It's UWAweek 48

help3002

This forum is provided to promote discussion amongst students enrolled in CITS3002 Computer Networks.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message. How do I ask a good question?

14 articles posted by this ANONYMOUS person
Showing 14 of 503 articles.
Currently 1 other person reading this forum.


 UWA week 23 (1st semester, 1st exam week) ↓
SVG not supported 10:15am Fri 7th Jun, ANONYMOUS

Hi could I check my answer to this question The ISO OSI networking group defined six distinct software mechanisms forming their ISO OSI Security Architecture. Unfortunately, none of the ISO OSI Security Architecture recommendations are supported by th...


SVG not supported 9:35am Fri 7th Jun, ANONYMOUS

Hi Chris, thanks for the reply. In that case, would the other two be uniqueness (each IPv4 address must be unique within its network) and that every host within the same network share the same network address? Or that addresses have a hierarchical st...


SVG not supported 2:34pm Thu 6th Jun, ANONYMOUS

My understanding is that all client server models are either Iterative or Concurrent, and concurrency can be implemented using a combination of multi-processing, multi-threading, and or asynchronous I O like select or poll. Is that correct? I'm a bit...


SVG not supported 11:31am Thu 6th Jun, ANONYMOUS

In Q2a do the "properties" refer to the class type, network and host number?


SVG not supported 11:09am Thu 6th Jun, ANONYMOUS

Hi I have a few questions about Q1. I had originally interpreted the question to be that we write the protocol that one node would follow (ie each node runs the code in a seperate process, i suppose like our project) and found that easy enough to wri...


SVG not supported 4:32pm Tue 4th Jun, ANONYMOUS

Hi, is RPC Server Client code in Lecture 10 assessable? Thanks.


 UWA week 20 (1st semester, week 11) ↓
SVG not supported 10:46am Wed 15th May, ANONYMOUS

Also confused by this contradiction


SVG not supported 10:40am Wed 15th May, ANONYMOUS

Hi Is there any requirement on the UI for how the route is returned to the user. Right now my group just displays the text on an entirely unformatted white page. Is that fine so long as the route is valid, or does it need to be styled?


SVG not supported 5:43pm Tue 14th May, ANONYMOUS

Hi My group has encountered an issue with communicating between 2 computers. Everything works as expected for UDP communication but not all TCP works. Our set up is like this Computer 1 IP Address 172.20.10.14 . station-server StationA 4001 4002 127....


 UWA week 19 (1st semester, week 10) ↓
SVG not supported
Favicon requests 👍x2  (both)
4:31pm Sat 11th May, ANONYMOUS

Hi not sure if anyone has come across this issue - when testing on my chrome browser I noticed that the servers are constantly getting requests for favicon. Right now I'm just brute-forcing the problem by saying if request is "GET favicon.ico HTTP 1...


SVG not supported 3:19pm Sat 11th May, ANONYMOUS

Hi, I'm wondering to what degree the python c implementations must be aligned? I.e. is it enough for the behaviour on the front-end to be identical between server implementations or do the functions we write general protocol logic also need to be...


 UWA week 15 (1st semester, week 6) ↓
SVG not supported 10:20pm Tue 9th Apr, ANONYMOUS

Hi, hoping I could check my solution to tutorial Q2c with someone here as I couldn't make it to the last two tutes ) (c) What is the probability that all 3 devices can successfully transmit their frames in a maximum of 3 time slots after the origina...


SVG not supported 10:36pm Mon 8th Apr, ANONYMOUS

Lecture 2 states " RX Monitors (only detects) transmission errors" as a responsibility of the physical layer. How does the physical layer detect errors? Are detection techniques such as hamming, parity, crc etc not a function of the DLL? Could I als...


 UWA week 14 (1st semester, non-teaching week) ↓
SVG not supported 12:00pm Sat 6th Apr, ANONYMOUS

Hi, i am hoping to get some clarification on this statement from pg. 20 of Wk. 5 lecture "The leaky bucket algorithm enables an application to generate bursty traffic (high volume, for a short period) without saturating the network". I would've though...

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  8:08AM Aug 25 2024
Privacy policy