Lab8_8
.docx
keyboard_arrow_up
School
Rensselaer Polytechnic Institute *
*We aren’t endorsed by this school
Course
344
Subject
Computer Science
Date
May 14, 2024
Type
docx
Pages
5
Uploaded by KidMetal781 on coursehero.com
Lab - Use a Calculator for Binary Conversions Objectives
Switch among Windows Calculator modes.
Use Windows Calculator to convert between decimal and binary.
Use Windows Calculator to determine the number of hosts in a network with powers of 2.
Background / Scenario
When working with networking devices, a network technician should understand binary and decimal numbers. In this lab, you will use the Windows Calculator application to convert between these numbering systems. You
will also use the “powers” function to determine the number of hosts that can be addressed based on the number of bits available.
Required Resources
PC (Windows 10)
Instructions
Part 1: Using Windows Calculator
Step 1: Access Windows Calculator and determine mode of operation.
a.
Open the Windows Calculator application. Click Start
, type Calculator
. Select Calculator in the results.
Question:
What mode is the Calculator in?
The mode which Windows calculator application mode is set to is Standard.
Type your answers here.
b.
Click the
Open Navigation
icon (
≡
) located in the upper left-hand corner. The Windows calculator supports different mode of calculations.
Question:
List the five modes for the calculator. If yours has more list all modes.
My windows calculator has several of supported modes by default those are: “Standard”, “Scientific”, “Graphing”, “Programmer”, and “Date calculation”.
Type your answers here.
Step 2: Switch between modes.
a.
To switch between calculator modes, click the Open Navigation
icon (
≡
) and select desired mode.
b.
Practice switching between calculator modes to see which options they provide.
Question:
Briefly explain the function of each mode.
Standard Mode: This mode provides regular basic computing of integer values.
Scientific Mode: This mode provides advanced computing of integer values and variable values.
Graphing Mode: This mode provides advanced computing of integer values and variable values on a visual plane of an X and Y axis.
2016 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Page 1
of 5
www.netacad.com
Lab - Use a Calculator for Binary Conversions
Programmer Mode: This mode provides complex computing and translation of values that are represented by other values such as HEX, DEC, OCT, BIN values.
Date Calculation Mode: This mode provides a calculation between two different dates giving a result if how many Years, Month, Week, Days are between those two dates.
Type your answers here.
Part 2: Binary System
Step 1: Convert between number systems.
a.
Select the Programmer mode calculator.
b.
The Programmer calculator supports four numbering systems — HEX (Hexadecimal), DEC
(Decimal), OCT (Octal), and BIN (Binary).
Questions:
Which number system is currently active?
The number system, which is currently active is Decimal mode.
Type your answers here.
Which numbers on the number pad are active in Decimal mode?
The numbers which are active in Decimal mode are 0:10 (0-10).
Type your answers here.
c.
Click BIN
.
Which numbers on the number pad are now active?
In Binary mode there are two values that are active which are 1’s and 0’s.
Type your answers here.
Why do you think the other numbers are grayed out?
Binary only computes 1’s and 0’s which mean that any other number cannot be interpreted by calculator in binary value.
d.
Click HEX
Question:
Which numbers on the number pad are now active?
Numbers 1:10 are active in the number with the addition of alphabetical values A:F.
Type your answers here.
What items have been added and why?
These items have been added due to the complexity of Hexadecimal as they have exact values in a ASCII Chart.
Type your answers here.
e.
Click DEC
. Using your mouse, click on the number 3 followed by the number 5 on
the number pad. The decimal number 35 has now been entered.
f.
Now click BIN
.
Question:
What happened to the number 15 listed in the textbox at the top of the window?
The original number of 35, which was inputted into the results table now has been translated to a value of 0010 0011, which in Binary represents the value of 35 in Decimal value.
Type your answers here.
g.
Enter the number 222 and select BIN.
2016 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Page 2
of 5
www.netacad.com
Lab - Use a Calculator for Binary Conversions
Question:
What is the binary equivalent of 222?
The binary equivalent of 222, is “1101 1110”.
Type your answers here.
h.
Clear the binary value representing 222 in the window. From Binary mode, type in the following
binary number: 11011101
. Select the DEC
.
Question:
What is the decimal equivalent to the binary number of 11011101?
The decimal equivalent of binary 11011101 is the value “221”.
Type your answers here.
Step 2: Practice the conversion between binary and decimal numbering system.
Questions:
Convert the following decimal numbers to binary.
Decimal
Binary
186
1011 1010
75
0100 1011
224
1110 0000
119
0111 0111
Convert the following binary numbers to decimal.
Binary
Decimal
1100 1011
203
0110 1010
107
0111 1000
120
1101 0011
211
Part 3: Network Addresses
Step 1: Convert host IP addresses.
a.
Computer hosts usually have two addresses, an Internet Protocol (IP) address and an Ethernet Media Access Control (MAC) address. For the benefit of humans, the IP address is normally represented as a dotted decimal notation, such as 192.168.10.2. Each of the decimal octets in the address or a mask can be converted to 8 binary bits. Remember that the computer only understands binary bits.
Question:
If all 4 octets were converted to binary, how many bits would there be?
32 bits due to have 8 bits in each octet, which is 4x8.
Type your answers here.
b.
IP addresses are normally shown with four decimal numbers ranging from 0 to 255 and separated by
a period.
Question:
Convert the 4 parts of the IP address 192.168.10.25 to binary.
2016 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Page 3
of 5
www.netacad.com
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
In MySQLi procedural the function _____ is used to return the connection error.
connect_error()
mysqli_connect_error()
mysql_connect_error()
mysqli_error()
arrow_forward
Linux Command
Function
ifconfig also: ifcfg, ifup, ifdown, ethtool, nm-tool
/etc/init.d/networking restart ip link set down ip link set up
The ifconfig command is a tool used to display and configure network interfaces. This command will display information about the network card, IP address, broadcast address, and network mask. It also shows how many packets were received and transmitted. There is also information about the loopback device (lo).
ping
The ping command allows the user to test whether or not a network connection is active, the speed of that connection, and how a network behaves given specific data loads.
arpalso: arping
The arp command by itself is used to view the information currently in the ARP table (Address Resolution Protocol). This table maps the IP address of machines on your network segment with their MAC address.
hostnamealso: domainname, dnsdomainname
The hostname command tells you what the hostname of your machine is set to. The…
arrow_forward
Computer Science
Java
You are to create a direct messenger program. In particular, the program will perform as follows:
It must behave as either a client or a server, depending on the command line arguments supplied when started.
Specifically, the -l option will direct the program to listen for connections, thereby acting as a server. If the -l option is not present on the command line, your program will connect to a server, thereby acting as a client.
The port number must also be supplied as a command line argument.
Although your messenger may be hard-coded to connect only to localhost when acting as a client, you may include a server address on the command line as well, thereby permitting your messenger to connect between hosts.
The -l option, if used, should be placed immediately after the name of the program and before the port number and server address arguments.
Once the client and server messengers are connected, either end can send text messages to the other end.
Messages must…
arrow_forward
A bank client wants to withdraw cash that was sent to them through the cash send service. To withdraw cash from an automated teller machine (ATM), the client needs to do this by firstly selecting the cardless services function from the ATM’s screen. The client will then select withdraw money. The ATM will ask the client to enter the 4-digit PIN that was received via an SMS. If the PIN is not correct, the client will be notified and as them to re-enter the correct PIN.If the PIN is correct, the ATM will then ask the client to enter the amount they wish to withdraw. After entering the amount, the system will check if the amount requested is more less or equal to the balance. If the amount requested is greater than the balance, the ATM will inform the client and ask them to re-enter the correct amount. If the amount entered is less than or equal to the balance, the ATM will release the money and the system will update the balance. The client would be asked if they want the slip to be…
arrow_forward
TCP Window Flow Control, consider the following:
• The MSS Maximum Segment size is 1024 bytes (I kilobyte)
• Window size (rwnd) = 4096 bytes
• The sendbase is 0000, the segment size is 1024 bytes
How many segments can you send (before acknowledgment) then you have to stop, you stop until some ack comes back?
What is the sequence number of the third segment?
arrow_forward
suppose you are working with two disparate systems, and one system depends on data from the other but the data formatting is different, so you need to specify a software application that pulls data from one system, changes the format to suit the second system and sends that data. This type of application is most commonly called:
The Central Number Cruncher (CNC)
Extract, Transform, Load middleware (ETL)
A Transmission Control Protocol (TCP)
A Data Transformer Engine (DTE)
arrow_forward
Computer Networking Assignment 2
Lab 2: Web Server Lab
In this lab, you will learn the basics of socket programming for TCP connections in Python: how to create a socket, bind it to a specific address and port, and send and receive a HTTP packet. You will also learn some basics of HTTP header format.
You will develop a web server that handles one HTTP request at a time. Your web server should accept and parse the HTTP request, get the requested file from the server’s file system, create an HTTP response message consisting of the requested file preceded by header lines, and send the response directly to the client. If the requested file is not present in the server, the server should send an HTTP “404 Not Found” message back to the client.
Code
Below you will find the skeleton code for the Web server. You are to complete the skeleton code. The places where you need to fill in code are marked with #Fill in start and #Fill in end. Each place may require one or more lines of code.…
arrow_forward
Write a Python program that assists you in managing a network of devices for your company. You need to keep track of the IP addresses, MAC addresses, and device types in your network.
List: Create a list named device_ip containing IP addresses as strings. Your network consists of one router and at least one of each of the following devices: switch, server, workstation, printer, and mobile device. Each device should have a unique IP address. The router's IP address should be '192.168.1.1'.
Print each IP address on a new line.
Tuple: Since MAC addresses of devices are unique and not changing, you decide to store them in a tuple named device_mac. Create this tuple with MAC addresses corresponding to each IP address. A MAC address looks like '00:14:22:01:23:45'.
Print each MAC address on a new line.
Set: You also want to keep track of the different types of devices in your network. As the device types are distinct and do not have duplicates, create a set named device_type that contains…
arrow_forward
Q10/ write True or False answer for the following statements.
Correct the false statements
1. DHCP allow host to statically obtain its IP address from network
server when it joins network.
2. IPV6 addresses are 32 bits, while IPV4 addresses are 128 bits.
3. IPsec is standard for IP network security, available for both IPV4 and
IPV6.
4. IPSec helps to create authenticated and confidential packets for the
transport layer
5. ICMP does not attempt to make IP a reliable protocol. it simply
attempts to report errors and provide feedback on specific condition.
arrow_forward
TO DO: Code connection servers for all phones
code:
"""
HYPHEN = "-"QUIT = 'quit'SWITCH_CONNECT = 'switch-connect'SWITCH_ADD = 'switch-add'PHONE_ADD = 'phone-add'NETWORK_SAVE = 'network-save'NETWORK_LOAD = 'network-load'START_CALL = 'start-call'END_CALL = 'end-call'DISPLAY = 'display'
def connect_switchboards(switchboards, area_1, area_2):pass
def add_switchboard(switchboards, area_code):pass
def add_phone(switchboards, area_code, phone_number):pass
def save_network(switchboards, file_name):pass
def load_network(file_name):""":param file_name: the name of the file to load.:return: you must return the new switchboard network. If you don't, then it won't load properly."""pass
def start_call(switchboards, start_area, start_number, end_area, end_number):pass
def end_call(switchboards, start_area, start_number):pass
def display(switchboards):pass
FUNCTIONS:
switch-add [area-code-1]
This will create a new switchboard with the area code specified. The braces are just to indicate that it…
arrow_forward
UDP Echo ApplicationA UDP Echo program is a simple network application that demonstrates the basicprinciples of UDP communication. In this program, a server listens for incoming UDPpackets from clients, and when it receives a packet, it echoes (sends back) the samepacket to the client. The client sends a message to the server, and the server returns thesame message. It's often used for testing network connectivity and understanding thefundamentals of UDP communication.
(Answer the following question using python)
Implement both the server and client components of this UDP Echo program whileadhering to the features outlined below. Please ensure that your implementation followsgood coding practices and provides clear prompts and feedback to the user, making ituser-friendly and robust. Please refer to the class example to guide your implementation.
1) UDP Echo Server
Receiving and Displaying Messages: The UDP Echo server should be able toreceive messages sent by clients. For each…
arrow_forward
5. A terminal is connected to a BOB with connections as shown below. The terminal
is configured with the following settings.
Router Properties
?X ASCII Setup
Connect To Settings
ASCII Sending
I Send line ends with line feeds
V Echo typed characters locally
Line delay: 5
Function, arow, and ctri keys act as
* Teminal keys
C Windows keys
milliseconds.
Backspace key sends
O Cri+H C Del C Ctrl+H, Space, Ctrl+H
Character delay: 2
milliseconds.
Emulation:
ASCII Receiving
VT100
Teminal Setup.
Colors.
I Append line feeds to incoming line ends
I Force incoming data to 7-bit ASCII
V Wrap lines that exceed teminal width
Telnet teminal ID:
VT100
Backscroll buffer lines: 500
E Play sound when connecting or disconnecting
I Exit program upon disconnecting
OK
Cancel
ASCII Setup.
OK
Cancel
Describe exactly what you see when you type
keys on the keyboard of the terminal.
[1]
TD
RD
BOB
arrow_forward
Creation of a chat application using networking and threads. Activity Outcomes: This lab teaches you the following topics: Combining two concepts, Threads and Networking, in one java application Lab Activities: Based on the previous lab on networking, write a program corresponding to a chat application where a server and a client will communicate through a TCP connection. Note that in a chatting application, every side of the connection can send messages at any time and the other side will receive and display it. To do this, we need two thread classes, one for writing in the socket and the other for reading from it. These two threads will be executed together by both the client and the server. Thus, you have to develop the following classes: - Two thread classes. The first one, called SenderThread, will be used to send messages to the other side through a socket infinitely (use an infinite loop). The second one, called ReceiverThread, will read any message coming from the other side…
arrow_forward
Server
Host A
SYN
Seq 0
SYN JACK
Seq=0, ACK=1
ACK
Seq, ACK
Seq=? ACK=?
170 bytes
Get Req
Seq and ACK values are:
a. Seq=1, ACK=0
b. None is true.
c. Seq=0, ACK=1
d. Seq=0, ACK=0
e. Беq-1, ACK-1
С.
arrow_forward
The write UDPsocket programming code is rdt2 in python where:
#Client:
1)function get data from user
2)function add port number
3)function calculate checksum
4)function add IP
5)function send/retransmit
#Server:
1)function receve paket
2)function check IP (error)
3)function re calculate checksum (send OK if correct checksum else send NACK)
4)function output data in screen
arrow_forward
MC9: In wireless LAN communication, MACA is widely used. In this protocol, in
order to avoid collision, a sender can send
sender is granted the privilege to send a frame to the receiver only after it receives
request signal to a receiver. The
replied from the receiver.
RTS, RTS
CTS, CTS
RTS, CTS
CTS, RTS
arrow_forward
Python language
1 - What modification(s) can you do to the code #1 and code #2 to make the server and client use the TCP Protocol?2 - Modify the server code to send an error to the client if the file requested does not exist.3 - Modify the server code to send an error to the client if the line requested does not exist.4 - Modify the client code to request the first line if the client didn't write a line number in their request. Example req = 'book2.txt'
arrow_forward
True or False
Congestion window (CWND):
In TCP, the congestion window is used to determine the number of bytes, which can be remaining at any time. It is maintained by the sender.
arrow_forward
Pseudocode Port Scanner
INPUT : IPv4 address with its port range
TASK/function : Try the Internet Protocol address with its a port range
The software will attempt to find open ports on the particular pc within having a connection to every one of them as well as having any successful connection ports, trace a port as open.
OUTPUT : status of port (open/closed)
arrow_forward
TCP connection-Server and Client connection using C. Please adjust the given code as needed. Do not change to another language. Please provide screenshots of it's execution.
1.- client read a line of characters(data) from its keyboard and sends the data to the server.
2- the server receives the data and converts characters to uppercase.
3- the server sends the modified data to the client.
4- the client receives the modified data and displays the line on its screen.
//Server.c
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <arpa/inet.h>
#include <sys/socket.h>
// Add header files if needed
void error_handling(char *message);
int main(int argc, char *argv[])
{
int serv_sock;
int clnt_sock;
struct sockaddr_in serv_addr;
struct sockaddr_in clnt_addr;
socklen_t clnt_addr_size;
// Declarer variables
char message[]="Hello Socket Programming!";
if(argc!=2){
printf("Usage : %s <port>\n", argv[0]);…
arrow_forward
Below you can see access-list number 1 has 3 statements, number 10, 20 and 30. Whenever a packet hits the access-list so what will happen?
arrow_forward
* Question Completion Status:
A Moving to the next question prevents changes to this answer.
Question 6
Let the maximum TCP segment size be 3 KB. Assume also that the sender uses TCP Vegas for congestion control. The following parameters were recorded at the time of transmission # k:
congestion window - 9 KB; round-trip time = 0.04 sec minimum (congestion-free) round-trip time - 0.01 sec a= 200 KB/sec; and B- 500 KB/sec.
What will be the value of the new congestion window (in KB) at the time of transmission # k + 1? Write the value with no units.
A Moving to the next question prevents changes to this answer.
1080 •
acer
arrow_forward
IPV4 is a Connection oriented
Protocol. *
False
True
Broadcast is the process of
sending a packet from one host
to a selected group of hosts. *
False
True
The prefix length is the number
of bits in the address that gives
the Host portion. "
False
True
The metric is used to decide
which route appears on the
routing table. *
True
False
The throughput value is greater
than The Bandwidth Value. *
True
False
O O
O O
arrow_forward
NEED PROGRAM IN C++
Write a program that will allow you to execute the TCP/IP Ping Command.
This assignment can be performed on your desktop/laptop/etc.
You should be able to determine your local system IP Address and document your local IP Address.
You should be able to determine your local system’s Default Gateway and document your Default Gateway.
You should be able to determine on your local system Subnet Mask and document your system Subnet Mask.
Your program will execute the TCP/IP Ping Command against yahoo.com or amazon.com.
The TCP/IP Ping Command will need to be continued for at least 25 consecutive pings. You will have to determine how to stop pinging yahoo.com or amazon.com after 25 successive pings in your code.
Students are expected to upload a singlePDF file with the following outcome from Assignment 2:
Screen Captures:
Of local desktop/laptop/etc. IP Address
Of local IP Address Subnet Mask
Of local default Gateway IP Address
Coding:
Screen capture of your…
arrow_forward
Create a Client/Server using DatagramSocket and
DatagramPacket Programming and using DESede
(168) as encryption algorithm.
A client and a server. The server receives the
encrypted datagram packet over a datagram socket.
The client should ask the user to enter the 16-digit
credit card number, and then send the encrypted
credit number to the server. The datagram packet
received by the server should be decrypted and
display the unencrypted credit card number to the
server screen. When the server receives a datagram,
it replies by sending a datagram packet that contains
a one-line "thanks for sending" back to the client.
Note: The key should be generated, use the
appropriate class to generate the key. Use the IPV4
loopback address
arrow_forward
Computer Science
In Python, I am trying to make a client and server code that passes the payload with the requirements.
The client has to specify the length of the data packet, up to max, specify how many times to pass the data packet, and specify the server IPv4 address.
Both the client and the server need timer functions and compute the time needed to perform the number of sends
both the Client and the server need to display the local and remote IPv4 addresses, total time, and bytes per second.
Please help,
Thanks.
arrow_forward
MCQ:
In an ACK probe packet response, if the TTL value is 46, What can you infer from this?
a.
The port is open
b.
WINDOW value needs to be checked
c.
The port is closed
d.
The port will be open after 46 seconds
arrow_forward
1 IntroductionThe objective of this project is to learn TCP client-server interaction using a socket interface in C programming language. After completing this Project, you will have a basic understanding of the steps required todevelop a networking application.
2 Project SpecificationIn this project, you are required to do socket programming in C language (Linux environment) to implementa pair of client and server that can achieve simple password verification to indicate the current market valueof the stock. Your client will send a pair of username and password to your server and your server willverify whether the pair of username and password is legitimate or not for retrieving the stock value. Assumethe only legitimate pairs of usernames and passwords that will be accepted by your server are as follows.
Username Password StockValuelcid welpa23e 13.93mrvl ghqwo31a 41.23snap tyjli14d 10.21cl1 rjwqe83f 85.09bro gnmds28z 56.43cvs rhktl87c 91.34…
arrow_forward
In a TCP connection, the initial sequence number at the client site is 2171. The client opens the connection, sends three segments, the second of which carries 1000 bytes of data, and closes the connection. What is the value of the sequence number in each of the following segments sent by the client?
a. The SYN segment
b. The data segment
c. The FIN segment
arrow_forward
In the packet tracer program, what settings are needed to provide the following network topology
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- In MySQLi procedural the function _____ is used to return the connection error. connect_error() mysqli_connect_error() mysql_connect_error() mysqli_error()arrow_forwardLinux Command Function ifconfig also: ifcfg, ifup, ifdown, ethtool, nm-tool /etc/init.d/networking restart ip link set down ip link set up The ifconfig command is a tool used to display and configure network interfaces. This command will display information about the network card, IP address, broadcast address, and network mask. It also shows how many packets were received and transmitted. There is also information about the loopback device (lo). ping The ping command allows the user to test whether or not a network connection is active, the speed of that connection, and how a network behaves given specific data loads. arpalso: arping The arp command by itself is used to view the information currently in the ARP table (Address Resolution Protocol). This table maps the IP address of machines on your network segment with their MAC address. hostnamealso: domainname, dnsdomainname The hostname command tells you what the hostname of your machine is set to. The…arrow_forwardComputer Science Java You are to create a direct messenger program. In particular, the program will perform as follows: It must behave as either a client or a server, depending on the command line arguments supplied when started. Specifically, the -l option will direct the program to listen for connections, thereby acting as a server. If the -l option is not present on the command line, your program will connect to a server, thereby acting as a client. The port number must also be supplied as a command line argument. Although your messenger may be hard-coded to connect only to localhost when acting as a client, you may include a server address on the command line as well, thereby permitting your messenger to connect between hosts. The -l option, if used, should be placed immediately after the name of the program and before the port number and server address arguments. Once the client and server messengers are connected, either end can send text messages to the other end. Messages must…arrow_forward
- A bank client wants to withdraw cash that was sent to them through the cash send service. To withdraw cash from an automated teller machine (ATM), the client needs to do this by firstly selecting the cardless services function from the ATM’s screen. The client will then select withdraw money. The ATM will ask the client to enter the 4-digit PIN that was received via an SMS. If the PIN is not correct, the client will be notified and as them to re-enter the correct PIN.If the PIN is correct, the ATM will then ask the client to enter the amount they wish to withdraw. After entering the amount, the system will check if the amount requested is more less or equal to the balance. If the amount requested is greater than the balance, the ATM will inform the client and ask them to re-enter the correct amount. If the amount entered is less than or equal to the balance, the ATM will release the money and the system will update the balance. The client would be asked if they want the slip to be…arrow_forwardTCP Window Flow Control, consider the following: • The MSS Maximum Segment size is 1024 bytes (I kilobyte) • Window size (rwnd) = 4096 bytes • The sendbase is 0000, the segment size is 1024 bytes How many segments can you send (before acknowledgment) then you have to stop, you stop until some ack comes back? What is the sequence number of the third segment?arrow_forwardsuppose you are working with two disparate systems, and one system depends on data from the other but the data formatting is different, so you need to specify a software application that pulls data from one system, changes the format to suit the second system and sends that data. This type of application is most commonly called: The Central Number Cruncher (CNC) Extract, Transform, Load middleware (ETL) A Transmission Control Protocol (TCP) A Data Transformer Engine (DTE)arrow_forward
- Computer Networking Assignment 2 Lab 2: Web Server Lab In this lab, you will learn the basics of socket programming for TCP connections in Python: how to create a socket, bind it to a specific address and port, and send and receive a HTTP packet. You will also learn some basics of HTTP header format. You will develop a web server that handles one HTTP request at a time. Your web server should accept and parse the HTTP request, get the requested file from the server’s file system, create an HTTP response message consisting of the requested file preceded by header lines, and send the response directly to the client. If the requested file is not present in the server, the server should send an HTTP “404 Not Found” message back to the client. Code Below you will find the skeleton code for the Web server. You are to complete the skeleton code. The places where you need to fill in code are marked with #Fill in start and #Fill in end. Each place may require one or more lines of code.…arrow_forwardWrite a Python program that assists you in managing a network of devices for your company. You need to keep track of the IP addresses, MAC addresses, and device types in your network. List: Create a list named device_ip containing IP addresses as strings. Your network consists of one router and at least one of each of the following devices: switch, server, workstation, printer, and mobile device. Each device should have a unique IP address. The router's IP address should be '192.168.1.1'. Print each IP address on a new line. Tuple: Since MAC addresses of devices are unique and not changing, you decide to store them in a tuple named device_mac. Create this tuple with MAC addresses corresponding to each IP address. A MAC address looks like '00:14:22:01:23:45'. Print each MAC address on a new line. Set: You also want to keep track of the different types of devices in your network. As the device types are distinct and do not have duplicates, create a set named device_type that contains…arrow_forwardQ10/ write True or False answer for the following statements. Correct the false statements 1. DHCP allow host to statically obtain its IP address from network server when it joins network. 2. IPV6 addresses are 32 bits, while IPV4 addresses are 128 bits. 3. IPsec is standard for IP network security, available for both IPV4 and IPV6. 4. IPSec helps to create authenticated and confidential packets for the transport layer 5. ICMP does not attempt to make IP a reliable protocol. it simply attempts to report errors and provide feedback on specific condition.arrow_forward
- TO DO: Code connection servers for all phones code: """ HYPHEN = "-"QUIT = 'quit'SWITCH_CONNECT = 'switch-connect'SWITCH_ADD = 'switch-add'PHONE_ADD = 'phone-add'NETWORK_SAVE = 'network-save'NETWORK_LOAD = 'network-load'START_CALL = 'start-call'END_CALL = 'end-call'DISPLAY = 'display' def connect_switchboards(switchboards, area_1, area_2):pass def add_switchboard(switchboards, area_code):pass def add_phone(switchboards, area_code, phone_number):pass def save_network(switchboards, file_name):pass def load_network(file_name):""":param file_name: the name of the file to load.:return: you must return the new switchboard network. If you don't, then it won't load properly."""pass def start_call(switchboards, start_area, start_number, end_area, end_number):pass def end_call(switchboards, start_area, start_number):pass def display(switchboards):pass FUNCTIONS: switch-add [area-code-1] This will create a new switchboard with the area code specified. The braces are just to indicate that it…arrow_forwardUDP Echo ApplicationA UDP Echo program is a simple network application that demonstrates the basicprinciples of UDP communication. In this program, a server listens for incoming UDPpackets from clients, and when it receives a packet, it echoes (sends back) the samepacket to the client. The client sends a message to the server, and the server returns thesame message. It's often used for testing network connectivity and understanding thefundamentals of UDP communication. (Answer the following question using python) Implement both the server and client components of this UDP Echo program whileadhering to the features outlined below. Please ensure that your implementation followsgood coding practices and provides clear prompts and feedback to the user, making ituser-friendly and robust. Please refer to the class example to guide your implementation. 1) UDP Echo Server Receiving and Displaying Messages: The UDP Echo server should be able toreceive messages sent by clients. For each…arrow_forward5. A terminal is connected to a BOB with connections as shown below. The terminal is configured with the following settings. Router Properties ?X ASCII Setup Connect To Settings ASCII Sending I Send line ends with line feeds V Echo typed characters locally Line delay: 5 Function, arow, and ctri keys act as * Teminal keys C Windows keys milliseconds. Backspace key sends O Cri+H C Del C Ctrl+H, Space, Ctrl+H Character delay: 2 milliseconds. Emulation: ASCII Receiving VT100 Teminal Setup. Colors. I Append line feeds to incoming line ends I Force incoming data to 7-bit ASCII V Wrap lines that exceed teminal width Telnet teminal ID: VT100 Backscroll buffer lines: 500 E Play sound when connecting or disconnecting I Exit program upon disconnecting OK Cancel ASCII Setup. OK Cancel Describe exactly what you see when you type keys on the keyboard of the terminal. [1] TD RD BOBarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning