wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Socket Programming in Java

profile
Kiddoneeta
Oct 26, 2017
0 Likes
0 Discussions
694 Reads
 
  • Java Socket programming is used for communication between the applications running on different JRE.
  • Java Socket programming can be connection-oriented or connection-less.
  • Socket and ServerSocket classes are used for connection-oriented socket programming and DatagramSocket and DatagramPacket classes are used for connection-less socket programming.
  • The client in socket programming must know two information:1) IP Address of Server, and 2)Port number.

1) First open the two notepad.

A] In first notepad, type the code for  server side and save it as the same class name which you have provided in the code and with the extension .java

For Example, MyServer1.java
import java.io.*; import java.net.*; public class MyServer1 { public static void main(String[] args) { try { ServerSocket ss=new ServerSocket(6666); Socket s=ss.accept();//establishes connection DataInputStream dis=new DataInputStream(s.getInputStream()); String  str=(String)dis.readUTF(); System.out.println("message= "+str); System.out.println("message= "+str); System.out.println("message= "+str); ss.close(); } catch(Exception e) { System.out.println(e); } } }

B] In second notepad, type the code for the client side and save it as the  same class name which you have provided in the code and with the extension .java

For Example, MyClient1.java
import java.io.*; import java.net.*; public class MyClient1 { public static void main(String[] args) { try { Socket s=new Socket("localhost",6666); DataOutputStream dout=new DataOutputStream(s.getOutputStream()); dout.writeUTF("Hello Server"); dout.flush(); dout.close(); s.close(); } catch(Exception e) { System.out.println(e); } } }

2) Output for the code:-

A] Server-Side :

Socket Programming

B] Client-Side :

Socket Programming

Comments ()


Sign in

Read Next

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Virtual machine.

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

What is thread and alse multithreading

Blog banner

Virtual memory

Blog banner

semaphores

Blog banner

Health is Wealth

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

LINUX

Blog banner

Virtual Machine

Blog banner

Cache Memory

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Emailing the merger document

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Mumbai

Blog banner

Understanding Business Layer in Data Science

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Virtual memory

Blog banner

Segmentation and paging concept

Blog banner

Oracle Corporation

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Social Engineering

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

File system implementation

Blog banner

A little bit of salt is all the hash needs!

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

How return on investment is defined in IT services

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

What is OS and its overview

Blog banner

Data Warehousing

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Embedded Operating System

Blog banner

Mariana Trench: The deepest depths

Blog banner

Internet of Things

Blog banner

Earth with no trees

Blog banner

Virtual Memory

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner