Tuxedo學習筆記-WSL

來源:互聯網
上載者:User

Passing information to a WSL process:

CLOPT = “[-A] [servopts_options] -- -n netaddr [-d device] [-w WSHname] [-t timeout_factor]

[-T client_timeout] [-m minh] [-M maxh] [-x mpx_factor] [-p minwshport]

[-P maxwshport] [-I init_timeout] [-c compression_threshold]

[-k compression_threshold] [-z bits] [-Z bits] [-H external_netaddr]

[-N network_timeout] [-K {client|handler|both|none}]”

 

-n netaddr

required, used by WS clients to contact the listener.

 

-d device

Specify the network device name. Some transport interface require it.

 

-t time_out

The amount of time to allow for a client connect to the WSH. The default is 3 in a non-secure application. We refer to an applications as secure if one of the following parameter is set: USER_AUTH, ACL. MANDATORY_ACL, APP_PW.

 

-w name

The name of the WSH process that should be booted for this listener. The default is WSH, If another handler process is built with the buildwsh command, that name is specified here.

 

-m number

The minimum number of handlers that should be booted and always available. The default is 0.

 

-M number

The maximum number of handlers that can be booted. The default is the value of MAXWSCLIENTS for the machine being configured, divided by the multiplexing value (specified with -x)

 

-x number

The maximum number of clients that a WSH can multiplex at one time. The value must be greater than 0. The default is 10.

 

-p minwshport and –P maxwshport

The range for port numbers available for use by WSHs associated with this listener server. Port numbers must fall in the range between 0 and 65535. The default is 2048 for minwshport and 65535 for maxwshport.

 

-z and –Z

The range of the bits that can be used on the WSL side, for link-level encryption: use –z to specify the minimum number of bits, and –Z to specify the maximum number of bits.

 

-N network_timeout

The minimum amount of time (in seconds) that a Workstation clients is allowed to wait to receive a response from the WSL/WSH. A value of 0 indicates no network timeout.

 

-K {client|handler|both|none}

The viability of a network connection between the Workstation handler and a Workstation client if no traffic has occurred over that connection within a specified period of time.

 

How Data Moves Over a Network

In a distributed application, data is sent across the network as follows:

1.      At the sending end – the BRIDGE sends a message to destination_machine by writing the message to a virtual circuit and delegating, to the operating system, responsibility for sending it. The operating system retains a copy of every pending message. If a network error occurs, however, pending messages are lost.

2.     At the receiving end – the BRIDGE process listens on a particular network address for incoming messages.

 

How Data Moves Over Parallel Networks

In a distributed application there are several advantages to using parallel data circuits for sending data across the network:

1.      By listening at more than one address, the BRIDGE achieves higher availability.

2.     By sending data simultaneously on parallel data circuits, the BRIDGE can achieve a higher throughput, if the network was the limiting factor before.

3.     The system attempts to schedule traffic the traffic over the circuit with the highest network group number(NETGRPNO).

 

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.