How read and write is performed using sockets, Computer Engineering

Assignment Help:

How read and write is performed using sockets?

An application program interface gives the details of how can an application program interacts along with protocol software. But socket API is a defacto standard. One time a socket has been established an application that can transfer information.

recv( ) and send( ) are utilized to read and write the data.

recv(socket , buffer, length, flags)

The socket is the descriptor of the socket, buffer gives the address in memory where incoming message must be placed and length gives the size of the buffer, flags al low the caller to control details.

send(socket , data, length, f lags)

There is data of the address of data to be sent and other arguments are same.

Sockets also al lows read( ) and write( ) to transfer data as send ( ) and recv( ).read( ) and write() contain three arguments: a socket descriptor, the location of the buffer into the memory and the length of the memory buffer.


Related Discussions:- How read and write is performed using sockets

Simple maze game, The following is a requirements specification for a simpl...

The following is a requirements specification for a simple game based on a player moving through a maze of connected rooms from an entrance door to an exit door. The required sy

Explain single instruction and multiple data stream (simd), Normal 0 ...

Normal 0 false false false EN-US X-NONE X-NONE Figure: SIMD Organisation

How do you turn off cookies for one page in your site, How do you turn off ...

How do you turn off cookies for one page in your site?  Use the Cookie. Abandon Property which Gets or sets the discard flag set by the server. When true, this property instruc

Explain about double error detection bit, Q. Explain about Double Error Det...

Q. Explain about Double Error Detection bit? Let's presume now that two bit errors take place in data. Data received: So on -matching we conclude P3-D3 pair doesn't

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Artificial neural networks - artificial intelligence, Artificial Neural Net...

Artificial Neural Networks - Artificial intelligence: Decision trees, while strong, are a easy representation method. While graphical on the surface, they may be seen as disjun

What are cosmic rays, Q. What are cosmic rays? The ionising radiation s...

Q. What are cosmic rays? The ionising radiation several times stronger than γ-rays entering the earth from all the directions from cosmic or interstellar space is known as cosm

What is ''LRU'' page replacement policy, 'LRU' page replacement policy is ?...

'LRU' page replacement policy is ? Ans. Least Recently Used.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd