How read and write is performed using sockets, Computer Engineering

Assignment Help:

How read and write is performed using sockets?

An application program interface gives the details of how can an application program interacts along with protocol software. But socket API is a defacto standard. One time a socket has been established an application that can transfer information.

recv( ) and send( ) are utilized to read and write the data.

recv(socket , buffer, length, flags)

The socket is the descriptor of the socket, buffer gives the address in memory where incoming message must be placed and length gives the size of the buffer, flags al low the caller to control details.

send(socket , data, length, f lags)

There is data of the address of data to be sent and other arguments are same.

Sockets also al lows read( ) and write( ) to transfer data as send ( ) and recv( ).read( ) and write() contain three arguments: a socket descriptor, the location of the buffer into the memory and the length of the memory buffer.


Related Discussions:- How read and write is performed using sockets

Programming, Which is the best programming language to learn?

Which is the best programming language to learn?

Same reg variable in an always block, What value is inferred when multiple ...

What value is inferred when multiple procedural assignments made to the same reg variable in an always block? When  there  are  multiple  nonblocking  assignments  made  to  th

Explain working of d flip -flop, Q. Explain working of D Flip -Flop? D ...

Q. Explain working of D Flip -Flop? D (data) flip-flop is modification of RS flip-flop. Problem of undefined output in SR flip-flop when both R and S become 1 gets avoided in D

By which transport protocol used, The transport protocol used by TFTP (Triv...

The transport protocol used by TFTP (Trivial File Transfer Protocol) is? The transport protocol used through Trivial File Transfer Protocol is UDP.

What is a sap system, What is a SAP system? The union of all s/w compo...

What is a SAP system? The union of all s/w components that are assigned to the similar databases is known as a SAP system.

What is event-based simulator, Event-based Simulator Digital  Logic  S...

Event-based Simulator Digital  Logic  Simulation  method  sacrifices  performance  for  rich  functionality:  each active signal  is  calculated  for  every  device  it  propa

Which technique is an encryption technique, Which technique is an encryptio...

Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.

How do i publish an xml message, Follow these steps: 1. Produce XML from...

Follow these steps: 1. Produce XML from the DOM document tree. 2. Serialize the generated DOM document to a StringWriter. 3. Call toString on the StringWriter and pass it into

Explain the working of interpreter, Explain the working of Interpreter? ...

Explain the working of Interpreter? The Interpreter is a program that executes instructions written in a high-level language. There are two manners to run programs written in a

Running time - metrics for performance evaluation, Running Time - Metrics f...

Running Time - Metrics for performance evaluation: Running time is amount of time consumed in execution of an algorithm for a provided input on N-processor based parallel comp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd