Please consider offering answers and suggestions to help other students!
And if you fix a problem by following a suggestion here,
it would be great if other interested students could see a short
"Great, fixed it!" followup message.
How do I ask a good question?
Displaying 21 tagged articles
Showing 21 of 503 articles.
Currently 48 other people reading this forum.
Hi,
I am struggling to develop some pseudo code for some of the past exam questions. Pseudo code has always been such a hard subject to know how much information to put into it. Given there are no answers from the past exams, would anyone please share...
vertical scaling scaling UP, horizontal scaling scaling OUT. But your thinking is sort of there. Try thinking about it this way
out spreading "out" over more machines
up increasing (upping) the compute one a single machine monolith
I hope thi...
ANONYMOUS wrote
They're certainly relevant to answering the question, but see it as an exercise in writing your best answer, not just a sufficient one.
ANONYMOUS wrote
The matter of what are traditional file-system semantics should already be quite clear to you. What do we expect a file-system to do for us - to reliably store and transfer copy data, not losing any data, not replicating any data. Ho...
In the lecture notes it says
"An important characteristic of client-server systems is scalability
Horizontal scaling means adding or removing client workstations with only a slight performance impact.
Vertical scaling means migrating to a larger and ...
What is the traditional file system semantics? is this the same as the "read, write, append" command in the Linux File System? Hence, this will create an issue about the address space that the target's pointing to? Or the problem asks more about the ...
Hi, I am a bit lost on ideas for answering the following question
Hamming's method of error correction can only detect and correct single bit errors. However, we saw that it requires 4 additional (redundant) bits to support the 7 data bits of each A...
Hi Chris hope you are feeling better, I am unsure at how to go about answering this question
Consider the delivery of messages in an internetworked environment in which the source and
destination nodes are many hops apart. Large messages must be fragm...
ANONYMOUS wrote
The emphasis is on the word 'semantics' - how things must work as expected.
For example, authentication is not required for a file-system to work as expected.
The Network File System (NFS) employs Remote Procedure Calls (RPCs) over the User
Datagram Protocol (UDP).
With reference to traditional file-system semantics, what problems does this choice of
interprocess communication scheme introduce?
What solutions ...
ANONYMOUS wrote
Not sure how to ask this more clearly.
It's referring to the properties of the addresses, their representation, and their use.
Also, unsure what your "four fields" refers to.
"The numeric addresses used within a computer network are not numbers simply chosen at random. They have a number of properties that facilitate their use.
With reference to current Internet Protocol (IPv4) addressing scheme, briefly describe three suc...
ANONYMOUS wrote
Pages 17 onwards of Lecture 4 clearly provide an outline, as do the relevant sections from either of the 2 textbooks - what 802.11 is, what are its goals, how does it work, under what circumstances does it not work (well).
Your questio...
ANONYMOUS wrote
Yes, your pseudo-code should include an 'implementation' of binary-exponential backoff, as the delays of each node (based on their observations of collisions) will affect when they transmit retransmit in the future and, thus, affect h...
looking at schedule, for week 12 lecture, some topics were "End-to-end communication using the secure sockets layer (SSL). Virtual private networks (VPNs)". However, they are barely mentioned (as examples of using cryptography methods).
So I just ask ...
Develop an implementation in pseudo-code, with a syntax similar to C, Python, or Java, that simulates the behaviour of the 1-persistent CSMA CD protocol over 100Mbps Ethernet. The simulation should support N identical nodes, each wishing to transmit ...