Forming a P2P System In order to form a P2P system, the 'central-server' should be created by the following command.
|
|
- Wilfrid Hampton
- 8 years ago
- Views:
Transcription
1 CSCI 5211 Fall 2015 Programming Project Peer-to-Peer (P2P) File Sharing System In this programming assignment, you are asked to develop a simple peer-to-peer (P2P) file sharing system. The objective of this project is to let you get hands-on experiences in computer network programming, in particular, socket programming, and in network application development. You are asked to develop two programs, called 'central-server' and 'peer'. 'central-server' is used to store the information of 'peer's (e.g., peer ID, peer Name, IP address, port number). 'peer's need to register themselves to 'central-server' and 'central-server' returns the connecting information to 'peer's. Multiple hosts execute the program 'peer' in certain order (which will be elaborated later) to form a P2P system. We call such a host with a running 'peer' program as a peer host. Every peer host designates a directory containing several files as its shared directory when it starts working. Once a peer-to-peer system is set up, any peer host can use command 'get' to download the specified file from some peer hosts holding the file. There are multiple peer hosts and one central server. You must finish this programming project individually. Note: The file sharing is only among the peers, not the 'central-server'. 'central-server' does not participate in the file downloading. Forming a P2P System In order to form a P2P system, the 'central-server' should be created by the following command. central-server [optional argument1] [optional argument2]... After the central-server is created, a peer host can register itself to the central-server and join the P2P network by the following command. peer pathname central-server-name [optional argument1] [optional argument2]... Here, 'pathname' designates the shared directory of a peer host running this program. 'central-servername' is name of the central-server that has been created. After this command, the following operations should be finished. 1) The peer host registers itself to the central-server. 2) The central-server looks up its records, randomly picks up an existing peer host and returns its name to the new peer host. Then this new peer host will join the P2P system by connecting to this existing peer host. If there is no peer host (the new requesting peer host is the first one to register), the central-server does not return the name of existing peer host, and instead, it can return a confirmation message to the new peer host to let the new peer host form a P2P network. (After that, there is only one peer host in the P2P network.)
2 To make things clear, we assume the name of the existing peer host returned by central-server is "A". And the new requesting peer host is called "B". After the new requesting peer host B receives the name of existing peer host A from the central server, B sets up a connection to A. Then, we say A and B are neighbors. Note: 'central-server' and 'peer' are not neighbors. An Example: Assuming you have compiled the source files and generated the binary 'central-server' and 'peer'. Before started, you copy 'peer' to your CS account home directory '/home/grad04/xiang' Step 1: create directories and files on different hosts xiang@cello (~) % mkdir /home/grad04/xiang/cello xiang@cello(~) % echo "this is mydoc1" > /home/grad04/xiang/cello/mydoc1 xiang@saxophone (~) % mkdir /home/grad04/xiang/saxophone xiang@saxophone (~) % echo "this is mydoc2" > /home/grad04/xiang/saxophone/mydoc2 xiang@oboe (~) % mkdir /home/grad04/xiang/oboe xiang@oboe (~) % echo "this is mydoc3" > /home/grad04/xiang/oboe/mydoc3 xiang@trombone (~) % mkdir /home/grad04/xiang/trombone xiang@trombone (~) % echo "this is mydoc4" > /home/grad04/xiang/trombone /mydoc4 Step 2: start central-server on 'flute'. xiang@flute (~) % central-server [optional argument1] [optional argument2]... Step 3: start peer host on 'cello', registering and joining the P2P system xiang@cello (~) % peer /home/grad04/xiang/cello flute.cs.umn.edu [optional argument1] [optional argument2]... Step 4: start peer host on 'saxophone', registering and joining the P2P system xiang@saxophone (~) % peer /home/grad04/xiang/saxophone flute.cs.umn.edu [optional argument1] [optional argument2]... Step 5: start peer host on 'oboe', registering and joining the P2P system xiang@oboe (~) % peer /home/grad04/xiang/oboe flute.cs.umn.edu [optional argument1] [optional argument2]... Step 6: start peer host on 'trombone', registering and joining the P2P system xiang@trombone (~) % peer /home/grad04/xiang/trombone flute.cs.umn.edu [optional argument1] [optional argument2]... Step 7: on peer host 'cello', type in command get mydoc4 The file 'mydoc4' should be downloaded from 'trombone' to 'cello' and stored in the designated directory of the 'peer' program. In this example, you should find the downloaded file at '/home/grad04/xiang/cello/mydoc4'. Lookup service After the peer-to-peer system is set up, a user can type the command like 'get mydoc4' on a peer host to download the specified file. This actually involves two steps - lookup and download. The lookup service used in this simple file sharing system is based on flooding. In the previous example, after 'get
3 mydoc4' is input on peer host 'cello', a message which looks like 'GET mydoc ' is constructed. In this message, ' ' is the IP address of host 'cello'. '36953' is the port number of the listen socket that 'cello' has created to set up a data channel (or TCP connection) with the peer which has 'mydoc4'. This message is flooded to all neighbors of 'cello'. For every peer host receiving this message, they first do a local lookup to see whether the specified file is in its shared directory. If it is not there, the peer host forwards the same message to all of its known neighbors, except the one from which it got the message. If the specified file is in a peer host's shared directory, it makes a connection request to the originating peer host whose IP address and port number is in the message (in this example, it should make a connection to host at port 36953). Once the connection is set up, the requested file is sent. If the requested file has multiple copies in different peers, the peer which requests this file will download it from the peer which first makes the file transfer connection, and rejects other peers' file downloading connections. Note: The peer hosts transmitting files between each other are not neighbors. In the previous example, although "cello" gets 'mydoc4' from "trombone" and a connection is built between them, they are not considered as neighbors. The following figure shows one possible P2P topology of the previous example.
4 Download Files considering Timeout A new listen socket needs to be created when a 'get' command is received from stdin. Since this listen socket has a timeout requirement, you can use select() with timeout period, e.g., 5 seconds, to wait for connection requests on the listen socket. In the example, 'cello' creates a listen socket waiting for connection request from some peer host holding 'mydoc4'. However, it is possible that 'mydoc4' does not exist in any peer host. To handle this case, such listen socket has a timeout period, for example, 5 seconds. If there is no connection setup after timeout, the listen socket is closed and a message admin: the requested file does not exist in the P2P system should be displayed by your programs. On the other hand, when the download is completed, a message the requested file has been downloaded successfully should be shown. Servicing the Files downloaded from Other Peers After a peer downloads a new file from another peer, the file can be provided to other peers which request it. Therefore, you need to update the file list after completing each download. For example, assume that 'saxophone' downloaded 'mydoc4' from 'trombone' and 'oboe' requests 'mydoc4'. Since 'saxophone' has 'mydoc4' now, it can provide it for 'oboe' instead of 'trombone'. Terminate a Peer Host Use 'quit' to terminate a copy of 'peer' and 'central-server'. It is required that the termination is handled gracefully (e.g., the connected neighbor(s) should display a message like "admin: disconnected from 'saxophone.cs.umn.edu(35032)' " if 'saxophone' is shut down). Be assured that there is no crash on any neighboring peers. The remaining peer hosts must work correctly. Commands you must support in the peer program 1) get: to download a file from other peers. 2) list: to display file lists in its own shared directory. 3) quit: to terminate a peer host. Miscellaneous This programming project must be finished individually. We assume there are no more than 10 peers in the P2P system. In order to simplify the problem, we can assume that a peer does not download a file that has existed in its designated shared directory, even if the two files with the same file name have different contents. For example, if a peer host A has the file mydoc1 in its directory, it will not download mydoc1 from other peers, even if the file mydoc1 in other peers directories have different contents from mydoc1 in peer host A s directory. In other words, you do not need to consider file overwrite or replacing existing files. You can use command line "gcc -lsocket -lnsl peer.c -o peer" under Solaris, or use "gcc -lnsl peer.c -o peer" under Linux to compile your source files. As long as your final programs have the mentioned functions (including output messages) and work well in UNIX or LINUX, they will be acceptable. Any programming language is acceptable. You must make sure that you programs work well in CS or CSELabs machines. Your programs must be able to work on multiple machines, i.e., the central server and each peer host should run on
5 different machines. For example, if you have 5 peers, these 5 peers should run on 5 different machines respectively. Also, the central server should run on another machine different from these 5 machines. You need to consider some error handlings (e.g., peer registering to a non-existing central server, invalid commands, downloading a non-existing file). If one peer terminates by 'quit', you do not need to consider re-connecting the two separated parts together. However, you need to make sure the two separated parts work well respectively. Your programs should output some proper messages after each command and operation. A readme file should be provided in the submission to explicitly show how to compile and run your programs. Milestones 11/02 (Monday): First submission (partial running programs). Your 'peer' and 'central-server' programs need to show successfully constructing P2P network. Other requirements do not need to be provided. 12/07 (Monday): Final submission (complete programs). You must submit your Makefile (if necessary) as well as all other files. Note: The project will be graded based on the final submission (due 12/07), but you are required to do the first submission (due 11/02). Please compress all your files to.tar or.zip (not.rar) for convenience. You use "Last name + StudentID.tar (or.zip)" to name your submission file. Please submit your compressed file to Moodle website:
Advanced Computer Networks Project 2: File Transfer Application
1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application
More informationParallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0
Parallels Plesk Panel VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide Revision 1.0 Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49
More information1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
More informationCS 557- Project 1 A P2P File Sharing Network
Assigned: Feb 26, 205 Due: Monday, March 23, 205 CS 557- Project A P2P File Sharing Network Brief Description This project involves the development of FreeBits, a file sharing network loosely resembling
More informationParallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.
More informationFile Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN 1 Contents CONNECTIONS COMMUNICATION COMMAND PROCESSING
More informationInstalling Bacula Client on Mac OS X Server
Installing Bacula Client on Mac OS X Server This tutorial guides you through a Bacula install on a fresh installation of Mac OS X Server 10.5 (Leopard). This does not include setting up firewall settings.
More informationDeploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
More informationBF2CC Daemon Linux Installation Guide
BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...
More informationDisaster Recovery on the Sun Cobalt RaQ 3 Server Appliance with Third-Party Software
Technical Paper Disaster Recovery on the Sun Cobalt RaQ 3 Server Appliance with Third-Party Software The Sun Cobalt RaQ 3 server appliance supports the use of third-party backup solutions for performing
More information15-441: Computer Networks Project 1: Internet Relay Chat (IRC) Server
15-441: Computer Networks Project 1: Internet Relay Chat (IRC) Server Lead TA: Daegun Won Assigned: January 21, 2010 Checkpoint 1 due: January 26, 2010 Checkpoint 2 due: February
More informationThere are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to):
Remote Connection Protocols There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): - telnet (typically to connect to a machine
More informationCNT5106C Project Description
Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in
More informationImplementing and testing tftp
CSE123 Spring 2013 Term Project Implementing and testing tftp Project Description Checkpoint: May 10, 2013 Due: May 29, 2013 For this project you will program a client/server network application in C on
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationSetting up PostgreSQL
Setting up PostgreSQL 1 Introduction to PostgreSQL PostgreSQL is an object-relational database management system based on POSTGRES, which was developed at the University of California at Berkeley. PostgreSQL
More informationAuthenticate vsftpd (a secure FTP server for UNIXlike systems) with IDENTIKEY Authentication Sever
KB 160083 Authenticate vsftpd (a secure FTP server for UNIXlike systems) with IDENTIKEY Authentication Sever Creation date: 11/03/2016 Last Review: 11/03/2016 Revision number: 2 Document type: How To Security
More informationSWsoft, Inc. Plesk VPN. Administrator's Guide. Plesk 7.5 Reloaded
SWsoft, Inc. Plesk VPN Administrator's Guide Plesk 7.5 Reloaded (c) 1999-2004 ISBN: N/A SWsoft Inc 13800 Coppermine Drive Suite 112 Herndon VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationBackup Server DOC-OEMSPP-S/6-BUS-EN-21062011
Backup Server DOC-OEMSPP-S/6-BUS-EN-21062011 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this guide
More informationOCS Training Workshop LAB14. Email Setup
OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging
More information15-441 Project 3, Fall 2001 Stateful Functionality in IP Layer Out: Thursday, November 1, 2001 Due: Tuesday, December 4, 2001
15-441 Project 3, Fall 2001 Stateful Functionality in IP Layer Out: Thursday, November 1, 2001 Due: Tuesday, December 4, 2001 1. Introduction In Project 2 we asked you to implement the IP layer of the
More informationAppendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationSigniant Agent installation
Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation
More informationProject 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
More informationCOMP 112 Assignment 1: HTTP Servers
COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server
More informationTutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services
Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services Sayed Hadi Hashemi Last update: August 28, 2015 1 Overview Welcome Before diving into Cloud Applications, we need to set up the environment
More informationCSEE 4119: Computer Networks, Spring 2014
CSEE 4119: Computer Networks, Spring 2014 Programming Assignment 1: Socket Programming Due Tuesday, March 4 th 11:55 pm P. Prakash, W. An, P. Nirantar, R. Yu, X. Zhu (TAs), A. Chaintreau (instructor) Academic
More informationLab 5: BitTorrent Client Implementation
Lab 5: BitTorrent Client Implementation Due: Nov. 30th at 11:59 PM Milestone: Nov. 19th during Lab Overview In this lab, you and your lab parterner will develop a basic BitTorrent client that can, at minimal,
More informationSpam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
More informationConfiguration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
More informationStateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
More informationIntroduction. How does FTP work?
