Design and implement an upgraded version of the simple ftp

Assignment Help Computer Engineering
Reference no: EM131894346

PROGRAMMING PROJECT ASSIGNMENT

1. Development Setup

For this programming assignment you will work in the CS Linux Lab (linuxlab.cs.pdx.edu) located in FAB 88-09 and 88-10. If you don't already have an account.

For this Project you must use C/C++, UDP Sockets, POSIX Threads, Timers and Make. Refrain from any other languages or 3 rd party libraries. We will use the GNU C/C++ Compiler (gcc/g++) and Make already installed in the development machines in the lab.

2. Problem Description

For the second part of the class project we will design and implement an upgraded version of the simple File Transfer Protocol from Part 1. Our focus will be on improving the performance of the reliable channel and implementing flow control and congestion control mechanisms.

You will implement both the Client and the Server applications for our Simplified Remote Copy Protocol. As with Part 1, your pro client and server must use command line parameters to allow the user to specify the IP address, port, and file to transfer. It must also allow the user to specify the following control parameters: retransmission timeout and maximum window size.

3. Implementation Overview

For the second part of the project we will implement the Selective Repeat flow control protocol. We will modify our stop and go implementation from Part 1 to allow to send multiple packets and pipeline the acknowledgments to improve throughput. Selective Repeat is a sliding-window based protocol, that is, the protocol operates over a limited but configurable number of packets.

Selective Repeat can be used with a static window size or a dynamic window size. We will use a dynamic window size and scale the window size based on the AIMD (Additive Increase-Multiplicative Decrease) algorithm. The window will be controlled by the sender, the initial size of the sliding window will be 1 packet and we will increase the size of the window by 1 until a packet is lost. When a packet is lost we will cut the size of the sending window by half. The algorithm will never exceed the size of the window specified by the user through the command line.

You are allowed to use only one socket to receive packets and one socket to send packets. This is important as our protocol is a pipelined protocol and not a parallel version of Stop and Go. Therefore for this part of the project you might have to change the architecture of your implementation a bit from what you implemented in Part 1. More specifically you will probably need to use system timers and threads as opposed to just use the internal socket timeout.Finally as part of the project your program should print statistics about the performance of Selective

Repeat: the number of packets lost, total packets sent and the time elapsed to send the entire file.

These are a few key concepts you must address as part of your implementation:

1) You must implement a protocol that establishes handshake between the client and the server.

That is the client must send a packet to request a connection with the server, the server must reply with an ACK packet.

2) After the connection is established the user can request a file to be sent to the client. To do this your protocol must implement a file request packet. A file request packet must specify the exact path of the file that the client wants to retrieve. It is recommended that the server acknowledges the request and notifies of the file size to the client. Also if the file does not exist in the server the client must be notified and the connection terminated.

3) After the request is acknowledged, the server can start sending the data to the client, by sending up to w packets at a time, where w is the size of the window. More specifically your program must use Selective Repeat with Additive Increase Multiplicative Decrease window size

4) Your server must wait for a timer to expire in case the packet is lost. If no ACK has been received before the timer expires it means the packet was lost in transit and must be resent.

5) After the file transfer completes your server must notify the client using a Close packet before closing the connection. After a Close packet is received the client can also terminate the connection and exit.

Reference no: EM131894346

Questions Cloud

Discuss the basic concepts of self-control theory : Explain what the advantages and disadvantages of using "mini theories" to explain specific crimes would be.
How many pieces of wood sold : Today, your carpentry shop must produce 324 chair railings where each railing is made from a single piece of fine wood. Your three step manufacturing process.
Analysis does not incorporate income tax considerations : The equity dividend rate's usefulness is limited because the analysis does not incorporate income tax considerations.
Explore the concept of rationality : Are there crimes that are obviously more appropriate for rationality theories? Are there crimes obviously less appropriate? Explain your answer.
Design and implement an upgraded version of the simple ftp : For the second part of the class project we will design and implement an upgraded version of the simple File Transfer Protocol from Part 1.
Contemporary ethical dilemmas : While the usual Unit writing assignments take the form of a developed essay, for this Unit I would like you to write out short answer questions
Research and find a biography about an offender : How would the lawbreaker's actions be explained according to social control theory? What events or deprivations appear to be meaningful or significant.
Yield on extremely short-term treasury bills : The operating ratio-Yield on extremely short-term Treasury bills issued by federal government is frequently taken as reasonable approximation of risk free rate.
South for the aurora borealis : Many people reported seeing flashing lights in the sky last night. Apparently, the sightings were caused by the car lot grand opening, since

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design a variation of algorithm treesearch

Design a variation of algorithm TreeSearch for performing the operation find Al(k) in an ordered dictionary implemented with a binary search tree T.

  Provide a program that tests the methods that you supplied

The Rectangle class of standard Java library does not supply a method to compute area of a rectangle. Provide a program that tests the methods that you supplied

  Write a loop that removes all strings

Write a loop that removes all strings with length less than four from a linked list of strings called words.

  Design appropriate it infrastructures to manage data

In the unlikely event of any discrepancy between the Academic Regulations and any other publication, including this module guide, the Academic Regulations, as the definitive document, take precedence over all other publications and will be applied..

  Make program that displays a digital clock in a window

Write down a program that displays a digital clock in a window using an applet. The clock should show, day of week, date, time, time zone and year.

  Examine the web sites regarding your suggestions

Examine the Web sites regarding your suggestions as to how they might be improved. Create a PowerPoint presentation that includes 10-12 slides with voice recording that presents your recommended improvements.

  What is a preprocessor statement

Why is C so popular as a systems programming language in applications such as embedded microprocessor systems?

  Computes blue yonders profit based on the number of customer

Develop a worksheet that computes Blue Yonder's profit based on the number of customers who show up for the flight.

  Compute analysis of laminar thermal entry flow

Compute analysis of laminar thermal entry flow in a circular pipe with to = cost and constant fluid properties: Calculate the flow and construct plots.

  Implement encryption-decryption procedures for rsa method

Implement encryption/decryption procedures for the RSA method (assume that s, p and N are all given and represented in arrays of integers of size 25).

  Write application that allows you to enter amount of money

Write a windows application that allows you to enter the amount of money in your savings account, the interest rate, and a number of years.

  Open-addressing hashing method using quadratic probing

Write down the next four (4) locations we will attempt (suppose they also have collisions) if we are using Quadratic Probing?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd