Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment

The purpose of this assignment is to discover how to author client-server applications that communicate over sockets (network connections). To make this interesting, we are going to replicate the venerable rsh command that was available on the original UNIX systems. rsh stands for remote shell. Namely, it is a client that is used to access the server hosted on a remote system. For simplicity's sake, we are going to run the client and the server on the same machine, but your code should work just as well on a remote machine.

There are clearly two parts to complete: the server and the client. Both server and client can be implemented with a total of less than 150 lines of code. In this assignment, you receive an empty folder and you must produce everything (Makefile and source code for the two programs: client.c and server.c). The executables are rsh and rshd. Make sure you adhere to the naming directives! Good luck!

Important: Remember that we are implementing applications that work in networked environments. It is almost certain that your implementations (or even the protocol you are asked to implement) will have vulnerabilities. They are not production ready and you should not deploy them on real systems!. There is a reason why rsh is no longer favored as a good solution for remote shell (these days we all use ssh). And we ask you to test your code, both client and server, on your local machine only. The focus of this exercise (and some other assignments in this course) is on understanding the mechanics of client-server communications over sockets. To understand the risks and security features that you would like to include in your programs, you will have to take other courses (e.g., computer security, cryptography, network security, etc.).

Exercise 1.Server

Your server should be accessible on localhost and port 8025. Your implementation uses the IPv4 stack and the TCP (byte stream) transport layer. The server listens for inbound request to talk and, upon reception of such a request, spawns a child process responsible for running the bash shell (this is your default shell and is available under /usr/bin/bash). A shell should be started as a login shell (option -l for bash). Note that a shell uses all three standard streams stdin, stdout, and stderr, and sockets are full-duplex and bi-directional.

Clearly, a spawned child process should take care of the necessary re-directions for bash to work properly.

Finally, the parent process (the rshd daemon) should collect the dead processes regularly to fully release resources back to the OS.

Your server executable should be named rshd. You can execute it from a shell from the command line and it will listen for inbound client requests. If implemented correctly, your daemon is inter-operable with the rsh client of any of your peers! You can run rshd and use the following command to test your server in a separate terminal.

Note that the remote shell daemon you are creating is not meant to provide any advanced capabilities like authentication or terminal emulation. It is only suitable for simple line oriented commands like those used in the pipeline in the previous homework. You are NOT asked to start the shell in the interactive mode (option -i). So you will not see the shell prompt.

Exercise 2. Client

Your client should be called rsh and take the name of the target host as the first argument on the command line. Clearly, for testing purposes, you would invoke the client with the argument localhost to contact the rshd server you are running on your UITS VM in another terminal.

The client is pretty straightforward. It sets up a socket to contact the server on port 8025, obtains commands from the standard input, forwards them to the remote shell, and displays on its standard output the messages coming back from the remote shell. For example, a working implementation should be able to submit simple commands such as ls, cd, pwd, cat, echo , ... to the remote shell and display the results on its local standard output.

The sole delicate point lies in how to choreograph the two activities: reading from the standard input and reading from the socket connected to the remote shell. Neither of the readings is blocking.

In case some of you are wondering, you CANNNOT simply turn your client into other programs (like nc).

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92768577

Have any Question?


Related Questions in Computer Engineering

Rocket class keyboard event handlingintroductionfor this

Rocket Class: Keyboard Event Handling Introduction For this program, you will implement an interface that will allow you to move around a rocket of your own design. You will need to implement your own classes for the roc ...

Question suppose that a simple fpga programmable switch

Question : Suppose that a simple FPGA programmable switch that has four destination points (N, S, E and W) and consists of 6 pass transistors with 6-SRAM cells to program each gate (T1, T2, T3, T4, T5, T6) is used. If th ...

Question a as we have seen the internet layer of tcpip has

Question : (a) As we have seen, the Internet layer of TCP/IP has two protocols - IPv4 and IPv6. The transport layer provides two main protocols TCP and UDP (along with some special-purpose, minor protocols). But these ar ...

On the below question how did they decided the two

On the below question, how did they decided the two probabilities of guessing the correct and wrong answer on a question? Where did the 0.25 and 0.75 come from? The probability of achieving exactly  k  successes in  n  t ...

Tetrafluoromethane cf4 is a greenhouse gas synthesized by a

Tetrafluoromethane (CF 4 ) is a greenhouse gas synthesized by a violently explosive reaction between methane and fluorine. In joules, what is the average kinetic energy of a molecule of CF 4  at 57.2°C and 0.0010 atm?

What are the uses and value of statistical significance

What are the uses and value of statistical significance testing and the p-value as demonstrated in the various analytical techniques (t-tests, ANOVA, chi-square, etc.). What's the fundamental reason we apply these techni ...

Question a add a navigation form to your applicationa

Question: A) Add a Navigation form to your application. A navigation form makes it easy for users to switch between the various forms and reports in your database. Navigation forms are a great addition to any desktop dat ...

What is a security policy and why is it so critical to the

What is a security policy and why is it so critical to the success of an organization's information security program? Select an Issue Specific Security Policy and describe why an organization should have this issue cover ...

A humane society claims that less thannbsp32 of us

A humane society claims that less than 32% of U.S. households own a dog. In a random sample of 410 U.S.? households, 153 say they own a dog. At alpha(α) = 0.03, is there enough evidence to support the? society's claim? C ...

Questionbased on the option chain below consider an

Question: Based on the option chain below : Consider an asymmetric butterfly constructed using the given put options with the low strike at 58, the peak at 60 and the high strike at 64, for one unit of the underlying ass ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As