I recently began trying my hand at using protocols in my Objective-C development as an (obvious) means of delegating tasks more appropriately among my classes. I completely understand the basic notion of protocols and how they work. However, I came across a roadblock when trying to create a custom protocol that in turn implements another...
If a category I'm creating for a class adds methods that also fulfill the contract set out by a protocol, I'd like to flag that category class as implementing the protocol, and thereby indicate to the Obj-C pre-processor that the class effectively implements the protocol as well.
Example delegate (for clarity, thanks Ole!):
@protocol S...
I am looking for an open source framework to build a proprietary protocol onto (Agent/Client talks to a Receiver/Server that stuffs things into a SQL database).
I need session handling (ie login/logout) and some kind of encryption.
I found the Spread Framework which looks great, but does not appear to support authentication or encryption...
How can I make an http passthrough pluggable protocol for IE work in Firefox?
Alternatively, how to develop one for Firefox? Any examples would be appreciated.
Thanks.
...
Hi,
I'm implementing a simple proof of concept Telnet server in C# and telnet to it via the windows built in telnet client.
I echo all non IAC data back to the client. However, I can't figure out how to get backspace/delete to work correctly.
I tried several combinations acting on 'BS' from the telnet client:
'BS' (moves cursor bac...
If I send two TCP messages, do I need to handle the case where the latter arrives before the former? Or is it guaranteed to arrive in the order I send it? I assume that this is not a Twisted-specific example, because it should conform to the TCP standard, but if anyone familiar with Twisted could provide a Twisted-specific answer for my ...
Coming from an Eclipse / Java background, one of my favorite features is the ability to quickly stub out all the methods required by an interface. In Eclipse, I can choose 'Override / implement' from the source menu to generate stub methods for any method of the Interface.
I'd like to do the same thing in Objective-C. For instance, if...
My jersey resource is sending this to the client browsers namely (safari & chrome) but the browsers are not redirecting. Is there anything wrong with my HTTP response below ?
HTTP/1.1 303 See Other
Date: Thu, 12 Nov 2009 10:17:23 GMT
Location: http://twitter.com/oauth/authenticate?oauth_token=KNHo4mcLMJG
Content-Length: 0
Server: Jetty(...
I'm communicating data between devices, and I have to program the protocol as an array of bytes.
Any tips when building protocols at a low-level? .. Eg:
Use a 2 byte header, to send the length of the message before the data bytes.
Use a CRC/data validation scheme. (How do I do this? Any simple checksums?)
...
Does the HTTP protocol specify a max length for the ETag?
...
Hello,
I want to detect weather Citrix ICA protocol is running on my network or not. I don't want to hit on port because it is not a good solution.
What flags (bytes) to send to server and read its response, like detecting VNC i send some bytes to server and in response it returns me Protocol Version, so I know that VNC is running on th...
Do any body knows what control messages does RGS Client sends to server for establishing connection?
I want there messages to know weather RGS Server is running on some machine or not?
If you know the documentation link of RGS Protocol then please mention it.
...
Please,
We have the following situation:
Component X that divides a request file into parts, sending each part to an independent processing component Y -through a network- that will reply with a result to component Z , component Z collects all the results of the file parts into a batch result file.
Note:- Request file: file contains ...
What is the most efficient DHT? I am looking for name and/or some kind of implementation or related work, but I am not looking for the one that is most used.
Efficient in terms of CPU execution cycles, load balance, and memory consumption.
...
I am enhancing a piece of software that implements a simple ASCII based protocol.
The protocol is simple... here is an example of what the messages look a little bit like (not the same though, I can't show you the real protocol):
AUTH 1 1 200<CR><LF>
To which we get a response looking similar to
230 DEVICE 1 STATE AUTH 200 OUTPUT 1 ...
Just curious - what are some automatic or even semi-automatic techniques for reverse-engineering of communication protocols?
I am particularly interested in the case when one's sniffing traffic and trying to understand the protocol.
I could find a number of papers on scholar, but in my experience this is a completely manual process mos...
Hi, everyone.
I have working for iPhone development for a while. First time, I so surprised with memory-management in objective-c :). but now I got it a little bit.
The question is, sometime, I use protocol as an attribute of a class, because I think its definition very similar to 'interface' in C# or Java. like below.
@protocol Shiel...
I'm trying to add a new transport to Twisted, which will read data from a stream - either a file in a tail -f way, or from a pipe, but I have some problems with Twisted architecture.
I've got the transport itself (implements ITransport) ready - it handles all file opening. I've got streaming functions/deferreds ready. How do I put it to...
We see these packets being injected in an FTP-DTP channel during a downlink file transfer on Telstra's NEXTG mobile network. We are not sure if these are network level packets, a problem with our 3G modem (HC25 based) or something like our firewall injecting in the stream.
Using a tool we noticed that the PPP framing fails with protoco...
How is this implemented at a python level?
I've got an object that pretends to be a dict for the most part (in retrospect I should have just subclassed dict, but I'd rather not refactor the codebase, and I'd also like to know this for future reference), which looks something a bit like
class configThinger(object):
_config = {}
...