Please consider offering answers and suggestions to help other students!
And if you fix a problem by following a suggestion here,
it would be great if other interested students could see a short
"Great, fixed it!" followup message.
How do I ask a good question?
Showing 20 of 503 articles
Showing page 2 of 26⬅ older | newer ⮕
Currently 21 other people reading this forum.
My understanding is that all client server models are either Iterative or Concurrent, and concurrency can be implemented using a combination of multi-processing, multi-threading, and or asynchronous I O like select or poll. Is that correct?
I'm a bit...
Hi I have a few questions about Q1.
I had originally interpreted the question to be that we write the protocol that one node would follow (ie each node runs the code in a seperate process, i suppose like our project) and found that easy enough to wri...
Unfortunately, project marks will not be available before the final exams.
Our lab facilitators are making progress in the marking, but also have exams of their own to attend to.
ANONYMOUS wrote
The emphasis is on the word 'semantics' - how things must work as expected.
For example, authentication is not required for a file-system to work as expected.
The Network File System (NFS) employs Remote Procedure Calls (RPCs) over the User
Datagram Protocol (UDP).
With reference to traditional file-system semantics, what problems does this choice of
interprocess communication scheme introduce?
What solutions ...
ANONYMOUS wrote
Not sure how to ask this more clearly.
It's referring to the properties of the addresses, their representation, and their use.
Also, unsure what your "four fields" refers to.
ANONYMOUS wrote
It's based on the assumption that the bad actors first broke into the host computer to install and then launch their attack. Once the origin of the attack (the host) has been identified, and the bad actors have long departed, the owne...
ANONYMOUS wrote
The code is certainly not assessable, but the motivation for and generation of the code by tools such as rpcgen is.
How does the use of the RPC approach enable the client software and the server software, on different computers owned b...
"The numeric addresses used within a computer network are not numbers simply chosen at random. They have a number of properties that facilitate their use.
With reference to current Internet Protocol (IPv4) addressing scheme, briefly describe three suc...
For this point in lecture 11
The smurf attack has 3 types of victims
the single destination victim of the attack,
a network abused (temporarily) to amplify the attack, and
(always) the host harboring the attacker.
Could you please explain why the host ...
ANONYMOUS wrote
Pages 17 onwards of Lecture 4 clearly provide an outline, as do the relevant sections from either of the 2 textbooks - what 802.11 is, what are its goals, how does it work, under what circumstances does it not work (well).
Your questio...
ANONYMOUS wrote
Yes, your pseudo-code should include an 'implementation' of binary-exponential backoff, as the delays of each node (based on their observations of collisions) will affect when they transmit retransmit in the future and, thus, affect h...