METHODS AND APPARATUS TO IMPROVE INTERPROCESS COMMUNICATION
Methods, apparatus, systems and articles of manufacture are disclosed to improve interprocess communication. An example apparatus to improve network transmission efficiency of a sending peer includes an encoder interface to prevent an encoder from encoding data in a native format to a target format associated with a requesting peer in response to a transmission trigger, a composite interface description (CID) engine to generate architecture agnostic metadata of the data in the native format, a composite layout description (CLD) engine to generate architecture specific metadata of the data in the native format, the architecture specific metadata identifying offset values associated with elements of the data in the native format, and a client payload engine to improve the network transmission efficiency by sending unencoded data combined with the architecture agnostic metadata and the architecture specific metadata to the requesting peer having an architecture different than that of the sending peer.
This disclosure relates generally to information exchange, and, more particularly, to methods and apparatus to improve interprocess communication.
BACKGROUNDIn recent years, server devices have collected information from ubiquitous network client devices, such as mobile telephones, tablets, personal computers, and the like. In some examples, the client devices perform one or more tasks to collect information as instructed by program(s) executing thereon. In response to a request from the client devices, the server devices store the collected information in a particular format for circumstances when requesting entities wish to retrieve the collected information. Because the different client devices, server devices and requesting entities may have different architecture types, the client devices encode their collected task information into one or more particular formats that can be read and/or otherwise processed by the server devices.
Network applications may exchange data in response to one or more triggers, such as remote procedure calls (RPCs), in which an example first application (e.g., a networked server) sends a request having particular data fields, and expects a response from an example second application (e.g., a networked mobile peer device) including those same data fields. In some examples, the second application may send reports in response to triggers, such as periodic time durations, aperiodic time durations, scheduled time durations, memory storage capacity threshold values, sensor response events, and/or manual triggers. Data collected and/or otherwise acquired by the example second application may be stored on a client device that executes the second application, in which the collected data is stored in a memory and/or other storage in a native format, such as a binary format. Data stored in a binary format is typically architecture specific, in which different architectures utilize different byte sizes (e.g., 8-bits per byte, 16-bits per byte, etc.), different endianness (e.g., big-endian, little-endian, mixed-endian, etc.), and/or different offset alignments.
However, because an architecture of the example sending client device 102 may differ from an architecture of the example receiving server device 104, the sending client device 102 includes the example encoder 110 to encode one or more portions of the data from a native binary format into a format that can be processed by the example receiving server device 104. For example, the encoder 110 may convert and/or otherwise encode the native binary (or portions thereof) to an extensible markup language (XML) format, an abstract syntax notation (ASN, e.g., ASN.1) format, a text format (e.g., ASCII), etc. In some examples, encoding the native binary to an alternate format results in a relatively larger data storage footprint. Additionally, the example encoder 110 of the sending client device 102 is unique to a predetermined format of interest that is to communicate with one or more receiving server device(s).
Example sending client devices, such as the example sending client device 102 of
Example methods, apparatus, articles of manufacture and/or systems disclosed herein facilitate an improved manner of exchanging information between peers (e.g., the example sending client device 102 and the example receiving server device 104) of a network 106 (or within a common platform). As described in further detail below, an example client payload engine 150 facilitates sending data from the example sending client device 102 in a manner that preserves a native binary format that may have been generated by one or more task processes 184 of the example client task engine 103 and/or stored in the payload storage 108.
Such preservation of the native binary format reduces a computational burden of the example sending client device 102 that would otherwise traditionally occur when encoding the native binary to a human-readable format prior to sending to one or more destination peer(s). Furthermore, such preservation of the native binary format reduces a storage capacity requirement of the sending device 102 because native binary formats exhibit a relatively smaller storage footprint than data encoded in a human-readable format. Because transmitting the native binary format reflects a relatively lower bandwidth when compared to encoded versions of the binary into an alternate format, network transmission efficiency is improved. Moreover, by sending data in its native binary format, it exhibits superior security characteristics when compared to human-readable format(s), and consumes less bandwidth during transmission.
Additionally, and as described in further detail below, an example server payload engine 160 facilitates reception of data in the binary format from a sending peer that may exhibit architecture differences of the example receiving server device 104, thereby allowing the network transfer of the binary format to maintain its inherent security as compared to traditional human-readable format(s). An example enumeration engine 170 facilitates mapping of data composite types of ENUM between peers that may not operate with a similar architecture (e.g., different value mappings may be employed for ENUM elements, such as similar names having different values), as described in further detail below. An example translation engine 180 facilitates requests (e.g., translation requests to render data associated with a composite stored on the example receiving server device 104 (the receiving peer)) that may originate from one or more translation request entities 182 and/or the example receiving server device 104, as described in further detail below.
To facilitate the improved manner of exchanging information between peers (e.g., the example sending client device 102 and the example receiving server device 104), the example interprocess environment 100 includes an example metadata engine 136 communicatively connected to the example sending client device 102 and/or the example receiving server device 104 via at least one of the example network 106 and/or the example communication bus 188. In the illustrated example of
In operation, the example sending client device 102 retrieves and/or otherwise receives one or more task process(es) 184 to be executed in a manner that retrieves and/or otherwise collects payload data to be stored in the example payload storage 108. As described above, the example sending client device 102 may be a device having limited processing and/or storage resources, but able to execute one or more task process(es) 184 to accomplish, for example, data acquisition operations. The example task process(es) 184 may be compiled into an executable format by an example task process compiler 186 of the example metadata engine 136. Payload data generated by the task process(es) 184 includes one or more associated composites. As used herein, a composite reflects a portion of a payload in the example payload storage 108 having data fields and/or data units. An example composite includes a C-structure having variable names, variable types and corresponding variable values (e.g., values for each variable name). One or more payloads stored in the example payload storage 108 may include any number and/or type of composite.
Traditional sending client devices 102 are typically instructed to send and/or otherwise transmit one or more payloads that will invoke the example encoder 110 to encode a native binary of the requested composite to a format expected by the example receiving server device. However, examples disclosed herein improve bandwidth utilization during the sending process by preventing the encoder (e.g., for legacy peers having an encoder) from encoding the composite(s), thereby allowing the sending of data to a peer (e.g., the example receiving server device 104) in its native binary format. Additionally, because the composite is sent in its native binary format, the composite is more secure by preventing a human-readable format from being rendered in the event of interception and/or network sniffing. In some examples, the native binary format, as distinguished from a human-readable format, is considered security by way of obscurity.
Taken together, the example CID and the CLD represent the composite metadata, which is compiled into the task process 184 or, in the case of virtualized languages like JAVA, the composite metadata is stored in a virtual machine (VM) 152 and/or stored in the example payload storage 108 of the sending client device 102. After the example task process 184 is compiled and the metadata is included therein, the example metadata engine 136 is no longer needed during run time. Generally speaking, after the example CID engine 120 generates the CID associated with the composite and the example CLD engine 126 generates the CLD associated with the composite, any future reference to the composite (and the associated CID and CLD) to be sent may be referenced via the example metadata reference to conserve processing resources of the example sending client device 102. The generated composite metadata, which includes the CID and the CLD, is later retrieved during run time by an example metadata reference manager 134 (in circumstances of a compiled task process 184), or retrieved from the VM 152 and associated with a unique metadata reference (e.g., textual and/or numeric nomenclature to identify the composite metadata), in which other devices using this reference can generate consistent results despite any architecture differences that may exist therebetween. The example metadata reference manager 134 is located in the example client payload engine 150 and described in further detail below.
In operation, the example client payload monitor 204 determines whether the example payload storage 108 includes information that is to be sent and/or otherwise transmitted to the example receiving server device 104. In some examples, the client payload monitor 204 responds to one or more triggers to identify available information in the payload storage 108, such as a request from the receiving server device 104 (e.g., a remote procedure call (RPC), a time-based trigger, a sensor based trigger and/or a trigger based on a threshold capacity of stored information in the payload storage 108. When the example client payload monitor 204 is to send payload information, the example metadata reference manager 134 extracts and/or otherwise retrieves the metadata compiled in the task process 184 to facilitate improved payload transmission between peers that may have architecture differences. In the event non-compiled (virtualized) tasks are invoked (e.g., tasks executed with the example VM 152), the example metadata reference manager 134 extracts and/or otherwise retrieves the associated metadata from the VM 152 or payload storage 108.
To build and/or otherwise generate the example CID 300, the example CID pointer manager 122 retrieves a composite associated with the task process 184 that is to be compiled by the task process compiler 186. Generally speaking, composite information, such as variable types, variable names, offset values, and/or size information are available to and/or otherwise resolved by compilers. As such, the example task process compiler 186 is of a type that is consistent and/or otherwise associated with an architecture type for the device on which a corresponding executable will execute. An example CLD structure (binary) definition handled by the example task process compiler 186 is shown below in Table 1.
Additionally, the corresponding textual CID is shown below in Table 2.
Further, the example task process compiler 186 may compile the binary CLD as shown below in Table 3.
The example CID file generator 124 generates a CID shell file to populate with architecture agnostic information associated with the composite, and the example CID pointer manager 122 identifies the beginning of the binary composite with a pointer to parse the composite for information for each element contained therein. For each element in the binary composite, the example CID file generator 124 encodes information to the CID 300 as text. When all elements have been encoded to the CID 300, the example CLD pointer manager 128 retrieves the composite associated with the task process 184 that is to be compiled by the task process compiler 186, and the example CLD file generator 130 generates a CLD shell file to populate with architecture specific information associated with the composite. The example payload analyzer 132 identifies a size of the composite and writes it to the CLD shell file and identifies a number of elements of the composite and writes that value to the CLD shell file (see elements 352, 354, 356 and 358) of the example CLD 350). Based on the number of elements of the composite, the example CLD pointer manager 128 increments and/or otherwise parses the composite binary a corresponding number of times to identify each element, identify its corresponding binary offset value, and the example payload analyzer 132 writes that information to the CLD shell file. In some examples, the example payload analyzer 132 determines an endianness value of the example binary composite, if available, and writes the same to the CLD shell file. In the event of any sub-composites within a composite, such sub-composites will have their own similar metadata definition(s) determined in a manner similar to the above.
The example metadata reference generator 134 sends the CID 300 and CLD 350 to the sending client device 102 as composite metadata for future use to facilitate improved data transfer/transmission to a targeted peer (e.g., the example receiving server device 104). In some examples, when the task process 184 of the sending client device is ready to transmit available payload data to a target peer, such transmission may proceed without further involvement by the example metadata engine 136. However, in the event one or more additional and/or alternate task process(es) 184 are to be provided to the example sending client device for payload data collection, then the example metadata engine 136 repeats the above disclosed examples to generate a corresponding executable and one or more instances of composite metadata (e.g., CID, CLD) for corresponding composites.
As described above, one or more task process(es) 184 are associated with virtualized languages (e.g., JAVA®, C#) rather than compiled (e.g., native) languages (e.g., C, C++). In such circumstances, the example CID and CLD are generated by reflection with cooperation from the example VM 152. For example, the metadata reference manager 134 (see the example payload engine 150 of the sending client device 102) queries the VM 152 of the sending client device 102 to determine one or more variable types and/or variable names available for the composites associated with the virtualized task process 184. Additionally, because virtual machine based languages (e.g., JAVA®, C#) do not include offset information, elements are packed back-to-back with or without padding bytes. In some examples, virtualized tasks do not need a CLD, particularly when one or more padding techniques are employed. Still further, VMs in one or more different locations (e.g., the VM 152 of the sending client device 102, the VM 152 of the receiving server device 104) may be synchronized and/or otherwise registered by the example metadata engine 136 to ensure task process consistency between two or more peers.
In response to a trigger (e.g., a request for payload data), the example task storage interface 210 of
As described in further detail below, sending the composite metadata along with the native binary allows the example receiving server device 104 to decode the native binary upon receipt, which allows computational efficiency improvements of the example sending client device 102 by avoiding encoding effort(s). Additionally, because the example sending client device 102 may send the native binary without expending encoding resources/effort, the example sending client device 102 conserves on-board power (e.g., battery) resources, consumes a lower transmission bandwidth (improves transmission efficiency) and, because native binary formats include a relatively smaller storage footprint than human readable format(s), the example sending client device 102 conserves on-board storage (e.g., on-board memory, RAM, FLASH, etc.) resources. Furthermore, in the event the example sending client device 102 changes its schema related to the composite binaries generated, sending compatibility is not disrupted between sending/receiving peers and, instead, schema updates (e.g., architecture changes, changes in binary offset values associated with composite elements, etc.) may be managed with updated composite metadata.
In some examples, the sending client device 102 has previously sent the composite metadata associated with the composite to the example receiving server device 104. Accordingly, the example receiving server device 104 already has a stored copy of (a) the composite metadata and (b) the metadata reference. Thus, rather than sending all three of the (a) composite metadata, (b) the metadata reference and (c) the composite binary, the example client payload engine 150 sends only the metadata reference and the composite binary, as described above. The example receiving server device references a previously stored copy of the composite metadata to allow the composite binary to be translated (e.g., translated into an alternate format, such as text, XML, an alternate binary associated with the receiving peer architecture, etc.).
In operation, the example server payload monitor 404 determines whether a payload has been received via the example receiving server I/O interface 114. As described above, the example sending client device 102 may send payload data in response to a trigger, such as a trigger initiated by the example receiving server device 104. If payload information has been received, then the example server metadata manager 406 determines whether the received payload data also includes a matching composite metadata reference. As described above, when the example sending client device 102 provides composite metadata (e.g., the example CID 300 and the example CLD 350), an associated composite metadata reference is also associated, matched and/or otherwise tagged to the composite metadata for future reference. Assuming for this example that the received payload (e.g., a received binary composite, a received metadata reference, and received metadata composite information) occurs for the first time, then the example server storage interface 408 extracts the received metadata composite information to identify the corresponding CID and CLD. The extracted CID (e.g., the example CID 350 of
However, because the example sending client device 102 and the example receiving server device 104 may each have a unique and/or otherwise different architecture, the received payload from the sending client device 102 may not be compatible with the receiving server device 104. As such, the example server metadata manager 406 generates its own server-side CID file and server-side CLD file to accommodate for and/or otherwise resolve any architecture differences. In some examples, the server metadata manager 406 includes one or more elements as shown in
In the illustrated example of
The server-side CID 500 may have its own unique definition with more or less elements, in which only those matching between peers will allow translating. For those one or more elements that do not include corresponding matches between peers, they may be ignored and/or exception errors may be generated by the example exception generator 416 to convey partial decoding capabilities therebetween. When comparing and/or translation is complete, the example server-side CID 500 will also include a composite type 502, a composite name 504, composite element names 506 and corresponding composite element types 508. Additionally, the example server-side CID 500 will be associated with the same metadata reference nomenclature that was originally established by the example sending client device 102. In the illustrated example of
As described above in connection with
In some examples, a mapping table resolves sender metadata and receiver metadata. In the illustrated example of
When the binary composite is received and/or otherwise retrieved by the example receiving server device 104 in the future (e.g., when the binary composite contains different payload data, but exhibits the same schema/composite format), then the receiving server device 104 can identify matching metadata and map to correct offset locations. In some examples, the server metadata manager 406 generates side-by-side comparison tables as shown in the illustrated example of
When one or more differences between the retrieved CID 300 and the stored server-side CID 500 are identified, then one or more exceptions may be invoked and/or otherwise generated by the example exception generator 416 of the translation engine 180 to identify data corruption and/or data mismatch. Additionally, the example translation engine 180 obtains the retrieved CLD 350 and corresponding metadata reference (e.g., “SF1” 310), and queries the example server data store 116 to identify a matching metadata reference (e.g., “SF1” 510). If found, the example translation engine 180 retrieves the previously stored server-side CLD 550 and compares it with the retrieved CLD 350 to identify differences in offset values. Knowledge of the offset values in the retrieved CLD 350 permits the example receiving server device 104 to extract stored data within the composite binary that is associated with a particular element, and then store it in the example server data store 116 in a binary format that complies with the particular hardware architecture of the receiving server device 104.
Additionally, in the event the example receiving server device 104 is to perform a translation request that generates an alternate format of the retrieved binary composite for a translation request entity 182 (e.g., third party requestors (e.g., one of the translation request entities 182) that need the binary composite information rendered in XML), then the example server-side CLD 550 allows the example translator system 424 to retrieve the stored binary composite (e.g., in a binary format native to the receiving server device 104 rather than native to the sending client device 102), identify accurate locations within the binary for one or more elements of interest, and invoke an appropriate format encoder 426 to render payload data to the desired alternate format for further transmission/distribution. While the illustrated example of
When the request manager 420 identifies a translation request (e.g., a third party request to the example receiving server device 104 to obtain composite data in a particular format), the example format resolver 422 identifies a type of the format desired. The example format resolver 422 queries the example server data store 116 to determine whether the desired format of the requested composite is already available and, if so, the example translation engine 180 retrieves the decoded composite from storage and forwards it to the requestor via the example receiving server I/O interface 114. In some examples, the requested composite is already available because it was saved to the example server data store 116 in response to one or more prior efforts to decode the binary composite into a desired format requested by a third party translation request.
On the other hand, if the desired format of the requested composite is not available in the example server data store 116 (e.g., this is the first time a translation request has been invoked for the composite binary of interest), then the example format resolver 422 identifies a first composite element from the server-side CID 500, and identifies a corresponding composite element from the server-side CLD 550 containing an offset value associated with elements of the composite binary stored in the example server data store 116. Based on respective offset values for elements of the composite binary, the example translator system 424 obtains the data located in the composite binary and invokes a corresponding format encoder 426 to translate the data to a format associated with the requestor (e.g., translation to text, translation to XML, translation to JSON, etc.). The format encoders 426 may include any number of encoder types, each one capable of encoding into a particular format. In some examples, the translator system 424 invokes a format encoder 426 to translate from a native binary into text, a native binary into XML, a native binary into JSON, etc. As the example translation engine 180 translates each element of the target composite binary stored in the example server data store 116, it stores (e.g., in the example server data store 116) aggregated composite elements to an output file having the desired format. The example translation engine 180 then sends the translated file to the requestor via the example receiving server I/O interface 114.
As described above, in some examples the composite is of type ENUM, which requires further resolution between elements to resolve one or more nomenclature disparities of a composite ENUM from the sending peer as compared to a composite ENUM from the receiving peer.
In the illustrated example of
As described above, traditional approaches to mapping and/or otherwise resolving disparities between ENUM composite types required coordination between peers to encode and/or otherwise translate the ENUM into a standard format, which causes an original binary format to be converted into a relatively larger memory storage footprint and causes a corresponding greater bandwidth consumption, requires encoding resources, and decreases data security during a data transfer (e.g., the encoded standard type becomes human readable text). Examples disclosed herein conserve a memory storage footprint, conserve bandwidth consumption, reduce and/or eliminate encoding resources, and improve data security during a data transfer.
The example resolution table manager 114 of the example receiving server device 104 determines whether an enumeration resolution table (ERT) has previously been generated and, if not, an ERT (e.g., an initially blank shell file) is generated based on CID and CLD information sharing a matching composite tag. The example resolution table manager may save the ERT as a file in the example server data store 116.
To determine which elements match between ENUMs of the example first peer 702 and the example second peer 704, the example exception generator 416 of the ENUM engine 170 determines whether an element position mismatch occurs. In particular, the example exception generator 416 identifies a first element position of both peers (e.g., the zero “0” bits of the element index position columns 714) and determines whether a corresponding element name (e.g., the element name “red” in the element name columns 716) matches. If so, then the element associated with the evaluated element index position (e.g., index position zero “0”) is deemed to be a match, in which the example resolution table manager 414 sets a value of TRUE in the example element parity column 720.
On the other hand, in the event the example exception generator 416 identifies a mismatch of an element position between peers (see row 724 of
Despite the mismatch between the example first peer 702 and the example second peer 704 associated with the element name “blue,” one or more other elements therebetween may still indicate matches that can be used to resolve differences between the ENUMs of the example first peer 702 and the example second peer 704. For example, the example exception generator 416 also identifies a mismatch of an index position between peers for index position “3” (see row 726 of
When the example ERT 700 has been populated with resolved mapping information, the example enumeration engine 170 stores the ERT in the example server data store 116 in the event one or more future requests for mapping the ENUM “colors” is requested. For example, in the event the example enumeration engine 170 retrieves and/or otherwise receives a binary input query value of “1” associated with an ENUM named “colors” from the example first peer 702, then it invokes the example resolution table manager 414 to retrieve a corresponding target value for the appropriate ENUM named “colors” from the example second peer 704 by referencing the ERT 700. Because the example input query value of “1” is associated with element name “green” from the first peer 702, then a corresponding value from the second peer 704 of “50” is resolved (see row 728 of
While an example manner of implementing the client payload engine 150, the server payload engine 160, the enumeration engine 170 and the translation engine 180 of
Flowcharts representative of example machine readable instructions for implementing the client payload engine 150, the server payload engine 160 and/or the enumeration engine 170 of
As mentioned above, the example processes of
The program 800 of
To conserve computing resources of the example sending client device 102, the example encoder interface 208 interrupts and/or otherwise prevents the example encoder 110 from performing an encoding operation on the composite to be sent (block 804). As such, any composite(s) sent by the example sending client device 102 will remain in a native format (e.g., binary), which consumes a relatively smaller memory storage footprint and preserves an inherent security of the composite that is sent via the example network 106.
The example task storage interface 210 determines whether the metadata reference has been sent to the target peer on a prior occasion (block 808). As discussed above, the example client payload engine may distribute composite metadata as soon as it is available, such as when one or more peers is experiencing a relatively low computational demand. If the metadata reference has not been previously sent, then the example client payload engine 202 sends the payload (e.g., a composite within the payload) with (a) the metadata reference, (b) a CID associated with the composite, (c) a CLD associated with the composite and (d) the composite in its binary format (block 810). On the other hand, in the event the task storage interface 210 determines that the metadata reference has been sent to the target peer on a prior occasion (block 808), which means that the target peer already has received the corresponding CID and CLD associated with the composite, then the example client payload engine 202 sends only the composite in its binary format (block 812). In still other examples, the client payload engine 202 always sends the payload with the metadata reference by default. In the event the receiving peer does not have the corresponding composite metadata, then it sends a request that is acknowledged by and/or otherwise serviced by the client payload engine 202 to send the composite metadata.
While the example programs of
So that the example receiving server device 104 can process the received payload, which includes a composite binary that may have an architecture format different than that of the example receiving server device 104, the example server metadata manager 406 generates its own server-side CID file and server-side CLD file (block 1108). Generally speaking, the server-side CID file and server-side CLD file stores corresponding metadata information associated with the sending peer (e.g., the sending client device 102) in a manner that permits resolution and mapping for architecture specific requirements of the receiving server device 104. As described above, the example server metadata manager 406 populates the server-side CID and the server-side CLD with the corresponding metadata translated and/or otherwise compared by the translation engine 180 in view of the received CID and CLD from the peer (block 1110). Based on the architecture of the receiving server device 104, the example translation engine 180 resolves architecture discrepancies by assigning each element with an offset value in the server-side CLD (block 1112). Additionally, if the example enumeration engine 170 determines that the composite is of type ENUM (block 1113), then the enumeration engine 170 resolves enumeration nomenclature discrepancies that may exist between the example sending client device 102 and the example receiving server device 104 (block 1150), as described in further detail below. Control then returns to block 1102.
Returning to block 1104, in the event that the example server metadata manager 406 includes a matching composite metadata reference, then the example server storage interface 408 retrieves the previously stored server-side CID and server-side CLD associated with the received metadata reference (block 1114). The example translator system 424 accesses the previously stored server-side metadata (e.g., the server-side CID 500 and the server-side CLD 550) as shown in
While the example receiving server-side device 104 has been described above with reference to a network peer (e.g., the example sending client device 102) that provides one or more composite binaries for collection, the receiving server-side device 104 also services requests from other peers (e.g., networked peers, same-platform peers, etc.) that demand a translated version of the composite binary (a translation request). As described above, translation requests originate from peer devices that may have varying preferences on the format of the composite data to be retrieved, such as plain text, XML, JSON, etc. As such, the example translation engine 180 includes any number of different format encoders 426 in the example translation engine 180 to accommodate for particular encoding type formats. Returning to block 1102, in the event a payload (e.g., a composite binary) has not been received, the example request manager 420 determines whether a translation request has occurred (block 1120). If not, then the example service payload monitor 404 determines whether an ENUM mapping request has been received (block 1122) and, if so, the example ENUM engine 170 services the ENUM mapping request (block 1420), as described in further detail below. However, in response to detecting a translation request (block 1120), then the example translation engine 180 services the request (block 1124), such as a request from one of the example translation request entities 182.
Returning to block 1204, in the event the example format resolver 422 determines that the requested format is not already available in the example server data store 116, which may occur when the binary composite is translated for the first time in response to a request, then the example translator system 424 retrieves the stored binary and associated metadata (e.g., the example server-side CID 500 and server-side CLD 550 of
Returning to
In the event the exception generator 416 of the enumeration engine 170 identifies a mismatch (e.g., an element position mismatch, an element name mismatch, an element value mismatch, etc.) between the peers (e.g., a mismatch between the ENUM element order of the example first peer 702 as compared with the ENUM element order of the example second peer 704) (block 1408), then the example exception generator 416 determines whether secondary (or other) resolution is available (block 1410). As described above, secondary resolution may be based on one or more element parameters (e.g., element names) that are common to both the example first peer 702 and the example second peer 704. If available, then the example resolution table manager 414 establishes corresponding parameters for mapping (block 1412). For example, and as shown in the illustrated example of
In the event the example exception generator 416 determines that there is no mismatch (e.g., element position mismatch) between the ENUM composites of the example first peer 702 and the example second peer 704 (block 1408), then the example resolution table manager 414 establishes corresponding parameters for mapping (block 1418), and stores those mappings in the example server data storage 116 for future reference (block 1414).
While the illustrated example program 1150 of
The processor platform 1500 of the illustrated example includes a processor 1512. The processor 1512 of the illustrated example is hardware. For example, the processor 1512 can be implemented by one or more integrated circuits, logic circuits, microprocessors or controllers from any desired family or manufacturer. In the illustrated example of
The processor 1512 of the illustrated example includes a local memory 1513 (e.g., a cache). The processor 1512 of the illustrated example is in communication with a main memory including a volatile memory 1514 and a non-volatile memory 1516 via a bus 1518. The volatile memory 1514 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. The non-volatile memory 1516 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 1514, 1516 is controlled by a memory controller.
The processor platform 1500 of the illustrated example also includes an interface circuit 1520. The interface circuit 1520 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface.
In the illustrated example, one or more input devices 1522 are connected to the interface circuit 1520. The input device(s) 1522 permit(s) a user to enter data and commands into the processor 1512. The input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video), a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint, a voice recognition system and/or any other human-machine interface.
One or more output devices 1524 are also connected to the interface circuit 1520 of the illustrated example. The output devices 1524 can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen, a tactile output device, a printer and/or speakers). The interface circuit 1520 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip or a graphics driver processor.
The interface circuit 1520 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 1526 (e.g., an Ethernet connection, a digital subscriber line (DSL) to facilitate exchange of data within a similar machine platform (e.g., a communication bus), a telephone line, coaxial cable, a cellular telephone system, etc.). In the illustrated example of
The processor platform 1500 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 1526 and/or the network 106 (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.).
The processor platform 1500 of the illustrated example also includes one or more mass storage devices 1528 for storing software and/or data. Examples of such mass storage devices 1528 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and digital versatile disk (DVD) drives. In some examples, the mass storage device 1530 may implement the example payload storage 108 and/or the example server data store 116.
The coded instructions 1532 of
Although certain example methods, apparatus and articles of manufacture have been disclosed herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.
Example 1 is an apparatus to improve network transmission efficiency of a sending peer that includes an encoder interface to prevent an encoder from encoding data in a native format to a target format associated with a requesting peer in response to a transmission trigger, a composite interface description (CID) engine to generate architecture agnostic metadata of the data in the native format, a composite layout description (CLD) engine to generate architecture specific metadata of the data in the native format, the architecture specific metadata identifying offset values associated with elements of the data in the native format, and a client payload engine to improve the network transmission efficiency by sending unencoded data combined with the architecture agnostic metadata and the architecture specific metadata to the requesting peer having an architecture different than that of the sending peer.
Example 2 includes the subject matter of example 1, wherein the unencoded data includes a storage footprint lower than that of the data in the native format after encoding by the encoder.
Example 3 includes the subject matter of example 1, wherein the data in the native format includes a binary format.
Example 4 includes the subject matter of example 1, wherein the target format includes at least one of an extensible markup language format, an abstract syntax notation format, or a text format.
Example 5 includes the subject matter of example 1, wherein the data in the native format includes a composite associated with a type.
Example 6 includes the subject matter of example 5, wherein the type includes at least one of a C-structure or an enumeration.
Example 7 includes the subject matter of example 1, further including a pointer manager to identify a first one of the elements in the data in the native format.
Example 8 includes the subject matter of example 7, further including a CID file generator to generate a CID file to store the architecture agnostic metadata.
Example 9 includes the subject matter of example 8, wherein the CID file generator is to encode element data into the CID file.
Example 10 includes the subject matter of example 9, wherein the element data includes at least one of a composite type, a composite name, a composite element name, or a composite element type.
Example 11 includes the subject matter of example 7, further including a CLD file generator to generate a CLD file to store the architecture specific metadata.
Example 12 includes the subject matter of example 11, further including a payload analyzer to identify the offset values associated with the elements of the data in the native format, and write the offset values in the CLD file.
Example 13 includes the subject matter of example 1, further including a metadata reference manager to generate a metadata reference associated with the combined architecture agnostic metadata and the architecture specific metadata.
Example 14 includes the subject matter of example 1, further including a task process compiler to compile the architecture agnostic metadata and the architecture specific metadata into a task executable of the sending peer.
Example 15 is a method to improve network transmission efficiency of a sending peer, including preventing an encoder from encoding data in a native format to a target format associated with a requesting peer in response to a transmission trigger, generating architecture agnostic metadata of the data in the native format, generating architecture specific metadata of the data in the native format, the architecture specific metadata identifying offset values associated with elements of the data in the native format, and improving the network transmission efficiency by sending unencoded data combined with the architecture agnostic metadata and the architecture specific metadata to the requesting peer having an architecture different than that of the sending peer.
Example 16 includes the subject matter of example 15, wherein the unencoded data includes a storage footprint lower than that of the data in the native format after encoding by the encoder.
Example 17 includes the subject matter of example 15, wherein the data in the native format includes a binary format.
Example 18 includes the subject matter of example 15, wherein the target format includes at least one of an extensible markup language format, an abstract syntax notation format, or a text format.
Example 19 includes the subject matter of example 15, wherein the data in the native format includes a composite associated with a type.
Example 20 includes the subject matter of example 19, wherein the type includes at least one of a C-structure or an enumeration.
Example 21 includes the subject matter of example 15, further including identifying a first one of the elements in the data in the native format.
Example 22 includes the subject matter of example 21, further including generating a composite interface description (CID) file to store the architecture agnostic metadata.
Example 23 includes the subject matter of example 22, further including encoding element data into the CID file.
Example 24 includes the subject matter of example 23, wherein the element data includes at least one of a composite type, a composite name, a composite element name, or a composite element type.
Example 25 includes the subject matter of example 21, further including generating a composite layout description (CLD) file to store the architecture specific metadata.
Example 26 includes the subject matter of example 25, further including identifying the offset values associated with the elements of the data in the native format, and writing the offset values in the CLD file.
Example 27 includes the subject matter of example 15, further including generating a metadata reference associated with the combined architecture agnostic metadata and the architecture specific metadata.
Example 28 includes the subject matter of example 15, further including compiling the architecture agnostic metadata and the architecture specific metadata into a task executable of the sending peer.
Example 29 is a tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor to at least prevent an encoder from encoding data in a native format to a target format associated with a requesting peer in response to a transmission trigger, generate architecture agnostic metadata of the data in the native format, generate architecture specific metadata of the data in the native format, the architecture specific metadata identifying offset values associated with elements of the data in the native format, and improve the network transmission efficiency by sending unencoded data combined with the architecture agnostic metadata and the architecture specific metadata to the requesting peer having an architecture different than that of the sending peer.
Example 30 includes the subject matter of example 29, wherein the instructions are to cause the processor to transmit the unencoded data in a storage footprint lower than that of the data in the native format after encoding by the encoder.
Example 31 includes the subject matter of example 29, wherein the instructions are to cause the processor to transmit the native format as a binary format.
Example 32 includes the subject matter of example 29, wherein the instructions are to cause the processor to identify a first one of the elements in the data in the native format.
Example 33 includes the subject matter of example 32, wherein the instructions are to cause the processor to generate a composite interface description (CID) file to store the architecture agnostic metadata.
Example 34 includes the subject matter of example 33, wherein the instructions are to cause the processor to encode element data into the CID file.
Example 35 includes the subject matter of example 32, wherein the instructions are to cause the processor to generate a composite layout description (CLD) file to store the architecture specific metadata.
Example 36 includes the subject matter of example 35, wherein the instructions are to cause the processor to identify the offset values associated with the elements of the data in the native format, and write the offset values in the CLD file.
Example 37 includes the subject matter of example 29, wherein the instructions are to cause the processor to generate a metadata reference associated with the combined architecture agnostic metadata and the architecture specific metadata.
Example 38 includes the subject matter of example 29, wherein the instructions are to cause the processor to compile the architecture agnostic metadata and the architecture specific metadata into a task executable of the sending peer.
Example 39 is a system to improve network transmission efficiency of a sending peer, including means for preventing an encoder from encoding data in a native format to a target format associated with a requesting peer in response to a transmission trigger, means for generating architecture agnostic metadata of the data in the native format, means for generating architecture specific metadata of the data in the native format, the architecture specific metadata identifying offset values associated with elements of the data in the native format, and means for improving the network transmission efficiency by sending unencoded data combined with the architecture agnostic metadata and the architecture specific metadata to the requesting peer having an architecture different than that of the sending peer.
Example 40 includes the subject matter of example 39, wherein the unencoded data includes a storage footprint lower than that of the data in the native format after encoding by the encoder.
Example 41 includes the subject matter of example 39, wherein the data in the native format includes a binary format.
Example 42 includes the subject matter of example 39, wherein the target format includes at least one of an extensible markup language format, an abstract syntax notation format, or a text format.
Example 43 includes the subject matter of example 39, wherein the data in the native format includes a composite associated with a type.
Example 44 includes the subject matter of example 43, wherein the type includes at least one of a C-structure or an enumeration.
Example 45 includes the subject matter of example 39, further including means for identifying a first one of the elements in the data in the native format.
Example 46 includes the subject matter of example 45, further including means for generating a composite interface description (CID) file to store the architecture agnostic metadata.
Example 47 includes the subject matter of example 46, wherein the means for generating a CID file is to encode element data into the CID file.
Example 48 includes the subject matter of example 47, wherein the element data includes at least one of a composite type, a composite name, a composite element name, or a composite element type.
Example 49 includes the subject matter of example 45, further including a means for generating a composite layout description (CLD) file to store the architecture specific metadata.
Example 50 includes the subject matter of example 49, further including means for identifying the offset values associated with the elements of the data in the native format, and means for writing the offset values in the CLD file.
Example 51 includes the subject matter of example 39, further including means for generating a metadata reference associated with the combined architecture agnostic metadata and the architecture specific metadata.
Example 52 includes the subject matter of example 39, further including means for compiling the architecture agnostic metadata and the architecture specific metadata into a task executable of the sending peer.
Example 53 is an example apparatus to resolve data retrieved by a receiving peer having an incompatible architectural format, including a server storage interface to retrieve: a composite having the incompatible architectural format, a client-side composite interface description (CID) having architecture agnostic metadata associated with the composite, and a client-side composite layout description (CLD) having architecture specific metadata associated with the composite, a server metadata manager to: encode a server-side CID with the architecture agnostic metadata of the client-side CID, encode a server-side CLD with the architecture specific metadata of the client-side CLD, and a translation engine to generate offset values for respective elements of the server-side CLD based on an architecture type of the receiving peer.
Example 54 includes the subject matter of example 53, further including a request manager to detect a request to render the data having the incompatible architectural format.
Example 55 includes the subject matter of example 54, further including a format resolver to identify a format type of the request.
Example 56 includes the subject matter of example 55, further including a translation engine to translate the respective elements of the data retrieved by the receiving peer based on (a) respective offset values of the respective elements and (b) the format type of the request.
Example 57 includes the subject matter of example 56, wherein the translation engine is to forward the translated respective elements of the data to a requestor of the request.
Example 58 includes the subject matter of example 54, wherein the server storage interface is to reduce a computational demand of the receiving peer during a subsequent request by associating the client-side CID and the client-side CLD with a receiving peer metadata reference.
Example 59 includes the subject matter of example 53, wherein the server storage interface is to associate the server-side CID and the server-side CLD with the receiving peer metadata reference.
Example 60 includes the subject matter of example 59, wherein the server metadata manager is to improve a computational efficiency of the receiving peer by bypassing encoding of the server-side CID and the server-side CLD when the data retrieved by the receiving peer includes a sending peer metadata reference that matches the receiving peer metadata reference.
Example 61 includes the subject matter of example 60, wherein the server metadata manager is to retrieve the server-side CID and the server-side CLD from a local storage when the sending peer metadata reference matches the receiving peer metadata reference.
Example 62 is a method to resolve data retrieved by a receiving peer having an incompatible architectural format, including retrieving a composite having the incompatible architectural format, a client-side composite interface description (CID) having architecture agnostic metadata associated with the composite, and a client-side composite layout description (CLD) having architecture specific metadata associated with the composite, encoding a server-side CLD with the architecture agnostic metadata of the client-side CID, and encoding a server side CLD with the architecture specific metadata of the client-side CLD, and generating offset values for respective elements of the server-side CLD based on an architecture type of the receiving peer.
Example 63 includes the subject matter of example 62, further including detecting a request to render the data having the incompatible architectural format.
Example 64 includes the subject matter of example 63, further including identifying a format type of the request.
Example 65 includes the subject matter of example 64 further including translating the respective elements of the data retrieved by the receiving peer based on (a) respective offset values of the respective elements and (b) the format type of the request.
Example 66 includes the subject matter of example 65, further including forwarding the translated respective elements of the data to a requestor of the request.
Example 67 includes the subject matter of example 63, further including reducing a computational demand of the receiving peer during a subsequent request by associating the client-side CID and the client-side CLD with a receiving peer metadata reference.
Example 68 includes the subject matter of example 62, further including associating the server-side CID and the server-side CLD with the receiving peer metadata reference.
Example 69 includes the subject matter of example 68, further including improving a computational efficiency of the receiving peer by bypassing encoding of the server-side CID and the server-side CLD when the data retrieved by the receiving peer includes a sending peer metadata reference that matches the receiving peer metadata reference.
Example 70 includes the subject matter of example 69, further including retrieving the server-side CID and the server-side CLD from a local storage when the sending peer metadata reference matches the receiving peer metadata reference.
Example 71 is a tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor to at least retrieve a composite having the incompatible architectural format, a client-side composite interface description (CID) having architecture agnostic metadata associated with the composite, and a client-side composite layout description (CLD) having architecture specific metadata associated with the composite, encode a server-side CLD with the architecture agnostic metadata of the client-side CID, and encode a server side CLD with the architecture specific metadata of the client-side CLD, and generate offset values for respective elements of the server-side CLD based on an architecture type of the receiving peer.
Example 72 includes the subject matter of example 71, wherein the instructions are to cause the processor to detect a request to render the data having the incompatible architectural format.
Example 73 includes the subject matter of example 72, wherein the instructions are to cause the processor to identify a format type of the request.
Example 74 includes the subject matter of example 73, wherein the instructions are to cause the processor to translate the respective elements of the data retrieved by the receiving peer based on (a) respective offset values of the respective elements and (b) the format type of the request.
Example 75 includes the subject matter of example 74, wherein the instructions are to cause the processor to forward the translated respective elements of the data to a requestor of the request.
Example 76 includes the subject matter of example 72, wherein the instructions are to cause the processor to reduce a computational demand of the receiving peer during a subsequent request by associating the client-side CID and the client-side CLD with a receiving peer metadata reference.
Example 77 includes the subject matter of example 71, wherein the instructions are to cause the processor to associate the server-side CID and the server-side CLD with the receiving peer metadata reference.
Example 78 includes the subject matter of example 77, wherein the instructions are to cause the processor to improve a computational efficiency of the receiving peer by bypassing encoding of the server-side CID and the server-side CLD when the data retrieved by the receiving peer includes a sending peer metadata reference that matches the receiving peer metadata reference.
Example 79 includes the subject matter of example 78, wherein the instructions are to cause the processor to retrieve the server-side CID and the server-side CLD from a local storage when the sending peer metadata reference matches the receiving peer metadata reference.
Example 80 is a system to resolve data retrieved by a receiving peer having an incompatible architectural format, including means for retrieving a composite having the incompatible architectural format, means for retrieving a client-side composite interface description (CID) having architecture agnostic metadata associated with the composite, means for retrieving a client-side composite layout description (CLD) having architecture specific metadata associated with the composite, means for encoding a server-side CLD with the architecture agnostic metadata of the client-side CID, and means for encoding a server side CLD with the architecture specific metadata of the client-side CLD, and means for generating offset values for respective elements of the server-side CLD based on an architecture type of the receiving peer.
Example 81 includes the subject matter of example 80, further including means for detecting a request to render the data having the incompatible architectural format.
Example 82 includes the subject matter of example 81, further including means for identifying a format type of the request.
Example 83 includes the subject matter of example 82, further including means for translating the respective elements of the data retrieved by the receiving peer based on (a) respective offset values of the respective elements and (b) the format type of the request.
Example 84 includes the subject matter of example 83, further including means for forwarding the translated respective elements of the data to a requestor of the request.
Example 85 includes the subject matter of example 81, further including means for reducing a computational demand of the receiving peer during a subsequent request by associating the client-side CID and the client-side CLD with a receiving peer metadata reference.
Example 86 includes the subject matter of example 80, further including means for associating the server-side CID and the server-side CLD with the receiving peer metadata reference.
Example 87 includes the subject matter of example 86, further including means for improving a computational efficiency of the receiving peer by bypassing encoding of the server-side CID and the server-side CLD when the data retrieved by the receiving peer includes a sending peer metadata reference that matches the receiving peer metadata reference.
Example 88 includes the subject matter of example 87, further including means for retrieving the server-side CID and the server-side CLD from a local storage when the sending peer metadata reference matches the receiving peer metadata reference.
Example 89 is an apparatus to prevent binary translation of a sending peer enumeration (ENUM) composite, including a server storage interface to retrieve sending peer metadata associated with the sending peer ENUM composite, a resolution table manager to generate an enumeration resolution table (ERT) to compare the sending peer metadata with receiving peer metadata associated with a receiving peer ENUM composite, and an exception generator to improve receiving peer computation demands by preventing translation of the sending peer ENUM composite by identifying matching elements based on respective element index positions of (a) the sending peer metadata and (b) the receiving peer metadata.
Example 90 includes the subject matter of example 89, wherein the resolution table manager is to identify respective target values of a receiving peer ENUM composite based on a mapping request value associated with the sending peer ENUM composite.
Example 91 includes the subject matter of example 90, wherein the exception generator is to identify a mismatch of one of the respective element index positions between (a) the sending peer metadata and (b) the receiving peer metadata.
Example 92 includes the subject matter of example 91, wherein the exception generator is to identify a secondary resolution parameter in response to identifying the mismatch.
Example 93 includes the subject matter of example 92, wherein the second resolution parameter includes an element name that is common to (a) the sending peer metadata and (b) the receiving peer metadata.
Example 94 includes the subject matter of example 91, wherein the resolution table manager establishes a mapping link between the sending peer ENUM composite and the receiving peer ENUM composite based on the secondary resolution parameter.
Example 95 includes the subject matter of example 91, wherein the exception generator is to invoke an exception for a respective element that includes (a) the mismatch and (b) no available secondary resolution parameter.
Example 96 is a method to prevent binary translation of a sending peer enumeration (ENUM) composite, including retrieving sending peer metadata associated with the sending peer ENUM composite, generating an enumeration resolution table (ERT) to compare the sending peer metadata with receiving peer metadata associated with a receiving peer ENUM composite, and improving receiving peer computation demands by preventing translation of the sending peer ENUM composite by identifying matching elements based on respective element index positions of (a) the sending peer metadata and (b) the receiving peer metadata.
Example 97 includes the subject matter of example 96, further including identifying respective target values of a receiving peer ENUM composite based on a mapping request value associated with the sending peer ENUM composite.
Example 98 includes the subject matter of example 96, further including identifying a mismatch of one of the respective element index positions between (a) the sending peer metadata and (b) the receiving peer metadata.
Example 99 includes the subject matter of example 98, further including identifying a secondary resolution parameter in response to identifying the mismatch.
Example 100 includes the subject matter of example 99, wherein the second resolution parameter includes an element name that is common to (a) the sending peer metadata and (b) the receiving peer metadata.
Example 101 includes the subject matter of example 98, further including establishing a mapping link between the sending peer ENUM composite and the receiving peer ENUM composite based on the secondary resolution parameter.
Example 102 includes the subject matter of example 98, further including invoking an exception for a respective element that includes (a) the mismatch and (b) no available secondary resolution parameter.
Example 103 is a tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor to at least retrieve sending peer metadata associated with the sending peer ENUM composite, generate an enumeration resolution table (ERT) to compare the sending peer metadata with receiving peer metadata associated with a receiving peer ENUM composite, and improve receiving peer computation demands by preventing translation of the sending peer ENUM composite by identifying matching elements based on respective element index positions of (a) the sending peer metadata and (b) the receiving peer metadata.
Example 104 includes the subject matter of example 103, wherein the instructions are to cause the processor to identify respective target values of a receiving peer ENUM composite based on a mapping request value associated with the sending peer ENUM composite.
Example 105 includes the subject matter of example 103, wherein the instructions are to cause the processor to identify a mismatch of one of the respective element index positions between (a) the sending peer metadata and (b) the receiving peer metadata.
Example 106 includes the subject matter of example 105, wherein the instructions are to cause the processor to identify a secondary resolution parameter in response to identifying the mismatch.
Example 107 includes the subject matter of example 106, wherein the instructions are to cause the processor to include an element name of the second resolution parameter that is common to (a) the sending peer metadata and (b) the receiving peer metadata.
Example 108 includes the subject matter of example 105, wherein the instructions are to cause the processor to establish a mapping link between the sending peer ENUM composite and the receiving peer ENUM composite based on the secondary resolution parameter.
Example 109 includes the subject matter of example 105, wherein the instructions are to cause the processor to invoke an exception for a respective element that includes (a) the mismatch and (b) no available secondary resolution parameter.
Example 110 is a system to prevent binary translation of a sending peer enumeration (ENUM) composite, including means for retrieving sending peer metadata associated with the sending peer ENUM composite, means for generating an enumeration resolution table (ERT) to compare the sending peer metadata with receiving peer metadata associated with a receiving peer ENUM composite, and means for improving receiving peer computation demands by preventing translation of the sending peer ENUM composite by identifying matching elements based on respective element index positions of (a) the sending peer metadata and (b) the receiving peer metadata.
Example 111 includes the subject matter of example 110, further including means for identifying respective target values of a receiving peer ENUM composite based on a mapping request value associated with the sending peer ENUM composite.
Example 112 includes the subject matter of example 110, further including means for identifying a mismatch of one of the respective element index positions between (a) the sending peer metadata and (b) the receiving peer metadata.
Example 113 includes the subject matter of example 112, further including means for identifying a secondary resolution parameter in response to identifying the mismatch.
Example 114 includes the subject matter of example 113, wherein the second resolution parameter includes an element name that is common to (a) the sending peer metadata and (b) the receiving peer metadata.
Example 115 includes the subject matter of example 112, further including means for establishing a mapping link between the sending peer ENUM composite and the receiving peer ENUM composite based on the secondary resolution parameter.
Example 116 includes the subject matter of example 112, further including means for invoking an exception for a respective element that includes (a) the mismatch and (b) no available secondary resolution parameter.
Claims
1.-25. (canceled)
26. An apparatus to resolve data retrieved by a receiving peer having an incompatible architectural format, comprising:
- a server storage interface to retrieve: a composite having the incompatible architectural format; a client-side composite interface description (CID) having architecture agnostic metadata associated with the composite; and a client-side composite layout description (CLD) having architecture specific metadata associated with the composite;
- a server metadata manager to: encode a server-side CID with the architecture agnostic metadata of the client-side CID; encode a server-side CLD with the architecture specific metadata of the client-side CLD; and
- a translation engine to generate offset values for respective elements of the server-side CLD based on an architecture type of the receiving peer.
27. An apparatus as defined in claim 26, further including a request manager to detect a first request to render the data having the incompatible architectural format.
28. An apparatus as defined in claim 27, further including a format resolver to identify a format type of the first request.
29. An apparatus as defined in claim 28, wherein the translation engine is to translate the respective elements of the data retrieved by the receiving peer based on (a) offset values of the respective elements and (b) the format type of the first request.
30. An apparatus as defined in claim 29, wherein the translation engine is to forward the translated respective elements of the data to a requestor of the first request.
31. An apparatus as defined in claim 27, wherein the server storage interface is to reduce a computational demand of the receiving peer during a second request by associating the client-side CID and the client-side CLD with a receiving peer metadata reference.
32. An apparatus as defined in claim 26, wherein the server storage interface is to associate the server-side CID and the server-side CLD with a receiving peer metadata reference.
33. An apparatus as defined in claim 32, wherein the server metadata manager is to improve a computational efficiency of the receiving peer by bypassing encoding of the server-side CID and the server-side CLD when the data retrieved by the receiving peer includes a sending peer metadata reference that matches the receiving peer metadata reference.
34. An apparatus as defined in claim 33, wherein the server metadata manager is to retrieve the server-side CID and the server-side CLD from a local storage when the sending peer metadata reference matches the receiving peer metadata reference.
35. A method to resolve data retrieved by a receiving peer having an incompatible architectural format, comprising:
- retrieving a composite having the incompatible architectural format, a client-side composite interface description (CID) having architecture agnostic metadata associated with the composite, and a client-side composite layout description (CLD) having architecture specific metadata associated with the composite;
- encoding a server-side CLD with the architecture agnostic metadata of the client-side CID, and encoding a server side CLD with the architecture specific metadata of the client-side CLD; and
- generating offset values for respective elements of the server-side CLD based on an architecture type of the receiving peer.
36. A method as defined in claim 35, further including detecting a first request to render the data having the incompatible architectural format.
37. A method as defined in claim 36, further including identifying a format type of the first request.
38. A method as defined in claim 37, further including translating the respective elements of the data retrieved by the receiving peer based on (a) offset values of the respective elements and (b) the format type of the first request.
39. A method as defined in claim 38, further including forwarding the translated respective elements of the data to a requestor of the first request.
40. A method as defined in claim 36, further including reducing a computational demand of the receiving peer during a second request by associating the client-side CID and the client-side CLD with a receiving peer metadata reference.
41. A method as defined in claim 35, further including associating a server-side CID and the server-side CLD with a receiving peer metadata reference.
42. A method as defined in claim 41, further including improving a computational efficiency of the receiving peer by bypassing encoding of the server-side CID and the server-side CLD when the data retrieved by the receiving peer includes a sending peer metadata reference that matches the receiving peer metadata reference.
43. A method as defined in claim 42, further including retrieving the server-side CID and the server-side CLD from a local storage when the sending peer metadata reference matches the receiving peer metadata reference.
44. A tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor to at least:
- retrieve a composite having an incompatible architectural format, a client-side composite interface description (CID) having architecture agnostic metadata associated with the composite, and a client-side composite layout description (CLD) having architecture specific metadata associated with the composite;
- encode a server-side CLD with the architecture agnostic metadata of the client-side CID, and encode a server side CLD with the architecture specific metadata of the client-side CLD; and
- generate offset values for respective elements of the server-side CLD based on an architecture type of a receiving peer.
45. A tangible computer readable storage medium as defined in claim 44, wherein the computer readable instructions are to cause the processor to detect a first request to render data having the incompatible architectural format.
46. A tangible computer readable storage medium as defined in claim 45, wherein the computer readable instructions are to cause the processor to identify a format type of the first request.
47. A tangible computer readable storage medium as defined in claim 46, wherein the computer readable instructions are to cause the processor to translate the respective elements of the data retrieved by the receiving peer based on (a) offset values of the respective elements and (b) the format type of the first request.
48. A tangible computer readable storage medium as defined in claim 47, wherein the computer readable instructions are to cause the processor to forward the translated respective elements of the data to a requestor of the first request.
49. A tangible computer readable storage medium as defined in claim 45, wherein the computer readable instructions are to cause the processor to reduce a computational demand of the receiving peer during a second request by associating the client-side CID and the client-side CLD with a receiving peer metadata reference.
50. A tangible computer readable storage medium as defined in claim 44, wherein the computer readable instructions are to cause the processor to associate a server-side CID and the server-side CLD with a receiving peer metadata reference.
Type: Application
Filed: Mar 25, 2020
Publication Date: Sep 17, 2020
Inventors: Amol Shivaji Dhere (Aalborg East), Henrik Krogh Moeller (Svenstrup)
Application Number: 16/829,810