The present application is related to the following United States Patents and patent applications, which patents/applications are assigned to the owner of the present invention, and which patents/applications are incorporated by reference herein in their entirety:
U.S. Provisional Patent Application No. 60/450,720, entitled “A System for Dynamic Code Generation”, filed on Feb. 28, 2003; and
U.S. Provisional Patent Application No. 60/450,987, entitled “Dynamic Code Generation Method”, filed on Feb. 28, 2003.
A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
The current invention relates generally to automatically generating program code, and more particularly to automatically generating wrapper classes dynamically to enforce call-by-value semantics between objects collocated within an application server.
Application server systems provide an environment that allows client applications to implement services over a server network. The application server network may include vendor resources for providing services to the client applications. One such application server system is Web Logic Server, provided by BEA Systems of San Jose, Calif.
As vendor resources and application server utilities are used by client applications, it is often necessary to introduce adapters or proxies to mediate requests between clients and application server resources. A proxy is a class that has the same interface as some other class that it is taking the place of. An adapter takes the place of some class and exposes it through a different interface. A typical application server system implements a large number of proxies as resources are invoked and other services are performed. Many of these proxies require substantial amounts of code while often utilized for limited periods of time. Thus, it is not desirable to implement the interfaces for the lifetime of the application server system.
In some systems, a client may need to invoke a method on an Enterprise Java Bean (EJB) that resides on the same virtual machine. A prior art system 100 that illustrates a typical system for handling this operation is shown in
One method of the prior art for complying with call-by-value semantics is illustrated in method 200 of
What is needed is a more efficient system and method for implementing call-by-value semantics between an EJB and an EJB method invoking client.
In one embodiment, the present invention includes a system and method for dynamically generating proxy classes in order to enforce call-by-value semantics between clients and EJBs collocated with a virtual machine. The virtual machine can be a Java virtual machine (JVM) or some other type of virtual machine that is configured to operate with the system and techniques as described herein and as known to those skilled in the art. The proxy classes are dynamically generated at runtime using dynamic bytecode generation. Generated proxies are then interposed between a client and an EJB. The interposition of the generated proxies allows the proxies to intercept communication between the client and the EJB. In another embodiment, the present invention may be used in any system wherein a first entity invokes a second entity wherein the second entity has an interface that can be retrieved or introspected and utilizes call-by-value semantics.
In one embodiment, the present invention includes a system and method for dynamically generating proxy classes in order to enforce call-by-value semantics between clients and EJBs collocated with a virtual machine. The virtual machine can be a Java virtual machine (JVM) or some other type of virtual machine that is configured to operate with the system and techniques as described herein and as known to those skilled in the art. The proxy classes are dynamically generated at runtime using dynamic bytecode generation. Generated proxies are then interposed between a client and an EJB. The interposition of the generated proxies allows the proxies to intercept communication between the client and the EJB. In another embodiment, the present invention may be used in any system wherein a first entity invokes a second entity, wherein the second entity has an interface that can be retrieved or introspected and utilizes call-by-value semantics.
The proxies enforce call-by-value semantics by making copies of all parameters passed from the client or caller to the EJB. The proxies take advantage of several enhancements to improve performance. One such enhancement is to pass objects in a manner custom suited to the type of object. The present invention results in a dramatic improvement in performance for clients and/or callers that invoke EJBs located in the same virtual machine.
A method 300 for dynamically generating a wrapper class for implementing call by value semantics in accordance with one embodiment of the present invention is illustrated in
A method 400 for implementing a wrapper class is illustrated in
In one embodiment, the optimization on the parameters at step 420 is based on the parameter type. If the parameter is an immutable parameter such that a deep copy is not required, then a reference to the parameter may be passed by the wrapper as a reference. Examples of these types of parameters include strings within an EJB. Parameters that are in a predictable format but are not necessarily immutable may be cloned. Examples of these type of parameters include data indicating a date. For all other parameters that can not be optimized for transfer to the requesting client, java serialization may be performed. After optimization is performed, operation ends at step 425.
The present invention includes a system and method for dynamically generating proxy classes in order to enforce call-by-value semantics between software modules. In a preferred embodiment, the present invention generates proxy classes to enforce call-by-value semantics between clients and EJBs collocated with a Java virtual machine. The proxy classes are dynamically generated at runtime using dynamic bytecode generation. Generated proxies are then interposed between a client and an EJB. The interposition of the generated proxies to allows the proxies to intercept communication between the client and the EJB. In another embodiment, the present invention may be used in any system wherein a first entity invokes a second entity wherein the second entity has an interface that can be retrieved or introspected and utilizes call-by-value semantics.
Other features, aspects and objects of the invention can be obtained from a review of the figures and the claims. It is to be understood that other embodiments of the invention can be developed and fall within the spirit and scope of the invention and claims.
The foregoing description of preferred embodiments of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations will be apparent to the practitioner skilled in the art. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, thereby enabling others skilled in the art to understand the invention for various embodiments and with various modifications that are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the following claims and their equivalence.
In addition to an embodiment consisting of specifically designed integrated circuits or other electronics, the present invention may be conveniently implemented using a conventional general purpose or a specialized digital computer or microprocessor programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art.
Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art. The invention may also be implemented by the preparation of application specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art.
The present invention includes a computer program product which is a storage medium (media) having instructions stored thereon/in which can be used to program a computer to perform any of the processes of the present invention. The storage medium can include, but is not limited to, any type of disk including floppy disks, optical discs, DVD, CD-ROMs, microdrive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
Stored on any one of the computer readable medium (media), the present invention includes software for controlling both the hardware of the general purpose/specialized computer or microprocessor, and for enabling the computer or microprocessor to interact with a human user or other mechanism utilizing the results of the present invention. Such software may include, but is not limited to, device drivers, operating systems, and user applications.
Included in the programming (software) of the general/specialized computer or microprocessor are software modules for implementing the teachings of the present invention, including, but not limited to, generating wrapper classes to implement call-by-value semantics in Java virtual machines.
Number | Name | Date | Kind |
---|---|---|---|
4989132 | Mellender et al. | Jan 1991 | A |
5408405 | Mozumder et al. | Apr 1995 | A |
5815415 | Bentley | Sep 1998 | A |
6006230 | Ludwig et al. | Dec 1999 | A |
6011917 | Leymann et al. | Jan 2000 | A |
6011918 | Cohen | Jan 2000 | A |
6085030 | Whitehead | Jul 2000 | A |
6085198 | Skinner | Jul 2000 | A |
6125383 | Glynias | Sep 2000 | A |
6151639 | Tucker et al. | Nov 2000 | A |
6321261 | Glass | Nov 2001 | B1 |
6381737 | Click | Apr 2002 | B1 |
6385661 | Guthrie | May 2002 | B1 |
6389452 | Glass | May 2002 | B1 |
6415315 | Glass | Jul 2002 | B1 |
6442586 | Glass | Aug 2002 | B1 |
6513157 | Glass | Jan 2003 | B1 |
6519653 | Glass | Feb 2003 | B1 |
6535928 | Glass | Mar 2003 | B1 |
6549955 | Guthrie | Apr 2003 | B2 |
6578191 | Boehme et al. | Jun 2003 | B1 |
6622175 | Piller | Sep 2003 | B1 |
6629128 | Glass | Sep 2003 | B1 |
6678743 | Glass | Jan 2004 | B1 |
6834389 | Glass | Dec 2004 | B1 |
6877163 | Jones | Apr 2005 | B1 |
6931455 | Glass | Aug 2005 | B1 |
6947965 | Glass | Sep 2005 | B2 |
6951021 | Bodwell | Sep 2005 | B1 |
6961772 | Wensel | Nov 2005 | B1 |
6976029 | Venkatesh et al. | Dec 2005 | B2 |
6993774 | Glass | Jan 2006 | B1 |
7114152 | Hogstrom et al. | Sep 2006 | B2 |
7146399 | Fox et al. | Dec 2006 | B2 |
7181745 | Foti | Feb 2007 | B1 |
7536675 | Gallagher | May 2009 | B2 |
7548830 | Goebel et al. | Jun 2009 | B2 |
20030033038 | Paris et al. | Feb 2003 | A1 |
20040015832 | Stapp | Jan 2004 | A1 |
20060031834 | Colby et al. | Feb 2006 | A1 |
20130029667 | Zhu | Jan 2013 | A1 |
20130121209 | Padmanabhan et al. | May 2013 | A1 |
Entry |
---|
Sun Microsystems, Inc., Enterprise JavaBeans™ Specification, Version 2.1, Final Release, Nov. 12, 2003, pp. 1-646. |
Uppal, Chris, “Newbie question: immutable objects in Smalltalk,” Mombu the Programming Forum, http://www.mombu.com/programming/c/t-newbie-question-immutable-objects-in-smalltalk-916311.html. |
Number | Date | Country | |
---|---|---|---|
20060107222 A1 | May 2006 | US |