Java asynchronous callback mechanism
1. What is a callback?
Callback, callback. There must be a call first before there is a callback between the caller and the callee. So in Baidu Encyclopedia it is like this:
There are always certain interfaces between software modules. In terms of calling methods, they can be divided into three categories: synchronous calls, callbacks and asynchronous calls.
Callback is a special kind of call, and the three methods are a little different.
1. Synchronous callback, that is, blocking, one-way.
2. Callback, that is, two-way (similar to two gears on a bicycle).
3. Asynchronous call, that is, notification through asynchronous message.
2. Asynchronous callback in CS (java case)
For example, here is a simulated scenario: the client sends msg to the server, and after the server processes it (5 seconds), it calls back to the client to inform the client that the processing is successful. The code is as follows:
Callback interface class:
public interface CSCallBack { public void process(String status); }
Simulated client:
public class Client implements CSCallBack { private Server server; public Client(Server server) { this.server = server; } public void sendMsg(final String msg){ System.out.println("客户端:发送的消息为:" + msg); new Thread(new Runnable() { @Override public void run() { server.getClientMsg(Client.this,msg); } }).start(); System.out.println("客户端:异步发送成功"); } @Override public void process(String status) { System.out.println("客户端:服务端回调状态为:" + status); } }
Simulated server:
public class Server { public void getClientMsg(CSCallBack csCallBack , String msg) { System.out.println("服务端:服务端接收到客户端发送的消息为:" + msg); // 模拟服务端需要对数据处理 try { Thread.sleep(5 * 1000); } catch (InterruptedException e) { e.printStackTrace(); } System.out.println("服务端:数据处理成功,返回成功状态 200"); String status = "200"; csCallBack.process(status); } }
Test class:
public class CallBackTest { public static void main(String[] args) { Server server = new Server(); Client client = new Client(server); client.sendMsg("Server,Hello~"); } }
Run the test class - the printed results are as follows:
客户端:发送的消息为:Server,Hello~ 客户端:异步发送成功 服务端:服务端接收到客户端发送的消息为:Server,Hello~ (这里模拟服务端对数据处理时间,等待5秒) 服务端:数据处理成功,返回成功状态 200客户端:服务端回调状态为:200
Analyze the code step by step, The core summary is as follows
1、接口作为方法参数,其实际传入引用指向的是实现类 2、Client的sendMsg方法中,参数为final,因为要被内部类一个新的线程可以使用。这里就体现了异步。 3、调用server的getClientMsg(),参数传入了Client本身(对应第一点)。
3. Application scenarios of callbacks
In what scenarios are callbacks currently used more often? From operating system to developer call:
1、Windows平台的消息机制 2、异步调用微信接口,根据微信返回状态对出业务逻辑响应。 3、Servlet中的Filter(过滤器)是基于回调函数,需容器支持。
Addition: The difference between Filter and Interceptor is that the interceptor is based on Java’s reflection mechanism and has nothing to do with the container. But it is similar to the callback mechanism.
In short, this design allows the underlying code to call subroutines defined by the higher level (implementation layer), which enhances the flexibility of the program.
4. Mode Comparison
As mentioned above, Filter and Intercepter have the same purpose. In fact, the interface callback mechanism is also similar to a design pattern - the observer pattern:
Observer pattern:
GOF said - "Define a one-to-many dependency relationship of an object. When the state of an object changes, it sends At this time, all objects that depend on it are notified and updated. "It is a pattern that is implemented through the interface callback method, that is, it is a manifestation of callback.
Interface callback: The difference between
and the observer pattern is that it is a principle rather than a specific implementation.
5. Experience
Summary in four steps:
The mechanism is the principle.
Pattern is manifestation.
Remember specific scenarios and common patterns.
Then understand the principles in depth.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











AI can help optimize the use of Composer. Specific methods include: 1. Dependency management optimization: AI analyzes dependencies, recommends the best version combination, and reduces conflicts. 2. Automated code generation: AI generates composer.json files that conform to best practices. 3. Improve code quality: AI detects potential problems, provides optimization suggestions, and improves code quality. These methods are implemented through machine learning and natural language processing technologies to help developers improve efficiency and code quality.

HTML5 brings five key improvements: 1. Semantic tags improve code clarity and SEO effects; 2. Multimedia support simplifies video and audio embedding; 3. Form enhancement simplifies verification; 4. Offline and local storage improves user experience; 5. Canvas and graphics functions enhance the visualization of web pages.

MySQL functions can be used for data processing and calculation. 1. Basic usage includes string processing, date calculation and mathematical operations. 2. Advanced usage involves combining multiple functions to implement complex operations. 3. Performance optimization requires avoiding the use of functions in the WHERE clause and using GROUPBY and temporary tables.

Reasons for writing platform-specific code in Java include access to specific operating system features, interacting with specific hardware, and optimizing performance. 1) Use JNA or JNI to access the Windows registry; 2) Interact with Linux-specific hardware drivers through JNI; 3) Use Metal to optimize gaming performance on macOS through JNI. Nevertheless, writing platform-specific code can affect the portability of the code, increase complexity, and potentially pose performance overhead and security risks.

typetraits are used in C for compile-time type checking and operation, improving code flexibility and type safety. 1) Type judgment is performed through std::is_integral and std::is_floating_point to achieve efficient type checking and output. 2) Use std::is_trivially_copyable to optimize vector copy and select different copy strategies according to the type. 3) Pay attention to compile-time decision-making, type safety, performance optimization and code complexity. Reasonable use of typetraits can greatly improve code quality.

Methods for configuring character sets and collations in MySQL include: 1. Setting the character sets and collations at the server level: SETNAMES'utf8'; SETCHARACTERSETutf8; SETCOLLATION_CONNECTION='utf8_general_ci'; 2. Create a database that uses specific character sets and collations: CREATEDATABASEexample_dbCHARACTERSETutf8COLLATEutf8_general_ci; 3. Specify character sets and collations when creating a table: CREATETABLEexample_table(idINT

Renaming a database in MySQL requires indirect methods. The steps are as follows: 1. Create a new database; 2. Use mysqldump to export the old database; 3. Import the data into the new database; 4. Delete the old database.

Implementing singleton pattern in C can ensure that there is only one instance of the class through static member variables and static member functions. The specific steps include: 1. Use a private constructor and delete the copy constructor and assignment operator to prevent external direct instantiation. 2. Provide a global access point through the static method getInstance to ensure that only one instance is created. 3. For thread safety, double check lock mode can be used. 4. Use smart pointers such as std::shared_ptr to avoid memory leakage. 5. For high-performance requirements, static local variables can be implemented. It should be noted that singleton pattern can lead to abuse of global state, and it is recommended to use it with caution and consider alternatives.
