主权项 |
1. A computer program product, comprising a non-transitory computer usable medium having a computer readable program code embodied therein, the computer readable program code adapted to be executed to implement a method for network communication, the method comprising:
providing a first system, wherein the first system comprises distinct software modules, and wherein the distinct software modules comprise a user application module, a network sockets-style application programming interface module, a connectivity services module, and a transport protocol module, wherein the user application module and the network sockets-style application programming interface module communicate with each other directly; generating, by the user application module, data to be sent over a network link based on at least one process performed by the user application module or information entered by a user, sending, by the network application programming interface module, a request to open the communication link to the connectivity services module; determining, by the connectivity services module of the first system, a transport protocol that will be used to transmit data over a network communication link; sending, by the connectivity services module of the first system, a request to open the network communication link to the transport module in response to a request by the user application module; negotiating, by the connectivity services module of the first system or a connectivity services modules of a second system, connection services to be performed on data that will be transmitted over the network communication link with a connectivity services module of a second system; receiving, by the connectivity services of the first system, a request for credentials of the first system for sending to the connectivity services module of the second system to verify that the credentials match an authenticated computer; opening, by the connectivity services module of the first system, a network connection between the first system and the second system when the first system's credentials have been verified by the connectivity services module of the second system; and transmitting, by the transport protocol module and the connectivity services module of the first system, the data to the second system according to the determining network protocol and negotiated connection services. |