Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) prepare down two reasons a company might prefer to pay Akamai to host their webpage instead of putting it onto a peer-to-peer network (like Napster) for free.

problem 2) Peer-to-peer file sharing systems require a way to permit peers to determine which other peers have the content they want. Compare and contrast the approaches taken by Napster (a centralized database), Gnutella (request ooding), and BitTorrent (distributed hash tables).

problem 3) David is torrenting a movie. Suppose all other BitTorrent users in the network are using a standard client and:

i) Have an active set size of four

ii) Equally split upload bandwidth among peers in their active sets

iii) Have all of the chunks of the movie David is downloading

The other peers in David's neighbourhood are listed below, along with the total upload capacity of each as well as the rate at which it is receiving data from the slowest peer in its active set.

Peer #      Total Upload Capacity         Download rate from slowest active peer
1                  100 Kbps                           100 Kbps
2                  2000 Kbps                         300 Kbps
3                  800 Kbps                           200 Kbps
4                  800 Kbps                           400 Kbps
5                 1200 Kbps                          100 Kbps
6                 400 Kbps                             225 Kbps

Assume that David has an infinite download capacity and upload capacity of 1 Mbps. Ignore optimistic unchoking for all peers in network, including David (that is, in the problems below, don’t take into account the upload cost or the download benefit of optimistic unchoking).

Suppose that if David offers a peer the same upload rate as another user in that peer's active set he will sometimes win and replace that user in the peer's active set.

(a) If David is using standard BitTorrent client with same properties as the rest of the peers in the network, determine the maximum download rate he can achieve?

(b) If David switches to BitTyrant, determine the maximum download rate he can achieve?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96703

Have any Question? 


Related Questions in Computer Network & Security

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Dqfacebook email electronic commerce and collaborative

DQ Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by ...

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Assignment1many more square-wave digital encoding schemes

Assignment 1. Many more square-wave digital encoding schemes exist than NRZ-L, NRZI, Manchester, differential Manchester, and bipolar-AMI. List three other encoding techniques and show an example of how each encodes. 2. ...

Pros amp cons of very simple vs very planned networkwrite a

Pros & Cons of Very Simple Vs Very Planned Network Write a 3-5 page report that discusses the pros and cons of very simple plans versus detailed plans, although the standards mandate very specific requirements for the pl ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Assignment1 give a generic definition of what a

Assignment 1. Give a generic definition of what a protocol is (not related to the internet). (Knowledge) 2. Using the definition you just found explain how TCP and IP fit that definition. (Evaluation) 3. What is the resp ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro