Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) prepare down two reasons a company might prefer to pay Akamai to host their webpage instead of putting it onto a peer-to-peer network (like Napster) for free.

problem 2) Peer-to-peer file sharing systems require a way to permit peers to determine which other peers have the content they want. Compare and contrast the approaches taken by Napster (a centralized database), Gnutella (request ooding), and BitTorrent (distributed hash tables).

problem 3) David is torrenting a movie. Suppose all other BitTorrent users in the network are using a standard client and:

i) Have an active set size of four

ii) Equally split upload bandwidth among peers in their active sets

iii) Have all of the chunks of the movie David is downloading

The other peers in David's neighbourhood are listed below, along with the total upload capacity of each as well as the rate at which it is receiving data from the slowest peer in its active set.

Peer #      Total Upload Capacity         Download rate from slowest active peer
1                  100 Kbps                           100 Kbps
2                  2000 Kbps                         300 Kbps
3                  800 Kbps                           200 Kbps
4                  800 Kbps                           400 Kbps
5                 1200 Kbps                          100 Kbps
6                 400 Kbps                             225 Kbps

Assume that David has an infinite download capacity and upload capacity of 1 Mbps. Ignore optimistic unchoking for all peers in network, including David (that is, in the problems below, don’t take into account the upload cost or the download benefit of optimistic unchoking).

Suppose that if David offers a peer the same upload rate as another user in that peer's active set he will sometimes win and replace that user in the peer's active set.

(a) If David is using standard BitTorrent client with same properties as the rest of the peers in the network, determine the maximum download rate he can achieve?

(b) If David switches to BitTyrant, determine the maximum download rate he can achieve?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96703

Have any Question? 


Related Questions in Computer Network & Security

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

Assignment1 give a generic definition of what a

Assignment 1. Give a generic definition of what a protocol is (not related to the internet). (Knowledge) 2. Using the definition you just found explain how TCP and IP fit that definition. (Evaluation) 3. What is the resp ...

Q1 a subnetted or hierarchical backbone can also be called

Q1. A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Q2. A backbone network that connects many backbone networks span ...

Web and data securitybullyour company security

Web and Data Security • Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as ...

What special function does a cache server perform why does

What special function does a cache server perform? Why does this function have value for larger organizations? How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

Assignment network layerquestion 1 routing 1 use the packet

Assignment: Network Layer Question 1: Routing 1. Use the Packet Tracer software to build the above network. a. Choose the generic empty router type for your routers. b. Choose the generic empty switch type for your switc ...

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

Assignmentpart 1the new network administrator at health

Assignment Part 1 The new network administrator at Health Care HQ wants to be clear about your duties as the system administrator. In 1 paragraph, you will provide the following: • Explain your job duties to the new netw ...

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro