Develop application - a connection oriented

Assignment Help Computer Networking
Reference no: EM131041551

In this project, you will develop two applications: a connection oriented (TCP) IM (Instant message) server and a client. The implementation logic is similar to the first two programs but with some difference: 1) Use TCP as transport layer protocol. 2) Since this project will use TCP rather than UDP, there is no need for an application level message number (means no need the random 5digits number from the two projects), so that has been dropped from the message format. That means that everything following the first semi-colon should be encrypted. 3) Client servers as a client as well as a server.

Server:

Your server will need to respond to sign-on messages (message type 1) from clients. Your server should be able to support up to 5 clients at one time. It must also be able to send updates to those clients as other members join and leave the system.
It must be running in a Linux machine.

Client:

You will register with your server, but once you have signed on, you will get the names and addresses (IP and port) of all active users. Then all message passing will be directly between clients (P2P applications). When you are done, you send a sign-off message to the server and then close all of your open connections.

As with the first project, all of the information following the message type and semi-colon should be encrypted. By default, you should use the same cipher_sp14.h header used in project 1, however, there are some differences. Since this project will use TCP rather than UDP, there is no need for an application level message number, so that has been dropped from the message format. That means that everything following the first semi-colon should be encrypted.

It can be running either in a Windows or Linux machine.

Attachment:- Assignment.rar

Reference no: EM131041551

Questions Cloud

Room and begin rummaging through the archive boxes : The budget is being prepared on a month-by-month basis, by analysing the same month from the previous three years. January and February have been completed, so you need to start working on March.
Explore wikipedia entry concept map and then create your own : Write down ideas you are considering for your topic and begin organizing them (a process called "brainstorming"). Explore the Wikipedia entry Concept Map and then create your own. During your brainstorming, use the websites bubble.us, Mindmeister,..
What prompted the rise in the domestic slave trade : How did older slaves prepare younger generations to deal with the brutal realities of slavery (punishments, sexual exploitation, poor diet, intolerable working conditions, etc)?
What are byods and how are they currently being used : The report is to be based on the following case study scenarioabout Bring Your Own Devices - What are BYODs and how are they currently being used. You should explore a range of applications of BYOD,for example, in areas such as healthcare, educatio..
Develop application - a connection oriented : In this project, you will develop two applications: a connection oriented (TCP) IM (Instant message) server and a client
Which one actor do you think should have won the oscar : Three actors were nominated for the Academy Award for Best Supporting Actor but none of them won. Which one actor do you think should have won the Oscar and Why? Lee J. Cobb as Johnny Friendly, Karl Malden as the Priest, or Rod Steiger as Charli..
The spot exchange rate for indian rupees : The spot exchange rate for Indian Rupees is Rs 44/$. The one-year forward exchange rate is Rs 46/$ and the one-year U.S. interest rate is 5%. What is the implied one-year interest rate in India? A) 9.24% B) 10.24% C) 8.56% D) 9.77%
How they approach their stories : How they approach their stories. Do they have a structure that they use if so describe it ( ie. Do they do human profiles, do they quote sources, do they use statistics, quotes, facts, outside experts etc.
Explain nora reasons for leaving her home and family : Discuss how the Younger's enivrionment impacts their lives. Even though Walter Sr never appears in the play, he is an important character. Discuss his significance.

Reviews

Write a Review

Computer Networking Questions & Answers

  Project on networking service request

Resources: Service requests SR-lf-003, SR-ht-011, and SR-kf-015; and the Lafluer Trading Company, Huffman Trucking, and Kudler Fine Foods Virtual Organizations. Review this entire document. Choose one of the SR-lf-003, SR-ht-011, or SR-kf-015 serv..

  What ip range would an isp provide to a customer

Using the IP ranges below: 245.0.0.0/8 225.113.9.0/25 169.254.137.0/25 192.168.0.0/16 172.16.0.0/24 10.0.0.0/8 245.125.1378.0/24 215.154.10.0/24 225.113.8.0/24 127.0.0.0/8 10.0.0.0/24 a)

  Would a packet-switched network or a circuit-switched

consider an application that transmits data at a steady rate for example the sender generates an n-bit unit of data

  Write report listing possible vulnerabilities of the wlan

Based on this information, write a one-page report listing possible vulnerabilities of the WLAN's current configuration. Your report should include recommendations for improving wireless security

  How to set up a small network in hardware and software

Explain how you would set up a small network in hardware and software for a charity with six computers running Windows 7. The charity would like to share an Internet connection and buy a multifunction device

  Describe quality-of-service

You were hired as a network engineer for a small firm that had just recently implemented a voice-over Internet protocol (VoIP) solution in its converged network, which had replaced all of its analog lines. Describe quality-of-service

  Deliver a research paper and presentation based on your

deliver a research paper and presentation based on your research.future threats to network security and planning for

  Knowledge and understanding of computer networks

Write a report that investigates network cabling options available in your country for the network you have designed. Your report should provide recommendations for the cabling and connectors to purchase.

  List and briefly define the key areas comprise network

List and briefly define the key areas that comprise network management. Explain succinctly the difference between the database of a network management system and its MIB. How do you implement each in a network management system

  Disadvantages of several different web technologies

Describe the advantages and disadvantages of several different Web 2.0 technologies. How could these technologies be used for good? What types of problems might these technologies cause?

  Information security security being a top concern for any

security being a top concern for any organisation choosing the correct security solutions is of utmost importance.

  Under what conditions should the page be copied locally

That page is initially remote, and it takes C nsec to copy it locally. Under what conditions should the page be copied locally in the absence of significant use by other processors?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd