wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Socket Programming in Java

profile
Kiddoneeta
Oct 26, 2017
0 Likes
0 Discussions
694 Reads
 
  • Java Socket programming is used for communication between the applications running on different JRE.
  • Java Socket programming can be connection-oriented or connection-less.
  • Socket and ServerSocket classes are used for connection-oriented socket programming and DatagramSocket and DatagramPacket classes are used for connection-less socket programming.
  • The client in socket programming must know two information:1) IP Address of Server, and 2)Port number.

1) First open the two notepad.

A] In first notepad, type the code for  server side and save it as the same class name which you have provided in the code and with the extension .java

For Example, MyServer1.java
import java.io.*; import java.net.*; public class MyServer1 { public static void main(String[] args) { try { ServerSocket ss=new ServerSocket(6666); Socket s=ss.accept();//establishes connection DataInputStream dis=new DataInputStream(s.getInputStream()); String  str=(String)dis.readUTF(); System.out.println("message= "+str); System.out.println("message= "+str); System.out.println("message= "+str); ss.close(); } catch(Exception e) { System.out.println(e); } } }

B] In second notepad, type the code for the client side and save it as the  same class name which you have provided in the code and with the extension .java

For Example, MyClient1.java
import java.io.*; import java.net.*; public class MyClient1 { public static void main(String[] args) { try { Socket s=new Socket("localhost",6666); DataOutputStream dout=new DataOutputStream(s.getOutputStream()); dout.writeUTF("Hello Server"); dout.flush(); dout.close(); s.close(); } catch(Exception e) { System.out.println(e); } } }

2) Output for the code:-

A] Server-Side :

Socket Programming

B] Client-Side :

Socket Programming

Comments ()


Sign in

Read Next

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Cache Memory(142)

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Deadlock in operating system

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Python as a tool for Data science task & project

Blog banner

Cross site scripting Attack

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

MY FIRST BLOG?

Blog banner

Concept and definition of m-commerce

Blog banner

Install Ubuntu Easily

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Hash password! Is it really secured?

Blog banner

Buffering

Blog banner

Quality check in IT services

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Sage

Blog banner

Royal enfield

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

How can parents support a child’s mental health?

Blog banner

Threats To Computer System

Blog banner

Functions Of Operating Systems

Blog banner

Service Operation

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Uniprocessor Scheduling

Blog banner

Dangers of Using Public WiFis

Blog banner

Memory managment

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Broken Authentication Attacks

Blog banner

S-Tool : Steganography

Blog banner

Excel records

Blog banner

Service Design Model

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

What is Virtual Memory

Blog banner

EdTech (Education Technology)

Blog banner

Deadlock and Starvation

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Scheduling in Operating Systems

Blog banner

Fault Tolerance in an Operating System

Blog banner