TCP/IP Sockets in Java: Practical Guide for Programmers

Slides:



Advertisements
Similar presentations
Lecture 1 Overview of Socket Programming Erick Pranata © Sekolah Tinggi Teknik Surabaya 1.
Advertisements

Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
CPSC 441: Intro, UDP1 Transport Layer Instructor: Carey Williamson Office: ICT Class Location:
Computer Communication Digital Communication in the Modern World Transport Layer Multiplexing, UDP
Chapter 3: Transport Layer
UDP - User Datagram Protocol UDP – User Datagram Protocol Author : Nir Shafrir Reference The TCP/IP Guide - ( Version Version.
Socket Programming.
1 Java Networking – Part I CS , Spring 2008/9.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
UDP: User Datagram Protocol. UDP: User Datagram Protocol [RFC 768] r “bare bones”, “best effort” transport protocol r connectionless: m no handshaking.
CS3771 Today: network programming with sockets  Previous class: network structures, protocols  Next: network programming Sockets (low-level API) TODAY!
Lecture 8 Chapter 3 Transport Layer
CPSC 441: Intro, UDP1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes.
TCP/IP Sockets in C: Practical Guide for Programmers Michael J. Donahoo Kenneth L. Calvert.
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
Process-to-Process Delivery:
TCP/IP Sockets in Java: Practical Guide for Programmers Kenneth L. Calvert Michael J. Donahoo.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 12 Omar Meqdadi Department of Computer Science and Software Engineering University.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
1 CS: 4244 Internet Programming Sockets Programming Dr. Eli Tilevich January 29, 2007.
TCP/IP Transport and Application (Topic 6)
RGEC MEERUT(IWT CS703) 1 Java Networking RGEC Meerut.
Chapter 3 Transport Layer
1 Writing Network Applications using the TCP/IP Protocol Stack: Socket Programming.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Transport Layer1 Ram Dantu (compiled from various text books)
Dr. John P. Abraham Professor University of Texas Pan American Internet Applications and Network Programming.
The Pocket Guide to TCP/IP Sockets: C Version Michael J. Donahoo Kenneth L. Calvert.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
1 Network Communications A Brief Introduction. 2 Network Communications.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Object-Orientated Analysis, Design and Programming
Chapter 3 Transport Layer
Introduction to Networks
Chapter 3 Transport Layer
The Transport Layer Implementation Services Functions Protocols
Transport Layer Slides are originally from instructor: Carey Williamson at University of Calgary Very minor modification are made Notes derived from “Computer.
Chapter 3 outline 3.1 Transport-layer services
Transport Layer.
06- Transport Layer Transport Layer.
The Pocket Guide to TCP/IP Sockets: C Version
Understand the OSI Model Part 2
TCP/IP Sockets in C: Practical Guide for Programmers
CS 1652 Jack Lange University of Pittsburgh
Introduction to Networks
Chapter 2 Introduction Application Requirements VS. Transport Services
Transport Layer Our goals:
September 19th, 2013 CS1652 Jack Lange University of Pittsburgh
Socket Programming in C
Chapter 14 User Datagram Protocol (UDP)
Lecture 11 Socket Programming.
TCP/IP Sockets in C: Practical Guide for Programmers
Process-to-Process Delivery:
TCP/IP Sockets in C: Practical Guide for Programmers
TCP/IP Sockets in C: Practical Guide for Programmers
Process-to-Process Delivery: UDP, TCP
Chapter 3 Transport Layer
Exceptions and networking
Transport Layer Our goals:
Presentation transcript:

TCP/IP Sockets in Java: Practical Guide for Programmers Kenneth L. Calvert Michael J. Donahoo

Computer Chat How do we make computers talk? How are they interconnected? Internet Protocol (IP)

Internet Protocol (IP) Datagram (packet) protocol Best-effort service Loss Reordering Duplication Delay Host-to-host delivery Host-to-host delivery means that IP takes packets from one host to another host. Datagram service analogy to the post office.

