Write two command-line sockets programs

Assignment Help Computer Network Security
Reference no: EM13544470

Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”. Define a You-Are message as a UDP datagram containing the ASCII string “YOU ARE X AT Y” where X is the hostname string of the client host sending the Who-Am-I message and Y is the port number of the client host sending the WhoAm-I message. Write a client program to send a Who-Am-I message to a server and wait for a reply YouAre message from the server – on receiving the reply You-Are message the client program should print the message to the console and exit. The client program should take the IP address of the destination server from the command line (that is, as a command line argument). Write a server program that waits for a Who-Am-I message from a client and then returns to the client an You-Are message containing its host name and port number. The server program should not automatically terminate. If you modify existing code to meet the requirements of this assignment, be sure to carefully and clearly denote which code is yours and which is “old”. Be sure to consult the class C Style Guidelines for keeping your code style compliant. You are to submit two things: 1) A screenshot of execution and 2) the source code for the client and server programs.

Reference no: EM13544470

Questions Cloud

Find electronics workbench helpful in doing this portion : Design a circuit which provides 20 dB of gain. The 3dB filter points should be 50 HZ and 50 KHZ. Use a bipolar power supply (+/- 9V). Your circuit should be able to provide a minimum of 5 Watts of output power.
The fear of which faulkner speaks : what events not long before 1950 gave rise to the fear of which Faulkner speaks?
Example of the effect of multithreading : Imagine you are a graphic artist working on an animation for a movie. Describe at least one (1) possible effect that multithreading could have on your work process. Support your response with at least (1) example of the effect of multithreading.
Compare two kind and everyday use stories in an essay : Compare two kind and everyday use stories in an essay format of at least FIVE PARAGRAPHS  with an introduction, several body paragraphs, and a conclusion.
Write two command-line sockets programs : Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”
College and high school teaching similarities : College and High School teaching similarities are that he or she is put in a classroom to make sure that the rules are enforced and obey. ( how can I rephrase this sentence)
Loveliest of trees the cherry now : How can the poems, "Loveliest of Trees, the Cherry Now" and "High Windows" be compared and contrasted?
Identification of the major health issues for the african : Identification of the major health issues for the African American population with supporting evidence, data, and rationale
Create a primary function that uses a function handle with a : Create a primary function that uses a function handle with a nested function to compute the minimum of the function 20x2-200x+12 over the range 0

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the three general sources of security threats and

explain the three general sources of security threats and five types of security losses. your response should be at

  Explain decryption speed

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  Research commercial data repositories be sure to understand

in this writing assignment you will create a brochure advertising your services as a data repository.research

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Find one example of password protocols in microsoft product

Find one example of password protocols in Microsoft product and discuss its security or insecurity with your colleagues. If possible, install one of the available cracking tools to see whether you could crack this system and share your experience ..

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  How many bits is the encrypted message

Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

  Identify the types of network components devices and

define the requirements and then design an appropriate network that would support this dental practice. your answer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd