing which aspects will ities in terms of modularization, allowing for a clean separation execute there and in what order is non-trivial. This makes it difficult between base code and crosscutting concerns. However this sepa- to understand how the application will behave. A number of visu- ration makes it more difficult for a developer to assess system be- alization tools have been proposed that attempt to provide support havior. In particular, the implicit invocation mechanism introduces for such program understanding. However, they neither scale up to an additional layer of complexity in the construction of a system. large code bases nor scale down to understanding what happens at This can make it harder to understand how base system and aspects a single join point.
    [Show full text]
  • Structure of Programming Languages – Lecture 2A
    Structure of Programming Languages { Lecture 2a CSCI 6636 { 4536 February 4, 2020 CSCI 6636 { 4536 Lecture 2a. 1/19 February 4, 2020 1 / 19 Outline 1 Overview of Languages 2 Language Properties 3 Good or Bad: Fundamental Considerations 4 Homework CSCI 6636 { 4536 Lecture 2a. 2/19 February 4, 2020 2 / 19 Outline The Language Landscape Languages Come in Many Flavors. Possible Design Goals Design Examples Representation Issues CSCI 6636 { 4536 Lecture 2a. 3/19 February 4, 2020 3 / 19 Overview of Languages What is a Program? We can view a program two ways: Developer's view: A program is the implementation of a design (a model) for a piece of software. Coder's view: A program is a description of a set of actions that we want a computer to carry out on some data. Similarly, we can view a language more than one way: High level: It permits us to express a model. Low level: It permits us to define a correct set of instructions for the computer. CSCI 6636 { 4536 Lecture 2a. 4/19 February 4, 2020 4 / 19 Overview of Languages Aspects of a Language. To use a language effectively we must learn these four aspects: Syntax is the set legal forms that a sentence or program unit may take. During translation, if the syntax of a program unit is legal (correct), then we can talk about the semantics of the unit. Semantics is the science of meaning. Operational semantics is the set of actions when a program is executed. Style is a set of human factors.
    [Show full text]
  • Comprehensive Aspect Weaving for Java
    Science of Computer Programming 76 (2011) 1015–1036 Contents lists available at ScienceDirect Science of Computer Programming journal homepage: www.elsevier.com/locate/scico Comprehensive aspect weaving for Java Alex Villazón ∗, Walter Binder, Philippe Moret, Danilo Ansaloni Faculty of Informatics, University of Lugano, CH-6900 Lugano, Switzerland article info a b s t r a c t Article history: Aspect-oriented programming (AOP) has been successfully applied to application code Received 20 July 2009 thanks to techniques such as Java bytecode instrumentation. Unfortunately, with existing Received in revised form 19 October 2009 AOP frameworks for Java such as AspectJ, aspects cannot be woven into the standard Java Accepted 2 December 2009 class library. This restriction is particularly unfortunate for aspects that would benefit Available online 29 April 2010 from comprehensive aspect weaving with complete method coverage, such as profiling or debugging aspects. In this article we present MAJOR, a new tool for comprehensive aspect Keywords: weaving, which ensures that aspects are woven into all classes loaded in a Java Virtual Aspect-oriented programming Aspect weaving Machine, including those in the standard Java class library. MAJOR includes the pluggable Bytecode instrumentation module CARAJillo, which supports efficient access to a complete and customizable calling Profiling context representation. We validate our approach with three case studies. Firstly, we Debugging weave existing profiling aspects with MAJOR which otherwise would generate incomplete Detecting memory leaks profiles. Secondly, we introduce an aspect for memory leak detection that also benefits Recreating crashing conditions from comprehensive weaving. Thirdly, we present an aspect subsuming the functionality Java Virtual Machine of ReCrash, an existing tool based on low-level bytecode instrumentation techniques that generates unit tests to reproduce program failures.
    [Show full text]
  • Multiparadigm Programming with Python 3 Chapter 5
    Multiparadigm Programming with Python 3 Chapter 5 H. Conrad Cunningham 7 September 2018 Contents 5 Python 3 Types 2 5.1 Chapter Introduction . .2 5.2 Type System Concepts . .2 5.2.1 Types and subtypes . .2 5.2.2 Constants, variables, and expressions . .2 5.2.3 Static and dynamic . .3 5.2.4 Nominal and structural . .3 5.2.5 Polymorphic operations . .4 5.2.6 Polymorphic variables . .5 5.3 Python 3 Type System . .5 5.3.1 Objects . .6 5.3.2 Types . .7 5.4 Built-in Types . .7 5.4.1 Singleton types . .8 5.4.1.1 None .........................8 5.4.1.2 NotImplemented ..................8 5.4.2 Number types . .8 5.4.2.1 Integers (int)...................8 5.4.2.2 Real numbers (float)...............9 5.4.2.3 Complex numbers (complex)...........9 5.4.2.4 Booleans (bool)..................9 5.4.2.5 Truthy and falsy values . 10 5.4.3 Sequence types . 10 5.4.3.1 Immutable sequences . 10 5.4.3.2 Mutable sequences . 12 5.4.4 Mapping types . 13 5.4.5 Set Types . 14 5.4.5.1 set ......................... 14 5.4.5.2 frozenset ..................... 14 5.4.6 Other object types . 15 1 5.5 What Next? . 15 5.6 Exercises . 15 5.7 Acknowledgements . 15 5.8 References . 16 5.9 Terms and Concepts . 16 Copyright (C) 2018, H. Conrad Cunningham Professor of Computer and Information Science University of Mississippi 211 Weir Hall P.O. Box 1848 University, MS 38677 (662) 915-5358 Browser Advisory: The HTML version of this textbook requires a browser that supports the display of MathML.
    [Show full text]
  • A Comparison of Context-Oriented and Aspect-Oriented Programming
    A comparison of Context-Oriented and Aspect-Oriented Programming Matthias Springer Hasso Plattner Institute, Advanced Modularity, seminar paper Abstract. Aspect-oriented programming and context-oriented program- ming were designed to modularize cross-cutting concerns that would oth- erwise lead to scattered code. We illustrate conceptual differences be- tween aspect-oriented programming and context-oriented programming in order to point out which technique should be used for a given use case. Besides, we motivate that pointcuts and immediate layer activation no- tifications can be useful in context-oriented programming. 1 Software development for mobile devices In this paper, we will compare aspect-oriented programming and context-oriented programming, two techniques for modularizing cross-cutting concerns. We will show two typical use cases in the area of mobile devices, immediate feedback and power management, that we will implement using aspect-oriented programming and context-oriented programming. 1.1 Immediate feedback Haptic feedback and auditive feedback are well-known patterns in human-com- puter interaction [7]. The idea is to provide immediate feedback to user input, such that the user can be certain that the device received the input. In this example the mobile device should vibrate for a quarter of a second after the user touched the touch screen or pressed a keyboard button or another hardware button. Alternatively, the device should play an unobtrusive click sound. 1.2 Power management Figure 1 shows four power states for a mobile device. If the battery charge level is 50% or greater, then the device is in the high battery state. In that state, no power saving mechanisms are activated, i.e.
    [Show full text]
  • Object-Oriented Type Inference
    Object-Oriented Type Inference Jens Palsberg and Michael I. Schwartzbach [email protected] and [email protected] Computer Science Department, Aarhus University Ny Munkegade, DK-8000 Arh˚ us C, Denmark Abstract The algorithm guarantees that all messages are un- derstood, annotates the program with type infor- We present a new approach to inferring types in un- mation, allows polymorphic methods, and can be typed object-oriented programs with inheritance, used as the basis of an optimizing compiler. Types assignments, and late binding. It guarantees that are finite sets of classes and subtyping is set in- all messages are understood, annotates the pro- clusion. Given a concrete program, the algorithm gram with type information, allows polymorphic methods, and can be used as the basis of an op- constructs a finite graph of type constraints. The timizing compiler. Types are finite sets of classes program is typable if these constraints are solvable. and subtyping is set inclusion. Using a trace graph, The algorithm then computes the least solution in our algorithm constructs a set of conditional type worst-case exponential time. The graph contains constraints and computes the least solution by least all type information that can be derived from the fixed-point derivation. program without keeping track of nil values or flow analyzing the contents of instance variables. This 1 Introduction makes the algorithm capable of checking most com- mon programs; in particular, it allows for polymor- phic methods. The algorithm is similar to previous Untyped object-oriented languages with assign- work on type inference [18, 14, 27, 1, 2, 19, 12, 10, 9] ments and late binding allow rapid prototyping be- in using type constraints, but it differs in handling cause classes inherit implementation and not spec- late binding by conditional constraints and in re- ification.
    [Show full text]
  • Type Inference for Late Binding. the Smalleiffel Compiler. Suzanne Collin, Dominique Colnet, Olivier Zendra
    Type Inference for Late Binding. The SmallEiffel Compiler. Suzanne Collin, Dominique Colnet, Olivier Zendra To cite this version: Suzanne Collin, Dominique Colnet, Olivier Zendra. Type Inference for Late Binding. The SmallEiffel Compiler.. Joint Modular Languages Conference (JMLC), 1997, Lintz, Austria. pp.67–81. inria- 00563353 HAL Id: inria-00563353 https://hal.inria.fr/inria-00563353 Submitted on 4 Feb 2011 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Typ e Inference for Late Binding. The SmallEiel Compiler. Suzanne COLLIN, Dominique COLNET and Olivier ZENDRA Campus Scientique, Bâtiment LORIA, Boîte Postale 239, 54506 Vando euvre-lès-Nancy Cedex France Tel. +33 03 83.59.20.93 Email: [email protected] Centre de Recherche en Informatique de Nancy Abstract. The SmallEiel compiler uses a simple typ e inference mecha- nism to translate Eiel source co de to C co de. The most imp ortant asp ect in our technique is that many o ccurrences of late binding are replaced by static binding. Moreover, when dynamic dispatch cannot b e removed, inlining is still p ossible. The advantage of this approach is that it sp eeds up execution time and decreases considerably the amount of generated co de.
    [Show full text]
  • Introduction to Object-Oriented Programming (OOP)
    QUIZ Write the following for the class Bar: • Default constructor • Constructor • Copy-constructor • Overloaded assignment oper. • Is a destructor needed? Or Foo(x), depending on how we want the initialization to be made. Criticize! Ch. 15: Polymorphism & Virtual Functions Virtual functions enhance the concept of type. There is no analog to the virtual function in a traditional procedural language. As a procedural programmer, you have no referent with which to think about virtual functions, as you do with almost every text other feature in the language. Features in a procedural language can be understood on an algorithmic level, but, in an OOL, virtual functions can be understood only from a design viewpoint. Remember upcasting Draw the UML diagram! We would like the more specific version of play() to be called, since flute is a Wind object, not a generic Instrument. Ch. 1: Introduction to Objects Remember from ch.1 … Early binding vs. late binding “The C++ compiler inserts a special bit of code in lieu of the absolute call. This code calculates the text address of the function body, using information stored in the object at runtime!” Ch. 15: Polymorphism & Virtual Functions virtual functions To cause late binding to occur for a particular function, C++ requires that you use the virtual keyword when declaring the function in the base text class. All derived-class functions that match the signature of the base-class declaration will be called using the virtual mechanism. example It is legal to also use the virtual keyword in the derived-class declarations, but it is redundant and can be confusing.
    [Show full text]
  • An AOP Extension for C++
    Workshop Aspects AspectC++: Olaf Spinczyk Daniel Lohmann Matthias Urban an AOP Extension for C++ ore and more software developers are The aspect Tracing modularises the implementa- On the CD: getting in touch with aspect-oriented tion of output operations, which are used to trace programming (AOP). By providing the the control flow of the program. Whenever the exe- The evaluation version M means to modularise the implementation of cross- cution of a function starts, the following aspect prints of the AspectC++ Add- in for VisualStudio.NET cutting concerns, it stands for more reusability, its name: and the open source less coupling between modules, and better separa- AspectC++ Develop- tion of concerns in general. Today, solid tool sup- #include <cstdio> ment Tools (ACDT) port for AOP is available, for instance, by JBoss for Eclipse, as well as // Control flow tracing example example listings are (JBoss AOP), BEA (AspectWerkz), and IBM (As- aspect Tracing { available on the ac- pectJ) and the AJDT for Eclipse. However, all // print the function name before execution starts companying CD. these products are based on the Java language. advice execution ("% ...::%(...)") : before () { For C and C++ developers, none of the key players std::printf ("in %s\n", JoinPoint::signature ()); offer AOP support – yet. } This article introduces AspectC++, which is an as- }; pect-oriented language extension for C++. A compil- er for AspectC++, which transforms the source code Even without fully understanding all the syntactical into ordinary C++ code, has been developed as elements shown here, some big advantages of AOP an open source project. The AspectC++ project be- should already be clear from the example.
    [Show full text]
  • Run Time Polymorphism Against Virtual Function in Object Oriented Programming
    Devaendra Gahlot et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (1) , 2011, 569-571 Run Time Polymorphism Against Virtual Function in Object Oriented Programming #1 2 #3 Devendra Gahlot , S. S. Sarangdevot# , Sanjay Tejasvee #Department of Computer Application, Govt. Engineering College Bikaner, Bikaner, Rajasthan, India. #Depertment of IT & CS, Janardan Rai Nagar Rajasthan Vidyapeeth University, Pratap Nagar, Udaipur, Rajasthan, India) # Department of Computer Application,Govt. Engineering College Bikaner,Bikaner ,Rajasthan,India. Abstract- The Polymorphism is the main feature of Object same name and the same parameter sets in all the super classes, Oriented Programming. Run Time Polymorphism is concept of subclasses and interfaces. In principle, the object types may be late binding; means the thread of the program will be unrelated, but since they share a common interface, they are often dynamically executed, according to determination of the implemented as subclasses of the same super class. Though it is not compiler. In this paper, we will discuss the role of Run Time required, it is understood that the different methods will also produce Polymorphism and how it can be effectively used to increase the similar results (for example, returning values of the same type). efficiency of the application and overcome complexity of overridden function and pointer object during inheritance in Polymorphism is not the same as method overloading or method Object Oriented programming. overriding.[1] Polymorphism is only concerned with the application of specific implementations to an interface or a more generic base 1. INTRODUCTION TO POLYMORPHISM IN OBJECT- class. Method overloading refers to methods that have the same name ORIENTED PROGRAMMING but different signatures inside the same class.
    [Show full text]
  • TAPS Working Group T. Pauly, Ed. Internet-Draft Apple Inc. Intended Status: Standards Track B
    TAPS Working Group T. Pauly, Ed. Internet-Draft Apple Inc. Intended status: Standards Track B. Trammell, Ed. Expires: 13 January 2022 Google Switzerland GmbH A. Brunstrom Karlstad University G. Fairhurst University of Aberdeen C. Perkins University of Glasgow P. Tiesel SAP SE C.A. Wood Cloudflare 12 July 2021 An Architecture for Transport Services draft-ietf-taps-arch-11 Abstract This document describes an architecture for exposing transport protocol features to applications for network communication, the Transport Services architecture. The Transport Services Application Programming Interface (API) is based on an asynchronous, event-driven interaction pattern. It uses messages for representing data transfer to applications, and it describes how implementations can use multiple IP addresses, multiple protocols, and multiple paths, and provide multiple application streams. This document further defines common terminology and concepts to be used in definitions of Transport Services APIs and implementations. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." Pauly, et al. Expires 13 January 2022 [Page 1] Internet-Draft TAPS Architecture July 2021 This Internet-Draft will expire on 13 January 2022.
    [Show full text]