Hi Wim,

thanks for your quick answer. To conclude, please let me know if I
understand correctly: given that I have a page that triggers two ajax
events (almost the same time), these two requests cannot be processed
in parallel (two different threads) as the tree is locked.


rgrds,
mobi

On Wed, May 2, 2012 at 8:58 AM, Wim Dumon <[email protected]> wrote:

> Hello,
>
> 1. Wt always renders all modifications to the widget tree in a single
> response (for application startup, there may be a few extra requests).
> All modifications of all modified subtrees are combined in one
> response.
> 2. When Wt processes a session, it grabs the WApplication::UpdateLock
> of that session. Therefore, for all event handlers initiated by the
> client, you are guaranteed to have exclusive access to the widget
> tree. If you take the initiative to use a session's widget tree
> server-side outside of this mechanism, you must grab the updatelock
> before doing so.
> 3. That is correct: threads are randomly assigned to incoming requests.
>
> Regards,
> Wim.
>
>
> 2012/5/1 mobi phil <[email protected]>:
> > Hello,
> >
> >
> > trying to allocate again some time for wt programming...
> > I have however a question about the overall strategy of updating sub
> trees.
> >
> > Assumption about how wt works (of course this may be wrong):
> >
> > 1. an object tree (dom) is built dynamically on the browser (and on
> > the server) as a sequence of a first http request for the root html
> > followed by several subsequent ajax based http requests to <fill in
> > the gaps>/<decorate>/<make pages dynamic> or whatsoever purpose.
> > 2. for the same session multiple request may be sent and processed on
> > different trees
> > 3. these multiple requests may be handled on different threads
> >
> > What is the locking mechanism principle to avoid to mess up the object
> > tree on two different threads that operate for the same session
> >
> > If my question is unclear, please let me know.
> >
> > rgrds,
> > mobi phil
> >
> >
> ------------------------------------------------------------------------------
> > Live Security Virtual Conference
> > Exclusive live event will cover all the ways today's security and
> > threat landscape has changed and how IT managers can respond. Discussions
> > will include endpoint security, mobile security and the latest in malware
> > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> > _______________________________________________
> > witty-interest mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/witty-interest
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> witty-interest mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/witty-interest
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
witty-interest mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/witty-interest

Reply via email to