Passing information to a WSL process:
Clopt = "[-A] [servopts_options] ---N netaddr [-D device] [-W wshname] [-T timeout_factor]
[-T client_timeout] [-M Minh] [-M maxh] [-x mpx_factor] [-P minwshport]
[-P maxwshport] [-I init_timeout] [-C compression_threshold]
[-K compression_threshold] [-Z bits] [-Z bits] [-H external_netaddr]
[-N network_timeout] [-K {client | handler | both | none}]"
-N netaddr
Required, used by WS clients to contact the listener.
-D Device
Specify the network device name. Some transport interface require it.
-T time_out
The amount of time to allow for a client connect to the wsh. the default is 3 in a non-secure application. we refer to an applications as secure if one of the following parameter is set: user_auth, ACL. mandatory_acl, app_pw.
-W name
The name of the wsh process that shoshould be booted for this listener. The default is wsh, if another handler process is built with the buildwsh command, that name is specified here.
-M number
The minimum number of handlers that shoshould be booted and always available. The default is 0.
-M number
The maximum number of handlers that can be booted. The default is the value of maxwsclients for the Machine Being configured, divided by the multiplexing value (specified with-x)
-X number
The maximum number of clients that a wsh can multiplex at one time. The value must be greater than 0. The default is 10.
-P minwshportAnd-P maxwshport
The range for port numbers available for use by wshs associated with this listener server. port numbers must fall in the range between 0 and 65535. The default is 2048 for minwshport and 65535 for maxwshport.
-ZAnd-Z
The range of the bits that can be used on the WSL side, for Link-level encryption: Use-Z to specify the minimum number of bits, and-Z to specify the maximum number of bits.
-N network_timeout
The minimum amount of time (in seconds) that a workstation clients is allowed to wait to receive a response from the WSL/wsh. A value of 0 indicates no network timeout.
-K {client | handler | both | none}
The viability of a network connection between the workstation handler and a workstation client if no traffic has occurred over that connection within a specified period of time.
How data moves over a network
In a distributed application, data is sent published ss the network as follows:
1. at the sending end-the bridge sends a message to destination_machine by writing the message to a virtual circuit and delegating, to the operating system, responsibility for sending it. the operating system retains a copy of every pending message. if a network error occurs, however, pending messages are lost.
2. At the processing ing end-the bridge process listens on a participant network address for incoming messages.
How data moves over parallel networks
In a distributed application there are several advantages to using parallel data circuits for sending data into ss the network:
1. By listening at more than one address, the bridge achieves higher availability.
2. By sending data simultaneously on parallel data circuits, the bridge can achieve a higher throughput, if the network was the limiting factor before.
3. The system attempts to schedule traffic the traffic over the circuit with the highest network group number (netkgno ).