IP Address 32-bit identifier Dotted-quad: 192.118.56.25 www.mkp.com -> 167.208.101.28 Identifies a host interface (not a host) We need some way to identify computers on an internetwork The “dotted-quad” representation is just a more readable version of a real 32-bit number 192.18.22.13 209.134.16.123

Transport Protocols Best-effort not sufficient! Add services on top of IP User Datagram Protocol (UDP) Data checksum Best-effort Transmission Control Protocol (TCP) Reliable byte-stream delivery Flow and congestion control

Ports Identifying the ultimate destination IP addresses identify hosts Host has many applications Ports (16-bit identifier) Ports are analogous to phone extensions from main switchboard Application WWW E-mail Telnet Port 80 25 23 192.18.22.13

Sockets Identified by protocol and local/remote address/port Applications may refer to many sockets

Clients and Servers Client: Initiates the connection Server: Passively waits to respond Server: Jane Client: Bob “Hi, Bob. I’m Jane” “Hi. I’m Bob.” “Nice to meet you, Jane.”

TCP Client/Server Interaction Server starts by getting ready to receive client connections… Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book

TCP Client/Server Interaction ServerSocket servSock = new ServerSocket(servPort); Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book Server specified “well-known” port

TCP Client/Server Interaction for (;;) { Socket clntSock = servSock.accept(); Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book

TCP Client/Server Interaction Server is now blocked waiting for connection from a client Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book

TCP Client/Server Interaction Later, a client decides to talk to the server… Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book

TCP Client/Server Interaction Socket socket = new Socket(server, servPort); Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book Client must specify server address (name or IP) and port

TCP Client/Server Interaction OutputStream out = socket.getOutputStream(); out.write(byteBuffer); Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book Socket has OutputStream for writing

TCP Client/Server Interaction Socket clntSock = servSock.accept(); Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book accept( ) returns a new, connected Socket instance

TCP Client/Server Interaction InputStream in = clntSock.getInputStream(); recvMsgSize = in.read(byteBuffer); Server Create a TCP socket Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Communicate Close the connection Students should follow along with source code in the book Socket has InputStream for reading

TCP Client/Server Interaction close(sock); close(clntSocket) Server Create a TCP socket Bind socket to a port Set socket to listen Repeatedly: Accept new connection Communicate Close the connection Client Create a TCP socket Establish connection Communicate Close the connection Students should follow along with source code in the book Note that server closes connection socket, not listening socket

TCP Tidbits Client Server Client knows server address and port No correlation between send() and recv() Client out.write(“Hello Bob”) in.read() -> “Hi Jane” Server in.read() -> “Hello ” in.read() -> “Bob” out.write(“Hi ”) out.write(“Jane”)

Closing a Connection Client Server close() used to delimit communication Analogous to EOF Client out.write(string) while (not received entire string) in.read(buffer) out.write(buffer) close(socket) Server in.read(buffer) while(client has not closed connection) out.write(buffer) close(client socket) In echo application, how does server know when client is done considering it doesn’t know echo string length? Role of closer can (and is in HTTP) be reversed

Constructing Messages …beyond simple strings

TCP/IP Byte Transport TCP/IP protocols transports bytes Application protocol provides semantics Application Application byte stream byte stream Here are some bytes. I don’t know what they mean. I’ll pass these to the app. It knows what to do. TCP/IP TCP/IP TCP does not examine or modify the bytes

Application Protocol Encode information in bytes Sender and receiver must agree on semantics Data encoding Primitive types: strings, integers, and etc. Composed types: message with fields

Primitive Types String Character encoding: ASCII, Unicode, UTF Delimit: length vs. termination character 0 77 0 111 0 109 0 10 M o m \n 3 77 111 109

Primitive Types Integer Strings of character encoded decimal digits Advantage: 1. Human readable 2. Arbitrary size Disadvantage: 1. Inefficient 2. Arithmetic manipulation 49 55 57 57 56 55 48 10 ‘1’ ‘7’ ‘9’ ‘9’ ‘8’ ‘7’ ‘0’ \n Inefficient: Need only 4 bits to represent values 0-9 Arithmetic manipulation: Cannot add and subtract strings. Must convert to primitive type. If you must convert then you lose arbitrary size advantage.

Primitive Types Integer Native representation Network byte order (Big-Endian) Use for multi-byte, binary data exchange htonl(), htons(), ntohl(), ntohs() Little-Endian 0 0 92 246 4-byte two’s-complement integer 23,798 Big-Endian If the byte order is already big-endian, then the [hn]to[ns][sl]( ) functions are no-ops. 246 92 0 0

Message Composition Message composed of fields Fixed-length fields Variable-length fields integer short M i k e 1 2 \n