Skip to main content
Log in

Multiple Bypass: Interposition Agents for Distributed Computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Interposition agents are a well-known device for attaching legacy applications to distributed systems. However, agents are difficult to build and are often large, monolithic pieces of software which are suited only to limited applications or systems. We solve this problem with Bypass, a language and a tool for quickly building multiple small agents that can be combined together to create powerful yet manageable software.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. Alexandrov, M. Ibel, K. Schauser and C. Scheiman, UFO: A personal global file system based on user-level extensions to the operating system, ACM Transactions on Computer Systems (August 1998) 207–233.

  2. D. Thain and M. Livny, Bypass: A tool for building split execution systems, in: Ninth IEEE Symposium on High Performance Distributed Computing (August 2000) pp. 79–85.

  3. R. Balzer and N. Goldman, Mediating connectors, in: 19th IEEE International Conference on Distributed Computing Systems (June 1999).

  4. J. Bester, I. Foster, C. Kesselman, J. Tedesco and S. Tuecke, GASS: A data movement and access service for wide area computing systems, in: 6th Workshop on I/O in Parallel and Distributed Systems (May 1999).

  5. A.D. Birrell and B.J. Nelson, Implementing remote procedure calls, ACM Transactions on Computer Systems 2(1) (February 1984) 39–59.

    Google Scholar 

  6. I. Foster and C. Kesselman, Globus: A metacomputing intrastructure toolkit, International Journal of Supercomputer Applications 11(2) (1997) 115–128.

    Google Scholar 

  7. D.P. Ghormley, D. Petrou, S.H. Rodrigues and T.E. Anderson, SLIC: An extensibility system for commodity operating systems, in: USENIX Annual Technical Conference (June 1998).

  8. A.S. Grimshaw, W.A. Wulf et al., The Legion vision of a worldwide virtual computer, Communications of the ACM 40(1) (January 1997) 39–45.

    Google Scholar 

  9. G. Hunt and D. Brubacher, Detours: Binary interception of Win32 functions, Technical Report MSR-TR–98–33, Microsoft Research (February 1999).

  10. IEEE/ANSI, Portable operating system interface (POSIX): Part 1, system application program interface (API): C language (1990).

  11. S.C. Johnson, YACC - Yet another compiler-compiler, Comp. Sci. Tech. Rep. 32, Bell Labs, Murray Hill, NJ (July 1975).

    Google Scholar 

  12. M.B. Jones, Interposition agents: Transparently interposing user code at the system interface, in: Proceedings of the 14th ACM Symposium on Operating Systems Principles (1993) pp. 80–93.

  13. M.E. Lesk and E. Schmidt, LEX - a lexical analyzer generator, Comp. Sci. Tech. Rep. 39 (Bell Labs, Murray Hill, NJ, 1975).

    Google Scholar 

  14. M. Litzkow, M. Livny and M. Mutka, Condor - a hunter of idle workstations, in: Proceedings of the 8th International Conference of Distributed Computing Systems (June 1988).

  15. R. Srinivasan, RFC-1831: RPC: Remote procedure call protocol specification version 2, Network Working Group Requests for Comments (August 1995).

  16. R. Srinivasan, RFC-1832: XDR: External data representation standard, Network Working Group Requests for Comments (August 1995).

  17. SunMicrosystems, rpcgen Programming Guide (Sun Microsystems Inc., Mountain View, CA, 1987).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Thain, D., Livny, M. Multiple Bypass: Interposition Agents for Distributed Computing. Cluster Computing 4, 39–47 (2001). https://doi.org/10.1023/A:1011412209850

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1011412209850

Navigation