-
Notifications
You must be signed in to change notification settings - Fork 1.6k
/
Figure_list
116 lines (92 loc) · 4.37 KB
/
Figure_list
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
Chapter 1
Figure 1-1 (images/fig1.eps): Request-Reply
Figure 1-2 (images/fig2.eps): A terrible accident...
Figure 1-3 (images/fig3.eps): A 0MQ string
Figure 1-4 (images/fig4.eps): Publish-Subscribe
Figure 1-5 (images/fig5.eps): Parallel Pipeline
Figure 1-6 (images/fig6.eps): Fair Queuing
Figure 1-7 (images/fig7.eps): Messaging as it Starts
Figure 1-8 (images/fig8.eps): Messaging as it Becomes
Figure 1-9 (images/fig9.eps): Missing Message Problem Solver
__________
Chapter 2
Figure 2-1 (images/fig10.eps): TCP sockets are 1 to 1
Figure 2-2 (images/fig11.eps): 0MQ Sockets are N to N
Figure 2-3 (images/fig12.eps): HTTP On the Wire
Figure 2-4 (images/fig13.eps): 0MQ On the Wire
Figure 2-5 (images/fig14.eps): Parallel Pipeline with Kill Signaling
Figure 2-6 (images/fig15.eps): Small-scale Pub-Sub Network
Figure 2-7 (images/fig16.eps): Pub-Sub Network with a Proxy
Figure 2-8 (images/fig17.eps): Extended Publish-Subscribe
Figure 2-9 (images/fig18.eps): Load-balancing of Requests
Figure 2-10 (images/fig19.eps): Extended Request-reply
Figure 2-11 (images/fig20.eps): Request-reply Broker
Figure 2-12 (images/fig21.eps): Pub-Sub Forwarder Proxy
Figure 2-13 (images/fig22.eps): Multithreaded Server
Figure 2-14 (images/fig23.eps): The Relay Race
Figure 2-15 (images/fig24.eps): Pub-Sub Synchronization
Figure 2-16 (images/fig25.eps): Pub-Sub Envelope with Separate Key
Figure 2-17 (images/fig26.eps): Pub-Sub Envelope with Sender Address
__________
Chapter 3
Figure 3-1 (none): ROUTER-DEALER proxy in a request-reply pattern
Figure 3-2 (images/fig27.eps): Single-hop Request-reply Envelope
Figure 3-3 (images/fig28.eps): Multihop Request-reply Envelope
Figure 3-4 (images/fig29.eps): ROUTER Invents a UUID
Figure 3-5 (images/fig30.eps): ROUTER uses Identity If It knows It
Figure 3-6 (images/fig31.eps): ROUTER-to-DEALER Custom Routing
Figure 3-7 (images/fig32.eps): Routing Envelope for DEALER
Figure 3-8 (images/fig33.eps): ROUTER to REQ Custom Routing
Figure 3-9 (images/fig34.eps): Routing Envelope for REQ
Figure 3-10 (images/fig35.eps): ROUTER-to-REP Custom Routing
Figure 3-11 (images/fig36.eps): Routing Envelope for REP
Figure 3-12 (images/fig37.eps): Basic Request-reply
Figure 3-13 (images/fig38.eps): Stretched Request-reply
Figure 3-14 (images/fig39.eps): Stretched Request-reply with LRU
Figure 3-15 (images/fig40.eps): Message that Client Sends
Figure 3-16 (images/fig41.eps): Message Coming in on Frontend
Figure 3-17 (images/fig42.eps): Message Sent to Backend
Figure 3-18 (images/fig43.eps): Message Delivered to Worker
Figure 3-19 (images/fig44.eps): Asynchronous Client-Server
Figure 3-20 (images/fig45.eps): Detail of Asynchronous Server
Figure 3-21 (images/fig46.eps): Cluster Architecture
Figure 3-22 (images/fig47.eps): Multiple Clusters
Figure 3-23 (images/fig48.eps): Idea 1 - Cross-connected Workers
Figure 3-24 (images/fig49.eps): Idea 2 - Brokers Talking to Each Other
Figure 3-25 (images/fig50.eps): Cross-connected Brokers in Federation Model
Figure 3-26 (images/fig51.eps): Broker Socket Arrangement
Figure 3-27 (images/fig52.eps): The State Flow
Figure 3-28 (images/fig53.eps): The Flow of Tasks
__________
Chapter 4
Figure 4-1 (images/fig54.eps): The Lazy Pirate Pattern
Figure 4-2 (images/fig55.eps): The Simple Pirate Pattern
Figure 4-3 (images/fig56.eps): The Paranoid Pirate Pattern
Figure 4-4 (images/fig57.eps): The Majordomo Pattern
Figure 4-5 (images/fig58.eps): The Titanic Pattern
Figure 4-6 (images/fig59.eps): High-availability Pair, Normal Operation
Figure 4-7 (images/fig60.eps): High-availability Pair During Failover
Figure 4-8 (images/fig61.eps): Binary Star Finite State Machine
Figure 4-9 (images/fig62.eps): The Freelance Pattern
__________
Chapter 5
Figure 5-1 (images/fig63.eps): The Simple Black Box Pattern
Figure 5-2 (images/fig64.eps): Mad Black Box Pattern
Figure 5-3 (images/fig65.eps): Simplest Clone Model
Figure 5-4 (images/fig66.eps): State Replication
Figure 5-5 (images/fig67.eps): Republishing Updates
Figure 5-6 (images/fig68.eps): Clone Client Finite State Machine
Figure 5-7 (images/fig69.eps): High-availability Clone Server Pair
__________
Chapter 6
Figure 6-1 (images/fig70.eps): The 'Start' State
Figure 6-2 (images/fig71.eps): The 'Authenticated' State
Figure 6-3 (images/fig72.eps): The 'Ready' State
__________
Chapter 7
No figures
__________
Chapter 8
Figure 8-1 (images/fig73.eps): ZRE discovery message
Figure 8-2 (images/fig74.eps): ZyRE Tester Tool
__________