Abstract
This paper attempts to bring some order to the apparent disorder of numerous addressing schemes. Various addressing strategies are examined, and four orthogonal dimensions identified. These are: (i) number of address spaces per system, (ii) number of address-mapping tiers, (iii) when and how often mapping functions are performed and (iv) implementation of the access matrix (via capabilities or access-control lists). The number of address-mapping tiers in a system is directly related to the number of different forms of addresses present in the system. We discuss the functionality that can be achieved by the various options along the four dimensions. We focus on three important functionalities: sharing, protection and persistence. The functionality of dynamic linking is also discussed briefly. Twelve commercial and research computer systems have been selected and classified into three categories: (i) ordinary virtual-memory systems, (ii) non-persistent object systems and (iii) persistent object systems. The success of these systems in providing the above functionalities is traced back to their addressing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Maurice J. Bach, The Design of the Unix Operating System, Prentice-Hall, 1986.
Brian N. Bershad, Edward T. Lazowska, and Henry M. Levy, “PRESTO: a system for object-oriented parallel programming,” Software—Practice arid Experience, 18: 8, August 1988.
Alfred L. Brown, “Persistent Objet Stores,” Persistent Programming Report 71, Universities of St. Andrews and Glasgow, Oct. 1989.
V. Berstis, C. D. Truxal, J. G. Ranweiler, “System/38 addressing and authorization,” IBM System/38 Technical Developments, General Systems Div., International Business Machines Corporation, Pub. no. 0-933186-00-2, 1978, pp. 51–54.
W. P. Cockshott, M. P. Atkinson, K. J. Chisholm, P. J. Bailey, and R. Morrison, “Persistent object management system,” Software—Practice and Experience, 14, 1983, pp. 49–71.
Robert P. Colwell, Edward F. Gehringer, E. Douglas, “Performance Effects of Architectural Complexity in the Intel 432,” ACM Transactions on Computer Systems, Vol. 6, No. 3, August 1988, pp. 296–339.
R. E. French, R. W. Collins, L. W. Loen, “System/38 machine storage management,” in IBM System/38 Technical Developments, General Systems Division, International Business Machines Corporation, Publication no. 0-933186-00-2, 1978, pp. 59–62.
R. S. Fabry, “Capability-based addressing,” Communications of the ACM, 17: 7, July 1974, pp. 403–412.
R. O. Fess, K. R. Reid, C. D. Truxal, R. J. Lindner, “AS/400 system overview,” in IBM Application System/400 Technology, IBM Application Business Systems, Pub. no. SA21-9540-0, 1988, pp. 2–10.
Edward F. Gehringer, “MONADS: A Computer Architecture to Support Software Engineering,” MONADS Report no. 13, Monash University, Clayton, Victoria, Australia, 1982.
Edward F. Gehringer, “Name-based Mapping: Addressing Support for Persistent Objects,” Proc. Third Workshop on Persistent Object Systems, Newcastle, NSW, Australia, Jan. 10–13, 1989, pp. 139–157.
Adele Goldberg and David Robson, Smalltalk-80: The Language and its Implementation, Addison-Wesley, 1983.
Intel Corporation, “iAPX 432 General Data Processor Architecture Reference Manual”, Preliminary Manual 171860-001, Intel Corporation, Santa Clara, CA, 1981.
J. Leslie Keedy, “An Implementation of Capabilities without a Central Mapping Table,” Proc. Seventeenth Annual Hawaii International Conference on Systems Sciences, 1984.
J. Leslie Keedy, John Rosenberg, “Support for Objects in the MONADS Architecture,” Proc. Third Workshop on Persistent Object Systems, Newcastle, NSW, Australia, January 10–13, 1989, pp. 202–213.
Borivoje Furht and Veljko Milutinovíc, “A survey of microprocessor architectures for memory management,” IEEE Computer, 20: 3, March 1987, pp. 48–67.
Elliott I. Organick, The Multics Systems: An Examination of Its Structure, MIT Press, Cambridge, Massachusetts, 1972.
Elliott I. Organick, Computer System Organization: The B5700/B6700 Series, Academic Press, 1973.
Jerome H. Saltzer, “Protection and the Control of Information Sharing in Multics,” Communications of the ACM, 17: 7, July 1974, pp. 388–402.
Jerome H. Saltzer and Michael D. Schroeder, “The protection of information in computer systems,” Proc. IEEE, 63: 9, September 1975, pp. 1278–1308.
Howard E. Sturgis, “A post-mortem for a time sharing system,” Ph.D. thesis, U. of California, Berkeley, May 1973. Reprinted as CSL 74-1, Xerox Palo Alto Research Ctr.
A. Dain Samples, David Ungar, and Paul Hilfinger, “Soar: Smalltalk without Bytecodes,” OOPSLA’86 Proceedings (ACM SIGPLAN Notices, 21: 11, November 1986 ), pp. 107–118.
U. S. Navy, User’s Handbook for Navy Standard 16-Bit Computers, Support Software, NAVSEA 0967-LP-598-2050, Volume V, Rev. B, Change 2, December 1984.
M. Young, A. Tevanian, R. Rashid, D. Golub, J. Eppinger, J. Chew, W. Bolosky, D. Black, R. Baron, “The duality of memory and communication in the implementation of a multiprocessor operating system,” Proc. Eleventh ACM Symposium on Operating Systems Principles(ACM Operating Systems Review, 21:5), November 1987, pp. 63–76.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 British Computer Society
About this paper
Cite this paper
Sarkar, M., Gehringer, E.F. (1990). Dimensions of Addressing Schemes. In: Rosenberg, J., Keedy, J.L. (eds) Security and Persistence. Workshops in Computing. Springer, London. https://doi.org/10.1007/978-1-4471-3178-6_3
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3178-6_3
Publisher Name: Springer, London
Print ISBN: 978-3-540-19646-4
Online ISBN: 978-1-4471-3178-6
eBook Packages: Springer Book Archive