Please consider offering answers and suggestions to help other students!
And if you fix a problem by following a suggestion here,
it would be great if other interested students could see a short
"Great, fixed it!" followup message.
How do I ask a good question?
14 articles posted by this ANONYMOUS person
Showing 14 of 503 articles.
Currently 9 other people reading this forum.
Hi could I check my answer to this question
The ISO OSI networking group defined six distinct software mechanisms forming their ISO OSI Security Architecture. Unfortunately, none of the ISO OSI Security Architecture recommendations are supported by th...
Hi Chris, thanks for the reply.
In that case, would the other two be uniqueness (each IPv4 address must be unique within its network) and that every host within the same network share the same network address? Or that addresses have a hierarchical st...
My understanding is that all client server models are either Iterative or Concurrent, and concurrency can be implemented using a combination of multi-processing, multi-threading, and or asynchronous I O like select or poll. Is that correct?
I'm a bit...
Hi I have a few questions about Q1.
I had originally interpreted the question to be that we write the protocol that one node would follow (ie each node runs the code in a seperate process, i suppose like our project) and found that easy enough to wri...
Hi Is there any requirement on the UI for how the route is returned to the user. Right now my group just displays the text on an entirely unformatted white page. Is that fine so long as the route is valid, or does it need to be styled?
Hi My group has encountered an issue with communicating between 2 computers. Everything works as expected for UDP communication but not all TCP works.
Our set up is like this
Computer 1 IP Address 172.20.10.14
. station-server StationA 4001 4002 127....
Hi not sure if anyone has come across this issue - when testing on my chrome browser I noticed that the servers are constantly getting requests for favicon. Right now I'm just brute-forcing the problem by saying if request is "GET favicon.ico HTTP 1...
Hi, I'm wondering to what degree the python c implementations must be aligned? I.e. is it enough for the behaviour on the front-end to be identical between server implementations or do the functions we write general protocol logic also need to be...
Hi, hoping I could check my solution to tutorial Q2c with someone here as I couldn't make it to the last two tutes )
(c) What is the probability that all 3 devices can successfully transmit their frames in a maximum of 3 time slots after the origina...
Lecture 2 states " RX Monitors (only detects) transmission errors" as a responsibility of the physical layer.
How does the physical layer detect errors? Are detection techniques such as hamming, parity, crc etc not a function of the DLL?
Could I als...
Hi, i am hoping to get some clarification on this statement from pg. 20 of Wk. 5 lecture
"The leaky bucket algorithm enables an application to generate bursty traffic (high volume, for a short period) without saturating the network".
I would've though...