1
کامپیوتر و شبکه::
پروتکل درخواست-پاسخ
4.14 Program each of the three operations of the request-reply protocol in Figure 4.123, using UDP communication, but without adding any fault-tolerance measures.
4.18 Describe the ways in which the request-reply protocol masks the heterogeneity of operating systems and of computer networks.
These interfaces are concealed by the interfaces of the request-reply protocol.
The request-reply protocol may equally be implemented over other protocols.
iii) unlike the request-reply protocol, recipients may not necessarily send a message within any particular time limit.
واژگان شبکه مترجمین ایران