Please consider offering answers and suggestions to help other students!
And if you fix a problem by following a suggestion here,
it would be great if other interested students could see a short
"Great, fixed it!" followup message.
How do I ask a good question?
181 articles posted by this person
Showing 181 of 503 articles.
Currently 6 other people reading this forum.
Project marks for both the group code component and the individual reflection component are now available via csmarks.
The average for the group component was 20.7 30 and for the reflection 7.0 10, an overall average of 69.2 for the project (quite cl...
ANONYMOUS wrote
Yes, we have finished marking the projects, have combined the results from the demonstrations and code inspection. I'm just incorporating any late-penalties and checking the UAAP conditions.
ANONYMOUS wrote
In the spirit of how the question is asked, the class is a property which simply determines the size number of the network and host values.
There's still 2 other important properties.
ANONYMOUS wrote
They're certainly relevant to answering the question, but see it as an exercise in writing your best answer, not just a sufficient one.
ANONYMOUS wrote
The matter of what are traditional file-system semantics should already be quite clear to you. What do we expect a file-system to do for us - to reliably store and transfer copy data, not losing any data, not replicating any data. Ho...
ANONYMOUS wrote
The simplest approach, avoiding the problems you've identified with detecting if the channel is in use, and collating the utilisation from each node, is to follow the same approach discussed in Q1 of Tutorial 3.
Unfortunately, project marks will not be available before the final exams.
Our lab facilitators are making progress in the marking, but also have exams of their own to attend to.
ANONYMOUS wrote
The emphasis is on the word 'semantics' - how things must work as expected.
For example, authentication is not required for a file-system to work as expected.
ANONYMOUS wrote
Not sure how to ask this more clearly.
It's referring to the properties of the addresses, their representation, and their use.
Also, unsure what your "four fields" refers to.
ANONYMOUS wrote
It's based on the assumption that the bad actors first broke into the host computer to install and then launch their attack. Once the origin of the attack (the host) has been identified, and the bad actors have long departed, the owne...
ANONYMOUS wrote
The code is certainly not assessable, but the motivation for and generation of the code by tools such as rpcgen is.
How does the use of the RPC approach enable the client software and the server software, on different computers owned b...
ANONYMOUS wrote
Pages 17 onwards of Lecture 4 clearly provide an outline, as do the relevant sections from either of the 2 textbooks - what 802.11 is, what are its goals, how does it work, under what circumstances does it not work (well).
Your questio...
ANONYMOUS wrote
Yes, your pseudo-code should include an 'implementation' of binary-exponential backoff, as the delays of each node (based on their observations of collisions) will affect when they transmit retransmit in the future and, thus, affect h...
The mid-semester tests have been marked, reviewed, and are finally available in csmarks.
217 students sat the test (195 in 2023), and the average mark (after some remarking) is 11.1 20 (was 9.8 20 in 2023).
Congratulations to the 61 students receiving ...
ANONYMOUS wrote
You've been provided a marking rubric; it's not a marking sheet.
If you make a reasonable attempt at each of the rubric's sections, are able to explain and justify your decisions, and the implementation for that section can be easily ...
ANONYMOUS wrote
From Wikipedia (not the best resource, but reliable)
"The maximum IP packet size is 65,535 bytes (2 16-1), including all headers and usually requiring fragmentation. Assuming standard headers, IPv4 uses 20 bytes and UDP 8 bytes. Th...
ANONYMOUS wrote
The station names have no significance; they do not imply any relationship with their neighbours (just like real train-station names (often suburb names) have no relationship to their neighbours).
I'm afraid that I don't under your sec...
Hi Henry,
There's no requirement for your protocol to find all station names, and no station should need to know use all other station names in your protocol.
But see https secure.csse.uwa.edu.au run help3002?p np opt B361 year 2024
Each station only...
Sorry, but no.
All assessment deadlines, across campus, are set and announced by the first day of each semester. This gives all students the equal chance to plan their workloads, particularly in the latter part of a semester when most assessments are...
On the Clarifications page
"The fastest journey to a destination (from 'now') is one that arrives at the destination soonest, independent of when it starts."
ANONYMOUS wrote
If anything is an unrecognised request - doesn't provide a destination station and a leaving time - then it's a request that your station (web-server) doesn't support, or can't provide.
What do typical web-servers do when they can't do...
ANONYMOUS wrote
All stations are aligned by your common protocol, they must send, receive, and act upon your protocol messages in the same way.
Their front-ends, involving the browser, does not have to be identical (though I can't imagine you'd wish ...
ANONYMOUS wrote
It's certainly possible, but time prevents me from writing something like that this semester.
I've made a slightly modified buildrandomtimetables.c - https teaching.csse.uwa.edu.au units CITS3002 project2024 buildrandomtimetables.c
wh...
Yes, it's a standard Python module but, as I mentioned a few time in other questions, I worry that your design model is more complicated than it needs to be.
ANONYMOUS wrote
There's no emphasis on speed or great efficiency in this project,
but I'm surprised to read that you're using UDP datagrams in a connected manner (guessing you're using send() rather than sendto() ).
I've found it much easie...
ANONYMOUS wrote
Glad that something's working for you,
though I can see how allowing the select() call to unblock after 10sec would help the datagrams arrive.
It sounds like you don't have all the important descriptors set in your readset .
ANONYMOUS wrote
I appreciate that no-one likes the phrase, but "it works for me"
create bind to your TCP and UDP sockets
sleep(2)
transmit a 'hello' datagram to your neighbours
enter your select() loop
.....
receive 'hello' datagr...
ANONYMOUS wrote
One possibility - if you're starting all of your station servers from a script then, when one of them transmits that first 'hello' datagram, its destination server might not have started yet. The datagram is transmitted, but there's n...
ANONYMOUS wrote
Not permitted, because it's not what is specified on the project sheet,
and will prevent your project from being tested using some common scripts.
It's trivial to first send a datagram to each of your neighbours, telling them your name....
ANONYMOUS wrote
Ouch I've cut-and-paste that bit from another recent project (and it's been proofread 'a million' times), but you're the first to find that error (thank you ).
It now correctly states
"You must clearly describe your design choices, ...
ANONYMOUS wrote
You're writing two servers, one in language L1 and the other in language L2.
Instances of the server written in L1 should be able to communicate with servers written in L2.
As they need to communicate using (your) common protocol, they'...
ANONYMOUS wrote
There's a past discussion on this here https secure.csse.uwa.edu.au run help3002?p np opt U309
The unreliability of UDP needs to be addressed so that any lost datagrams do not prevent a query being answered.
The use of sequence numb...
Hi Jasper,
Yes, this is permitted within our scope, but I can't immediately see any advantage to it.
If a datagram is sent from temporary socket, with a randomly assigned port, then the station receiving that datagram doesn't know which station sent it...
ANONYMOUS wrote
Because the station that determines the best result, possibly by receiving and comparing multiple responses, might not be a neighbour of the original station that started the query.
There are many possible ways to implement this applic...
(coincidentally, this was discussed in a tutorial, yesterday)
Stations should not know (or need) the names of all other stations when sending out their queries, other than when identifying a particular destination.
But it is reasonable for each station...
ANONYMOUS wrote
Stations can only communicate with their neighbours, using UDP and their port number provided on the command-line.
A station is not permitted to know the hostname port of any non-neighbouring station, so that information should not be ...
ANONYMOUS wrote
Absolutely - as outlined in last week's lecture.
There are ways (but they are very off-topic, and have not been introduced in your degree).
Review last week's lecture, and you'll see you don't require that concurrent execution.
ANONYMOUS wrote
ou're welcome to use, change, or ignore any of the scripts and files I've provided, including that HTML page.
I feel it's a simple, useful, change to let the user select the time.
ANONYMOUS wrote
(ask me, or my father?)
Yes, you may use fork() , provided that the parent and child only communication using socket-based protocols.
But I'm encouraging you to seriously ask - why do you need a new heavy-weight process, presumably...
"A local authority has announced it will ban apostrophes on street signs to avoid problems with computer systems."
https www.bbc.com news uk-england-york-north-yorkshire-68942321
ANONYMOUS wrote
Always difficult to diagnose, but is the receiver converting the port from network-standard-order to host-order before displaying and re-using it?
ANONYMOUS wrote
You do not have to use any of the scripts described linked on the Getting Started page.
They are just provided as, hopefully helpful, suggestions.
Hubble Network makes Bluetooth connection with a satellite for the first time
https techcrunch.com 2024 05 02 hubble-network-connects-a-bluetooth-chip-to-a-satellite-for-the-first-time
"The Seattle-based startup launched its first two satellites t...
ANONYMOUS wrote
No, it's not intentional, just something that I hadn't spotted.
...still thinking on this one, with the goal of not making the project any more difficult (in terms of networking) than intended.
ANONYMOUS wrote
Yes (there's a lot of overlap, here, with what we discussed in Tutorial 4)
It's very likely that your home router will support private addresses of the form 192.168.x.y (a widely used default), and that your neighbour's router will use...
ANONYMOUS wrote
Yes, permitted, because they are both 'core' in the C11 snd Python-3.12 standards, so no external libraries or modules required.
However, you'll very likely find that using threads makes your program more complicated to design (and deb...
ANONYMOUS wrote
Yes, but I can't imagine why you'd need to.
It would be interesting to hear what you need serialisation for. A non-linear data-structure??
If you are passing integers, you can use htonl(), and its reverse.
Strings don't require serialisa...
ANONYMOUS wrote
(disappointing that no-one else has answered this)
The character is not an argument to your station-server.
It is a token for your shell (on both Linux and macOS), requesting that the command be executed in the background
- the comm...
ANONYMOUS wrote
Hey.
The goal is to make a useable web-based application that reports correct information, or indicates if there is no 'solution' to a query.
You will need to ask the starting station-A
"how to I get from station-A to station-B, le...
It is a fact, and 'built-in' feature of UDP, that "If a datagram arrives, it will be uncorrupted" - that statement is not a requirement (to add support) for the project.
I strongly suggest that you read from a textbook or the Beej tutorial to get a ba...
ANONYMOUS wrote
This is a Level-3 unit, in which the project's requirements are listed, but actual implementation details are not specified.
You are not being told what you have to do, nor how you have to implement your solution.
The problem is not...
ANONYMOUS wrote
When I've finished reviewing some low-scoring papers, and entered all the marks, I'll announce that they are ready to be picked up.
The CSSE front office runs for very standard office hours, each weekday, and or leave a sign up when th...
The BASIC programming language turns 60
https arstechnica.com gadgets 2024 05 the-basic-programming-language-turns-60
"Sixty years ago, on May 1, 1964, at 4 am in the morning, a quiet revolution in computing began at Dartmouth College. That's when...
I've just been having another look at this, and the simplest solution appears to be to just use the default language dialects, without providing specific command-line arguments.
On Linux, using a recent version of gcc ( gcc --version , probably 13...
ANONYMOUS wrote
You do not have to use or mimic the provided scripts - they are provided as a guide to help your understanding, or as a starting point to create modify your own.
The provided materials are not 'part of the project' - the only software ...
ANONYMOUS wrote
I'm unsure what difficulties you're having.
The format of the timetable files is described on the Gatting Started page. You can either use the provided scripts and compiled C file to generate correct (connected) timetables, or genera...
ANONYMOUS wrote
You may use any other materials I've provided.
Note, however, that mywebpage.html and or the script that generated it, will require changing if you have different station names, and begin developing for multiple computers.
Hi Ethan,
In practice this obviously would be physically impossible, so there's only a need to support transfers with at least 1 minute between arriving and leaving (and, in practice, even that 1 minute would be far too short).
ANONYMOUS wrote
I suggest that you keep thinking or designing your protocol - I can't imagine any protocol requiring any UDP message between station-servers to be bigger than a few hundred bytes (given that we've defined the maximum station name size...
ANONYMOUS wrote
Yes, you're welcome to create any additional scripts that you choose
(though I'm unsure why presenting and parsing the data in JSON will make things easier for you).
ANONYMOUS wrote
The requirements are that each server, which owns the timetable of a single station, has two open ports
- its TCP IP port for communicating using HTML, typically between a web-browser or the command-line utility 'curl'.
- its UDP IP po...
ANONYMOUS wrote
Once you have implemented either TCP or UDP communication with your servers, you can add a new command to haver them terminate (themselves).
ANONYMOUS wrote
Yes, sys is a (very) standard module, so feel free to use it.
Though I can't see why you'd need to use getopt , as you can simply access elements of sys.argv ?
ANONYMOUS wrote
Your question is not really about compilers, but about language standards or dialects
https gcc.gnu.org onlinedocs gcc-13.2.0 gcc Standards.html C-Language
If needing to use -std gnu11, rather than just -std c11 (gcc's current def...
Implementing this project using asynchronous I O is probably 'overkill' for the type and frequency of traffic your project will transmit and receive. You may prefer an approach involving https docs.python.org 3.12 library select.html select.select...
ANONYMOUS wrote
When using UDP, its packets may be lost (though not corrupted, or incorrectly delivered).
Your project will need to account for that possible loss.
Sorry, that was badly worded. Your project will need to eventually execute on multiple ...
A Win Win Approach Maximizing Wi-Fi Performance Using Game Theory
https www.shibaura-it.ac.jp en headline detail 20240416 7070 001.html
"When a new user connects to a Wi-Fi network, their position, speed, and interference can negatively affect the...
https arstechnica.com security 2024 04 zombie-worm-continues-to-infect-millions-of-ips-years-after-it-was-left-for-dead
"A now-abandoned USB worm that backdoors connected devices has continued to self-replicate for years since its creators lost con...
ANONYMOUS wrote
The longest in the Transperth dataset appears to be 'St Georges Tce Before William St Eastbound',
so if we set the max to be 60 chars we'll be safe.
(not a fan of dynamic memory?)
Hello Everyone,
In a perfect reproduction of Fred Brooks' Mythical Man Month the addition of new people to my 'project' has slowed its progress.
So, for 2 more weeks, we'll continue with the standard presentation of our unit
- standard (live and record...
The next long-term-release of Ubuntu Linux, 24.04 (Noble Numbat) has just been released
https canonical.com blog canonical-releases-ubuntu-24-04-noble-numbat
However, I strongly suggest that you DON'T upgrade your system until at least the end of...
Hello Ethan,
Let's assume (guarantee) that every journey can be completed on the day it was started - if a requested journey can't be completed by 11 59PM any day, then it "doesn't exist", and that condition should be reported back via the web-browse...
ANONYMOUS wrote
The project requires two or more programs to communicate across a network. If all goes well - great - and the successes will be the correct meaningful results.
But a number of things can go wrong - network messages not delivered, inva...
Fantastic article
https arstechnica.com space 2024 04 recoding-voyager-1-nasas-interstellar-explorer-is-finally-making-sense-again
Latency
"Voyager 1 is flying on an outbound trajectory more than 15 billion miles (24 billion kilometers) from Ea...
Hello,
ANONYMOUS wrote
Not sure what you mean by 'hints' here.
For the project, you may assume that all addresses in use are IPv4, as not all (limited) devices support IPv6 and not all systems choose to enable support it by default.
They should all be ...
ANONYMOUS wrote
Each station-server will be reading its station's timetable information from a file on the local disk. The file's name will not change.
At any time, that file's contents may be updated to provide new timetable information, that should ...
ANONYMOUS wrote
This is a very relevant question, and a good one to be asked at this stage, but it's the sort of question you should be discussing with your team members (please).
ANONYMOUS wrote
The fastest journey is one that arrives at the destination soonest - even if you have to wait around at the starting platform before the first leg.
ANONYMOUS wrote
Yes, that's exactly as expected. That is what the web-browser is sending the the 'nc' process, which is listening on port 4444.
Probably because you're missing the colon before the 4444.
ANONYMOUS wrote
That's very odd - which platform?
Wondering if you don't have a name mapping to 127.0.0.1 (which would be odd).
Can you access - 127.0.0.1 4444 ??
Ahh, that's where I got up to yesterday before going home; I've marked it as 'Under Co...
ANONYMOUS wrote
Yes, a station will almost certainly need to know (and remember) the names of its neighbour(s), which it can 'learn' simply by ask each neighbour.
A big thank you to the (embarrassingly large) number of students who have sent through their good wishes and very kind words. I'm not worried about anything, so I hope that no-one else is either. It's been a rough past 6 years, but have found that ...
ANONYMOUS wrote
For this to occur, each of the 3 slots must host exactly one transmission.
If the 1st slot hosts a successful re-transmission by one node, the other two nodes must have chosen to not immediately retransmit, but to back-off for one slot...
ANONYMOUS wrote
In practice the situation is blurred because the PL and DLL are combined in a Media Access Control (MAC) Layer, such as a single Ethernet interface card. If taken too literally - that the PL is just the wire itself, the scene where e...
ANONYMOUS wrote
Discarding DATA will result in it, eventually, being re-transmitted, but not for the longest (anticipated) time. During the period of time, we hope that the congestion will 'die' down while the sender waits for the ACK (which will now...
ANONYMOUS wrote
There'll be 10-12 questions, each worth 1, 2, or 3 marks.
No question requires a lengthy answer, instead marks are awarded based on the difficulty of the question and the sophistication of your answer.
As some examples, from the list of...
ANONYMOUS wrote
I'm not sure what point you're wishing to make here.
In the leaky-bucket algorithm, one frame is transmitted for each 'drip' from the bucket (i.e. one frame is transmitted each time interval). This would occur regardless of whether th...
ANONYMOUS wrote
Hello, yes, you are correct.
I have corrected the last sentence on each of page 20 and page 21.
(There seems to have been some poor cut-and-paste going on there - I wonder for how many years it went un-noticed...?)
Thanks.
ANONYMOUS wrote
This is the strongest answer of all the points made, above.
Consider who the sequence numbers are for
- in a DataLink Layer protocol, they're for 2 directly connected node
- in a Network Layer protocol, they're for 2 nodes possibly ma...
ANONYMOUS wrote
Actually Q5.
Both of your points are correct, though 1 2 16 is not really a very low probability (consider 10s of thousands of frames per second), and there is a better answer than the 2 points you've provided.
YES (taken care of by o...
Two tutorials in CSSE Rm 2.07 to discuss your questions from the sample test
- Monday 2-3PM
- Tuesday 3-4PM
Test starts in the 2 Physics venues at 10.15AM Wednesday
Students with UAAPs please check your UWA email for alternative arrangements.
Good ...
ANONYMOUS wrote
Hi, I'm not sure how to answer your question as I'm not sure what you mean by "I'm unable to use things..."
The approach to piggybacking requires two timers, one supporting the retransmission of unacknowledged (outgoing) data, and one...
It means that the transmissions of all 3 nodes collided in slot-0 (the pre-condition for all three parts of this question), and you're asked what is the probability that all 3 nodes will successfully transmit their frame by the end of slot-3.
As requi...
ANONYMOUS wrote
Some sample questions, all taken from past papers, were linked to the test instructions today.
No 'intense' calculations, but some questions may just require basic arithmetic.
ANONYMOUS wrote
You don't ignore the new frames from that node, your DLL simply des not accept them from the layer above until the older frame has been successfully transmitted.
(although we're not coding this question in any language), but in cnet ...
You are correct; it's the sort of thing I often do in my coding 'just in case', so it's not forgotten. It's termed defensive programming. Other examples include adding ... around code blocks, even if they're only a single line, and the pai...
Full details of our mid-semester test are available from https teaching.csse.uwa.edu.au units CITS3002 examinations.php
There's a link to a list of 20 relevant sample questions, all taken from recent past mid-semester tests.
Tutorials on 2pm Monday ...
Unfortunately, the weekly tutorial that was held at 1PM Mondays has been cancelled due to lack of sufficient attendance.
Other tutorials, which will resume in Week-7 (15th April), will be held on Mondays at 10am and 2pm, Tuesdays 3pm, and Wednesdays 9...
That's great news - though we should all be frustrated, and curious, when things 'start' to work without our knowing why. We generally need to know 'why', so that we can re-apply the knowledge the next time we have a similar problem.
But, of well. G...
ANONYMOUS wrote
We've been discussing Aloha in the context of the data-link layer, with the DLL needing to successfully transmit one frame before beginning the process for the next one. We should complete the re-transmission, before starting a new...
Yes, such approaches work as well - you're using the fact that a timer is still 'running' as a Boolean value, which is the same as checking the equivalence of two integer values. However, as those integer values have a value that reflects how fut...
Yes, all of that is correct. The calculations are the same for both odd and even partity (the choice just determines what the 'final' value of each checkbit will be, and both the sender and receiver must agree on which (odd even) is being used.
ANONYMOUS wrote
Glad that you solved it, though a shame that you had to re-install so many things to address what was probably a smaller problem too difficult to track down But you've chosen to stay with Windows-10, and not upgrade to 11?
I find it ...
ANONYMOUS wrote
A few other students have reported the same problem https secure.csse.uwa.edu.au run help3002?p np opt U54 hl segmentation
but it's proving very difficult to pin-down. There's been no reported problems on a native-Linux installatio...
ANONYMOUS wrote
Hi. It would be an impressive result if you were describing what we hope an improved protocol will do - deliver (and have accepted by the receiver) more messages per unit time (here, one hour), than the standard stop-and-wait. Whi...
I'm surprised that you're still seeing this problem.
Have you downloaded and run the new installation script (from 16th March)?
Does your system have newly installed usr local lib libc .1.0.dylib and usr local lib libunwind.1.dylib ?
Sort-of. It doesn't cause the errors, or bad design decisions, to surface, but if they're likely to surface 'sooner-or-later' it makes 'sooner-or-later' arrive sooner.
ANONYMOUS wrote
The implementations of the standard CRC algorithms are certainly not examinable, and Labsheet-1 reinforced this by only treating the CRCs as 'black-boxes', which we called as functions, and they returned a result.
You should know what ...
ANONYMOUS wrote
Either way can work - the best way, initially, is the way that simplest for your to implement and get working. If your frame-types are mutually exclusive, you can give them all distinct values, and just store one of them in a header ...
No, no need to store multiple checksums anywhere. We can always recalculate a checksum at any time required. We detect duplicates through the use of sequence-numbers.
One advantage to using simulation is that you can 'exhaustively' check your protoc...
Hi Henry,
Yes, you're correct - in practice, we should be calculating and verifying checksums for everything that could be corrupted (by the Physical Layer), so it applies for both data frames and acknowledgment frames.
Those early slides trying to int...
ANONYMOUS wrote
Yes - both 'ends' need to support the sending of their own data, receiving data from the other end, receiving acknowledgements (of your data) from the other end, and sending acknowledgements (about the data from the other end). We te...
With PROSH being held on this Wednesday 20th, we have a couple of things to note this week
- NO tutorial on Wednesday from 9am-10am
- the Wednesday 10am lecture will be held as normal (because it's not possible to reschedule it, and it'll be recorded,...
For anyone still stuck using Apple Silicon, there's an updated installation script - https teaching.csse.uwa.edu.au units CITS3002 cnet downloads install-cnet.sh
that, if necessary, downloads and installs the libraries discussed in this thread.
Than...
It stands for 'bit error rate' - the probability that one-or-more bits in a frame will be corrupted.
Yes, there's an additional problem that needs to be solved.
It's easy to detect a damaged frame, and send back a negative-acknowledgement, but what n...
Wondering if anyone has experienced any problems installing or running cnet on Intel-based macOS?
"No problems at all" is a valid response -)
If you encountered a problem, and fixed it, what was the problem and its solution?
Thank you,
Can you please give a bit of context - WSL2 we know, Windows-11? Ubuntu Linux? you've run the extended installation instructions (in the yellow box)?
Try to work out why it works on other student's machines, but not yours.
The solution to this is not to do everything as root (the administrator), and not to install cnet as root, as you may be locked out from using it. But some of the suggestions, above, are correct - thank you. From the shell terminal, either on macO...
ANONYMOUS wrote
I'm try to understand and fix this problem; I'm confused why a (non-existent) library that my code is not dependent upon, is a show-stopper. Really hope to have a solution today.
Hopefully this doesn't send you down a rabbit-hole, but try this https teaching.csse.uwa.edu.au units CITS3002 cnet downloads libunwind.1.dylib
(I wish I knew why these libraries claim to be required - my code makes no reference to this (that's OK)...
I have another workshop to present from 2-4, today, so if you need to come and see me, please send an email and we'll arrange a time for later in the week.
Thank you - seems a very good solution (I wonder why Windows, or WSL-2, doesn't actually provide an Xserver as part of their distribution?).
I have added this information to our installation instructions - https teaching.csse.uwa.edu.au units CITS30...
There really shouldn't be a need to (manually) do any of this.
The real problem to be solved is why that cp command can't find a file you've just downloaded into the current directory.
ANONYMOUS wrote
Great if this works.
How does WT support manage setting up the windowing, by setting DISPLAY to a known, required value, or by directing a command's graphical output the a display server before the command is even invoked?
Anyone else t...
ANONYMOUS wrote
Still trying to resolve this one.
I can't understand why your linker is looking in System Volumes Preboot Cryptexes ... for anything, unless you knowingly have an environment variable set, such as LD LIBRARY PATH
Does u...
ANONYMOUS wrote
I remember this as a problem that some students had last year but, again, not all students are having it this year.
Clearly your DISPLAY variable is set, to 0.0 , but that's not the correct value.
Reading stackoverflow, again......
ANONYMOUS wrote
Thanks very much for that
I have updated the installation instructions here - https teaching.csse.uwa.edu.au units CITS3002 cnet install.php
If others 'uncover' additional packages that are required, please send the details to me. G...
ANONYMOUS wrote
You should be able to see your version with cat etc os-release
Here's my thinking while your system has shared libraries for libm, libc, and libstdc (reported by ldd )
the error message suggests that your system has an...
ANONYMOUS wrote
As we try to sort this out, please don't mix up topics - your comment, above, doesn't match this thread's Subject line.
Not sure what you mean by 'compile-time issue'. Do you mean on my end, when building the pre-built binaries?
I think that your macOS systems have Xcode installed (as required), but not the Command Line Tools. You can install them with
xcode-select --install
and then xcode-select -p should report their location.
What Linux distribution are you running inside WSL-2 ?
It's rather unusual for a Linux distribution not to come with glibc.
Can you provide the full (long) output from ldd usr local bin cnet on your system?
It should show what's installed, and w...
I don't really know what that file is for, but the web suggests to install a package with
shell sudo apt install libxkbcommon0
( https packages.ubuntu.com mantic i386 libxkbcommon0 filelist )
??
... from https teaching.csse.uwa.edu.au units CITS3002 labsheets labsheet2.php
For Labsheets 2-4 we'll be using (my) network simulation software named cnet https teaching.csse.uwa.edu.au units CITS3002 cnet
cnet is not installed on laboratory com...
... from our Schedule page https teaching.csse.uwa.edu.au units CITS3002 schedule.php
Sample solutions and discussion will be available every week, and you can raise your thoughts in the Tutorials, too, but I won't make an announcement about them ev...
ANONYMOUS wrote
Keep in mind that Hamming's mechanism (algorithm) requires the original input data to be 7 bits long, to calculate 4 checkbits, and to 'merge' the data and checkbits together to form a total of 11 output bits.
From our Resources page ...
Hi Sebastian,
For this exercise, we're not really passing frames across a network, and not having the network (possibly) corrupt those frames, we're just simulating emulating all of the actions with a single process on a single computer (no network re...
The discussion questions for our 1st tutorial, next week, are available from our Schedule page https teaching.csse.uwa.edu.au units CITS3002 schedule.php
Please also note that the 2nd tutorial slot, which was to be held 11-12, has now been moved to...
ANONYMOUS wrote
The sender and receiver of messages need to agree of two things
- what data is being exchanged (the 1s and 0s), and
- how many bits are arriving
The 1st requirement is met by using encoding schemes that use the amplitude, or change in a...
ABC News - "Explore the most important infrastructure you've never heard of the plumbing of the internet"
https www.abc.net.au news 2024-03-06 the-cloud-under-the-sea 103137378
See also
https www.submarinecablemap.com
https www.itnews.com.au news nbn-co-wants-to-boost-its-100-20mbps-tier-to-500-50mbps-605754
"NBN Co will today unveil a plan to change the top three speed tiers for residential broadband by the end of the year for users in its fibre and hybrid fibre...
The problem is a weird one so, anticipating what files you'll all be seeking this afternoon and over the weekend, I've placed some copies elsewhere
Lecture-1
https teaching.csse.uwa.edu.au units CITS2002 3002 lectures lecture01 01.html
Labsheet-1...
"Today is ... February 29. That's normally a quirky, astronomical factoid (or a very special birthday for some). But that unique calendar date broke gas station payment systems across New Zealand for much of the day."
https arstechnica.com gadgets...
The Girls Programming Network https www.girlsprogramming.network perth is a great outreach activity which has gone from strength to strength since it moved to UWA last year.
High school girls are guided through writing Python programs, and they ha...
Hello Everyone,
Welcome to Computer Networks '3002 for 2024.
I'm the unit-coordinator for this semester, and will be presenting all of the lectures and some of the tutorial and laboratory sessions. Laboratories commence in week 2; tutorials in week 3....