Explain the communications of request or response interface, Operating System

Assignment Help:

Explain the Communications of Request or Response Interface

The inter-application communication must provide four specific interface to the CSInterface() components. A client must be able to send and receive from the server and the server must be able to receive from the client and return results. The communications interface must provide these generic services to the application layer while remaining transport independent at the bottom layer. Communications interface components may be required to perform more advanced functions than simple send and receive. First, it is their responsibility to mask the underlying protocols from the developer.

Second the communications interface must manage the modes of operation for CSInterface(). Our previous example of CSInterface() used CallServer() to communicate with the server computer. The client uses the CallServer() procedure to send request to the server in either synchronous or asynchronous mode:

  • In synchronous mode, client request will be returned upon receipt of results from the server.
  • In asynchronous mode, the CallServer() function will need to send the request to the server and immediately return.

 

Third, with the inclusion of callback procedures, the communications interface component must initiate the callback to the application- level code. Callbacks are most easily managed by including a pointer to the procedure in the REQHEADER for each CSInterface() call as documented in the previous section.

When the server returns the result of executed procedure, the communications interface can scan the REQHEADER for configured callbacks. If they exist, the communications interface should dispatch CSInterfaceSetupCallback() for setup and execution of the callback.


Related Discussions:- Explain the communications of request or response interface

Naming scheme for servers in an enterprise, Problem: Within a corporate...

Problem: Within a corporate environment, there are usually many servers located across various departments. Naming of servers is often a tedious task. In many circumstances, w

Explain what type of group scope you will use, Question: (a) The actual...

Question: (a) The actual use and scope groups depend on the mode in which a domain is running. There are two domain modes in which you can run a Windows 2000 domain. List and d

OS is a resource allocator and control program, why we say OS is a resource...

why we say OS is a resource allocator and control program

Locks - mutexes, Locks (also known as mutexes, short for mutual exclusion l...

Locks (also known as mutexes, short for mutual exclusion locks) provide mutual exclusion to shared data inside a critical session. They are implemented by means of two atomic routi

What are files and explain the access methods for files, What are files and...

What are files and explain the access methods for files? File definition Attributes, operations and types Direct access Sequential access with diagram Other access

What are kernels and what do kernels do, What are kernels and what do kerne...

What are kernels and what do kernels do? The kernel is a program that comprises the central core of a computer operating   system. It has entire control over everything that

Multi user systems technology, describe main points of multiuser and multi ...

describe main points of multiuser and multi tasking operating systems.

What are the different types of semaphore?, What are the different types of...

What are the different types of semaphore? Principally the semaphore is able to be classified into two on the basis of their values a)      Counting semaphore: In counting s

Write a brief note on demand paging, Write a brief note on demand paging. ...

Write a brief note on demand paging. A demand paging is alike to a paging system with swapping. The Processes reside on the secondary memory while we want to implement a proces

Explain concept of buffering, Buffering Messages exchanged by communica...

Buffering Messages exchanged by communication processes reside in a impermanent queue. Such a queue can be executed in three ways. Zero capacity: The queue length is 0.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd