Java Networking Flashcards
kahit maka 1 lang sa quiz
allows secure communication between different
applications. is a connection-oriented protocol which means that once a connection is
established, data can be transmitted in two directions. This protocol is typically used over the
Internet Protocol. Therefore, TCP is also referred to as . has built-in methods to
examine for errors and ensure the delivery of data in the order it was sent, making it a complete
protocol for transporting information like still images, data files, and web pages
Transmission Control Protocol (TCP)
l is a connection-less protocol that allows data packets to
be transmitted between different applications. is a simpler Internet protocol in which
error-checking and recovery services are not required. In , there is no overhead for
opening a connection, maintaining a connection, or terminating a connection. In , the
data is continuously sent to the recipient, whether they receive it or not.
User Datagram Protocol (UDP
s is a unique address that distinguishes a device on the
internet or a local network. IP stands for “Internet Protocol.” It comprises a set of rules
governing the format of data sent via the internet or local network. IP Address is
referred to as a logical address that can be modified. It is composed of octets. The
range of each octet varies from 0 to 255.
IP Address
r is a method to recognize a particular process connecting
internet or other network information when it reaches a server. The port number is
used to identify different applications uniquely. The port number behaves as a
communication endpoint among applications. The port number is correlated with the
IP address for transmission and communication among two applications. There are
65,535 port numbers, but not all are used every day.
Port Number –
– A network protocol is an organized set of commands that define how data is
transmitted between different devices in the same network. Network protocols are the
reason through which a user can easily communicate with people all over the world
and thus play a critical role in modern digital communications. For Example – TCP, FTP,
POP, etc.
Protocol
It is a bizarre
identifier that is allocated to a NIC (Network Interface Controller/ Card). It contains a 48
bit or 64-bit address, which is combined with the network adapter. address can be
in hexadecimal composition. In simple words, a address is a unique number that is
used to track a device in a network.
MAC Address
is one endpoint of a two-way communication connection between
the two applications running on the network. The socket mechanism presents a
method of inter-process communication (IPC) by setting named contact points between
which the communication occurs. A socket is tied to a port number so that the TCP
layer can recognize the application to which the data is intended to be sent.
Socket
-oriented and connection-less protocol – In a connection-oriented service,
the user must establish a connection before starting the communication. When the
connection is established, the user can send the message or the information, and after
this, they can release the connection. However, In connectionless protocol, the data is
transported in one route from source to destination without verifying that the
destination is still there or not or if it is ready to receive the message. Authentication is
not needed in the connectionless protocol.
Connection
is used in Java to implement a
callback mechanism for securing up an HTTP state management policy
implementation inside the HTTP protocol handler. The HTTP state
management mechanism specifies the mechanism of how to make HTTP
requests and responses.
CookieHandler –