Preview

Networking and Network Programming

Powerful Essays
Open Document
Open Document
74530 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Networking and Network Programming
Introduction to Networking
1 Networking and Network Programming 2 TCP/IP Overview 3 WinSock Overview 4 Visual C++

I

Chapter 1 s

Networking and Network Programming

3

1
Networking Networking and Network and Network Programming Programming

4

Part I s

Introduction to Networking

The purpose of this book is to show you how to make network-aware applications that run on the Microsoft Windows and Windows NT operating systems using the Windows Sockets (WinSock) Application Programming Interface (API). To that end, several practical examples are examined that utilize the basic functionality of WinSock. Network operating systems, such as Windows for Workgroups and Windows NT, provide basic file and printer sharing services. This most basic level of functionality is provided “out of the box.” Network-aware applications are programs that use the capabilities of a collection of connected computers. Network-aware programs range from custom applications that transfer data among computers on a network to mainstream applications that enable electronic mail and remote database access. The WinSock API is a library of functions that a programmer can use to build these network-aware applications. WinSock has its roots in Berkeley sockets as introduced in the Berkeley Software Distribution of UNIX. WinSock uses the TCP/IP (Transmission Control Protocol/Internet Protocol) suite, which provides the formal rules of behavior that govern network communications between all computers running this particular computer networking protocol. Before I begin the examination of network programming, look at the basics of computer networking in general. A network can be loosely defined as a collection of two or more computers that have some sort of communication path between them. A network can be loosely classified as either a local area network (LAN) or wide-area network (WAN). The use of the terms LAN and WAN is somewhat misleading because which term you use is relative

You May Also Find These Documents Helpful

  • Powerful Essays

    The total number of network and subnet bits equal an address’s prefix. If a Class A address of 10.10.33.46 has a mask of 255.255.224.0, then all of the 1s in the binary form of that mask, which totals 19, would be the prefix. In CIDR notation, the address would be seen as 10.10.33.46/19.…

    • 2698 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Networking Project Week 4

    • 1212 Words
    • 5 Pages

    One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…

    • 1212 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

    NT1210 Introduction to Networking Unit 2: Chapter 2, Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises. …

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Networking - Task 3

    • 354 Words
    • 2 Pages

    Task 3: Document and analyses the network test results you obtained in task 2 above and compare them with the expected results. You should provide snips of the test results to support your answer.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Intro to networking

    • 606 Words
    • 2 Pages

    1. An enterprise campus LAN uses wired UTP Ethernet and wireless 802.11 LANs at the edge of the LAN. Looking at a particular floor in a particular building, all the devices connect to either a single Ethernet switch or single wireless access point, both of which sit in a wiring closet in the middle of the space. Which of the following is true about the distance limitations in this LAN?…

    • 606 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Also, after completing the lab, you must show your work by copying and pasting a screenshot of the following configurations/verification:…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A protocol is basically a set of rules and regulations that govern how data is to be transmitted across a network. It defines the regulations regarding software as well as hardware. To enable two/more devices to communicate, they must follow the same protocol - an agreed format for transmission of data between devices. The protocol determines things such as: Type of error checking to be used, data compression methods, etc.…

    • 1024 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Network Management

    • 923 Words
    • 4 Pages

    The standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol are :…

    • 923 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Networking Case Study

    • 538 Words
    • 3 Pages

    The ISP, CHINA, SMARTGILAS and CHINESETAIPEI routers can only be reached through FIBAASIA initially by configuring the right interface.…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Sendmail is the default MTA on the RedHat Linux distribution. Do NOT use linuxconf to configure sendmail as it has NOT been updated to work with current versions of sendmail!!! (The tool linuxconf is no longer included with current versions of Red Hat Linux 7.3+)…

    • 776 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Unix Network Programing

    • 5507 Words
    • 23 Pages

    Three interrelated aspects: r TCP/IP protocol suite r standard Internet applications r coding using UNIX sockets API…

    • 5507 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Socket Programming

    • 1283 Words
    • 6 Pages

    Begin Requirement Analysis Preliminary Design Investigate the requirements Select or develop an algorithm to solve the problem Define data structure Detailed Design Define the format of input and output Draw a flow-chart and module design Input and edit the source program Coding Compile it no errors Testing Running and testing it successful End…

    • 1283 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    vdv d v

    • 1779 Words
    • 8 Pages

     15 – CT (7.5) Unit 1+ HA (6*5 = 30 ------ 7.5) Unit 1-5…

    • 1779 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Live and Let Live

    • 7984 Words
    • 32 Pages

    This document assumes that one is familiar with the workings of a non-connected simple IP network (e.g. a few 4.2 BSD systems on an Ethernet not connected to anywhere else). Appendix A contains remedial information to get one to this point. Its purpose is to get that person, familiar with a simple net, versed in the "oral tradition" of the Internet to the point that that net can be connected to the Internet with little danger to either. It is not a tutorial, it consists of pointers to other places, literature, and hints which are not normally documented. Since the Internet is a dynamic environment, changes to this document will be made regularly. The author welcomes comments and suggestions. This is especially true of terms for the glossary (definitions are not necessary).…

    • 7984 Words
    • 32 Pages
    Better Essays