Question

In: Computer Science

In a distributed system, three manners in which the transportation layer switch can be implemented are...

In a distributed system, three manners in which the transportation layer switch can be implemented are Network Address protocol, TCP hands-off, and via proxy.

Can you briefly describe the three manners above?

Solutions

Expert Solution

Q.In a distributed system, three manners in which the transportation layer switch can be implemented are Network Address protocol, TCP hands-off, and via proxy.Can you briefly describe the three manners above?

Answer:

Network Address protocol:

The idea of NAT is to allow multiple devices to access the Internet through a single public address. To achieve this, the translation of private IP address to a public IP address is required. Network Address Translation) is a process in which one or more local IP address is translated into one or more Global IP address and vice versa in order to provide Internet access to the local hosts. Also, it does the translation of port numbers i.e. masks the port number of the host with another port number, in the packet that will be routed to the destination. It then makes the corresponding entries of IP address and port number in the NAT table.An internet protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

TCP hands-off:

The TCP handoff is totally transparent from the client's point of view. Since it operates on transport-level streams, clients can never be aware of being redirected. They send their requests to the service machine and do not know that the intermediate gateway switches them between replicas.a TCP 3-way handshake is a process which is used in a TCP/IP network to make a connection between the server and client. It is a three-step process that requires both the client and server to exchange synchronization and acknowledgment packets before the real data communication process starts.

proxy:

A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your use case, needs, or company policy.If you’re using a proxy server, internet traffic flows through the proxy server on its way to the address you requested. The request then comes back through that same proxy server and then the proxy server forwards the data received from the website to you.


Related Solutions

What are the two basic manners in which health care expenditures can increase?
What are the two basic manners in which health care expenditures can increase?
In 2012, the state of California implemented a system of quanitity regulation of greenhouse gases, which...
In 2012, the state of California implemented a system of quanitity regulation of greenhouse gases, which included tradeable permits. This “cap-and-trade” program for greenhouse gas emissions distributes a fixed amount of greenhouse gas “allowances” to large emittes of greenhouse gases, such as electric power stations and large industrial plants. Plants may then purchase additional greenhouse gas emission allowances at auction, or, alternatively, may purchase unused allowances from another polluter. Theory predicts that this trading system will lead to a socially...
Which protocol layer defines the process by which LAN devices can access the shared medium?
  Which protocol layer defines the process by which LAN devices can access the shared medium?     a. MAC     b. LLC     c. physical layer     d. IP Select the correct statement(s) regarding the use of DSSS and OFDM on IEEE 802.11 WLANs.     a. DSSS and OFDM are more spectrally efficient than traditional FDM     b. DSSS and OFDM are both spread spectrum techniques that are easy to implement and less complicated...
How do you to determine sustainability in transportation system? describe three important elements of sustainability.
How do you to determine sustainability in transportation system? describe three important elements of sustainability.
Q4. Name three areas in which you can increase the availability of a SCADA system by...
Q4. Name three areas in which you can increase the availability of a SCADA system by introducing redundancy into the design of the system.
Briefly describe the characteristics (three key elements) of an area where carsharing can be successfully implemented.
Briefly describe the characteristics (three key elements) of an area where carsharing can be successfully implemented.
Ways in which Fiscal and Monetary Policy can be implemented in our turbulent market environment to...
Ways in which Fiscal and Monetary Policy can be implemented in our turbulent market environment to more effectively manage and stabilize our current markets.
Name 2 other solvents that can be used for TLC (thin layer chromatography). Which one is...
Name 2 other solvents that can be used for TLC (thin layer chromatography). Which one is polar and which one is non-polar?
The City of Smithville just implemented a dual-track computerized accounting system, which provides files for general...
The City of Smithville just implemented a dual-track computerized accounting system, which provides files for general journal entries and posting to appropriate general ledger/subsidiary ledger accounts. Budgetary, operating statement, and balance sheet accounts are provided for the General Fundand the other governmental fund types. Operating statement accounts and balance sheet accounts are also provided for governmental activities at the government-wide level. As the city’s new accountant, it is your job to enter the city’s initial journal entry accounting information as...
How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?
How can a system for multi-level access control be implemented for government and military applications? What might access rules look like for such a system?  
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT