Explain processing predefined application protocols, Operating System

Assignment Help:

Explain Processing Predefined Application Protocols

Implementing and swift processing of predefined application protocols is sure to improve performance of server - side applications. As we learned earlier, they are geared for high performance by a twofold mechanism. First, because they are inflexible, a minimal amount of time is spent massaging parameters into communications buffers. Second, they may be efficiently processed by the server application if properly architected.

In fact, even a flexible application- level protocol can be made much more efficient at the server with good coding techniques. Fundamentally, a server component is either aware of its execution as a separate server component or unaware; as is the case with RPCs. Optimizing the execution based on the efficient processing of application-level protocols requires the server components to become very aware. The modification is simple, however. Server processing of application-level protocols can be optimized by passing actual protocol buffers to the server procedure for processing. This removes the overhead of unpacking the protocols, and possibly the wasted memory space of copying the inter- application protocol data into formalized parameters.


Related Discussions:- Explain processing predefined application protocols

What is single-level directory, What is Single-level Directory All file...

What is Single-level Directory All files are constrained in the similar directory, which is simple to support and understood. One limitation is when the number of files enhance

Determine a critical section is a program segment, Determine a critical sec...

Determine a critical section is a program segment  Critical section is where shared resources are accessed

Define deadlock avoidance, Define deadlock avoidance. An alternative me...

Define deadlock avoidance. An alternative method for avoiding deadlocks is to need additional information about how resources are to be requested. Every request requires the sy

Time-Sharing Operating System, Advantages and disadvantages of time-sharing...

Advantages and disadvantages of time-sharing operating system

Optimal replacement policy, The optimal replacement policy, called OPT, is ...

The optimal replacement policy, called OPT, is to evict the page which will be accessed farthest into the future. Since we can't predict the future precisely, we can't implement OP

Garbage collection, The dynamic memory allocator is a layer between the app...

The dynamic memory allocator is a layer between the application and the OS, managing heap objects. When a program requests memory from the allocator (via malloc(), for instance), t

Cpu scheduling algorithm, Q. A CPU scheduling algorithm determined an orde...

Q. A CPU scheduling algorithm determined an order for the execution of its scheduled processes. Convinced n processes to be scheduled on one processor how numerous possible differ

Differentiate pre-emptive and non-preemptive scheduling, Differentiate pre-...

Differentiate pre-emptive and non-preemptive scheduling In a pre-emptive scheduling technique, CPU can be taken away from a process if there is a requirement while in a non-pre

Request or response interface - interaction using message, Explain the Requ...

Explain the Request or Response interface The Request/Response interface is ideal for a message based client-server interaction. By modeling components to interact via a reque

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd