Nt1330 Unit 5 Research Paper

Improved Essays
THE DEFERENCES OF HANDLING SOCKET AND SERVERSOCKET First of all what is a socket?
A socket is the one end –point of two-way communication link between two programs running over the network. This means the programs run on different computers, usually referred as the local and the remote computer. However, one can run the two programs on the same computer. Such communicating programs constitute a client/server application normally; a server runs on a specific computer and has a socket that is bound to a specific port number. The server just waits, listening to the socket for a client to make a connection request (Polam, 2014).
On the client- side, the client knows the hostname of the machine on which the server is
…show more content…
First appeared in early 1970’systems, There are two kinds of sockets:
1, the connection oriented socket based on TCP
2, connectionless sockets based on user Datagram Protocol (UDP).
*The TCP type sockets guarantee data arrives in the correct order, but the user Datagram protocol (UDP) does not.
One of the main differences between (” socket” and “server socket “) is;
* Socket implemented at the client side to send request to the port of the machine where the server socket is listing. But
*server socket implemented at the server side so that it can listen to the client’s and respond to them,
When we look at this two differently, the socket class placed on the client’s side, which is send request to the server side socket and waits for the response from the server. While the server socket placed in server side, which is sends requests to clients’ side socket and waits for response from client.
In censes, we need to make an object of socket class for networking application. While for server side, networking application server socket class is used. A method named server socket_ object. Accepts [] is used by server to listen to clients at a specific port

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    It is software free, so it can run on all operating systems…

    • 351 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    North Bound Interface Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14]. OpenFlow protocol provides an interface that allows a control software to program switches in the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    When a user’s DirectAccess - enabled laptop is connected to the Internet, a bidirectional connection is automatically established with the user’s corporate network. Because the connection is bidirectional, the IT administrator can also remotely manage the Windows 7 machine while the machine is away from the network. 5.2.3.(i)Implementing Direct Access Installing the DirectAccess Feature 1) Start Server Manager by clicking Start ->…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    A denial of service attack is a push to make one or more PC frameworks inaccessible. It is normally focused at web servers, however it can likewise be utilized on mail servers, name servers, and some other sort of PC framework. Denial of service attack (DoS) attacks may be started from a solitary machine, yet they normally utilize numerous PCs to do an attacks. Since most servers have firewalls and other security programming introduced, it is anything but difficult to bolt out individual frameworks. In this way, circulated denial of service attack (DDoS) attacks are frequently used to organize various frameworks in a concurrent attacks.…

    • 364 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Intel Xeon Phi Case Study

    • 1200 Words
    • 5 Pages

    In excess to these cores, there are 16 memory channels. Generally for the programming of the Intel Xeon Phi coprocessor all the coprocessors are installed on the single host system. Intel Xeon processor known as the host is connected to Intel Xeon phi coprocessor through a bus named PCI Express. As the Intel Xeon Phi coprocessor runs Linux programming, the networking protocol would be the TCP/IP, which allows communication. TCP/IP stack is implemented over the PCIe bus thereby allowing the user to have access over the coprocessor as the networking node.…

    • 1200 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays