ImageVerifierCode 换一换
格式:PDF , 页数:31 ,大小:2MB ,
资源ID:1256918      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-1256918.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ISO IEC 15851-1999 Information technology - Communication protocol - Open MUMPS interconnect《信息技术 通信协议 开放MUMPS互连》.pdf)为本站会员(twoload295)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ISO IEC 15851-1999 Information technology - Communication protocol - Open MUMPS interconnect《信息技术 通信协议 开放MUMPS互连》.pdf

1、INTERNATIONAL STANDARD ISOIIEC 15851 First edition 1999-03-01 Information technology - Communication protocol - Open MUMPS Interconnect Technologies de /information - Protocole de communication - lnterconnexion de syst the additional text is for information only: - environment: 7.1.2.4 identifies a

2、specific set of all possible names - a name space. A particular name may appear only once in an environment. Typical implementations place an environment in a directory or a user class, and - with a network - on a node as well. - gv 7.1.2.4 Global variables are persistent data records organized into

3、 trees. CJJJ is the name of a global variable, for example: “INV(5321 ,“Denver”,“qu”) A global variable may optionally have a value, and it may optionally have descendants. A tree of global variables is informally called a “global.” - naked reference: 7.1.2.4 a shorthand form of gv referring to the

4、last-used gv. - nref: 8.2.12 The objects of database lock operations are organized into trees. Their names are similar to qvns, but they relate to gvs only by an applications convention. nrefs have no values. - $Data: 7.1.5.3 Function of a gv indicates whether the variable it names has a value and w

5、hether it has descendants. - $Get: 7.1.5.7 Function of a gv returns the value of the variable it names, or the empty string if the variable is not defined. - $Job: 7.1.4.10 An unsigned decimal integer uniquely identifies a process on a particular computer. 2 0 ISO/IEC ISOAEC 15851:1999(E) - Kill: 8.

6、2.11 deletes a global variable and its descendants. - Lock+: 8.2.12 claims exclusive use of an nref or a list of nrefs. If the claim succeeds, other concurrent processes claims on those nrefs will not succeed. - Lock-: 8.2.12 releases a claim on an nref or a list of nrefs. - Merge: 8.2.13 assigns th

7、e value of one variable to another and then assigns the values of all the first variables descendants to corresponding descendants of the second variable. - $Order: 7.1511 Function of a gvt returns the final subscript of the next qvn in a defined tree-walking order. - $Query: 7.1.5.15 Function of a

8、gv returns the next gv in a defined tree-walking order. - Set: 8.2.18 creates a global variable and assigns it a value. - Set $Extracf: 8.2.18 creates a global variable and modifies its value by assigning a range of its character positions. - Set $Piece: 8.2.18 creates a global variable and modifies

9、 its value by assigning one or more of its pieces. B.6 (of this International Standard, not Xl 1 .l) suggests how implementations may combine these basic operations to achieve more complex MUMPS operations. 4.2 OMI and the OSI network model OMI provides the services described by levels 5 and 6 of th

10、e Open Systems Interconnect model. Level 5, the session layer, involves creating and terminating communication sessions between cooperating systems, while Level 6, the presentation layer, deals with data formats. These OMI services make the network transparent to applications (OSI level 7) for their

11、 remote database operations. In turn, OMI relies on the virtual circuits of an existing OSI level 4 service to provide reliable sequential transmission of messages. Successful communication with OMI depends on hardware and software to establish compatible protocols at level 4 and below, which are be

12、yond the scope of this International Standard. 4.3 Client-server protocol OMI is a connection-oriented protocol based on the client-server model. An OMI node may offer client functions, server functions, or both, as its applications require and its implementer chooses. 4.3.1 Sessions OMI uses one ci

13、rcuit to establish a session between exactly two OMI nodes. However, implementers may supply servers that support many sessions, to give several client nodes access to the server nodes database. Implementers may also permit more than one session on a client node, so that different client processes m

14、ay refer to data on several server nodes. However, a particular client shall connect to a particular server through only one session at a time, because duplicate paths between a client and a server could cause transactions to be processed out of sequence. Initiation and termination of sessions shall

15、 be invisible to application programs. The implementation shall establish and terminate sessions as necessary to perform OMI operations. A session is not symmetric. Requests from one client node are satisfied at the other server node. Another session is needed to handle requests in the opposite dire

16、ction. 4.3.2 The role of the agent OMI allows, but does not require, an agent process that multiplexes requests from any number of clients on one node in a single session. Thus several clients may share one connection to a server, and all OMI servers shall accept multiplexed requests. NOTE - Althoug

17、h agents are an important conceptual part of this International Standard, their existence does not affect the form, content, or sequence of messages. A simple implementation could provide one client per session, and you may read “client” wherever “agent” appears. This International Standard describe

18、s the agent as a separate process, but an implementation may provide its functions by any method. lSO/lEC 15851:1999(E) o ISO/IEC The agent is synchronous. A session supports only one transaction at a time. The agent shall send one request and then no more until the servers response arrives or the c

19、ircuit fails. 4.3.3 Transactions An agent shall originate each transaction with exactly one request message. The server shall attempt the requested operation and shall reply with exactly one response message, which may indicate failure to perform the operation. NOTE - In anticipation of future versi

20、ons of the protocol, which may permit many requests and responses in a transaction, messages include sequence numbers and request identifiers. Only the agent shall initiate a transaction. If the server has something to tell the agent, for example “shutting down,” the server shall indicate in its nex

21、t response message that the agent should request the servers status. Transactions are isolated. The server need not retain information about completed transactions. Nonetheless, both server and agent shall retain the parameters of the session including, for example, agents and servers names, and neg

22、otiated maximum lengths of gvs, values, and messages. All OMI transactions shall have the same priority or the same class. That is, there are no out-of-band messages. Protocol management transactions such as capability negotiation, status updates, or startup and shutdown shall be handled in the same

23、 manner as database transactions. 4.3.4 Complex locks A client may lock a list of nrefs that lie on different OMI nodes. The lock operation is atomic - it shall succeed only if all nrefs in the list are successfully claimed. This property, combined with the isolated transactions between the agent an

24、d its servers, requires the agent to assemble a complex lock from OMI lock requests to the respective servers. The agent shall claim all nrefs of a complex lock. If all the claims succeed, then the entire lock succeeds. Otherwise, the agent shall release its successful claims and repeat the procedur

25、e until the lock succeeds or times out. NOTE -To facilitate this procedure, the protocol defines a request to unlock all nrefs held by a client on one server. 4.4 National character sets ANSVMDC Xl 1 .l, Annex A, requires ASCII symbols for codes 0 - 127. Many English language terminals and all other

26、 language terminals require different encodings, some of which use codes 128 - 255 as well. Most information systems have addressed the question of printing a symbol on a printer that uses a different code from the keyboard that originated the symbol. Networked systems should also address the transl

27、ation of codes between agents and servers that use different character sets. All OMI messages shall use the IS0 8859-l Latin alphabet No. 1, which equals ASCII for codes 0 - 127, and which specifies common European symbols for codes 128 - 255. Both agents and servers shall send the standard characte

28、r set on output and shall accept it as input, except for the following special case: OMI provides an exemption from this requirement for an agent and a server that share a single non-standard character set internally. When establishing their session they may select untranslated messages, thus avoidi

29、ng the burden of two reciprocal translations. 4.5 Security Security of computer networks has many facets. This International Standard addresses some of them and leaves some to other layers of the protocol stack. The general principle is to afford the networked system as much security as typical single-computer commercial systems furnish. 4.5.1 Privacy OMI offers no privacy protection. System managers who wish to thwart eavesdropping should specify lower-level protocols that provide encryption. 4

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1