Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) prepare down two reasons a company might prefer to pay Akamai to host their webpage instead of putting it onto a peer-to-peer network (like Napster) for free.

problem 2) Peer-to-peer file sharing systems require a way to permit peers to determine which other peers have the content they want. Compare and contrast the approaches taken by Napster (a centralized database), Gnutella (request ooding), and BitTorrent (distributed hash tables).

problem 3) David is torrenting a movie. Suppose all other BitTorrent users in the network are using a standard client and:

i) Have an active set size of four

ii) Equally split upload bandwidth among peers in their active sets

iii) Have all of the chunks of the movie David is downloading

The other peers in David's neighbourhood are listed below, along with the total upload capacity of each as well as the rate at which it is receiving data from the slowest peer in its active set.

Peer #      Total Upload Capacity         Download rate from slowest active peer
1                  100 Kbps                           100 Kbps
2                  2000 Kbps                         300 Kbps
3                  800 Kbps                           200 Kbps
4                  800 Kbps                           400 Kbps
5                 1200 Kbps                          100 Kbps
6                 400 Kbps                             225 Kbps

Assume that David has an infinite download capacity and upload capacity of 1 Mbps. Ignore optimistic unchoking for all peers in network, including David (that is, in the problems below, don’t take into account the upload cost or the download benefit of optimistic unchoking).

Suppose that if David offers a peer the same upload rate as another user in that peer's active set he will sometimes win and replace that user in the peer's active set.

(a) If David is using standard BitTorrent client with same properties as the rest of the peers in the network, determine the maximum download rate he can achieve?

(b) If David switches to BitTyrant, determine the maximum download rate he can achieve?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96703

Have any Question? 


Related Questions in Computer Network & Security

Assignment1 as a new security manager for a retail

Assignment 1. As a new security manager for a retail operation, you have been asked to create a new loss prevention and risk management program that will be presented to upper management. Create a 10- to 12-slide Microso ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

Assignment1 give a generic definition of what a

Assignment 1. Give a generic definition of what a protocol is (not related to the internet). (Knowledge) 2. Using the definition you just found explain how TCP and IP fit that definition. (Evaluation) 3. What is the resp ...

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

Perimeter securitythe project deliverables are as

Perimeter Security The project deliverables are as follows: • Update the Information Network Security Architecture Design document title page with a new date and project name. • Update your previously completed sections ...

Short answer1 classify each of the following

Short Answer 1. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called intoplay. a. A hacker breaks into the com ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen