Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) prepare down two reasons a company might prefer to pay Akamai to host their webpage instead of putting it onto a peer-to-peer network (like Napster) for free.

problem 2) Peer-to-peer file sharing systems require a way to permit peers to determine which other peers have the content they want. Compare and contrast the approaches taken by Napster (a centralized database), Gnutella (request ooding), and BitTorrent (distributed hash tables).

problem 3) David is torrenting a movie. Suppose all other BitTorrent users in the network are using a standard client and:

i) Have an active set size of four

ii) Equally split upload bandwidth among peers in their active sets

iii) Have all of the chunks of the movie David is downloading

The other peers in David's neighbourhood are listed below, along with the total upload capacity of each as well as the rate at which it is receiving data from the slowest peer in its active set.

Peer #      Total Upload Capacity         Download rate from slowest active peer
1                  100 Kbps                           100 Kbps
2                  2000 Kbps                         300 Kbps
3                  800 Kbps                           200 Kbps
4                  800 Kbps                           400 Kbps
5                 1200 Kbps                          100 Kbps
6                 400 Kbps                             225 Kbps

Assume that David has an infinite download capacity and upload capacity of 1 Mbps. Ignore optimistic unchoking for all peers in network, including David (that is, in the problems below, don’t take into account the upload cost or the download benefit of optimistic unchoking).

Suppose that if David offers a peer the same upload rate as another user in that peer's active set he will sometimes win and replace that user in the peer's active set.

(a) If David is using standard BitTorrent client with same properties as the rest of the peers in the network, determine the maximum download rate he can achieve?

(b) If David switches to BitTyrant, determine the maximum download rate he can achieve?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96703

Have any Question? 


Related Questions in Computer Network & Security

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Services in your arearesearch dsl and cable modem services

Services in your area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Resea ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

Network security paper in this paper you will define the

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro