Skip to main content

Dimensions of Addressing Schemes

  • Conference paper
Security and Persistence

Part of the book series: Workshops in Computing ((WORKSHOPS COMP.))

Abstract

This paper attempts to bring some order to the apparent disorder of numerous addressing schemes. Various addressing strategies are examined, and four orthogonal dimensions identified. These are: (i) number of address spaces per system, (ii) number of address-mapping tiers, (iii) when and how often mapping functions are performed and (iv) implementation of the access matrix (via capabilities or access-control lists). The number of address-mapping tiers in a system is directly related to the number of different forms of addresses present in the system. We discuss the functionality that can be achieved by the various options along the four dimensions. We focus on three important functionalities: sharing, protection and persistence. The functionality of dynamic linking is also discussed briefly. Twelve commercial and research computer systems have been selected and classified into three categories: (i) ordinary virtual-memory systems, (ii) non-persistent object systems and (iii) persistent object systems. The success of these systems in providing the above functionalities is traced back to their addressing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maurice J. Bach, The Design of the Unix Operating System, Prentice-Hall, 1986.

    Google Scholar 

  2. Brian N. Bershad, Edward T. Lazowska, and Henry M. Levy, “PRESTO: a system for object-oriented parallel programming,” Software—Practice arid Experience, 18: 8, August 1988.

    Google Scholar 

  3. Alfred L. Brown, “Persistent Objet Stores,” Persistent Programming Report 71, Universities of St. Andrews and Glasgow, Oct. 1989.

    Google Scholar 

  4. V. Berstis, C. D. Truxal, J. G. Ranweiler, “System/38 addressing and authorization,” IBM System/38 Technical Developments, General Systems Div., International Business Machines Corporation, Pub. no. 0-933186-00-2, 1978, pp. 51–54.

    Google Scholar 

  5. W. P. Cockshott, M. P. Atkinson, K. J. Chisholm, P. J. Bailey, and R. Morrison, “Persistent object management system,” Software—Practice and Experience, 14, 1983, pp. 49–71.

    Article  Google Scholar 

  6. Robert P. Colwell, Edward F. Gehringer, E. Douglas, “Performance Effects of Architectural Complexity in the Intel 432,” ACM Transactions on Computer Systems, Vol. 6, No. 3, August 1988, pp. 296–339.

    Article  Google Scholar 

  7. R. E. French, R. W. Collins, L. W. Loen, “System/38 machine storage management,” in IBM System/38 Technical Developments, General Systems Division, International Business Machines Corporation, Publication no. 0-933186-00-2, 1978, pp. 59–62.

    Google Scholar 

  8. R. S. Fabry, “Capability-based addressing,” Communications of the ACM, 17: 7, July 1974, pp. 403–412.

    Article  Google Scholar 

  9. R. O. Fess, K. R. Reid, C. D. Truxal, R. J. Lindner, “AS/400 system overview,” in IBM Application System/400 Technology, IBM Application Business Systems, Pub. no. SA21-9540-0, 1988, pp. 2–10.

    Google Scholar 

  10. Edward F. Gehringer, “MONADS: A Computer Architecture to Support Software Engineering,” MONADS Report no. 13, Monash University, Clayton, Victoria, Australia, 1982.

    Google Scholar 

  11. Edward F. Gehringer, “Name-based Mapping: Addressing Support for Persistent Objects,” Proc. Third Workshop on Persistent Object Systems, Newcastle, NSW, Australia, Jan. 10–13, 1989, pp. 139–157.

    Google Scholar 

  12. Adele Goldberg and David Robson, Smalltalk-80: The Language and its Implementation, Addison-Wesley, 1983.

    MATH  Google Scholar 

  13. Intel Corporation, “iAPX 432 General Data Processor Architecture Reference Manual”, Preliminary Manual 171860-001, Intel Corporation, Santa Clara, CA, 1981.

    Google Scholar 

  14. J. Leslie Keedy, “An Implementation of Capabilities without a Central Mapping Table,” Proc. Seventeenth Annual Hawaii International Conference on Systems Sciences, 1984.

    Google Scholar 

  15. J. Leslie Keedy, John Rosenberg, “Support for Objects in the MONADS Architecture,” Proc. Third Workshop on Persistent Object Systems, Newcastle, NSW, Australia, January 10–13, 1989, pp. 202–213.

    Google Scholar 

  16. Borivoje Furht and Veljko Milutinovíc, “A survey of microprocessor architectures for memory management,” IEEE Computer, 20: 3, March 1987, pp. 48–67.

    Article  Google Scholar 

  17. Elliott I. Organick, The Multics Systems: An Examination of Its Structure, MIT Press, Cambridge, Massachusetts, 1972.

    Google Scholar 

  18. Elliott I. Organick, Computer System Organization: The B5700/B6700 Series, Academic Press, 1973.

    Google Scholar 

  19. Jerome H. Saltzer, “Protection and the Control of Information Sharing in Multics,” Communications of the ACM, 17: 7, July 1974, pp. 388–402.

    Article  Google Scholar 

  20. Jerome H. Saltzer and Michael D. Schroeder, “The protection of information in computer systems,” Proc. IEEE, 63: 9, September 1975, pp. 1278–1308.

    Article  Google Scholar 

  21. Howard E. Sturgis, “A post-mortem for a time sharing system,” Ph.D. thesis, U. of California, Berkeley, May 1973. Reprinted as CSL 74-1, Xerox Palo Alto Research Ctr.

    Google Scholar 

  22. A. Dain Samples, David Ungar, and Paul Hilfinger, “Soar: Smalltalk without Bytecodes,” OOPSLA’86 Proceedings (ACM SIGPLAN Notices, 21: 11, November 1986 ), pp. 107–118.

    Article  Google Scholar 

  23. U. S. Navy, User’s Handbook for Navy Standard 16-Bit Computers, Support Software, NAVSEA 0967-LP-598-2050, Volume V, Rev. B, Change 2, December 1984.

    Google Scholar 

  24. M. Young, A. Tevanian, R. Rashid, D. Golub, J. Eppinger, J. Chew, W. Bolosky, D. Black, R. Baron, “The duality of memory and communication in the implementation of a multiprocessor operating system,” Proc. Eleventh ACM Symposium on Operating Systems Principles(ACM Operating Systems Review, 21:5), November 1987, pp. 63–76.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1990 British Computer Society

About this paper

Cite this paper

Sarkar, M., Gehringer, E.F. (1990). Dimensions of Addressing Schemes. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3178-6_3

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-19646-4

  • Online ISBN: 978-1-4471-3178-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics