Parcourir la source

README-en.md edited online with Bitbucket

Jose R Ortiz Ubarri il y a 8 ans
Parent
révision
41c31a1854
1 fichiers modifiés avec 10 ajouts et 8 suppressions
  1. 10
    8
      README-en.md

+ 10
- 8
README-en.md Voir le fichier

@@ -5,9 +5,9 @@
5 5
 ![main2.png](images/main2.png)
6 6
 ![main3.png](images/main3.png)
7 7
 
8
-[Verano 2016 - Ive]
8
+[Verano 2016 - Ive - Tatiana]
9 9
 
10
-When working with arrays, two common tasks are searching for data and sorting the data using a certain order, ascending or descending, alphabetically or numerically. To efficiently carry out these tasks, searching and sorting algorithms are used. One simple searching algorithm is linear search. Two well known sorting algorithms are the Selection Sort and the Bubble Sort. In this laboratory experience you will complete an application to monitor network flow to practice the implementation of algorithms for searching and sorting.
10
+When working with arrays, two common tasks are searching for data and sorting the data using a certain order, ascending or descending, alphabetically or numerically. To efficiently carry out these tasks, searching and sorting algorithms are used. One simple searching algorithm is linear search. Two well known sorting algorithms are Selection Sort and Bubble Sort. In this laboratory experience, you will complete an application to monitor network flow to practice the implementation of algorithms for searching and sorting.
11 11
 
12 12
 
13 13
 ##Objectives:
@@ -33,7 +33,7 @@ Before coming to the laboratory session you should have:
33 33
 
34 34
 4. Studied the concepts and instructions for the laboratory session.
35 35
 
36
-5. Taken the Pre-Lab quiz available through the course’s Moodle portal.
36
+5. Taken the Pre-Lab quiz, available in Moodle.
37 37
 
38 38
 ---
39 39
 
@@ -53,7 +53,7 @@ Internet addresses are stored on 4 bytes (32 bits), normally presented to users
53 53
 
54 54
 Port numbers are stored on 2 bytes (16 bits). Therefore, port numbers range from 0 to 65535. Some port numbers assigned to known service applications are: 22 for `ssh`, 23 for `telnet`, 25 `smtp`, 80 for `http`. 
55 55
 
56
-The application that you will see today can be used to monitor what is known as NetFlows. One NetFlow is composed of the aggregation of the packets of an unidirectional communication between the the applications of two computers. For instance, a NetFlow can be composed of the packets used to send the information from you browser to the `http` application of the web server running Moodle. 
56
+The application that you will see today can be used to monitor what is known as NetFlows. One NetFlow is composed of the aggregation of the packets of an unidirectional communication between the the applications of two computers. For instance, a NetFlow can be composed of the packets used to send the information from your browser to the `http` application of the web server running Moodle. 
57 57
 
58 58
 
59 59
 Figure 1 shows the interface for the *Network Analyzer* application.
@@ -71,12 +71,12 @@ Each row in the table in Figure 1 is a NetFlow composed of the source and destin
71 71
 The application that you will complete gives the user the ability to analyze the status of the network.  Among others it allows to:
72 72
 
73 73
 * identify which communications transmit the largests amount of data
74
-* which applications are running in certain computers
75
-* which computers transmit a large amount of packets compared to the amount of data
74
+* identify which applications are running in certain computers
75
+* identify which computers transmit a large amount of packets compared to the amount of data
76 76
 
77 77
 ##Libraries
78 78
 
79
-For this laboratory experience you will use objects of class `vector`, which are similar to arrays, and you will need to know how to use the `size()` method of the `vector` class objects. You should also familiarize yourself with the `Packet` class defined in this project. The `Packet.h` library contains the setters and getters necessary to fill the information of a NetFlow packet.
79
+For this laboratory experience, you will use objects of class `vector`, which are similar to arrays, and you will need to know how to use the `size()` method of the `vector` class objects. You should also familiarize yourself with the `Packet` class defined in this project. The `Packet.h` library contains the setters and getters necessary to fill the information of a NetFlow packet.
80 80
 
81 81
 ---
82 82
 
@@ -209,4 +209,6 @@ Source_Address Destination_Address Source_Port Destination_Port Octects Packets
209 209
 
210 210
 [3] http://www.java2novice.com/java-sorting-algorithms/quick-sort/
211 211
 
212
-[4] http://intranet.deei.fct.ualg.pt/IC/t22.html
212
+[4] http://intranet.deei.fct.ualg.pt/IC/t22.html
213
+
214
+