Explain csmsginterface() function with predefined protocol, Computer Engineering

Assignment Help:

Explain CSMsgInterface() Function with Predefined Protocol 

A REQUEST structure is created for each message sent to the server. Messages passed to CSMsgInterface() as *dataMSG will be copied into request.csData for transmission to the server. This entire process may be further optimized by using the REQUEST structure as the data interface in the client application rathert than a MSG structure.

REQUEST could then be passed to CSMsgInterface() instead of MSG, avoiding the unnecessary memory allocation and copy.

As we learned, predefined protocols are inherently not flexible. Our interface may be expanded, however to include more types of MSG protocols. Server components could then send and receive different application protocols based on differing requirements. The additional changes could be implemented as new parameters to CSMsginterface (), variable sizes passed in REQUEST, or could be manually coded via switch () statements for each client-server request.


Related Discussions:- Explain csmsginterface() function with predefined protocol

Determine the analog output voltage of 6-bit DAC, Determine the analog outp...

Determine the analog output voltage of 6-bit DAC (R-2R ladder network) with Vref as 5V when the digital input is 011100. Ans. The analog output for 6-bit R-2R DAC ladder network

Persuasive communication , 1)   Discuss various types of persuasive communi...

1)   Discuss various types of persuasive communication you might be needed to write or present in your professional and personal life. 2)    Describe two ways to organize a resume

Block diagram of a microcomputer system, Q. Block Diagram of a Microcompute...

Q. Block Diagram of a Microcomputer System? Before going on to consider the I/O sub/systems of a computer, let's discuss how a digital computer system can be realized by a micr

Explain the terms constructors and destructors, When we initialize the form...

When we initialize the form at that time if we require to set any variable's value then we can set it by defining in constructor. Constructor's name always similar as class name an

Determine the signed numbers are used in binary arithmetic, When signed num...

When signed numbers are used in binary arithmetic, then which one of the notations would have unique representation for zero ? Ans. When signed numbers are utilized in binary ar

What is cyclomatic complexity, What is cyclomatic complexity? Cyclomati...

What is cyclomatic complexity? Cyclomatic complexity is a computer science metric (measurement) developed by Thomas McCabe used to generally calculate the complexity of a progr

Define access time for magnetic disk, Define access time for magnetic disk....

Define access time for magnetic disk. The sum of seek time and rotational delay is known as access time for disks. Normal 0 false false false EN-IN

Define the system users, Q. Define the System users? System users are d...

Q. Define the System users? System users are defined as the people who employ information systems or who are affected by information system on a regular basis i.e. validating,

Explian service topologies, Explian Service Topologies Service Topolog...

Explian Service Topologies Service Topologies In a service-based architecture there increase dependencies between services resulting from cooperation

What is boundary scan, What is Boundary Scan?  Boundary scan is a board...

What is Boundary Scan?  Boundary scan is a board level design method that provides test access to the input and output pads of ICs on PCBs. Boundary scan changes the IO circuit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd