Implementation of Socket Programming using C#.net
Keywords:
anatomy of sockets, manipulate, socket connection, Server Socket ProgramAbstract
TCP socket connections are an essential part of socket programming as they provide a connection oriented service with both flow and congestion control. This means that a TCP connection provides a reliable connection over which data can be transferred with less effort required on the programmer part; TCP takes care of the reliability, flow control, congestion control for you. Firstly we discuss basics concepts, and then we will learn how to implement a simple TCP client and server. This research explains the networking concepts, instance ISO stack, of TCP/IP under the C# framework by employing its essential socket classes and how applications can logically and physically be distributed in a network environment. In this we are going to create a client socket program using C# and a Server Socket Program using C#.net with the use of Encryption and Decryption the message send from client to server transmits securely. Apart from that, we shall learn how to manipulate an IP address and do a DNS lookup to establish a socket connection between the client and server. The anatomy of sockets in depth and examine how to develop a client and server application to set up a socket connection.
References
C#.net –Server socket Implementation http://csharp.netinformations. com/communications/csharpserver- socket.htm
Introduction to Socket Programming http://alumni.cs.ucr.edu/~ecegelal/TAw/socketT CP.pdf
Introduction to Socket and socket programming http://compnetworking.about.com/od/itinformationtechnology/l/aa083100a.htm
Networking Complete Reference (TMH)
Encyclopedia of Networking (PHI)
Shankland S (2011) Amazon cloud outage derails Reddit, Quora
Anand N (2010) The legal issues around cloud computing. http://www.labnol.org/internet/cloud-computinglegal- issues/14120/
Kaufman C, Venkatapathy R (2010) Windows Azure Security Overview.go.microsoft.com/?linkid=9740388, [August].
Kandukuri BR, Paturi R, Rakshit A (2009) Cloud Security Issues. In: Proceedings of the 2009 IEEE International Conference on Services
Computing, SCC ’09
Yan L, Rong C, Zhao G (2009) Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. In: Proceedings of the 1st International Conference on Cloud Computing, CloudCom ’09
Musthaler L (2009) Cost-effective data encryption in the cloud. Network World
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.