Posts Tagged called

Stream Videos From Megaupload

I need a script or wordpress plugin to stream videos (mp4) from the filehostings directly – (megaupload mainly- if megaupload works i dont care about others). You can see a working example from m o v i e z e t DOT com.

Functionality:
Stream from Megaupload
Use player and load subtitles

I need this working for firefox, chrome, safari, IE and opera. I dont care if you copy part of the code from other sites or the player is a free player. I have a pretty clear idea of the php files it calls and javascript files that are called. I also have downloaded these files but I cant seem to get them to call each other correctly. I am pretty sure it is all there, just that the frame is not being called correctly. I can provide what I have if it reduces the workload and completion time. I really do feel like someone with a little more experience can work with the files i have retrieved from their site and get it together fairly quickly.

If you visit the site – you can see that the plugins for all the browsers are there. these can be downloaded locally, and then the files called inside can also be downloaded. When it is all said and done, the user-side script calls another server side script, which calls another which calls 1 of 3 php files, and then finally loads the fetched video on the swf player. I am pretty sure I have all the files that are called.

I have a wordpress test site running on a random domain that can be used for this project. I can provide via private message.

Tags: , , , , , , , , , , , , , , , ,

Pay To Book A Restaurant Table

I need a module for joomla that allows users to sign up and be able to book a table at a restaurant for a specified date with the number of people etc. Ideally i would like a credit system where they buy up and book a table and the credits is deducted but if that cant work then a simple pay as you go is sufficient. I came across a Joomla credit system called Joom Credit and a table reservations module called TableBooking. Is there any way we can mash these two together?

Tags: , , , , , , , , , , , , , , , ,

Domain Cleaner

We require a multi threaded windows based application that will analyze a large list "millions" of domain names "www." and then determine if the domain has an "MX" record or if it does "Not". The domain names that "do not have MX records" go into a list called "Bad" and The list of domain names that DO have MX records go into a list called "Good". It must be a multi-threaded program that the user can control the amount of threads used. We will pay $50 US dollars for this program

Tags: , , , , , ,

Web Scrapping And Excel Programmer 2

Generally speaking, I need a .net/C# programmer to write one trigger of excel, and one timer-controlled program of excel and web scrapping.

A). there are following elements involved in the trading process.
10). Stock trading software which is win app (no work needed)
20). Excel spreadsheet with one trigger and one program called status and two buttons. these programs are what you need to create. I will take care of structure and format of those spreadsheets.
30). Online broker.com web site (no work needed)
B). The process flow is as followings:
10). I open stock trading software at 6:30 am
20). Stock trading software will write first buy list at 6:40am to excel. List has stocks I want to buy.
30). An excel trigger should go to broker order page and fill an order and send it out,and then works on next order.
40). After 2 minutes , another excel program called status program (it should be separated from trigger) check order status on online broker, get order status, buying power, profit and etc, and update these columns of
spreadsheet. This program should send an email when finished one run. Other purpose of this action is to keep web site alive.
42). status program will check a command sheet at same time as step 40). if read "close all", status program should close all positions by sending order one by one to broker web page.
50). 6:50am, stock trading software write two lists to excel this time, one for buy and one for sell.
60). repeat step 30).
70). add a button on sheet called "close all" using the same code as 42).
80). add a button on sheet called "send order". Program check the checkboxes of a column called "send" to send order to broker.

C). The followings are optional
10). excel 2007 above
20). trigger of excel could be written in vb.net 3.5 or C# 3.5
30). status program could be written in C# 3.5
40). .net 3.5
50). logging block 3.5 for logging to access db
70). exception block 3.5 for excepion handling.

Tags: , , , , , ,

Excel VBA Macro Tool To Draw Org Charts

I am looking for a VBA / macro expert to build a tool that can automatically draw org charts in Excel.

The data is in spreadsheet form with a number of columns showing where each team sits and how each team is related. For example, column 3 says the name of the team is called BIG; column 2 says that the next team up the ladder (on the next level) is called BIGGER, and column 1 says that the next team above that is called BIGGEST. The spreadsheet has many of these rows. Obviously, each team can have a number of teams below it. For example, team BIGGER could also have a team called SMALL sitting below it.

Ideally the tool will draw the org chart and put in each box in the chart the name of the team and the number of staff (shown in column 4 of the spreadsheet).

Only VBA / macro can be used to build the tool to work in Excel 2003.

I need the tool by next week.

Tags: , , , , , , , , , , , , , , , ,

Face Book Page

Hi,
I have written a 12 month health and fatloss program (called obese2ease) as well as an ebook about diet for health and fatloss (called easybodyupgrade). I am a certified sports nutrition advisor, a ACE Fitness Trainer etc.
I am looking for someone who can help me make an effective facebook page for the category fatloss/weightloss which I can link to my current personal facebook page.
Anyway, I don`t know the first thing about all this, so just contact me with relevant questions and let me know what you can do including your charges.
Best

Thomas

Tags: , , , , , , , , , , , , , , , ,

Magento 1.4.1.1. Product Admin Grid (light Version)

We are looking for a modification of the Magento Module Enhanced Admin Product Grid.

The grid needs to get a custom layout.

As the Enhanced Admin Product Grid brings some configurable attributes into the overview, we would like to have the following attributes in the following order of appearance of the coloumns.

1) The standard checkbox for multiple product selection
2) The Status (active/ inactive)
3) Article last updated-date (with asc/dsc sort option, like all atrributes have)
4) A custom attribute called

Tags: , , , , , , , , , , , , , , , ,

Mass Article Submission Using Article Marketing Robot

HI

The Job:
You will be given Articles which you are to Spin using a software called TheBestSpinner and then you are to submit them to Article Sites using a Software called Article Marketing Robot.

Initially i will give you 10 articles to do this. If done well there will be many more for you to do and potentially on a regular basis.

Ideally you have already used the above 2 software so i should not have to provide any training.

IF you are interested please tell me about ur expertese with these software and examples if u have done any. Also it will be good if u have a team of ppl becasue if you are succesful then there will be high work load on a regular basis

Tags: , , , , , , , , , , , , , , , ,

Vbulletin Theme Needed

Hey I need a Vbulletin Theme for My V-bulletin 4.0.2

I need a theme for my guild for a game called Company of Heroes: Tales of Valor. I need a world war 2 based theme for my guild called Tales of Heroes. Im looking for professional work. I am willing to pay up to 150.00

Thank You!

Tags: , , , , , , , , , , , , , , , ,

Site Removal

I have recently has the displeasure of working with calling himself cyberking from the so called company : who are a talentless con company
I need someone to remove the pathetic unfinished eyesore they call a website, they are so bad they couldnt work out how to put it up so they have installed bits of it onto my friends website which they refused to remove when asked for the past 3 weeks so I need someone to remove it without causing damage to my friends site and then also remove it from where I paid someone else to install it for me to see the so called site
I need to put up a sign saying under construction until I can get someone with talent to redo the orriginal project
Oh and word of warning dont deal with Anirban Das from www.systechtechnologies.com they are the biggest rip off con people who shouldnt even be on gaf

Tags: , , , , , , , , , , , , , , , ,

Cincinnati Delivery Service

I would like a website created that is similar in design to malibudeliveryservice.com

I would like it to also have a calendar area with a daily menu for optional home cooked/ prepaired meals to buy.

I want to it to be catered to called Cincinnatideliveryserivce.com

I will only be servicing an are called Indian Hill so also indianhilldeliveryservice.com

Tags: , , , , , ,

IPhone Black-list – *** Urgent ***

I need application for Iphone to disconnect all calls exept 5 person in family list.
it need one option when some one from family list called, this Application answer call and play a music then caller press a key, it will ring the phone, otherwise any one called No Ring No answer until the application is running.

Tags: , , , , , , , , , , , , , , , ,

Android APP Black-List

Hi
I want to hire some to develop an app for Android,

Project Description:

I need application for Android to disconnect all calls exept 5 person in family list.
it need one option when some one from family list called, this Application answer call and play a music then if person in family list press a key. it will ring the phone, otherwise any one called No Ring No answer until the application is running.

Tags: , , , , , , , , , , , , , , , ,

Spoof Caller ID

Dear bidders,

I am having my own VoIP GSM gateway that basically used for termination business, what i need is when the calls terminated via the SIM cards installed in my gateway, either the caller ID number shows at the called party or a value I specify like 000 or "No Number" . I DO NOT WANT MY GATEWAY SIM CARDS NUMBERS SHOWN AT THE CALLED PARTY!

i surfed couple of websites explaining that with combining Asterisk and A2billing that would be possible, and that would be ultimate also for establishing a spoofing calling card service , where assigning a DID and callers calls in , they will be asked to Enter their PIN# , their number , and the number they wish to be shown at the called party.

Note: The mobile operator here in Egypt does not allow CLI restriction.

Tags: , , , , , , , , , , , , , , , ,

Data Import Script PHP

I get the attached file.

What I need is that the files that I will upload to a folder on my web server to be imported in to sperate mysql database tables.

For example the files that ends IPFP will import into a table called IPFP with all the content in there in to a table.
then files that end IPFPSMS to go in to a table called IPFPSMS, and the same for IPDC and IPDCFF.

I will provide the server details for the user to work on, plus database server access.

Tags: , , , , , , , , , , , , , , , ,

Magento Website: 2 Bug Fix + Update To Checkout

Were looking for someone who spends most of their time working with Magento. We would like to work with you in the future with more Magento projects. Please PM me with examples of you Magento work.

We have an existing Magento website that was updated about 6 months ago to version 1.4.1.0. The site has not be very active, so we did not notice that the update may of caused 2 bugs that we need to fix:

Bug 1: On Step 5 "Payment Information", when you click "continue" it doesnt do anything. Its like the button does not trigger anything to happen. (I will provide a link to the site if you PM me).

Bug 2: If you click on pay with Paypal, it goes to /paypal/express/shortcut/ which brings up a 404 error.

After we correct those bugs, we would like to make the following updates to the Checkout – Shipping options. We DO HAVE the "Aitoc – Magento Form Fields To Checkout" plugin. Heres the updates:

Update 1: We want to add a new shipping method called "Ship Using My Specified Carrier and Account". It would add the following text fields: "Carrier", "Account Number", "Contact Information" fields and "Notes" textbox. Basically, the customer is not charged anything – it just passes along these details and stores them on the order – accessible in the backend.

Update 2: Add another new shipping method called "Select a Carrier For Me and Add Shipping to My Order". Put this text under the title: "We will notify you when the shipping costs are ready for your approval". Basically, nothing will be charged for shipping intially. We will manually calculate shipping and need to add it to the order – Can we add the shipping amount into the backend and than charge it? What would be the best way to do this? (I suppose we could setup a product called "Shipping" and then use their account to purchase that "product". We would like your guidance here.

Tags: , , , , , , , , , , , , , , , ,

Implementing A Reliable Transport Protocol

Programming Assignment 5: Implementing a Reliable Transport Protocol

Overview

In this laboratory programming assignment, you will be writing the sending and receiving transport-level code for implementing a simple reliable data transfer protocol. There are two versions of this lab, the Alternating-Bit-Protocol version and the Go-Back-N version. This lab should be fun since your implementation will differ very little from what would be required in a real-world situation.

Since you probably dont have standalone machines (with an OS that you can modify), your code will have to execute in a simulated hardware/software environment. However, the programming interface provided to your routines, i.e., the code that would call your entities from above and from below is very close to what is done in an actual UNIX environment. (Indeed, the software interfaces described in this programming assignment are much more realistic that the infinite loop senders and receivers that many texts describe). Stopping/starting of timers are also simulated, and timer interrupts will cause your timer handling routine to be activated.
The routines you will write

The procedures you will write are for the sending entity (A) and the receiving entity (B). Only unidirectional transfer of data (from A to B) is required. Of course, the B side will have to send packets to A to acknowledge (positively or negatively) receipt of data. Your routines are to be implemented in the form of the procedures described below. These procedures will be called by (and will call) procedures that I have written which emulate a network environment. The overall structure of the environment is shown in Figure Lab.3-1 (structure of the emulated environment):

The unit of data passed between the upper layers and your protocols is a message, which is declared as:

struct msg {
char data[20];
};

This declaration, and all other data structure and emulator routines, as well as stub routines (i.e., those you are to complete) are in the file, prog2.c, described later. Your sending entity will thus receive data in 20-byte chunks from layer5; your receiving entity should deliver 20-byte chunks of correctly received data to layer5 at the receiving side.

The unit of data passed between your routines and the network layer is the packet, which is declared as:

struct pkt {
int seqnum;
int acknum;
int checksum;
char payload[20];
};

Your routines will fill in the payload field from the message data passed down from layer5. The other packet fields will be used by your protocols to insure reliable delivery, as weve seen in class.

The routines you will write are detailed below. As noted above, such procedures in real-life would be part of the operating system, and would be called by other procedures in the operating system.

* A_output(message), where message is a structure of type msg, containing data to be sent to the B-side. This routine will be called whenever the upper layer at the sending side (A) has a message to send. It is the job of your protocol to insure that the data in such a message is delivered in-order, and correctly, to the receiving side upper layer.

* A_input(packet), where packet is a structure of type pkt. This routine will be called whenever a packet sent from the B-side (i.e., as a result of a tolayer3() being done by a B-side procedure) arrives at the A-side. packet is the (possibly corrupted) packet sent from the B-side.

* A_timerinterrupt() This routine will be called when As timer expires (thus generating a timer interrupt). Youll probably want to use this routine to control the retransmission of packets. See starttimer() and stoptimer() below for how the timer is started and stopped.

* A_init() This routine will be called once, before any of your other A-side routines are called. It can be used to do any required initialization.

* B_input(packet),where packet is a structure of type pkt. This routine will be called whenever a packet sent from the A-side (i.e., as a result of a tolayer3() being done by a A-side procedure) arrives at the B-side. packet is the (possibly corrupted) packet sent from the A-side.

* B_init() This routine will be called once, before any of your other B-side routines are called. It can be used to do any required initialization.

Software Interfaces

The procedures described above are the ones that you will write. I have written the following routines which can be called by your routines:

* starttimer(calling_entity,increment), where calling_entity is either 0 (for starting the A-side timer) or 1 (for starting the B side timer), and increment is a float value indicating the amount of time that will pass before the timer interrupts. As timer should only be started (or stopped) by A-side routines, and similarly for the B-side timer. To give you an idea of the appropriate increment value to use: a packet sent into the network takes an average of 5 time units to arrive at the other side when there are no other messages in the medium.

* stoptimer(calling_entity), where calling_entity is either 0 (for stopping the A-side timer) or 1 (for stopping the B side timer).

* tolayer3(calling_entity,packet), where calling_entity is either 0 (for the A-side send) or 1 (for the B side send), and packet is a structure of type pkt. Calling this routine will cause the packet to be sent into the network, destined for the other entity.

* tolayer5(calling_entity,message), where calling_entity is either 0 (for A-side delivery to layer 5) or 1 (for B-side delivery to layer 5), and message is a structure of type msg. With unidirectional data transfer, you would only be calling this with calling_entity equal to 1 (delivery to the B-side). Calling this routine will cause data to be passed up to layer 5.

The simulated network environment

A call to procedure tolayer3() sends packets into the medium (i.e., into the network layer). Your procedures A_input() and B_input() are called when a packet is to be delivered from the medium to your protocol layer.

