It's UWAweek 47

help3002

This forum is provided to promote discussion amongst students enrolled in CITS3002 Computer Networks.

Please consider offering answers and suggestions to help other students! And if you fix a problem by following a suggestion here, it would be great if other interested students could see a short "Great, fixed it!"  followup message. How do I ask a good question?

Displaying 21 tagged articles
Showing 21 of 503 articles.
Currently 48 other people reading this forum.


 UWA week 23 (1st semester, 1st exam week) ↓
SVG not supported 5:15pm Fri 7th Jun, ANONYMOUS

Hi, I am struggling to develop some pseudo code for some of the past exam questions. Pseudo code has always been such a hard subject to know how much information to put into it. Given there are no answers from the past exams, would anyone please share...


SVG not supported 10:18am Fri 7th Jun, ANONYMOUS

vertical scaling scaling UP, horizontal scaling scaling OUT. But your thinking is sort of there. Try thinking about it this way out spreading "out" over more machines up increasing (upping) the compute one a single machine monolith I hope thi...


SVG not supported 6:54am Fri 7th Jun, Christopher M.

ANONYMOUS wrote They're certainly relevant to answering the question, but see it as an exercise in writing your best answer, not just a sufficient one.


SVG not supported 6:38am Fri 7th Jun, Christopher M.

ANONYMOUS wrote The matter of what are traditional file-system semantics should already be quite clear to you. What do we expect a file-system to do for us - to reliably store and transfer copy data, not losing any data, not replicating any data. Ho...


SVG not supported 10:18pm Thu 6th Jun, ANONYMOUS

In the lecture notes it says "An important characteristic of client-server systems is scalability Horizontal scaling means adding or removing client workstations with only a slight performance impact. Vertical scaling means migrating to a larger and ...


SVG not supported 5:19pm Thu 6th Jun, ANONYMOUS

What is the traditional file system semantics? is this the same as the "read, write, append" command in the Linux File System? Hence, this will create an issue about the address space that the target's pointing to? Or the problem asks more about the ...


SVG not supported 5:14pm Thu 6th Jun, ANONYMOUS

Hi, I am a bit lost on ideas for answering the following question Hamming's method of error correction can only detect and correct single bit errors. However, we saw that it requires 4 additional (redundant) bits to support the 7 data bits of each A...


SVG not supported 3:18pm Thu 6th Jun, ANONYMOUS

Hi Chris hope you are feeling better, I am unsure at how to go about answering this question Consider the delivery of messages in an internetworked environment in which the source and destination nodes are many hops apart. Large messages must be fragm...


SVG not supported 2:07pm Thu 6th Jun, ANONYMOUS

Would discussing the use of concurrent servers, iterative servers and the use of inetd be sufficient?


SVG not supported 4:33am Thu 6th Jun, Christopher M.

ANONYMOUS wrote The emphasis is on the word 'semantics' - how things must work as expected. For example, authentication is not required for a file-system to work as expected.


SVG not supported 10:15pm Wed 5th Jun, ANONYMOUS

The Network File System (NFS) employs Remote Procedure Calls (RPCs) over the User Datagram Protocol (UDP). With reference to traditional file-system semantics, what problems does this choice of interprocess communication scheme introduce? What solutions ...


SVG not supported 5:16pm Wed 5th Jun, Christopher M.

ANONYMOUS wrote Not sure how to ask this more clearly. It's referring to the properties of the addresses, their representation, and their use. Also, unsure what your "four fields" refers to.


SVG not supported 4:11pm Wed 5th Jun, ANONYMOUS

"The numeric addresses used within a computer network are not numbers simply chosen at random. They have a number of properties that facilitate their use. With reference to current Internet Protocol (IPv4) addressing scheme, briefly describe three suc...


SVG not supported 2:31pm Tue 4th Jun, Christopher M.

ANONYMOUS wrote It's more closely asking about the topics on the 'middle pages' of Lecture-9.


SVG not supported 2:18pm Tue 4th Jun, Christopher M.

ANONYMOUS wrote Pages 17 onwards of Lecture 4 clearly provide an outline, as do the relevant sections from either of the 2 textbooks - what 802.11 is, what are its goals, how does it work, under what circumstances does it not work (well). Your questio...


SVG not supported 2:14pm Tue 4th Jun, Christopher M.

ANONYMOUS wrote Yes, your pseudo-code should include an 'implementation' of binary-exponential backoff, as the delays of each node (based on their observations of collisions) will affect when they transmit retransmit in the future and, thus, affect h...


 UWA week 22 (1st semester, study break) ↓
SVG not supported 11:04pm Fri 31st May, ANONYMOUS

About question 4b in the 2023 exam paper Is it just outlining tier1,2, and 3 client-server architecture?


SVG not supported 9:08pm Fri 31st May, ANONYMOUS

looking at schedule, for week 12 lecture, some topics were "End-to-end communication using the secure sockets layer (SSL). Virtual private networks (VPNs)". However, they are barely mentioned (as examples of using cryptography methods). So I just ask ...


SVG not supported 8:43pm Fri 31st May, Oliver F.

Binary exponential back-off is a part of the standard Ethernet protocol and thus will be implemented I think.


SVG not supported 3:55pm Thu 30th May, ANONYMOUS

What do we need to understand about IEEE 802.11? can anyone give an outline


SVG not supported 6:36pm Tue 28th May, ANONYMOUS

Develop an implementation in pseudo-code, with a syntax similar to C, Python, or Java, that simulates the behaviour of the 1-persistent CSMA CD protocol over 100Mbps Ethernet. The simulation should support N identical nodes, each wishing to transmit ...

The University of Western Australia

Computer Science and Software Engineering

CRICOS Code: 00126G
Written by [email protected]
Powered by history
Feedback always welcome - it makes our software better!
Last modified  8:08AM Aug 25 2024
Privacy policy