Networks and Protocols Course: International University Bremen Date: Dr. Jürgen Schönwälder Deadline:
|
|
- Bethanie Cook
- 8 years ago
- Views:
Transcription
1 Networks and Protocols Course: International University Bremen Date: Dr. Jürgen Schönwälder Deadline: Problem Sheet #10 Problem 10.1: finger rpc server and client implementation ( =10 points) The finger protocol (described in RFC 1288) can be used to retrieve information about accounts active on remote systems. You have already implemented the finger protocol as part of previous homeworks. This time, you have to implement the finger service by using ONC remote procedure calls. particular, you have to solve the following tasks: In a) Write an XDR RPC language definition which defines RPC procedures for retrieving user information in long and short format. The procedures should allow a client to specify whether information for a particular user is retrieved or information about all active users on the system. b) Use the rpcgen tool to generate stub functions from the remote procedure definition. c) Write a client application which performs RPC calls to retrieve the requested information. Your client should accept the following command syntax: finger [-l] [-s] [user]@host Elements in square brackets are optional. The -l option requests long format while the -s option requests short format. If no option is given, the format defaults to short format when the user name is empty and long format otherwise. Some examples: finger root@thesun.iu-bremen.de finger finger -s root@thesun.iu-bremen.de Make sure your program handles all possible errors. d) Write a server application which implements the RPC functions. Again, make sure your program handles all possible errors. Solution: Below is a sample finger RPC definition. finger.x -- Definition of a simple finger service. Using the RPC interface, it probably does not really make sense to distinguish between short and long format anymore. But we do so in order to be consistent with the original finger service. const LOGIN_MAXLEN = 32; const USER_MAXLEN = 32; const TTY_MAXLEN = 32; struct finger string login<login_maxlen>;
2 string user<user_maxlen>; string tty<tty_maxlen>; ; typedef finger finger_array<>; program FINGERPROG = ; version FINGER_1 finger_array finger_short(string user<user_maxlen>) = 1; finger_array finger_long(string user<user_maxlen>) = 2; = 1; Below is a sample finger RPC client implementation. finger-rpc/finger_client.c -- Implementation of the finger client for the finger RPC server. #include "finger.h" #include <unistd.h> static const char progname = "finger"; finger_at_host(const char user, const char host, const int lflag) CLIENT clnt; finger_array result; char arg = (char ) user; int i; #ifndef DEBUG clnt = clnt_create (host, FINGERPROG, FINGER_1, "udp"); if (clnt == NULL) clnt_pcreateerror (host); exit(exit_failure); #endif DEBUG result = (lflag)? finger_long_1(&arg, clnt) : finger_short_1(&arg, clnt); if (result == NULL) clnt_perror(clnt, "call failed"); clnt_destroy(clnt); if (! lflag) printf("%-8s %-24s %-12s \r\n", "Login", "Name", "Tty"); for (i = 0; i < result->finger_array_len; i++) finger f = &result->finger_array_val[i]; if (lflag) printf("%slogin: %-24s Name: %-24s\r\nTty: %s\r\n",
3 i? "\r\n" : "", f->login, f->user? f->user : "?", f->tty); else printf("%-8s %-24s %-12s \r\n", f->login, f->user? f->user : "?", f->tty); #ifndef DEBUG clnt_destroy(clnt); #endif DEBUG int main (int argc, char argv[]) int i, c; char user, host; int lopt = 0, sopt = 0, lflag; while ((c = getopt(argc, argv, "ls")) >= 0) switch (c) case l : lopt = 1; sopt = 0; break; case s : sopt = 1; lopt = 0; break; if (argc == optind) fprintf(stderr, "usage: %s [-l] [-s] [-p port] [user]@host...\n", progname); return EXIT_FAILURE; for (i = optind; i < argc; i++) if (i > optind) printf("\n"); user = argv[i]; host = ); if (! host) fprintf(stderr, "%s: format must be [user]@host\n", progname); continue; host = 0; host++; lflag = (user[0]!= 0); if (sopt) lflag = 0; if (lopt) lflag = 1; finger_at_host(user, host, lflag);
4 return EXIT_SUCCESS; Below is a sample finger RPC server implementation. finger-rpc/finger_server.c -- Implementation of the finger procedures on the RPC server side. Both RPC calls (short and long format) are implemented using a common internal function. #include "finger.h" #define _GNU_SOURCE #include <stdio.h> #include <sys/types.h> #include <utmp.h> #include <pwd.h> #define WFLAG 0x01 finger_free(finger_array result) int i; if (! result->finger_array_val) for (i = 0; i < result->finger_array_len; i++) if (result->finger_array_val[i].login) free(result->finger_array_val[i].login); if (result->finger_array_val[i].user) free(result->finger_array_val[i].user); if (result->finger_array_val[i].tty) free(result->finger_array_val[i].tty); if (result->finger_array_val) free(result->finger_array_val); result->finger_array_val = NULL; result->finger_array_len = 0; finger_impl(finger_array result, const char user, int flags) int cnt = 0, alloc = 0; struct utmp utent; struct passwd pw; setutent(); while ((utent = getutent())!= NULL) if (utent->ut_type == USER_PROCESS && (! user! user strcmp(user, utent->ut_user) == 0)) if (alloc <= cnt) alloc += 10;
5 result->finger_array_val = realloc(result->finger_array_val, alloc sizeof(finger)); if (! result->finger_array_val) result->finger_array_len = 0; pw = getpwnam(utent->ut_user); result->finger_array_val[cnt].login = strdup(utent->ut_user); result->finger_array_val[cnt].user = strdup( (pw && pw->pw_gecos)? pw->pw_gecos : "?"); result->finger_array_val[cnt].tty = strdup( (flags & WFLAG)? utent->ut_line : ""); cnt++; result->finger_array_len = cnt; finger_array finger_short_1_svc(char argp, struct svc_req rqstp) static finger_array result = 0, NULL ; finger_free(&result); finger_impl(&result, argp? argp : NULL, 0); return &result; finger_array finger_long_1_svc(char argp, struct svc_req rqstp) static finger_array result = 0, NULL ; finger_free(&result); finger_impl(&result, argp? argp : NULL, WFLAG); return &result;
Specific Simple Network Management Tools
Specific Simple Network Management Tools Jürgen Schönwälder University of Osnabrück Albrechtstr. 28 49069 Osnabrück, Germany Tel.: +49 541 969 2483 Email: Web:
More informationLecture 17. Process Management. Process Management. Process Management. Inter-Process Communication. Inter-Process Communication
Process Management Lecture 17 Review February 25, 2005 Program? Process? Thread? Disadvantages, advantages of threads? How do you identify processes? How do you fork a child process, the child process
More informationMCP/AS. ONC+ Remote Procedure Call (RPC) for MCP/AS Installation and Programming Guide MCP 12.0
MCP/AS ONC+ Remote Procedure Call (RPC) for MCP/AS Installation and Programming Guide MCP 12.0 April 2008 . unisys imagine it. done. MCP/AS ONC+ Remote Procedure Call (RPC) for MCP/AS Installation and
More informationProgrammation Systèmes Cours 4 Runtime user management
Programmation Systèmes Cours 4 Runtime user management Stefano Zacchiroli zack@pps.jussieu.fr Laboratoire PPS, Université Paris Diderot - Paris 7 20 Octobre 2011 URL http://upsilon.cc/zack/teaching/1112/progsyst/
More informationCategory: Standards Track August 1995
Network Working Group R. Srinivasan Request for Comments: 1833 Sun Microsystems Category: Standards Track August 1995 Status of this Memo Binding Protocols for ONC RPC Version 2 This document specifies
More informationTheater Key Retrieval (TKR)
Theater Key Retrieval (TKR) A System for Automated KDM Delivery 1 Introduction In Digital Cinema, the generation of KDMs is typically a highly automated process. However the delivery of those KDMs to the
More informationSQLITE C/C++ TUTORIAL
http://www.tutorialspoint.com/sqlite/sqlite_c_cpp.htm SQLITE C/C++ TUTORIAL Copyright tutorialspoint.com Installation Before we start using SQLite in our C/C++ programs, we need to make sure that we have
More informationSMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2
SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1
More informationOpenSMTPD: we deliver
OpenSMTPD: we deliver Giovanni Bechis LinuxCon Europe 2015 About Me sys admin and developer @SNB OpenBSD developer Open Source developer in several other projects OpenSMTPD story
More informationHow To Port A Program To Dynamic C (C) (C-Based) (Program) (For A Non Portable Program) (Un Portable) (Permanent) (Non Portable) C-Based (Programs) (Powerpoint)
TN203 Porting a Program to Dynamic C Introduction Dynamic C has a number of improvements and differences compared to many other C compiler systems. This application note gives instructions and suggestions
More informationShared file. LINUX Virtual File System. Hard link. Linux ext2fs. Disk layout in general. Linux: ext2fs & ext3fs, Windows NTFS Distributed Processing
Linux: ext2fs & ext3fs, Windows NTFS Distributed Processing Ch 12.8-9 [Stal 05] Ch 10.6.4, 11.6-7 Ch 20.7 [DDC 04] Ch 13 14.3 [Stal05] WEEK 9 Shared file Hard link Direct link from several directories
More informationElementary Name and Address. Conversions
Elementary Name and Address Domain name system Conversions gethostbyname Function RES_USE_INET6 resolver option gethostbyname2 Function and IPv6 support gethostbyaddr Function uname and gethostname Functions
More informationLecture 25 Systems Programming Process Control
Lecture 25 Systems Programming Process Control A process is defined as an instance of a program that is currently running. A uni processor system or single core system can still execute multiple processes
More informationMonitoring of Tritium release at PTC.
Monitoring of Tritium release at PTC. Scope of the project From more than 20 projects supported by Equipment Manufacturing Support group this is one of the simplest. What is nice about it is that elegant
More informationPetaLinux SDK User Guide. Application Development Guide
PetaLinux SDK User Guide Application Development Guide Notice of Disclaimer The information disclosed to you hereunder (the "Materials") is provided solely for the selection and use of Xilinx products.
More informationRPC and TI-RPC Test Suite Test Plan Document
RPC and TI-RPC Test Suite Test Plan Document Cyril LACABANNE Bull S.A.S. Version 1.3 12 July 2007 Revision history Version Description 1.0 First release 1.1 Several correction on 1, 5, 8, 14 1.2 Add first
More informationProgramming Guide for Moxa Device Manager
Programming Guide for Moxa Device Manager First Edition, December 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Programming Guide for Moxa Device Manager The software described in this
More informationAn Incomplete C++ Primer. University of Wyoming MA 5310
An Incomplete C++ Primer University of Wyoming MA 5310 Professor Craig C. Douglas http://www.mgnet.org/~douglas/classes/na-sc/notes/c++primer.pdf C++ is a legacy programming language, as is other languages
More informationFirewalking. A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists
Firewalking A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists Cambridge Technology Partners Enterprise Security Services David Goldsmith Senior Security Architect
More informationIntroduction. dnotify
Introduction In a multi-user, multi-process operating system, files are continually being created, modified and deleted, often by apparently unrelated processes. This means that any software that needs
More informationiphone SDK Enrolled students will be invited to developer program Login to Program Portal Request a Certificate Download and install the SDK
Objective-C Basics iphone SDK Enrolled students will be invited to developer program Login to Program Portal Request a Certificate Download and install the SDK The First Program in Objective-C #import
More information7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012
7th Marathon of Parallel Programming WSCAD-SSC/SBAC-PAD-2012 October 17 th, 2012. Rules For all problems, read carefully the input and output session. For all problems, a sequential implementation is given,
More informationDistributed Internet Applications - DIA. Principles of Object-Oriented Middleware
Distributed Internet Applications - DIA Principles of Object-Oriented Middleware 1 Why Middleware? Distributed system construction directly on top of a transport layer is rather difficult. The communication
More informationSimple Network Management Protocol (SNMP) EngineID Discovery draft-schoenw-snmp-discover-01
Simple Network Management Protocol (SNMP) EngineID Discovery draft-schoenw-snmp-discover-01 Jürgen Schönwälder Jacobs University Bremen Bremen, Germany 68. IETF March 2007 Jürgen Schönwälder draft-schoenw-snmp-discover-01
More informationURI and UUID. Identifying things on the Web.
URI and UUID Identifying things on the Web. Overview > Uniform Resource Identifiers (URIs) > URIStreamOpener > Universally Unique Identifiers (UUIDs) Uniform Resource Identifiers > Uniform Resource Identifiers
More informationHands-on Hacking Unlimited
About Zone-H Attacks techniques (%) File Inclusion Shares misconfiguration SQL Injection DNS attack through social engineering Web Server external module intrusion Attack against the administrator/user
More informationCSE 333 SECTION 6. Networking and sockets
CSE 333 SECTION 6 Networking and sockets Goals for Today Overview of IP addresses Look at the IP address structures in C/C++ Overview of DNS Write your own (short!) program to do the domain name IP address
More informationQNX SDK for Apps and Media 1.0. Application and Window Management
QNX SDK for Apps and Media 1.0 QNX SDK for Apps and Media 1.0 Application and Window Management 2014, QNX Software Systems Limited, a subsidiary of BlackBerry Limited. All rights reserved. QNX Software
More informationASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters
The char Type ASCII Encoding The C char type stores small integers. It is usually 8 bits. char variables guaranteed to be able to hold integers 0.. +127. char variables mostly used to store characters
More informationVirtuozzo Virtualization SDK
Virtuozzo Virtualization SDK Programmer's Guide February 18, 2016 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200
More informationTo connect to the cluster, simply use a SSH or SFTP client to connect to:
RIT Computer Engineering Cluster The RIT Computer Engineering cluster contains 12 computers for parallel programming using MPI. One computer, cluster-head.ce.rit.edu, serves as the master controller or
More informationIllustration 1: Diagram of program function and data flow
The contract called for creation of a random access database of plumbing shops within the near perimeter of FIU Engineering school. The database features a rating number from 1-10 to offer a guideline
More informationTextbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1
Event Driven Simulation in NS2 Textbook: T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2, Springer 2008. 1 Outline Recap: Discrete Event v.s. Time Driven Events and Handlers The Scheduler
More informationHow to write a CGI for the Apache Web server in C
How to write a CGI for the Apache Web server in C The Com/PC Embedded Gateway Linux (EGL/2) operating system comes with a pre-installed Apache Web server. Please see also mht-cpc1l-07.pdf: How to use the
More information1 Abstract Data Types Information Hiding
1 1 Abstract Data Types Information Hiding 1.1 Data Types Data types are an integral part of every programming language. ANSI-C has int, double and char to name just a few. Programmers are rarely content
More informationTFTP Usage and Design. Diskless Workstation Booting 1. TFTP Usage and Design (cont.) CSCE 515: Computer Network Programming ------ TFTP + Errors
CSCE 515: Computer Network Programming ------ TFTP + Errors Wenyuan Xu Department of Computer Science and Engineering University of South Carolina TFTP Usage and Design RFC 783, 1350 Transfer files between
More informationTutorial on C Language Programming
Tutorial on C Language Programming Teodor Rus rus@cs.uiowa.edu The University of Iowa, Department of Computer Science Introduction to System Software p.1/64 Tutorial on C programming C program structure:
More informationµtasker Document FTP Client
Embedding it better... µtasker Document FTP Client utaskerftp_client.doc/1.01 Copyright 2012 M.J.Butcher Consulting Table of Contents 1. Introduction...3 2. FTP Log-In...4 3. FTP Operation Modes...4 4.
More informationOracle Tuxedo Systems and Application Monitor (TSAM)
Oracle Tuxedo Systems and Application Monitor (TSAM) Reference Guide 10g Release 3 (10.3) January 2009 Tuxedo Systems and Application Monitor Reference Guide, 10g Release 3 (10.3) Copyright 2007, 2009,
More informationLast Class: Communication in Distributed Systems. Today: Remote Procedure Calls
Last Class: Communication in Distributed Systems Structured or unstructured? Addressing? Blocking/non-blocking? Buffered or unbuffered? Reliable or unreliable? Server architecture Scalability Push or pull?
More informationAn API for Reading the MySQL Binary Log
An API for Reading the MySQL Binary Log Mats Kindahl Lead Software Engineer, MySQL Replication & Utilities Lars Thalmann Development Director, MySQL Replication, Backup & Connectors
More informationShared Memory Segments and POSIX Semaphores 1
Shared Memory Segments and POSIX Semaphores 1 Alex Delis delis -at+ pitt.edu October 2012 1 Acknowledgements to Prof. T. Stamatopoulos, M. Avidor, Prof. A. Deligiannakis, S. Evangelatos, Dr. V. Kanitkar
More informationOpenScape Business V1R3 myreports
OpenScape Business V1R3 myreports HowTo Configure E-mail transmission Version 1.0 Table of Contents 1. Overview 3 2. Configuration 3 3. Basic functionality 4 3.1. myreports behavior without Synchronization
More informationBasic Java Constructs and Data Types Nuts and Bolts. Looking into Specific Differences and Enhancements in Java compared to C
Basic Java Constructs and Data Types Nuts and Bolts Looking into Specific Differences and Enhancements in Java compared to C 1 Contents Hello World Program Statements Explained Java Program Structure in
More informationDebugging and Bug Tracking. Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com
Debugging and Bug Tracking Slides provided by Prof. Andreas Zeller, Universität des Saarlands http://whyprogramsfail.com Learning goals 1. part: Debugging Terminology o Defect o Infection o Failure Debugging
More informationFirst Java Programs. V. Paúl Pauca. CSC 111D Fall, 2015. Department of Computer Science Wake Forest University. Introduction to Computer Science
First Java Programs V. Paúl Pauca Department of Computer Science Wake Forest University CSC 111D Fall, 2015 Hello World revisited / 8/23/15 The f i r s t o b l i g a t o r y Java program @author Paul Pauca
More informationDevice Management API for Windows* and Linux* Operating Systems
Device Management API for Windows* and Linux* Operating Systems Library Reference September 2004 05-2222-002 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS
More informationSources: On the Web: Slides will be available on:
C programming Introduction The basics of algorithms Structure of a C code, compilation step Constant, variable type, variable scope Expression and operators: assignment, arithmetic operators, comparison,
More information[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension
[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
More informationComputer Systems II. Unix system calls. fork( ) wait( ) exit( ) How To Create New Processes? Creating and Executing Processes
Computer Systems II Creating and Executing Processes 1 Unix system calls fork( ) wait( ) exit( ) 2 How To Create New Processes? Underlying mechanism - A process runs fork to create a child process - Parent
More informationMolecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct
Dr. Martin O. Steinhauser University of Basel Graduate Lecture Spring Semester 2014 Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct Friday, 7 th March
More information/* File: blkcopy.c. size_t n
13.1. BLOCK INPUT/OUTPUT 505 /* File: blkcopy.c The program uses block I/O to copy a file. */ #include main() { signed char buf[100] const void *ptr = (void *) buf FILE *input, *output size_t
More informationTivaWare Utilities Library
TivaWare Utilities Library USER S GUIDE SW-TM4C-UTILS-UG-1.1 Copyright 2013 Texas Instruments Incorporated Copyright Copyright 2013 Texas Instruments Incorporated. All rights reserved. Tiva and TivaWare
More informationHPCC - Hrothgar Getting Started User Guide MPI Programming
HPCC - Hrothgar Getting Started User Guide MPI Programming High Performance Computing Center Texas Tech University HPCC - Hrothgar 2 Table of Contents 1. Introduction... 3 2. Setting up the environment...
More informationNetworks. Inter-process Communication. Pipes. Inter-process Communication
Networks Mechanism by which two processes exchange information and coordinate activities Inter-process Communication process CS 217 process Network 1 2 Inter-process Communication Sockets o Processes can
More informationCS 294-73 Software Engineering for Scientific Computing. http://www.cs.berkeley.edu/~colella/cs294. Lecture 25:Mixed Language Programming.
CS 294-73 Software Engineering for Scientific Computing http://www.cs.berkeley.edu/~colella/cs294 Lecture 25:Mixed Language Programming. Different languages Technical, historical, cultural differences
More informationProcess Monitor HOW TO for Linux
Table of Contents Process Monitor HOW TO for Linux...1 Al Dev (Alavoor Vasudevan) alavoor@yahoo.com...1 1.Linux or Unix Processes...1 2.Unix/Linux command procautostart...1 3.File procautostart.cpp...1
More informationNetwork Address Translation Commands
Network Address Translation Commands This chapter describes the function and displays the syntax for Network Address Translation (NAT) commands. For more information about defaults and usage guidelines,
More informationChannel Access Client Programming. Andrew Johnson Computer Scientist, AES-SSG
Channel Access Client Programming Andrew Johnson Computer Scientist, AES-SSG Channel Access The main programming interface for writing Channel Access clients is the library that comes with EPICS base Written
More informationTail call elimination. Michel Schinz
Tail call elimination Michel Schinz Tail calls and their elimination Loops in functional languages Several functional programming languages do not have an explicit looping statement. Instead, programmers
More informationGetting Started with the Internet Communications Engine
Getting Started with the Internet Communications Engine David Vriezen April 7, 2014 Contents 1 Introduction 2 2 About Ice 2 2.1 Proxies................................. 2 3 Setting Up ICE 2 4 Slices 2
More informationCMLOG: A Common Message Logging System
CMLOG: A Common Message Logging System Jie Chen, Walt Akers, Matt Bickley, Danjin Wu and William Watson III Control Software Group Thomas Jefferson National Accelerator Facility Newport News, Virginia
More informationOutput: 12 18 30 72 90 87. struct treenode{ int data; struct treenode *left, *right; } struct treenode *tree_ptr;
50 20 70 10 30 69 90 14 35 68 85 98 16 22 60 34 (c) Execute the algorithm shown below using the tree shown above. Show the exact output produced by the algorithm. Assume that the initial call is: prob3(root)
More informationInternet Payment Gateway. Win32 API Developer Guide
Internet Payment Gateway Win32 API Developer Guide Table of Contents Disclaimer... 3 Confidentiality... 3 Document Purpose / Intended Audience... 3 Related Documents... 3 1 Introduction... 4 1.1 Minimum
More informationSystem Calls and Standard I/O
System Calls and Standard I/O Professor Jennifer Rexford http://www.cs.princeton.edu/~jrex 1 Goals of Today s Class System calls o How a user process contacts the Operating System o For advanced services
More informationMyPBX Security Configuration Guide
MyPBX Security Configuration Guide Version: V1.4 Date: March 25 th, 2013 Yeastar Technology Co., Ltd. http://www.yeastar.com 1/16 Contents 1. Security Configuration for Web GUI..3 1.1 Change the default
More information---------------------------------- Exploiting Cisco Systems (Even From Windows! ;-) ) Written by Cyvamp (with a few notes added by Raven) July 2000
Exploiting Cisco Systems (Even From Windows! ;-) ) Written by Cyvamp (with a few notes added by Raven) July 2000 http://blacksun.box.sk Warning: DO NOT use this to damage cisco systems, or gain unauthorized
More informationChapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
More informationSystem Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
More informationCSC230 Getting Starting in C. Tyler Bletsch
CSC230 Getting Starting in C Tyler Bletsch What is C? The language of UNIX Procedural language (no classes) Low-level access to memory Easy to map to machine language Not much run-time stuff needed Surprisingly
More informationEmbedded Software Development
Linköpings Tekniska Högskola Institutionen för Datavetanskap (IDA), Software and Systems (SaS) TDDI11, Embedded Software 2010-04-22 Embedded Software Development Host and Target Machine Typical embedded
More informationImplementing Network Software
Implementing Network Software Outline Sockets Example Process Models Message Buffers Spring 2007 CSE 30264 1 Sockets Application Programming Interface (API) Socket interface socket : point where an application
More informationLesson 4 Web Service Interface Definition (Part I)
Lesson 4 Web Service Interface Definition (Part I) Service Oriented Architectures Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Interface Definition Languages (1) IDLs
More informationSystem Calls Related to File Manipulation
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS Information and Computer Science Department ICS 431 Operating Systems Lab # 12 System Calls Related to File Manipulation Objective: In this lab we will be
More informationWriting a C-based Client/Server
Working the Socket Writing a C-based Client/Server Consider for a moment having the massive power of different computers all simultaneously trying to compute a problem for you -- and still being legal!
More informationBrent A. Perdue. July 15, 2009
Title Page Object-Oriented Programming, Writing Classes, and Creating Libraries and Applications Brent A. Perdue ROOT @ TUNL July 15, 2009 B. A. Perdue (TUNL) OOP, Classes, Libraries, Applications July
More information3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version
Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin wolin@jlab.org Carl Timmer timmer@jlab.org
More informationSEVENSTAX-SNMP. User Manual
SEVENSTAX-SNMP User Manual Revision No.: 1.7 State: Release Author: sevenstax GmbH Initial version: 31/01/08 Last change: 24/01/11 Last Review: 07/12/10 Publication: Public Filename: sevenstaxsnmp_usermanual_v01_07
More informationChapter 5 Real time clock by John Leung
Chapter 5 Real time clock 5.1 Philips PCF8563 Real time clock (RTC) Philips PCF8563 (U5) is an I 2 C compatible real time clock (RTC). Alternatively, this chip can be replaced by a software module like
More informationC Programming Review & Productivity Tools
Review & Productivity Tools Giovanni Agosta Piattaforme Software per la Rete Modulo 2 Outline Preliminaries 1 Preliminaries 2 Function Pointers Variadic Functions 3 Build Automation Code Versioning 4 Preliminaries
More informationC++ Outline. cout << "Enter two integers: "; int x, y; cin >> x >> y; cout << "The sum is: " << x + y << \n ;
C++ Outline Notes taken from: - Drake, Caleb. EECS 370 Course Notes, University of Illinois Chicago, Spring 97. Chapters 9, 10, 11, 13.1 & 13.2 - Horstman, Cay S. Mastering Object-Oriented Design in C++.
More informationHow to Secure Network Printers?
How to Secure Network Printers? IT Security Office June 7, 2006 Agenda Printer History & Statistics The problem with Network Printers Tools for managing network printers How to secure your printers What
More informationCSCI110: Examination information.
CSCI110: Examination information. The exam for CSCI110 will consist of short answer questions. Most of them will require a couple of sentences of explanation of a concept covered in lectures or practical
More informationCS 103 Lab Linux and Virtual Machines
1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationESPResSo Summer School 2012
ESPResSo Summer School 2012 Introduction to Tcl Pedro A. Sánchez Institute for Computational Physics Allmandring 3 D-70569 Stuttgart Germany http://www.icp.uni-stuttgart.de 2/26 Outline History, Characteristics,
More informationPine Exchange mini HOWTO
Pine Exchange mini HOWTO Alexandru Roman v1.0, 2002 03 28 Revision History Revision 1.0 2002 03 28 Revised by: ar Submitted to the LDP for publication. Revision 0.3 2002 03 25 Revised
More informationPhys4051: C Lecture 2 & 3. Comment Statements. C Data Types. Functions (Review) Comment Statements Variables & Operators Branching Instructions
Phys4051: C Lecture 2 & 3 Functions (Review) Comment Statements Variables & Operators Branching Instructions Comment Statements! Method 1: /* */! Method 2: // /* Single Line */ //Single Line /* This comment
More informationCOSC 6397 Big Data Analytics. Distributed File Systems (II) Edgar Gabriel Spring 2014. HDFS Basics
COSC 6397 Big Data Analytics Distributed File Systems (II) Edgar Gabriel Spring 2014 HDFS Basics An open-source implementation of Google File System Assume that node failure rate is high Assumes a small
More informationImplementing a Web Service Client using Java
Implementing a Web Service Client using Java Requirements This guide is based on implementing a Java Client using JAX-WS that comes with Java Web Services Developer Pack version 2.0 (JWSDP). This can be
More informationChapter 46 Terminal Server
Chapter 46 Terminal Server Introduction... 46-2 TTY Devices... 46-2 Multiple Sessions... 46-4 Accessing Telnet Hosts... 46-5 Command Reference... 46-7 connect... 46-7 disable telnet server... 46-7 disconnect...
More informationCORBA Programming with TAOX11. The C++11 CORBA Implementation
CORBA Programming with TAOX11 The C++11 CORBA Implementation TAOX11: the CORBA Implementation by Remedy IT TAOX11 simplifies development of CORBA based applications IDL to C++11 language mapping is easy
More informationHow to Add a New System Call for Minix 3
How to Add a New System Call for Minix 3 Karthick Jayaraman Department of Electrical Engineering & Computer Science Syracuse University, Syracuse, New York 1. Introduction Minix3 has the micro-kernel architecture.
More informationUsing SQL-server as database engine
This tutorial explains on a step by step base how to configure YDOC-Insights for usage with a SQL-server database. (How to manage SQL-server itself is not part of this tutorial) CONTENTS CONTENTS 1 1.
More informationNetscape Internet Service Broker for C++ Programmer's Guide. Contents
Netscape Internet Service Broker for C++ Programmer's Guide Page 1 of 5 [Next] Netscape Internet Service Broker for C++ Programmer's Guide Nescape ISB for C++ - Provides information on how to develop and
More informationSession NM059. TCP/IP Programming on VMS. Geoff Bryant Process Software
Session NM059 TCP/IP Programming on VMS Geoff Bryant Process Software Course Roadmap Slide 160 NM055 (11:00-12:00) Important Terms and Concepts TCP/IP and Client/Server Model Sockets and TLI Client/Server
More informationConfiguring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
More informationHow To Understand How A Process Works In Unix (Shell) (Shell Shell) (Program) (Unix) (For A Non-Program) And (Shell).Orgode) (Powerpoint) (Permanent) (Processes
Content Introduction and History File I/O The File System Shell Programming Standard Unix Files and Configuration Processes Programs are instruction sets stored on a permanent medium (e.g. harddisc). Processes
More informationKeil C51 Cross Compiler
Keil C51 Cross Compiler ANSI C Compiler Generates fast compact code for the 8051 and it s derivatives Advantages of C over Assembler Do not need to know the microcontroller instruction set Register allocation
More informationCP Lab 2: Writing programs for simple arithmetic problems
Computer Programming (CP) Lab 2, 2015/16 1 CP Lab 2: Writing programs for simple arithmetic problems Instructions The purpose of this Lab is to guide you through a series of simple programming problems,
More information