|
|
|
|
5
|
![main2.png](images/main2.png)
|
5
|
![main2.png](images/main2.png)
|
6
|
![main3.png](images/main3.png)
|
6
|
![main3.png](images/main3.png)
|
7
|
|
7
|
|
8
|
-[Verano 2016 - Ive]
|
|
|
|
|
8
|
+[Verano 2016 - Ive - Tatiana]
|
9
|
|
9
|
|
10
|
-When working with arrays, two common tasks are searching for data and sorting the data using a certain order, ascending or descending, alphabetically or numerically. To efficiently carry out these tasks, searching and sorting algorithms are used. One simple searching algorithm is linear search. Two well known sorting algorithms are the Selection Sort and the Bubble Sort. In this laboratory experience you will complete an application to monitor network flow to practice the implementation of algorithms for searching and sorting.
|
|
|
|
|
10
|
+When working with arrays, two common tasks are searching for data and sorting the data using a certain order, ascending or descending, alphabetically or numerically. To efficiently carry out these tasks, searching and sorting algorithms are used. One simple searching algorithm is linear search. Two well known sorting algorithms are Selection Sort and Bubble Sort. In this laboratory experience, you will complete an application to monitor network flow to practice the implementation of algorithms for searching and sorting.
|
11
|
|
11
|
|
12
|
|
12
|
|
13
|
##Objectives:
|
13
|
##Objectives:
|
|
|
|
|
33
|
|
33
|
|
34
|
4. Studied the concepts and instructions for the laboratory session.
|
34
|
4. Studied the concepts and instructions for the laboratory session.
|
35
|
|
35
|
|
36
|
-5. Taken the Pre-Lab quiz available through the course’s Moodle portal.
|
|
|
|
|
36
|
+5. Taken the Pre-Lab quiz, available in Moodle.
|
37
|
|
37
|
|
38
|
---
|
38
|
---
|
39
|
|
39
|
|
|
|
|
|
53
|
|
53
|
|
54
|
Port numbers are stored on 2 bytes (16 bits). Therefore, port numbers range from 0 to 65535. Some port numbers assigned to known service applications are: 22 for `ssh`, 23 for `telnet`, 25 `smtp`, 80 for `http`.
|
54
|
Port numbers are stored on 2 bytes (16 bits). Therefore, port numbers range from 0 to 65535. Some port numbers assigned to known service applications are: 22 for `ssh`, 23 for `telnet`, 25 `smtp`, 80 for `http`.
|
55
|
|
55
|
|
56
|
-The application that you will see today can be used to monitor what is known as NetFlows. One NetFlow is composed of the aggregation of the packets of an unidirectional communication between the the applications of two computers. For instance, a NetFlow can be composed of the packets used to send the information from you browser to the `http` application of the web server running Moodle.
|
|
|
|
|
56
|
+The application that you will see today can be used to monitor what is known as NetFlows. One NetFlow is composed of the aggregation of the packets of an unidirectional communication between the the applications of two computers. For instance, a NetFlow can be composed of the packets used to send the information from your browser to the `http` application of the web server running Moodle.
|
57
|
|
57
|
|
58
|
|
58
|
|
59
|
Figure 1 shows the interface for the *Network Analyzer* application.
|
59
|
Figure 1 shows the interface for the *Network Analyzer* application.
|
|
|
|
|
71
|
The application that you will complete gives the user the ability to analyze the status of the network. Among others it allows to:
|
71
|
The application that you will complete gives the user the ability to analyze the status of the network. Among others it allows to:
|
72
|
|
72
|
|
73
|
* identify which communications transmit the largests amount of data
|
73
|
* identify which communications transmit the largests amount of data
|
74
|
-* which applications are running in certain computers
|
|
|
75
|
-* which computers transmit a large amount of packets compared to the amount of data
|
|
|
|
|
74
|
+* identify which applications are running in certain computers
|
|
|
75
|
+* identify which computers transmit a large amount of packets compared to the amount of data
|
76
|
|
76
|
|
77
|
##Libraries
|
77
|
##Libraries
|
78
|
|
78
|
|
79
|
-For this laboratory experience you will use objects of class `vector`, which are similar to arrays, and you will need to know how to use the `size()` method of the `vector` class objects. You should also familiarize yourself with the `Packet` class defined in this project. The `Packet.h` library contains the setters and getters necessary to fill the information of a NetFlow packet.
|
|
|
|
|
79
|
+For this laboratory experience, you will use objects of class `vector`, which are similar to arrays, and you will need to know how to use the `size()` method of the `vector` class objects. You should also familiarize yourself with the `Packet` class defined in this project. The `Packet.h` library contains the setters and getters necessary to fill the information of a NetFlow packet.
|
80
|
|
80
|
|
81
|
---
|
81
|
---
|
82
|
|
82
|
|
|
|
|
|
209
|
|
209
|
|
210
|
[3] http://www.java2novice.com/java-sorting-algorithms/quick-sort/
|
210
|
[3] http://www.java2novice.com/java-sorting-algorithms/quick-sort/
|
211
|
|
211
|
|
212
|
-[4] http://intranet.deei.fct.ualg.pt/IC/t22.html
|
|
|
|
|
212
|
+[4] http://intranet.deei.fct.ualg.pt/IC/t22.html
|
|
|
213
|
+
|
|
|
214
|
+
|