Supplementary Material

Size: px
Start display at page:

Download "Supplementary Material"

Transcription

1 Supplementary Material (fr Parasitic Cmputing, by Albert-László Barabási, et al.) 1 Encding 3-SAT prblem using TCP checksum In the checksum, ne can use up t three variables withut verflw, as. Thus a 3- SAT prblem can be encded in a way similar t the 2-SAT implementatin described in the manuscript, assuming that there are apprpriate peratrs whse lgical tables match the checksum. There are 3 different peratins in additin t the NOT peratr fr each variable that can be perfrmed by the TCP checksum. (Nte: that the slutin t the 2-SAT prblem uses AND and XOR between variables and NOT peratr.) Operatin I: ALL TRUE (AND) crrespnding t "!# %$'& Operatin II: TWO TRUE crrespnding t (*) +-,./ :8<;=,>71)/,>?@. 8:AB,>7C8<467CD8 %E % F GHGI"!J $K& () +0 LM. N4POQ0R :8<;=,>71)/,>?@. 8:AB,>7C8<467CD8 6S "!UT S V"!UT S "! 6S T S T S "!W XT W!W TV"!U Operatin III: ONE TRUE crrespnding t - %F ZY [Y/\! $'& () +]0 L@. N0 L8< :8Q;I,>71)/,>?M. 8:A') AZ4679D8 X S S "!UT 6S S "!UT 6S S ^V"! XT T "!U 6S T S W!W 6S T S "!W 6S KT S Z! Fr peratins II and III, (x:y:z) and (x.y.z), the first definitin lks simple, hwever, because we are using Cnjunctive Nrmal Frm (cnnected with AND( ) between clauses) it is mre apprpriate t use the secnd definitin. Althugh a 2-SAT prblem is nt NP-cmplete, a mixed prblem, where any number (greater than zer) f 3-SAT clauses is cmbined with 2-SAT clauses, is NP-cmplete. T illustrate the use f these peratrs, cnsider the fllwing sentence with eight variables Z_àb "`:Y/Y/Y/àdc : #_Y d "Y beh!f 6S Z_<GHbghG S dï!w 6S d ' S beb dj!u bg"y S dj Y Zk!f b "Y di"y S #k>!w deg S dihghdc!w b GHdjhGHbc!U 6S #_ly be"y dj! The nly slutin is `:F `:F `: `:F `: `:F `m!. The checksum that wuld frce TCP t drp everything but the crrect slutin has the frm As a test we have implemented their 3-SAT prblems as well as described in n Cmputing with TCP Our implementatin f parasitic cmputing explits a reliability mechanism in the transmissin cntrl prtcl (TCP). The sender f a TCP segment cmputes a checksum ver the entire segment, which prvides 1

2 F Vers Service Packet Length Identificatin Fragment ffset Time t live Prtcl IP header checksum IP surce address IP destinatin address TCP surce prt TCP destinatin prt Sequence number Acknwledgment number TCP hdr Len IP hdr Len IP Flags Unused TCP Flags Windw size TCP checksum Urgent pinter a b IP Header TCP Header Data Figure 1: TCP/IP segment used fr parasitic cmputing reliability against bit errrs that might ccur in transprt. It inserts the cmplement f the checksum in the message. The receiver als cmputes a checksum in rder t verify data integrity. The receiver drps an entire segment if its checksum des nt add up, assuming that the message was crrupted in transit. Because TCP is reliable, a sender will retransmit each segment until it is acknwledged by the receiver [1, 2]. We explit the TCP checksum t answer the fllwing questin: Is p equal t q? The checksum value in a TCP packet is determined by q. The data cntains 16-bit wrds and p. TCP pr cmputes the checksum, if q, then TCP rejects the segment. Therefre, a message is a valid TCP pb segment if and nly if q. p< Suppse ne needs t find tw numbers which add up t a certain value, q. One culd generate guesses fr and p, add them, and test if the sum is equal t q. The checksum mechanism f TCP can be used t slve this prblem. First, cmpute a checksum fr the answer, q, as the data part f the the TCP segment. Next, send a TCP segment where the data part cntains candidate addends ts and pvu, as shwn belw. TCP header q s... w\x w\x... data p u Dummy packet fr cmputing checksum Slutin packet Finally, cntinue t send TCP segments until ne is received meaning that the checksum was verified. Fr p u r any s q, the TCP segment is drpped because the checksum verificatin fails. Cnsequently, nly ypz the crrect slutin (where q ) is a well-frmed TCP segment. The checksum in the TCP header is w{x nt q because the checksum cmputatin is cmputed ver the entire header and it is cmplemented. If the header fields are the same, the checksum cmputed fr a packet with and p as data is the same as that cmputed fr a packet with q and F (pad t keep length the same). Figure 1 shws a schematic diagram f the specially cnstructed TCP segment that is used in ur explit. The first 20 bytes are the IP header, the next 20 are the TCP header, and the last 4 bytes are the data. The 2

3 } Initiatr Nde Acceptr Nde Time SYN SYN+ACK ACK Cnnectin Established Figure 2: Establishing a TCP cnnectin. values f and p and the checksum (w{x ) are shwn in blue. TCP is a cnnectin-riented prtcl meaning that a cnnectin must first be established befre data is sent. A cnnectin is established with three messages, see Figure 2. First, the initiatr sends a SYN (the TCP SYN flag is set) t a remte nde. If the remte nde is willing t accept a new cnnectin, it respnds with a SYN/ACK (bth the SYN and ACK flags are set) message. Finally, the initiatr sends an ACK message [1, 2]. In these messages ndes exchange initial sequence numbers. The test TCP segments, cnstructed as abve, are sent fllwing the establishment f a cnnectin. Because we are cnnecting t an HTTP server, the respnse received depends n the cnfiguratin f the server. Hwever, all we care abut is whether there is a respnse r nt. The crrect slutin results in a valid TCP segment, but it is nt a valid HTTP request. Therefre, the respnse will be smething like that in Figure 3. 3 Algrithm An 8-variable 2-SAT prblem prblem is shwn belw. _Z!U e g!w _Z S g!w ' i!u e j!f g k!w j' c!u ' g! The slutin vectr, }, has 8 elements that can range ver 0 and 1. Thus there are E c ~ `:F `: `: `: `: `: `:F ƒ. The nly crrect slutin t (1) is: } specially cnstructed TCP/IP packet, as shwn in Figure 1. The high-level algrithm is: S = create TCP segment S.checksum = checksum freach } s@ S.data = pad with zeres( } s ) send S receive answer if answer = true write } s is a slutin (1) pssible slutins fr. Our algrithm tests each slutin using a First, we create a TCP segment that cntains all the standard header infrmatin required by the prtcl. Next the checksum field is set. The slutin determines the checksum, as discussed in Figure 3 in the text; 3

4 q q <html> <head> <Title> Ntre Dame Cmputer Science and Engineering </Title> </head> <bdy bgclr=white> <center> <img align=middle src= alt="[ U_N_I_V_E_R_S_I_T_Y f N_O_T_R_E D_A_M_E ]"> <h1></h1><h2><p> That feature is nt implelemented n this server (501): <br> /index.html < <H2> If yu feel this message is in errr, please cntact <br> <em><a href="mailt:www@ </em></h2> <H4> Please include the full URL that yu are trying t access, <br>r we may nt be able t prvide yu with any assistance.<br><p> <img align=bttm src= <p> <a href= <img align=tp src= alt="[back TO ND CSE HOME PAGE]"></a> </center> </bdy></html> Figure 3: Respnse frm HTTP server therefre, there is a single checksum fr all tests. In the main lp f the algrithm, a test slutin is placed int the data field f the segment. Then the packet is sent, and we wait fr an answer. A crrect slutin induces a respnse frm the remte nde. Therefre, a respnse means a crrect slutin. An incrrect slutin is deduced by nt receiving a respnse. This is dne by timing ut: if a respnse is nt received within a certain amunt f time it is presumed a negative answer. This is discussed in greater detail in n 2 and n 4. 4 Implementatins In ur implementatin a single master nde cntrls the executin f the algrithm. There are several ways t implement the basic algrithm discussed abve. The tw majr chices are (a) cncurrency and (b) cnnectin reuse. Regarding (a), the master nde can have many cmputatins ccurring in the web cncurrently. Each cncurrent cmputatin requires a separate TCP cnnectin t a HTTP hst. Regarding (b), befre a TCP cnnectin can be used, it must be established. Once established, TCP segments can be sent t the remte hst. When multiple guesses are sent in ne cnnectin, it is impssible p:_` _K pa ` ^ t knw t which guess a crrect slutin refers t. Fr example, suppse guess and are sent ne after the ther in a single cnnectin. Further suppse that nly ne slutin is crrect. We expect t get ne respnse back. But we cannt tell t which slutin the respnse refers. The implementatin used in this paper is a prttype that is nt designed fr efficiency f executin. In ur prttype implement there is n cncurrency and each cnnectin is used fr exactly ne cmputatin. 4

5 4.1 Reliable Cmmunicatins Any message can get lst. In a reliable system, the sender f a message saves a cpy f the message and waits fr an acknwledgement f the message. If after sme time, the sender has nt received an acknwledgement, it will re-send the message (frm the cpy). The sender will cntinue t d this until an acknwledgement is received. In general, there is n upper bund n hw lng a message might take t be delivered. Cnsequently, in a distributed system, it is nt pssible t distinguish between a lst message and a delayed message. Therefre, a message is assumed lst after sme time-ut perid. A time-ut value that is t small declares t many delayed messages as lst. On the ther hand, a value that is t large unnecessarily slws dwn the system. Our explit circumvents the reliability mechanism in TCP. Furthermre, because an invalid slutin fails the checksum, it is as if it never arrived. Therefre, the receiver will nt send an acknwledgement f the message. There are tw undesirable utcmes that culd ccur: A false negative ccurs when a packet fr a valid slutin is drpped due t a data crruptin r cngestin, and A false psitive ccurs when a bit errr changes an invalid result int an valid result. The latter is very rare statistically and all but impssible in practice. Althugh the frmer is als unusual, it is frequent enugh that it shuld be cnsidered further. First, let s cnsider the errrs that are caught by the TCP checksum. Every transmissin link (hardware devices such as ethernet) cmputes a checksum n its packets. The TCP checksum catches errrs that pass the link checksum, but still have sme data crruptin. Because the data was nt damaged in transmissin (where it wuld have been caught by the transmissin link checksum), it must have ccurred in an intermediate system (ruter, bridge, gateway, etc.) r at an end pint (sender r receiver) [3]. Such errrs ccur very infrequently. Research shws that the TCP checksum fails abut 1 in E _ ˆ messages [4]. The prbability f receiving a false psitive is the prbability f a errr times the prbability that it changes an invalid slutin int a valid slutin. The prbability f the latter event is infinitesimal. Secnd, an IP packet might be drpped due t data crruptin r cngestin. The rdinary TCP reliability mechanism handles this, but it is disabled in ur prttype. Our test shw false negatives ccur between 1 in abut 100 and less than 1 in 17,000. The errr rate is strngly crrelated with the distance (number f hps) between end pints. 4.2 Dealing with an Unreliable System This sectin describes tw appraches t using this unreliable system. First, ne culd ask every questin multiple times. The prbability f false negatives is almst certainly uncrrelated. Therefre, if Š is the the likelihd prbability f a false negative, then Š{ is the prbability f Œ false negative. Because ŠV f a false negative all but disappears fr small values f Œ. Secnd, ne culd ask a questin, Ž S, and its cmplement, Ž. Absent any errrs, ne will get exactly ne respnse. If n respnse is received, ne must assume that a prblem ccurred. Then, the questins shuld be asked again. This slutin results in a reliable system, but requires the every questin als have a cmplement. 5

6 ! F F u q E 4.3 Implementing the 3-SAT Prblem The 3-SAT prblem has three variables per clause. This easily can be supprted with the prttype. The algrithm described in n 3 des nt have t be mdified. The nly change is t hw the packet is cnstructed. Each candidate slutin cntains three 16-bit wrds, which are added tgether and cmpared t answer the pz questin: Is q equal t? The sender cmputes the checksum ver three 16-bit wrds and the header, as shwn belw. TCP header s... w\ w\... data p u Dummy packet fr cmputing checksum Slutin packet The data part f the packet cntains three data wrds. Data wrds are cnstructed with zer padding, as dne in the 2-SAT prblem. On the receiver side, a checksum in cmputed ver the TCP packet just as befre. A respnse is sent p nly if q des indeed equal. The nly difference is between this and the 2-SAT prblem, is that the packet is 2 bytes lnger. 5 Scalability Definitin f 3-SAT prblem: 3-SAT is a special case f the satisfiability prblem whereby all frmulae are in a special frm. A literal is a Blean variable r a negated Blean variable, as in r S. A clause is several literals cnnected with ORs, as in _ T S T S e!. A Blean frmula is in cnjunctive nrmal frm, called a CNF-frmula, if all clauses are cnnected with ANDs, as in Z_ZT S b 'T S de't^bg"!w de't S dibt bjh!f dg't^bi't S dj!6y It is a 3CNF-frmula if all the clauses have exactly three literals, as in Z_ZT S d BT S bë!w de't S dibt dj!u be't S bj Tdg"!6Y 6 The 3-SAT prblem is determining the satisfiability f a 3CNF-frmula. It is pssible t reduce any %! - SAT prblem int a 3-SAT prblem. First, if a frmula has mixed ANDs and ORs, by the distributive laws, X T "! ^[!ft V\!6` XT "! T^[!f TV\!6` we can replace an OR f ANDs with an equivalent AND f ORs. Ding s may significantly increase the size f each sub-frmula, but nly by cnstant factr. By this prcess, we have written the frmula in CNF. All that remains is t make all clauses cntain three literals. In each clause that currently has ne r tw literals, replicate ne literal until the ttal number is three. In each clause that has mre than three literals, split it int several clauses and add additinal variables t preserve the satisfiability r nn-satisfiability f the riginal. _[T ZT e#t g! Fr example, the fllwing clause _[T #T "!I 6S T e#t g! is replaced with where z is a new variable. It is straightfrward t extend this int the clause cntaining Œ literals. Fr example, _ft <TXY/Y/YHT can be rewritten with the Œ _ft <TXt_!d 6S t_ft e<tx9![ 6S 9 T g<t clauses 9e"!fVY/Y/Y" 6S l š e T prblem. š _ T! Therefre, it is always pssible t reduce 6! -SAT prblem int 3-SAT 6

7 References [1] Stevens, W. R TCP/IP Illustrated. Addisn-Wesley, Reading, Massachusetts. [2] Fruzan, B. A TCP/IP Prtcl Suite. McGraw-Hill, Bstn, Massachusetts. [3] Jnathan Stne and Craig Partridge. When the CRC and TCP checksum disagree. In SIGCOMM 2000, September [4] Jnathan Stne, Michael Greenwald, Craig Partridge, and Jim Hughes. Perfrmance f checksums and CRCs ver real data. IEEE Trans. n Netwrks, Octber

Transmission Control Protocol Introduction

Transmission Control Protocol Introduction Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 9 2016 v5.1 Answers 100% 1. Which tw characteristics are assciated with UDP sessins? (Chse tw.) Destinatin devices receive traffic with minimal delay. Transmitted data segments are tracked.

More information

1 Version Spaces. CS 478 Homework 1 SOLUTION

1 Version Spaces. CS 478 Homework 1 SOLUTION CS 478 Hmewrk SOLUTION This is a pssible slutin t the hmewrk, althugh there may be ther crrect respnses t sme f the questins. The questins are repeated in this fnt, while answers are in a mnspaced fnt.

More information

(ii). o IP datagram packet is payload of a TCP segment o TCP segment is payload of an IP datagram. (iii).

(ii). o IP datagram packet is payload of a TCP segment o TCP segment is payload of an IP datagram. (iii). CSC 344: Cmputer Netwrks Review Questins 1. Select the crrect answer amng the chices by placing a checkmark next t the right statement. (i). ARP (Address Reslutin Prtcl) is used t btain IP address fr a

More information

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words,

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words, The transprt layer An intrductin t prcess t prcess cmmunicatin CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Transprt-layer services Prvides fr lgical cmmunicatin* between applicatin

More information

Telecommunication Protocols Laboratory Course

Telecommunication Protocols Laboratory Course Telecmmunicatin Prtcls Labratry Curse Lecture 2 March 11, 2004 http://www.ab.fi/~lpetre/teleprt/teleprt.html 1 Last time We examined sme key terms: prtcl, service, layer, netwrk architecture We examined

More information

Chapter 6 Delivery and Routing of IP Packets. PDF created with FinePrint pdffactory Pro trial version

Chapter 6 Delivery and Routing of IP Packets. PDF created with FinePrint pdffactory Pro trial version Chapter 6 Delivery and Ruting f IP Packets PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline Cnnectin Delivery Ruting methds Static and dynamic ruting Ruting table and mdule

More information

Chapter 2. The OSI Model and TCP/IP Protocol Suite. PDF created with FinePrint pdffactory Pro trial version

Chapter 2. The OSI Model and TCP/IP Protocol Suite. PDF created with FinePrint pdffactory Pro trial version Chapter 2 The OSI Mdel and TCP/IP Prtcl Suite PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline THE OSI MODEL LAYERS IN THE OSI MODEL TCP/IP PROTOCOL SUITE ADDRESSING TCP/IP

More information

Link-layer switches. Jurassic Park* LANs with backbone hubs are good. LANs with backbone hubs are bad. Hubs, bridges, and switches

Link-layer switches. Jurassic Park* LANs with backbone hubs are good. LANs with backbone hubs are bad. Hubs, bridges, and switches Link-layer switches Jurassic Park* Hubs, bridges, and switches CS4 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege *A multi-tier hub design. Switches 0- LANs with backbne hubs are gd. Prvide

More information

Using SPLAY Tree s for state-full packet classification

Using SPLAY Tree s for state-full packet classification Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,

More information

Getting it there in one piece

Getting it there in one piece Getting it there in ne piece Service mdel and implementatin Principles f reliable data transfer CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Reliable transfer 9-2 Terminlgy Finite

More information

Data Link Layer 10/28/2013. Data Link Layer. Adaptors Communicating. Data Link Layer. Session Transport Network Data Link Physical

Data Link Layer 10/28/2013. Data Link Layer. Adaptors Communicating. Data Link Layer. Session Transport Network Data Link Physical /28/23 Data Link Layer Department f Cmputer and IT Engineering University f Kurdistan Data Cmmunicatin Netwtks (Graduate level) Data Link Layer By: Dr. Alireza Abdllahpuri 2 Data Link Layer Applicatin

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as: Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties

More information

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02)

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02) Lab 3 Packet Scheduling Due Date: Lab reprt is due n Mar 6 (PRA 01) r Mar 7 (PRA 02) Teams: This lab may be cmpleted in teams f 2 students (Teams f three r mre are nt permitted. All members receive the

More information

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first

More information

Linking network nodes

Linking network nodes Linking netwrk ndes The data link layer CS242 Cmputer Netwrks The link layer The transprt layer prvides cmmunicatin between tw prcesses. The netwrk layer prvides cmmunicatin between tw hsts. The link layer

More information

1. What is a characteristic of Frame Relay that provides more flexibility than a dedicated line?

1. What is a characteristic of Frame Relay that provides more flexibility than a dedicated line? CCNA 4 Chapter 4 v5.0 Exam Answers 2015 (100%) 1. What is a characteristic f Frame Relay that prvides mre flexibility than a dedicated line? Dedicated physical circuits are installed between each site.

More information

TRAINING GUIDE. Overview of Lucity Spatial

TRAINING GUIDE. Overview of Lucity Spatial TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

DNS (Domain Name Service)

DNS (Domain Name Service) mywbut.cm DNS (Dmain Name Service) The internet primarily uses IP addresses fr lcating ndes. Hwever, its humanly nt pssible fr us t keep track f the many imprtant ndes as numbers. Alphabetical names as

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2013 Lab 1 - Calculatr Intrductin Reading Cncepts In this lab yu will be

More information

FIREWALL RULE SET OPTIMIZATION

FIREWALL RULE SET OPTIMIZATION Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue

More information

Network Protocol Design (ITC8061) - Part II -

Network Protocol Design (ITC8061) - Part II - Netwrk Prtcl Design (ITC8061) - Part II - utline v 3.1 Transprt-layer services v 3.2 Multiplexing and demultiplexing v 3.3 Cnnectinless transprt: UDP v 3.4 Principles f reliable data transfer v 3.5 Cnnectinriented

More information

Lab 5 Sorting with Linked Lists

Lab 5 Sorting with Linked Lists UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces

More information

Chapter 6: Lgic Based Testing LOGIC BASED TESTING: This unit gives an indepth verview f lgic based testing and its implementatin. At the end f this unit, the student will be able t: Understand the cncept

More information

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader Hughes BGAN-X 9211 Upgrader User Guide (Mac) Rev 1.2 (6-Jul-17) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9211 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is

More information

Max 8/16 and T1/E1 Gateway, Version FAQs

Max 8/16 and T1/E1 Gateway, Version FAQs Frequently Asked Questins Max 8/16 and T1/E1 Gateway, Versin 1.5.10 FAQs The FAQs have been categrized int the fllwing tpics: Calling Calling Cmpatibility Cnfiguratin Faxing Functinality Glssary Q. When

More information

The programming for this lab is done in Java and requires the use of Java datagrams.

The programming for this lab is done in Java and requires the use of Java datagrams. Lab 2 Traffic Regulatin This lab must be cmpleted individually Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic regulatin, called a leaky bucket, that runs ver a real netwrk.

More information

Practical Exercises in Computer Networks and Distributed Systems

Practical Exercises in Computer Networks and Distributed Systems (V..6, Nv 2) Practical Exercises in Cmputer Netwrks and Distributed Systems Stream Sckets and the Client/Server mdel (C language, W) 2-, Jsé María F Mrán This practical illustrates basic cncepts prtcl

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast

More information

CS1150 Principles of Computer Science Midterm Review

CS1150 Principles of Computer Science Midterm Review CS1150 Principles f Cmputer Science Midterm Review Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang CS1150 UC. Clrad Springs Office hurs 10/15, Mnday, 12:05 12:50pm 10/17, Wednesday

More information

Overview of OPC Alarms and Events

Overview of OPC Alarms and Events Overview f OPC Alarms and Events Cpyright 2016 EXELE Infrmatin Systems, Inc. EXELE Infrmatin Systems (585) 385-9740 Web: http://www.exele.cm Supprt: supprt@exele.cm Sales: sales@exele.cm Table f Cntents

More information

Procurement Contract Portal. User Guide

Procurement Contract Portal. User Guide Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5

More information

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%)

CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) 1. Which tw netwrk design features require Spanning Tree Prtcl (STP) t ensure crrect netwrk peratin? (Chse tw.) static default rutes implementing VLANs t

More information

2. Which command can be used to view the cable type that is attached to a serial interface?

2. Which command can be used to view the cable type that is attached to a serial interface? CCNA 4 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. At which layer f the OSI mdel des multiplexing take place? Layer 1 Layer 2 Layer 3 Layer 4 2. Which cmmand can be used t view the cable type that is attached

More information

Once the Address Verification process is activated, the process can be accessed by employees in one of two ways:

Once the Address Verification process is activated, the process can be accessed by employees in one of two ways: Type: System Enhancements ID Number: SE 94 Date: June 29, 2012 Subject: New Address Verificatin Prcess Suggested Audience: Human Resurce Offices Details: Sectin I: General Infrmatin fr Address Verificatin

More information

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader Hughes BGAN-X 9202 Upgrader User Guide (Mac) Rev 1.0 (23-Feb-12) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9202 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is

More information

1 Binary Trees and Adaptive Data Compression

1 Binary Trees and Adaptive Data Compression University f Illinis at Chicag CS 202: Data Structures and Discrete Mathematics II Handut 5 Prfessr Rbert H. Slan September 18, 2002 A Little Bttle... with the wrds DRINK ME, (r Adaptive data cmpressin

More information

ECAT-1000 Version Info

ECAT-1000 Version Info ECAT-1000 Versin Inf 11.26.2018 V5.700 Metasys release Fixed issue in Metasys N2 slave driver where COS ntificatins stp being sent t the master. Fixed delays in Metasys N2 COS reprting n high traffic netwrks.

More information

Computer Organization and Architecture

Computer Organization and Architecture Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.

More information

Second Assignment Tutorial lecture

Second Assignment Tutorial lecture Secnd Assignment Tutrial lecture INF5040 (Open Distributed Systems) Faraz German (farazg@ulrik.ui.n) Department f Infrmatics University f Osl Octber 17, 2016 Grup Cmmunicatin System Services prvided by

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule

More information

HP MPS Service. HP MPS Printer Identification Stickers

HP MPS Service. HP MPS Printer Identification Stickers HP MPS Service We welcme yu t HP Managed Print Services (MPS). Fllwing yu will find infrmatin regarding: HP MPS printer identificatin stickers Requesting service and supplies fr devices n cntract Tner

More information

Service commands: RETR, STOR, STOU, APPE, ALLO, REST, RNFR, RNTO, ABOR, DELE, RMD, MRD, PWD, LIST, NLST, SITE, SYST, STAT, HELP, NOOP.

Service commands: RETR, STOR, STOU, APPE, ALLO, REST, RNFR, RNTO, ABOR, DELE, RMD, MRD, PWD, LIST, NLST, SITE, SYST, STAT, HELP, NOOP. Chapter 2 Prblems Prblem a) F b) T c) F d) F e) F Prblem 2 Access cntrl cmmands: USER, PASS, ACT, CWD, CDUP, SMT, REI, QUIT Transfer parameter cmmands: PORT, PASV, TYPE STRU, MODE Service cmmands: RETR,

More information

TN How to configure servers to use Optimise2 (ERO) when using Oracle

TN How to configure servers to use Optimise2 (ERO) when using Oracle TN 1498843- Hw t cnfigure servers t use Optimise2 (ERO) when using Oracle Overview Enhanced Reprting Optimisatin (als knwn as ERO and Optimise2 ) is a feature f Cntrller which is t speed up certain types

More information

COP2800 Homework #3 Assignment Spring 2013

COP2800 Homework #3 Assignment Spring 2013 YOUR NAME: DATE: LAST FOUR DIGITS OF YOUR UF-ID: Please Print Clearly (Blck Letters) YOUR PARTNER S NAME: DATE: LAST FOUR DIGITS OF PARTNER S UF-ID: Please Print Clearly Date Assigned: 15 February 2013

More information

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability Chapter 10: Infrmatin System Cntrls fr System Reliability Part 3: Prcessing Integrity and Availability Cntrls Ensuring Prcessing Integrity Input Prcess Output Input Cntrls Garbage-in Garbage-ut Frm Design

More information

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls* Operatinal Security Firewalls and Intrusin Detectin CS242 Cmputer Netwrks Speaking Frankly The Internet is nt a very safe place Frm ur netwrk administratr s pint f view, the wrld divides int tw camps:

More information

CCNA 3 Chapter 8 v5.0 Exam Answers 2015 (100%) CCNA 5 Page 1

CCNA 3 Chapter 8 v5.0 Exam Answers 2015 (100%)  CCNA 5 Page 1 CCNA 3 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. Refer t the exhibit. All netwrks are active in the same EIGRP ruting dmain. When the aut-summary cmmand is issued n R3, which tw summary netwrks will be

More information

LIN101 RS232 / LAN INTERFACE

LIN101 RS232 / LAN INTERFACE LIN101 24/02/2004 English 1 1. LIN101 LIN101 is a Serial Device Server, the main functin f the LIN101 is t netwrk-enable existing serial devices. Using the LIN101 yu can add an Ethernet prt practically

More information

Systems & Operating Systems

Systems & Operating Systems McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware

More information

Infrastructure Series

Infrastructure Series Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing

More information

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to:

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to: Summary This dcument is a guide intended t guide yu thrugh the prcess f installing and cnfiguring PepleTls 8.55.27 (r current versin) via Windws Remte Applicatin (App). Remte App allws the end user t run

More information

Chapter 5. The Network Layer IP

Chapter 5. The Network Layer IP Chapter 5 The Netwrk Layer IP These slides are taken frm the bk Cmputer etwrking, A Tp Dwn Apprach Featuring the Internet by Kurse & Rss and frm the bk Cmputer etwrks by Andrew Tanenbaum. The Netwrk Layer

More information

HireRight: Step-by-Step Guide

HireRight: Step-by-Step Guide HireRight: Step-by-Step Guide Using HireRight fr Frm I-9 and E-Verify This guide prvides step-by-step prcedures fr using HireRight t cmplete the Emplyment Eligibility Verificatin Frm I-9 and E-Verify check

More information

of Prolog An Overview 1.1 An example program: defining family relations

of Prolog An Overview 1.1 An example program: defining family relations An Overview f Prlg This chaptereviews basic mechanisms f Prlg thrugh an example prgram. Althugh the treatment is largely infrmal many imprtant cncepts are intrduced. 1.1 An example prgram: defining family

More information

Chapter 4. IP Addresses: Classful Addressing. PDF created with FinePrint pdffactory Pro trial version

Chapter 4. IP Addresses: Classful Addressing. PDF created with FinePrint pdffactory Pro trial version Chapter 4 IP Addresses: Classful Addressing Outlines Intrductin Classfuladdressing Other issues A sample Internet 4.1 INTRODUCTION Intrductin IP address, r Internet Address 32-bit binary address Uniquely

More information

Programming Project: Building a Web Server

Programming Project: Building a Web Server Prgramming Prject: Building a Web Server Submissin Instructin: Grup prject Submit yur cde thrugh Bb by Dec. 8, 2014 11:59 PM. Yu need t generate a simple index.html page displaying all yur grup members

More information

2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches?

2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches? CCNA 3 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. Refer t the exhibit. Which switching technlgy wuld allw each access layer switch link t be aggregated t prvide mre bandwidth between each Layer 2 switch

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

Grade 4 Mathematics Item Specification C1 TJ

Grade 4 Mathematics Item Specification C1 TJ Claim 1: Cncepts and Prcedures Students can explain and apply mathematical cncepts and carry ut mathematical prcedures with precisin and fluency. Cntent Dmain: Measurement and Data Target J [s]: Represent

More information

TL 9000 Quality Management System. Measurements Handbook. SFQ Examples

TL 9000 Quality Management System. Measurements Handbook. SFQ Examples Quality Excellence fr Suppliers f Telecmmunicatins Frum (QuEST Frum) TL 9000 Quality Management System Measurements Handbk Cpyright QuEST Frum Sftware Fix Quality (SFQ) Examples 8.1 8.1.1 SFQ Example The

More information

Requesting Service and Supplies

Requesting Service and Supplies HP MPS Service We welcme yu t HP Managed Print Services (MPS). Fllwing yu will find infrmatin regarding: HP MPS printer identificatin stickers Requesting service and supplies fr devices n cntract Tner

More information

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP

More information

1 Getting and Extracting the Upgrader

1 Getting and Extracting the Upgrader Hughes BGAN-X 9202 Upgrader User Guide (PC) Rev 1.0 (23-Feb-12) This dcument explains hw t use the Hughes BGAN-X Upgrader prgram fr the 9202 User Terminal using a PC. 1 Getting and Extracting the Upgrader

More information

Release Notes System Software

Release Notes System Software Release Ntes System Sftware 10.2.5 Cntent Cntent... 1 1 Release 10.2.5.100... 2 1.1 New functins... 2 1.2 Changes... 3 1.3 Errr crrectins... 3 1.4 Knwn Restrictins... 5 Release Ntes 10.2.5 V. 1.0 20181220

More information

CCNA Security v2.0 Chapter 3 Exam Answers

CCNA Security v2.0 Chapter 3 Exam Answers CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin

More information

Ascii Art Capstone project in C

Ascii Art Capstone project in C Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,

More information

Communication across the ether

Communication across the ether Cmmunicatin acrss the ether Ethernet CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Lcal Area Netwrks (LANs) Multiple access prtcls are used fr satellite and wireless channels. They

More information

Scatter Search And Bionomic Algorithms For The Aircraft Landing Problem

Scatter Search And Bionomic Algorithms For The Aircraft Landing Problem Scatter Search And Binmic Algrithms Fr The Aircraft Landing Prblem J. E. Beasley Mathematical Sciences Brunel University Uxbridge UB8 3PH United Kingdm http://peple.brunel.ac.uk/~mastjjb/jeb/jeb.html Abstract:

More information

Computational Methods of Scientific Programming Fall 2008

Computational Methods of Scientific Programming Fall 2008 MIT OpenCurseWare http://cw.mit.edu 12.010 Cmputatinal Methds f Scientific Prgramming Fall 2008 Fr infrmatin abut citing these materials r ur Terms f Use, visit: http://cw.mit.edu/terms. 12.010 Hmewrk

More information

Integrating QuickBooks with TimePro

Integrating QuickBooks with TimePro Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data

More information

Uploading Files with Multiple Loans

Uploading Files with Multiple Loans Uplading Files with Multiple Lans Descriptin & Purpse Reprting Methds References Per the MHA Handbk, servicers are required t prvide peridic lan level data fr activity related t the Making Hme Affrdable

More information

- Replacement of a single statement with a sequence of statements(promotes regularity)

- Replacement of a single statement with a sequence of statements(promotes regularity) ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine

More information

CCNA 1 v5.1 Practice Final Exam Answers %

CCNA 1 v5.1 Practice Final Exam Answers % CCNA 1 v5.1 Practice Final Exam Answers 2016 100% 1. Which term refers t a netwrk that prvides secure access t the crprate ffices by suppliers, custmers and cllabratrs? Internet intranet extranet extendednet

More information

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide HPE AppPulse Mbile Sftware Versin: 2.1 IT Operatins Management Integratin Guide Dcument Release Date: Nvember 2015 Cntents Overview: The IT Operatins Management Integratin 3 System Requirements 3 Hw t

More information

In-Class Exercise. Hashing Used in: Hashing Algorithm

In-Class Exercise. Hashing Used in: Hashing Algorithm In-Class Exercise Hashing Used in: Encryptin fr authenticatin Hash a digital signature, get the value assciated with the digital signature,and bth are sent separately t receiver. The receiver then uses

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput

More information

BMC Remedyforce Integration with Remote Support

BMC Remedyforce Integration with Remote Support BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 8 2016 v5.1 Answers 100% 1. What is a result f cnnecting tw r mre switches tgether? The number f bradcast dmains is increased. The size f the bradcast dmain is increased. The number f cllisin

More information

Author guide to submission and publication

Author guide to submission and publication Authr guide t submissin and publicatin Cntents Cntents... 1 Preparing an article fr submissin... 1 Hw d I submit my article?... 1 The decisin prcess after submissin... 2 Reviewing... 2 First decisin...

More information

Test Pilot User Guide

Test Pilot User Guide Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus

More information

MATH PRACTICE EXAM 2 (Sections 2.6, , )

MATH PRACTICE EXAM 2 (Sections 2.6, , ) MATH 1050-90 PRACTICE EXAM 2 (Sectins 2.6, 3.1-3.5, 7.1-7.6) The purpse f the practice exam is t give yu an idea f the fllwing: length f exam difficulty level f prblems Yur actual exam will have different

More information

CS1150 Principles of Computer Science Methods

CS1150 Principles of Computer Science Methods CS1150 Principles f Cmputer Science Methds Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang CS1150 UC. Clrad Springs Opening Prblem Find the sum f integers frm 1 t 10, frm 20

More information

Gemini Intercom Quick Start Guide

Gemini Intercom Quick Start Guide Gemini Intercm Quick Start Guide 2 Quick Start Guide Cntents Cntents... 1 Overview... 3 First Step unpack and inspect... 3 Netwrk plan and IP addresses... 4 Management PC... 5 Install Sftware... 6 Cnfigure

More information

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55. Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors Cnfiguring Database & SQL Query Mnitring With Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, Nvember, 2013 http://www.sentry-g.cm Be Practive, Nt Reactive! One f the best ways f ensuring a database is

More information

ECE 545 Project Deliverables

ECE 545 Project Deliverables Tp-level flder: _ Secnd-level flders: 1_assumptins 2_blck_diagrams 3_interface 4_ASM_charts 5_surce_cdes 6_verificatin 7_timing_analysis 8_results 9_benchmarking 10_bug_reprts

More information

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure

More information

HP OpenView Performance Insight Report Pack for Quality Assurance

HP OpenView Performance Insight Report Pack for Quality Assurance Data sheet HP OpenView Perfrmance Insight Reprt Pack fr Quality Assurance Meet service level cmmitments Meeting clients service level expectatins is a cmplex challenge fr IT rganizatins everywhere ging

More information

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Prf. Mntek Singh Spring 2019 Lab #7: A Basic Datapath; and a Sprite-Based Display Issued Fri 3/1/19; Due Mn 3/25/19

More information

24-4 Image Formation by Thin Lenses

24-4 Image Formation by Thin Lenses 24-4 Image Frmatin by Thin Lenses Lenses, which are imprtant fr crrecting visin, fr micrscpes, and fr many telescpes, rely n the refractin f light t frm images. As with mirrrs, we draw ray agrams t help

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information