Traffic Shaping (Part 1)
|
|
- Neal Barnard McDaniel
- 6 years ago
- Views:
Transcription
1 Lab 2a Traffic Shaping (Part 1) Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic shaping, called a leaky bucket, that runs ver a real netwrk. The traffic fr testing the leaky bucket will be the Pissn, VBR vide, and LAN traffic traces frm Lab 1. Nte: Lab 2b will be a cntinuatin f this lab. Sftware Tls: The prgramming fr this lab is dne in Java and requires the use f Java datagrams. What t turn in: Turn in a reprt with yur answers t the questins in this lab, including the plts, hard cpies f all yur Java cde, and the annymus feedback frm. Versin 1 (January 27, 2007) Versin 2 (January 28, 2011) Jörg Liebeherr, All rights reserved. Permissin t use all r prtins f this material fr educatinal purpses is granted, as lng as use f this material is acknwledged in all derivative wrks.
2 Table f Cntent Table f Cntent 2 Preparing fr Lab 2a 2 Cmments 2 Part 1. Prgramming with Datagram Sckets and with Files 3 Part 2. Traffic generatrs 5 Part 3. Leaky Bucket Traffic Shaper 7 Feedback Frm fr Lab 2a 13 Preparing fr Lab 2a This lab requires netwrk prgramming with Java datagram sckets. There is an infrmative and shrt tutrial n Java datagrams is available at: Java datagram sckets use the UDP transprt prtcl t transmit traffic. The relatinship between Java datagrams and the UDP prtcl is described in: Cmments Quality f plts in lab reprt: This lab asks yu t prduce plts fr a lab reprt. It is imprtant that the graphs are f high quality. All plts must be prperly labeled. This includes that the units n the axes f all graphs are included, and that each plt has a header line that describes the cntent f the graph. Feedback: T be able t imprve the labs fr future years, we cllect data n the current lab experience. Yu must submit an annymus feedback frm fr each lab. Please use the feedback frm at the end f the lab, and return the frm with yur lab reprt. Extra credit: Cmplete the ptinal Part 4 fr 10% extra credit. Java: In the Unix lab, the default versin f the Java installatin is relatively ld. T access a mre recent versin use the cmmand: Cmpiling: /lcal/java/jdk1.5.0_09/bin/javac Running: /lcal/java/jdk1.5.0_09/bin/java ECE 466 LAB 2A - PAGE 2 J. Liebeherr
3 Part 1. Prgramming with Datagram Sckets and with Files The purpse f this part f the lab is t becme familiar with prgramming Datagram sckets and with writing Java prgrams that read and write data t/frm a file. The prgrams prvided in this part intend t ffer guidance fr the prgramming tasks needed later n. Exercise 1.1 Prgramming with datagram sckets Cmpile and run the fllwing tw prgrams. The prgram Sender.java transmits a string t the receiver ver a datagram scket. The prgram Receiver.java displays the string when it is received. Sender.java Receiver.java imprt java.i.*; imprt java.net.*; public class Sender { public static vid main(string[] args) thrws IOExceptin { InetAddress addr = InetAddress.getByName(args[0]); byte[] buf = args[1].getbytes(); DatagramPacket packet = new DatagramPacket(buf, buf.length, addr, 4444); DatagramScket scket = new DatagramScket(); scket.send(packet); } } imprt java.i.*; imprt java.net.*; public class Receiver { public static vid main(string[] args) thrws IOExceptin { DatagramScket scket = new DatagramScket(4444); byte[] buf = new byte[256]; DatagramPacket packet = new DatagramPacket(buf, buf.length); System.ut.println("Waiting..."); scket.receive(packet); String s = new String(p.getData(), 0, p.getlength()); System.ut.println(p.getAddress().getHstName() + ": " + s); } } Cmpile the prgrams. Start the receiver by running java Receiver. Assuming that the receiver is running n a hst with IP address , start the sender by running: java Sender My String The receiver prgram shuld nw display the string My String. Repeat this exercise, with the difference, that yu run the sender and receiver n tw different hsts. ECE 466 LAB 2A - PAGE 3 J. Liebeherr
4 Exercise 1.2 Reading and Writing data frm a file Dwnlad the Java prgram ReadFileWriteFile.java. The prgram reads an input file "data.txt" which has entries f the frm I P B The file is read line-by-line, the values in a line are parsed and assigned t variables. Then the values are displayed, and written t a file with name utput.txt. Run the prgram with the VBR vide trace frm Lab 1 as input. The vide trace is available at: Mdify the prgram s that it cmputes and displays the average size f the fllwing frame types: I frames; P frames; B frames. ECE 466 LAB 2A - PAGE 4 J. Liebeherr
5 Part 2. Traffic generatrs The gal in this part f the lab is t build a traffic generatr that emulates realistic traffic surces. The traffic generatr is driven by a traffic trace file, i.e., ne f the trace files frm Lab 1. The entries in the file permit t determine the size f transmitted packets and the elapsed time between packet transmissins. Fr each entry in the trace file, the traffic generatr creates a UDP datagram f the indicated size and transmits the datagram t the traffic sink. The traffic sink recrds time and size f each incming datagram, and writes the infrmatin int a file. The scenari is depicted in the figure belw. In this part f the lab, yu will build a traffic generatr fr the trace files with Pissn traffic. In Part 3, yu wrk with the Bellcre trace file. In Part 4, yu use the VBR vide traffic. Exercise 2.1 Traffic Generatr fr Pissn traffic Write a prgram that is a traffic generatr fr the cmpund Pissn traffic surce (see Lab 1, Exercise 1.4) and that transmits the traffic using Java datagrams t a traffic sink. The traffic sink has t be prgrammed as well. A trace fr the cmpund Pissn surce is available at URL The file has the frmat: SeqN Time (in µsec) Size (in Bytes) This results in a cmpund Pissn prcess with packet arrival rate λ = 1250 packets/sec, and the packet size has an expnential distributin with average size 1/µ =100 Bytes. ECE 466 LAB 2A - PAGE 5 J. Liebeherr
6 The traffic generatr reads each line frm the trace file, re-scales the values, and transmits a UDP datagram packet using the fllwing cnsideratins: The size f the transmitted datagram is equal t the (re-scaled) packet size value; The time f transmissin is determined frm the (re-scaled) time values. (The first packet shuld be transmitted withut delay). Exercise 2.2 Build the Traffic Sink Write a prgram that serves as traffic sink fr the traffic generatr frm the previus exercise. The requirements fr the traffic sink are as fllws: Read packets frm a specified UDP prt; Fr each incming packet, write a line t an utput file that recrds the size f the packet and the time since the arrival f the previus packet (Fr the first packet, the time is zer). Test the traffic sink with the traffic generatr frm Exercise 2.1. Exercise 2.3 Evaluatin Run experiments where yu transmit traffic frm the traffic generatr t the traffic sink. Evaluate the accuracy f the traffic generatr by cmparing the entries in the trace file (at the traffic generatr) t the results written t the utput file (at the sink). Use at least 10,000 data pints fr yur evaluatin. Prepare a plt that shws the difference f trace file and the utput file. Fr example, yu may create tw functins that shw the cumulative arrivals f the trace file and the utput file, respectively, and plt them as a functin f time. Try t imprve the accuracy f the traffic generatr. Evaluate and graph yur imprvements by cmparing them t the initial plt. Exercise 2.4 Accunt fr packet lsses. Packet lsses may ccur due t bit errrs, buffer verflws, cllisins f transmissins, r ther reasns. Packet lsses are less likely if bth the sender and the receiver are n the same machine. The UDP prtcl des nt recver packet lsses. Indicate in yur plts frm the evaluatin any packet lsses. Lab Reprt: Prvide discussins and graphs as requested in Exercise 2.3 and Exercise 2.4. ECE 466 LAB 2A - PAGE 6 J. Liebeherr
7 Part 3. Leaky Bucket Traffic Shaper In this part f the lab, yu familiarize yurself with a reference implementatin f a Leaky Bucket. The implementatin f the leaky bucket (in Java) and dcumentatin fr using the implementatin is available at: ucket In the next lab (Lab 2b) yu will mdify the surce cde f the implementatin. Right nw, the bjective is t run the cde f the reference implementatin, but withut a need t mdify the prvided surce cde. A leaky bucket traffic shaper with burst size LB max and rate r is shwn in the figure. Tkens are fed int the bucket at rate r. N mre tkens are added if the bucket cntains LB max tkens. Data can be transmitted nly if there are sufficient tkens in the bucket. T transmit a packet f L bytes, the bucket must cntain at least L tkens. If there are nt sufficient tkens, the packet must wait until there are enugh tkens in the bucket. The maximum size f the buffer is B max. Initially, the leaky bucket is full and the buffer is empty, i.e., LB(t) = LB max bytes and B(t) = 0 bytes. Nte that L shuld nt be smaller than the maximum packet size. The leaky bucket fr this Lab receives data frm a traffic generatr n a UDP prt and transmits the utput t a traffic sink, specified in terms f a an IP address and a UDP prt. This is illustrated belw. ECE 466 LAB 2A - PAGE 7 J. Liebeherr
8 An implementatin f the Leaky bucket fr packet sizes with a variable length is sketched in the fllwing figure. The traffic generatr (TG) generates packets that are transmitted t the Leaky Bucket, which sends the packets t the traffic sink (TS) after applying a shaping plicy. The leaky bucket is cmprised f fur cmpnents: Bucket Receiver (BR), Bucket Sender (BS), the Tken Bucket, and a Buffer. Upn arrival t the leaky bucket, packets are handled by BR which stres packets int the buffer r sends them ut immediately. The Buffer wrks as a FIFO queue with limited capacity and hlds packets until they can be send. The Tken Bucket generates tkens at a given rate (r) and hlds up t LB max tkens. BS takes packets ut f buffer and sends them when enugh tkens are available. The reference implementatin f the Leaky Bucket implements the abve functins, but which is missing details n the methd fr updating the value f LB and fr cmputing the time t* fr waking up the Bucket Sender. This implementatin is prvided by the package LeakyBucket, which cnsists f fur Java classes: Class LeakyBucket Creates the cmpnents f the leaky bucket and starts BR, BS, and TkenBucket in different threads. An instant f LeakyBucket is created with the fllwing parameters: ECE 466 LAB 2A - PAGE 8 J. Liebeherr
9 inprt UDP Prt number, where BR expects arriving packets. utaddress - IP address t which BS sends packets. utprt UDP prt number t which BS sends packets maxpacketsize - Maximum size f packet that can be prcessed. buffercapacity - Capacity f buffer in bytes (B max ). bucketsize Maximum number f tkens in leaky bucket (LB max ). bucketrate - Tken generating rate in tkens/sec (r). filename - Name f file, where arrival times are recrded. Buffer Thread safe implementatin f a FIFO buffer that is meant t be used in prducer/cnsumer scenari. This buffer stres packets that must nt exceed MAX_PACKET_SIZE and has inherent capacity f MAX_VALUE packets. The capacity f the buffer can be specified explicitly in bytes. The buffer has methds fr adding packets t the tail f the buffer and remving packets frm the head f the buffer, peeking at the first packet (withut remving it), and querying the currently ccupied buffer size (in terms f packets r bytes). LeakyBucketReceiver (BR) Waits n a specified UDP prt fr incming packets. When a packet arrives, it recrds its arrival time, size, buffer backlg (B), and the number f tkens in the bucket (LB) t a file. A received packet is prcessed in the fllwing way: if (buffer_is_empty && nt(sendinginprgress) && enugh_tkens_available) cnsume tkens; send packet; else add packet in buffer; Whether a transmissin is in prgress is checked by reading the SendingInPrgress variable f BucketSender. Nte that BucketReceiver and BucketSender never send at the same time, since BucketReceiver nly transmits when the buffer is empty. If a packet cannt be added t the buffer, e.g., because the buffer is full, the packet is drpped and an errr message displayed. LeakyBucketSender (BS) Remves packets frm buffer and transmits them t a specified address (IP address and UDP prt), when there are enugh tkens. The prcedure fr transmissin is as fllws: If (buffer_is_nt_empty) if (enugh_tkens) cnsume tkens; sendinginprgress = true; remve packet frm buffer; send packet; sendinginprgress = false; else get expected time when there will be enugh tkens; sleep fr this time; ECE 466 LAB 2A - PAGE 9 J. Liebeherr
10 else wait fr packet t arrive t buffer; // buffer wakes up BS when packet arrives TkenBucket This class updates the cntent f the tkens in the tken bucket. A tken bucket is created with tw parameters size and rate, where size is the maximum cntent f the tken bucket (LB max ), rate is the tken generatin rate in tkens per secnd (r). Other classes can request the TkenBucket abut the cntent f the tken bucket, and can request t remve tkens frm the bucket. The fllwing requests are available: getntkens: Returns number f tkens in bucket. remvetkens(x) : Request t remve X tkens frm the bucket. The methd returns false if there are less than X tkens in the bucket. getwaitingtime(x): Returns the waiting time (in nansecnds) until bucket has X tkens. Nte that there is n guarantee that there will be enugh tkens at the returned time (smene else may have remved tkens). Exercise 3.1 Running the reference implementatin f the Leaky Bucket Yur task is t execute the reference implementatin f the leaky bucket s that it receives packets frm yur implementatin f the traffic generatr frm Part 2, and send packets t yur versin f the traffic sink. The transmissins between traffic generatr, leaky bucket, and traffic sink use UDP datagrams. The size and timing f packet transmissins by the traffic generatr is dne as described in Part 2. Upn each packet arrival, the leaky bucket regulatr writes a line t an utput file that recrds the size f the packet and the time since the arrival f the last packet (Fr the first packet, the time is zer). Als recrded are the number f tkens (LB) in the leaky bucket and the backlg in the buffer (B) after the arrival f the packet. In yur implementatin, the traffic sink, the Leaky Bucket, and the traffic generatr must be started separately as independent prcesses. The fllwing cde segment shws hw yu start the LeakyBucket f the reference implementatin in a prcess. The implementatin assumes that the class LeakyBucket is in a subdirectry with name LeakyBucket : imprt LeakyBucket.LeakyBucket; public class Main { ECE 466 LAB 2A - PAGE 10 J. Liebeherr
11 } public static vid main(string[] args) { // listen n prt 4444, send t lcalhst:4445, // max. size f received packet is 1024 bytes, // buffer capacity is 100*1024 bytes, // leaky bucket has tkens, rate 5000 tkens/sec, and // recrds packet arrivals t bucket.txt). LeakyBucket lb = new LeakyBucket(4444, "lcalhst", 4445, 1024, 100*1024, 10000, 5000, "bucket.txt"); new Thread(lb).start(); } Exercise 3.2 Evaluate the reference implementatin fr the Pissn traffic file Cnsider the transmissin f Pissn traffic frm Exercise 2.3. Prepare a single plt that shws the cumulative arrival functin as a functin f time f: The data f the trace file (as read by the traffic generatr); The arrivals at the leaky bucket; The arrivals at the traffic sink. Prvide a secnd plt that shws the cntent f the tken bucket and the backlg in the Buffer as a functin f time. Exercise 3.3 Evaluate the reference implementatin fr the Ethernet and Vide Tracefiles Repeat the evaluatin fr the vide traffic trace and the Ethernet trace file that were used in Lab 1, and which are available at: Vide trace file: Ethernet traffic: There are a few things t nte: The frmat f the trace files fr the Vide and the Ethernet traffic is described in the descriptin f Lab 1. ECE 466 LAB 2A - PAGE 11 J. Liebeherr
12 Fr the vide trace file, the size f a vide frame may exceed the maximum size f a datagram, and yu need t send the frame in multiple datagrams. Lab Reprt: Prvide the surce cde fr yur surce cde fr Exercise 3.1. D nt include the surces fr the traffic generatr and traffic sink. Als, d nt include surce files f the reference implementatin. Fr Exercises 3.2 and 3.3, prvide the set f plts and include a descriptin f the plts. ECE 466 LAB 2A - PAGE 12 J. Liebeherr
13 Feedback Frm fr Lab 2a Cmplete this feedback frm at the cmpletin f the lab exercises and submit the frm when submitting yur lab reprt. The feedback is annymus. D nt put yur name n this frm and keep it separate frm yur lab reprt. Fr each exercise, please recrd the fllwing: Part 1. Prgramming with Datagram Sckets and with Files Part 2. Traffic generatrs Difficulty (-2,-1,0,1,2) -2 = t easy 0 = just fine 2 = t hard Interest Level (-2,-1,0,1,2) -2 = lw interest 0 = just fine 2 = high interest Time t cmplete (minutes) Part 3. Leaky Bucket Traffic Regulatr Please answer the fllwing questins: What did yu like abut this lab? What did yu dislike abut this lab? Make a suggestin t imprve the lab. ECE 466 LAB 2A - PAGE 13 J. Liebeherr
The programming for this lab is done in Java and requires the use of Java datagrams.
Lab 2 Traffic Regulatin This lab must be cmpleted individually Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic regulatin, called a leaky bucket, that runs ver a real netwrk.
More informationDue Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02)
Lab 3 Packet Scheduling Due Date: Lab reprt is due n Mar 6 (PRA 01) r Mar 7 (PRA 02) Teams: This lab may be cmpleted in teams f 2 students (Teams f three r mre are nt permitted. All members receive the
More informationThis labs uses traffic traces from Lab 1 and traffic generator and sink components from Lab 2.
Lab 3 Packet Scheduling Purpse f this lab: Packet scheduling algrithms determine the rder f packet transmissin at the utput link f a packet switch. This lab includes experiments that exhibit prperties
More informationProgramming Project: Building a Web Server
Prgramming Prject: Building a Web Server Submissin Instructin: Grup prject Submit yur cde thrugh Bb by Dec. 8, 2014 11:59 PM. Yu need t generate a simple index.html page displaying all yur grup members
More informationLAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C
LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure
More informationEnterprise Chat and Developer s Guide to Web Service APIs for Chat, Release 11.6(1)
Enterprise Chat and Email Develper s Guide t Web Service APIs fr Chat, Release 11.6(1) Fr Unified Cntact Center Enterprise August 2017 Americas Headquarters Cisc Systems, Inc. 170 West Tasman Drive San
More informationXilinx Answer Xilinx PCI Express DMA Drivers and Software Guide
Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 9 2016 v5.1 Answers 100% 1. Which tw characteristics are assciated with UDP sessins? (Chse tw.) Destinatin devices receive traffic with minimal delay. Transmitted data segments are tracked.
More informationTo start your custom application development, perform the steps below.
Get Started T start yur custm applicatin develpment, perfrm the steps belw. 1. Sign up fr the kitewrks develper package. Clud Develper Package Develper Package 2. Sign in t kitewrks. Once yu have yur instance
More informationCisco Tetration Analytics, Release , Release Notes
Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated
More informationPreparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop.
Lab 1 Name: Checked: (instructr r TA initials) Objectives: Learn abut jgrasp - the prgramming envirnment that we will be using (IDE) Cmpile and run a Java prgram Understand the relatinship between a Java
More informationHPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices
HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...
More informationSecond Assignment Tutorial lecture
Secnd Assignment Tutrial lecture INF5040 (Open Distributed Systems) Faraz German (farazg@ulrik.ui.n) Department f Infrmatics University f Osl Octber 17, 2016 Grup Cmmunicatin System Services prvided by
More informationPractical Exercises in Computer Networks and Distributed Systems
(V..6, Nv 2) Practical Exercises in Cmputer Netwrks and Distributed Systems Stream Sckets and the Client/Server mdel (C language, W) 2-, Jsé María F Mrán This practical illustrates basic cncepts prtcl
More informationThese tasks can now be performed by a special program called FTP clients.
FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad
More informationLab 5 Sorting with Linked Lists
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationMunicode Website Instructions
Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater
More informationSeaLinx Guide. Table of Contents
SeaLinx Guide Table f Cntents SeaLinx Overview... 2 Cre Cmpnent... 2 Physical Layer... 2 Mac Layer... 3 Netwrk Layer... 4 Transprt Layer... 5 Applicatin Layer... 6 Quick Start Guide... 6 Sftware Installatin
More informationUsing the Swiftpage Connect List Manager
Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts
More informationExtended Traceability Report for Enterprise Architect
Extended Traceability Reprt User Guide Extended Traceability Reprt fr Enterprise Architect Extended Traceability Reprt fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More informationDashboard Extension for Enterprise Architect
Dashbard Extensin fr Enterprise Architect Dashbard Extensin fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins f the free versin f the extensin... 3 Example Dashbard
More informationSecure File Transfer Protocol (SFTP) Interface for Data Intake User Guide
Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP
More informationPopulate and Extract Data from Your Database
Ppulate and Extract Data frm Yur Database 1. Overview In this lab, yu will: 1. Check/revise yur data mdel and/r marketing material (hme page cntent) frm last week's lab. Yu will wrk with tw classmates
More informationLab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first
More informationMyUni Adding Content. Date: 29 May 2014 TRIM Reference: D2013/ Version: 1
Adding Cntent MyUni... 2 Cntent Areas... 2 Curse Design... 2 Sample Curse Design... 2 Build cntent by creating a flder... 3 Build cntent by creating an item... 4 Cpy r mve cntent in MyUni... 5 Manage files
More informationNetwork Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template
Netwrk Rail ARMS - Asbests Risk Management System Training Guide fr use f the Imprt Survey Template The ARMS Imprt Survey Template New Asbests Management Surveys and their Survey Detail reprts can be added
More informationUsing CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command
Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.
More information(ii). o IP datagram packet is payload of a TCP segment o TCP segment is payload of an IP datagram. (iii).
CSC 344: Cmputer Netwrks Review Questins 1. Select the crrect answer amng the chices by placing a checkmark next t the right statement. (i). ARP (Address Reslutin Prtcl) is used t btain IP address fr a
More informationSTIDistrict AL Rollover Procedures
2009-2010 STIDistrict AL Rllver Prcedures General Infrmatin abut STIDistrict Rllver IMPORTANT NOTE! Rllver shuld be perfrmed between June 25 and July 25 2010. During this perid, the STIState applicatin
More informationTUTORIAL --- Learning About Your efolio Space
TUTORIAL --- Learning Abut Yur efli Space Designed t Assist a First-Time User Available t All Overview Frm the mment yu lg in t yur just created myefli accunt, yu will find help ntes t guide yu in learning
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast
More informationProper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page
Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...
More informationUsing the Swiftpage Connect List Manager
Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts
More informationSAS Hot Fix Analysis, Download and Deployment Tool
SAS Ht Fix Analysis, Dwnlad and Deplyment Tl SASHFADD Versin 2.2.1 Usage Guide What's New in SASHFADD 2.2.1? Table f Cntents Intrductin... 1 System Requirements... 2 Imprtant infrmatin regarding tl usage...
More informationProject 3 Specification FAT32 File System Utility
Prject 3 Specificatin FAT32 File System Utility Assigned: Octber 30, 2015 Due: Nvember 30, 11:59 pm, 2015 Yu can use the reminder f the slack days. -10 late penalty fr each 24-hur perid after the due time.
More informationUploading Files with Multiple Loans
Uplading Files with Multiple Lans Descriptin & Purpse Reprting Methds References Per the MHA Handbk, servicers are required t prvide peridic lan level data fr activity related t the Making Hme Affrdable
More informationAras Innovator Viewer Add-Ons
Aras Innvatr Viewer Add-Ons Aras Innvatr 9.2 Dcument #: 9.2.02232009 Last Mdified: 4/1/2010 Aras Crpratin ARAS CORPORATION Cpyright 2010 All rights reserved Aras Crpratin 300 Brickstne Square Suite 904
More informationProject #1 - Fraction Calculator
AP Cmputer Science Liberty High Schl Prject #1 - Fractin Calculatr Students will implement a basic calculatr that handles fractins. 1. Required Behavir and Grading Scheme (100 pints ttal) Criteria Pints
More informationJava Socket Workshop. July Purpose of this workshop:
Java Socket Workshop July 2012 Purpose of this workshop: The objective of this workshop is to gain experience with writing and compiling programs using the Java programming language. The exercises provide
More information1 Getting and Extracting the Upgrader
Hughes BGAN-X 9202 Upgrader User Guide (Mac) Rev 1.0 (23-Feb-12) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9202 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is
More informationNetwork Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Asset Template
Netwrk Rail ARMS - Asbests Risk Management System Training Guide fr use f the Imprt Asset Template The ARMS Imprt Asset Template New assets can be added t the Asbests Risk Management System (ARMS) using
More information1 Getting and Extracting the Upgrader
Hughes BGAN-X 9211 Upgrader User Guide (Mac) Rev 1.2 (6-Jul-17) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9211 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is
More informationMICRONET INTERNATIONAL COLLEGE BDTVEC ND in Computer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013
MICRONET INTERNATIONAL COLLEGE BDTVEC ND in Cmputer Studies MULTIMEDIA AND WEB DESIGN (MWD) ASSIGNMENT 3 (20%) Due Date: 31st January 2013 Prduce dcumentatin fr the prgram Submit the SOFTCOPY and als HARDCOPY
More informationTechSmith Relay 5.1.5
TechSmith Relay 5.1.5 WHAT END USERS NEED TO KNOW This upgrade cmes with new features that will be available t yu. Fr all f these feature t be installed n yur cmputer few steps will need t be taken. After
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Prf. Mntek Singh Spring 2019 Lab #7: A Basic Datapath; and a Sprite-Based Display Issued Fri 3/1/19; Due Mn 3/25/19
More informationAvaya 9610 IP Telephone End User Guide
Avaya 9610 IP Telephne End User Guide 9610 IP Telephne End User Guide 1 P age Table f Cntents Abut Yur Telephne... 3 Abut Scrlling and Navigatin... 3 Selecting Names, Numbers, r Features... 3 Starting
More informationEphorus Integration Kit
Ephrus Integratin Kit Authr: Rbin Hildebrand Versin: 2.0 Date: May 9, 2007 Histry Versin Authr Cmment v1.1 Remc Verhef Created. v1.2 Rbin Hildebrand Single Sign On (Remved v1.7). v1.3 Rbin Hildebrand Reprting
More informationVMware EVO:RAIL Customer Release Notes
VMware EVO:RAIL Custmer Release Ntes EVO:RAIL Release 1.2.0 Dcument Revisin: 1.2.0-2 (May 27, 2015) Cpyright 1998-2015 VMware, Inc. All rights reserved. Cpyright, trademark, and patent infrmatin: http://pubs.vmware.cm/cpyright-trademark.html.
More informationGetting Started with the Web Designer Suite
Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite
More informationIntegrating QuickBooks with TimePro
Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data
More informationUser Guide. Document Version: 1.0. Solution Version:
User Guide Dcument Versin: 1.0 Slutin Versin: 365.082017.3.1 Table f Cntents Prduct Overview... 3 Hw t Install and Activate Custmer Satisfactin Survey Slutin?... 4 Security Rles in Custmer Satisfactin
More informationClassFlow Administrator User Guide
ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual
More informationElement Creator for Enterprise Architect
Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the
More informationThe transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words,
The transprt layer An intrductin t prcess t prcess cmmunicatin CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Transprt-layer services Prvides fr lgical cmmunicatin* between applicatin
More informationBMC Remedyforce Integration with Remote Support
BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective
More informationFinal Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010
Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic
More informationOn the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks
On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.
More informationCopyrights and Trademarks
Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and
More informationCustodial Integrator. Release Notes. Version 3.11 (TLM)
Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:
More informationDate: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems
Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance
More informationInformation about the ACC Education App Featuring ACCSAP 9
Infrmatin abut the ACC Educatin App Featuring ACCSAP 9 Key Features: This app is designed t be a study tl fr select educatinal prducts. It des nt include all features and functinality f the nline prtin
More informationTRAINING GUIDE. Overview of Lucity Spatial
TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign
More informationRelease Notes. Dell SonicWALL Security firmware is supported on the following appliances: Dell SonicWALL Security 200
Release Ntes Email Security Dell SnicWALL Email Security 8.0.1 SnicOS Cntents System Cmpatibility... 1 Enhancements in Email Security 8.0.1... 2 Reslved Issues... 3 Upgrading t Email Security 8.0.1...
More informationMcAfee Endpoint Upgrade Assistant 2.2
Release Ntes McAfee Endpint Upgrade Assistant 2.2 Fr use with eplicy Orchestratr Cntents Abut this release... 2 Release build... 2 Changes in this Release... 3 Custm Lg Lcatin... 3 EUA Envirnment Lgin
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationAdverse Action Letters
Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin
More informationCreating a TES Encounter/Transaction Entry Batch
Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.
More informationCS1150 Principles of Computer Science Introduction (Part II)
Principles f Cmputer Science Intrductin (Part II) Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Review Terminlgy Class } Every Java prgram must have at least
More informationAPPLY PAGE: LOGON PAGE:
APPLY PAGE: Upn accessing the system fr the first time, yu will land n the Apply Page. This page will shw yu any currently pen pprtunities that yu can apply fr, as well as any relevant deadlines r ther
More informationTest Pilot User Guide
Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus
More informationTransmission Control Protocol Introduction
Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers
More informationROCK-POND REPORTING 2.1
ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule
More informationPAGE NAMING STRATEGIES
PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename
More informationhtml o Choose: Java SE Development Kit 8u45
ITSS 3211 Intrductin f Prgramming 1 Curse ITSS 3211 Intrductin t Prgramming Instructr Jytishka Ray Term Summer 2016 Meetings Mndays, 6 p.m. 8:45 p.m. Rm JSOM 12.202 Instructr: Jytishka Ray Email: jxr114030@utdallas.edu
More informationEView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,
More informationReport Writing Guidelines Writing Support Services
Reprt Writing Guidelines Writing Supprt Services Overview The guidelines presented here shuld give yu an idea f general cnventins fr writing frmal reprts. Hwever, yu shuld always cnsider yur particular
More informationOASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS
OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL
More informationContents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.
1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding
More informationAscii Art Capstone project in C
Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,
More informationBI Publisher TEMPLATE Tutorial
PepleSft Campus Slutins 9.0 BI Publisher TEMPLATE Tutrial Lessn T2 Create, Frmat and View a Simple Reprt Using an Existing Query with Real Data This tutrial assumes that yu have cmpleted BI Publisher Tutrial:
More informationistartsmart 3.5 Upgrade - Installation Instructions
istartsmart 3.5 Upgrade - Installatin Instructins Minimum System Requirements: Hatch All-In-One istartsmart Cmputer Learning Center v1.0 r v1.1 Internet access - either hard-wired r wireless cnnectin is
More informationIMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7
IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f
More informationCOP2800 Homework #3 Assignment Spring 2013
YOUR NAME: DATE: LAST FOUR DIGITS OF YOUR UF-ID: Please Print Clearly (Blck Letters) YOUR PARTNER S NAME: DATE: LAST FOUR DIGITS OF PARTNER S UF-ID: Please Print Clearly Date Assigned: 15 February 2013
More informationFIREWALL RULE SET OPTIMIZATION
Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue
More informationBMC Remedyforce Integration with Bomgar Remote Support
BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their
More informationHW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers
Page 1 f 18 HW4 Sftware versin 3 Device Manager and Data Lgging LOG-RC Series Data Lggers 2011; Page 2 f 18 Table f cntents 1 ORGANIZATION OF THE HW4 MANUALS... 3 2 OVERVIEW... 4 3 INITIAL SETUP... 4 3.1
More informationElement Creator for Enterprise Architect
Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the
More informationRxAXIS Security Module 09/25/2013
RxAXIS Security Mdule 09/25/2013 Lessn Title Intrductin: Security Mdule In this tutrial we are ging t lk at the Security Maintenance Mdule f the RxAXIS system. When used, this system gives emplyees access
More informationOverview of Data Furnisher Batch Processing
Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested
More information1on1 Sales Manager Tool. User Guide
1n1 Sales Manager Tl User Guide Table f Cntents Install r Upgrade 1n1 Page 2 Setting up Security fr Dynamic Reprting Page 3 Installing ERA-IGNITE Page 4 Cnverting (Imprting) Queries int Dynamic Reprting
More informationSoftware Usage Policy Template
Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/
More informationApply IU Admin Center
Overview The (fr undergraduate applicatins) allws administrative users t view the applicatins which are in prgress and applicatins which have been submitted. Yu can search fr applicatins by last name,
More informationAssignment #5: Rootkit. ECE 650 Fall 2018
General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment
More informationGetting Started with the SDAccel Environment on Nimbix Cloud
Getting Started with the SDAccel Envirnment n Nimbix Clud Revisin Histry The fllwing table shws the revisin histry fr this dcument. Date Versin Changes 09/17/2018 201809 Updated figures thrughut Updated
More information