This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
The presentation introduces to the computer network basics. Local, metropolian and wide area networks explained. Point-to-point, bus and star network topologies. Unicast, multicast and broadcast transmissions. What is a broadcast storm and how to split a broadcast domain. Virtual local networks (VLANs), VLAN tags, VLAN trunks and multilayer switches are also explained.
Watch this with a 10-15 minute audiotrack at http://vimeo.com/novusprogram/powerpoint3
This lesson builds upon the concepts that were learned in the previous PowerPoint lesson. The topics covered include options for printing and saving your presentation, and an overview of animation techniques. The objective of the lesson is for the user to be comfortable with saving their PowerPoint presentation in various formats, printing handouts of their presentation, and using animation and timing techniques tot enhance their presentations. The lesson teaches concepts through a combination of image-based slides and video tutorials.
The Novus project is a combination of video tutorials designed to be used in conjunction with a free business simulation software program. The Novus Business and IT Program contains 36 business and IT training videos, covering basic finance, accounting, marketing, economics, business strategy, Word, Excel, and PowerPoint. Users will have an opportunity to apply the lessons in the Novus Business Simulator. Over six rounds, the user or teams will have to make decisions on capital purchases, financing, production, financing, and human resources for a microbrewery. This channel has arranged the 36 video lessons into the order in which they are meant to be used with the simulator. To watch this slideshow as a video, please go to our Vimeo page at: https://vimeo.com/novusprogram. To download our free business simulation software, please go to our SourceForge page at: http://sourceforge.net/projects/novus/.
In today's high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of data and information. Most Organizations like banks, airlines, markets, manufactures and universities widely used computer systems to manage, manipulate and process their information. Many of today's most widely used computer systems are database applications, for example, Amazon, which was built on top of MySQL. Database application is involved like everywhere in our world, it touches all aspects of our lives.
A database application is a computer program whose primary purpose is entering and retrieving information from a computerized database. Early examples of database applications were accounting systems and airline reservations systems.
The aim of this course is to explore fundamentals of database application related to MySQL, phpMyAdmin, MySQL command lines, apache server and PHP Maker. It details the relational database principles. It shows how to build and develop database application with web interface.
Upon completion of this course, computer students will have gained knowledge of database application concepts and the ability to:
Must know the basic concepts related relational database application.
Must know how to manage relational database via using MySQL command line and phpMyAdmin.
Must know how to build database application with web interface by using MySQL and PHPMaker.
A combination of lectures and practical sessions will be used in this course in order to achieve the aim of the course.
By MSc. Karwan Mustafa Kareem
The Presentation given at Guru Gobind Singh Polytechnic, Nashik for Third Year Information Technology and Computer Engineering Students on 08/02/2011.
Topic: Java Network Programming
The presentation given at MSBTE sponsored content updating program on 'Advanced Java Programming' for Diploma Engineering teachers of Maharashtra. Venue: Guru Gobind Singh Polytechnic, Nashik
Date: 22/12/2010
Session: Java Network Programming
The presentation introduces to the computer network basics. Local, metropolian and wide area networks explained. Point-to-point, bus and star network topologies. Unicast, multicast and broadcast transmissions. What is a broadcast storm and how to split a broadcast domain. Virtual local networks (VLANs), VLAN tags, VLAN trunks and multilayer switches are also explained.
Watch this with a 10-15 minute audiotrack at http://vimeo.com/novusprogram/powerpoint3
This lesson builds upon the concepts that were learned in the previous PowerPoint lesson. The topics covered include options for printing and saving your presentation, and an overview of animation techniques. The objective of the lesson is for the user to be comfortable with saving their PowerPoint presentation in various formats, printing handouts of their presentation, and using animation and timing techniques tot enhance their presentations. The lesson teaches concepts through a combination of image-based slides and video tutorials.
The Novus project is a combination of video tutorials designed to be used in conjunction with a free business simulation software program. The Novus Business and IT Program contains 36 business and IT training videos, covering basic finance, accounting, marketing, economics, business strategy, Word, Excel, and PowerPoint. Users will have an opportunity to apply the lessons in the Novus Business Simulator. Over six rounds, the user or teams will have to make decisions on capital purchases, financing, production, financing, and human resources for a microbrewery. This channel has arranged the 36 video lessons into the order in which they are meant to be used with the simulator. To watch this slideshow as a video, please go to our Vimeo page at: https://vimeo.com/novusprogram. To download our free business simulation software, please go to our SourceForge page at: http://sourceforge.net/projects/novus/.
In today's high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of data and information. Most Organizations like banks, airlines, markets, manufactures and universities widely used computer systems to manage, manipulate and process their information. Many of today's most widely used computer systems are database applications, for example, Amazon, which was built on top of MySQL. Database application is involved like everywhere in our world, it touches all aspects of our lives.
A database application is a computer program whose primary purpose is entering and retrieving information from a computerized database. Early examples of database applications were accounting systems and airline reservations systems.
The aim of this course is to explore fundamentals of database application related to MySQL, phpMyAdmin, MySQL command lines, apache server and PHP Maker. It details the relational database principles. It shows how to build and develop database application with web interface.
Upon completion of this course, computer students will have gained knowledge of database application concepts and the ability to:
Must know the basic concepts related relational database application.
Must know how to manage relational database via using MySQL command line and phpMyAdmin.
Must know how to build database application with web interface by using MySQL and PHPMaker.
A combination of lectures and practical sessions will be used in this course in order to achieve the aim of the course.
By MSc. Karwan Mustafa Kareem
The Presentation given at Guru Gobind Singh Polytechnic, Nashik for Third Year Information Technology and Computer Engineering Students on 08/02/2011.
Topic: Java Network Programming
The presentation given at MSBTE sponsored content updating program on 'Advanced Java Programming' for Diploma Engineering teachers of Maharashtra. Venue: Guru Gobind Singh Polytechnic, Nashik
Date: 22/12/2010
Session: Java Network Programming
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...VijiPriya Jeyamani
Interaction:
Introduction
Models of interaction
Ergonomics
Interaction styles
The context of the interactions
Paradigms:
Introduction
Paradigms for interaction.
2.2 Interaction Design:
Introduction
What is design?
User focus
Scenarios
Navigation design
Screen design and layout
Interaction and prototyping
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...VijiPriya Jeyamani
HCI in the Software Process:
Introduction
The software lifecycle
Usability engineering
Interactive design and prototyping
Design rationale
3.2 Design Rules
Introduction
Principles to support usability
Standards
Guidelines
Golden rules and heuristics
HCI patterns
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...VijiPriya Jeyamani
Implementation Support:
Introduction
Elements of windowing systems
Programming the application
User interface management systems
4.2 Evaluation Techniques
What is evaluation?
Goals of evaluation
Choosing an evaluation method
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....VijiPriya Jeyamani
Universal Design:
Introduction
Universal design principles
Multi-modal interaction
Designing for diversity
User Support:
Introduction
Requirements of user support
Approaches to user support
Adaptive help systems
Designing user support systems
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriyaVijiPriya Jeyamani
Chapter 1 Introduction to AI
Chapter 2 Introduction to Expert Systems
Chapter 3 Knowledge Representation
Chapter 4 Inference Methods and Reasoning
Chapter 5 Expert System Design and Pattern Matching
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriyaVijiPriya Jeyamani
Chapter 5 in Integrative Programming Technology
Integrative Coding: Design Patterns; Interfaces; Inheritance
Miscellaneous Issues: Adopt and Adapt vs. make; Versioning and version control
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
1. Web Services and Middleware; Network programming;
Low level data communications
Message and queuing services;
08/12/2015 1Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
Integrative Programming andTechnology
2. application integration technology
Allows applications to be integrated more rapidly, easily and less
expensively
program-to- program interactions whereas web for program-to-user
interactions
allow companies to reduce the cost of doing e-business, to deploy
solutions faster and to open up new opportunities
Web services model built on emerging standards such as
HTTP
XML
Simple Object Access Protocol (SOAP)
Web Services Description Language (WSDL)
Universal Description, Discovery and Integration (UDDI)
08/12/2015 2Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
3. developed in order to distribute an object and serve it to various users
in the web environments
used in the server situations while solving the web-scalability problem
of the other distributed object technologies
WSDL, and SOAP exploit XML.
WSDL is an XML describing the web service.
SOAP is an XML describing the called method, its parameters, and its
return value, can be delivered over the HTTP
08/12/2015 3Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
5. 1. A client that wants to be serviced should first find the supported services
from the pre-existing registry before compiling a code.
2. After finding its services through searching, the client gains the Web
Service Description Language (WSDL) that a server previously registers.
From theWSDL, the client knows the service provider location and the
parameters to the found method.
3. After the client binds the described service during the compile time, it
calls the local agent whenever the client invokes a method call, and
the local agent delivers it to the server side agent through Simple Object
Access Protocol (SOAP) over HTTP, FTP, SMTP, andTCP during the
runtime.
4. The server side agent activates the appropriate object, and delivers
the calls to the object.
08/12/2015 5Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
6. Network:
A network is a collection of computers and other devices that can send data to and receive data
from each other.
A network is often connected by wires.
However, wireless networks transmit data through infrared light and microwaves.
Node:
Each machine on a network is called a node.
Most nodes are computers, but printers, routers, bridges, gateways etc.. can also be nodes.
Nodes that are fully functional computers are also called hosts.
Packet:
All modern computer networks are packet-switched networks: data traveling on the network is
broken into chunks called packets and each packet is handled separately.
Each packet contains information about who sent it and where it's going.
Protocol: A protocol is a precise set of rules defining how computers communicate: the format of
addresses, how data is split into packets
08/12/2015 6Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
7. IP:
IP was designed to allow multiple routes between any two points and
to route packets of data around damaged routers.
TCP:
Since there are multiple routes between two points, and the packets
that make up a particular data stream.
Furthermore, they may not arrive in the order they were sent, if they
even arrive at all.
UDP:
UDP is an unreliable protocol that does not guarantee that packets will
arrive at their destination or that they will arrive in the same order
they were sent.
Ports:
Each computer with an IP address has several thousand logical ports.
Each port is identified by a number between 1 and 65,535. Each port can
be allocated to a particular service.
Port numbers 1 through 255 are reserved by IP for well-known services
If you connect to port 80 of a host, for instance, you may expect to find
an HTTP server.
08/12/2015 7Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
8. Internet:
largest IP-based network for connecting machines together.
Java: easy-to-use, cross-platform model for network communications.
What is a Socket?
Sockets are a means of using IP to communicate between machines, so sockets
allow Java to interoperate with legacy systems by simply talking to existing
servers using their pre-defined protocol.
Internet protocol: User Datagram Protocol (UDP) andTransmissionControl
Protocol (TCP).
Internet Addresses or IP Addresses
Every network node has an address, a series of bytes that uniquely identify it.
Internet addresses are manipulated in Java by the use of the InetAddress class.
InetAddress takes care of the Domain Name System (DNS) look-up and reverse
look-up;
IP addresses can be specified by either the host name or the raw IP address.
InetAddress provides methods to getByName(), getAllByName(),
getLocalHost(), getAddress(), etc.
IP addresses are a 32-bit number, often represented as a "quad" of four 8-bit
numbers separated by periods.
They are organized into classes (A, B, C, D, and E). For example 126.255.255.255
Client/Server Computing- Java language communicate with remote file system
08/12/2015 8Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
9. How UDPclients and UDPservers communicate over sockets
Creating UDP Servers:
To create a server with UDP, do the following:
1. Create a DatagramSocket attached to a port.
int port = 1234;
DatagramSocket socket = new DatagramSocket(port);
2. Allocate space to hold the incoming packet, and create an instance of DatagramPacket to hold the
incoming data.
byte[] buffer = new byte[1024];
DatagramPacket packet = new DatagramPacket(buffer, buffer.length);
3. Block until a packet is received, then extract the information you need from the packet.
// Block on receive()
socket.receive(packet);
// Extract the packet data
byte[] data = packet.getData();
// Find out where packet came from
// so we can reply to the same host/port
InetAddress remoteHost = packet.getAddress();
int remotePort = packet.getPort();
08/12/2015 9Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
10. Creating UDP Clients
1. First allocate space to hold the data we are sending and create an instance
of DatagramPacket to hold the data.
byte[] buffer = new byte[1024];
int port = 1234;
InetAddress host = InetAddress.getByName("magelang.com");
DatagramPacket packet = new DatagramPacket(buffer,
buffer.length, host, port);
2. Create a DatagramSocket and send the packet using this socket.
DatagramSocket socket = new DatagramSocket();//free local port to
use
socket.send(packet);
// Find out where we are sending from
InetAddress localHostname = socket.getLocalAddress();
int localPort = socket.getLocalPort();
08/12/2015 10Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
11. HowTCPclients andTCPservers communicate over sockets
CreatingTCP Servers:
To create aTCP server, do the following:
1. Create a ServerSocket attached to a port number.
ServerSocket server = new ServerSocket(port);
2.Wait for connections from clients requesting connections to that port.
// Block on accept()
Socket channel = server.accept();
You'll get a Socket object as a result of the connection.
3. Get input and output streams associated with the socket.
out = new PrintWriter (channel.getOutputStream());
out.println("Hey! I heard you over this socket!");
reader = new InputStreamReader (channel.getInputStream());
in = new BufferedReader (reader);
Now you can read and write to the socket, thus, communicating with the client.
String data = in.readLine();
08/12/2015 11Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
12. CreatingTCP Clients:
To create aTCP client, do the following:
1. Create a Socket object attached to a remote host, port.
Socket client = new Socket(host, port);
When the constructor returns, you have a connection.
2. Get input and output streams associated with the socket.
out = new PrintWriter (client.getOutputStream());
out.println("Watson!" + "Come here...I need you!");
reader = new InputStreamReader (client.getInputStream());
in = new BufferedReader (reader);
Now you can read and write to the socket, thus, communicating with the
server.
String data = in.readLine();
08/12/2015 12Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
13. TCP/IP(Transmission Control Protocol/Internet Protocol)
The Protocol upon which the whole Internet is based
Each node must be configured forTCP/IP to function properly.
A software-based protocol
TCP/IP is basically the binding together of Internet Protocols used to
connect hosts on the internet- Main ones are IP andTCP
TCP and IP have special packet structure
IP (Internet Protocol) is responsible for delivering packets of data
between systems on the internet and specifies their format. Packets
forwarded based on a four byte destination IP address (IP number)
IP DOES NOT MAKE GUARANTEES! It is very simple - essentially: send
and forget.
TCP (TransmissionControl Protocol) is responsible for verifying the
correct delivery of data/packets from client to server. Data can be lost
.SoTCP also adds support to detect errors and retransmit data until
completely received
08/12/2015 13Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
15. Version — Indicates the version of IP currently used.
IP Header Length (IHL) — Indicates the datagram header length in 32-bit words.
Type-of-Service — Specifies how an upper-layer protocol would like a current datagram to
be handled, and assigns datagram various levels of importance.
Total Length — Specifies the length, in bytes, of the entire IP packet, including the data
and header.
Identification — Contains an integer that identifies the current datagram. This field is used
to help piece together datagram fragments.
Flags — Consists of a 3-bit field of which the two low-order (least-significant) bits control
fragmentation. The low-order bit specifies whether the packet can be fragmented. The
middle bit specifies whether the packet is the last fragment in a series of fragmented
packets.The third or high-order bit is not used.
Fragment Offset — Indicates the position of the fragment’s data relative to the beginning
of the data in the original datagram, which allows the destination IP process to properly
reconstruct the original datagram.
Time-to-Live — Maintains a counter that gradually decrements down to zero, at which
point the datagram is discarded.
Protocol — Indicates which upper-layer protocol receives incoming packets after IP
processing is complete.
Header Checksum — Helps ensure IP header integrity.
Source Address — Specifies the sending node.
Destination Address — Specifies the receiving node.
Options — Allows IP to support various options, such as security.
Data — Contains upper-layer sent in packet.
08/12/2015 15Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia
17. There are 12 fields inTCP Packet:
Source Port and Destination Port — Identifies points at which upper-
layer source and destination processes receiveTCP services.
Sequence Number In the connection-establishment phase, this field also
can be used to identify an initial sequence number to be used in an
upcoming transmission.
Acknowledgment Number — Contains the sequence number of the next
byte of data the sender of the packet expects to receive.
Data Offset — Indicates the number of 32-bit words in theTCP header.
Reserved — Remains reserved for future use.
Flags — Carries a variety of control information, including the SYN and
ACK bits used for connection establishment, and the FIN bit used for
connection termination.
Window — Specifies the size of the sender’s receive window (that is, the
buffer space available for incoming data).
Checksum — Indicates whether the header was damaged in transit.
Urgent Pointer — Points to the first urgent data byte in the packet.
Options — Specifies variousTCP options.
Data — Contains upper-layer sent in packet.
08/12/2015 17Dr. J.VijiPriya,Assistant Professor, Hawassa University, Ethiopia