Introduction The µtasker supports an optional single user FTP. This operates always in active FTP mode and optionally in passive FTP mode. The basic idea of using FTP is not as a data server where a multitude
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communications & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationBack-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationQuick Connect. Overview. Client Instructions. LabTech
LabTech Quick Connect QUICK CONNECT 1 Overview... 1 Client Instructions... 1 Technician Instructions... 4 VNC... 5 RDP... 6 RAssist (Remote Assistance)... 8 IE (Internet Explorer browser)... 9 CMD... 10
More informationTCP Session Management (SesM) Protocol Specification
TCP Session Management (SesM) Protocol Specification Revision Date: 08/13/2015 Version: 1.1e Copyright 2015 Miami International Securities Exchange, LLC. All rights reserved. This constitutes information
More informationODBC Driver User s Guide. Objectivity/SQL++ ODBC Driver User s Guide. Release 10.2
ODBC Driver User s Guide Objectivity/SQL++ ODBC Driver User s Guide Release 10.2 Objectivity/SQL++ ODBC Driver User s Guide Part Number: 10.2-ODBC-0 Release 10.2, October 13, 2011 The information in this
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationCase Study 2 SPR500 Fall 2009
Case Study 2 SPR500 Fall 2009 6 th November 2009 Due Date: 9 th December 2009 Securing Sotnec's web site using Linux Firewall technology Sotnec corporation, an Open Source Company, consists of a small
More informationYSoft SafeQ Client for Windows
making the MFDs think YSoft SafeQ Client for Windows Installation and Usage guide Version 1.4 2010 by Y Soft Corporation a.s. All rights to this document, domestic and international, are reserved by Y
More informationCS155: Computer and Network Security
CS155: Computer and Network Security Programming Project 3 Spring 2005 Shayan Guha sguha05@stanford.edu (with many slides borrowed from Matt Rubens) Project Overview 1) Use standard network monitoring
More informationFioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Entire contents Fiorano Software and Affiliates. All rights reserved. Reproduction of this document in any form without prior written permission is forbidden. The information
More informationSetting Up the Site Licenses
XC LICENSE SERVER Setting Up the Site Licenses INTRODUCTION To complete the installation of an XC Site License, create an options file that includes the Host Name (computer s name) of each client machine.
More informationDS License Server V6R2013x
DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology
More information1. Installing and configuring APC UPS Management
1. Installing and configuring APC UPS Management 1.1. Objectives and Overview In this lab, you will learn how to install and configure the APC UPS power management suite and the Web/SNMP Management Card.
More informationMeasuring the performance of a Wired network
Measuring the performance of a Wired network slide 1 note throughout the following tutorial the courier font indicates the terminal output whereas the courier bold indicates keyboard input. and italic
More informationHow To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner)
Oracle Virtualization Installing Oracle VM Server 3.0.3, Oracle VM Manager 3.0.3 and Deploying Oracle RAC 11gR2 (11.2.0.3) Oracle VM templates Linux x86 64 bit for test configuration In two posts I will
More informationDanware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
More informationz/tpf FTP Client Support
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Fall 2006 z/tpf FTP Client Support Name: Jason Keenaghan Venue: Main Tent AIM
More informationTera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
More information1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
More informationProject #4: MITM Attacks and Authentication
Project #4: MITM Attacks and Authentication CS 645: Network Security Due: August 31, 2012 11:59 pm EST August 15, 2013 This project is based on a project designed by Dan Boneh for his class (cs 255) and
More informationSysAidTM Freeware Installation Guide
SysAidTM Freeware Installation Guide Document Updated: 10 November 2009 Introduction SysAid free edition is built for organizations with fewer than 100 computers and users. This document will help you
More informationRemote Administration
Contents Preparing The Server 2 Firewall Considerations 3 Performing Remote Administration 4 Additional Notes 5 Mobile Application Administration 6 Managing Users In The iphone App 8 Maxum Development
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
More informationNRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...
Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...
More informationSMC7004ABR Barricade Broadband Router Installation Instructions
SMC7004ABR Barricade Broadband Router Installation Instructions SPECIAL NOTE: Part D Upgrading the Firmware in Your Barricade MUST occur in ALL installations for multiple VPN sessions to work!!! SPECIAL
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationSyslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems
Syslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Syslog (Centralized Logging and Analysis) 5 1.1 Introduction..............................
More informationUsing Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
More informationEnterprise SSL Support
01 Enterprise SSL Support This document describes the setup of SSL (Secure Sockets Layer) over HTTP for Enterprise clients, servers and integrations. 1. Overview Since the release of Enterprise version
More informationFTP protocol (File Transfer Protocol)
FTP protocol (File Transfer Protocol) Introduction to FTP protocol FTP protocol (File Transfer Protocol) is, as its name indicates a protocol for transferring files. The implementation of FTP dates from
More informationCisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
More informationLab 2 : Basic File Server. Introduction
Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and
More informationProgram 5 - Processes and Signals (100 points)
Program 5 - Processes and Signals (100 points) COMPSCI 253: Intro to Systems Programming 1 Objectives Using system calls to create and manage processes under Linux and Microsoft Windows Using Visual Studio
More informationCisco Configuring Secure Shell (SSH) on Cisco IOS Router
Cisco Configuring Secure Shell (SSH) on Cisco IOS Router Table of Contents Configuring Secure Shell (SSH) on Cisco IOS Routers...1 Contents...1 Introduction...1 Hardware and Software Versions...1 SSHv1
More informationCS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationXMLVend Protocol Message Validation Suite
XMLVend Protocol Message Validation Suite 25-01-2012 Table of Contents 1. Overview 2 2. Installation and Operational Requirements 2 3. Preparing the system 3 4. Intercepting Messages 4 5. Generating Reports
More informationChapter 46 Terminal Server
Chapter 46 Terminal Server Introduction... 46-2 TTY Devices... 46-2 Multiple Sessions... 46-4 Accessing Telnet Hosts... 46-5 Command Reference... 46-7 connect... 46-7 disable telnet server... 46-7 disconnect...
More informationActive-Active ImageNow Server
Active-Active ImageNow Server Getting Started Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: March 2014 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow,
More informationdotdefender v5.12 for Apache Installation Guide Applicure Web Application Firewall Applicure Technologies Ltd. 1 of 11 support@applicure.
dotdefender v5.12 for Apache Installation Guide Applicure Web Application Firewall Applicure Technologies Ltd. 1 of 11 Installation Process The installation guide contains the following sections: System
More informationCS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
More informationInstallation Overview
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
More informationProject 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
More informationAgenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
More informationwebmethods Certificate Toolkit
Title Page webmethods Certificate Toolkit User s Guide Version 7.1.1 January 2008 webmethods Copyright & Document ID This document applies to webmethods Certificate Toolkit Version 7.1.1 and to all subsequent
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationChapter 26 EasyPrinter
Chapter 26 EasyPrinter... 2 26.1 Using EasyPrinter as a Printer Server... 3 26.1.1 Setup Procedure in EasyPrinter... 3 26.1.2 Setup Procedure in EasyBuilder... 4 26.2 Using EasyPrinter as a Backup Server...
More informationEVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
More informationDefeating Firewalls : Sneaking Into Office Computers From Home
1 of 6 Defeating Firewalls : Sneaking Into Office Computers From Home Manu Garg Overview Yes, it's possible. Let me first give you an overview of the setup. You work with a company
More informationAnswers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationDS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x
DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version
More informationINSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER A TECHNICAL WHITEPAPER Copyright 2012 Kaazing Corporation. All rights reserved. kaazing.com Executive Overview This document
More informationBuilding and Using NX Open Source Components version 3.X
pproved by: Building and Using NX Open Source Components version 3.X Document Prot.D-509/06-NXG-DOC Page 1 of 9 pproved by: Index 1. version 3.x...3 1.1. Building NX Compression Libraries and Proxy...3
More informationRemote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell krmitchell@swin.edu.au Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
More informationAPPLICATION NOTE. How to build pylon applications for ARM
APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications
More informationSystem Area Manager. Remote Management
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
More informationCS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th) YOUR ASSIGNMENT Your assignment is to write an SMTP (Simple
More informationSocket Programming in the Data Communications Laboratory
Socket Programming in the Data Communications Laboratory William E. Toll Assoc. Prof. Computing and System Sciences Taylor University Upland, IN 46989 btoll@css.tayloru.edu ABSTRACT Although many data
More informationPATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationConfigure ActiveSync with a single Exchange server (Exchange sync for an iphone)
Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) I recently picked up a first-generation iphone from a friend and after playing around with it for a while I decided that
More informationAvid inews Command Best Practices
Avid inews Command Best Practices Failover and Redundancy This document outlines the Command Server failover and Command hotswap failover functionality of inews Command. It includes the performance expectations,
More informationAutoDownload: SQL Server and Network Trouble Shooting
AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions
More informationNetwork Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS kaw@cerias.purdue.edu 1 Network Packet Analysis Definition: Examining network packets to determine
More information