wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A small world of Sockets

profile
Ronak Gala
May 17, 2022
0 Likes
0 Discussions
151 Reads

Normally, a server runs on a specific computer and has a socket that is bound to a specific port number. The server just waits, listening to the socket for a client to make a connection request.

On the client-side: The client knows the hostname of the machine on which the server is running and the port number on which the server is listening. To make a connection request, the client tries to rendezvous with the server on the server's machine and port. The client also needs to identify itself to the server so it binds to a local port number that it will use during this connection. This is usually assigned by the system.

A client's connection request

If everything goes well, the server accepts the connection. Upon acceptance, the server gets a new socket bound to the same local port and also has its remote endpoint set to the address and port of the client. It needs a new socket so that it can continue to listen to the original socket for connection requests while tending to the needs of the connected client.

The connection is made

On the client side, if the connection is accepted, a socket is successfully created and the client can use the socket to communicate with the server.

The client and server can now communicate by writing to or reading from their sockets.

 

An endpoint is a combination of an IP address and a port number. Every TCP connection can be uniquely identified by its two endpoints. That way you can have multiple connections between your host and the server.

The java.net package in the Java platform provides a class, Socket, that implements one side of a two-way connection between your Java program and another program on the network. The Socket class sits on top of a platform-dependent implementation, hiding the details of any particular system from your Java program. By using the java.net.Socket class instead of relying on native code, your Java programs can communicate over the network in a platform-independent fashion.

Additionally, java.net includes the ServerSocket class, which implements a socket that servers can use to listen for and accept connections to clients. This lesson shows you how to use the Socket and ServerSocket classes.

If you are trying to connect to the Web, the URL class and related classes (URLConnection, URLEncoder) are probably more appropriate than the socket classes. In fact, URLs are a relatively high-level connection to the Web and use sockets as part of the underlying implementation.


Comments ()


Sign in

Read Next

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Importance of modern technology era

Blog banner

Virtual Memory

Blog banner

Save Girl Child

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

PROCESS STATE:

Blog banner

Scheduling

Blog banner

10 Unknown facts about India's Independence

Blog banner

Modern Operating System

Blog banner

Understanding Regression Analysis

Blog banner

Article on Team Work

Blog banner

Operating system

Blog banner

Sweet Mango Murabba

Blog banner

LINUX

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Disk scheduling

Blog banner

PPT methodology

Blog banner

Theads

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

VIRTUAL MACHINES

Blog banner

How to lose belly fat

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Internet of Things and cyber security

Blog banner

Regression Analysis

Blog banner

RAID

Blog banner

Traditional Unix System

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Yoga in INDIA and ABROAD

Blog banner

APACHE KAFKA

Blog banner

My favourite food

Blog banner

MENDELEY

Blog banner

memory management

Blog banner

PHONE TECHNOLOGY

Blog banner

Social Engineering Attacks

Blog banner

Disk cache

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Memory Management

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Smartsheet

Blog banner

Cyber Forensics

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Process Creation

Blog banner