What is socket inheritance, Computer Engineering

Assignment Help:

What is socket inheritance? Explain.

Socket Inheritance:

In a socket inheritance a reference count mechanism is utilized. Whenever a socket is first created, the system sets the reference of socket count to 1; the socket exists as long as the reference count keeps positive. While a program creates any additional thread, the system gives the thread with a list of all the sockets which program owns, and increments the reference count of each through 1. while a thread calls close for a socket, the system decrements the reference count upon the socket through 1 and removes the socket from the list of thread.

The major thread of a concurrent server creates the socket which the server uses to accept incoming connections. While a connection request arrives, the system makes a new socket for the new connection. When a service thread finishes, this calls close on the new socket.


Related Discussions:- What is socket inheritance

Backward chaining - artificial intelligence, Backward Chaining - Artificial...

Backward Chaining - Artificial intelligence Given that we are just interested in constructing the path, we may set our initial state to be the theorem statement and search backw

What are the fundamental steps in program development, What are the fundame...

What are the fundamental steps in program development The basic steps in program development are as follows: a. Program coding, design and documentation. b. Preparation o

Alignment with your indents, Use Microsoft SQLServer to make the following ...

Use Microsoft SQLServer to make the following queries.  You should also download the Pirate Sports DM-DD that gives the fields for every table.  Be sure to use proper alignment wit

Write a small program using floating-point operations, Question: a) Wri...

Question: a) Write a small program using floating-point operations in Reverse Polish Notation to evaluate the following: Volume of Sphere = (4/3)πr 3 Consider that the u

Mac address helps in which access control, MAC address helps in (A)  m...

MAC address helps in (A)  multimedia access control. (B)  media access control. (C)  mobile access control. (D) master access point control Ans: MAC addr

Direct or random access of elements, Direct or random access of elements is...

Direct or random access of elements is not possible in:- In Linked list direct or random access of elements is not possible

What is grid computing, (a) What is Grid computing? (b) What are the k...

(a) What is Grid computing? (b) What are the key distinctions between conventional distributed computing and Grid computing? (b) Describe how five features of Grid Computi

Find out if a particular file is available in a disk, Q. Find out if a part...

Q. Find out if a particular file is available in a disk in DOS? Sometimes you may like to find out if a particular file is available in a disk. In that case, you can identify t

Sap security audit log, You are required to use software of your choice (sp...

You are required to use software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP security audit log data ( Userdata.xls ), generate appr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd