Writing Client/Server Programs in C Using Sockets (A Tutorial) Part I. Session Greg Granger grgran@sas. sas.com. SAS/C & C++ Support
|
|
|
- Doris Skinner
- 10 years ago
- Views:
Transcription
1 Writing Client/Server Programs in C Using Sockets (A Tutorial) Part I Session 5958 Greg Granger grgran@sas sas.com SAS Slide 1 Feb SAS/C & C++ Support SAS Institute
2 Part I: Socket Programming Overview Sockets (to me) Networking (or what s natural about natural logs) TCP/IP (and what it means to your life) More Sockets (we didn t get enough the first time) SAS Slide 2 Feb. 1998
3 What is Sockets An Application Programming Interface (API) used for InterProcess Communications (IPC). [A well defined method of connecting two processes, locally or across a network] Protocol and Language Independent Often referred to as Berkeley Sockets or BSD Sockets SAS Slide 3 Feb. 1998
4 Connections and Associations In Socket terms a connections between two processes in called an association. An association can be abstractly defined as a 5- tuple which specifies the two processes and a method of communication. For example: {protocol, local-addr, local-process, foreign-addr, foreign-process} A half-association is a single side of an association (a 3-tuple tuple) {protocol, addr, process} SAS Slide 4 Feb. 1998
5 Networking Terms packet - the smallest unit that can be transferred through the network by itself protocol - a set of rules and conventions between the communicating participants A collection of protocol layers is referred to as a protocol suite, protocol family or protocol stack. TCP/IP is one such protocol suite. SAS Slide 5 Feb. 1998
6 Introduction to TCP/IP What (the heck) is TCP/IP? Internet Protocol (IP) User Datagram Protocol (UDP) Transmission Control Protocol (TCP) TCP/IP Applications Name Resolution Processing TCP/IP Network Diagram SAS Slide 6 Feb. 1998
7 What is TCP/IP? Transmission Control Protocol/Internet Protocol A network protocol suite for interprocess communication The protocol of the Internet Open, nonproprietary Integrated into UNIX operating systems Many popular networking applications telnet NFS (network file system) X11 GUI SMTP (mail) www ftp (file transfer protocol) SAS Slide 7 Feb. 1998
8 TCP/IP Architectural Model Process (message) REXEC / SMTP / TELNET / FTP / DNS / RPC / Local Apps. Transport (message) TCP UDP Network (packets) ICMP IP (R)ARP Data Link (frames) Ethernet Token-Ring FDDI X.25 SNA Hyperchannel Proprietary SAS Slide 8 Feb. 1998
9 Internet Protocol (IP) Establishes a virtual network between hosts, independent of the underlying network topology Provides routing throughout the network, using IP addressing. For example: Features Best-effort packet delivery Connectionless (stateless) Unreliable TCP IP UDP Physical Network SAS Slide 9 Feb. 1998
10 User Datagram Protocol (UDP) Application Interface to IP - Packet Oriented Establishes a port, which allows IP to distinguish among processes running on the same host Features resemble IP semantics Connectionless Unreliable Checksums (optional) TCP IP UDP Physical Network SAS Slide 10 Feb. 1998
11 Transmission Control Protocol (TCP) Connection-oriented Stream Data Transfer Reliable Flow-Control Full-Duplex TCP Suited for critical data transfer applications IP UDP Physical Network SAS Slide 11 Feb. 1998
12 SAS Slide 12 Feb The Importance of Ports Both the TCP and UDP protocols use 16 bit identifiers called ports to uniquely identify the processes involved in a socket. In UNIX the first 1024 ports for both protocols are called well known ports and are defined in the file /etc/services. Programs that bind to these ports require root access. These numbers are managed by the Internet Assigned Numbers Authority (IANA). A complete list of these assignments and more information about IANA can be found in RFC 1700
13 How stuff gets around (routing) TCP/IP packets are routed based on their destination IP address (ex: ) Packets are passed from one network segment to another by machines called routers until the packet arrives at the network segment attached to the host with the destination IP address. Routers that act as gates to larger networks are called gateways. SAS Slide 13 Feb. 1998
14 Name Resolution Processing Associates an IP address to a name (hostname) Structured method of identifying hosts within an internet The Domain Name System (DNS) implements a hierarchical naming scheme which maps names like mvs mvs.sas.com to an IP address DNS is implemented by a set of cooperating servers Machines that process DNS requests are called nameservers A set of library routines called the resolver provide the logic to query nameservers SAS Slide 14 Feb. 1998
15 TCP Ports TCP/UDP/IP Diagram 64K Dev1.sas.com ( ) REXEC Server port Well-known Ports 0 0 Well-known Ports 1023 IP Routing REXEC client REXEC client Dev2.sas.com ( ) UDP Ports 64K internet Server1.net.sas.com ( ) NameServer SAS Slide 15 Feb. 1998
16 Back to Sockets Socket Definition and Components Socket Library Functions Primary Socket Header Files Sample Client/Server Dialog Ancillary Socket Topics Beyond Sockets SAS Slide 16 Feb. 1998
17 Definition and Components Socket - endpoint of communication Sockets - An application programming interface (API) for interprocess communication (IPC) Attributes: Protocol Independent Language Independent Sockets implies (not requires) TCP/IP and C Socket and Connection Association A local host can be identified by it s protocol, IP address and port. A connection adds the IP address & port of the remote host. SAS Slide 17 Feb. 1998
18 System calls SAS Slide 18 Feb startup / close data transfer options control other Socket Library Function Network configuration lookup host address ports for services other Utility functions data conversion address manipulation error handling
19 socket() bind() listen() accept() Primary Socket Calls - create a new socket and return its descriptor - associate a socket with a port and address - establish queue for connection requests - accept a connection request - initiate a connection to a remote host connect() - initiate a connection to a remote host recv() - receive data from a socket descriptor send() - send data to a socket descriptor close() - one-way close of a socket descriptor SAS Slide 19 Feb. 1998
20 Network Database Administration functions gethostbyname - given a hostname, returns a structure which specifies its DNS name(s) and IP address(es es) getservbyname - given service name and protocol, returns a structure which specifies its name(s) and its port address gethostname - returns hostname of local host getservbyname, getservbyport, getservent getprotobyname, getprotobynumber, getprotobyent getnetbyname, getnetbyaddr, getnetent SAS Slide 20 Feb. 1998
21 Socket Utility Functions ntohs/ntohl ntohl - convert short/long from network byte order (big endian) ) to host byte order htons/htonl htonl - convert short/long from host byte order to network byte order inet_ntoa ntoa/inet_addr - convert 32-bit IP address (network byte order to/from a dotted decimal string) perror() - print error message (based on errno errno ) to stderr herror() - print error message for gethostbyname() to stderr (used with DNS) SAS Slide 21 Feb. 1998
22 Primary Header Files Include file sequence may affect processing (order is important!) <sys/types.h> - prerequisite typedefs <errno.h> - names for errno errno values (error numbers) - struct sockaddr; ; system prototypes and constants <sys/socket.h> <netdb.h.h> <netinet/in.h> <arpa/inet.h> - network info lookup prototypes and structures - struct sockaddr_in; byte ordering macros - utility function prototypes SAS Slide 22 Feb. 1998
23 Sample TCP Client / Server Session Iterative Server socket() bind() Remote Client socket() listen() gethostbyname() accept() connect() recv()/send() recv()/send() close() close() SAS Slide 23 Feb. 1998
24 Ancillary Socket Topics UDP versus TCP Controlling/managing socket characteristics get/setsockopt setsockopt() - keepalive,, reuse, nodelay fcntl() - async signals, blocking ioctl() - file, socket, routing, interface options Blocking versus Non-blocking socket Signal based socket programming (SIGIO) Implementation specific functions SAS Slide 24 Feb. 1998
25 Design Considerations Data representation and conversion Server design alternatives Security Issues Portability Considerations SAS Slide 25 Feb. 1998
26 Data Representation Transport Protocols detail data exchange/movement; applications must interpret the data! Byte order affects data - not just addresses Text is often sent in ASCII, but ASCII versus EBCDIC is decided by the application-level protocol Structure alignment and floating point pose problems External Data Representation (XDR) can be used (even without RPC) SAS Slide 26 Feb. 1998
27 SAS Slide 27 Feb Single Threaded more complex code (must track multiple concurrent requests) generally lower system overhead crash of thread disables service Multi-Tasking less complex code (written only for handling only one connection) higher system overhead (each task requires it s own process space) highly crash resistant (one or more tasks can fail without losing service) [Multi-]Threaded Server Design Alternatives shares less complex code of Multi-Tasking model system overhead between Single-Threaded and Multi-Tasking model crash resistant (but one badly behaved thread can crash service)
28 Security Considerations Socket semantics do NOT address security problems, such as: IP and adapter addresses Userid and passwords data encryption traces UNIX systems require root privilege when a program binds a reserved (<1024) port getpeername() returns the peer s port and IP-address: determine privileged peers and trusted hosts The Kerberos protocol provides password and data encryption, along with service authentication SAS Slide 28 Feb. 1998
29 Limit applications to standard socket routines, BSD 4.x Implement a portable transport module Mainframe Environment - Distribute existing applications Portability Considerations API Programmer s Reference - Details SAS/C, C/370, Interlink,, Open Connect, NSC OS/2 - REXX Sockets, Programmer s Toolkit MS Windows Sockets WINSOCK.DLL ( ftp.stardust.com:/pub/winsock winsock) SAS Slide 29 Feb. 1998
30 Summary Basic networking and features of TCP/IP protocols Socket library organization Socket library coding techniques Awareness of more advanced topics What s Next Session Part II - Client/Server Application SAS Slide 30 Feb. 1998
31 Bibliography Internetworking with TCP/IP: Volumes I, II & III, Douglas Comer, Prentice Hall, 1991 (ISBN Vol I: , Vol III: ) The Whole Internet User s Guide & Catalog by Ed Kroll; O Reilly & Associates UNIX Network Programming by W. Richard Stevens; Prentice Hall, 1990 (ISBN ) Socket API Programmer s Reference UNIX man pages TCP/IP Illustrated: Volumes 1 & 2, W. Richard Stevens (v2 with Gary R. Wright); Addison-Wesley Publishing Company, 1994 SAS Slide 31 Feb. 1998
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Tutorial on Socket Programming
Tutorial on Socket Programming Computer Networks - CSC 458 Department of Computer Science Seyed Hossein Mortazavi (Slides are mainly from Monia Ghobadi, and Amin Tootoonchian, ) 1 Outline Client- server
Introduction to Socket Programming Part I : TCP Clients, Servers; Host information
Introduction to Socket Programming Part I : TCP Clients, Servers; Host information Keywords: sockets, client-server, network programming-socket functions, OSI layering, byte-ordering Outline: 1.) Introduction
Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming
Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment
Session NM059. TCP/IP Programming on VMS. Geoff Bryant Process Software
Session NM059 TCP/IP Programming on VMS Geoff Bryant Process Software Course Roadmap Slide 160 NM055 (11:00-12:00) Important Terms and Concepts TCP/IP and Client/Server Model Sockets and TLI Client/Server
Network Programming with Sockets. Process Management in UNIX
Network Programming with Sockets This section is a brief introduction to the basics of networking programming using the BSD Socket interface on the Unix Operating System. Processes in Unix Sockets Stream
TCP/IP - Socket Programming
TCP/IP - Socket Programming [email protected] Jim Binkley 1 sockets - overview sockets simple client - server model look at tcpclient/tcpserver.c look at udpclient/udpserver.c tcp/udp contrasts normal master/slave
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Socket Programming. Srinidhi Varadarajan
Socket Programming Srinidhi Varadarajan Client-server paradigm Client: initiates contact with server ( speaks first ) typically requests service from server, for Web, client is implemented in browser;
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Chapter 11. User Datagram Protocol (UDP)
Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
ICT SEcurity BASICS. Course: Software Defined Radio. Angelo Liguori. SP4TE lab. [email protected]
Course: Software Defined Radio ICT SEcurity BASICS Angelo Liguori [email protected] SP4TE lab 1 Simple Timing Covert Channel Unintended information about data gets leaked through observing the
Basic Operation & Management of TCP/IP Networks
Basic Operation & Management of TCP/IP Networks SYSTEMS, Inc. For the MU-SPIN Coordination Office Slide 1 Presentation Contents Introduction to the Internet, Protocols and TCP/IP IP addressing, Name Resolution
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008 Standard)
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Socket Programming in C/C++
September 24, 2004 Contact Info Mani Radhakrishnan Office 4224 SEL email mradhakr @ cs. uic. edu Office Hours Tuesday 1-4 PM Introduction Sockets are a protocol independent method of creating a connection
Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
ELEN 602: Computer Communications and Networking. Socket Programming Basics
1 ELEN 602: Computer Communications and Networking Socket Programming Basics A. Introduction In the classic client-server model, the client sends out requests to the server, and the server does some processing
Socket Programming. Request. Reply. Figure 1. Client-Server paradigm
Socket Programming 1. Introduction In the classic client-server model, the client sends out requests to the server, and the server does some processing with the request(s) received, and returns a reply
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user
Transport service characterization The Transport Layer End-to-End Protocols: UDP and TCP Connection establishment (if connection-oriented) Data transfer Reliable ( TCP) Unreliable / best effort ( UDP)
Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
The TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Network Models OSI vs. TCP/IP
Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both
Network Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Cross-platform TCP/IP Socket Programming in REXX
Cross-platform TCP/IP Socket programming in REXX Abstract: TCP/IP is the key modern network technology, and the various REXX implementations have useful, if incompatible interfaces to it. In this session,
Internet Protocols. Background CHAPTER
CHAPTER 3 Internet Protocols Background The Internet protocols are the world s most popular open-system (nonproprietary) protocol suite because they can be used to communicate across any set of interconnected
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
Operating Systems Design 16. Networking: Sockets
Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski [email protected] 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
Computer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
Socket Programming. Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur
Socket Programming Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Background Demultiplexing Convert host-to-host packet delivery service into a process-to-process communication channel
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
Computer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents
Unit 4 Introduction to TCP/IP Overview Description This unit contains one lesson: This lesson will introduce protocols in general. You will look at how a protocol functions, the differences between a routable
Introduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
Application Architecture
A Course on Internetworking & Network-based Applications CS 6/75995 Internet-based Applications & Systems Design Kent State University Dept. of Science LECT-2 LECT-02, S-1 2 Application Architecture Today
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
Introduction to Socket programming using C
Introduction to Socket programming using C Goal: learn how to build client/server application that communicate using sockets Vinay Narasimhamurthy [email protected] CLIENT SERVER MODEL Sockets are
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
Chapter 5. Transport layer protocols
Chapter 5. Transport layer protocols This chapter provides an overview of the most important and common protocols of the TCP/IP transport layer. These include: User Datagram Protocol (UDP) Transmission
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
A Heterogeneous Internetworking Model with Enhanced Management and Security Functions
Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how
finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...
Read Chapter 9 Linux network utilities finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... 1 Important to know common network terminology
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Distributed Systems. 2. Application Layer
Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Application. Transport. Network. Data Link. Physical. Network Layers. Goal
Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined 1 2 Data Exchange Between Processes TCP Connection-Setup Between Processes
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
Design of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
TCP/IP Networking An Example
TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the
Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
TCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Windows Sockets Network Programming
Windows Sockets Network Programming Bob Quinn Dave Shute TT ADDISON-WESLEY PUBLISHING COMPANY Reading, Massachusetts Menlo Park, California New York Don Mills, Ontario Wokingham, England Amsterdam Bonn
IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing
IP Addressing -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing Internetworking The concept of internetworking: we need to make different networks communicate
You will work in groups of two on the labs. It is OK to talk to others and help each other in the lab.
ECE4110 Internetworking Programming Version 1/6/2006 Instructor: John Copeland Office: TTh VL-292B, MWF Centergy 5138 Email: [email protected] Phone: 404-894-5177 (MWF) Class Hours: T/Th 12:05-1:55
Principles of Network Applications. Dr. Philip Cannata
Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).
How To Understand The Internet Of S (Netware)
Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
Application-layer protocols
Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
Unix Security Features and TCP/IP Primer
Unix Security Features and TCP/IP Primer Secure Software Programming and Vulnerability Analysis Christopher Kruegel Unix Security Features and TCP/IP Primer Secure Software Programming 2 Unix Features
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Porting applications & DNS issues. socket interface extensions for IPv6. Eva M. Castro. [email protected]. dit. Porting applications & DNS issues UPM
socket interface extensions for IPv6 Eva M. Castro [email protected] Contents * Introduction * Porting IPv4 applications to IPv6, using socket interface extensions to IPv6. Data structures Conversion functions
A network monitoring tool for student training
A network monitoring tool for student training Miguel A. Mateo Pla, M.P. Malumbres Departamento de Informática de Sistemas y Computadores (DISCA) Facultad de Informática (FI) Universidad Politécnica de
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
