OSF DCE Application Development Guide--Core Components

OSF DCE Application Development Guide—Core Components
Figure 14-7. NSI Attributes .................... 14-15
Figure 14-8. Parts of a Global Name .................. 14-17
Figure 14-9. Possible Information in a Server Entry ............. 14-19
Figure 14-10. Possible Mappings of a Group ................ 14-19
Figure 14-11. Possible Mappings of a Profile ................ 14-21
Figure 14-12. The import_next, lookup_next Search Algorithm in a Single Entry ..... 14-30
Figure 14-13. Priorities Assigned on Proximity of Members ........... 14-38
Figure 14-14. Service Model: Interchangeable Instances on Two Hosts ........ 14-40
Figure 14-15. Service Model: Interchangeable Instances on One Host ........ 14-41
Figure 14-16. Service Model: Distinct Instances on One Host .......... 14-43
Figure 14-17. Resource Model: A System-Specific Application .......... 14-46
Figure 14-18. Resource Model: A Single Server Entry for Each Server ........ 14-48
Figure 14-19. Resource Model: A Separate Server Entry for Each Object ....... 14-50
Figure 16-1. Phases of a Nested RPC Call ................ 16-32
Figure 16-2. Phases of a Nested RPC Call to Client Address Space ......... 16-32
Figure 16-3. Steps in Routing Remote Procedure Calls ............ 16-34
Figure 16-4. Mapping Information and Corresponding Endpoint Map Elements ..... 16-36
Figure 16-5. Decisions for Looking Up an Endpoint ............. 16-38
Figure 16-6. A Request Buffer at Full Capacity .............. 16-42
Figure 16-7. Stages of Call Routing by a Server Process ............ 16-43
Figure 16-8. Decisions for Selecting a Manager .............. 16-45
Figure 19-1. ISO Format for Time Displays ................19-2
Figure 19-2. Variations to the ISO Time Format ..............19-3
Figure 19-3. Full Syntax for a Relative Time ...............19-4
Figure 19-4. Syntax for Representing a Duration ..............19-5
Figure 19-5. DTS API Routines Shown by Functional Grouping .........19-8
Figure 20-1. DTS/Time-Provider RPC Calling Sequence ............20-3
Figure 22-1. Shared-Secret Authentication and DCE Authorization in Brief ......22-5
Figure 22-2. DCE Security and the DCE Application Environment ......... 22-10
Figure 23-1. Conventions Used in Authentication Walkthrough Illustrations ......23-6
Figure 23-2. Client Acquires TGT Using Third-Party Protocol ..........23-9
Figure 23-3. Client Acquires TGT Using the DCE Version 1.0 Protocol ....... 23-13
Figure 23-4. Client Acquires PTGT .................. 23-17
Figure 23-5. Client Sets Authentication and Authorization Information ....... 23-19
Figure 23-6. Client Principal Makes Application Request ........... 23-21
Figure 23-7. Application Server Responds to Client’s Request .......... 23-22
Figure 24-1. Derivation of ACL Defaults ................24-2
xviii Tandem Computers Incorporated 124245