ENGN4521/6521. Embedded Wireless. An LIPD Band RF Front End for DATV

Size: px
Start display at page:

Download "ENGN4521/6521. Embedded Wireless. An LIPD Band RF Front End for DATV"

Transcription

1 ENGN4521/6521 Embedded Wireless An LIPD Band RF Front End for DATV V3.0 Copyright G.G. Borg College of Engineering and Computer Science. Australian National University 1

2 Contents 1 Foreword 3 2 Assessment 3 3 Introduction 3 4 Description 3 5 Exercises 5 2

3 1 Foreword The ENGN4521 term project introduces digital amateur television (DATV). Amateur radio gives radio hobbyists a way to experiment with radio wave communications 1. We will build a DATV radio to transmit video to an existing software defined receiver using the satellite digital video broadcast standard (dvb-s) 2. 2 Assessment The project is worth 40% of the course mark and will be covered entirely in labs. The broadaimistoimplement aworking wireless video linkwiththehelpofanrtl-sdrsoftware radio receiver (sdr) - based DTV receiver 3. There are two separate projects. This document describes the RF front end. It is worth 20% of the course total mark. The appendix also contains an introduction to LINUX which will be using in the rest of the course. One of the exercises in this project includes an exercise in C programming. 3 Introduction This project is an rf electronics exercise involving the construction of (a) an rf up/downconverter to cross-band translate the MHz lipd (Low Interference Potential Device) band to an intermediate frequency (if) and (b) an rf power amplifier based on a common emitter amplifier using a BF199 VHF transistor. Note that because the LIPD band only permits 10mW (20dBm) EIRP (Equivalent Isotropic Radiated Power), the amplfier is really a low power common-emitter BJT amplifier. The information contained in this description and the solutions to a few short exercises provide the basis for a 5-10 page report. There is more to DATV communications system than is in the scope of the project. Students only need to concentrate on the assessment areas and their specific requirements. The report submission deadline is the end of semester. Emphasis should be placed mostly on providing worked solutions to the questions and demonstrating that you understand the principle of operation of the radio and the design choices. 4 Description A block diagram of the radio is shown in Fig https : //en.wikipedia.org/wiki/amateur r adio

4 MIXER LO IF RF QPSK IF LOW PASS 74MHz IF RF BAND PASS 24MHz LO 50MHz QPSK IF 55MHz BAND PASS 55MHz QPSK IF 55MHz Figure 1: Circuit schematic of the up converter. The inset shows the architecture of the double balanced ring diode mixer. There are two possible rf-ucs the main figure shows the 24MHz system which requires a mixer to convert from 74MHz to 24MHz and the lower figure shows 55MHz version which does not need a mixer. 4

5 Vdd (12V) R1 Lchoke = 10uH R2 BF199 50R 1 2 b c Rbias e 50R 3 Figure 2: Circuit schematic of the rfpa. 5 Exercises 1. Design, build and test an rfpa based on the BF199 VHF transistor for 12V power supply and 20-80MHz and 20dB gain. Your report should contain sections describing, Use of solve to model the amplifier. Be careful to design the amplifier for an input and output impedance of 50Ω. The construction process. Using components supplied in the lab build the amplifier on on a double sided FR4 PCB. Be sure to leave enough room for matching and input/output BNC connectors. Test results. Measurements of gain (transfer function). (8 marks) 5

6 2. Design, build and test a 74MHz low pass filter for an impedance of 50Ω. Be sure to include all design steps, performance predictions and test results in your report. (3 marks) 3. Design,buildandtesta24MHzbandpassfilterofbandwidth2MHzandanimpedance of 50Ω. Be sure to include all design steps, performance predictions and test results in your report. (3 marks) 4. Make anrfup/down-converter by laying outthe filtersonapcb withaminicir- CUITS ADEX-10 mixer (see appendix B) and a 5V-50MHz clock / local oscillator. Make measurements of the filter response (transfer function) and input impedance. Connect in the power amplifier and remake the measurements. (3 marks) 5. Read appendix A on linux, implement the udp talker / listener and demonstrate communications on a localhost. (3 marks) 6

7 APPENDIX A: LINUX When you connect to the LINUX O.S. using PUTTY (secure shell), you are presented with a terminal interface. This is an old-fashioned but very effective way to interact with a computer. In this section we describe the structure of LINUX file system and how you can use LINUX. First off type ls /. You should see the following. debian@beaglebone:~$ ls / bin dev home lost+found mnt proc run selinux sys usr boot etc lib media opt root sbin srv tmp var / refers to the root file system. This is the top folder or directory. There are a number of subfolders as follows: bin Contains many of the binary files that constitute the commands in the O.S. boot Contains kernel images and configutation files. The kernel refers to the LINUX operating system itself. dev Contains system interfaces (files) to the LINUX character and block devices (but not the network devices). Take a look at them by typing ls/dev. These devices can be opened as files by programs and allow the program to access LINUX device drivers. Can you think of what any of the devices refer to? etc Is where most of the system configuration scripts are located. home Is the home folder where the files are located of users who can access the system. There is only one user on my BBB system with uid debian. When you log in you arrive directly at your home folder. Here this is /home/debian. lib These are where the binary libraries are located. On WINDOWS think dlls. media This is where external storage devices can be mounted. Such devices include CD- ROMS, flash and external hard drives. Note tha term mount. The mount command is used to connect a folder (usually but not necessarily located in /media) to a block device in /dev. This allows the block device to be accessed as a folder. This may seem strange for MAC and WINDOWS users where mounting is performed transparently by the O.S. mnt serves a similar purpose to media proc Is actually a file system that is not located on the hard drive - or any block device. proc is located in RAM and is a volatile folder containing all of the system information. For example try cat /proc/cpuinf o to see what is contained in this file. 7

8 sbin is the superuser binary director. This is where the administrator-only commands are stored. usr is the usual place where new commands and other system files get stored when a user installs new software on LINUX. The following is a short list of basic unix commands that can be executed in the xterm. These commands are big programs usually with many options and can be very powerful. If you wish to learn more about a command type, man COMMAND NAME >. The man refers to the manual or man page for the command. man produces a scrollable interface inside the xterm. To navigate, simply use thearrow keys. To quit type < quit >. ls l list the files in the current directory in detailed format. cat FILE NAME.txt dumps the contents of a text file to the terminal. grep STRING FILE NAME.txt. ListalloccurrencesofSTRINGinfileFILE NAME. Note that wildcards are possible: grep STRING.txt. cp FILE NAME TARGET. Copy file FILE NAME to TARGET where TARGET could be another file or a directory. In this case the file FILE NAME is left in tact. mv FILE NAME TARGET. MovethefileFILE NAME totarget where TARGET could be another file or a directory. In this case the file FILE NAME is removed. rm FILE NAME. Delete the file FILE NAME. Be careful of this command. The rm command does not transport files to a safe haven such as the trash can. Instead it wipes them completely from the disk. mkdir DIR NAME. Create a directory DIR NAME. rmdir DIR NAME. Delete the directory DIR NAME. Only works if DIR NAME is empty. cd DIR NAME change to folder DIR NAME. format. The command cd takes you to your home folder. df. List total disk usage. Superfast way of finding out how much of your hard drive space is left. mount is used to mount file systems e.g. mount /dev/sdb1 /media/disk 8

9 ssh allows you to make a connection to another LINUX computer. Example 1: connect to user debian on a machine at IP address : ssh debian@ Example 2: Do the same but also allow an x-session: ssh X debian@ Example 3: Copy a file FILE NAME located in folder DIR1 NAME on the local machine to folder DIR2 NAME on debian@ scp DIR1 NAME/F ILE NAME debian@ : /DIR2 NAME/F ILE NAME note that DIR2 NAME has to be an absolute path. DIR1 NAME can be an absolute path but may be a relative path e.g../ is the current folder. nano is a simple screen text-editor with a built-in description of its ten only commands. The figure below shows how to use nano to create a simple c-program that prints Hello World! to the terminal. gcc o myfile myfile.c: compile C-program myfile.c into executable myfile. To run myfile, cd to the folder where it is located and type./myfile. If you are running X-windows the following are useful commands. /usr/bin/sof f icew orddoc.docx to open a WORD document /usr/bin/evincepdffile.pdf open a PDF /sbin/if conf ig: display the status of network devices. An example is shown below. Note that there are three network interfaces: eth0 the main ethernet interface, lo the loopback interface and usb0 the USB network interface (providing ethernet connectivity). debian@beaglebone:~$ /sbin/ifconfig eth0 Link encap:ethernet HWaddr 90:59:af:5b:cd:c3 inet addr: Bcast: Mask: UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Interrupt:40 lo Link encap:local Loopback inet addr: Mask: inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:65536 Metric:1 RX packets:68 errors:0 dropped:0 overruns:0 frame:0 TX packets:68 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 9

10 RX bytes:6434 (6.2 KiB) TX bytes:6434 (6.2 KiB) usb0 Link encap:ethernet HWaddr c6:fe:62:d7:9a:82 inet addr: Bcast: Mask: inet6 addr: fe80::c4fe:62ff:fed7:9a82/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:630 errors:0 dropped:0 overruns:0 frame:0 TX packets:448 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:51153 (49.9 KiB) TX bytes:96967 (94.6 KiB) Finally there is /usr/bin/sudo. This command can be used to execute superuser commands by a regular user - provider the uid is stored in /etc/sudoers. You even need /usr/bin/sudo just to look at the file /etc/sudoers. A useful command requiring /usr/bin/sudo is /usr/bin/sudo halt which shuts down LINUX. Notice that these comands have been invoked from the folders where they are located. It is unnecessary to do this if these folders are in the PATH. PATH is an environment variable that can be found using the command echo $PATH. 10

11 Figure 3: Screenshot of nano in action UDP code /* ** talker.c -- a datagram "client" demo */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <errno.h> #include <string.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #include <netdb.h> 11

12 #define SERVERPORT "9999" // the port users will be connecting to int main(int argc, char *argv[]) { int sockfd; struct addrinfo hints, *servinfo, *p; int rv; int numbytes; if (argc!= 3) { fprintf(stderr,"usage: talker hostname message\n"); exit(1); memset(&hints, 0, sizeof hints); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_DGRAM; if ((rv = getaddrinfo(argv[1], SERVERPORT, &hints, &servinfo))!= 0) { fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(rv)); return 1; // loop through all the results and make a socket for(p = servinfo; p!= NULL; p = p->ai_next) { if ((sockfd = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) { perror("talker: socket"); continue; break; if (p == NULL) { fprintf(stderr, "talker: failed to bind socket\n"); return 2; if ((numbytes = sendto(sockfd, argv[2], strlen(argv[2]), 0, p->ai_addr, p->ai_addrlen)) == -1) { perror("talker: sendto"); 12

13 exit(1); freeaddrinfo(servinfo); printf("talker: sent %d bytes to %s\n", numbytes, argv[1]); close(sockfd); return 0; /* ** listener.c -- a datagram sockets "server" demo */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <errno.h> #include <string.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> #include <netdb.h> #define MYPORT "9999" // the port users will be connecting to #define MAXBUFLEN 100 // get sockaddr, IPv4 or IPv6: void *get_in_addr(struct sockaddr *sa) { if (sa->sa_family == AF_INET) { return &(((struct sockaddr_in*)sa)->sin_addr); return &(((struct sockaddr_in6*)sa)->sin6_addr); int main(void) { int sockfd; 13

14 struct addrinfo hints, *servinfo, *p; int rv; int numbytes; struct sockaddr_storage their_addr; char buf[maxbuflen]; socklen_t addr_len; char s[inet6_addrstrlen]; memset(&hints, 0, sizeof hints); hints.ai_family = AF_UNSPEC; // set to AF_INET to force IPv4 hints.ai_socktype = SOCK_DGRAM; hints.ai_flags = AI_PASSIVE; // use my IP if ((rv = getaddrinfo(null, MYPORT, &hints, &servinfo))!= 0) { fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(rv)); return 1; // loop through all the results and bind to the first we can for(p = servinfo; p!= NULL; p = p->ai_next) { if ((sockfd = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) { perror("listener: socket"); continue; if (bind(sockfd, p->ai_addr, p->ai_addrlen) == -1) { close(sockfd); perror("listener: bind"); continue; break; if (p == NULL) { fprintf(stderr, "listener: failed to bind socket\n"); return 2; freeaddrinfo(servinfo); printf("listener: waiting to recvfrom...\n"); 14

15 addr_len = sizeof their_addr; if ((numbytes = recvfrom(sockfd, buf, MAXBUFLEN-1, 0, (struct sockaddr *)&their_addr, &addr_len)) == -1) { perror("recvfrom"); exit(1); printf("listener: got packet from %s\n", inet_ntop(their_addr.ss_family, get_in_addr((struct sockaddr *)&their_addr), s, sizeof s)); printf("listener: packet is %d bytes long\n", numbytes); buf[numbytes] = \0 ; printf("listener: packet contains \"%s\"\n", buf); close(sockfd); return 0; /* ** rtl_decode.c -- decodes rtl-sdr binary IQ to HEX */ #include <errno.h> #include <stdio.h> #include <stdlib.h> #include <string.h> main(int argc, char **argv) { char infilename[200]; char outfilename[200]; char *name; FILE *infile; FILE *outfile; unsigned char Ichar, Qchar; int flag; int sample_counts; int Nbytes; 15

16 printf("usage:./rtl_decode infile outfile Nbytes\n"); printf("default filename=file.in Nbytes = 200\n"); if( argc < 4 ) { strcpy(infilename,"file.in"); strcpy(outfilename,"file.out"); Nbytes = 200; else { strcpy(infilename,argv[1]); printf("infile = %s\n",infilename); strcpy(outfilename,argv[2]); printf("outfile = %s\n",outfilename); Nbytes=(int)atoi(argv[3]); printf("%d\n",nbytes); infile = fopen(infilename,"r"); if( infile == NULL) { printf("could not open file\n"); exit(exit_failure); outfile = fopen(outfilename,"w"); if( outfile == NULL) { printf("could not open file\n"); exit(exit_failure); flag = fscanf( infile, "%c", &Ichar); flag = fscanf( infile, "%c", &Qchar); // while( EOF!= flag ) for(sample_counts=0;sample_counts<nbytes;sample_counts++) { fprintf(outfile, "%d,%d\n", (int)ichar-128,(int)qchar-128); flag = fscanf( infile, "%c", &Ichar); flag = fscanf( infile, "%c", &Qchar); 16

17 fclose(infile); fclose(outfile); 17

18 APPENDIX B: ADEX-10H Mixer 18

19 APPENDIX C: AEL9710CSN-50MHz Crystal Clock 19

20 Surface Mount Frequency Mixer Level 17 (LO Power +17 dbm) 10 to 1000 MHz NEW! ADEX-10H Maximum Ratings Operating Temperature -40 C to 85 C Storage Temperature -55 C to 100 C RF Power 200mW IF Current 40mA Pin Configuration LO 6 RF 3 IF 2 GROUND 1,4,5 EVALUATION BOARD P/N: TB-03 Outline Drawing Features EXcellent L-R isolation, 54 db typ. EXcellent flat conversion loss ±0.35 db typ. over entire band low conversion loss, 7.0 db typ. good VSWR, 1.4:1 typ. for LO, 1.6:1typ. for RF, 1.4:1 typ. for IF good performance to 1500 MHz solder plated leads for excellent solderability low profile package, US Patent Applications cellular PCN FREQUENCY (MHz) LO/RF f L - f U IF CONVERSION LOSS* (db) Mid-Band _ m x σ Max. Electrical Specifications Total Range Max. LO-RF ISOLATION (db) L Typ. Min. M Typ. Min. U Typ. Min. CASE STYLE: CD542 PRICE: $3.45 ea. QTY.: (10-49) LO-IF ISOLATION (db) IP3@ center band Typ. (dbm) DC dB Compr.: +14 dbm typ. E= [IP3(dBm)-LO Power(dBm)]/10 *Conversion loss increases 0.5 db when IF is above 150 MHz. L Typ. Min. M Typ. Min. U Typ. Min. E FACTOR L = low range [f L to 10 f L ] M = mid range [10 f L to f U /2] U = upper range [f U /2 to f U ] m= mid band [2f L to f U /2] Outline Dimensions ( ) inch mm A B C D E F G H J K L wt grams Frequency RF MHz LO MHz Conversion Loss (db) LO +17dBm Typical Performance Data Isolation L-R (db) LO +17dBm Isolation L-I (db) LO +17dBm VSWR LO port (:1) LO +17dBm VSWR RF port (:1) LO +17dBm at IF Freq of 30 MHz ADEX-10H CONVERSION LOSS 80 at LO DRIVE of +14/+17/+20 dbm ADEX-10H ISOLATION L-R 2.2 at LO DRIVE of +17 dbm ADEX-10H VSWR CONVERSION LOSS (db) ISOLATION (db) VSWR LO +14dBm LO +17dBm LO +20dBm FREQUENCY (MHz) 30 LO +14 dbm LO +17dBm LO +20dBm FREQUENCY (MHz) 1.0 #LO VSWR #RF VSWR FREQUENCY (MHz) M i n i - C i r c u i t s I N T E R N E T h t t p : / / w w w. m i n i c i r c u i t s. c o m P. O. B o x , B r o o k l y n, N e w Y o r k ( ) F a x ( ) D i s t r i b u t i o n C e n t e r s N O R T H A M E R I C A F a x E UR O P E F a x REV. OR M79465 ED-9813/1 ADEX-10H DJ/TD/CP I S O C E R T I F I E D

21 DatasheetArchive.com Request For Quotation Order the parts you need from our real-time inventory database. Simply complete a request for quotation form with your part information and a sales representative will respond to you with price and availability. Request For Quotation Your free datasheet starts on the next page. More datasheets and data books are available from our homepage: This datasheet has been downloaded from

22

ENGN8637. Advanced Topics in Communications. Your Title

ENGN8637. Advanced Topics in Communications. Your Title ENGN8637 Advanced Topics in Communications Your Title Your name uxxxxxxxx@anu.edu.au Research School of Engineering, ANU submitted on 18/March/2018 Contents 1 Introduction 1 2 A New Section 3 3 Yet another

More information

Azblink API for Sending XMPP Messages via HTTP POST

Azblink API for Sending XMPP Messages via HTTP POST Azblink API for Sending XMPP Messages via HTTP POST Abstract: This document is to describe the API of Azblink SBC for sending XMPP messages via HTTP POST. This is intended for the systems or the devices

More information

Network Programming in C. Networked Systems 3 Laboratory Sessions and Problem Sets

Network Programming in C. Networked Systems 3 Laboratory Sessions and Problem Sets Network Programming in C Networked Systems 3 Laboratory Sessions and Problem Sets Lab Timetable, Aims, and Objectives Teaching Week Activity 14 Introduction 15 Warm-up exercise 16 17 Web client 18 19 20

More information

CSE 333 SECTION 7. C++ Virtual Functions and Client-Side Network Programming

CSE 333 SECTION 7. C++ Virtual Functions and Client-Side Network Programming CSE 333 SECTION 7 C++ Virtual Functions and Client-Side Network Programming Overview Virtual functions summary and worksheet Domain Name Service (DNS) Client side network programming steps and calls dig

More information

The Berkeley Sockets API. Networked Systems Architecture 3 Lecture 4

The Berkeley Sockets API. Networked Systems Architecture 3 Lecture 4 The Berkeley Sockets API Networked Systems Architecture 3 Lecture 4 The Berkeley Sockets API Widely used low-level C networking API First introduced in 4.3BSD Unix Now available on most platforms: Linux,

More information

CSE 333 SECTION 7. Client-Side Network Programming

CSE 333 SECTION 7. Client-Side Network Programming CSE 333 SECTION 7 Client-Side Network Programming Overview Domain Name Service (DNS) Client side network programming steps and calls dig and ncat tools Network programming for the client side Recall the

More information

Network Programming in C: The Berkeley Sockets API. Networked Systems 3 Laboratory Sessions

Network Programming in C: The Berkeley Sockets API. Networked Systems 3 Laboratory Sessions Network Programming in C: The Berkeley Sockets API Networked Systems 3 Laboratory Sessions The Berkeley Sockets API Widely used low-level C networking API First introduced in 4.3BSD Unix Now available

More information

CSE 333 SECTION 8. Sockets, Network Programming

CSE 333 SECTION 8. Sockets, Network Programming CSE 333 SECTION 8 Sockets, Network Programming Overview Domain Name Service (DNS) Client side network programming steps and calls Server side network programming steps and calls dig and ncat tools Network

More information

Computer Network Programming

Computer Network Programming Practical Programming Computer Network Programming Marwan Burelle & David Bouchet david.bouchet.epita@gmail.com 1 Quick Overview 1.IP and Protocol Stack 2.TCP Concepts 3.Client / Server Concepts 4.Socket

More information

CSE 333 Section 8 - Client-Side Networking

CSE 333 Section 8 - Client-Side Networking CSE 333 Section 8 - Client-Side Networking Welcome back to section! We re glad that you re here :) Networking Quick Review What are the following protocols used for? (bonus: what layer of the networking

More information

Let us ping! First we will learn the Hello World of a networked machine.

Let us ping! First we will learn the Hello World of a networked machine. AN INTRODUCTION TO LINUX NETWORKING In this article, we ll explore networking under GNU/Linux. You ll find it interesting to manage the entire network through certain valid keystrokes known as commands.

More information

CSE 333 SECTION 6. Networking and sockets

CSE 333 SECTION 6. Networking and sockets CSE 333 SECTION 6 Networking and sockets Overview Network Sockets IP addresses and IP address structures in C/C++ DNS Resolving DNS names Demos Section exercise Sockets Network sockets are network interfaces

More information

Raising the Datagram API to Support Transport Protocol Evolution

Raising the Datagram API to Support Transport Protocol Evolution Raising the Datagram API to Support Transport Protocol Evolution Tom Jones, Gorry Fairhurst University of Aberdeen Colin Perkins University of Glasgow Presentation given at the IFIP Networking 2017 Workshop

More information

CSE 333 SECTION 7. Client-Side Network Programming

CSE 333 SECTION 7. Client-Side Network Programming CSE 333 SECTION 7 Client-Side Network Programming Overview Homework 3 due tonight Questions? Domain Name Service (DNS) Review Client side network programming steps and calls intro dig tool Network programming

More information

IP over IB Protocol. Introduction CHAPTER

IP over IB Protocol. Introduction CHAPTER CHAPTER 3 The following sections appear in this chapter: Introduction, page 3-1 Manually Configure IPoIB for Default IB Partition, page 3-2 Subinterfaces, page 3-2 Verify IPoIB Functionality, page 3-5

More information

6 장과제샘플코드 - 다자간채팅 (udp 버전 1) 목포해양대해양컴퓨터공학과

6 장과제샘플코드 - 다자간채팅 (udp 버전 1) 목포해양대해양컴퓨터공학과 6 장과제샘플코드 - 다자간채팅 (udp 버전 1) 과제 서버에서먼저 bind 하고그포트를다른사람에게알려줄것 클라이언트들은알려준포트로접속 서버는클라이언트로부터받은메시지를다른클라이언트들에게전달 2 Makefile 1 SRC_DIR =../../common 2 COM_OBJS = $(SRC_DIR)/addressUtility.o $(SRC_DIR)/dieWithMessage.o

More information

CSE 333 Section 3. Thursday 12 April Thursday, April 12, 12

CSE 333 Section 3. Thursday 12 April Thursday, April 12, 12 CSE 333 Section 3 Thursday 12 April 2012 Goals for Today 1. Overview IP addresses 2. Look at the IP address structures in C/C++ 3. Overview DNS 4. Talk about how to use DNS to translate IP addresses 5.

More information

Sockets. Dong-kun Shin Embedded Software Laboratory Sungkyunkwan University Embedded Software Lab.

Sockets. Dong-kun Shin Embedded Software Laboratory Sungkyunkwan University  Embedded Software Lab. 1 Sockets Dong-kun Shin Embedded Software Laboratory Sungkyunkwan University http://nyx.skku.ac.kr Internet Connections (1) 2 Connection Clients and servers communicate by sending streams of bytes over

More information

UNIX System Programming Lecture 19: IP Sockets

UNIX System Programming Lecture 19: IP Sockets UNIX System Programming Lecture 19: Outline Reference BLP: Chapter 15 man pages: socket, bind, connect, listen, accept, ip(7), ipv6(7), getaddrinfo, getnameinfo 1 Review of UNIX Sockets On the server,

More information

Enabling CDC-ETHER Connection for Skywire CAT1

Enabling CDC-ETHER Connection for Skywire CAT1 Enabling CDC-ETHER Connection for Skywire CAT1 NimbeLink Corp Updated: May 2017 PN 30111 rev 5 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction 2 1.1 Orderable

More information

Clustered Data ONTAP 8.3 Update 2, IPspaces. Self-paced Lab NETAPP UNIVERSITY. NetApp University - Do Not Distribute

Clustered Data ONTAP 8.3 Update 2, IPspaces. Self-paced Lab NETAPP UNIVERSITY. NetApp University - Do Not Distribute NETAPP UNIVERSITY Clustered Data ONTAP 8.3 Update 2, IPspaces Self-paced Lab Course ID: STRSW-SPL-CDOT83UPD2 Content Version: 1.0 ATTENTION The information contained in this course is intended only for

More information

Network Configuration for Cisco UCS Director Baremetal Agent

Network Configuration for Cisco UCS Director Baremetal Agent Network Configuration for Cisco UCS Director Baremetal Agent This chapter contains the following sections: About the Network Configuration Options, page 1 Single Network for Management and PXE, page 1

More information

Programming with TCP/IP. Ram Dantu

Programming with TCP/IP. Ram Dantu 1 Programming with TCP/IP Ram Dantu 2 Client Server Computing Although the Internet provides a basic communication service, the protocol software cannot initiate contact with, or accept contact from, a

More information

CSE 333 Lecture 16 - network programming intro

CSE 333 Lecture 16 - network programming intro CSE 333 Lecture 16 - network programming intro Hal Perkins Department of Computer Science & Engineering University of Washington Today Network programming - dive into the Berkeley / POSIX sockets API -

More information

Quick guide for configuring a system with multiple IP-LINKs

Quick guide for configuring a system with multiple IP-LINKs Quick guide for configuring a system with multiple IP-LINKs October 4 th 2005, KK. This guide will show an example configurations for a system with multiple IP-LINKs. Example 1, three devices connected

More information

RG-MACC_2.0 Installation Manual

RG-MACC_2.0 Installation Manual RG-MACC_2.0 Installation Manual Ruijie Networks Co., Ltd all rights reserved 1 Copyright Clarify Copyright ownership belongs to Ruijie, shall not be reproduced, copied, or used in other ways without permission.

More information

Hyo-bong Son Computer Systems Laboratory Sungkyunkwan University

Hyo-bong Son Computer Systems Laboratory Sungkyunkwan University Sockets Hyo-bong Son (proshb@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Client-Server Model Most network application is based on the client-server model: A server

More information

PA #2 Reviews. set_name, get_name, del_name. Questions? Will be modified after PA #4 ~

PA #2 Reviews. set_name, get_name, del_name. Questions? Will be modified after PA #4 ~ Sockets Prof. Jin-Soo Kim( jinsookim@skku.edu) TA Dong-Yun Lee(dylee@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu PA #2 Reviews set_name, get_name, del_name Will

More information

Sockets. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Sockets. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University Sockets Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Internet Connections (1) Connection Clients and servers communicate by sending streams of

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003 [CRT09] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 MODULE NO: CPU5003 Date: Wednesday 21 st January 2015 Time: 10:00 13:00 INSTRUCTIONS

More information

UNIX Sockets. Developed for the Azera Group By: Joseph D. Fournier B.Sc.E.E., M.Sc.E.E.

UNIX Sockets. Developed for the Azera Group By: Joseph D. Fournier B.Sc.E.E., M.Sc.E.E. UNIX Sockets Developed for the Azera Group By: Joseph D. Fournier B.Sc.E.E., M.Sc.E.E. Socket and Process Communication application layer User Process Socket transport layer (TCP/UDP) network layer (IP)

More information

Client-side Networking

Client-side Networking Client-side Networking CSE 333 Autumn 2018 Instructor: Hal Perkins Teaching Assistants: Tarkan Al-Kazily Renshu Gu Trais McGaha Harshita Neti Thai Pham Forrest Timour Soumya Vasisht Yifan Xu Administriia

More information

2007 Microsoft Corporation. All rights reserved.

2007 Microsoft Corporation. All rights reserved. Creating a Basic Winsock Application 2007 Microsoft Corporation. All rights reserved. To create a basic Winsock application 1. Create a new empty project. 2. Add an empty C++ source file to the project.

More information

목포해양대해양컴퓨터공학과. IPv6 적용

목포해양대해양컴퓨터공학과. IPv6 적용 IPv6 적용 1 IPV6 기본규격 2 IPv6 Basic header 3 IPv6 - Extension Headers (1) Hop-by-Hop Options (0) RSVP, PIM/MLD, etc. Routing (43) Source Routing, MIPv6 Fragment (44) Encapsulating Security Payload (50) IPsec

More information

Outline. Option Types. Socket Options SWE 545. Socket Options. Out-of-Band Data. Advanced Socket. Many socket options are Boolean flags

Outline. Option Types. Socket Options SWE 545. Socket Options. Out-of-Band Data. Advanced Socket. Many socket options are Boolean flags Outline SWE 545 Socket Options POSIX name/address conversion Out-of-Band Data Advanced Socket Programming 2 Socket Options Various attributes that are used to determine the behavior of sockets Setting

More information

Network Socket Programming - 2 BUPT/QMUL

Network Socket Programming - 2 BUPT/QMUL Network Socket Programming - 2 BUPT/QMUL 2017-3-20 Review Basic Concepts in NP Introduction to Network Programming Importance Classes Environments in this course Program Developing Phases Skills Useful

More information

Unix Network Programming

Unix Network Programming Introduction to Computer Networks Polly Huang EE NTU Unix Network Programming The socket struct and data handling System calls Based on Beej's Guide to Network Programming 1 The Unix Socket A file descriptor

More information

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Network Programming Worksheet 2. Simple TCP Clients and Servers on *nix with C.

Network Programming Worksheet 2. Simple TCP Clients and Servers on *nix with C. Simple TCP Clients and Servers on *nix with C. Aims. This worksheet introduces a simple client and a simple server to experiment with a daytime service. It shows how telnet can be used to test the server.

More information

Fountain Multimedia Broadcasting Final Report Spring Semester 2012

Fountain Multimedia Broadcasting Final Report Spring Semester 2012 Fountain Multimedia Broadcasting Final Report Spring Semester 2012 -Full Report- By Aqeel Alhashim Ben Kappel Jassim Alhashim Prepared to partially fulfill the requirements for ECE402 Department of Electrical

More information

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science NETWORK PROGRAMMING CSC- 341 25 Instructor: Junaid Tariq, Lecturer, Department of Computer Science 26 9 Lecture Sockets as means for inter-process communication (IPC) application layer Client Process Socket

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

GM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010

GM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010 GM8126 MAC DRIVER User Guide Rev.: 1.0 Issue Date: December 2010 REVISION HISTORY Date Rev. From To Dec. 2010 1.0 - Original Copyright 2010 Grain Media, Inc. All Rights Reserved. Printed in Taiwan 2010

More information

CIS Test 1- Practice - Fall 2011

CIS Test 1- Practice - Fall 2011 CIS 192 - Test 1- Practice - Fall 2011 Name Each question worth 2 points: Tip: When not logged in as root, you can still use many of the network commands but you must preface them with /sbin/ because you

More information

Access Server: User's and Developer's Guide <<< Previous Next >>>

Access Server: User's and Developer's Guide <<< Previous Next >>> 1 of 14 12/9/2008 10:18 AM Access Server: User's and Developer's Guide > Chapter 2. Getting Started with Access Server Access Server can be controlled in three ways: by using the WWW

More information

ICT 6544 Distributed Systems Lecture 5

ICT 6544 Distributed Systems Lecture 5 ICT 6544 Distributed Systems Lecture 5 Hossen Asiful Mustafa Message Brokers Figure 4-21. The general organization of a message broker in a message-queuing system. IBM s WebSphere Message-Queuing System

More information

IP Addresses, DNS. CSE 333 Spring Instructor: Justin Hsia

IP Addresses, DNS. CSE 333 Spring Instructor: Justin Hsia IP Addresses, DNS CSE 333 Spring 2018 Instructor: Justin Hsia Teaching Assistants: Danny Allen Dennis Shao Eddie Huang Kevin Bi Jack Xu Matthew Neldam Michael Poulain Renshu Gu Robby Marver Waylon Huang

More information

Wi-Fi Guide: Edimax USB Adapter on BBG

Wi-Fi Guide: Edimax USB Adapter on BBG Wi-Fi Guide: Edimax USB Adapter on BBG August 3 rd 2017 Table of Contents: Page 1: Page 2: Page 3: Page 4: Page 5: Introduction & Hardware requirements Getting Started Connecting to a network using Network

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

CSCI 4061: Sockets and Network Programming

CSCI 4061: Sockets and Network Programming 1 CSCI 4061: Sockets and Network Programming Chris Kauffman Last Updated: Tue Dec 5 13:30:56 CST 2017 Networks are Aging Source: www.ipv6now.hk Source: XKCD #865 2 3 Aging Networks Makes Network Programming

More information

Socket Programming. CSIS0234A Computer and Communication Networks. Socket Programming in C

Socket Programming. CSIS0234A Computer and Communication Networks. Socket Programming in C 1 CSIS0234A Computer and Communication Networks Socket Programming in C References Beej's Guide to Network Programming Official homepage: http://beej.us/guide/bgnet/ Local mirror http://www.cs.hku.hk/~c0234a/bgnet/

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer Networking: A Top

More information

MSc Integrated Electronics Networks Assignment. Investigation of TCP/IP Sockets and Ports. Gavin Cameron

MSc Integrated Electronics Networks Assignment. Investigation of TCP/IP Sockets and Ports. Gavin Cameron MSc Integrated Electronics Networks Assignment Investigation of TCP/IP Sockets and Ports Gavin Cameron Introduction TCP and IP (Transmission Control Protocol / Internet Protocol) are two protocols from

More information

Getting Started with PetaLinux SDK

Getting Started with PetaLinux SDK Getting Started with PetaLinux SDK November 26, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 Getting Started...3 Prerequisites...3 Installation...4

More information

Create Test Environment

Create Test Environment Create Test Environment Describes how to set up the Trafodion test environment used by developers and testers Prerequisites Python Passwordless ssh If you already have an existing set of ssh keys If you

More information

IP Addresses, DNS. CSE 333 Summer Teaching Assistants: Renshu Gu William Kim Soumya Vasisht

IP Addresses, DNS. CSE 333 Summer Teaching Assistants: Renshu Gu William Kim Soumya Vasisht IP Addresses, DNS CSE 333 Summer 2018 Instructor: Hal Perkins Teaching Assistants: Renshu Gu William Kim Soumya Vasisht Lecture Outline Network Programming Sockets API Network Addresses DNS Lookup 2 Files

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

Socket Programming. #In the name of Allah. Computer Engineering Department Sharif University of Technology CE443- Computer Networks

Socket Programming. #In the name of Allah. Computer Engineering Department Sharif University of Technology CE443- Computer Networks #In the name of Allah Computer Engineering Department Sharif University of Technology CE443- Computer Networks Socket Programming Acknowledgments: Lecture slides are from Computer networks course thought

More information

A Client-Server Exchange

A Client-Server Exchange Socket programming A Client-Server Exchange A server process and one or more client processes Server manages some resource. Server provides service by manipulating resource for clients. 1. Client sends

More information

Getting Started with The ThingWorx C SDK on the Raspberry PI

Getting Started with The ThingWorx C SDK on the Raspberry PI Getting Started with The ThingWorx C SDK on the Raspberry PI Setting up your.irst Raspberry PI can be a challenge. Combining it with setting up and using the ThingWorx C-SDK to expose some simple properties

More information

RG-MACC-BASE_v2.01. Installation Guide

RG-MACC-BASE_v2.01. Installation Guide RG-MACC-BASE_v2.01 Preface Thank you for using our products. Audience This manual is intended for: Network engineers Technical support and servicing engineers Network administrators Symbols Important information.

More information

How do we Communicate? Introduction to Unix Network Programming. What does Alice do? What does Bob do? Two simplest networking programs

How do we Communicate? Introduction to Unix Network Programming. What does Alice do? What does Bob do? Two simplest networking programs Introduction to Unix Network Programming Reference: Stevens Unix Network Programming How do we Communicate? Send a mail from Alice to Bob Bob Alice in Champaign, Bob in Hollywood Example: US Postal Service

More information

Enabling CDC_ETHER Connection for Skywire GSM CAT1

Enabling CDC_ETHER Connection for Skywire GSM CAT1 Enabling CDC_ETHER Connection for Skywire GSM CAT1 NimbeLink Corp Updated: February 2018 PN 30262 rev 4 NimbeLink Corp. 2018. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction

More information

CSE 333 Lecture network programming intro

CSE 333 Lecture network programming intro CSE 333 Lecture 17 -- network programming intro Hal Perkins Paul G. Allen School of Computer Science & Engineering University of Washington Administrivia HW3 due Thursday night HW4 out Friday morning -

More information

Introduction to Lab 2 and Socket Programming. -Vengatanathan Krishnamoorthi

Introduction to Lab 2 and Socket Programming. -Vengatanathan Krishnamoorthi Introduction to Lab 2 and Socket Programming -Vengatanathan Krishnamoorthi Before we start.. Soft deadline for lab 2- February 13 Finish assignment 1 as soon as possible if you have not yet. Hard deadline

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University 1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)

More information

Elementary TCP Sockets

Elementary TCP Sockets Elementary TCP Sockets Chapter 4 UNIX Network Programming Vol. 1, Second Ed. Stevens Distributed Computer Systems 1 socket interface Application 1 Application 2 socket interface user kernel user kernel

More information

Practical Exercises in Computer Networks

Practical Exercises in Computer Networks Practical Exercises in Computer Networks Wall clock time in Distributed Systems 2015-16 by José María Foces Morán 1. Wall clock time and the ICMP protocol One of the functions of the icmp protocol allows

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Tian Song ( 嵩天 ), Ph.D., Assoc. Prof. songtian@bit.edu.cn Introduction to Computer Networks Socket and Network Programming Tian Song ( 嵩天 ), Ph.D., Assoc. Prof. songtian@bit.edu.cn

More information

Accessing the Networking Stack

Accessing the Networking Stack The Cisco IOS XR Software serves as a networking stack for communication. This section explains how applications on IOS XR can communicate with internal processes, and with servers or outside devices.

More information

CS 640: Computer Networking

CS 640: Computer Networking CS 640: Computer Networking Yu-Chi Lai Lecture 3 Network Programming Topics Client-server model Sockets interface Socket primitives Example code for echoclient and echoserver Debugging With GDB Programming

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA - Dong-Yun Lee (dylee@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating

More information

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018 GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux

More information

Tutorial on Socket Programming

Tutorial on Socket Programming Tutorial on Socket Programming Computer Networks - CSC 458 Department of Computer Science Hao Wang (Slides are mainly from Seyed Hossein Mortazavi, Monia Ghobadi, and Amin Tootoonchian, ) 1 Outline Client-server

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA Sanghoon Han(sanghoon.han@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Announcement (1) Please come

More information

CS118 Discussion 1B, Week 1. Taqi Raza BUNCHE 1209B, Fridays 12:00pm to 1:50pm

CS118 Discussion 1B, Week 1. Taqi Raza BUNCHE 1209B, Fridays 12:00pm to 1:50pm CS118 Discussion 1B, Week 1 Taqi Raza BUNCHE 1209B, Fridays 12:00pm to 1:50pm 1 TA Taqi, PhD student in Computer Networking Discussion (1B): Bunche 1209, Fri 12:00 1:50 p.m. Office hours: Boelter Hall

More information

NVIDIA Professional Application Center

NVIDIA Professional Application Center NVIDIA Professional Application Center Network Licensing Guide 5 May 2017 Document version 2.0 Copyright Information 2017 NVIDIA Corporation. All rights reserved. This document is protected under copyright

More information

Hostname and IP Address

Hostname and IP Address 1/19 IP Addressing Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Hostname and IP Address 2/19 browser What is the IP address of www.isoc.org? www.isoc.org

More information

Essential Unix and Linux! Perl for Bioinformatics, ! F. Pineda

Essential Unix and Linux! Perl for Bioinformatics, ! F. Pineda Essential Unix and Linux! Perl for Bioinformatics, 140.636! F. Pineda Generic computer architecture Memory Storage Fig. 1.2 From Designing Embedded Hardware, 2 nd Ed. by John Catsoulis OS concepts Shell

More information

StampA5D3x/PortuxA5/PanelA5. Quickstart Guide

StampA5D3x/PortuxA5/PanelA5. Quickstart Guide StampA5D3x/PortuxA5/PanelA5 Quickstart Guide StampA5D3x/PortuxA5/PanelA5 StampA5D3x/PortuxA5/PanelA5: Quickstart Guide Copyright 2015 taskit GmbH All rights to this documentation and to the product(s)

More information

Piotr Mielecki Ph. D.

Piotr Mielecki Ph. D. Piotr Mielecki Ph. D. http://mielecki.ristel.pl/ piotr.mielecki@pwr.edu.pl pmielecki@gmail.com Building blocks of client-server applications: Client, Server, Middleware. Simple client-server application:

More information

These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement

These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement Copyright 2017, fp Technologies, Inc. All Rights Reserved These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement You will need to

More information

The UFC-6000 can measure the frequency of a signal from 1 to 6000 MHz. Mini-Circuits

The UFC-6000 can measure the frequency of a signal from 1 to 6000 MHz. Mini-Circuits Wide Frequency Range RF Frequency Counter 1-6000 MHz The Big Deal USB HID device compatible with 32/64 bit operating systems Wide Frequency Range Uses internal or External reference Supplied with proprietary

More information

Ports under 1024 are often considered special, and usually require special OS privileges to use.

Ports under 1024 are often considered special, and usually require special OS privileges to use. 1 2 Turns out that besides an IP address (used by the IP layer), there is another address that is used by TCP (stream sockets) and, coincidentally, by UDP (datagram sockets). It is the port number. It's

More information

last time redo logging copy-on-write filesystems / snapshots distributed systems motivation, etc.

last time redo logging copy-on-write filesystems / snapshots distributed systems motivation, etc. Sockets / RPC 1 last time 2 redo logging write log + commit, then do operation on failure, check log redo anything marked committed in log copy-on-write filesystems / snapshots distributed systems motivation,

More information

UNIX Sockets. COS 461 Precept 1

UNIX Sockets. COS 461 Precept 1 UNIX Sockets COS 461 Precept 1 Socket and Process Communica;on application layer User Process Socket transport layer (TCP/UDP) OS network stack network layer (IP) link layer (e.g. ethernet) Internet Internet

More information

Configuring a Standalone VCL Environment using VMware Server 2.0

Configuring a Standalone VCL Environment using VMware Server 2.0 Configuring a Standalone VCL Environment using VMware Server 2.0 DISCLAIMER! This document provides instuctions for configuring a standalone VCL environment running on a single computer which is able to

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

CSC209H Lecture 9. Dan Zingaro. March 11, 2015

CSC209H Lecture 9. Dan Zingaro. March 11, 2015 CSC209H Lecture 9 Dan Zingaro March 11, 2015 Socket Programming (Kerrisk Ch 56, 57, 59) Pipes and signals are only useful for processes communicating on the same machine Sockets are a general interprocess

More information

Exercise 1: Basic Tools

Exercise 1: Basic Tools Exercise 1: Basic Tools This exercise is created so everybody can learn the basic tools we will use during this course. It is really more like a tutorial than an exercise and, you are not required to submit

More information

Configuring the BeagleBone Black s Ethernet Port for SSH Access

Configuring the BeagleBone Black s Ethernet Port for SSH Access Configuring the BeagleBone Black s Ethernet Port for SSH Access NimbeLink Corp Updated: April 2016 PN 30112 rev 1 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction

More information

TABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2

TABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LAB REFERENCE & TOPOLOGY INFORMATION... 3 3 DELETE THE EXISTING OUT OF BAND NODE MANAGEMENT ADDRESSES CONFIGURATION FOR YOUR DESIGNATED ACI FABRIC... 4 4 CONFIGURE

More information

CSE 333 Lecture 8 - file and network I/O

CSE 333 Lecture 8 - file and network I/O CSE 333 Lecture 8 - file and network I/O Steve Gribble Department of Computer Science & Engineering University of Washington CSE333 lec 8 net // 04-13-12 // gribble Administrivia HW1 was due yesterday

More information

Sockets. Dong-kun Shin Embedded Software Laboratory Sungkyunkwan University Embedded Software Lab.

Sockets. Dong-kun Shin Embedded Software Laboratory Sungkyunkwan University  Embedded Software Lab. 1 Sockets Dong-kun Shin Embedded Software Laboratory Sungkyunkwan University http://nyx.skku.ac.kr Echo Client (1) 2 #include #include #include #include

More information

Lecture 2. Outline. Layering and Protocols. Network Architecture. Layering and Protocols. Layering and Protocols. Chapter 1 - Foundation

Lecture 2. Outline. Layering and Protocols. Network Architecture. Layering and Protocols. Layering and Protocols. Chapter 1 - Foundation Lecture 2 Outline Wireshark Project 1 posted, due in a week Lab from a different textbook Work through the lab and answer questions at the end Chapter 1 - Foundation 1.1 Applications 1.2 Requirements 1.3

More information

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX CHAPTER 7 DEMONSTRATE THE PAN IN LINUX SYSTEM The new model - Network Access Point Group Network 7.1 DEMONSTRATION Software: All machines are installed with Linux Redhat 8.0 Hardware list:- There are two

More information

RF SP6T Switch Matrix

RF SP6T Switch Matrix USB & Ethernet Controlled 50Ω DC to 26.5 GHz The Big Deal Dual mechanical SP6T switch Excellent performance to 26.5 GHz High reliability, 2 million switch cycles 5W power rating (cold switching) Case Style:

More information