Explain the communications of request or response interface, Operating System

Assignment Help:

Explain the Communications of Request or Response Interface

The inter-application communication must provide four specific interface to the CSInterface() components. A client must be able to send and receive from the server and the server must be able to receive from the client and return results. The communications interface must provide these generic services to the application layer while remaining transport independent at the bottom layer. Communications interface components may be required to perform more advanced functions than simple send and receive. First, it is their responsibility to mask the underlying protocols from the developer.

Second the communications interface must manage the modes of operation for CSInterface(). Our previous example of CSInterface() used CallServer() to communicate with the server computer. The client uses the CallServer() procedure to send request to the server in either synchronous or asynchronous mode:

  • In synchronous mode, client request will be returned upon receipt of results from the server.
  • In asynchronous mode, the CallServer() function will need to send the request to the server and immediately return.

 

Third, with the inclusion of callback procedures, the communications interface component must initiate the callback to the application- level code. Callbacks are most easily managed by including a pointer to the procedure in the REQHEADER for each CSInterface() call as documented in the previous section.

When the server returns the result of executed procedure, the communications interface can scan the REQHEADER for configured callbacks. If they exist, the communications interface should dispatch CSInterfaceSetupCallback() for setup and execution of the callback.


Related Discussions:- Explain the communications of request or response interface

Case studies, Did Abhinav agree to the initial timeline requested by Rebecc...

Did Abhinav agree to the initial timeline requested by Rebecca

Semaphore, define semaphore. how can we use semaphore to deal with n-proces...

define semaphore. how can we use semaphore to deal with n-process critical section problem.

Explain about deadlock prevention, Explain about deadlock prevention? I...

Explain about deadlock prevention? In order for the occurrence of deadlock, the four conditions like mutual exclusion, hold and wait, no pre-emption and  circular wait must hap

Deadlocks, At the end of this lecture, and into the next lecture, we will d...

At the end of this lecture, and into the next lecture, we will discuss the last major type of logical error that can occurwhen programming with threads. A deadlock occurswhen two t

Definition of operating system, Q. Definition of Operating System? Defi...

Q. Definition of Operating System? Definition of Operating System: • An Operating system is a program which controls execution of application programs and acts as an interfa

Problem of unbalanced loads, Present your own fully documented and tested p...

Present your own fully documented and tested programming example illustrating the problem of unbalanced loads. Describe the use of OpenMP's scheduler as a means of mitigating this

Explain schemes for defining the logical structure, What are the most commo...

What are the most common schemes for defining the logical structure of a directory? The most common schemes for explaining the logical structure of a directory Single-L

Data transfer between two processes, Q. Data transfer between two processes...

Q. Data transfer between two processes? Communication: Data transfer between two processes is essential for some time. Both processes are on the one computer or on different

Explain the os/2 operating system, Explain the OS/2 Operating System Li...

Explain the OS/2 Operating System Like NetWare, OS/2 manage resources at three levels, as shown in Figure 4.5 Resources may be maintained at the session, process, and thread le

Virtual addresses, Virtual addresses are made up of two parts: the ?rst par...

Virtual addresses are made up of two parts: the ?rst part is the page number, and the second part is an offset inside that page. Suppose our pages are 4kb (4096 = 212 bytes) long,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd