Question

In: Computer Science

Please don't copy and paste from the internet. Thank you - What is meant by term...

Please don't copy and paste from the internet. Thank you

- What is meant by term “inelastic traffic” on a network?

- Explain the primary difference between network applications that use client-server architecture and applications that use peer-to-peer architecture.

- What is meant by the term “peer-churn” with respect to peer-to-peer application architectures?

- Describe in one sentence what is represented by a “port” number to the protocol operating in the transport layer in layered protocol architecture.

Please don't copy and paste from the internet. Thank you

Solutions

Expert Solution

Q1-What is meant by term “inelastic traffic” on a network?

ANS-  Inelastic traffic fixes not effortlessly familiarise to vicissitudes in postponement and amount. Real-period hypermedia (acoustic flowing, cinematic) is a sample of inelastic traffic. Inelastic traffic requirements special action, though elastic circulation could noticeably also advantage from such action. In over-all, the excellence of radio relations would be pretentious by many issues like crashes, disappearing or the sound of setting.

Q2- Explain the primary difference between network applications that use client-server architecture and applications that use peer-to-peer architecture.

ANS- In Client-Server Network, Federal waiter is rummage-sale to stock the information. Though in Peer-to-Peer Network, apiece peer has its individual information. In Client-Server Network, Server account the service industries which is demand by Client. While in Peer-to-Peer System, respectively bulge can do together appeal and reply for the service industries

Important Differences Between Client-Server and Peer-to-Peer architecture

1. The main alteration between Client-Server and Peer-to-Peer network is that there is an enthusiastic waitperson and precise clients in the client-server network classical but, in peer-to-peer respectively protuberance cannister entertainment as both waiter and shopper.

2. In the client-server classical, the attendant offers facilities to the customer. Though, in peer-to-peer, apiece noble can deliver facilities and can also appeal for the service industries.

3. In the client-server perfect, distribution info is more significant while, in peer-to-peer perfect connectivity amid peers is additional significant.

4. In the client-server classical, information is stowed on a federal server but, in peer-to-peer respectively peer takes its personal information.

5. In peer-to-peer model, the waitpersons are spread in a organisation, so there are less odds of waitperson receiving bottlenecked, nonetheless in the consumer-server perfect, there is a solitary server portion the clients, so here are more odds of server receiving bottlenecked.

6. The client-server classical is supplementary luxurious to tool than peer-to-peer.

7. The client-server classical is additional climbable and steady than peer-to-peer.

Q3- What is meant by the term “peer-churn” with respect to peer-to-peer application architectures?

ANS- The subtleties of peer contribution, or churn, are a characteristic stuff of Peer-to-Peer organisations and dangerous for project and assessment. Precisely describing churn necessitates precise and impartial info about the entrance and leaving of peers, which is stimulating to obtain. Prior educations demonstration that peer contribution is very active but with incompatible physiognomies. Consequently, churn leftovers ill unspoken, notwithstanding its meaning.

Q4 - Describe in one sentence what is represented by a “port” number to the protocol operating in the transport layer in layered protocol architecture.

ANS - HTTP on admissions the transportation layer via listed variety harbour . Since port eighty has been selected as a station harbour, TCP is rummage-sale to section and summarise the http information beforehand transitory it to the Net sheet procedure internet protocol.

In processer schmoozing, the conveyance layer is a theoretical separation of approaches in the layered construction of procedures in the system stack in the Net procedure set and the OSI perfect.


Related Solutions

Please don't copy and paste from the internet. Thank you - What event will cause the...
Please don't copy and paste from the internet. Thank you - What event will cause the sender to initiate fast retransmit when using TCP? - Describe briefly the relationship between the round trip time (RTT) observed between a sender and a receiver and the retransmit timer used in TCP - Describe briefly the basic difference in service provided by an email server using POP3 protocol compared to an email server using IMAP protocol. Please don't copy and paste from the...
***** please don't copy and paste and don't use handwriting ***** Q3: Explain how Internet technologies...
***** please don't copy and paste and don't use handwriting ***** Q3: Explain how Internet technologies are involved in developing a process in one of the functions of the business? Give an example and evaluate its business value. Q4: What are the basic differences between HRM, Intranet and Internet in terms of Domain and Network Communication Scope? HRM Intranet HRM Internet Domain Network Communication Scope
***** please don't copy and paste and don't use handwriting ***** Q3: Explain how Internet technologies...
***** please don't copy and paste and don't use handwriting ***** Q3: Explain how Internet technologies are involved in developing a process in one of the functions of the business? Give an example and evaluate its business value. Q4: What are the basic differences between HRM, Intranet and Internet in terms of Domain and Network Communication Scope? HRM Intranet HRM Internet Domain Network Communication Scope
Need new and unique answers. Please don't copy and paste. Thank you. Q1.Discuss the process of...
Need new and unique answers. Please don't copy and paste. Thank you. Q1.Discuss the process of normalization and its purpose in the context of relational databases. Provide at least one example (preferably a table) of how normalization helps solve certain problems in relations.
** please don't copy and paste ** please don't use handwriting Q1: As the project sponsor,...
** please don't copy and paste ** please don't use handwriting Q1: As the project sponsor, you suggested that your company that runs multiple local supermarkets should provide an online shopping service to increase sales during COVID-19 pandemic. Write a system request to propose this project. System request Project Sponsor Business Need Business Requirements Business Value Special Issues or Constraints
**Please don't use handwriting **Please don't copy and paste use your own word Q1:What are the...
**Please don't use handwriting **Please don't copy and paste use your own word Q1:What are the roles of a project sponsor and the approval committee during the different SDLC phases? Part 2: Assume the following scenario: A small company needs to develop an information system for the Finance and Accounting Department. As an analyst which process model would you prefer and why? Part 3:There are three techniques which help users discover their needs for the new system, list and compare...
***** please don't copy and paste and don't use handwriting ***** Q1: Data Modelling is the...
***** please don't copy and paste and don't use handwriting ***** Q1: Data Modelling is the primary step in the process of database design. Compare and contrast Conceptual data model versus Physical data model. Illustrates with help of example to list down data (entities), relationship among data and constraints on data. Q2:What strategic competitive benefits do you see in a company’s use of extranets?
please i need unique answer , don't copy and paste ,, don't use handwriting.. can you...
please i need unique answer , don't copy and paste ,, don't use handwriting.. can you complete my answer , i need you answer b only Question: 3- Al Yamamah Steel Industries Co. uses the step method for allocating the costs of its service departments to operating departments. The company has two support departments (Human Resource and Information Technology) and two operating departments (Hot Rolled Hollow Steel and Cold Rolled Hollow Steel). Al Yamamah Steel Industries Co. decided to allocate...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question: Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question: Using a Web browser, identify at least five sources you would want to use when training a CSIRT. Using a Web browser, visit mitre org. What information is provided there, and how would it be useful?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT