network-protocols

trace an address using ip address

how to trace the information of an individual using ip adress and email id can any one help me... i tried for a example using my friends ip address , and i was able to get only this information alone.... Location of the IP address 59.162.171.249: Visakhapatnam in India. but how to trace his address perfectly plz help me ...

Disable RARP packets from linux

Hi all, I am doing a script in which I change MAC address of interface in linux machine. But when I change the MAC address of the interface it generates an RARP packet (to get an IP address for the new MAC which is assigned). But this is not desirable in my scheme of things. I do not want the RARP to be generated. Can you guys suggest m...

Is there a Java client that supports Telnet RFC2217 (to communicate with COM ports over a network connection)?

This should be simple, very simple, but I'm having a hard time with it. Problem I'm looking for an open source project, in java, that will communicate using the RFC2217 protocol. I find no shortage of Java RFC2217 Terminal Servers but I need a client. If all these people are writing servers, someone has to have written a client! Righ...

Adding methods to a simple RPC server in a clean and separated way

Hello: I created a simple RPC server to perform certain tasks common to our teams, but which are called from different networks. The server looks like this (I don't include error handling for brevity): from twisted.internet.protocol import Protocol, Factory from twisted.internet import reactor import json class MyProtocol(Protocol): ...

Reverse IP Logfile Analysis API

I have a list of IP addresses, about 1300, that I need to look up to find out company information or whatever is available from an online tool. I don't mind if I have to pay for it. but I don't want to have to put each one in manually. Is there something that I can use that would give me this detail that I could either copy or paste or ...

What does destination mac address field contains, when the source doesn't know address of remote machine

What does destination mac address field contains, when the source doesn't know address of remote machine ? (say opening page from google.com from my machine) And while broadcasting the packet, what does mac-address field contains? ...

How can Malroy impersonate Alice in the Wide Mouth Frog protocol?

How can Malroy impersonate Alice in the Wide Mouth Frog protocol? Notation: A: Alice B: Bob S: Trusted server Ta: Timestamp A Ts: Timestamp S Kab: Session key between A and B Kas: Session key between A and S Kbs: Session key between B and S Protocol: step 1: A->S:A,{Ta,Kab,B}Kas step 2: S->B:{Ts,Kab,A}Kbs ...

Remote desktop connection

Hello, I'm developing a remote desktop application that enables users to connect remotely to a machine that does not have a static IP. How can I locate such a machine? there is a site logmein.com that installs a client to the machine to allow remote desktop. I don't know what this client do exactly to allow this process! ...

How to get Port Range for Passive Mode FTP in C# ?

Hi, How to get Port Range for Passive Mode FTP in C# ? Any code snippet... ...

Simple protocols (like twisted.pb) vs messaging (AMQP/JMS) vs web services (REST/SOAP)

Hi, I'm currently using twisted's perspective broker on python and I have considered in the past switching to something like RabbitMQ but I'm not sure it could just replace pb - I feel like I might be comparing apples to oranges here. I've been reading a lot about REST lately and the inevitable debate with SOAP, which led me to read abou...

I have an idea for a security protocol!

Ok guys, So I was watching inception yesterday and I had this idea. I dont know too much about network security or the internet really. So thats what you guys are for, tell me if this is secure or even possible.Its to send secure data over the web by the way. My Ideas takes the data needed to be send and encrypts it. The data is then sp...

WinPac-8000 OPC-server network access

Hello. I am to build an automation solution based on WinPac-8000 controller (http://www.icpdas.com/products/PAC/winpac/introduction.htm). I split this project into 2 programs: 1st is running on the controller (it does some business logic) and second operates on user machine (it displays current results). The problem is: I use build-in ...

how does Dropbox upload my files to its server?

Drop Box appears to be really fast at syncing with its server. Does anyone know what algorithm it uses? ...

Discriminators for using in flow-based classification

I need to classify TCP traffic base on video and non-video. So i need to find characteristics of each flow. My classification is Flow-based and one of my variables is incoming packet length. but it is not accurate as P(video|1200Bytes)= 0.04 P(non-Video|1200Bytes) = 0.22 I need some help to find some variables, at least two more to d...

How do I send a delete request with ASIHTTPRequest?

Wondering how I can send a DELETE instead of POST/GET etc with ASIHTTPRequest. Thanks! ...

Distributed network monitoring - how to tell if the monitored resource has fallen over, or the monitor it's self is at fault

Hi, I'm building a system for monitoring several large web sites (resources), using distributed web services controlled by a central controller. I'm coming to a specific part of the design - the actual reporting of resources that are thought to have fallen over. My problem is that there is always the chance that the actual monitor it...

About network protocol

How do protocols like TCP identify the beginning of a new frame? ...

I'm an aspiring developer who wants to build large systems like PayPal. Which path should I follow?

I'm a 2nd year computer engineering student in Ethiopia, Africa. We have taken C and C++ and i've taught my self HTML, CSS, PHP(cakePHP framework too) and little javascript, JQUERY and mySQL to develop small systems just like blog. But I want to build large systems that are secure and robust. I am very humbled to see very smart and exper...

why do all compatible 802.11 standards use the same value of SIFS/DIFS?

802.11 standards define SIFS/DIFS value. Why do they use the same values? and if they use different values in the same network, what would happen? ...

It is possible to figure out which internet connection is correlated with which networkInterface?

I am a noob in netoworks stuff, but I must to get to know something. When I have list o networkInterface rmnet0 eth0 lo //etc. How can I tell, which kind of connection (wifi/bluethoof/UMTS) use which networkInterface? ...