Nt1330 Unit 5 Research Paper

Improved Essays
THE DEFERENCES OF HANDLING SOCKET AND SERVERSOCKET First of all what is a socket?
A socket is the one end –point of two-way communication link between two programs running over the network. This means the programs run on different computers, usually referred as the local and the remote computer. However, one can run the two programs on the same computer. Such communicating programs constitute a client/server application normally; a server runs on a specific computer and has a socket that is bound to a specific port number. The server just waits, listening to the socket for a client to make a connection request (Polam, 2014).
On the client- side, the client knows the hostname of the machine on which the server is
…show more content…
First appeared in early 1970’systems, There are two kinds of sockets:
1, the connection oriented socket based on TCP
2, connectionless sockets based on user Datagram Protocol (UDP).
*The TCP type sockets guarantee data arrives in the correct order, but the user Datagram protocol (UDP) does not.
One of the main differences between (” socket” and “server socket “) is;
* Socket implemented at the client side to send request to the port of the machine where the server socket is listing. But
*server socket implemented at the server side so that it can listen to the client’s and respond to them,
When we look at this two differently, the socket class placed on the client’s side, which is send request to the server side socket and waits for the response from the server. While the server socket placed in server side, which is sends requests to clients’ side socket and waits for response from client.
In censes, we need to make an object of socket class for networking application. While for server side, networking application server socket class is used. A method named server socket_ object. Accepts [] is used by server to listen to clients at a specific port

Related Documents

  • Improved Essays

    Although IP address can be static or dynamic. A static IP address stays the same and it is a permanent Internet address. On the other hand, a dynamic IP address is a temporary address that is assigned each time a computer or device accesses the Internet, and DNS is used to it make easy to read or remember hostnames like www.it200class.com ¥ 1.2 Server and Client is a network architecture in which each computer or process on the network is either a client or a server.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    When a user’s DirectAccess - enabled laptop is connected to the Internet, a bidirectional connection is automatically established with the user’s corporate network. Because the connection is bidirectional, the IT administrator can also remotely manage the Windows 7 machine while the machine is away from the network. 5.2.3.(i)Implementing Direct Access Installing the DirectAccess Feature 1) Start Server Manager by clicking Start ->…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is specified in RFC 768. As it is connectionless, the packet safety is missing, i.e. there is no guarantee that the packet is delivered and there is no acknowledgement from the receiver. Thus it is un reliable, but in many cases this does not create an impact owing to its less size. It attaches checksum bits along with the packet to provide data integrity. • HTTP…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    At this period, the first two bytes are not changed. However, the 3rd type shifts from 63 to 60 while the 4th bytes convert zero. Match with the network address in the routing table. The 2nd-row matches. The router will transmit the packet to interface 1.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    North Bound Interface Northbound APIs must support a wide variety of applications because SDN is bound to the innovative applications it can potentially support and enable. The northbound API is not standardized and often allows fine-grained control of switches. Applications should and do not need to process details of the southbound interface, such as details about the network topology [14]. OpenFlow protocol provides an interface that allows a control software to program switches in the network.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Homework 4 Elaine Le Hawaii Pacific University Part A: Textbook p293 Exercises 9.4 Consider the interrupt that occurs at the completion of a disk transfer. a. Direct memory access (DMA) is an alternative method that avoids the use of the CPU by allowing direct data transfers between memory and I/O devices or peripherals. Once the data is transferred the CPU is notified of the transfer completion and able to resume access of the main memory. It is able to do this with interrupts; are signals that are generated once an action is completed. Normally it suspends the execution of the running program and jumps to a special interrupt service routine.…

    • 568 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    NT1330 Unit 1 Essay

    • 486 Words
    • 2 Pages

    So the previous section was discussing the findability Layer which enables humans and applications to search and find the smart thing's services they need, however in this section the main concern is to know more the next layer which is sharing layer. This layer’s main concern is to keep human and machine updated with the new information so the main concern was making this communication secure and free from hacks so researchers tried to use already existing protocols like HTTP that is already provides authentication mechanisms for securely sharing resources by which it allows clients to provide their user names and passwords in order to make HTTP request on a server and it is followed with SSL/TLS in order to make sure that the user names and…

    • 486 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 3 Case Study

    • 305 Words
    • 2 Pages

    In round and robin mechanism it allocate IP address to the requested client as per the availability and making the server highly available . Answer 4:- "in.addr-arpa" is used to remove the obstruction to subnet on non-octet boundaries. Thus making it possible to assign IP address in smaller octet then 24 bit prefix without losing the ability to delegate authority for in.addr-arpa mapping.…

    • 305 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    A denial of service attack is a push to make one or more PC frameworks inaccessible. It is normally focused at web servers, however it can likewise be utilized on mail servers, name servers, and some other sort of PC framework. Denial of service attack (DoS) attacks may be started from a solitary machine, yet they normally utilize numerous PCs to do an attacks. Since most servers have firewalls and other security programming introduced, it is anything but difficult to bolt out individual frameworks. In this way, circulated denial of service attack (DDoS) attacks are frequently used to organize various frameworks in a concurrent attacks.…

    • 364 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Intel Xeon Phi Case Study

    • 1200 Words
    • 5 Pages

    In excess to these cores, there are 16 memory channels. Generally for the programming of the Intel Xeon Phi coprocessor all the coprocessors are installed on the single host system. Intel Xeon processor known as the host is connected to Intel Xeon phi coprocessor through a bus named PCI Express. As the Intel Xeon Phi coprocessor runs Linux programming, the networking protocol would be the TCP/IP, which allows communication. TCP/IP stack is implemented over the PCIe bus thereby allowing the user to have access over the coprocessor as the networking node.…

    • 1200 Words
    • 5 Pages
    Great Essays