More Efficient Serialization and RMI for Java

Total Page:16

File Type:pdf, Size:1020Kb

More Efficient Serialization and RMI for Java To appear in: Concurrency: Practice & Experience, Vol. 11, 1999. More Ecient Serialization and RMI for Java Michael Philippsen, Bernhard Haumacher, and Christian Nester Computer Science Department, University of Karlsruhe Am Fasanengarten 5, 76128 Karlsruhe, Germany [phlippjhaumajnester]@ira.u ka.de http://wwwipd.ira.uka.de/JavaPa rty/ Abstract. In current Java implementations, Remote Metho d Invo ca- tion RMI is to o slow, esp ecially for high p erformance computing. RMI is designed for wide-area and high-latency networks, it is based on a slow ob ject serialization, and it do es not supp ort high-p erformance commu- nication networks. The pap er demonstrates that a much faster drop-in RMI and an ecient drop-in serialization can b e designed and implemented completely in Java without any native co de. Moreover, the re-designed RMI supp orts non- TCP/IP communication networks, even with heterogeneous transp ort proto cols. We demonstrate that for high p erformance computing some of the ocial serialization's generality can and should b e traded for sp eed. Asaby-pro duct, a b enchmark collection for RMI is presented. On PCs connected through Ethernet, the b etter serialization and the improved RMI save a median of 45 maximum of 71 of the runtime for some set of arguments. On our Myrinet-based ParaStation network a cluster of DEC Alphas wesave a median of 85 maximum of 96, compared to standard RMI, standard serialization, and Fast Ethernet; a remote metho d invo cation runs as fast as 80 s round trip time, compared to ab out 1.5 ms. 1 Intro duction From the activities of the Java Grande Forum [8, 20] and from early compar- ative studies [7] it is obvious that there is growing interest in using Java for high-p erformance applications. Among other needs, these applications frequently demand a parallel computing infrastructure. Although Java o ers appropriate mechanisms to implementInternet scale client/server applications, Java's remote metho d invo cation RMI, [23] is to o slow for environments with low latency and high bandwidth networks, e.g., clusters of workstations, IBM SP/2, and SGI Ori- gin. 1.1 Breakdown of RMI cost Wehave studied the cost of a remote metho d invo cation on two platforms: { two PCs: 350 MHz Pentium I I, running Windows NT 4.0 Workstation, iso- lated from the LAN to avoid packet collisions but connected to each other by Ethernet, JDK 1.2 JIT enabled. { a cluster of 8 Digital Alphas: 500 MHz, running Digital UNIX, connected by Fast Ethernet, JDK 1.1.6 regular JIT; the JDK 1.2b eta was to o buggy. For three di erenttyp es of ob jects we measured the time of a remote invo cation of pingobj returning the same obj. A part of this time is sp ent when commu- nicating over existing so cket connections. Wehave timed this separately round trip, but including serialization. Finally,we measured the time needed for the JDK-serialization of the argument alone, i.e. without any communication. Table 1. Ping times s of RMI =100, so cket communication including serial- ization, and just JDK-serialization alone. The argument obj has either 32 int values, 4 int values plus 2 null p ointers, or it is a balanced binary tree of 15 ob jects eachof which holds 4 ints. s p er ob ject 32 int 4int 2null tree15 RMI pingobj 2287 1456 3108 PC socketobj 1900 83 1053 72 2528 81 serializeobj 840 37 368 25 1252 40 RMI pingobj 7633 4312 14713 DEC socketobj 6728 88 2927 68 12494 85 serializeobj 4332 57 1724 40 9582 65 Table 1 gives the results; other typ es of ob jects b ehave similarly.For large ob jects with array data the RMI overhead is ab out constant, so that serialization and low-level communication dominate the overall cost. As a rule of thumb however, Java's ob ject serialization takes at least 25 of the cost of a remote metho d invo cation. The cost of serialization grows with growing ob ject structures and up to 65 in our measurements. The p ercentage is bigger for slower JDK implementations. The RMI overhead is in the range of 0.4 to 2.2 milliseconds. Benchmarks conducted by the Manta team [22] show similar results. 1.2 Organization of this Pap er We presentwork on all three areas serialization, RMI, and network to achieve b est p erformance improvements. After a discussion of related work in section 2, section 3 discusses the central optimization ideas and the design issues of a b etter serialization. Section 4 presents the key ideas and the design of a much leaner RMI. Both our serialization and our RMI can b e used individually or in combination as drop-in replacements for standard JDK equivalents. They are written entirely in Java and are p ortable. Section 5 brie y presents the Myrinet- based ParaStation network that we use instead of Ethernet to demonstrate that our RMI can easily b e used over non-TCP/IP networking hardware. Section 6 discusses the b enchmark collection and quantitative results. 2 Related Work The idea of a remote pro cedure call, RPC, has b een around at least since 1976 [26]. After the rst pap er designs, numerous systems have b een built; Corba and DCOM are this evolutionary pro cess's latest outgrowths. The earliest systems fo cusing on latency and bandwidth of RPCs, include the Cedar RPC [1] by Birrell and Nelson and the Fire y RPC [17] bySchro eder and Burrows. Thekkath and Levy [19] study the design space of RPC mechanisms on several high-sp eed networks and identify the p erformance in uence of all hardware and software comp onents needed to implement an RPC, including network controller and cache system. It is known from this and other work that for a low-latency and high- bandwidth RPC at least the following optimizations need to b e applied: { Stubs marshal user data into network packets; skeletons unmarshal the data. Marshaling routines need to b e fast and need to avoid copying. Explicit and precompiled marshaling routines are needed. Thekkath even includes them into the kernel. The Fire y RPC reuses network packets and allows direct access to the packet data to avoid additional copying. { A pool of pro cesses or threads to handle incoming calls must be created ahead of time, so that their creation time is not added to the duration of the RPC. Analogously, a pre-allo cated network packet should b e assigned to any caller in advance. { Up on an incoming call, the pro cess or thread dispatcher should be able to switch immediately to the single pro cess or thread that waits for that message. { For small/short RPCs it might be advantageous if the caller spins instead of p erforming a blo cking wait for the return message. Similarly, it mightbe b etter on the side of the callee to have the network thread execute user co de. Both will save context switches and hence cache ushes. { Datagram based solutions are faster than connection oriented proto cols. All the features provided by the communication hardware should b e exploited to reduce software overhead. For example, computation of packet checksums is b etter done in hardware. If the network do es not drop any packets, there is no need to implement acknowledgement in software. Thus, any p ortable RPC design must allow to use platform sp eci c and optimized transp ort layer implementations. RMI extends the ideas of RPC to Java [23]. In contrast to earlier RPC sys- tems, RMI is designed for a single language environment, where b oth caller and callee are implemented in Java. The two most essential di erences are that RMI enables the programmer to use a global ob ject mo del with a distributed garbage collector. Second, p olymorphism works on remote calls, i.e., every argument can b e of its declared typeorofany subtyp e thereof. Polymorphism is not p ossible in conventional RPC systems including Corba, DCOM, and RMI-over-I IOP b ecause it requires dynamic loading and binding of stub co de. Unfortunately, Sun's design and implementation of RMI do es not address high p erformance. Whereas fast RPC implementations have learned to exploit hardware features, Sun's RMI seems to prevent exactly this. First, since Java disallows direct access to memory it is hard to avoid copying; pre-allo cated net- work packets cannot b e used. Second, since RMI is tied to connection-oriented TCP/IP-so ckets, the so cket API prevents streamlining the fast path needed for a fast RMI: for example, there is no way to teach the scheduler how to switch di- rectly to a waiting thread and there is no way to get rid of the status information needed for so cket connections but unnecessary for remote metho d invo cations. Sp ecial features of non-Ethernet high-p erformance communication hardware cannot b e exploited. It is a signi cant engineering problem to keep RMI's de nition and API, but to redesign it internally so it b ecomes p ossible to capitalize on existing knowledge on ecient RPC implementations. Moreover, the distinctions b etween RMI and RPC p ose at least two new problems. Whereas arguments and results of RPCs were of primitive data typ es and structures thereof , RMI can ship Java ob ject graphs. Sun's implementation of marshaling uses Java's ob ject serialization and is hence done in a very general way by means of typ e introsp ection.
Recommended publications
  • Remote Procedure Calls
    Lectures on distributed systems Remote Procedure Calls Paul Krzyzanowski Introduction, or what’s wrong with sockets? OCKETS are a fundamental part of client-server networking. They provide a S relatively easy mechanism for a program to establish a connection to another program, either on a remote or local machine and send messages back and forth (we can even use read and write system calls). This interface, however, forces us to design our distributed applications using a read/write (input/output) inter- face which is not how we generally design non-distributed applications. In design- ing centralized applications, the procedure call is usually the standard interface model. If we want to make distributed computing look like centralized comput- ing, input-output-based communications is not the way to accomplish this. In 1984, Birrell and Nelson devised a mechanism to allow programs to call procedures on other machines. A process on machine A can call a procedure on machine B. The process on A is suspended and execution continues on B. When B returns, the return value is passed to A and A continues execution. This mechanism is called the Remote Procedure Call (RPC). To the programmer, the goal is that it should appear as if a normal procedure call is taking place. Obvi- ously, a remote procedure call is different from a local one in the underlying implementation. Steps in a remote procedure call Clearly, there is no architectural support for making remote procedure calls. A local procedure call generally involves placing the calling parameters on the stack and executing some form of a call instruction to the address of the proce- dure.
    [Show full text]
  • Developer's Guide Sergey A
    Complex Event Processing with Triceps CEP v1.0 Developer's Guide Sergey A. Babkin Complex Event Processing with Triceps CEP v1.0 : Developer's Guide Sergey A. Babkin Copyright © 2011, 2012 Sergey A. Babkin All rights reserved. This manual is a part of the Triceps project. It is covered by the same Triceps version of the LGPL v3 license as Triceps itself. The author can be contacted by e-mail at <[email protected]> or <[email protected]>. Many of the designations used by the manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this manual, and the author was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this manual, the author assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Table of Contents 1. The field of CEP .................................................................................................................................. 1 1.1. What is the CEP? ....................................................................................................................... 1 1.2. The uses of CEP ........................................................................................................................ 2 1.3. Surveying the CEP langscape ....................................................................................................... 2 1.4. We're not in 1950s any more,
    [Show full text]
  • Distributed Objects in C
    Rochester Institute of Technology RIT Scholar Works Theses 2006 Distributed Objects in C# Xiaoyun Xie Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Xie, Xiaoyun, "Distributed Objects in C#" (2006). Thesis. Rochester Institute of Technology. Accessed from This Master's Project is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology Department of Computer Science Master of Science Project Distributed Objects System in C# Submitted By: Xie, Xiaoyun (Sherry) Date: February 2004 Chairman: Dr. Axel T. Schreiner Reader: Dr. Hans-Peter Bischof Observer: Dr. James Heliotis 2 ABSTRACT Today more and more programs run over a collection of autonomous computers linked by a network and are designed to produce an integrated computing facility. Java Distributed Objects (JDO) proposed by Dr. Axel T. Schreiner [1] builds an infrastructure which allows distributed program components to communicate over a network in a transparent, reliable, efficient, and generic way. JDO was originally intended as a teaching device to assess design parameters for distributed objects. This project focuses on porting JDO, which is implemented in Java on Sun’s JDK, to C# on Microsoft’s .NET. On one hand, it builds an infrastructure in C# that simplifies the construction of distributed programs by hiding the distributed nature of remote objects. On the other hand, it generates insights into the differences between two platforms, namely, Java on Sun and C# on .NET, in the distributed objects area.
    [Show full text]
  • Remote Procedure Call (RPC)
    Remote Procedure Call (RPC) RPC – RMI - Web Services 1 Complexity of the distributed applications . The programming of distributed applications is difficult. In addition to the usual tasks, programmers who build clients and servers must deal with the complex issues of communication. Although many of the needed functions are supplied by a standard API such as the socket interface, the socket calls require the programmer to specify many low level details as names ,addresses,protocols and ports. Moreover, asinchronous communications models are complex to implement. Distributed implementations tend to use the same standard API (e.g.,the socket interface). As a consequence most of the detailed code found in one program is replicated in others RPC – RMI - Web Services 2 . For example, all client programs that use a connection oriented transport must create a socket, specify the server’s endpoint address, open a connection to the server, send requests,receive responses and close the connection when interaction is complete. Tools (software that generates all or part of a computer program) have been created to construct clients and servers. Tools cannot eliminate all programming: a programmer must supply the code that perform the computation for the particular service. However, a tool can handle the communication details. As a result the code contains fever bugs. RPC – RMI - Web Services 3 . RPC = Remote Procedure Call . The basic model has been proposed by Birrell e Nelson in 1984. The essence of this technique is to allow programs on different machines to interact using simple procedure call/return semantics, just as if the two programs were in the same computer .
    [Show full text]
  • Inter Process Communication with Message Passing
    Operating systems (vimia219) Collaboration of Tasks Tamás Kovácsházy, PhD 13rd Topic Inter Process Communication with Message Passing Budapest University of Technology and Economics Department of Measurement and Information Systems Looking back, communication solutions . Using shared memory(RAM or PRAM model): o Among threads running in the context of a process (shared memory of the process) . Messages: o No shared memory • Among processes running inside an operating system • Distributed system (network communication) o Microkernel based operating system . Inter Process Communication, IPC © BME-MIT 2014, All Rights Reserved 2. lap Messages . Different from the same word used in computer networks o We consider a more generic notion of message . Message passing . For example: o System call o TCP/IP connection (TCP) or message (UDP) for internal (localhost) or external communication (among machines) . Most cases they are implemented as OS API function/method calls resulting a system call . The operating system implements them by its services © BME-MIT 2014, All Rights Reserved 3. lap Some notes . Semaphore, Critical section object, and Mutex are also implemented by the OS and handled by system calls o Threads running in the context of a process communicate using shared memory (fast, low resource utilization) o Mutual exclusion and synchronization are solved by messages (using system calls). o It has some overhead: • Experiments: Lockless programming, transactional memory etc. • There is no good solution, but we can pick a better one than
    [Show full text]
  • Course Outlines
    COURSE NAME PYTHON PROGRAMMING OVERVIEW OBJECTIVES Python is a general-purpose, versatile, and popular How Python works and its place in the world of programming language. It is a great first language programming languages; to work with and because it is concise and easy to read, and it is also manipulate strings; to perform math operations; to a good language to have in any programmer’s stack work with Python sequences; to collect user input as it can be used for everything from web and output results; flow control processing; to write development to software development and scientific to, and read from, files; to write functions; to handle applications. exception; and work with dates and times. WHO SHOULD ATTEND PRE-REQUISITES Students new to the language. Some experience with other programming languages DELIVERY METHOD DURATION Instructor-led virtual course 5 days (40 hours) COURSE OUTLINE PYTHON INSTALLATION LOOPS Python Distributions (ActivePython, Anaconda, For(each) loop MiniConda) Absence of traditional for (i=0, i<n, i++) loop Additional Modules (Pip, conda, easy_install) Basic Examples with foreach loop PYTHON INTRODUCTION & BASICS Emulating Traditional for loops using range(n) The Python interpreter While Loops Working with command-line/IDE FUNCTIONS Python Data Types Def Keyword Built in operators, functions and methods Functions without args Data and type introspection basics: type (), dir() Functions with fixed num of args Syntax (Blocks and indentation) Functions with variable number of args and default Concepts (Scope,
    [Show full text]
  • Reflecting on an Existing Programming Language
    Vol. 6, No. 9, Special Issue: TOOLS EUROPE 2007, October 2007 Reflecting on an Existing Programming Language Andreas Leitner, Dept. of Computer Science, ETH Zurich, Switzerland Patrick Eugster, Dept. of Computer Science, Purdue University, USA Manuel Oriol, Dept. of Computer Science, ETH Zurich, Switzerland Ilinca Ciupa, Dept. of Computer Science, ETH Zurich, Switzerland Reflection has proven to be a valuable asset for programming languages, es- pecially object-oriented ones, by promoting adaptability and extensibility of pro- grams. With more and more applications exceeding the boundary of a single address space, reflection comes in very handy for instance for performing con- formance tests dynamically. The precise incentives and thus mechanisms for reflection vary strongly between its incarnations, depending on the semantics of the considered programming lan- guage, the architecture of its runtime environment, safety and security concerns, etc. Another strongly influential factor is legacy, i.e., the point in time at which the corresponding reflection mechanisms are added to the language. This parameter tends to dictate the feasible breadth of the features offered by an implementation of reflection. This paper describes a pragmatic approach to reflection, consisting in adding introspection to an existing object-oriented programming language a posteriori, i.e., without extending the programming language, compiler, or runtime environ- ment in any specific manner. The approach consists in a pre-compiler generating specific code for types which are to be made introspectable, and an API through which this code is accessed. We present two variants of our approach, namely a homogeneous approach (for type systems with a universal root type) and a heterogeneous approach (without universal root type), and the corresponding generators.
    [Show full text]
  • An Organized Repository of Ethereum Smart Contracts' Source Codes and Metrics
    Article An Organized Repository of Ethereum Smart Contracts’ Source Codes and Metrics Giuseppe Antonio Pierro 1,* , Roberto Tonelli 2,* and Michele Marchesi 2 1 Inria Lille-Nord Europe Centre, 59650 Villeneuve d’Ascq, France 2 Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy; [email protected] * Correspondence: [email protected] (G.A.P.); [email protected] (R.T.) Received: 31 October 2020; Accepted: 11 November 2020; Published: 15 November 2020 Abstract: Many empirical software engineering studies show that there is a need for repositories where source codes are acquired, filtered and classified. During the last few years, Ethereum block explorer services have emerged as a popular project to explore and search for Ethereum blockchain data such as transactions, addresses, tokens, smart contracts’ source codes, prices and other activities taking place on the Ethereum blockchain. Despite the availability of this kind of service, retrieving specific information useful to empirical software engineering studies, such as the study of smart contracts’ software metrics, might require many subtasks, such as searching for specific transactions in a block, parsing files in HTML format, and filtering the smart contracts to remove duplicated code or unused smart contracts. In this paper, we afford this problem by creating Smart Corpus, a corpus of smart contracts in an organized, reasoned and up-to-date repository where Solidity source code and other metadata about Ethereum smart contracts can easily and systematically be retrieved. We present Smart Corpus’s design and its initial implementation, and we show how the data set of smart contracts’ source codes in a variety of programming languages can be queried and processed to get useful information on smart contracts and their software metrics.
    [Show full text]
  • CSE 486/586 Distributed Systems Remote Procedure Call Recall?
    Recall? App CSE 486/586 Distributed Systems Remote Procedure Call Socket API TCP UDP OS Steve Ko IP Computer Sciences and Engineering University at Buffalo Device Drivers Network Interface CSE 486/586 CSE 486/586 2 Socket API What’s Wrong with Socket API? Server • Low-level read/write socket() • Communication oriented • Same sequence of calls, repeated many times bind() • Etc, etc… Client listen() • Not programmer friendly socket() establish accept() connection connect() block send request write() read() process request send response write() read() CSE 486/586 3 CSE 486/586 4 Another Abstraction RPC • RPC (Remote Procedure Call) • Client • Server – Goal: it should appear that the programmer is calling a local function int main (…) … – Mechanism to enable function calls between different { processes – First proposed in the 80’s … void rpc_call(…) { • Examples rpc_call(…); … – Sun RPC … } – Java RMI – CORBA } • Other examples that borrow the idea … – XML-RPC – Android Bound Services with AIDL – Google Protocol Buffers CSE 486/586 5 CSE 486/586 6 C 1 Local Procedure Call Remote Procedure Call • E.g., x = local_call(“str”); • Give an illusion of doing a local call • The compiler generates coDe to transfer necessary • Closer to the programmers things to local_call – Language-level construct, not OS-level support – Push the parameters to the stack • What are some of the challenges? – Call local_call – How do you know that there are remote calls available? • The compiler also generates coDe to execute the – How do you pass the parameters? local call. – How do you find the correct server process? – Assigns registers – How do you get the return value? – AdJust stack pointers – Saves the return value – Calls the return instruction CSE 486/586 7 CSE 486/586 8 Stub, Marshalling, & Unmarshalling RPC Process • Stub functions: local interface to make it appear that the call is local.
    [Show full text]
  • Remote Procedure Call Protocol
    Remote Procedure Call Protocol Batholomew wish his killdees detains inaccessibly or swaggeringly after Morris rival and screw sartorially, scotopic and lipped. Juanita synthesizes her illuminist ruddily, detoxicant and odious. Toneless Rusty recommence irruptively. Access control to a procedure call machine boundaries has been performed by the major version number represented by procedure call protocol The client can custom this proxy or façade as though we actually implemented these interfaces, although one actually delegates the invocation to the implementation. In dust, an RPC server uses a standard HTTP server on several specific endpoint. The server side is simpler than the client. They provide remote objects to an email below illustrates one final piece to remote procedure call protocol does in a call is allowed to you can infer that can use. You should charge a copy of this. There now be an led even though the offspring was accepted. Determine those data types of fit procedure calling arguments and the result argument. TODO: we pull review the class names and whatnot in color here. IP address of the server that has responded. Because of transport independence, the RPC protocol does he attach specific semantics to three remote procedures or their execution requirements. IP where our office site is hosted. That gross, can a malicious host yeah a message an retransmit it at a hideous time? Rpc calls do a server, or rejected due to do this does a remote procedure parameters as a given server in this strategy for email below illustrates an office with call protocol stacks as this.
    [Show full text]
  • Flexible Composition for C++11
    Maximilien de Bayser Flexible Composition for C++11 Disserta¸c~aode Mestrado Dissertation presented to the Programa de P´os-Gradua¸c~ao em Inform´atica of the Departamento de Inform´atica, PUC-Rio as partial fulfillment of the requirements for the degree of Mestre em Inform´atica. Advisor: Prof. Renato Fontoura de Gusm~ao Cerqueira Rio de Janeiro April 2013 Maximilien de Bayser Flexible Composition for C++11 Dissertation presented to the Programa de P´os-Gradua¸c~ao em Inform´atica of the Departamento de Inform´atica, PUC-Rio as partial fulfillment of the requirements for the degree of Mestre em Inform´atica. Approved by the following commission: Prof. Renato Fontoura de Gusm~aoCerqueira Advisor Pontif´ıcia Universidade Cat´olica do Rio de Janeiro Prof. Alessandro Garcia Department of Informatics { PUC-Rio Prof. Waldemar Celes Department of Informatics { PUC-Rio Prof. Jos´eEugenio Leal Coordinator of the Centro T´ecnico Cient´ıfico Pontif´ıcia Universidade Cat´olica do Rio de Janeiro Rio de Janeiro | April 4th, 2013 All rights reserved. It is forbidden partial or complete reproduction without previous authorization of the university, the author and the advisor. Maximilien de Bayser Maximilien de Bayser graduated from PUC-Rio in Computer Engineering. He is also working at the Research Center for Inspection Technology where he works on software for non- destructive testing of oil pipelines and flexible risers for PE- TROBRAS. Bibliographic data de Bayser, Maximilien Flexible Composition for C++11 / Maximilien de Bayser; advisor: Renato Fontoura de Gusm~ao Cerqueira . | 2013. 107 f. : il. ; 30 cm 1. Disserta¸c~ao(Mestrado em Inform´atica) - Pontif´ıcia Universidade Cat´olica do Rio de Janeiro, Rio de Janeiro, 2013.
    [Show full text]
  • A Fully In-Browser Client and Server Web Application Debug and Test Environment
    LIBERATED: A fully in-browser client and server web application debug and test environment Derrell Lipman University of Massachusetts Lowell Abstract ging and testing the entire application, both frontend and backend, within the browser environment. Once the ap- Traditional web-based client-server application devel- plication is tested, the backend portion of the code can opment has been accomplished in two separate pieces: be moved to the production server where it operates with the frontend portion which runs on the client machine has little, if any, additional debugging. been written in HTML and JavaScript; and the backend portion which runs on the server machine has been writ- 1.1 Typical web application development ten in PHP, ASP.net, or some other “server-side” lan- guage which typically interfaces to a database. The skill There are many skill sets required to implement a sets required for these two pieces are different. modern web application. On the client side, initially, the In this paper, I demonstrate a new methodology user interface must be defined. A visual designer, in con- for web-based client-server application development, in junction with a human-factors engineer, may determine which a simulated server is built into the browser envi- what features should appear in the interface, and how to ronment to run the backend code. This allows the fron- best organize them for ease of use and an attractive de- tend to issue requests to the backend, and the developer sign. to step, using a debugger, directly from frontend code into The language used to write the user interface code is backend code, and to debug and test both the frontend most typically JavaScript [6].
    [Show full text]