Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

In this project, you will develop two applications: a connection oriented (TCP) IM (Instant message) server and a client. The implementation logic is similar to the first two programs but with some difference: 1) Use TCP as transport layer protocol. 2) Since this project will use TCP rather than UDP, there is no need for an application level message number (means no need the random 5digits number from the two projects), so that has been dropped from the message format. That means that everything following the first semi-colon should be encrypted. 3) Client servers as a client as well as a server.

Server:

Your server will need to respond to sign-on messages (message type 1) from clients. Your server should be able to support up to 5 clients at one time. It must also be able to send updates to those clients as other members join and leave the system.
It must be running in a Linux machine.

Client:

You will register with your server, but once you have signed on, you will get the names and addresses (IP and port) of all active users. Then all message passing will be directly between clients (P2P applications). When you are done, you send a sign-off message to the server and then close all of your open connections.

As with the first project, all of the information following the message type and semi-colon should be encrypted. By default, you should use the same cipher_sp14.h header used in project 1, however, there are some differences. Since this project will use TCP rather than UDP, there is no need for an application level message number, so that has been dropped from the message format. That means that everything following the first semi-colon should be encrypted.

It can be running either in a Windows or Linux machine.

Attachment:- Assignment.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91766001
  • Price:- $250

Guranteed 48 Hours Delivery, In Price:- $250

Have any Question?


Related Questions in Computer Network & Security

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

Question what is active threat in terms of network security

Question: What is active threat in terms of network security? Provide an example. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format. Note: minimum 300 wor ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As