UNIX Network Programming: 2nd. 2nd volume, inter-process communication (Chinese Version)
Basic Information
Original Title: UNIX network programming, Volume 2: Interprocess Communications (2nd edition)
Original Press: Prentice Hall
Author: (US) W. Richard Steven s
Series name: Turing Computer Science Series
Press: People's post and telecommunications Press
ISBN: 9787115230287
Mounting time:
Published on: February 1, July 2010
Start: 16
Page number: 454
For more details, see: http://www.china-pub.com/196859
More wonderful sample free trial read address: http://www.china-pub.com/ureader/product.asp? Bookid = 1, 196859
Media comment
"I have been a professional programmer for more than 20 years. Whenever I want to write new programs, I need to refer to this book. I entered VOIP and audio codec network programming ."
-- C. t. vandredecken
"In my projects, I have forgotten how many times I relied on this set of books to turn the tide off ...... Every real UNIX System Programmer should buy one ."
-- David Sharpe
"This book is essential for every programmer on a UNIX platform. It provides an in-depth explanation of the various IPC APIs on the UNIX platform. Covering both System V and POSIX standards, the discussion of IPC is unmatched. The appendix at the end of the book compares the performance of various pipelines, FIFO, POSIX message queues, System V message queues, portals, and Sun RPC, I have never seen any book introduce this topic so extensively and deeply. What's more, it comes from the hands of authoritative figures ."
-- Asingh
"Steven S is the 'God' of UNIX network programming, at least my 'God '."
-- Matthew MacGibbon
Introduction
The two-volume UNIX network programming is the masterpiece of the late famous Technical writer w. Richard Steven S. Volume 2 focuses on how to make applications talk to applications on other machines. Good inter-process communication (IPC) mechanism is the key to improving the performance of UNIX programs. This book provides an in-depth description of various forms of inter-process communication, including message transmission, synchronization, shared memory, and Remote Call (RPC ). The book contains a large number of optimized source code to help readers better understand. These source code can be registered and downloaded from the Turing website's book webpage for free.
This book is an authoritative reference book recognized by network researchers and developers. Only by deeply understanding the content of this book can we design good UNIX software.
Directory
Introduction
Chapter 2 Introduction 2
1.1 Overview 2
1.2 process, thread, and information sharing 3
1.3 continuity of IPC object 4
1.4 namespace 5
......
Chapter 14 posix ipc 14
2.1 Overview 14
2.2 IPC name 14
2.3 create and open IPC Channel 16
2.4 IPC permission 18
2.5 Conclusion 19
Exercise 19
Chapter 2 system v ipc 20
3.1 Overview 20
3.2 key_t key and ftok function 20
3.3 ipc_perm structure 22
3.4 create and open IPC Channel 22
......
Part 2 message transmission
Chapter 3 pipelines and FIFO 32
4.1 overview 32
4.2 A simple client-server example 32
4.3 MPs queue 32
4.4 full duplex pipe 37
4.5 popen and pclose functions 39
......
Chapter 4 POSIX Message Queue 58
5.1 overview 58
5.2 mq_open, mq_close, and mq_unlink functions 59
5.3 mq_getattr and mq_setattr functions 61
5.4 mq_send and mq_receive functions 64
5.5 Message Queue limit 67
......
Chapter 2 system v Message Queue 6th
6.1 Overview 103
6.2 msgget function 104
6.3 msgsnd function 104
6.4 msgrcv function 105
6.5 msgctl function 106
......
Part 3 Synchronization
Chapter 2 mutex lock and condition variable 7th
7.1 overview 126
7.2 mutex lock: Lock and unlock 126
7.3 producer-consumer question 127
7.4 comparison lock and wait 131
......
Chapter 2 read/write locks 8th
8.1 overview 140
8.2 obtain and release the read/write lock 140
8.3 read/write lock attribute 141
8.4 use mutex lock and conditional variable to implement read/write lock 142
......
Chapter 4 Record lock 9th
9.1 overview 154
9.2 comparison record locks and file locks 157
9.3 POSIX fcntl record lock 158
9.4 counseling locks 162
9.5 force lock 164
......
Chapter 2 POSIX semaphore 10th
10.1 overview 175
10.2 sem_open, sem_close, and sem_unlink functions 179
10.3 sem_wait and sem_trywait functions 180
10.4 sem_post and sem_getvalue functions 180
......
Chapter 2 system v semaphore 11th
11.1 overview 226
11.2 semget function 227
11.3 semop function 229
11.4 semctl function 231
......
Part 4 shared memory Zone
Chapter 2 shared memory zone introduction 12th
12.1 Overview 244
12.2 MMAP, munmap, and msync functions 247
12.3 Add 1 250 to the counter in the memory ing File
......
Chapter 2 POSIX shared memory zone 13th
13.1 overview 261
13.2 shm_open and shm_unlink functions 261
13.3 ftruncate and fstat functions 262
13.4 simple program 263
......
Chapter 2 system v shared memory zone 14th
14.1 overview 276
14.2 shmget function 276
14.3 shmat function 277
14.4 shmdt function 277
......
Part 5 Remote Procedure Call
Chapter 2 door 15th
15.1 overview 286
15.2 door_call function 291
15.3 door_create function 292
15.4 door_return function 293
15.5 door_cred function 294
......
Chapter 2 Sun RPC 16th
16.1 overview 323
16.2 multithreading 330
16.3 server bundle 333
16.4 certification 336
16.5 timeout and retransmission 338
......
Postscript 368
Appendix A performance measurement 371
Appendix B thread entry 406
Source code 409 in Appendix C
Appendix D selected Exercise answers 417
References 433
Index 435