SlideShare a Scribd company logo
1.Create a server that can process remote communication
request from clients
2.Create clients (multiple client objects can be instantiated from
the same client class) that can send request network
communication to remote server
3.During the communication, clients are supposed to sendjob
object which has job ID(has a confidential requirement while in
transmission)and a secret, OPNumber (confidential in
transmission, in memory, and in storage).
4.As the programmer, you should first make sure the
communication will be secure during the transmission. For
example, ssl through https, but only ensure the confidentiality
during the transmission.
5.Then, you should have your secret OPNumberneeds to be
encrypted before transmissionso when it will be encrypted after
it received.
6.To test it, you may decrypt the secret OPNumberafter server
received the job.
7.Your delivery: source code, and report with a few screen shots
of the execution of the program.

More Related Content

Similar to 1.Create a server that can process remote communication request from.docx

OpenStack Swift的性能调优
OpenStack Swift的性能调优OpenStack Swift的性能调优
OpenStack Swift的性能调优
Hardway Hou
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
Arun Modi
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
Infinity Tech Solutions
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
 
Network Security Practices-IP Security
Network Security Practices-IP SecurityNetwork Security Practices-IP Security
Network Security Practices-IP Security
Gayathridevi120
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
Vijayanand Yadla
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
Alex Punnen
 
Q1) Show what part of SSL that protects against the following attack.pdf
Q1) Show what part of SSL that protects against the following attack.pdfQ1) Show what part of SSL that protects against the following attack.pdf
Q1) Show what part of SSL that protects against the following attack.pdf
arishmarketing21
 
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)
maunicmer
 
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
TI Safe
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
Abhishek Sagar
 
SSl/TLS Analysis
SSl/TLS AnalysisSSl/TLS Analysis
SSl/TLS Analysis
Duduman Bogdan Vlad
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
Palani Kumar
 
Fiware cloud developers week brussels
Fiware cloud developers week brusselsFiware cloud developers week brussels
Fiware cloud developers week brussels
Fernando Lopez Aguilar
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
UC San Diego
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android Application
IRJET Journal
 

Similar to 1.Create a server that can process remote communication request from.docx (20)

OpenStack Swift的性能调优
OpenStack Swift的性能调优OpenStack Swift的性能调优
OpenStack Swift的性能调优
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
 
Network Security Practices-IP Security
Network Security Practices-IP SecurityNetwork Security Practices-IP Security
Network Security Practices-IP Security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Q1) Show what part of SSL that protects against the following attack.pdf
Q1) Show what part of SSL that protects against the following attack.pdfQ1) Show what part of SSL that protects against the following attack.pdf
Q1) Show what part of SSL that protects against the following attack.pdf
 
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)
 
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
SSl/TLS Analysis
SSl/TLS AnalysisSSl/TLS Analysis
SSl/TLS Analysis
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Fiware cloud developers week brussels
Fiware cloud developers week brusselsFiware cloud developers week brussels
Fiware cloud developers week brussels
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android Application
 

More from MargaritoWhitt221

Your supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docxYour supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docx
MargaritoWhitt221
 
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docxYour selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docx
MargaritoWhitt221
 
Your project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docxYour project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docx
MargaritoWhitt221
 
Your initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docxYour initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docx
MargaritoWhitt221
 
Your life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docxYour life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docx
MargaritoWhitt221
 
Your original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docxYour original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docx
MargaritoWhitt221
 
Your assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docxYour assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docx
MargaritoWhitt221
 
Your assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docxYour assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docx
MargaritoWhitt221
 
Your charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docxYour charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docx
MargaritoWhitt221
 
Young consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docxYoung consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docx
MargaritoWhitt221
 
You will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docxYou will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docx
MargaritoWhitt221
 
You will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docxYou will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docx
MargaritoWhitt221
 
You need to enable JavaScript to run this app. .docx
You need to enable JavaScript to run this app.      .docxYou need to enable JavaScript to run this app.      .docx
You need to enable JavaScript to run this app. .docx
MargaritoWhitt221
 
You will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docxYou will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docx
MargaritoWhitt221
 
You will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docxYou will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docx
MargaritoWhitt221
 
You will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docxYou will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docx
MargaritoWhitt221
 
You might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docxYou might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docx
MargaritoWhitt221
 
You will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docxYou will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docx
MargaritoWhitt221
 
You have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docxYou have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docx
MargaritoWhitt221
 
1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docx1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docx
MargaritoWhitt221
 

More from MargaritoWhitt221 (20)

Your supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docxYour supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docx
 
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docxYour selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docx
 
Your project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docxYour project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docx
 
Your initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docxYour initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docx
 
Your life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docxYour life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docx
 
Your original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docxYour original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docx
 
Your assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docxYour assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docx
 
Your assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docxYour assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docx
 
Your charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docxYour charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docx
 
Young consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docxYoung consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docx
 
You will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docxYou will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docx
 
You will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docxYou will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docx
 
You need to enable JavaScript to run this app. .docx
You need to enable JavaScript to run this app.      .docxYou need to enable JavaScript to run this app.      .docx
You need to enable JavaScript to run this app. .docx
 
You will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docxYou will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docx
 
You will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docxYou will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docx
 
You will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docxYou will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docx
 
You might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docxYou might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docx
 
You will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docxYou will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docx
 
You have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docxYou have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docx
 
1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docx1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docx
 

Recently uploaded

Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 

Recently uploaded (20)

Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 

1.Create a server that can process remote communication request from.docx

  • 1. 1.Create a server that can process remote communication request from clients 2.Create clients (multiple client objects can be instantiated from the same client class) that can send request network communication to remote server 3.During the communication, clients are supposed to sendjob object which has job ID(has a confidential requirement while in transmission)and a secret, OPNumber (confidential in transmission, in memory, and in storage). 4.As the programmer, you should first make sure the communication will be secure during the transmission. For example, ssl through https, but only ensure the confidentiality during the transmission. 5.Then, you should have your secret OPNumberneeds to be encrypted before transmissionso when it will be encrypted after it received. 6.To test it, you may decrypt the secret OPNumberafter server received the job. 7.Your delivery: source code, and report with a few screen shots of the execution of the program.