It transforms the data received in the request to match what's required to invoke the service.
它转换请求中收到的数据以匹配调用服务所需的数据。
2
Only once a single request contains all the required logon data the provider will actually try to authenticate the request.
只有在单一请求包含所有必需的登录数据的情况下,提供者才会真正开始尝试验证请求。
3
So a good virtualization system has an ability to measure the cost of each different type of request in terms of computing power required to process the request.