Explain the communications of request or response interface, Operating System

Assignment Help:

Explain the Communications of Request or Response Interface

The inter-application communication must provide four specific interface to the CSInterface() components. A client must be able to send and receive from the server and the server must be able to receive from the client and return results. The communications interface must provide these generic services to the application layer while remaining transport independent at the bottom layer. Communications interface components may be required to perform more advanced functions than simple send and receive. First, it is their responsibility to mask the underlying protocols from the developer.

Second the communications interface must manage the modes of operation for CSInterface(). Our previous example of CSInterface() used CallServer() to communicate with the server computer. The client uses the CallServer() procedure to send request to the server in either synchronous or asynchronous mode:

  • In synchronous mode, client request will be returned upon receipt of results from the server.
  • In asynchronous mode, the CallServer() function will need to send the request to the server and immediately return.

 

Third, with the inclusion of callback procedures, the communications interface component must initiate the callback to the application- level code. Callbacks are most easily managed by including a pointer to the procedure in the REQHEADER for each CSInterface() call as documented in the previous section.

When the server returns the result of executed procedure, the communications interface can scan the REQHEADER for configured callbacks. If they exist, the communications interface should dispatch CSInterfaceSetupCallback() for setup and execution of the callback.


Related Discussions:- Explain the communications of request or response interface

Explain memory management using link lists, MEMORY MANAGEMENT USING LINK LI...

MEMORY MANAGEMENT USING LINK LISTS The first one is for showing it is process or hole, second is for starting address and third is for length of the process and last is a point

Pthreads, A thread is defined as an independent stream of instructions that...

A thread is defined as an independent stream of instructions that can be scheduled to run as such by the operating system. Each program contains a number of threads which can be ru

Dynamically linked segmentation system, Sharing segments between processes ...

Sharing segments between processes without requiring the same segment number is possible in a dynamically linked segmentation system. a. Define a system that permits sta

Command interpreters, Develop a user mode command interpreter which support...

Develop a user mode command interpreter which support these functions: "list-short" -- just like ls without any options "list-long" -- same as ls -l "change" -- same as cd Your co

Packets and time division multiplexing (tdm), Broken data into small packet...

Broken data into small packets allow time division multiplexing. In TDM every packet leaves the sender and is switched on the shared interaction channel through a multiplexer. At t

Explain gui based operating system, GUI - Short for Graphical User Interfa...

GUI - Short for Graphical User Interface a GUI Operating System contains icons and graphics and is commonly navigated by using a computer mouse. Below are some instances of GUI Op

First-in-first-out (fifo), FIFO is named as 'named pipes'. FIFO (first-in-...

FIFO is named as 'named pipes'. FIFO (first-in-first-out) is a special file which is laid to be data transient. Once data is load from named pipe, it cannot be load again. Also, da

Write a short note on pcb, Write a short note on PCB? Every process is ...

Write a short note on PCB? Every process is represented in the operating system by a process control block also called a task control block. It contains more information regard

Bounded and unbounded buffer, Ask question #Minimum 100 difference between ...

Ask question #Minimum 100 difference between bounded and unbounded buffer words accepted#

Data races, Research the phenomenon of data races. Give an example of how...

Research the phenomenon of data races. Give an example of how an unprotected data race can give rise to data inconsistency. How do OpenMP and Cilk resolve this problem? Data

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd