Write two command-line sockets programs

Assignment Help Computer Network Security
Reference no: EM13544470

Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”. Define a You-Are message as a UDP datagram containing the ASCII string “YOU ARE X AT Y” where X is the hostname string of the client host sending the Who-Am-I message and Y is the port number of the client host sending the WhoAm-I message. Write a client program to send a Who-Am-I message to a server and wait for a reply YouAre message from the server – on receiving the reply You-Are message the client program should print the message to the console and exit. The client program should take the IP address of the destination server from the command line (that is, as a command line argument). Write a server program that waits for a Who-Am-I message from a client and then returns to the client an You-Are message containing its host name and port number. The server program should not automatically terminate. If you modify existing code to meet the requirements of this assignment, be sure to carefully and clearly denote which code is yours and which is “old”. Be sure to consult the class C Style Guidelines for keeping your code style compliant. You are to submit two things: 1) A screenshot of execution and 2) the source code for the client and server programs.

Reference no: EM13544470

Questions Cloud

Find electronics workbench helpful in doing this portion : Design a circuit which provides 20 dB of gain. The 3dB filter points should be 50 HZ and 50 KHZ. Use a bipolar power supply (+/- 9V). Your circuit should be able to provide a minimum of 5 Watts of output power.
The fear of which faulkner speaks : what events not long before 1950 gave rise to the fear of which Faulkner speaks?
Example of the effect of multithreading : Imagine you are a graphic artist working on an animation for a movie. Describe at least one (1) possible effect that multithreading could have on your work process. Support your response with at least (1) example of the effect of multithreading.
Compare two kind and everyday use stories in an essay : Compare two kind and everyday use stories in an essay format of at least FIVE PARAGRAPHS  with an introduction, several body paragraphs, and a conclusion.
Write two command-line sockets programs : Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”
College and high school teaching similarities : College and High School teaching similarities are that he or she is put in a classroom to make sure that the rules are enforced and obey. ( how can I rephrase this sentence)
Loveliest of trees the cherry now : How can the poems, "Loveliest of Trees, the Cherry Now" and "High Windows" be compared and contrasted?
Identification of the major health issues for the african : Identification of the major health issues for the African American population with supporting evidence, data, and rationale
Create a primary function that uses a function handle with a : Create a primary function that uses a function handle with a nested function to compute the minimum of the function 20x2-200x+12 over the range 0

Reviews

Write a Review

Computer Network Security Questions & Answers

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  Most of the organizations have now adopted or begun to

many organizations have now adopted or begun to offer cloud computing. this type of computing has advantages and

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  Analysis to be presented in a 10- to 15-slide microsoft

analysis to be presented in a 10- to 15-slide microsoft powerpoint presentation and use detailed speaker notes for

  How would you divide up your network to satisfy requirements

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Discussion on training

This issue of training is specific to each company, so there is no one size fits all plan. I do believe in training staff just before a new system is deployed,

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

  Ealuate the significance of the internet describe how the

1. analyze the evolution of internet to do this show how it has changed over time.2. evaluate the significance of the

  Do viruses infect hardware and executable files

Since physical security is often managed under separate responsibility from information security, risk analysis for information security does not need to address physical security.

  Malicious attacks and / or threats that you identified

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd