It's UWAweek 47

help3002

This forum is provided to promote discussion amongst students enrolled in CITS3002 Computer Networks.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message. How do I ask a good question?

Showing 20 of 503 articles
Showing page 2 of 26⬅ older  |  newer ⮕
Currently 21 other people reading this forum.


 UWA week 23 (1st semester, 1st exam week) ↓
SVG not supported 2:34pm Thu 6th Jun, ANONYMOUS

My understanding is that all client server models are either Iterative or Concurrent, and concurrency can be implemented using a combination of multi-processing, multi-threading, and or asynchronous I O like select or poll. Is that correct? I'm a bit...


SVG not supported 2:07pm Thu 6th Jun, ANONYMOUS

Would discussing the use of concurrent servers, iterative servers and the use of inetd be sufficient?


SVG not supported 11:31am Thu 6th Jun, ANONYMOUS

In Q2a do the "properties" refer to the class type, network and host number?


SVG not supported 11:09am Thu 6th Jun, ANONYMOUS

Hi I have a few questions about Q1. I had originally interpreted the question to be that we write the protocol that one node would follow (ie each node runs the code in a seperate process, i suppose like our project) and found that easy enough to wri...


SVG not supported 4:35am Thu 6th Jun, Christopher M.

Unfortunately, project marks will not be available before the final exams. Our lab facilitators are making progress in the marking, but also have exams of their own to attend to.


SVG not supported 4:33am Thu 6th Jun, Christopher M.

ANONYMOUS wrote The emphasis is on the word 'semantics' - how things must work as expected. For example, authentication is not required for a file-system to work as expected.


SVG not supported 10:15pm Wed 5th Jun, ANONYMOUS

The Network File System (NFS) employs Remote Procedure Calls (RPCs) over the User Datagram Protocol (UDP). With reference to traditional file-system semantics, what problems does this choice of interprocess communication scheme introduce? What solutions ...


SVG not supported 5:16pm Wed 5th Jun, Christopher M.

ANONYMOUS wrote Not sure how to ask this more clearly. It's referring to the properties of the addresses, their representation, and their use. Also, unsure what your "four fields" refers to.


SVG not supported 5:12pm Wed 5th Jun, Christopher M.

ANONYMOUS wrote It's based on the assumption that the bad actors first broke into the host computer to install and then launch their attack. Once the origin of the attack (the host) has been identified, and the bad actors have long departed, the owne...


SVG not supported 5:04pm Wed 5th Jun, Christopher M.

ANONYMOUS wrote The code is certainly not assessable, but the motivation for and generation of the code by tools such as rpcgen is. How does the use of the RPC approach enable the client software and the server software, on different computers owned b...


SVG not supported 4:11pm Wed 5th Jun, ANONYMOUS

"The numeric addresses used within a computer network are not numbers simply chosen at random. They have a number of properties that facilitate their use. With reference to current Internet Protocol (IPv4) addressing scheme, briefly describe three suc...


SVG not supported 3:11pm Wed 5th Jun, ANONYMOUS

For this point in lecture 11 The smurf attack has 3 types of victims the single destination victim of the attack, a network abused (temporarily) to amplify the attack, and (always) the host harboring the attacker. Could you please explain why the host ...


SVG not supported 4:32pm Tue 4th Jun, ANONYMOUS

Hi, is RPC Server Client code in Lecture 10 assessable? Thanks.


SVG not supported 2:31pm Tue 4th Jun, Christopher M.

ANONYMOUS wrote It's more closely asking about the topics on the 'middle pages' of Lecture-9.


SVG not supported 2:18pm Tue 4th Jun, Christopher M.

ANONYMOUS wrote Pages 17 onwards of Lecture 4 clearly provide an outline, as do the relevant sections from either of the 2 textbooks - what 802.11 is, what are its goals, how does it work, under what circumstances does it not work (well). Your questio...


SVG not supported 2:14pm Tue 4th Jun, Christopher M.

ANONYMOUS wrote Yes, your pseudo-code should include an 'implementation' of binary-exponential backoff, as the delays of each node (based on their observations of collisions) will affect when they transmit retransmit in the future and, thus, affect h...


SVG not supported 7:33am Tue 4th Jun, Christopher M.

While it's certainly desirable, it may not be possible, so no guarantees at this stage.


SVG not supported 4:44pm Mon 3rd Jun, ANONYMOUS

Yeah it would be very nice to have them before the exam


SVG not supported 1:18pm Mon 3rd Jun, ANONYMOUS

Will we receive the Project Marks before our Final Exam this week?


 UWA week 22 (1st semester, study break) ↓
SVG not supported 11:04pm Fri 31st May, ANONYMOUS

About question 4b in the 2023 exam paper Is it just outlining tier1,2, and 3 client-server architecture?

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  8:08AM Aug 25 2024
Privacy policy