SlideShare una empresa de Scribd logo
1 de 12
Berkeley Socket Network Programming
TCP Socket : Server ,[object Object],socket() bind() listen() accept()
TCP Socket : Server ,[object Object],[object Object],listenfd = socket(AF_INET, SOCK_STREAM, 0); // AF_INET: IPv4,  AF_INET6: IPv6 // SOCK_STREAM: TCP, SOCK_DGRAM: UDP bzero(&serv_addr, sizeof(serv_addr)); serv_addr.sin_family = AF_INET; serv_addr.sin_addr.s_addr = htonl(INADDR_ANY); serv_addr.sin_port = htons(23); // htonl: host to network (long) // htons: host to network (short) bind(listenfd, (struct sockaddr *) &serv_addr, sizeof(serv_addr));
TCP Socket : Server ,[object Object],[object Object],listen(listenfd, LISTENQ); // LISTENQ: the maximum length the queue of pending //  connections connfd = accept(listenfd, (struct sockaddr *) NULL, NULL); // or cli_len = sizeof(cli_addr); connfd = accept(listenfd, (struct sockaddr *) &cli_addr, cli_len);
TCP Socket : Client ,[object Object],socket() connect()
TCP Socket : Client ,[object Object],[object Object],sockfd = socket(AF_INET, SOCK_STREAM, 0); // AF_INET: IPv4,  AF_INET6: IPv6 // SOCK_STREAM: TCP, SOCK_DGRAM: UDP char *server_ip = “140.113.210.143”; bzero(&serv_addr, sizeof(serv_addr)); serv_addr.sin_family = AF_INET; serv_addr.sin_addr.s_addr = inet_addr(server_ip); serv_addr.sin_port = htons(23); // inet_addr: ascii dotted-decimal addr to network addr // htons: host to network (short) connect(sockfd, (struct sockaddr *) &serv_addr, sizeof(serv_addr));
TCP Socket : functions ,[object Object],[object Object],#include <netinet/in.h> uint32_t htonl(uint32_t hostlong); uint16_t htons(uint16_t hostshort); uint32_t ntohl(uint32_t netlong); uint16_t ntohs(uint16_t netshort); #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> in_addr_t inet_addr(const char *cp); char *  inet_ntoa(struct in_addr in); int  inet_pton(int af, const char * restrict src,  void * restrict dst);
TCP Socket : functions ,[object Object],[object Object],inet_ntoa(cli_addr.sin_addr); // return ascii ip address of client char *server_ip = “140.113.210.143”; inet_pton(AF_INET, server_ip, &serv_addr.sin_addr); // return  1: address valid // return  0: address not parseable // return -1: error occurred // inet_pton is valid for AF_INET and AF_INET6
Socket Options ,[object Object],[object Object],[object Object],[object Object],[object Object],int opt = 1; setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR,  &opt, sizeof(opt)); int opt = 1; setsockopt(sockfd, SOL_SOCKET, SO_REUSEPORT,  &opt, sizeof(opt));
Socket Options #include <sys/types.h> #include <sys/socket.h> sockfd = socket(. . . .); int opt = 1; setsockopt(sockfd, SOL_SOCKET, SO_REUSEPORT,  &opt, sizeof(opt)); bind(sockfd, . . . .);
TCP : TIME_WAIT Client Server close Active Close FIN_WAIT_1 Passive Close CLOSE_WAIT FIN M ACK M+1 FIN N ACK N+1 FIN_WAIT_2 TIME_WAIT close LAST_ACK CLOSED
TCP : TIME_WAIT ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programmingelliando dias
 
Network configuration
Network configurationNetwork configuration
Network configurationengshemachi
 
Socket programming in C
Socket programming in CSocket programming in C
Socket programming in CDeepak Swain
 
Socket programming
Socket programmingSocket programming
Socket programmingUjjwal Kumar
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.etherealgh02
 
Socket programming
Socket programmingSocket programming
Socket programmingharsh_bca06
 
LINUX RS232程式設計
LINUX RS232程式設計LINUX RS232程式設計
LINUX RS232程式設計艾鍗科技
 
Pf: the OpenBSD packet filter
Pf: the OpenBSD packet filterPf: the OpenBSD packet filter
Pf: the OpenBSD packet filterGiovanni Bechis
 
Socket Programming it-slideshares.blogspot.com
Socket  Programming it-slideshares.blogspot.comSocket  Programming it-slideshares.blogspot.com
Socket Programming it-slideshares.blogspot.comphanleson
 
ভিবিন্ন DEVISE AND AR PORT NUMBER
ভিবিন্ন DEVISE  AND AR PORT NUMBERভিবিন্ন DEVISE  AND AR PORT NUMBER
ভিবিন্ন DEVISE AND AR PORT NUMBERmd shariful eng
 

La actualidad más candente (20)

Sysprog17
Sysprog17Sysprog17
Sysprog17
 
Socket programming in c
Socket programming in cSocket programming in c
Socket programming in c
 
Npc08
Npc08Npc08
Npc08
 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programming
 
Network configuration
Network configurationNetwork configuration
Network configuration
 
Network Sockets
Network SocketsNetwork Sockets
Network Sockets
 
Sockets
SocketsSockets
Sockets
 
Socket programming in C
Socket programming in CSocket programming in C
Socket programming in C
 
Ppt of socket
Ppt of socketPpt of socket
Ppt of socket
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.ethereal
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Elementary TCP Sockets
Elementary TCP SocketsElementary TCP Sockets
Elementary TCP Sockets
 
LINUX RS232程式設計
LINUX RS232程式設計LINUX RS232程式設計
LINUX RS232程式設計
 
Pf: the OpenBSD packet filter
Pf: the OpenBSD packet filterPf: the OpenBSD packet filter
Pf: the OpenBSD packet filter
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
Socket programming
Socket programming Socket programming
Socket programming
 
Socket Programming it-slideshares.blogspot.com
Socket  Programming it-slideshares.blogspot.comSocket  Programming it-slideshares.blogspot.com
Socket Programming it-slideshares.blogspot.com
 
Lecture10
Lecture10Lecture10
Lecture10
 
ভিবিন্ন DEVISE AND AR PORT NUMBER
ভিবিন্ন DEVISE  AND AR PORT NUMBERভিবিন্ন DEVISE  AND AR PORT NUMBER
ভিবিন্ন DEVISE AND AR PORT NUMBER
 

Destacado

Socket Programming- Data Link Access
Socket Programming- Data Link AccessSocket Programming- Data Link Access
Socket Programming- Data Link AccessLJ PROJECTS
 
Loadrunner
LoadrunnerLoadrunner
Loadrunnerdanwrong
 
Berkeley Packet Filters
Berkeley Packet FiltersBerkeley Packet Filters
Berkeley Packet FiltersKernel TLV
 
Pdi abril2011 (1)
Pdi abril2011 (1)Pdi abril2011 (1)
Pdi abril2011 (1)lpalacin
 
Diagnòstic de xarxes
Diagnòstic de xarxesDiagnòstic de xarxes
Diagnòstic de xarxeslpalacin
 
Riepilogo Report 6 7 8 dicembre 2011
Riepilogo Report 6 7 8 dicembre 2011Riepilogo Report 6 7 8 dicembre 2011
Riepilogo Report 6 7 8 dicembre 2011Zio Romolo
 
Il Cittadino Risparmiatore e La Crisi
Il Cittadino Risparmiatore e La CrisiIl Cittadino Risparmiatore e La Crisi
Il Cittadino Risparmiatore e La CrisiZio Romolo
 
Jake Rescue Chameleon Project
Jake Rescue Chameleon ProjectJake Rescue Chameleon Project
Jake Rescue Chameleon ProjectJason Thompson
 
Diario Blog 0119 0123
Diario Blog 0119 0123Diario Blog 0119 0123
Diario Blog 0119 0123Zio Romolo
 
Report giornaliero del 7 dicembre 2011
Report giornaliero del 7 dicembre 2011Report giornaliero del 7 dicembre 2011
Report giornaliero del 7 dicembre 2011Zio Romolo
 
Pendidikan Jasmani Zaman Purba
Pendidikan Jasmani Zaman PurbaPendidikan Jasmani Zaman Purba
Pendidikan Jasmani Zaman Purbakaloky
 
Profile Si Selectia De Personal
Profile Si Selectia De PersonalProfile Si Selectia De Personal
Profile Si Selectia De Personal1Leu
 
Presentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLD
Presentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLDPresentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLD
Presentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLDZio Romolo
 
Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 2Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 21Leu
 
Diario Operativo Blog Gennaio Marzo 2010
Diario Operativo Blog Gennaio Marzo 2010Diario Operativo Blog Gennaio Marzo 2010
Diario Operativo Blog Gennaio Marzo 2010Zio Romolo
 
Pdi abril2011 (1)
Pdi abril2011 (1)Pdi abril2011 (1)
Pdi abril2011 (1)lpalacin
 
Evaluarea Dinamica Vs Evaluarea Psihometrica
Evaluarea Dinamica Vs Evaluarea PsihometricaEvaluarea Dinamica Vs Evaluarea Psihometrica
Evaluarea Dinamica Vs Evaluarea Psihometrica1Leu
 

Destacado (20)

Winsock
WinsockWinsock
Winsock
 
Socket Programming- Data Link Access
Socket Programming- Data Link AccessSocket Programming- Data Link Access
Socket Programming- Data Link Access
 
Loadrunner
LoadrunnerLoadrunner
Loadrunner
 
Berkeley Packet Filters
Berkeley Packet FiltersBerkeley Packet Filters
Berkeley Packet Filters
 
Pdi abril2011 (1)
Pdi abril2011 (1)Pdi abril2011 (1)
Pdi abril2011 (1)
 
Diagnòstic de xarxes
Diagnòstic de xarxesDiagnòstic de xarxes
Diagnòstic de xarxes
 
Il Codice E Vinci
Il Codice E VinciIl Codice E Vinci
Il Codice E Vinci
 
Riepilogo Report 6 7 8 dicembre 2011
Riepilogo Report 6 7 8 dicembre 2011Riepilogo Report 6 7 8 dicembre 2011
Riepilogo Report 6 7 8 dicembre 2011
 
Il Cittadino Risparmiatore e La Crisi
Il Cittadino Risparmiatore e La CrisiIl Cittadino Risparmiatore e La Crisi
Il Cittadino Risparmiatore e La Crisi
 
Jake Rescue Chameleon Project
Jake Rescue Chameleon ProjectJake Rescue Chameleon Project
Jake Rescue Chameleon Project
 
Diario Blog 0119 0123
Diario Blog 0119 0123Diario Blog 0119 0123
Diario Blog 0119 0123
 
Numeros
NumerosNumeros
Numeros
 
Report giornaliero del 7 dicembre 2011
Report giornaliero del 7 dicembre 2011Report giornaliero del 7 dicembre 2011
Report giornaliero del 7 dicembre 2011
 
Pendidikan Jasmani Zaman Purba
Pendidikan Jasmani Zaman PurbaPendidikan Jasmani Zaman Purba
Pendidikan Jasmani Zaman Purba
 
Profile Si Selectia De Personal
Profile Si Selectia De PersonalProfile Si Selectia De Personal
Profile Si Selectia De Personal
 
Presentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLD
Presentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLDPresentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLD
Presentazione WMO Milan 13 december 2014 $SPY $FTMIB $EUROSTOXX50 $GOLD
 
Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 2Introducere îN Psihologia EvoluţIonistă 2
Introducere îN Psihologia EvoluţIonistă 2
 
Diario Operativo Blog Gennaio Marzo 2010
Diario Operativo Blog Gennaio Marzo 2010Diario Operativo Blog Gennaio Marzo 2010
Diario Operativo Blog Gennaio Marzo 2010
 
Pdi abril2011 (1)
Pdi abril2011 (1)Pdi abril2011 (1)
Pdi abril2011 (1)
 
Evaluarea Dinamica Vs Evaluarea Psihometrica
Evaluarea Dinamica Vs Evaluarea PsihometricaEvaluarea Dinamica Vs Evaluarea Psihometrica
Evaluarea Dinamica Vs Evaluarea Psihometrica
 

Similar a 123

Network programming using python
Network programming using pythonNetwork programming using python
Network programming using pythonAli Nezhad
 
INTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.ppt
INTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.pptINTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.ppt
INTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.pptsenthilnathans25
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual Vivek Kumar Sinha
 
Network Prog.ppt
Network Prog.pptNetwork Prog.ppt
Network Prog.pptEloOgardo
 
TCP IP
TCP IPTCP IP
TCP IPhivasu
 
Socket Programming Tutorial 1227317798640739 8
Socket Programming Tutorial 1227317798640739 8Socket Programming Tutorial 1227317798640739 8
Socket Programming Tutorial 1227317798640739 8shanmuga priya
 
Socket Programming Tutorial
Socket Programming TutorialSocket Programming Tutorial
Socket Programming TutorialJignesh Patel
 
tp socket en C.pdf
tp socket en C.pdftp socket en C.pdf
tp socket en C.pdfYoussefJamma
 
Socket programming-tutorial-sk
Socket programming-tutorial-skSocket programming-tutorial-sk
Socket programming-tutorial-sksureshkarthick37
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commandstmavroidis
 

Similar a 123 (20)

Basic socket programming
Basic socket programmingBasic socket programming
Basic socket programming
 
sockets
socketssockets
sockets
 
Network programming using python
Network programming using pythonNetwork programming using python
Network programming using python
 
INTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.ppt
INTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.pptINTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.ppt
INTRODUCTION TO SOCKETS IN COMPUTER NETWORKS DEPT OF CSE.ppt
 
Sockets
Sockets Sockets
Sockets
 
sockets_intro.ppt
sockets_intro.pptsockets_intro.ppt
sockets_intro.ppt
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual
 
Basics of sockets
Basics of socketsBasics of sockets
Basics of sockets
 
Network Prog.ppt
Network Prog.pptNetwork Prog.ppt
Network Prog.ppt
 
Net Programming.ppt
Net Programming.pptNet Programming.ppt
Net Programming.ppt
 
Arduino práctico ethernet
Arduino práctico   ethernetArduino práctico   ethernet
Arduino práctico ethernet
 
TCP IP
TCP IPTCP IP
TCP IP
 
03 sockets
03 sockets03 sockets
03 sockets
 
Socket Programming Tutorial 1227317798640739 8
Socket Programming Tutorial 1227317798640739 8Socket Programming Tutorial 1227317798640739 8
Socket Programming Tutorial 1227317798640739 8
 
Socket Programming Tutorial
Socket Programming TutorialSocket Programming Tutorial
Socket Programming Tutorial
 
Pemrograman Jaringan
Pemrograman JaringanPemrograman Jaringan
Pemrograman Jaringan
 
tp socket en C.pdf
tp socket en C.pdftp socket en C.pdf
tp socket en C.pdf
 
Np unit2
Np unit2Np unit2
Np unit2
 
Socket programming-tutorial-sk
Socket programming-tutorial-skSocket programming-tutorial-sk
Socket programming-tutorial-sk
 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commands
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

123

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Socket Options #include <sys/types.h> #include <sys/socket.h> sockfd = socket(. . . .); int opt = 1; setsockopt(sockfd, SOL_SOCKET, SO_REUSEPORT, &opt, sizeof(opt)); bind(sockfd, . . . .);
  • 11. TCP : TIME_WAIT Client Server close Active Close FIN_WAIT_1 Passive Close CLOSE_WAIT FIN M ACK M+1 FIN N ACK N+1 FIN_WAIT_2 TIME_WAIT close LAST_ACK CLOSED
  • 12.