Preview

Nt1330 Unit 5 Assignment 1

Good Essays
Open Document
Open Document
1348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 5 Assignment 1
CS2307-COMPUTER NETWORKS LAB MANUAL

PROGRAM USING TCP SOCKETS
EX NO: 1.i DATE AND TIME SERVER
AIM:
TO implement date and time display from local host to server using TCP
ALGORITHM: CLIENT
1.start the program
2. To create a socket in client to server.
3. the client connection accept to the server and replay to read the system date and time.
5. Stop the program.
ALGORITHM: SERVER
1.start the program
2. To create a socket in server to client.
3. To display the current date and time to client
5. Stop the program.

EX NO:1.ii CLIENT-SERVER APPLICATION FOR CHAT
AIM:
To write a client-server application for chat using TCP
ALGORITHM: CLIENT
1.start the program
2. To create a socket in client to server.
3. The client establishes
…show more content…
To create a socket in server to client
3. The server establishes a connection to the client.
4. The server accept the connection and to send the data from server to client and vice ersa 5. The server communicate the client to send the end of the message
6.Stop the program.

EX NO:1.iii IMPLEMENTATION OF TCP/IP ECHO
AIM:
To implementation of echo client server using TCP/IP
ALGORITHM:
1.start the program
2 To create a socket in client to server.
3. 3he client establishes a connection to the server.
4. The client accept the connection and send data to server and the server to replay the echo message to the client
5. The client communicate the server to send the end of the message
6. Stop the program.

Ex No:2 PROGRAM USING SIMPLE UDP
EX NO:2.i DOMAIN NAME SYSTEM
AIM:
To write a C program to develop a DNS client server to resolve the given hostname. ALGORITHM:
1. Create a new file. Enter the domain name and address in that file.
2. To establish the connection between client and server.
3. Compile and execute the program.
4. Enter the domain name as input.
5. The IP address corresponding to the domain name is display on the screen
6. Enter the IP address on the
…show more content…
EX No: 05 SIMULATION OF SLIDING WINDOW PROTOCOL
AIM:
To write a C program to perform sliding window.
ALGORITHM:
1. Start the program.
2. Get the frame size from the user
3. To create the frame based on the user

You May Also Find These Documents Helpful

  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    a) An analogy of this type of connection would be the transmission of a large text document. Before the document is transferred across the synchronous line, it is first broken into blocks of sentences or paragraphs. The blocks are then sent over the communication link to the remote site. With other transmission modes, the text is organized into long strings of letters (or characters) that make up the words within the sentences and paragraphs. These characters are sent over the communication link one at a time and reassembled at the remote location.…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 273 Unit 1

    • 316 Words
    • 2 Pages

    4. Describe two hypothetical situations, one in which a peer-to-peer network would be most appropriate and one in which a client-server network would be most appropriate, and explain why the particular network type would be most appropriate for that case.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The process of the entire file transfer is completely overseen and ruled by the server. Their server is connected to the Central Offices which connects to the Local Exchange Carriers which is all interconnected to Interexchange Carriers which allow all customers the ability to connect to the server. The customers connect through their routers, all the way to their CO’s, to their LEC’s, finds a way to the IXC’s and is then routed to the direction of the game server.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I think that the organizations requirements for user's passwords to be several character long and have a certain amount of attempts is actually a great security measure. Yes, i think the additional security is worth it. I also think the number of security entry should be limited. The reason I agree with both is because if they were not in place it woud give people an easier chance of unlocking you phone and disappearing with it. For example, I have an Iphone i went to a friends get together. I place my phone down for 5 minute to get a drink someone took my phone and was trying to unlock it. The person could not get my code correct so my phone shut him out completely. I was happy because my information was protected.…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1-2. What are the roles of the source and the receiver in the communication process?…

    • 717 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Client-Server Model – utilizes client and server devices each designed for a specific purpose (Mitchell, 2013).…

    • 874 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data Exchange Standards • Lets understand how you transmit HL7 messages from one application to another. • HL7 Messages are typically moved via a network connection between two systems that reside on the same network. • Each system has a role in the communication. One acts as the CLIENT and the other acts as the Server. Typically the one sending the data is the CLIENT, but that does not have to be the case always.…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Tcip and Ip Protocols

    • 845 Words
    • 4 Pages

    2. Name and describe the central TCP/IP protocols. Correlate each of these protocols with the layer of the OSI model where they operate.…

    • 845 Words
    • 4 Pages
    Good Essays
  • Good Essays

    MIS 300 TG 3 Notes

    • 1087 Words
    • 5 Pages

    The Client/server model is where one computer makes a request (client) and another computer (server) satisfies the request. The two computers can be on different networks (and on the Internet).…

    • 1087 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Hures Company Case Study

    • 1565 Words
    • 7 Pages

    Client/server application is a piece of software in client and makes requests to a remote server via network. Client/server application is written in high-level visual programming languages where user interfaces and most of the business logics reside in client application. One of the examples of client/server applications is database application that makes database queries to a remote central database server. This type of application grew in popularity many years ago as personal computers became common alternative to older mainframe computers (compnetwroking.about.com).…

    • 1565 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Tcp/Ip

    • 1116 Words
    • 5 Pages

    At first glance, TCP/IP (Transmission Control Protocol/Internet Protocol) may seem baffling. Many other protocols, such as NetBEUI and IPX/SPX, require no configuration. TCP/IP is different. Due to the seemingly endless number of options that you can configure within TCP/IP, many people become intimidated at first. In reality, however, TCP/IP isn 't very difficult, but you have to gain some understanding of what you 're configuring. So, I 'm going to give you a crash course in TCP/IP. Although I won 't be able to explore every feature in detail, I 'll cover the important points.…

    • 1116 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In this chapter, we will cover asynchronous socket programming and common recipes using Netty for building network-based application. The user story is, you get requirements to develop a system, that client and server can communicate asynchronously using TCP/IP . So we will divide the problem to 6 common recipes:…

    • 1485 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Destination port range: from Others to others and fill up yung red na box using yung NAME ng Alias na ginawa natin kanina…

    • 304 Words
    • 2 Pages
    Satisfactory Essays