
Two Classes for Simple Socket Programming | Dr Dobb's
The server class contains similar data members to the client socket class except that there are two socket definitions, one for the server and another for the connecting client. Before using the socket …
Porting a C++ Application to Java | Dr Dobb's
The messaging protocol is a request-response type, consisting of a fixed header containing data fields such as message code, message time, cyclic redundancy check value, and size of accompanying …
Streaming Real-Time Audio | Dr Dobb's
After playing the data in the buffers, waveOut returns the buffers to the application for reinsertion into the Free List. In this application, on-time delivery of data is more important than error-free delivery, so I …
Designing Complex Datacentric Applications | Dr Dobb's
The Windows version uses dynamic data exchange (DDE) for interprocess communication; the UNIX-hosted SGI package uses sockets. Because the communication protocol is independent of the …
Wireless Networking & Berkeley DB | Dr Dobb's
All data communication between the mobile radio and landline host (s) goes through the WNG, which also does protocol translation and encapsulation between the landline protocol (usually IP) and the …
Fletcher's Checksum | Dr Dobb's
May 1, 1992 · When it comes to high-speed data verification, Fletcher's checksum algorithm can do the job.
File Formats & Automotive Data Acquisition | Dr Dobb's
In the field of automotive data acquisition (ADA), the files generated while a vehicle is being tested are as varied as the types of vehicles themselves. A single test, for instance, may use one or more types …
MIME and Internet Mail | Dr Dobb's
While Internet mail is a wonderful tool, it currently has a major shortcoming. Because it was developed to handle 7-bit text messages, Internet mail is unsuitable for transferring binary data such as word …
SOA, Web Services, and RESTful Systems | Dr Dobb's
Overall, REST can be described as a technology and platform-independent architecture where loosely coupled components communicate via interfaces over standard web protocols. Software, hardware, …
The SecureScout Wi-Fi Security & Monitoring Framework
Again, you might want to consider your 802.11 network as a radio broadcast of your LAN data. Passive security concerns can be partially mitigated by data encryption (which is an optional feature of the …