Make a program to transfer the same file from client side

Assignment Help Computer Engineering
Reference no: EM131232250

Programming Project using Socket

Using Java Language

Purpose: In this project, you are required to make a program to transfer the same file from client side to server side for one hundred times with TCP/UDP protocol. Every time as long as the file is transferred, compare with the stored standard file to see they are the same. If the received file is the same as the stored file, it means the file is transferred correctly, otherwise incorrectly. Count the transferring error rate (number of times incorrect file received at server side out of one hundred times) for TCP/UDP to see its (UDP or TCP) reliability. At the meantime, count the time in mili-second cost to transfer the same file for hundred times with TCP/UDP.

Detailed Requirements:

1. You need to make two programs including one client side (C), one server side (S).

2. You can finish either TCP or UDP code.

3. Please use Javalanguages. Using any other languages will result in zero of your project.

4. Your client and server side program must run in two different hosts, respectively. The two hosts must be two physical computers. The two hosts must connect through the Internet or local area network.

5. You client side program sends the same file (see the sample text format file) to the server side for one hundred times.

6. You server side program receives the file. Every time as long as the file is completely received, please compare with the sample file (stored at server side in advance) to see if they are the same. If the received file is different from the stored file, count one time incorrect transfer.

7. Use TCP/UDP to finish file transferring for one hundred times, count the number of time that incurs incorrect transfer, and count the average time used forone hundred times transferring.

8. You must test and explain your client and server side programs and demonstrate that your programs meet the requirements. In your demonstration, you must clearly show the IP addresses of the two machines/hosts (using ipconfig in windows and ifconfig in Unix or Linux), respectively. You also need to display the file in both sides

9. Zip your server and client side source code (no class code) and submit it through D2L dropbox. If you have special compiling and linking commands used, please attach a "readme.txt" file to let me know how to compile your source code. All the above files must be zipped into one submission file.

Reference no: EM131232250

Questions Cloud

Develop supporting facts and arguments for each position : Prepare an essay of at least 1,500 words. The paper should be 12-point font, Times New Roman, and include a final source list.
Develop supporting facts and arguments for each position : Prepare an essay of at least 1,500 words. The paper should be 12-point font, Times New Roman, and include a final source list.
Implementation of the black-scholes : Sys-Computation Finance ISyE 6767 - Consider an option portfolio consisting of a long position in the call option in problem 1 with τ = 0.5 and a short position in a call option with a different time to expiration
Three input cmos nand logic circuit : What is the optimum relation between the PMOS and NMOS width-to-length ratios for symmetrical switching speeds?
Make a program to transfer the same file from client side : In this project, you are required to make a program to transfer the same file from client side to server side for one hundred times with TCP/UDP protocol.
Identify the characteristics of the marketing plan : In developing a marketing plan, identify the characteristics of the marketing plan that P&G should implement to boost performance
Display current list contents using the enhanced for loop : Display the current list contents using the enhanced for loop along with appropriate output messages. Create a Listfterator object, iter, to be used in accessing the LinkedList contents.
Do you think that obtaining evidence in that manner ethical : As technology advances, there are more and more ethical and moral issues revolving around the use of scientific evidence. The book cites an example on page 155 of a suspect being identified through DNA left by a family member at a doctor's appo..
Determine the propagation delay time as a function : Use standard transistors and assume effective CT load capacitances of 0.05 pF. Determine the propagation delay time as a function of various transistor width-to-length ratios.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd