network-protocols

How to get disk usage statistics for remote network share?

If I have a network share say \\myfileserver\documents, can I find out programmatically how much disk space it is using (used/free space) using any API of some sort? Please note it could be hosted by samba or it could be on a san storage device which means I won't be able to install anything on that machine to check the local disk usage...

Is there a way to make a GET request without getting the body of the content?

I'm trying to do HEAD requests to follow 302 links, however this link: http://news.google.com/news/url?sa=t&fd=R&usg=AFQjCNGrJk-F7Dmshmtze2yhifxRsv8sRg&url=http://www.mtv.com/news/articles/1647243/20100907/story.jhtml is troublesome because a HEAD request returns a 200 OK and a GET request returns the expected 302 Status cod...

How does the home wireless perform if it connects to a public access point?

Assuming that there is a access point(hotspot) covering a dozen of houses. Besides, these houses also have their own wireless network. So, if everyone in each house connect to the Internet at the same time, will problems happen? The performance of this network will be reduced or not? ...

What is the effects of Gray Zone in OLSR, B.A.T.M.A.N protocol?

In communication, sometimes node may fail to communicate with other node due to gray zone problem. So, how does gray zone affect these protocols? ...

Developing client app for proprietary server

Hi, I was thinking about developing an app that enables the user to remotely check the progress of a longrunning task. The server application running the task is an existing commercial tool and comes with a proprietary client to connect to the server to manage it. However, the client is available only for windows computers and not for m...

Implementation of network protocols

I am going to be implementing a network protocol (specifically, SFTP) and I wondered if there are any general rules-of-thumb to follow? At the moment it seems like a mammoth task and I'm at a loss as where to start. I'm looking for: Tips Best practices Possible design patterns Experiences Try to keep it applicable to network protoc...

tcp reno, newreno and slow start

When packet loss occurs while in slow start, does the reno/newreno algorithms notice possible dupacks, or is it purely slowstart -> rto? Thus, if sending two packets (in start of slow start), and first one goes missing, does slow start do anything else but rto? It is confusing, since rfc states that 'in practice they (slow start & cong...

What are good specs/libraries for closed network communication in python?

The situation is that I have a small datacenter, with each server running python instances. It's not your usual distributed worker setup, as each server has a specific role with an appropriate long-running process. I'm looking for good ways to implement the the cross-server communication. REST seems like overkill. XML-RPC seems nice, bu...

Using HTTPS for the client-server communication

Hi, I would like to use the HTTPS to secure the communication between my client and the server. The first encrypted communication will be used to authenticate the user - i.e. checking his/her user name and password. After the user credentials will be successfully checked by server I would like to start getting some data in subsequent...

Recieve derived class with Wsman get transfer

Hi, How can i recieve derived class with WS-Man get operation? Enumerating class, for example CIM_X, return also the derived classes. What i'm trying to do is to get a derived class (using Get), i know i have one class so Get with specify keys should return me this class (but the resource uri is the resource uri of the base class). Is t...

Looking for a network-accessible hash table

I have a data acquisition application broken into a client and a server. The server is reponsible for grabbing data from the hardware, running some realtime analysis, and recording the data to disk when it's asked. The client is a GUI that the operator can use to look at some pretty graphs (generated by the server), set some parameters...

How does the Bittorrent protocol handle the data chunks?

How are the data chunks handled within the bittorrent protocol? When a client wants to download e.g. a linux distribution does the tracker return a list of peers which a client then connects to and requests chunks from each peer or does the tracker return a list of peers and info of which peer has what data? Where is the data chunks m...

calculate IP checksum in python

I need to calculate the checksum of an IP packet as described in http://www.faqs.org/rfcs/rfc1071.html. I have already the following code: #!/usr/bin/python import struct data = "45 00 00 47 73 88 40 00 40 06 a2 c4 83 9f 0e 85 83 9f 0e a1" # a test for the checksum calculation def _checksum(data): #calculate the header sum i...

Implementing IPSEC Protocol in java

Hello I want to implement a IPSEC protocol in java. I want to know how to create our own protocol. And how to embedded this protocol with packet. Please provide some code example so that it is easy to understand. ...

Ports that are always open? How does softwares like bittorrent manage to communicate even without port forwarding?

Hi, How come bittorrent clients manage to communicate to servers and other peers even if user has not configured port forwarding in their routers? Of course the speed will be very less compared to when port forwarding is done, but still they manage to communicate? How??? Are there any inbound ports which are always open? Regards, ...

my static ip problem

hi friends i am trying run a web server on my static ip address but when i open my ip address its opening my dsl router how can i assign that ip to my computer any idea thanks ...

What are best practices of designing and implementing Network Protocols?

For the first time I'm trying to implement some Network Protocol over TCP/IP. I've designed one but I'm not sure if it's efficient. Design So here is my idea: after client opening TCP/IP connection with server, every time it wants to make request, first of all it sends size of request followed by some separator character (new line or s...

Manchester Encoding and the Ethernet protocol

Theoretical question here -- the [general] Ethernet protocol uses an 8 byte preamble with an (almost) all 10101010 bit pattern, save for the very last byte. One purpose of this is for sender/receiver synchronization. Since Manchester Encoding can inherently sync the sender and receiver, do you think that the preamble is necessary or re...

why is window size less than or equal to half the sequence number in SR protocol?

in selective repeat protocol in the window size must be less than or equal to half the size of the sequence number space for SR protocol.why is so?? and how??? ...

Basic P2P / Port / Security Question

I'm building an app that allows a user to stream a video from their home computer. Where can I find more information about how I can make this stream accessible to users outside of the broadcaster's local network? Let's say I'm broadcasting the video from 192.168.0.1:8080/video.mpg I know that if I setup port forwarding to the broadca...