The medium is capable of corrupting and losing packets. It will not reorder packets. When you compile your procedures and my procedures together and run the resulting program, you will be asked to specify values regarding the simulated network environment:

* Number of messages to simulate. My emulator (and your routines) will stop as soon as this number of messages have been passed down from layer 5, regardless of whether or not all of the messages have been correctly delivered. Thus, you need not worry about undelivered or unACKed messages still in your sender when the emulator stops. Note that if you set this value to 1, your program will terminate immediately, before the message is delivered to the other side. Thus, this value should always be greater than 1.

* Loss. You are asked to specify a packet loss probability. A value of 0.1 would mean that one in ten packets (on average) are lost.

* Corruption. You are asked to specify a packet loss probability. A value of 0.2 would mean that one in five packets (on average) are corrupted. Note that the contents of payload, sequence, ack, or checksum fields can be corrupted. Your checksum should thus include the data, sequence, and ack fields.

* Tracing. Setting a tracing value of 1 or 2 will print out useful information about what is going on inside the emulation (e.g., whats happening to packets and timers). A tracing value of 0 will turn this off. A tracing value greater than 2 will display all sorts of odd messages that are for my own emulator-debugging purposes. A tracing value of 2 may be helpful to you in debugging your code. You should keep in mind that real implementors do not have underlying networks that provide such nice information about what is going to happen to their packets!

* Average time between messages from senders layer5. You can set this value to any non-zero, positive value. Note that the smaller the value you choose, the faster packets will be be arriving to your sender.

The Alternating-Bit-Protocol Version of this lab.

You are to write the procedures, A_output(),A_input(),A_timerinterrupt(),A_init(),B_input(), and B_init() which together will implement a stop-and-wait (i.e., the alternating bit protocol, which we referred to as rdt3.0 in the text) unidirectional transfer of data from the A-side to the B-side. Your protocol should use both ACK and NACK messages.

You should choose a very large value for the average time between messages from senders layer5, so that your sender is never called while it still has an outstanding, unacknowledged message it is trying to send to the receiver. Id suggest you choose a value of 1000. You should also perform a check in your sender to make sure that when A_output() is called, there is no message currently in transit. If there is, you can simply ignore (drop) the data being passed to the A_output() routine.

You should put your procedures in a file called prog2.c. You will need the initial version of this file, containing the emulation routines we have writen for you, and the stubs for your procedures. You can obtain this program from http://gaia.cs.umass.edu/kurose/transport/prog2.c.

This lab can be completed on any machine supporting C. It makes no use of UNIX features. (You can simply copy the prog2.c file to whatever machine and OS you choose).

We recommend that you should hand in a code listing, a design document, and sample output. For your sample output, your procedures might print out a message whenever an event occurs at your sender or receiver (a message/packet arrival, or a timer interrupt) as well as any action taken in response. You might want to hand in output for a run up to the point (approximately) when 10 messages have been ACKed correctly at the receiver, a loss probability of 0.1, and a corruption probability of 0.3, and a trace level of 2. You might want to annotate your printout with a colored pen showing how your protocol correctly recovered from packet loss and corruption.

Make sure you read the "helpful hints" for this lab following the description of the Go_Back-N version of this lab.

The Go-Back-N version of this lab.

You are to write the procedures, A_output(),A_input(),A_timerinterrupt(),A_init(),B_input(), and B_init() which together will implement a Go-Back-N unidirectional transfer of data from the A-side to the B-side, with a window size of 8. Your protocol should use both ACK and NACK messages. Consult the alternating-bit-protocol version of this lab above for information about how to obtain the network emulator.

We would STRONGLY recommend that you first implement the easier lab (Alternating Bit) and then extend your code to implement the harder lab (Go-Back-N). Believe me – it will not be time wasted! However, some new considerations for your Go-Back-N code (which do not apply to the Alternating Bit protocol) are:

* A_output(message), where message is a structure of type msg, containing data to be sent to the B-side.

Your A_output() routine will now sometimes be called when there are outstanding, unacknowledged messages in the medium – implying that you will have to buffer multiple messages in your sender. Also, youll also need buffering in your sender because of the nature of Go-Back-N: sometimes your sender will be called but it wont be able to send the new message because the new message falls outside of the window.

Rather than have you worry about buffering an arbitrary number of messages, it will be OK for you to have some finite, maximum number of buffers available at your sender (say for 50 messages) and have your sender simply abort (give up and exit) should all 50 buffers be in use at one point (Note: using the values given below, this should never happen!) In the “real-world, of course, one would have to come up with a more elegant solution to the finite buffer problem!

* A_timerinterrupt() This routine will be called when As timer expires (thus generating a timer interrupt). Remember that youve only got one timer, and may have many outstanding, unacknowledged packets in the medium, so youll have to think a bit about how to use this single timer.

Consult the Alternating-bit-protocol version of this lab above for a general description of what you might want to hand in. You might want to hand in output for a run that was long enough so that at least 20 messages were successfully transfered from sender to receiver (i.e., the sender receives ACK for these messages) transfers, a loss probability of 0.2, and a corruption probability of 0.2, and a trace level of 2, and a mean time between arrivals of 10. You might want to annotate parts of your printout with a colored pen showing how your protocol correctly recovered from packet loss and corruption.

For extra credit, you can implement bidirectional transfer of messages. In this case, entities A and B operate as both a sender and receiver. You may also piggyback acknowledgments on data packets (or you can choose not to do so). To get my emulator to deliver messages from layer 5 to your B_output() routine, you will need to change the declared value of BIDIRECTIONAL from 0 to 1.
Helpful Hints and the like

* Checksumming. You can use whatever approach for checksumming you want. Remember that the sequence number and ack field can also be corrupted. We would suggest a TCP-like checksum, which consists of the sum of the (integer) sequence and ack field values, added to a character-by-character sum of the payload field of the packet (i.e., treat each character as if it were an 8 bit integer and just add them together).

* Note that any shared "state" among your routines needs to be in the form of global variables. Note also that any information that your procedures need to save from one invocation to the next must also be a global (or static) variable. For example, your routines will need to keep a copy of a packet for possible retransmission. It would probably be a good idea for such a data structure to be a global variable in your code. Note, however, that if one of your global variables is used by your sender side, that variable should NOT be accessed by the receiving side entity, since in real life, communicating entities connected only by a communication channel can not share global variables.

* There is a float global variable called time that you can access from within your code to help you out with your diagnostics msgs.

* START SIMPLE. Set the probabilities of loss and corruption to zero and test out your routines. Better yet, design and implement your procedures for the case of no loss and no corruption, and get them working first. Then handle the case of one of these probabilities being non-zero, and then finally both being non-zero.

* Debugging. Wed recommend that you set the tracing level to 2 and put LOTS of printfs in your code while your debugging your procedures.

* Random Numbers. The emulator generates packet loss and errors using a random number generator. Our past experience is that random number generators can vary widely from one machine to another. You may need to modify the random number generation code in the emulator we have suplied you. Our emulation routines have a test to see if the random number generator on your machine will work with our code. If you get an error message:

It is likely that random number generation on your machine is different from what this emulator expects. Please take a look at the routine jimsrand() in the emulator code. Sorry.

then youll know youll need to look at how random numbers are generated in the routine jimsrand(); see the comments in that routine.

Q&A

When weve taught this lab in our introductory neworking course, students have posed versious questions. If you are interested in looking at the questions weve received (and answers), check out http://gaia.cs.umass.edu/kurose/transport/programming_assignment_QA.htm

Tags: , , , , , , , , , , , , , , , ,

Implementing A Reliable Transport Protocol

Programming Assignment 5: Implementing a Reliable Transport Protocol

Overview

In this laboratory programming assignment, you will be writing the sending and receiving transport-level code for implementing a simple reliable data transfer protocol. There are two versions of this lab, the Alternating-Bit-Protocol version and the Go-Back-N version. This lab should be fun since your implementation will differ very little from what would be required in a real-world situation.

Since you probably dont have standalone machines (with an OS that you can modify), your code will have to execute in a simulated hardware/software environment. However, the programming interface provided to your routines, i.e., the code that would call your entities from above and from below is very close to what is done in an actual UNIX environment. (Indeed, the software interfaces described in this programming assignment are much more realistic that the infinite loop senders and receivers that many texts describe). Stopping/starting of timers are also simulated, and timer interrupts will cause your timer handling routine to be activated.
The routines you will write

The procedures you will write are for the sending entity (A) and the receiving entity (B). Only unidirectional transfer of data (from A to B) is required. Of course, the B side will have to send packets to A to acknowledge (positively or negatively) receipt of data. Your routines are to be implemented in the form of the procedures described below. These procedures will be called by (and will call) procedures that I have written which emulate a network environment. The overall structure of the environment is shown in Figure Lab.3-1 (structure of the emulated environment):

The unit of data passed between the upper layers and your protocols is a message, which is declared as:

struct msg {
char data[20];
};

This declaration, and all other data structure and emulator routines, as well as stub routines (i.e., those you are to complete) are in the file, prog2.c, described later. Your sending entity will thus receive data in 20-byte chunks from layer5; your receiving entity should deliver 20-byte chunks of correctly received data to layer5 at the receiving side.

The unit of data passed between your routines and the network layer is the packet, which is declared as:

struct pkt {
int seqnum;
int acknum;
int checksum;
char payload[20];
};

Your routines will fill in the payload field from the message data passed down from layer5. The other packet fields will be used by your protocols to insure reliable delivery, as weve seen in class.

The routines you will write are detailed below. As noted above, such procedures in real-life would be part of the operating system, and would be called by other procedures in the operating system.

* A_output(message), where message is a structure of type msg, containing data to be sent to the B-side. This routine will be called whenever the upper layer at the sending side (A) has a message to send. It is the job of your protocol to insure that the data in such a message is delivered in-order, and correctly, to the receiving side upper layer.

* A_input(packet), where packet is a structure of type pkt. This routine will be called whenever a packet sent from the B-side (i.e., as a result of a tolayer3() being done by a B-side procedure) arrives at the A-side. packet is the (possibly corrupted) packet sent from the B-side.

* A_timerinterrupt() This routine will be called when As timer expires (thus generating a timer interrupt). Youll probably want to use this routine to control the retransmission of packets. See starttimer() and stoptimer() below for how the timer is started and stopped.

* A_init() This routine will be called once, before any of your other A-side routines are called. It can be used to do any required initialization.

* B_input(packet),where packet is a structure of type pkt. This routine will be called whenever a packet sent from the A-side (i.e., as a result of a tolayer3() being done by a A-side procedure) arrives at the B-side. packet is the (possibly corrupted) packet sent from the A-side.

* B_init() This routine will be called once, before any of your other B-side routines are called. It can be used to do any required initialization.

Software Interfaces

The procedures described above are the ones that you will write. I have written the following routines which can be called by your routines:

* starttimer(calling_entity,increment), where calling_entity is either 0 (for starting the A-side timer) or 1 (for starting the B side timer), and increment is a float value indicating the amount of time that will pass before the timer interrupts. As timer should only be started (or stopped) by A-side routines, and similarly for the B-side timer. To give you an idea of the appropriate increment value to use: a packet sent into the network takes an average of 5 time units to arrive at the other side when there are no other messages in the medium.

* stoptimer(calling_entity), where calling_entity is either 0 (for stopping the A-side timer) or 1 (for stopping the B side timer).

* tolayer3(calling_entity,packet), where calling_entity is either 0 (for the A-side send) or 1 (for the B side send), and packet is a structure of type pkt. Calling this routine will cause the packet to be sent into the network, destined for the other entity.

* tolayer5(calling_entity,message), where calling_entity is either 0 (for A-side delivery to layer 5) or 1 (for B-side delivery to layer 5), and message is a structure of type msg. With unidirectional data transfer, you would only be calling this with calling_entity equal to 1 (delivery to the B-side). Calling this routine will cause data to be passed up to layer 5.

The simulated network environment

A call to procedure tolayer3() sends packets into the medium (i.e., into the network layer). Your procedures A_input() and B_input() are called when a packet is to be delivered from the medium to your protocol layer.

The medium is capable of corrupting and losing packets. It will not reorder packets. When you compile your procedures and my procedures together and run the resulting program, you will be asked to specify values regarding the simulated network environment:

* Number of messages to simulate. My emulator (and your routines) will stop as soon as this number of messages have been passed down from layer 5, regardless of whether or not all of the messages have been correctly delivered. Thus, you need not worry about undelivered or unACKed messages still in your sender when the emulator stops. Note that if you set this value to 1, your program will terminate immediately, before the message is delivered to the other side. Thus, this value should always be greater than 1.

* Loss. You are asked to specify a packet loss probability. A value of 0.1 would mean that one in ten packets (on average) are lost.

* Corruption. You are asked to specify a packet loss probability. A value of 0.2 would mean that one in five packets (on average) are corrupted. Note that the contents of payload, sequence, ack, or checksum fields can be corrupted. Your checksum should thus include the data, sequence, and ack fields.

* Tracing. Setting a tracing value of 1 or 2 will print out useful information about what is going on inside the emulation (e.g., whats happening to packets and timers). A tracing value of 0 will turn this off. A tracing value greater than 2 will display all sorts of odd messages that are for my own emulator-debugging purposes. A tracing value of 2 may be helpful to you in debugging your code. You should keep in mind that real implementors do not have underlying networks that provide such nice information about what is going to happen to their packets!

* Average time between messages from senders layer5. You can set this value to any non-zero, positive value. Note that the smaller the value you choose, the faster packets will be be arriving to your sender.

The Alternating-Bit-Protocol Version of this lab.

You are to write the procedures, A_output(),A_input(),A_timerinterrupt(),A_init(),B_input(), and B_init() which together will implement a stop-and-wait (i.e., the alternating bit protocol, which we referred to as rdt3.0 in the text) unidirectional transfer of data from the A-side to the B-side. Your protocol should use both ACK and NACK messages.

You should choose a very large value for the average time between messages from senders layer5, so that your sender is never called while it still has an outstanding, unacknowledged message it is trying to send to the receiver. Id suggest you choose a value of 1000. You should also perform a check in your sender to make sure that when A_output() is called, there is no message currently in transit. If there is, you can simply ignore (drop) the data being passed to the A_output() routine.

You should put your procedures in a file called prog2.c. You will need the initial version of this file, containing the emulation routines we have writen for you, and the stubs for your procedures. You can obtain this program from http://gaia.cs.umass.edu/kurose/transport/prog2.c.

This lab can be completed on any machine supporting C. It makes no use of UNIX features. (You can simply copy the prog2.c file to whatever machine and OS you choose).

We recommend that you should hand in a code listing, a design document, and sample output. For your sample output, your procedures might print out a message whenever an event occurs at your sender or receiver (a message/packet arrival, or a timer interrupt) as well as any action taken in response. You might want to hand in output for a run up to the point (approximately) when 10 messages have been ACKed correctly at the receiver, a loss probability of 0.1, and a corruption probability of 0.3, and a trace level of 2. You might want to annotate your printout with a colored pen showing how your protocol correctly recovered from packet loss and corruption.

Make sure you read the "helpful hints" for this lab following the description of the Go_Back-N version of this lab.

The Go-Back-N version of this lab.

You are to write the procedures, A_output(),A_input(),A_timerinterrupt(),A_init(),B_input(), and B_init() which together will implement a Go-Back-N unidirectional transfer of data from the A-side to the B-side, with a window size of 8. Your protocol should use both ACK and NACK messages. Consult the alternating-bit-protocol version of this lab above for information about how to obtain the network emulator.

We would STRONGLY recommend that you first implement the easier lab (Alternating Bit) and then extend your code to implement the harder lab (Go-Back-N). Believe me – it will not be time wasted! However, some new considerations for your Go-Back-N code (which do not apply to the Alternating Bit protocol) are:

* A_output(message), where message is a structure of type msg, containing data to be sent to the B-side.

Your A_output() routine will now sometimes be called when there are outstanding, unacknowledged messages in the medium – implying that you will have to buffer multiple messages in your sender. Also, youll also need buffering in your sender because of the nature of Go-Back-N: sometimes your sender will be called but it wont be able to send the new message because the new message falls outside of the window.

Rather than have you worry about buffering an arbitrary number of messages, it will be OK for you to have some finite, maximum number of buffers available at your sender (say for 50 messages) and have your sender simply abort (give up and exit) should all 50 buffers be in use at one point (Note: using the values given below, this should never happen!) In the “real-world, of course, one would have to come up with a more elegant solution to the finite buffer problem!

* A_timerinterrupt() This routine will be called when As timer expires (thus generating a timer interrupt). Remember that youve only got one timer, and may have many outstanding, unacknowledged packets in the medium, so youll have to think a bit about how to use this single timer.

Consult the Alternating-bit-protocol version of this lab above for a general description of what you might want to hand in. You might want to hand in output for a run that was long enough so that at least 20 messages were successfully transfered from sender to receiver (i.e., the sender receives ACK for these messages) transfers, a loss probability of 0.2, and a corruption probability of 0.2, and a trace level of 2, and a mean time between arrivals of 10. You might want to annotate parts of your printout with a colored pen showing how your protocol correctly recovered from packet loss and corruption.

For extra credit, you can implement bidirectional transfer of messages. In this case, entities A and B operate as both a sender and receiver. You may also piggyback acknowledgments on data packets (or you can choose not to do so). To get my emulator to deliver messages from layer 5 to your B_output() routine, you will need to change the declared value of BIDIRECTIONAL from 0 to 1.
Helpful Hints and the like

* Checksumming. You can use whatever approach for checksumming you want. Remember that the sequence number and ack field can also be corrupted. We would suggest a TCP-like checksum, which consists of the sum of the (integer) sequence and ack field values, added to a character-by-character sum of the payload field of the packet (i.e., treat each character as if it were an 8 bit integer and just add them together).

* Note that any shared "state" among your routines needs to be in the form of global variables. Note also that any information that your procedures need to save from one invocation to the next must also be a global (or static) variable. For example, your routines will need to keep a copy of a packet for possible retransmission. It would probably be a good idea for such a data structure to be a global variable in your code. Note, however, that if one of your global variables is used by your sender side, that variable should NOT be accessed by the receiving side entity, since in real life, communicating entities connected only by a communication channel can not share global variables.

* There is a float global variable called time that you can access from within your code to help you out with your diagnostics msgs.

* START SIMPLE. Set the probabilities of loss and corruption to zero and test out your routines. Better yet, design and implement your procedures for the case of no loss and no corruption, and get them working first. Then handle the case of one of these probabilities being non-zero, and then finally both being non-zero.

* Debugging. Wed recommend that you set the tracing level to 2 and put LOTS of printfs in your code while your debugging your procedures.

* Random Numbers. The emulator generates packet loss and errors using a random number generator. Our past experience is that random number generators can vary widely from one machine to another. You may need to modify the random number generation code in the emulator we have suplied you. Our emulation routines have a test to see if the random number generator on your machine will work with our code. If you get an error message:

It is likely that random number generation on your machine is different from what this emulator expects. Please take a look at the routine jimsrand() in the emulator code. Sorry.

then youll know youll need to look at how random numbers are generated in the routine jimsrand(); see the comments in that routine.

Q&A

When weve taught this lab in our introductory neworking course, students have posed versious questions. If you are interested in looking at the questions weve received (and answers), check out http://gaia.cs.umass.edu/kurose/transport/programming_assignment_QA.htm

Tags: , , , , , , , , , , , , , , , ,

Petunia Pear And Mr Sun2

OK on my youtube account peterthesongman there is a partly completed story I wrote called PETUNIA PEAR AND MR SUN. http://www.youtube.com/peterthesongman#p/u/13/Skx_pxcSKGU (hope it shows up)

This story features animated plates from a book I wrote in the 80s in a series called THE LAND OF TUTTI FRUTTI. This series aimed to teach children various lessons. This one teaches patience. Now Ive dabbled on facebook, seen all sorts of offers "make a million from this and that" and I find it all confusing. I still have to finish this story which has my own original songs and story – but I want to as well as the other 3 in the series also with original songs

BUT I NEED A WAY TO GET IT OUT INTO THE WORLD – TO MARKET IT

I need a website I guess and a strategy – what am I selling – I have 4 different original title books – I have this Petunia which can end up on a dvd

This is why I am writing

Would appreciate your bonafide help and hopefully you will like what I am doing or am trying to achieve.

Tags: , , , , , , , , , , , , , , , ,

Graphics For Several Wedding Websites

<b>Read the directions carefully – you will be designing six graphics and submitting them as a PM (watermark them please)

I will determine which set I like the best and award the winner $50 US</b>

Now…look at www.maineweddingplanner.com

The banner graphic is 934 x 192 pixels, the blog graphic is 438 x 132

I have three similar sites these will be going on, but need to have different names and would like different photos for each site (I can tell them apart this way)

www.nhweddingplanner.com
Called New Hampshire Wedding Planner

For the two below, I would like a more tropical look to the graphics (beach wedding, etc)
www.tampabayweddingday.com – Called Tampa Bay Wedding Day
www.sarasotaweddingplanner.net – Called Sarasota Wedding Planner

Tags: , , , , , , , , , , , , , , , ,

Mobile Phone Spy Software

Hello,

I need a sofware that works like a keylogger for mobile phones (symbian, android, iphone, and blackberry)

software system must allow you to log in from any computer and supervise any smart phone or BlackBerry on real time. After installing it on any phone , you can monitor what it is done with it from your computer. You must have a username and password and login to a website and see the following:

Call Tracking:

See the numbers that had been called. Or, which numbers have called them. In addition, you can see how many calls were made for each number, at what time they were made, and how long each call lasted. Also, if the number is registered under a name in the phones memory, you can see it.

SMS Tracking:

You can read any message that was received by or sent from the phone.

GPS Location tracking:

You can track the exact position of the phone using Google Maps.

All this information must be sent from the phone to my website after the software had been installed on the mobile phone.

To see an example of someones website that done this visit www.spybubble.com and see the demo.

Tags: , , , , , , , , , , , , , , , ,

CD Cover Design, Back And Front

I need a CD cover designed for a Pop/punk Bank from Canberra, Australia.

The band is called "Dr Johnson"

The EP/CD is called "Youre a Nation"

Were looking for someone to create it with a sense of humor, bright colours would be great and as quick as possible would be even better!

Dont worry too much about the song names on the back of the CD as we have that covered =D

Happy bidding!

Tags: , , , , , , , , , , , ,

Content For Gambling Websites

I have 20 websites which require content. I am looking for a writer who can produce 5 articles for each website. So a total of 100 articles are required (350 to 400 words in length as a guide).

I would supply you with the URLs, and I would then expect you to produce suitable content based on the URLs. i.e. If I had a site called called "onlinecasinogames.tld" – I would expect you to write articles about Online Casino Games, Casino Bonus Offers, Blackjack, etc.

I would prefer only to work with people who can show samples of work in this niche area. You are bidding your total price for the 100 articles.

Tags: , , , , , , , , , , , , , , , ,

Phone Spy Software

Hello,

I need a sofware that works like a keylogger for mobile phones (symbian, android, iphone, and blackberry)

software system must allow you to log in from any computer and supervise any smart phone or BlackBerry on real time. After installing it on any phone , you can monitor what it is done with it from your computer. You must have a username and password and login to a website and see the following:

Call Tracking:

See the numbers that had been called. Or, which numbers have called them. In addition, you can see how many calls were made for each number, at what time they were made, and how long each call lasted. Also, if the number is registered under a name in the phones memory, you can see it.

SMS Tracking:

You can read any message that was received by or sent from the phone.

GPS Location tracking:

You can track the exact position of the phone using Google Maps.

All this information must be sent from the phone to my website after the software had been installed on the mobile phone.

To see an example of someones website that done this visit www.spybubble.com and see the demo.

Tags: , , , , , , , , , , , , , , , ,

Phone # And Extractor W/ Cell And Landline Sorter.

Need an app made that will extract telephone #s from a full comma deliminated database file .csv / .sql etc.

it needs to extract telephone #s from the files then it needs to sort them by landline and cellphone i have a list of extentions for this purpose that belong to cell carriers. the software will take all those and output a file called cell.txt and the rest dump to a file called land.txt

it should be a simple job for most programmers.

Tags: , , , , , , , , , , , , , , , ,

PHPTIMECLOCK FIELD ADJUSTMENTS

I need some adjustments made to a phptimeclock. Its to be hosted on a Linux Server.

If you go to http://phptimeclock.com

click on Forums tab,

then choose "off topic"

next choose, "demo install" scroll down page and choose "version 1."

Top right corner youll see "reports"

Login with user: admin , pass: admin

For example go to

Tags: , , , , , , , , , , , , , , , ,

Excel Files Needed With Sequential Serial Numbers And Random

Excel Files Needed with Sequential Serial Numbers and Random Authorization Codes

I need two Excel files. One called AK-Credit.xls and the other to be called AK-Debit.xls

====

The AK-Credit file needs to have the first column called Credit Serial # and the second column called Credit Authorization Codes

The first column needs sequential serials numbers generated from 1 to 10,000,000 (10 million) with the letter C before the serial number such as C1, C2, C3, C4 … C108, C109 … C125345788, C125345789 all the way from 1 to 10 million with C10000000 being the last number.

The second column needs a random uppercase 6 digit alpha/numeric authorization code generated for all 10 million credit serial numbers.

====

The AK-Debit file needs to have the first column called Debit Serial # and the second column called Debit Authorization Codes

The first column needs sequential serials numbers generated from 1 to 10,000,000 (10 million) with the letter D before the serial number such as D1, D2, D3, D4 … D108, D109 … D125345788, D125345789 all the way from 1 to 10 million with D10000000 being the last number.

The second column needs a random uppercase 6 digit alpha/numeric authorization code generated for all 10 million debit serial numbers.

Tags: , , , , , , , , , , , , , , , ,