How will the network be effected

Assignment Help Computer Networking
Reference no: EM131231946

PROBLEM SPECIFICATION:

Several major companies needing help in solving a network communications problem have approached us. Essentially, the desire is given partial information about network connectivity in the form of a network diagram, we have been asked to develop a method, which indicates all nodes reachable on the network from any node specified with the available information. Normally we will not really have the network diagram but rather a set of relations in the form (node[J] , node[K]) indicating communications currently exist from node J to node K. Some network nodes are not really destinations in the traditional sense, but special nodes (repeaters) used to facilitate communications between nodes separated by a large distance. These nodes receive network traffic, determine network routing, and retransmit the packet towards the desired destination.

To support high traffic volume, two separate half duplex communication lines too neighboring nodes normally connect each node in our network. One line is used to receive incoming traffic (packets) from the connected node; the other line is used to transmit outgoing packets. It is possible for one or both of these communications lines to be down at any given time. Hence it is possible for a network node to be able to receive but not transmit and vice versa. In the following sample network diagram, the arrows indicate the directions in which network traffic may currently travel between nodes.

Test your code using the following sample network diagram. Rows and columns must be labeled in ascending order using the node names in the presentation of results. Node names may be kept as characters or strings. You may declare them as a programmer defined data type (enumeration) if desired. Fixed and variable length strings may also be used to represent row and column labels if desired.

The results should appear in a matrix labeled as follows:

Data for the "C" Option:

The data for the lab must be entered dynamically at runtime and the results written to a file. You are encouraged to place the data in a file and use "I/O redirection" (see hints) for the "D" option. You may use "I/O redirection" to store the results in a file.I/O redirection is a technique that should be mastered by all professionals both programmers and users.

Process the information in the "D" Option sample network diagram. Prompt the user for the size of the array to hold the BMR (number of rows and columns) at runtime and dynamically allocatethe array in the system stack in Ada, C++, or Java. You specifically should not use "new, malloc," or any other operator, which allocates space in the heap in any language. Clearly mark this section of your code with a highlighter! Print each transaction as it is processed. I recommend the use of a data file. It will save you time and effort.With great reluctance, I will not take off for storing the data structure in the heap on the "D" option.

Submission: Submit a cover page with your name, COSC3319.xx where "xx" is the section number, time the class meets and date of submission. Clearly indicate you are submitting the "D" grading option. The cover page should be followed by the properly labeled "D" option results then the "D" option code.

"C" Option (best grade is 79):
You need not complete the "D" Option. Instead implement Warshall's algorithm as an Adapackage (class for C++/C#/Java). Build the BMR in your main program and pass it as a parameter to the package/class method implementing Warshall's algorithm. You specifically may not use "new, malloc," or any other operator, which allocates space in the heap in any language. Clearly mark the section of your code where you allocate the space with a highlighter!A 10 point penalty will be charged on your grade if you allocate storage in heap memory anywhere in your program. Print each transaction as it is processed. The BMR should be returned to the main program by reference (CBR). Print the results of Warshall's algorithm in the main program. All I/O must occur in the main program.Process both the "D" Option and "C" Option networks. You may assume the names of network nodes are a single character.

You may use "I/O redirection for files to complete the "C" Option.

Submission: Submit a cover page with your name, COSC3319.xx where "xx" is the section number, time the class meets and date of submission. Clearly indicate you are submitting the "C" grading option. The cover page should be followed by the "D" option results followed by the "C" Option results. The "C" Option code should appear next.

"B" Option (best grade is 89):
You must use Ada, C++, C# or Java to implement the "B" option. You are encouraged to use Ada, it requires by far the least programming effort. You need not do the "D" or "C" options. Rather implement Warshall's algorithmusing a generic package (template class in C++/Java) that allows the user to specify the data type for the row and column labels as well as the number of rows. Note the BMR will be a square matrix (same number of rows and columns).

Space for the BMR must be allocated in the system stackwithin the generic package, probably during generic instantiation! You specifically may not use "new," "malloc," or any other operator, which allocates space in the heap anywhere in your code. Specifically mark allocating space for the BMR with a highlighter!A 10 point penalty will be charged on your grade if you allocate storage in heap memory. Print each transaction as it is processed. All data must be read explicitly from a sequential text file and results printed to a text file in the main program.You may not use I/O redirection. Use a highlighter to mark where you open and close the text file.

Submission: Submit a cover page with your name, COSC3319.xx where "xx" is the section number, time the class meets and date of submission. Clearly indicate you are submitting the "B" grading option. The cover page should be followed by the "D" option results followed by the "C" Option results then the "B" Option results. The "B" Option code should appear next.

"A" Option (best grade is 100):

Space for the BMR must be allocated in the system stackwithin the generic package, probably during generic instantiation! You specifically may not use "new," "malloc," or any other operator, which allocates space in the heap at runtime in any language. Clearly mark this section of your code with a highlighter! You must read all transactions and print all results within the generic package/template. The I/O routines must be passed as generic parameters (Ada) or as pointers to functions (C++/C#/Java). Upon return to the main program, all storage required for the BMR must be reclaimed efficiently and automaticallyby the OS without programmer intervention or use of a garbage collector.

Ada encourages programmers to define and use their own data types. C++ and Java restrict programmers to intrinsic data types in generic (template) instantiations. Ada allows convenient instantiation with any programmer data type. You must use Ada, C++ or C# for the "A" option.

Submission: Submit a cover page with your name, COSC3319.xx where "xx" is the section number, time the class meets and date of submission. Clearly indicate you are submitting the "A" grading option. The cover page should be followed by the "D" option results followed by the "C" Option results, the "B" Option results and finally the "A" Option results. The "A" Option code should appear next.

Extensions for the use of this lab:

1) We must bring down a node for P.M. (preventive maintenance). How will the network be effected?

2) We wish to improve network reliability. How will inserting a node at a given point influence connectivity?

Attachment:- hall.rar

Reference no: EM131231946

Questions Cloud

Which is more important to the short-term lender : How should a business use working capital analysis? Which is more important to the short-term lender: the stock of cash or the flow of cash? Is it possible in today's business to operate with no current liabilities?
Evaluate the pros and cons of applicant tracking systems : Evaluate the pros and cons of applicant tracking systems, job boards, cloud recruiting systems, social media recruiting methods, etc. Then play devil's advocate as a job applicant to evaluate the complaints of applicants about modern staffing tech..
Compare and contrast the internal rate of return : Compare and contrast the Internal Rate of Return (IRR), the Net Present Value (NPV) and Payback approaches to capital rationing. Which do you think is better? Why?
Analyze the potential pitfalls in his capital budgeting : Describe his working capital practices, including his methods of capital budgeting analysis techniques. Analyze the potential pitfalls in his capital budgeting practices that George should be aware of.
How will the network be effected : How will the network be effected - We wish to improve network reliability. How will inserting a node at a given point influence connectivity -
Write paper that analyzes evolution of affirmative action : You must draw conclusions based on research from outside resources and answer the following question in your paper, "Has affirmative action been consistently and effectively used to create a more robust and productive workforce?"
Do the predictions tend to agree and reinforce each other : Consider K-wave cycle theory, 34-year cycle theory, and the relationship between birthrates and the stock market. - Plot on a timeline what each of these theories suggests stock market performance will be over the next 50 years.
Descriptions of ineffective practices that leaders avoid : Descriptions of effective best practices and day-to-day behaviors that leaders should follow for planning, measuring, motivating people, managing change and information, designing jobs, and encouraging relationships. Descriptions of ineffective pract..
Find the total work and the heat transfer for the process : Heat is now added until the pressure reaches 1.2 MPa. Show the P-V diagram, and find the work and heat transfer for the process.

Reviews

len1231946

10/5/2016 6:37:46 AM

hello, i have attached question in my attachment. the problem should be done in Ada language. there are a,b,c,d, question. please start from d,then ,c,then.b and atlast A. thankyou so much

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd