New York University Computer Science Department Courant Institute of Mathematical Sciences
|
|
|
- Rosalyn Armstrong
- 10 years ago
- Views:
Transcription
1 New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communications & Networks Course Number: g Instructor: Jean-Claude Franchitti Session: 6 Assignment #8 I. Due Thursday, December , at the beginning of class. II. Objectives 1. Get introduced to (or reacquainted with) a very neat computational model called a finite state machine. 2. Build a finite state machine implementation of the TCP connection protocol (3- way handshake) for the both the client (active) side and the server (passive) side of a connection. 3. Leverage a JAVA package that implements a programmable finite state machine to write a program that uses these classes to implement the TCP connection protocol given in Figure 1 below. 4. Since you won t really get events from a communications link, a sequence of events will be simulated by reading and parsing commands from "standard input" (System.in in Java)
2 PASSIVE / Λ CLOSED ACTIVE / <syn> CLOSE / LISTEN SEND / <syn> CLOSE / SYN / <syn-ack> SYN_RCVD SYN / <syn-ack> SYN_SENT CLOSE / <fin> ACK / Λ SYNACK/ <ack> CLOSE / <fin> FIN / ESTABLISHED FIN_WAIT_1 ACK / Λ FIN / RDATA / SDATA / <n> CLOSE_WAIT CLOSE / <fin> FIN_WAIT_2 FIN / CLOSING ACK / Λ LAST_ACK ACK / Λ TIME_WAIT TIMEOUT / Λ CLOSED Figure 1 TCP Connection Protocol (symbol Λ means no action ) III. References 1. Slides and handouts posted on the course Web site 2. Textbook chapters as applicable IV. Software Required 1. Microsoft Word. 2. Win Zip as necessary. 3. Java SE 6.0 and above
3 V. Assignment 1. Get introduced (or reacquainted) with FSMs: Finite state machines (fsm) are used to implement simulations, compilers, and, of most interest to us, communications protocols. You can learn about finite state machines from any text that covers Automata Theory or Theory of Switching Circuits, or from a myriad of sources on the World Wide Web. For our purposes, here is what you need to know: Machines are devices that respond to a set of stimuli (events) by generating predictable responses (actions) based on a history of prior events (current state). Any object that behaves according to this stimulus/response relationship may be considered as a machine. In order to represent a machine as a computational model, you need to define: 1. States 2. Events 3. Transitions 4. Start State States represent the particular configurations that a machine can assume. Events define the various inputs that a machine will recognize Transitions represent a change of state from a current state to another (possibly the same) state that is dependent upon a specific event. In a Mealy machine, an FSM may generate an output upon a transition. The Start State is the state of the machine before is has received any events. Generally, finite a state machine is classified as either a Mealy machine - one that generates an output for each transition, or a Moore machine - one that generates an output for each state. Moore machines can do anything a Mealy machine can do (and vice versa). Practically, Mealy machines are more useful for implementing communications protocols. The FSM that you will experiment with in this assignment is a Mealy machine.
4 2. Understand your program inputs requirements: Your program MUST accept as input (from standard input) the Strings for events in the following table EVENT Passive Open Active Open SYN received SYN + ACK received ACK received Data received from network Data to be sent from application FIN received Client or Server issues close() Timed wait ends Input string PASSIVE ACTIVE SYN SYNACK ACK RDATA SDATA FIN CLOSE TIMEOUT Events in standard input will be separated by white space (note: EOL is also white space!). NOTE 1: Events must be specified exactly as shown in the table above. All events must be entered in uppercase letters only. Any parsed token (word) that does not exactly match one of these should be treated as invalid (incorrect) input. NOTE 2: Figure 1 shows a transition from LISTEN state to SYN-SENT state driven by the SEND event. Your program should not handle this case so you should ignore this transition. A SEND event occurs when a server socket is converted implicitly from server to client by the owning application doing a write on the server socket.
5 3. Understand the classes provided in the FSM package: The classes in the FSM package are: FSM State Event Transition Action FsmException The finite state machine class. An abstract class that you will use to define the states for your FSM. A class that you will use to define the events for your FSM A class that you will use to define the transitions in your FSM An abstract class that you will use to define the actions that you take on each transition. A class used to generate detectable errors in package classes. The code for the FSM package is HERE. The package is in a jar file, so you will need to extract it or use the jar file in your classpath. To use the classes, your JAVA program must import the classes in the Fsm package. The easiest way to use the package is to include the jar file in your class path when you compile and execute. For example, on Unix, you might try: javac -cp.;./fsm.jar myprogram.java java -cp.;./fsm.jar myprogram to compile myprogram.java, and to run myprogram On Windows, the command is the same, but the classpath command argument is introduced by -cp rather than -classpath. The documentation for the FSM package is HERE. 4. Implement your program to operate as follows: Your program should loop, reading ONE event from standard in and processing that event completely, including display of any output, then continuing to read and process the next event, until end of input stream (end of file) You MUST implement ALL of the states shown in the transition diagram. You MUST Implement all of the transitions shown in the transition diagram AND the transitions for RDATA and SDATA.
6 Notice that there are two transitions in the Established state to handle data events. These are the SDATA (application request to send data) and the RDATA (data received from the network) events that can occur while in the ESTABLISHED State. You should handle these Events by writing an output message: DATA received n when the event is RDATA "DATA sent n" when the event is SDATA Where n is a number representing the number of SDATA or RDATA Events received to date, including this (R S)DATA Event. The transition for the ( S)DATA Event should leave the FSM in the ESTABLISHED State. The purpose of this requirement is to ask you to figure out how to associate a variable with a state. In practice, you would call a data transfer process which would have it's own FSM to implement flow control. To simplify your task, you may treat ANY String that you read from standard input that is NOT one of the events defined here by writing: "Error: unexpected Event: xxx" where xxx is the invalid event. Your program should then continue as if the bad input did not occur. 5. Review the following FAQs: OK, so how do I use these classes to make an FSM? 1. Create classes for your states (by extending State) and allocate your states. 2. Allocate an FSM, giving it a name and a Start State (see the constructor). NOTE: Use ONLY the constructor that allows you to specify the FSM name and starting state: public FSM(String fsmname, State start) 3. Create your events (by allocating instances of Event). 4. Create classes for the actions to take on each transition (by extending Action) and allocate your actions. 5. Allocate instances of the Transaction class using the allocated State, Event, and Action objects, and add these Transition objects to your FSM object (see the addtransition() method in FSM). How to I "send" events into the FSM?
7 The FSM class has a "doevent" method that takes an Event object as its input. What happens when I send an Event to the FSM? Well, this is a Mealy machine, so the FSM will locate the Transition you defined that associates the Event with the current state of the FSM, then set the current state to the state defined in this Transition as the next state, then it will execute the action method you specified in this Transition's Action object. What do I do in my "Action" methods? For all Transitions EXCEPT those caused by the (R S)DATA Events, write the message: "Event eee received, current State is sss" where eee is the Event and sss is the current State. For the Actions on the ESTABLISHED/(R S)DATA Transitions, write the message: DATA received n when the event is RDATA "DATA sent n" when the event is SDATA where n is a number representing the number of SDATA or RDATA Events received to date, including this (R S)DATA Event. What do I do if you send my program an Event that is not defined for the current State? The FSM.doEvent() method will throw an FsmException if you pass an Event that is not defined for the current State. Make sure that you catch this exception and just display the exception (every Exception has a tostring() method). Your program should then continue as if the bad Event did not occur. How does my program terminate? When you detect the end of the input stream on standard input, just exit. 6. your assignment file to your TA.
8 VI. Deliverables 1. Electronic: Your assignment file must be ed to the TA. The file must be created and sent by the beginning of class. After the class period, the homework is late. The clock is the official clock. Your assignment file should contain your program source code packaged as a JAR file. To create the JAR file containing your JAVA source code (please do not include the class files), change your working directory to the directory where your JAVA files are located and execute the command: jar cvf xxx.jar *.java where xxx is YOUR STUDENT ID. Include the jar file in your assignment zip file and send the zip file as an attachmentl to the grader. The associated documentation provided in your zip file MUST include a readme file containing the name of the class that contains the main() method. You may send questions to the class mailing list ONLY. 2. Written: Printout of the files as necessary (report/hardcopy portion of the assignment). The cover page supplied on the next page must be the first page of your assignment file Fill in the blank area for each field. NOTE: The sequence of the hardcopy submission is: 1. Cover sheet 2. Assignment Answer Sheet(s) VII. Sample Cover Sheet:
9 Name Username: Date: (last name, first name) Section: Assignment 8 Assignment Layout (25%) Assignment is neatly assembled on 8 1/2 by 11 paper. Cover page with your name (last name first followed by a comma then first name), username and section number with a signed statement of independent effort is included. Program and documentation submitted for Assignment #8 are satisfactory. File name is correct. Total in points Professor s Comments: Affirmation of my Independent Effort: (Sign here)
10
New York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
New York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Software Engineering Course Number: g22.2440-001 Instructor: Jean-Claude Franchitti Session: 4 (Individual)
FTP client Selection and Programming
COMP 431 INTERNET SERVICES & PROTOCOLS Spring 2016 Programming Homework 3, February 4 Due: Tuesday, February 16, 8:30 AM File Transfer Protocol (FTP), Client and Server Step 3 In this assignment you will
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th) YOUR ASSIGNMENT Your assignment is to write an SMTP (Simple
1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
webmethods Certificate Toolkit
Title Page webmethods Certificate Toolkit User s Guide Version 7.1.1 January 2008 webmethods Copyright & Document ID This document applies to webmethods Certificate Toolkit Version 7.1.1 and to all subsequent
Programming Languages CIS 443
Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception
COMP 356 Programming Language Structures Notes for Chapter 4 of Concepts of Programming Languages Scanning and Parsing
COMP 356 Programming Language Structures Notes for Chapter 4 of Concepts of Programming Languages Scanning and Parsing The scanner (or lexical analyzer) of a compiler processes the source program, recognizing
CafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short).
Table of Contents Introduction...2 Downloads... 2 Zip Setups... 2 Configuration... 3 Server...3 Client... 5 Service Request Monitor...6 Licensing...7 Frequently Asked Questions... 10 Introduction CafePilot
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
StreamServe Persuasion SP4 Service Broker
StreamServe Persuasion SP4 Service Broker User Guide Rev A StreamServe Persuasion SP4 Service Broker User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No
IBM WebSphere Adapter for PeopleSoft Enterprise 6.2.0. Quick Start Tutorials
IBM WebSphere Adapter for PeopleSoft Enterprise 6.2.0 Quick Start Tutorials Note: Before using this information and the product it supports, read the information in "Notices" on page 94. This edition applies
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Forming a P2P System In order to form a P2P system, the 'central-server' should be created by the following command.
CSCI 5211 Fall 2015 Programming Project Peer-to-Peer (P2P) File Sharing System In this programming assignment, you are asked to develop a simple peer-to-peer (P2P) file sharing system. The objective of
COMP 431 INTERNET SERVICES & PROTOCOLS
COMP 431 INTERNET SERVICES & PROTOCOLS Spring 2016 Programming Homework 4, Feb 22 Due: March 7, 8:30 AM Building an FTP Client/Server System Using Sockets You can now put all the pieces together and create
Introduction to Basics of Communication Protocol
Network Model Introduction to Basics of Communication Protocol Prof Pallapa. Venkataram Department of Electrical Communication Engineering Indian Institute of Science Bangalore 560012, India Physical Communication
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected]
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected] Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness
Question1-part2 What undesirable consequences might there be in having too long a DNS cache entry lifetime?
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Assignment 4 Working as a group. Working in small gruops of 2-4 students. When you work as a group, you have to return only one home assignment per
Advanced Computer Networks Project 2: File Transfer Application
1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application
This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). Here we explore the sequence of interactions in a typical FTP (File Transfer Protocol) session.
HW3: Programming with stacks
HW3: Programming with stacks Due: 12PM, Noon Thursday, September 18 Total: 20pts You may do this assignment with one other student. A team of two members must practice pair programming. Pair programming
Using Subversion in Computer Science
School of Computer Science 1 Using Subversion in Computer Science Last modified July 28, 2006 Starting from semester two, the School is adopting the increasingly popular SVN system for management of student
Appendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
NASA Workflow Tool. User Guide. September 29, 2010
NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
Building a Multi-Threaded Web Server
Building a Multi-Threaded Web Server In this lab we will develop a Web server in two steps. In the end, you will have built a multi-threaded Web server that is capable of processing multiple simultaneous
Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Project 5 Twitter Analyzer Due: Fri. 2015-12-11 11:59:59 pm
Project 5 Twitter Analyzer Due: Fri. 2015-12-11 11:59:59 pm Goal. In this project you will use Hadoop to build a tool for processing sets of Twitter posts (i.e. tweets) and determining which people, tweets,
CS155: Computer and Network Security
CS155: Computer and Network Security Programming Project 3 Spring 2005 Shayan Guha [email protected] (with many slides borrowed from Matt Rubens) Project Overview 1) Use standard network monitoring
Java Language Tools COPYRIGHTED MATERIAL. Part 1. In this part...
Part 1 Java Language Tools This beginning, ground-level part presents reference information for setting up the Java development environment and for compiling and running Java programs. This includes downloading
Custom Encryption in Siebel & Siebel Web Service Security Test Guide 1.0
Custom Encryption in Siebel & Siebel Web Security Test Guide 1.0 Muralidhar Reddy Introduction Siebel (7.5 onwards and upto 8.1) natively supports 2 Types of Inbound web Security 1. WS Security UserName
XMLVend Protocol Message Validation Suite
XMLVend Protocol Message Validation Suite 25-01-2012 Table of Contents 1. Overview 2 2. Installation and Operational Requirements 2 3. Preparing the system 3 4. Intercepting Messages 4 5. Generating Reports
The POSIX Socket API
The POSIX Giovanni Agosta Piattaforme Software per la Rete Modulo 2 G. Agosta The POSIX Outline Sockets & TCP Connections 1 Sockets & TCP Connections 2 3 4 G. Agosta The POSIX TCP Connections Preliminaries
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac.
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC Host based Analysis {Himanshu Pareek, [email protected]} {C-DAC Hyderabad, www.cdachyd.in} 1 Reference to previous lecture Bots
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
CRM Setup Factory Installer V 3.0 Developers Guide
CRM Setup Factory Installer V 3.0 Developers Guide Who Should Read This Guide This guide is for ACCPAC CRM solution providers and developers. We assume that you have experience using: Microsoft Visual
Denial of Service Attack Techniques: Analysis, Implementation and Comparison
Denial of Service Attack Techniques: Analysis, Implementation and Comparison Khaled M. Elleithy Computer Science Department, University of Bridgeport Bridgeport, CT 06604, USA Drazen Blagovic, Wang Cheng,
EE360: Digital Design I Course Syllabus
: Course Syllabus Dr. Mohammad H. Awedh Fall 2008 Course Description This course introduces students to the basic concepts of digital systems, including analysis and design. Both combinational and sequential
CSEE 4119: Computer Networks, Spring 2014
CSEE 4119: Computer Networks, Spring 2014 Programming Assignment 1: Socket Programming Due Tuesday, March 4 th 11:55 pm P. Prakash, W. An, P. Nirantar, R. Yu, X. Zhu (TAs), A. Chaintreau (instructor) Academic
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Configuring and Monitoring SiteMinder Policy Servers
Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
Configuring and Monitoring Hitachi SAN Servers
Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
DOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
Ulteo Open Virtual Desktop - Protocol Description
Ulteo Open Virtual Desktop - Protocol Description Copyright 2008 Ulteo SAS 1 LIST OF PROTOCOLS USED CONTENTS Contents 1 List of Protocols used 1 1.1 Hyper Text Transfert Protocol (HTTP)..............................
IBM SDK, Java Technology Edition Version 1. IBM JVM messages IBM
IBM SDK, Java Technology Edition Version 1 IBM JVM messages IBM IBM SDK, Java Technology Edition Version 1 IBM JVM messages IBM Note Before you use this information and the product it supports, read the
MS Enterprise Library 5.0 (Logging Application Block)
International Journal of Scientific and Research Publications, Volume 4, Issue 8, August 2014 1 MS Enterprise Library 5.0 (Logging Application Block) Anubhav Tiwari * R&D Dept., Syscom Corporation Ltd.
COMP 112 Assignment 1: HTTP Servers
COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server
Programming Project 1: Lexical Analyzer (Scanner)
CS 331 Compilers Fall 2015 Programming Project 1: Lexical Analyzer (Scanner) Prof. Szajda Due Tuesday, September 15, 11:59:59 pm 1 Overview of the Programming Project Programming projects I IV will direct
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP
20.12. smtplib SMTP protocol client
20.12. smtplib SMTP protocol client The smtplib module defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. For details of
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.035, Fall 2005 Handout 7 Scanner Parser Project Wednesday, September 7 DUE: Wednesday, September 21 This
Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14
1 Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14 Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit
EXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC
EXTENDED FILE SYSTEM FOR FMD AND NANO-10 PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
Java 7 Recipes. Freddy Guime. vk» (,\['«** g!p#« Carl Dea. Josh Juneau. John O'Conner
1 vk» Java 7 Recipes (,\['«** - < g!p#«josh Juneau Carl Dea Freddy Guime John O'Conner Contents J Contents at a Glance About the Authors About the Technical Reviewers Acknowledgments Introduction iv xvi
IBM Operational Decision Manager Version 8 Release 5. Getting Started with Business Rules
IBM Operational Decision Manager Version 8 Release 5 Getting Started with Business Rules Note Before using this information and the product it supports, read the information in Notices on page 43. This
This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN 1 Contents CONNECTIONS COMMUNICATION COMMAND PROCESSING
CS170 Lab 11 Abstract Data Types & Objects
CS170 Lab 11 Abstract Data Types & Objects Introduction: Abstract Data Type (ADT) An abstract data type is commonly known as a class of objects An abstract data type in a program is used to represent (the
Jenkins on Windows with StreamBase
Jenkins on Windows with StreamBase Using a Continuous Integration (CI) process and server to perform frequent application building, packaging, and automated testing is such a good idea that it s now a
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE TIGRAN HAKOBYAN SUJAL PATEL VANDANA MURALI INTRODUCTION Common Object Request
Programming Assignment II Due Date: See online CISC 672 schedule Individual Assignment
Programming Assignment II Due Date: See online CISC 672 schedule Individual Assignment 1 Overview Programming assignments II V will direct you to design and build a compiler for Cool. Each assignment will
IDS 561 Big data analytics Assignment 1
IDS 561 Big data analytics Assignment 1 Due Midnight, October 4th, 2015 General Instructions The purpose of this tutorial is (1) to get you started with Hadoop and (2) to get you acquainted with the code
FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL
FTP FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL Peter R. Egli INDIGOO.COM 1/22 Contents 1. FTP versus TFTP 2. FTP principle of operation 3. FTP trace analysis
TrueSight Operations Management Monitoring Studio
USER DOCUMENTATION APPLICATIONS MONITORING TrueSight Operations Management Monitoring Studio Version 9.0.00 June 2015 Contacting BMC Software You can access the BMC Software Web site at http://www.bmc.com.
>>> SOLUTIONS <<< c) The OSI Reference Model has two additional layers. Where are these layers in the stack and what services do they provide?
Midterm Exam for Computer Networks (CNT 4004) Fall 2013 >>> SOLUTIONS
Setting up Email in Outlook Express
Setting up Email in Outlook Express If you have more than one email account but need to use a single computer to access them, then Outlook Express can help. To begin, open Outlook Express by double-clicking
EXTENDED FILE SYSTEM FOR F-SERIES PLC
EXTENDED FILE SYSTEM FOR F-SERIES PLC Before you begin, please download a sample I-TRiLOGI program that will be referred to throughout this manual from our website: http://www.tri-plc.com/trilogi/extendedfilesystem.zip
LICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version
Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin [email protected] Carl Timmer [email protected]
Novell Identity Manager
AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
DOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
Learning From Lectures:
Learning From Lectures: A Guide to University Learning Learning Services University of Guelph Table of Contents Student Guide:... 3 University Lectures... 3 Preparing for Lectures... 4 Laptop Pros & Cons...
Division of Informatics, University of Edinburgh
CS1Bh Lecture Note 20 Client/server computing A modern computing environment consists of not just one computer, but several. When designing such an arrangement of computers it might at first seem that
Finite State Machine. RTL Hardware Design by P. Chu. Chapter 10 1
Finite State Machine Chapter 10 1 Outline 1. Overview 2. FSM representation 3. Timing and performance of an FSM 4. Moore machine versus Mealy machine 5. VHDL description of FSMs 6. State assignment 7.
Creating While Loops with Microsoft SharePoint Designer Workflows Using Stateful Workflows
Creating While Loops with Microsoft SharePoint Designer Workflows Using Stateful Workflows Published by Nick Grattan Consultancy Limited 2009. All rights reserved. Version 1.00. Nick Grattan Consultancy
CS 557- Project 1 A P2P File Sharing Network
Assigned: Feb 26, 205 Due: Monday, March 23, 205 CS 557- Project A P2P File Sharing Network Brief Description This project involves the development of FreeBits, a file sharing network loosely resembling
Introduction to Synoptic
Introduction to Synoptic 1 Introduction Synoptic is a tool that summarizes log files. More exactly, Synoptic takes a set of log files, and some rules that tell it how to interpret lines in those logs,
3 SOFTWARE AND PROGRAMMING LANGUAGES
3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have
Centralized Auditing in Windows Derek Melber
Introduction As I have been speaking, evangelizing, educating, and writing about Windows operating systems for the past 15 years, I have heard one common request during that time. How do I centralize the
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs
KB259302 - Windows 2000 DNS Event Messages 1 Through 1614
Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
Netbeans IDE Tutorial for using the Weka API
Netbeans IDE Tutorial for using the Weka API Kevin Amaral University of Massachusetts Boston First, download Netbeans packaged with the JDK from Oracle. http://www.oracle.com/technetwork/java/javase/downloads/jdk-7-netbeans-download-
Tips and Tricks SAGE ACCPAC INTELLIGENCE
Tips and Tricks SAGE ACCPAC INTELLIGENCE 1 Table of Contents Auto e-mailing reports... 4 Automatically Running Macros... 7 Creating new Macros from Excel... 8 Compact Metadata Functionality... 9 Copying,
Managing your e-mail accounts
Managing your e-mail accounts Introduction While at Rice University, you will receive an e-mail account that will be used for most of your on-campus correspondence. Other tutorials will tell you how to
CFX_AIM_JAVA. A payment card gateway solutions for ColdFusion users of Authorize.Net s Advanced Integration Method (AIM)
CFX_AIM_JAVA A payment card gateway solutions for ColdFusion users of Authorize.Net s Advanced Integration Method (AIM) Installation & User Guide Software Information Software Version: 1.0 Published: 01/25/2012
Eventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
Computing Concepts with Java Essentials
2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Computing Concepts with Java Essentials 3rd Edition Cay Horstmann
Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science. Unit of Study / Textbook Correlation
Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science updated 03/08/2012 Unit 1: JKarel 8 weeks http://www.fcps.edu/is/pos/documents/hs/compsci.htm
Hadoop Streaming. Table of contents
Table of contents 1 Hadoop Streaming...3 2 How Streaming Works... 3 3 Streaming Command Options...4 3.1 Specifying a Java Class as the Mapper/Reducer... 5 3.2 Packaging Files With Job Submissions... 5
