Wind River Glossary
Wind River Technical Glossary
Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
In the OSI network layer model, the application layer is the topmost layer--furthest away from the physical connection and closest to the data's origination or destination.
Address Resolution Protocol
A tool that takes assembly language input and converts it into object file formats. In contrast to the C compiler it does not translate the programming language, because there is a one on one mapping from assembler mnemonics to machine operation codes Depending on optimization constraints the assembler may reorder and optimize the original assembler code for maximum utilization of the chosen target.
When a process sends a message and then continues processing without waiting for a reply, or calls a function and continues without waiting for the function to complete its processing, these are said to beasynchronous messages or asynchronous function calls.
To attach the target application and the TCD so that the target application can receive and respond to requests from the host through that TCD, the application in the initialization code uses a target layer routine.
Each of the event objects may have custom attributes, enabling the server to provide additional information to the client with each event notification or whenever the client requests additional condition state data. The client can query the server for the available event attributes per category ID. The client can then select which attributes are sent with the event notification. While Wind River OPC does most of the work, the user must define which types of attributes are used and then include the attribute data in each event that is reported to the Event Manager.
An audio device is a device that sources or sinks sampled analog data.
The process to establish that an entity is trusted by another entity. Both IEEE 802.1X and IEEE 802.11 define their own authentication processes.
If the peers of a PPP connection negotiate an authentication phase for the connection, the peers will perform authentication with an authentication protocol.