wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A small world of Sockets

profile
Ronak Gala
May 17, 2022
0 Likes
0 Discussions
151 Reads

Normally, a server runs on a specific computer and has a socket that is bound to a specific port number. The server just waits, listening to the socket for a client to make a connection request.

On the client-side: The client knows the hostname of the machine on which the server is running and the port number on which the server is listening. To make a connection request, the client tries to rendezvous with the server on the server's machine and port. The client also needs to identify itself to the server so it binds to a local port number that it will use during this connection. This is usually assigned by the system.

A client's connection request

If everything goes well, the server accepts the connection. Upon acceptance, the server gets a new socket bound to the same local port and also has its remote endpoint set to the address and port of the client. It needs a new socket so that it can continue to listen to the original socket for connection requests while tending to the needs of the connected client.

The connection is made

On the client side, if the connection is accepted, a socket is successfully created and the client can use the socket to communicate with the server.

The client and server can now communicate by writing to or reading from their sockets.

 

An endpoint is a combination of an IP address and a port number. Every TCP connection can be uniquely identified by its two endpoints. That way you can have multiple connections between your host and the server.

The java.net package in the Java platform provides a class, Socket, that implements one side of a two-way connection between your Java program and another program on the network. The Socket class sits on top of a platform-dependent implementation, hiding the details of any particular system from your Java program. By using the java.net.Socket class instead of relying on native code, your Java programs can communicate over the network in a platform-independent fashion.

Additionally, java.net includes the ServerSocket class, which implements a socket that servers can use to listen for and accept connections to clients. This lesson shows you how to use the Socket and ServerSocket classes.

If you are trying to connect to the Web, the URL class and related classes (URLConnection, URLEncoder) are probably more appropriate than the socket classes. In fact, URLs are a relatively high-level connection to the Web and use sockets as part of the underlying implementation.


Comments ()


Sign in

Read Next

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Race Condition

Blog banner

Constrains in service design

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Spyware

Blog banner

Digital Marketing

Blog banner

HubSpot

Blog banner

Deadlock

Blog banner

THREADS (assignment 1)

Blog banner

Types of threads

Blog banner

Process Description

Blog banner

Objectives and functions of Operating System...

Blog banner

I Personally

Blog banner

File system implementation

Blog banner

Operating system

Blog banner

Expert System In AI

Blog banner

Photography

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Data Mining

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Delhi city

Blog banner

Mariana Trench: The deepest depths

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

I/O Management and Disk Scheduling

Blog banner

Measuring IT Risk

Blog banner

File management

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

File sharing

Blog banner

Deadlock

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

MEMORY HIERARCHY

Blog banner

THE ACTORS LIFE

Blog banner

MEMORY MANAGEMENT

Blog banner

objectives and functions of operating system

Blog banner

virtual memory

Blog banner

?How long does wisdom tooth pain last?

Blog banner

LiquidPlanner

Blog banner

Virtual Memory

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner