Explain the following questions below:

i) Can a server invoked by lightweight procedure calls control the degree of concurrency within it?

ii) Explain why and how a client is prevented from calling arbitrary code within a server under lightweight
RPC.

iii) Does LRPC expose clients and servers to greater risks of mutual interference than conventional RPC (given the sharing of memory)?


i) Although a server using LRPC does not explicitly create and manage threads, it can control the degree of concurrency within it by using semaphores within the operations that it exports.

ii) A client must not be allowed to call arbitrary code within the server, since it could corrupt the server’s data. The kernel ensures that only valid procedures are called when it mediates the thread’s upcall into the server.

iii) In principle, a client thread could modify a call’s arguments on the A-stack, while another of the client’s threads, executing within the server, reads these arguments. Threads within servers should therefore copy all arguments into a private region before attempting to validate and use them. Otherwise, a server’s data is entirely protected by the LRPC invocation mechanism.

Computer Science & Information Technology

You might also like to view...

You are limited to one grouping level per report.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of these denotes the identification, analysis, evaluation, and treatment of risk to information assets?

A. RM framework B. RM process C. RM initiative D. RM leadership

Computer Science & Information Technology

?

A. ?A network architecture in which each computer or process on the network is a client or server. Clients request services from a server, and a server processes requests from clients.  B. A law enacted in 1986 to extend the Wiretap Act to cover e-mail and other data transmitted via the Internet.? C. ?Anenhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, nonrepeatable number that's added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value.  D. A protocol for retrieving e-mail messages; it's slowly replacing POP3. E. ?A method of storing e-mail messages in a flat plaintext file F. The Microsoft system that enables other e-mail applications to work with each other? G. ?A specification for formatting non-ASCII messages, such as graphics, audio, and video, for transmission over the Internet. H. ?A term researchers use for social media. I. A type of e-mail scam that uses DNS poisoning to redirect readers to a fake Web site.? J. ?A type of e-mail scam that's typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.

Computer Science & Information Technology

In which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?

What will be an ideal response?

Computer Science & Information Technology