wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A small world of Sockets

profile
Ronak Gala
May 17, 2022
0 Likes
0 Discussions
151 Reads

Normally, a server runs on a specific computer and has a socket that is bound to a specific port number. The server just waits, listening to the socket for a client to make a connection request.

On the client-side: The client knows the hostname of the machine on which the server is running and the port number on which the server is listening. To make a connection request, the client tries to rendezvous with the server on the server's machine and port. The client also needs to identify itself to the server so it binds to a local port number that it will use during this connection. This is usually assigned by the system.

A client's connection request

If everything goes well, the server accepts the connection. Upon acceptance, the server gets a new socket bound to the same local port and also has its remote endpoint set to the address and port of the client. It needs a new socket so that it can continue to listen to the original socket for connection requests while tending to the needs of the connected client.

The connection is made

On the client side, if the connection is accepted, a socket is successfully created and the client can use the socket to communicate with the server.

The client and server can now communicate by writing to or reading from their sockets.

 

An endpoint is a combination of an IP address and a port number. Every TCP connection can be uniquely identified by its two endpoints. That way you can have multiple connections between your host and the server.

The java.net package in the Java platform provides a class, Socket, that implements one side of a two-way connection between your Java program and another program on the network. The Socket class sits on top of a platform-dependent implementation, hiding the details of any particular system from your Java program. By using the java.net.Socket class instead of relying on native code, your Java programs can communicate over the network in a platform-independent fashion.

Additionally, java.net includes the ServerSocket class, which implements a socket that servers can use to listen for and accept connections to clients. This lesson shows you how to use the Socket and ServerSocket classes.

If you are trying to connect to the Web, the URL class and related classes (URLConnection, URLEncoder) are probably more appropriate than the socket classes. In fact, URLs are a relatively high-level connection to the Web and use sockets as part of the underlying implementation.


Comments ()


Sign in

Read Next

ARTICLE ON WRIKE CORPORATION

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Memory Management in Operating System

Blog banner

Data Lake

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Types of Threads

Blog banner

Operating system

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Memory management

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

What is thread and alse multithreading

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Natural Language Processing(NLP)

Blog banner

OS Evolution Achievements

Blog banner

Developments in Modern Operating Systems

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Service Transition Process in ITSM

Blog banner

Landslide Hazard

Blog banner

Direct Memory Access

Blog banner

Dekkers Algorithm

Blog banner

Cache Memory

Blog banner

LISP - Library Management System

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Benefits of yoga and meditation

Blog banner

File management In Operating System

Blog banner

Trello ( management software)

Blog banner

UniProcessor Scheduling

Blog banner

Objectives and functions of Operating System...

Blog banner

Pooja Silver

Blog banner

Data Structures

Blog banner

Memory management

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

USES OF WHATSAPP

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

RAID_142

Blog banner

Fashion marketing in india

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Information of meesho company

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner