Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Answer the following problems.

problem 1) How might you implement the instant messaging application like GChat (a push-based service) in CCN (a pull-based architecture)?
Note: We do not have one particular \right" answer in mind. If you draw inspiration from VoCCN design presented in lecture, ensure to point out the main difference in traffic pattern between the IM app and a voice app.

problem 2) Skype uses mysterious protocol to find out whether the user is logged in, where they are located, and what ports they are listening on. Assume that you have set out to build your own peer-to-peer telephony system.

(a) describe briefly, how could you use a system such as Chord to maintain a directory of users?

(b) Your telephony system catches on very quickly, in part since you actually pay people to use it. (At least until it is discovered that funds are coming out of your research advisor's grant.) Soon you have tens of thousands of users worldwide. Now users are starting to complain that it takes long time to find their friends! Provide at least two good reasons why this might be.

(c) When the node suddenly fails in Chord, all of the information in that node may be lost. Given that you've already got an implementation of Chord up and running, describe an easy way to give some protection in the event that a single node fails.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M96712

Have any Question? 


Related Questions in Computer Network & Security

Or the purpose of the first part of this project you are

Or the purpose of the first part of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Projects 1 and 2. After seeing you searc ...

Case study wireless and mobile technologiesin this very

Case Study: Wireless and Mobile Technologies In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Project assignment software defined networks1introductionin

Project Assignment: Software Defined Networks 1 Introduction In this assignment you will learn how to use the OpenFlow protocol to program an SDN controller in a Mininet emulated network using POX. The following sections ...

1 list and describe the four types of computer networks

1. List and describe the four types of computer networks from largest to smallest.  2. Define client/server computing, packet switching, and TCP/IP.  Explain how these three things make the Internet so powerful and robus ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Discussion window media servicebulldiscuss sharepoint

Discussion Window Media Service • Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requi ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Assignmentinstructions1you just received a brand new

Assignment Instructions 1. You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing net ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro