Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) prepare down two reasons a company might prefer to pay Akamai to host their webpage instead of putting it onto a peer-to-peer network (like Napster) for free.

problem 2) Peer-to-peer file sharing systems require a way to permit peers to determine which other peers have the content they want. Compare and contrast the approaches taken by Napster (a centralized database), Gnutella (request ooding), and BitTorrent (distributed hash tables).

problem 3) David is torrenting a movie. Suppose all other BitTorrent users in the network are using a standard client and:

i) Have an active set size of four

ii) Equally split upload bandwidth among peers in their active sets

iii) Have all of the chunks of the movie David is downloading

The other peers in David's neighbourhood are listed below, along with the total upload capacity of each as well as the rate at which it is receiving data from the slowest peer in its active set.

Peer #      Total Upload Capacity         Download rate from slowest active peer
1                  100 Kbps                           100 Kbps
2                  2000 Kbps                         300 Kbps
3                  800 Kbps                           200 Kbps
4                  800 Kbps                           400 Kbps
5                 1200 Kbps                          100 Kbps
6                 400 Kbps                             225 Kbps

Assume that David has an infinite download capacity and upload capacity of 1 Mbps. Ignore optimistic unchoking for all peers in network, including David (that is, in the problems below, don’t take into account the upload cost or the download benefit of optimistic unchoking).

Suppose that if David offers a peer the same upload rate as another user in that peer's active set he will sometimes win and replace that user in the peer's active set.

(a) If David is using standard BitTorrent client with same properties as the rest of the peers in the network, determine the maximum download rate he can achieve?

(b) If David switches to BitTyrant, determine the maximum download rate he can achieve?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96703

Have any Question? 


Related Questions in Computer Network & Security

Assignment network consultation for designitthis assignment

Assignment: Network Consultation for DesignIT This assignment contains two Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to comple ...

Networking trendsnetworking trends paper in this paper you

Networking trends. Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, h ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

Services in your arearesearch dsl and cable modem services

Services in your area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Resea ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen