Networks and Protocols Course: International University Bremen Date: Dr. Jürgen Schönwälder Deadline:

Size: px
Start display at page:

Download "Networks and Protocols Course: 320301 International University Bremen Date: 2004-11-24 Dr. Jürgen Schönwälder Deadline: 2004-12-03."

Transcription

1 Networks and Protocols Course: International University Bremen Date: Dr. Jürgen Schönwälder Deadline: Problem Sheet #10 Problem 10.1: finger rpc server and client implementation ( =10 points) The finger protocol (described in RFC 1288) can be used to retrieve information about accounts active on remote systems. You have already implemented the finger protocol as part of previous homeworks. This time, you have to implement the finger service by using ONC remote procedure calls. particular, you have to solve the following tasks: In a) Write an XDR RPC language definition which defines RPC procedures for retrieving user information in long and short format. The procedures should allow a client to specify whether information for a particular user is retrieved or information about all active users on the system. b) Use the rpcgen tool to generate stub functions from the remote procedure definition. c) Write a client application which performs RPC calls to retrieve the requested information. Your client should accept the following command syntax: finger [-l] [-s] [user]@host Elements in square brackets are optional. The -l option requests long format while the -s option requests short format. If no option is given, the format defaults to short format when the user name is empty and long format otherwise. Some examples: finger root@thesun.iu-bremen.de finger finger -s root@thesun.iu-bremen.de Make sure your program handles all possible errors. d) Write a server application which implements the RPC functions. Again, make sure your program handles all possible errors. Solution: Below is a sample finger RPC definition. finger.x -- Definition of a simple finger service. Using the RPC interface, it probably does not really make sense to distinguish between short and long format anymore. But we do so in order to be consistent with the original finger service. const LOGIN_MAXLEN = 32; const USER_MAXLEN = 32; const TTY_MAXLEN = 32; struct finger string login<login_maxlen>;

2 string user<user_maxlen>; string tty<tty_maxlen>; ; typedef finger finger_array<>; program FINGERPROG = ; version FINGER_1 finger_array finger_short(string user<user_maxlen>) = 1; finger_array finger_long(string user<user_maxlen>) = 2; = 1; Below is a sample finger RPC client implementation. finger-rpc/finger_client.c -- Implementation of the finger client for the finger RPC server. #include "finger.h" #include <unistd.h> static const char progname = "finger"; finger_at_host(const char user, const char host, const int lflag) CLIENT clnt; finger_array result; char arg = (char ) user; int i; #ifndef DEBUG clnt = clnt_create (host, FINGERPROG, FINGER_1, "udp"); if (clnt == NULL) clnt_pcreateerror (host); exit(exit_failure); #endif DEBUG result = (lflag)? finger_long_1(&arg, clnt) : finger_short_1(&arg, clnt); if (result == NULL) clnt_perror(clnt, "call failed"); clnt_destroy(clnt); if (! lflag) printf("%-8s %-24s %-12s \r\n", "Login", "Name", "Tty"); for (i = 0; i < result->finger_array_len; i++) finger f = &result->finger_array_val[i]; if (lflag) printf("%slogin: %-24s Name: %-24s\r\nTty: %s\r\n",

3 i? "\r\n" : "", f->login, f->user? f->user : "?", f->tty); else printf("%-8s %-24s %-12s \r\n", f->login, f->user? f->user : "?", f->tty); #ifndef DEBUG clnt_destroy(clnt); #endif DEBUG int main (int argc, char argv[]) int i, c; char user, host; int lopt = 0, sopt = 0, lflag; while ((c = getopt(argc, argv, "ls")) >= 0) switch (c) case l : lopt = 1; sopt = 0; break; case s : sopt = 1; lopt = 0; break; if (argc == optind) fprintf(stderr, "usage: %s [-l] [-s] [-p port] [user]@host...\n", progname); return EXIT_FAILURE; for (i = optind; i < argc; i++) if (i > optind) printf("\n"); user = argv[i]; host = ); if (! host) fprintf(stderr, "%s: format must be [user]@host\n", progname); continue; host = 0; host++; lflag = (user[0]!= 0); if (sopt) lflag = 0; if (lopt) lflag = 1; finger_at_host(user, host, lflag);

4 return EXIT_SUCCESS; Below is a sample finger RPC server implementation. finger-rpc/finger_server.c -- Implementation of the finger procedures on the RPC server side. Both RPC calls (short and long format) are implemented using a common internal function. #include "finger.h" #define _GNU_SOURCE #include <stdio.h> #include <sys/types.h> #include <utmp.h> #include <pwd.h> #define WFLAG 0x01 finger_free(finger_array result) int i; if (! result->finger_array_val) for (i = 0; i < result->finger_array_len; i++) if (result->finger_array_val[i].login) free(result->finger_array_val[i].login); if (result->finger_array_val[i].user) free(result->finger_array_val[i].user); if (result->finger_array_val[i].tty) free(result->finger_array_val[i].tty); if (result->finger_array_val) free(result->finger_array_val); result->finger_array_val = NULL; result->finger_array_len = 0; finger_impl(finger_array result, const char user, int flags) int cnt = 0, alloc = 0; struct utmp utent; struct passwd pw; setutent(); while ((utent = getutent())!= NULL) if (utent->ut_type == USER_PROCESS && (! user! user strcmp(user, utent->ut_user) == 0)) if (alloc <= cnt) alloc += 10;

5 result->finger_array_val = realloc(result->finger_array_val, alloc sizeof(finger)); if (! result->finger_array_val) result->finger_array_len = 0; pw = getpwnam(utent->ut_user); result->finger_array_val[cnt].login = strdup(utent->ut_user); result->finger_array_val[cnt].user = strdup( (pw && pw->pw_gecos)? pw->pw_gecos : "?"); result->finger_array_val[cnt].tty = strdup( (flags & WFLAG)? utent->ut_line : ""); cnt++; result->finger_array_len = cnt; finger_array finger_short_1_svc(char argp, struct svc_req rqstp) static finger_array result = 0, NULL ; finger_free(&result); finger_impl(&result, argp? argp : NULL, 0); return &result; finger_array finger_long_1_svc(char argp, struct svc_req rqstp) static finger_array result = 0, NULL ; finger_free(&result); finger_impl(&result, argp? argp : NULL, WFLAG); return &result;

Specific Simple Network Management Tools

Specific Simple Network Management Tools Specific Simple Network Management Tools Jürgen Schönwälder University of Osnabrück Albrechtstr. 28 49069 Osnabrück, Germany Tel.: +49 541 969 2483 Email: Web:

More information

Lecture 17. Process Management. Process Management. Process Management. Inter-Process Communication. Inter-Process Communication

Lecture 17. Process Management. Process Management. Process Management. Inter-Process Communication. Inter-Process Communication Process Management Lecture 17 Review February 25, 2005 Program? Process? Thread? Disadvantages, advantages of threads? How do you identify processes? How do you fork a child process, the child process

More information

MCP/AS. ONC+ Remote Procedure Call (RPC) for MCP/AS Installation and Programming Guide MCP 12.0

MCP/AS. ONC+ Remote Procedure Call (RPC) for MCP/AS Installation and Programming Guide MCP 12.0 MCP/AS ONC+ Remote Procedure Call (RPC) for MCP/AS Installation and Programming Guide MCP 12.0 April 2008 . unisys imagine it. done. MCP/AS ONC+ Remote Procedure Call (RPC) for MCP/AS Installation and

More information

Programmation Systèmes Cours 4 Runtime user management

Programmation Systèmes Cours 4 Runtime user management Programmation Systèmes Cours 4 Runtime user management Stefano Zacchiroli zack@pps.jussieu.fr Laboratoire PPS, Université Paris Diderot - Paris 7 20 Octobre 2011 URL http://upsilon.cc/zack/teaching/1112/progsyst/

More information

Category: Standards Track August 1995

Category: Standards Track August 1995 Network Working Group R. Srinivasan Request for Comments: 1833 Sun Microsystems Category: Standards Track August 1995 Status of this Memo Binding Protocols for ONC RPC Version 2 This document specifies

More information

Theater Key Retrieval (TKR)

Theater Key Retrieval (TKR) Theater Key Retrieval (TKR) A System for Automated KDM Delivery 1 Introduction In Digital Cinema, the generation of KDMs is typically a highly automated process. However the delivery of those KDMs to the

More information

SQLITE C/C++ TUTORIAL

SQLITE C/C++ TUTORIAL http://www.tutorialspoint.com/sqlite/sqlite_c_cpp.htm SQLITE C/C++ TUTORIAL Copyright tutorialspoint.com Installation Before we start using SQLite in our C/C++ programs, we need to make sure that we have

More information

SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2

SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2 SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1

More information

OpenSMTPD: we deliver

OpenSMTPD: we deliver OpenSMTPD: we deliver Giovanni Bechis LinuxCon Europe 2015 About Me sys admin and developer @SNB OpenBSD developer Open Source developer in several other projects OpenSMTPD story

More information

How To Port A Program To Dynamic C (C) (C-Based) (Program) (For A Non Portable Program) (Un Portable) (Permanent) (Non Portable) C-Based (Programs) (Powerpoint)

How To Port A Program To Dynamic C (C) (C-Based) (Program) (For A Non Portable Program) (Un Portable) (Permanent) (Non Portable) C-Based (Programs) (Powerpoint) TN203 Porting a Program to Dynamic C Introduction Dynamic C has a number of improvements and differences compared to many other C compiler systems. This application note gives instructions and suggestions

More information

Shared file. LINUX Virtual File System. Hard link. Linux ext2fs. Disk layout in general. Linux: ext2fs & ext3fs, Windows NTFS Distributed Processing

Shared file. LINUX Virtual File System. Hard link. Linux ext2fs. Disk layout in general. Linux: ext2fs & ext3fs, Windows NTFS Distributed Processing Linux: ext2fs & ext3fs, Windows NTFS Distributed Processing Ch 12.8-9 [Stal 05] Ch 10.6.4, 11.6-7 Ch 20.7 [DDC 04] Ch 13 14.3 [Stal05] WEEK 9 Shared file Hard link Direct link from several directories

More information

Elementary Name and Address. Conversions

Elementary Name and Address. Conversions Elementary Name and Address Domain name system Conversions gethostbyname Function RES_USE_INET6 resolver option gethostbyname2 Function and IPv6 support gethostbyaddr Function uname and gethostname Functions

More information

Lecture 25 Systems Programming Process Control

Lecture 25 Systems Programming Process Control Lecture 25 Systems Programming Process Control A process is defined as an instance of a program that is currently running. A uni processor system or single core system can still execute multiple processes

More information

Monitoring of Tritium release at PTC.

Monitoring of Tritium release at PTC. Monitoring of Tritium release at PTC. Scope of the project From more than 20 projects supported by Equipment Manufacturing Support group this is one of the simplest. What is nice about it is that elegant

More information

PetaLinux SDK User Guide. Application Development Guide

PetaLinux SDK User Guide. Application Development Guide PetaLinux SDK User Guide Application Development Guide Notice of Disclaimer The information disclosed to you hereunder (the "Materials") is provided solely for the selection and use of Xilinx products.

More information

RPC and TI-RPC Test Suite Test Plan Document

RPC and TI-RPC Test Suite Test Plan Document RPC and TI-RPC Test Suite Test Plan Document Cyril LACABANNE Bull S.A.S. Version 1.3 12 July 2007 Revision history Version Description 1.0 First release 1.1 Several correction on 1, 5, 8, 14 1.2 Add first

More information

Programming Guide for Moxa Device Manager

Programming Guide for Moxa Device Manager Programming Guide for Moxa Device Manager First Edition, December 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Programming Guide for Moxa Device Manager The software described in this

More information

An Incomplete C++ Primer. University of Wyoming MA 5310

An Incomplete C++ Primer. University of Wyoming MA 5310 An Incomplete C++ Primer University of Wyoming MA 5310 Professor Craig C. Douglas http://www.mgnet.org/~douglas/classes/na-sc/notes/c++primer.pdf C++ is a legacy programming language, as is other languages

More information

Firewalking. A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists

Firewalking. A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists Firewalking A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists Cambridge Technology Partners Enterprise Security Services David Goldsmith Senior Security Architect

More information

Introduction. dnotify

Introduction. dnotify Introduction In a multi-user, multi-process operating system, files are continually being created, modified and deleted, often by apparently unrelated processes. This means that any software that needs

More information

iphone SDK Enrolled students will be invited to developer program Login to Program Portal Request a Certificate Download and install the SDK

iphone SDK Enrolled students will be invited to developer program Login to Program Portal Request a Certificate Download and install the SDK Objective-C Basics iphone SDK Enrolled students will be invited to developer program Login to Program Portal Request a Certificate Download and install the SDK The First Program in Objective-C #import

More information

7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012

7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012 7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012 October 17 th, 2012. Rules For all problems, read carefully the input and output session. For all problems, a sequential implementation is given,

More information

Distributed Internet Applications - DIA. Principles of Object-Oriented Middleware

Distributed Internet Applications - DIA. Principles of Object-Oriented Middleware Distributed Internet Applications - DIA Principles of Object-Oriented Middleware 1 Why Middleware? Distributed system construction directly on top of a transport layer is rather difficult. The communication

More information

Simple Network Management Protocol (SNMP) EngineID Discovery draft-schoenw-snmp-discover-01

Simple Network Management Protocol (SNMP) EngineID Discovery draft-schoenw-snmp-discover-01 Simple Network Management Protocol (SNMP) EngineID Discovery draft-schoenw-snmp-discover-01 Jürgen Schönwälder Jacobs University Bremen Bremen, Germany 68. IETF March 2007 Jürgen Schönwälder draft-schoenw-snmp-discover-01

More information

URI and UUID. Identifying things on the Web.

URI and UUID. Identifying things on the Web. URI and UUID Identifying things on the Web. Overview > Uniform Resource Identifiers (URIs) > URIStreamOpener > Universally Unique Identifiers (UUIDs) Uniform Resource Identifiers > Uniform Resource Identifiers

More information

Hands-on Hacking Unlimited

Hands-on Hacking Unlimited About Zone-H Attacks techniques (%) File Inclusion Shares misconfiguration SQL Injection DNS attack through social engineering Web Server external module intrusion Attack against the administrator/user

More information

CSE 333 SECTION 6. Networking and sockets

CSE 333 SECTION 6. Networking and sockets CSE 333 SECTION 6 Networking and sockets Goals for Today Overview of IP addresses Look at the IP address structures in C/C++ Overview of DNS Write your own (short!) program to do the domain name IP address

More information

QNX SDK for Apps and Media 1.0. Application and Window Management

QNX SDK for Apps and Media 1.0. Application and Window Management QNX SDK for Apps and Media 1.0 QNX SDK for Apps and Media 1.0 Application and Window Management 2014, QNX Software Systems Limited, a subsidiary of BlackBerry Limited. All rights reserved. QNX Software

More information

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters The char Type ASCII Encoding The C char type stores small integers. It is usually 8 bits. char variables guaranteed to be able to hold integers 0.. +127. char variables mostly used to store characters

More information

Virtuozzo Virtualization SDK

Virtuozzo Virtualization SDK Virtuozzo Virtualization SDK Programmer's Guide February 18, 2016 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200

More information

To connect to the cluster, simply use a SSH or SFTP client to connect to:

To connect to the cluster, simply use a SSH or SFTP client to connect to: RIT Computer Engineering Cluster The RIT Computer Engineering cluster contains 12 computers for parallel programming using MPI. One computer, cluster-head.ce.rit.edu, serves as the master controller or

More information

Illustration 1: Diagram of program function and data flow

Illustration 1: Diagram of program function and data flow The contract called for creation of a random access database of plumbing shops within the near perimeter of FIU Engineering school. The database features a rating number from 1-10 to offer a guideline

More information

Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1

Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1 Event Driven Simulation in NS2 Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1 Outline Recap: Discrete Event v.s. Time Driven Events and Handlers The Scheduler

More information

How to write a CGI for the Apache Web server in C

How to write a CGI for the Apache Web server in C How to write a CGI for the Apache Web server in C The Com/PC Embedded Gateway Linux (EGL/2) operating system comes with a pre-installed Apache Web server. Please see also mht-cpc1l-07.pdf: How to use the

More information

1 Abstract Data Types Information Hiding

1 Abstract Data Types Information Hiding 1 1 Abstract Data Types Information Hiding 1.1 Data Types Data types are an integral part of every programming language. ANSI-C has int, double and char to name just a few. Programmers are rarely content

More information

TFTP Usage and Design. Diskless Workstation Booting 1. TFTP Usage and Design (cont.) CSCE 515: Computer Network Programming ------ TFTP + Errors

TFTP Usage and Design. Diskless Workstation Booting 1. TFTP Usage and Design (cont.) CSCE 515: Computer Network Programming ------ TFTP + Errors CSCE 515: Computer Network Programming ------ TFTP + Errors Wenyuan Xu Department of Computer Science and Engineering University of South Carolina TFTP Usage and Design RFC 783, 1350 Transfer files between

More information

Tutorial on C Language Programming

Tutorial on C Language Programming Tutorial on C Language Programming Teodor Rus rus@cs.uiowa.edu The University of Iowa, Department of Computer Science Introduction to System Software p.1/64 Tutorial on C programming C program structure:

More information

µtasker Document FTP Client

µtasker Document FTP Client Embedding it better... µtasker Document FTP Client utaskerftp_client.doc/1.01 Copyright 2012 M.J.Butcher Consulting Table of Contents 1. Introduction...3 2. FTP Log-In...4 3. FTP Operation Modes...4 4.

More information

Oracle Tuxedo Systems and Application Monitor (TSAM)

Oracle Tuxedo Systems and Application Monitor (TSAM) Oracle Tuxedo Systems and Application Monitor (TSAM) Reference Guide 10g Release 3 (10.3) January 2009 Tuxedo Systems and Application Monitor Reference Guide, 10g Release 3 (10.3) Copyright 2007, 2009,

More information

Last Class: Communication in Distributed Systems. Today: Remote Procedure Calls

Last Class: Communication in Distributed Systems. Today: Remote Procedure Calls Last Class: Communication in Distributed Systems Structured or unstructured? Addressing? Blocking/non-blocking? Buffered or unbuffered? Reliable or unreliable? Server architecture Scalability Push or pull?

More information

An API for Reading the MySQL Binary Log

An API for Reading the MySQL Binary Log An API for Reading the MySQL Binary Log Mats Kindahl Lead Software Engineer, MySQL Replication & Utilities Lars Thalmann Development Director, MySQL Replication, Backup & Connectors

More information

Shared Memory Segments and POSIX Semaphores 1

Shared Memory Segments and POSIX Semaphores 1 Shared Memory Segments and POSIX Semaphores 1 Alex Delis delis -at+ pitt.edu October 2012 1 Acknowledgements to Prof. T. Stamatopoulos, M. Avidor, Prof. A. Deligiannakis, S. Evangelatos, Dr. V. Kanitkar

More information

OpenScape Business V1R3 myreports

OpenScape Business V1R3 myreports OpenScape Business V1R3 myreports HowTo Configure E-mail transmission Version 1.0 Table of Contents 1. Overview 3 2. Configuration 3 3. Basic functionality 4 3.1. myreports behavior without Synchronization

More information

Basic Java Constructs and Data Types Nuts and Bolts. Looking into Specific Differences and Enhancements in Java compared to C

Basic Java Constructs and Data Types Nuts and Bolts. Looking into Specific Differences and Enhancements in Java compared to C Basic Java Constructs and Data Types Nuts and Bolts Looking into Specific Differences and Enhancements in Java compared to C 1 Contents Hello World Program Statements Explained Java Program Structure in

More information

Debugging and Bug Tracking. Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com

Debugging and Bug Tracking. Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com Debugging and Bug Tracking Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com Learning goals 1. part: Debugging Terminology o Defect o Infection o Failure Debugging

More information

First Java Programs. V. Paúl Pauca. CSC 111D Fall, 2015. Department of Computer Science Wake Forest University. Introduction to Computer Science

First Java Programs. V. Paúl Pauca. CSC 111D Fall, 2015. Department of Computer Science Wake Forest University. Introduction to Computer Science First Java Programs V. Paúl Pauca Department of Computer Science Wake Forest University CSC 111D Fall, 2015 Hello World revisited / 8/23/15 The f i r s t o b l i g a t o r y Java program @author Paul Pauca

More information

Device Management API for Windows* and Linux* Operating Systems

Device Management API for Windows* and Linux* Operating Systems Device Management API for Windows* and Linux* Operating Systems Library Reference September 2004 05-2222-002 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

Sources: On the Web: Slides will be available on:

Sources: On the Web: Slides will be available on: C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,

More information

[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension

[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension [MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications

More information

Computer Systems II. Unix system calls. fork( ) wait( ) exit( ) How To Create New Processes? Creating and Executing Processes

Computer Systems II. Unix system calls. fork( ) wait( ) exit( ) How To Create New Processes? Creating and Executing Processes Computer Systems II Creating and Executing Processes 1 Unix system calls fork( ) wait( ) exit( ) 2 How To Create New Processes? Underlying mechanism - A process runs fork to create a child process - Parent

More information

Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct

Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct Dr. Martin O. Steinhauser University of Basel Graduate Lecture Spring Semester 2014 Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct Friday, 7 th March

More information

/* File: blkcopy.c. size_t n

/* File: blkcopy.c. size_t n 13.1. BLOCK INPUT/OUTPUT 505 /* File: blkcopy.c The program uses block I/O to copy a file. */ #include main() { signed char buf[100] const void *ptr = (void *) buf FILE *input, *output size_t

More information

TivaWare Utilities Library

TivaWare Utilities Library TivaWare Utilities Library USER S GUIDE SW-TM4C-UTILS-UG-1.1 Copyright 2013 Texas Instruments Incorporated Copyright Copyright 2013 Texas Instruments Incorporated. All rights reserved. Tiva and TivaWare

More information

HPCC - Hrothgar Getting Started User Guide MPI Programming

HPCC - Hrothgar Getting Started User Guide MPI Programming HPCC - Hrothgar Getting Started User Guide MPI Programming High Performance Computing Center Texas Tech University HPCC - Hrothgar 2 Table of Contents 1. Introduction... 3 2. Setting up the environment...

More information

Networks. Inter-process Communication. Pipes. Inter-process Communication

Networks. Inter-process Communication. Pipes. Inter-process Communication Networks Mechanism by which two processes exchange information and coordinate activities Inter-process Communication process CS 217 process Network 1 2 Inter-process Communication Sockets o Processes can

More information

CS 294-73 Software Engineering for Scientific Computing. http://www.cs.berkeley.edu/~colella/cs294. Lecture 25:Mixed Language Programming.

CS 294-73 Software Engineering for Scientific Computing. http://www.cs.berkeley.edu/~colella/cs294. Lecture 25:Mixed Language Programming. CS 294-73 Software Engineering for Scientific Computing http://www.cs.berkeley.edu/~colella/cs294 Lecture 25:Mixed Language Programming. Different languages Technical, historical, cultural differences

More information

Process Monitor HOW TO for Linux

Process Monitor HOW TO for Linux Table of Contents Process Monitor HOW TO for Linux...1 Al Dev (Alavoor Vasudevan) alavoor@yahoo.com...1 1.Linux or Unix Processes...1 2.Unix/Linux command procautostart...1 3.File procautostart.cpp...1

More information

Network Address Translation Commands

Network Address Translation Commands Network Address Translation Commands This chapter describes the function and displays the syntax for Network Address Translation (NAT) commands. For more information about defaults and usage guidelines,

More information

Channel Access Client Programming. Andrew Johnson Computer Scientist, AES-SSG

Channel Access Client Programming. Andrew Johnson Computer Scientist, AES-SSG Channel Access Client Programming Andrew Johnson Computer Scientist, AES-SSG Channel Access The main programming interface for writing Channel Access clients is the library that comes with EPICS base Written

More information

Tail call elimination. Michel Schinz

Tail call elimination. Michel Schinz Tail call elimination Michel Schinz Tail calls and their elimination Loops in functional languages Several functional programming languages do not have an explicit looping statement. Instead, programmers

More information

Getting Started with the Internet Communications Engine

Getting Started with the Internet Communications Engine Getting Started with the Internet Communications Engine David Vriezen April 7, 2014 Contents 1 Introduction 2 2 About Ice 2 2.1 Proxies................................. 2 3 Setting Up ICE 2 4 Slices 2

More information

CMLOG: A Common Message Logging System

CMLOG: A Common Message Logging System CMLOG: A Common Message Logging System Jie Chen, Walt Akers, Matt Bickley, Danjin Wu and William Watson III Control Software Group Thomas Jefferson National Accelerator Facility Newport News, Virginia

More information

Output: 12 18 30 72 90 87. struct treenode{ int data; struct treenode *left, *right; } struct treenode *tree_ptr;

Output: 12 18 30 72 90 87. struct treenode{ int data; struct treenode *left, *right; } struct treenode *tree_ptr; 50 20 70 10 30 69 90 14 35 68 85 98 16 22 60 34 (c) Execute the algorithm shown below using the tree shown above. Show the exact output produced by the algorithm. Assume that the initial call is: prob3(root)

More information

Internet Payment Gateway. Win32 API Developer Guide

Internet Payment Gateway. Win32 API Developer Guide Internet Payment Gateway Win32 API Developer Guide Table of Contents Disclaimer... 3 Confidentiality... 3 Document Purpose / Intended Audience... 3 Related Documents... 3 1 Introduction... 4 1.1 Minimum

More information

System Calls and Standard I/O

System Calls and Standard I/O System Calls and Standard I/O Professor Jennifer Rexford http://www.cs.princeton.edu/~jrex 1 Goals of Today s Class System calls o How a user process contacts the Operating System o For advanced services

More information

MyPBX Security Configuration Guide

MyPBX Security Configuration Guide MyPBX Security Configuration Guide Version: V1.4 Date: March 25 th, 2013 Yeastar Technology Co., Ltd. http://www.yeastar.com 1/16 Contents 1. Security Configuration for Web GUI..3 1.1 Change the default

More information

---------------------------------- Exploiting Cisco Systems (Even From Windows! ;-) ) Written by Cyvamp (with a few notes added by Raven) July 2000

---------------------------------- Exploiting Cisco Systems (Even From Windows! ;-) ) Written by Cyvamp (with a few notes added by Raven) July 2000 Exploiting Cisco Systems (Even From Windows! ;-) ) Written by Cyvamp (with a few notes added by Raven) July 2000 http://blacksun.box.sk Warning: DO NOT use this to damage cisco systems, or gain unauthorized

More information

Chapter 2: Remote Procedure Call (RPC)

Chapter 2: Remote Procedure Call (RPC) Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC

More information

System Security Fundamentals

System Security Fundamentals System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview

More information

CSC230 Getting Starting in C. Tyler Bletsch

CSC230 Getting Starting in C. Tyler Bletsch CSC230 Getting Starting in C Tyler Bletsch What is C? The language of UNIX Procedural language (no classes) Low-level access to memory Easy to map to machine language Not much run-time stuff needed Surprisingly

More information

Embedded Software Development

Embedded Software Development Linköpings Tekniska Högskola Institutionen för Datavetanskap (IDA), Software and Systems (SaS) TDDI11, Embedded Software 2010-04-22 Embedded Software Development Host and Target Machine Typical embedded

More information

Implementing Network Software

Implementing Network Software Implementing Network Software Outline Sockets Example Process Models Message Buffers Spring 2007 CSE 30264 1 Sockets Application Programming Interface (API) Socket interface socket : point where an application

More information

Lesson 4 Web Service Interface Definition (Part I)

Lesson 4 Web Service Interface Definition (Part I) Lesson 4 Web Service Interface Definition (Part I) Service Oriented Architectures Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Interface Definition Languages (1) IDLs

More information

System Calls Related to File Manipulation

System Calls Related to File Manipulation KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS Information and Computer Science Department ICS 431 Operating Systems Lab # 12 System Calls Related to File Manipulation Objective: In this lab we will be

More information

Writing a C-based Client/Server

Writing a C-based Client/Server Working the Socket Writing a C-based Client/Server Consider for a moment having the massive power of different computers all simultaneously trying to compute a problem for you -- and still being legal!

More information

Brent A. Perdue. July 15, 2009

Brent A. Perdue. July 15, 2009 Title Page Object-Oriented Programming, Writing Classes, and Creating Libraries and Applications Brent A. Perdue ROOT @ TUNL July 15, 2009 B. A. Perdue (TUNL) OOP, Classes, Libraries, Applications July

More information

3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version

3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin wolin@jlab.org Carl Timmer timmer@jlab.org

More information

SEVENSTAX-SNMP. User Manual

SEVENSTAX-SNMP. User Manual SEVENSTAX-SNMP User Manual Revision No.: 1.7 State: Release Author: sevenstax GmbH Initial version: 31/01/08 Last change: 24/01/11 Last Review: 07/12/10 Publication: Public Filename: sevenstaxsnmp_usermanual_v01_07

More information

Chapter 5 Real time clock by John Leung

Chapter 5 Real time clock by John Leung Chapter 5 Real time clock 5.1 Philips PCF8563 Real time clock (RTC) Philips PCF8563 (U5) is an I 2 C compatible real time clock (RTC). Alternatively, this chip can be replaced by a software module like

More information

C Programming Review & Productivity Tools

C Programming Review & Productivity Tools Review & Productivity Tools Giovanni Agosta Piattaforme Software per la Rete Modulo 2 Outline Preliminaries 1 Preliminaries 2 Function Pointers Variadic Functions 3 Build Automation Code Versioning 4 Preliminaries

More information

C++ Outline. cout << "Enter two integers: "; int x, y; cin >> x >> y; cout << "The sum is: " << x + y << \n ;

C++ Outline. cout << Enter two integers: ; int x, y; cin >> x >> y; cout << The sum is:  << x + y << \n ; C++ Outline Notes taken from: - Drake, Caleb. EECS 370 Course Notes, University of Illinois Chicago, Spring 97. Chapters 9, 10, 11, 13.1 & 13.2 - Horstman, Cay S. Mastering Object-Oriented Design in C++.

More information

How to Secure Network Printers?

How to Secure Network Printers? How to Secure Network Printers? IT Security Office June 7, 2006 Agenda Printer History & Statistics The problem with Network Printers Tools for managing network printers How to secure your printers What

More information

CSCI110: Examination information.

CSCI110: Examination information. CSCI110: Examination information. The exam for CSCI110 will consist of short answer questions. Most of them will require a couple of sentences of explanation of a concept covered in lectures or practical

More information

CS 103 Lab Linux and Virtual Machines

CS 103 Lab Linux and Virtual Machines 1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

ESPResSo Summer School 2012

ESPResSo Summer School 2012 ESPResSo Summer School 2012 Introduction to Tcl Pedro A. Sánchez Institute for Computational Physics Allmandring 3 D-70569 Stuttgart Germany http://www.icp.uni-stuttgart.de 2/26 Outline History, Characteristics,

More information

Pine Exchange mini HOWTO

Pine Exchange mini HOWTO Pine Exchange mini HOWTO Alexandru Roman v1.0, 2002 03 28 Revision History Revision 1.0 2002 03 28 Revised by: ar Submitted to the LDP for publication. Revision 0.3 2002 03 25 Revised

More information

Phys4051: C Lecture 2 & 3. Comment Statements. C Data Types. Functions (Review) Comment Statements Variables & Operators Branching Instructions

Phys4051: C Lecture 2 & 3. Comment Statements. C Data Types. Functions (Review) Comment Statements Variables & Operators Branching Instructions Phys4051: C Lecture 2 & 3 Functions (Review) Comment Statements Variables & Operators Branching Instructions Comment Statements! Method 1: /* */! Method 2: // /* Single Line */ //Single Line /* This comment

More information

COSC 6397 Big Data Analytics. Distributed File Systems (II) Edgar Gabriel Spring 2014. HDFS Basics

COSC 6397 Big Data Analytics. Distributed File Systems (II) Edgar Gabriel Spring 2014. HDFS Basics COSC 6397 Big Data Analytics Distributed File Systems (II) Edgar Gabriel Spring 2014 HDFS Basics An open-source implementation of Google File System Assume that node failure rate is high Assumes a small

More information

Implementing a Web Service Client using Java

Implementing a Web Service Client using Java Implementing a Web Service Client using Java Requirements This guide is based on implementing a Java Client using JAX-WS that comes with Java Web Services Developer Pack version 2.0 (JWSDP). This can be

More information

Chapter 46 Terminal Server

Chapter 46 Terminal Server Chapter 46 Terminal Server Introduction... 46-2 TTY Devices... 46-2 Multiple Sessions... 46-4 Accessing Telnet Hosts... 46-5 Command Reference... 46-7 connect... 46-7 disable telnet server... 46-7 disconnect...

More information

CORBA Programming with TAOX11. The C++11 CORBA Implementation

CORBA Programming with TAOX11. The C++11 CORBA Implementation CORBA Programming with TAOX11 The C++11 CORBA Implementation TAOX11: the CORBA Implementation by Remedy IT TAOX11 simplifies development of CORBA based applications IDL to C++11 language mapping is easy

More information

How to Add a New System Call for Minix 3

How to Add a New System Call for Minix 3 How to Add a New System Call for Minix 3 Karthick Jayaraman Department of Electrical Engineering & Computer Science Syracuse University, Syracuse, New York 1. Introduction Minix3 has the micro-kernel architecture.

More information

Using SQL-server as database engine

Using SQL-server as database engine This tutorial explains on a step by step base how to configure YDOC-Insights for usage with a SQL-server database. (How to manage SQL-server itself is not part of this tutorial) CONTENTS CONTENTS 1 1.

More information

Netscape Internet Service Broker for C++ Programmer's Guide. Contents

Netscape Internet Service Broker for C++ Programmer's Guide. Contents Netscape Internet Service Broker for C++ Programmer's Guide Page 1 of 5 [Next] Netscape Internet Service Broker for C++ Programmer's Guide Nescape ISB for C++ - Provides information on how to develop and

More information

Session NM059. TCP/IP Programming on VMS. Geoff Bryant Process Software

Session NM059. TCP/IP Programming on VMS. Geoff Bryant Process Software Session NM059 TCP/IP Programming on VMS Geoff Bryant Process Software Course Roadmap Slide 160 NM055 (11:00-12:00) Important Terms and Concepts TCP/IP and Client/Server Model Sockets and TLI Client/Server

More information

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key

More information

How To Understand How A Process Works In Unix (Shell) (Shell Shell) (Program) (Unix) (For A Non-Program) And (Shell).Orgode) (Powerpoint) (Permanent) (Processes

How To Understand How A Process Works In Unix (Shell) (Shell Shell) (Program) (Unix) (For A Non-Program) And (Shell).Orgode) (Powerpoint) (Permanent) (Processes Content Introduction and History File I/O The File System Shell Programming Standard Unix Files and Configuration Processes Programs are instruction sets stored on a permanent medium (e.g. harddisc). Processes

More information

Keil C51 Cross Compiler

Keil C51 Cross Compiler Keil C51 Cross Compiler ANSI C Compiler Generates fast compact code for the 8051 and it s derivatives Advantages of C over Assembler Do not need to know the microcontroller instruction set Register allocation

More information

CP Lab 2: Writing programs for simple arithmetic problems

CP Lab 2: Writing programs for simple arithmetic problems Computer Programming (CP) Lab 2, 2015/16 1 CP Lab 2: Writing programs for simple arithmetic problems Instructions The purpose of this Lab is to guide you through a series of simple programming problems,

More information