wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A small world of Sockets

profile
Ronak Gala
May 17, 2022
0 Likes
0 Discussions
152 Reads

Normally, a server runs on a specific computer and has a socket that is bound to a specific port number. The server just waits, listening to the socket for a client to make a connection request.

On the client-side: The client knows the hostname of the machine on which the server is running and the port number on which the server is listening. To make a connection request, the client tries to rendezvous with the server on the server's machine and port. The client also needs to identify itself to the server so it binds to a local port number that it will use during this connection. This is usually assigned by the system.

A client's connection request

If everything goes well, the server accepts the connection. Upon acceptance, the server gets a new socket bound to the same local port and also has its remote endpoint set to the address and port of the client. It needs a new socket so that it can continue to listen to the original socket for connection requests while tending to the needs of the connected client.

The connection is made

On the client side, if the connection is accepted, a socket is successfully created and the client can use the socket to communicate with the server.

The client and server can now communicate by writing to or reading from their sockets.

 

An endpoint is a combination of an IP address and a port number. Every TCP connection can be uniquely identified by its two endpoints. That way you can have multiple connections between your host and the server.

The java.net package in the Java platform provides a class, Socket, that implements one side of a two-way connection between your Java program and another program on the network. The Socket class sits on top of a platform-dependent implementation, hiding the details of any particular system from your Java program. By using the java.net.Socket class instead of relying on native code, your Java programs can communicate over the network in a platform-independent fashion.

Additionally, java.net includes the ServerSocket class, which implements a socket that servers can use to listen for and accept connections to clients. This lesson shows you how to use the Socket and ServerSocket classes.

If you are trying to connect to the Web, the URL class and related classes (URLConnection, URLEncoder) are probably more appropriate than the socket classes. In fact, URLs are a relatively high-level connection to the Web and use sockets as part of the underlying implementation.


Comments ()


Sign in

Read Next

Data Analytics in Data Science

Blog banner

Cross site scripting Attack

Blog banner

(Input/Output) in os

Blog banner

Bots and Cyber Security

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

I/O Buffering

Blog banner

Assignment-3

Blog banner

'Positivity in life'

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Creating Digitally Signed Document

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

The Golden Temple , Amritsar

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Types of Big Data

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

MailChimp

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Deadlock and starvation

Blog banner

Firewall in Computer Network

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Interesting fact about kangaroo.

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Memory Management

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Deadlock

Blog banner

All you need to know about “On-page SEO”

Blog banner

Threading

Blog banner

AI and cyber Security

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Asana

Blog banner

SQL Injection Techniques

Blog banner

Benefits of Yoga

Blog banner

Malicious softwares

Blog banner

Operating system

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Virtual memory

Blog banner

Memory Management in an Operating System

Blog banner