Building A Simple Web Client And A Multithreaded Web Server

  •   To understand client-server communication via sockets.
  •   To gain exposure to the basic operations of a Web server and client.
  •   To explore basic structures of HTTP messages.

Due: April 14, 2020 11:59pm Project Description 
In this project, you will be developing a multithreaded Web server and a simple web client. The Web server and Web client communicate using a text-based protocol called HTTP (Hypertext Transfer Protocol).
Requirements for the Web server 

  •   The server is able to handle multiple requests concurrently. This means the implementation is multithreaded. In the main thread, the server listens to a specified port, e.g., 8080. Upon receiving an HTTP request, the server sets up a TCP connection to the requesting client and serves the request in a separate thread. After sending the response back to the client, it closes the connection.
  •   The server is assumed to work with HTTP GET messages. If the requested file exists, the server responds with “HTTP/1.1 200 OK” together with the requested page to the client, otherwise it sends a corresponding error message, e.g., “HTTP/1.1 404 Not Found” or “HTTP/1.1 400 Bad Request”.
  •   If running the server program using command line, the syntax should be: server_code_name [<port_number>]
    where the optional <port_number> is the port on which the server is listening to connections from
    clients. If the port number is not entered, the default port 8080 is used.
  •   You can test your Web server implementation on your local machine using a Web browser, e.g.,
    Internet Explorer, Firefox, or Chrome. You need to specify the used port number within the URL, for example,
    http://localhost:8080/index.htm
    If omitting the port number portion, i.e., 8080, the browser will use the default port 80.
  •   The server should response with a default page when users do not enter a specific page in the URL,
    for example,
    http://localhost:8080/
    It should also work when the request includes a path to the requested file, for example,
    http://localhost:8080/path/to/file/example.htm
  •   You should display/log the request and header lines of request messages on the server for the purpose of debugging.
    Requirements for the simple Web client

    •   The client is able to connect to the server via a socket and to request a page on the server.
    •   Upon receipt of the response message from the server, the client extracts and displays/logs the
      message status, and then retrieves the page content from the message body.

 
 If running the client program using command line, the syntax should be:
client_code_name <server_IPaddress/name> [<port_number>] [<requested_file_name>]
where the <server_IPaddress/name> is the IP address or name of the Web server, e.g., 127.0.0.1 or localhost for the server running on the local machine. The optional <port_number> is the port on which the server is listening to connections from clients. If the port number is not entered, the default port 8080 is used. The optional <requested_file_name> is the name of the requested file, which may include the path to the file. If the file name is not entered, the default file “index.htm” is used.
Notes: 

  •   This is an individual project.
  •   You can use the programming language of your choice. (You may get more help with Java or Python.)
  •   You may use the skeleton code for the server provided in the textbook’s companion website for reference. You may also want to refer to the textbook, chapter 2, section 2.2.3, for more details on HTTP message format and section 2.7, for socket programming.
  •   The source codes should be well documented to make it easier for the TA to follow.
    Submission Guidelines

    •   Submit a single zipped file with the naming convention <your_UTA_id>_<your_name>.zip which consists of:
       Source codes of the Web server and client,
       Any additional files required to run your codes,
       A readme file with instructions on how to compile and run your codes. You must mention the IDE as well as any packages that are required to run the codes.
    •   Do NOT include any runnable executable (binary) program.
    •   Make sure your name and your SAU ID are also listed in the readme file and in comments at the
      beginning of your source files.
    •   Upload the zipped file via Canvas. Please strictly follow the naming convention of the zipped file and the subject title.
    •   Late submission will be accepted with a 10-point deduction for each extra day.
      Additional Requirements/Instructions

      •   Complete documentation and instructions for running the codes are recommended, otherwise you may be asked to come give the TA a demo if he is not able to run your programs from the instructions provided.
      •   If you are using any code from some external source or book, you MUST mention it explicitly in the codes as well as the readme file. Otherwise, it will be considered plagiarism and your project will not be evaluated.
      •   You can discuss with other classmates on steps/algorithms to implement the project. However, the source codes must be written yourself.

Turing Machine 

Turing Machine

No Programming, just draw the machine’s states out like in the notes and my video example for the Quiz Review

Machine one

Construct a Turing Machine (all on paper, no programming/source code needed) that computes the function

f(n) = n mod 3

In other words, for you non-math majors: sd
It will halt successfully if the number is divisible by 3.
11 (good)
1001 (good)
1101 (bad)
It will go to a reject state with bad input.
There’s a pattern you can figure out to set up your states.

Machine two

Construct a machine that accepts if the input string {S = x^n y^n } and rejects anything else.
In other words it accepts if there are a certain number of x’s followed by the same amount of y’s.
xx (bad)
xxyy (good)
xxxyyyy (bad)
xxxxxyyyyy (good)
You can write other symbols if you would like, but the only accept strings are x’s followed by same amount of y’s.

Turing Machine 

Turing Machine

No Programming, just draw the machine’s states out like in the notes and my video example for the Quiz Review

Machine one

Construct a Turing Machine (all on paper, no programming/source code needed) that computes the function

f(n) = n mod 3

In other words, for you non-math majors: sd
It will halt successfully if the number is divisible by 3.
11 (good)
1001 (good)
1101 (bad)
It will go to a reject state with bad input.
There’s a pattern you can figure out to set up your states.

Machine two

Construct a machine that accepts if the input string {S = x^n y^n } and rejects anything else.
In other words it accepts if there are a certain number of x’s followed by the same amount of y’s.
xx (bad)
xxyy (good)
xxxyyyy (bad)
xxxxxyyyyy (good)
You can write other symbols if you would like, but the only accept strings are x’s followed by same amount of y’s.

Define the purpose of Pig and Hive and your understanding of the process and what it is used for in a Big Data environment.

Import a table into the Hadoop ecosystem through the use of Pig and Hive. Define the purpose of Pig and Hive and your understanding of the process and what it is used for in a Big Data environment. Be sure to include all supporting screenshots as necessary. 
Step 1 – Reading

  1. Read Chapter 5: MapReduce Details for Multimachine Clusters (in “Pro Hadoop”; books 24×7).

 
Step 2 – Task 3 – Processing data using Pig and Hive

  1. Hive

**Please ensure that all services are running properly as needed in the Cloudera Manager before starting this task**

  1. Open a terminal window and type the following:

$ nano employees                         (This will open a text editor with the filename of employees)
 
Enter the following table structure:
Mary, 7038121129, VA, 42000
Tim, 3145558989, TX, 86000
Bob, 3429091122, MN, 75500
Manisha, 7096664242, WV, 94200
Aditya, 2021119765, CA, 39000
Xinwuei, 4129098787, OH, 57600
 
Press CTRL+X and follow the prompts to save changes. Then enter the following commands:
$ hadoop fs –put employees
$ hive
 

  1. Please enter the following commands in Hive:

Ø  CREATE database databasename;                        (Where databasename can be ANY name)
Ø  SHOW databases;
Ø  CREATE table tablename (colname1 datatype, colname2 datatype, colname3, datatype, . . .) row format delimited fields terminated by ‘,’ ;                            (Where tablename can be ANY name, the datatype must be appropriate to the column data, and column name must reflect column contents)
Ø  DESCRIBE tablename                           (where tablename is the name of the table you have just create)
Ø  LOAD DATA INPATH ‘employees’ INTO TABLE tablename;       (this will load the data into the table)
Ø  SELECT * FROM tablename;                 (this will show the contents of the table with tablename)
Ø  SELECT count(*) FROM tablename;       (this will count the number of rows in the table with tablename)
 

  1. Please discuss the process you have just completed and upload your results with related screenshots as needed.
  2. Pig
  3. In a terminal, use nano to create two text files named “file1” and “file2” with the following values respectively:

 
10,30,0                  5,1,10
0,5,10                    10,5,0
10,20,10                20,20,20
 
CTRL+X and follow the prompts. Then type the following:
$ hadoop fs –put file1
$ hadoop fs –put file2
$ pig

  1. In pig, enter the following commands:

Ø  A = LOAD ‘/user/cloudera/file1’ using PigStorage (‘,’) as (a1:int,a2:int,a3:int);
Ø  Dump a;
Ø  B = LOAD ‘/user/cloudera/file2’ using PigStorage (‘,’) as (b1:int,b2:int,b3:int);
Ø  Dump b;
Ø  Describe a;
Ø  Describe b;
Ø  C = UNION a,b;
Ø  Dump c;
Ø  SPLIT c INTO d IF $0==0, e IF $0==10;
Ø  Dump d;
Ø  Dump e;
Ø  F = filter c by $1 > 5;
Ø  Dump f;
Ø  Illustrate f;
Ø  G = GROUP c by $2;
Ø  Dump g;

  1. Please discuss the operations you have done using Pig and the resultant logical operations that you have done.

 
Step 3 – Task 3 – Report
 
Write a report (4-6 pages) includes:

  • Following APA standards cover page and table of content,
  • Short research report on other components of Hadoop platform: Hive and Pig.
  • Create a file and loading data in the file; include a document on your understanding of the process and purpose, along with supporting screen shots.
  • Use Hive and Pig and generate the result, along with supporting screen shots.

 

Regulating New Information Technologies  

Attached PPT for:  Regulating New Information Technologies
Attachment Has links for New Information Technologies.
Mention questions in while responding to each question.
* APA Format
* Plagiarism free
 
Q1. Why do new technologies require regulation,  What factors do they have in common that drive government regulator’s motivations? (try to provide 3 reasons, base them in literature as much as possible.  This point should apply to all new emerging technologies)
Q2. What do you think is a new technology that presents a significant regulatory challenge, and what do you think should be done?

Regulating New Information Technologies  

Attached PPT for:  Regulating New Information Technologies
Attachment Has links for New Information Technologies.
Mention questions in while responding to each question.
* APA Format
* Plagiarism free
 
Q1. Why do new technologies require regulation,  What factors do they have in common that drive government regulator’s motivations? (try to provide 3 reasons, base them in literature as much as possible.  This point should apply to all new emerging technologies)
Q2. What do you think is a new technology that presents a significant regulatory challenge, and what do you think should be done?

Quality Assurance and Patient Protection in Health Care Informatics

Topic: Quality Assurance and Patient Protection in Health Care Informatics 
Deliverable Length: 10-12 pages; min. 7 scholarly academic/professional sources published in the last 5 yrs.
Assignment Details
Assignment Description
You have been asked by your health care organization to provide a detailed report on the benefits of implementing a new health information technology system to comply with the current mandates. Develop a report of 10–12 pages detailing how information technology systems can be used to analyze organizational data for a health care organization. This should include types of systems where data may be retrieved and how IT and various applications can be used to aggregate and analyze the data to understand issues, identify root causes, and document progress related to implemented changes, patient progress, quality assurance, and compliance. Make sure to address the following questions:

  • With plenty of data stored on computer systems, data should not be a problem, but access to the data and      sharing of information may have implications under federal regulations. What precautions might you suggest when handling health care data? Be sure to apply current trends in health care from proven sources and models.
  • Consider the support capabilities of a typical health care operation and where employees may access data of      various types related to patient needs. What might be accessed, and what controls may be needed to protect patient data?
  • From a departmental perspective, consider the role of the health information manager (HIM). What qualifications and experience would be needed for your specific health care setting? What functions and role would the HIM have in regard to this organization’s medical records?
  • As technology advances, what compliance issues and regulations do health care managers at this organization need to be on top of? Consider the impact of falling behind the technology curve not only in terms of productivity but regulatory compliance. What role do the Affordable Care and Patient Protection Acts have on the implementation and use of technology and electronic health records (EHRs) at this setting?

Quality Assurance and Patient Protection in Health Care Informatics

Topic: Quality Assurance and Patient Protection in Health Care Informatics 
Deliverable Length: 10-12 pages; min. 7 scholarly academic/professional sources published in the last 5 yrs.
Assignment Details
Assignment Description
You have been asked by your health care organization to provide a detailed report on the benefits of implementing a new health information technology system to comply with the current mandates. Develop a report of 10–12 pages detailing how information technology systems can be used to analyze organizational data for a health care organization. This should include types of systems where data may be retrieved and how IT and various applications can be used to aggregate and analyze the data to understand issues, identify root causes, and document progress related to implemented changes, patient progress, quality assurance, and compliance. Make sure to address the following questions:

  • With plenty of data stored on computer systems, data should not be a problem, but access to the data and      sharing of information may have implications under federal regulations. What precautions might you suggest when handling health care data? Be sure to apply current trends in health care from proven sources and models.
  • Consider the support capabilities of a typical health care operation and where employees may access data of      various types related to patient needs. What might be accessed, and what controls may be needed to protect patient data?
  • From a departmental perspective, consider the role of the health information manager (HIM). What qualifications and experience would be needed for your specific health care setting? What functions and role would the HIM have in regard to this organization’s medical records?
  • As technology advances, what compliance issues and regulations do health care managers at this organization need to be on top of? Consider the impact of falling behind the technology curve not only in terms of productivity but regulatory compliance. What role do the Affordable Care and Patient Protection Acts have on the implementation and use of technology and electronic health records (EHRs) at this setting?

Quality Assurance and Patient Protection in Health Care Informatics

Topic: Quality Assurance and Patient Protection in Health Care Informatics 
Deliverable Length: 10-12 pages; min. 7 scholarly academic/professional sources published in the last 5 yrs.
Assignment Details
Assignment Description
You have been asked by your health care organization to provide a detailed report on the benefits of implementing a new health information technology system to comply with the current mandates. Develop a report of 10–12 pages detailing how information technology systems can be used to analyze organizational data for a health care organization. This should include types of systems where data may be retrieved and how IT and various applications can be used to aggregate and analyze the data to understand issues, identify root causes, and document progress related to implemented changes, patient progress, quality assurance, and compliance. Make sure to address the following questions:

  • With plenty of data stored on computer systems, data should not be a problem, but access to the data and      sharing of information may have implications under federal regulations. What precautions might you suggest when handling health care data? Be sure to apply current trends in health care from proven sources and models.
  • Consider the support capabilities of a typical health care operation and where employees may access data of      various types related to patient needs. What might be accessed, and what controls may be needed to protect patient data?
  • From a departmental perspective, consider the role of the health information manager (HIM). What qualifications and experience would be needed for your specific health care setting? What functions and role would the HIM have in regard to this organization’s medical records?
  • As technology advances, what compliance issues and regulations do health care managers at this organization need to be on top of? Consider the impact of falling behind the technology curve not only in terms of productivity but regulatory compliance. What role do the Affordable Care and Patient Protection Acts have on the implementation and use of technology and electronic health records (EHRs) at this setting?

Getting Started with Node

Getting Started with Node
So, in this section, you learned that:
– Node is a runtime environment for executing JS code.
– Essentially, Node is a C++ program that embeds Chrome’s v8 engine, the fastest
JS engine in the world.
– We use Node to build fast and scalable networking applications. It’s a perfect
choice for building RESTful services.
– Node applications are single-threaded. That means a single thread is used to
serve all clients.
– Node applications are asynchronous or non-blocking by default. That means
when the application involves I/O operations (eg accessing the file system or the
network), the thread doesn’t wait (or block) for the result of the operation. It is
released to serve other clients.
– This architecture makes Node ideal for building I/O-intensive applications.
– You should avoid using Node for CPU-intensive applications, such as a video
encoding service. Because while executing these operations, other clients have
to wait for the single thread to finish its job and be ready to serve them.
– In Node, we don’t have browser environment objects such as window or the
document object. Instead, we have other objects that are not available in
browsers, such as objects for working with the file system, network, operating
system, etc.
So, in this section, you learned that:
– Node is a runtime environment for executing JS code.
– Essentially, Node is a C++ program that embeds Chrome’s v8 engine, the fastest
JS engine in the world.
– We use Node to build fast and scalable networking applications. It’s a perfect
choice for building RESTful services.
– Node applications are single-threaded. That means a single thread is used to
serve all clients.
– Node applications are asynchronous or non-blocking by default. That means
when the application involves I/O operations (eg accessing the file system or the
network), the thread doesn’t wait (or block) for the result of the operation. It is
released to serve other clients.
– This architecture makes Node ideal for building I/O-intensive applications.
– You should avoid using Node for CPU-intensive applications, such as a video
encoding service. Because while executing these operations, other clients have
to wait for the single thread to finish its job and be ready to serve them.
– In Node, we don’t have browser environment objects such as window or the
document object. Instead, we have other objects that are not available in
browsers, such as objects for working with the file system, network, operating
system, etc.