Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Match each of the following terms with its definition.

[1]. Client
[2]. Middleware
[3]. Server
[4]. API
[5]. SQL

a) A set of function and call programs that allow clients and servers to intercommunicate.

b) A computer that houses information for manipulation by networked clients.

c) A networked information requester that can query a database or other information.

d) A method for addressing, creating, updating, or querying relational databases.

e) Software that improves connectivity between a client application and a server.

2. What transport protocols are used in the applications?

a) Simple connection-oriented streaming voice/video without control for pause, stop, resume, forward, backward.

b) Unreliable, no handshaking, no ordering, no retransmission of data.

c) SS7 transport.

d) Connection-oriented, reliable and ordered 3-way handshaking streaming of data transmission,

e) Streaming voice/video with control for pause, stop, resume, forward, backward.

f) Connection-oriented, reliable and ordered 3-way handshaking blocks (chunks) of stream data transmission.

g) Reservation of transmission bandwidth without real-time traffic feedback.

h) Reservation of transmission bandwidth with real-time traffic feedback.

i) Providing secure but not reliable transmission.

j) Providing secure and reliable transmission of data.

3. What mechanism is used to detect/avoid/correct data transmission collision in Layer 2, such as Ethernet and WiFi? Describe the mechanism in sufficient details.

4. Which data analysis/process method is most suitable for Big Data (e.g. Petra Bytes or more)? Justify your answer.

5. Two data centers used for retail credit authorization are located in two different major population centers, which are separated from each other by a large zone of very little population. Each data center is intended to cover a particular geographical area and thus contains data that reflect the account status of the card holders in that area (only). Terminals for each are connected to the corresponding data center. Communication between both data centers occurs only in case a card holder from one geographical area shops in a retail credit establishment of the geographical area covered by the other data center.

a) Classify the relationship between each terminal and the corresponding data center as either client/server or peer-to-peer. Explain your answer.

b) Classify the relationship between both data centers as either client/server or peer-to-peer. Explain your answer.

6. What is Distance-Vector Routing? What is Link-State Routing? What is Dijkstra's Algorithm? What is Bellman-Ford Algorithm ?

7. Explain how SOAP, RPC, HTTP, and XML are used in inter-process communications. Provide sufficient details to distinguish each protocol.

8. Explain why Cloud Interoperability, Portability, and Federation are becoming more and more serious considerations. What are the latest developments in these areas?

9. Explain how a cell phone obtains its IP address in the 3GPP/IMS packet switching system.

10. Consider a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk between each end office and the intermediate switch. The average telephone is used to make four phone calls per 8-hour workday, with a mean call duration of six minutes. Ten percent of the calls are long distance. What is the maximum number of telephones an end office can support?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91338622
  • Price:- $95

Guranteed 48 Hours Delivery, In Price:- $95

Have any Question?


Related Questions in Computer Engineering

Assignmentthe results of the spec cpu2006 bzip2 benchmark

Assignment The results of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution time of 750 s, and a reference time of 9650 s. 1) Find the CPI if the clock cycle ...

Submit your solution as a plain-text file with a c

Submit your solution as a plain-text file with a .c extension in the name. Name timer - counts down to zero from a user supplied number. Description Displays a count down to zero from a number supplied by the user at the ...

Discussion 2 initial post due friday by midnight estdefine

Discussion 2: Initial post due Friday by midnight EST Define and briefly discuss the following brainstorming techniques, the delphi technique, brainstorming, or nominal group technique. For your discussion, you are requi ...

System analysis and designthink about your own university

System Analysis And Design. Think about your own university or college and choose an idea that could improve student satisfaction with the course enrollment process. Currently, can students enroll for classes from anywhe ...

Explain the difference between penetration tests and

Explain the difference between penetration tests and security tests. Emphasize that this book will explain things from a security testing perspective.

One of the basic motivations behind the minimum spanning

One of the basic motivations behind the Minimum Spanning Tree Problem is the goal of designing a spanning network for a set of nodes with minimum total cost. Here we explore another type of objective: designing a spannin ...

What pieces of hardware and software do the collision

What pieces of hardware and software do the collision detection?

The second programming project involves writing a program

The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix notation and builds the arithmetic expression tree that represents that expression. From tha ...

Explain that the biggest problems with adware is that it

Explain that the biggest problems with adware is that it slows down the computers its running on.

What are some examples of when a data compression utility

What are some examples of when a data compression utility can be used for information stored on a computer's hard drive?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As