Question

In: Computer Science

One technique that can be used to roll back management transactions involves reverting to an earlier...

  1. One technique that can be used to roll back management transactions involves reverting to an earlier configuration file. Discuss two scenarios to prove this as a true management transaction. Discuss also two scenarios to reveal drawbacks of this technique subject to true management transactions

  1. A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. What is the problem and how will you identify the problem? What should be configured on the customer’s wireless network to improve connectivity to the wireless network and how will you configure this?

  1. A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Discuss two topologies that cannot achieve this and describe why. Discuss also two topologies the engineer would implement and describe how these can achieve the expected results.

Solutions

Expert Solution

Solution 1: Systems that have to actually perform the management of the transactions, it is necessary for that system to have a strategy in place to allow the admins and the users to commit as well rollback the changes that are carried out during the concurrent operations over these transactions. Scenarios to prove that it is a true transaction management system are:

  1. It allows the processing of the transactions concurrently.
  2. It allows the users to roll back the changes that they think are not necessary or unwanted.

Some of the drawbacks of this strategy are:

  1. The maintenance of the configuration file in order to carry out the changes in the concurrent transactions such as the committing as well as the rollback is actually an overhead and due to this, the system becomes really slow.
  2. Rollback is not enough in such a system if it does not provide a facility to lock over the transaction, this is because if you are rolling back on some transaction, someone else can actually perform the changes over the same transaction as you have not taken the lock over the transaction.

Solution 2: It is actually happening due to the interference among different wireless access points or WAPs. This can be overcome by making sure that these wireless APs that are having overlapping signals are assigned with unique channel frequencies. There are 14 frequency channels that can be assigned to these wireless APs according to the 802.11b standard and hence you can use any other channel to these APs except the one that is being used by your wireless access point.

Solution 3: The ring technology can be effectively used for the purpose of actually ensuring fault tolerance within the network system that is being designed by the network admin. Even though it is a ring topology but still kind of forms a star topology in which all the computers are connected to a central Multistation Access Unit or MAU through the connecting cables. The MAU can send the signals to the systems and it can even receive the signals back from them and hence the whole system kind of form a ring although they are connected in the form of a star technology and due to this if any system fails to function, all other systems remain functional. For the second requirement of making the systems wait to talk the MAU actually sends a token that can be acquired by that system only that needs to transmit the data. Only the system that posseses the token can actually transmit the data.

Here's the solution to your question and it is absolutely correct, please please please provide it a 100% rating. Thanks for asking and happy learning!!


Related Solutions

Encryption is a technique used to keep information private. It involves transforming text into a new...
Encryption is a technique used to keep information private. It involves transforming text into a new unreadable sequence of characters by changing the text in some way using a key. The goal is to do this in such a way that someone else who has the key can decrypt the information. In this question, you will write a program to encrypt an input string with the help of a key and an alphabet string. The program will start by setting...
Respond to this discussion, what feed back could you give? Correlation is a statistical technique used...
Respond to this discussion, what feed back could you give? Correlation is a statistical technique used to determine the relationship between two or more variables (Thomas, Nelson, & Silverman, 2015). This is a way to determine if there are positive or negative relationships between variables in research. For example, if someone were to research the effect of different amounts of creatine monohydrate supplementation in high school athletes, they may notice a correlation between the amounts of supplementation and the athletes...
Post-lab: Neutralization Power of an Antacid 1) This experiment used the technique of back titration. Describe...
Post-lab: Neutralization Power of an Antacid 1) This experiment used the technique of back titration. Describe the process of back titration in 2-3 sentences. Why is back titration used instead of directly titrating a solution of antacid with 0.15 M HCl? 2) Phenolphthalein is an indicator which turns a pink color at a pH of 8.3. In this experiment, phenolphthalein is added to the antacid solution to indicate the equivalence point of the back titration. Phenolphthalein solution by itself is...
QUESTION 37 Match the appropriate term to the definition or technique. Each technique can be used...
QUESTION 37 Match the appropriate term to the definition or technique. Each technique can be used only once. As such, choice the best definition       -       A.       B.       C.       D.    Hypothesis Test       -       A.       B.       C.       D.    ANOVA       -       A.       B.       C.       D.    Two Way ANOVA      ...
Explain how the nonprobability technique of quota sampling can be used to mimic the probability technique...
Explain how the nonprobability technique of quota sampling can be used to mimic the probability technique of stratified random sampling. Give an example.
Genetics: Using molecular hybridization: fully explain the technique and discuss one application of that technique used...
Genetics: Using molecular hybridization: fully explain the technique and discuss one application of that technique used in scientific research.
Can management take advantage or be abusive in buying share back?
Can management take advantage or be abusive in buying share back?
Impedance plethysmography is a technique that can be used to detect thrombosis--the presence of clots in...
Impedance plethysmography is a technique that can be used to detect thrombosis--the presence of clots in a blood vessel--by measuring the electrical resistance of a limb, such as the calf of the leg. In a typical clinical setting, a current of 200 μA is passed through the leg from the upper thigh to the foot. The voltage is measured at two points along the calf separated by 13 cm. Part A: If the voltage measured is 17 mV, what is...
Describe a tool or technique which can be used to analyse and improve the performance of...
Describe a tool or technique which can be used to analyse and improve the performance of manufacturing systems e.g. Rank-order clustering, Ishikawa diagrams, value stream mapping etc. and explain its basic principle, how it would be applied, the potential benefits and inhibitors to implementation.         
Name or describe in some detail a technique that can be used to determine the elemental...
Name or describe in some detail a technique that can be used to determine the elemental composition of surfaces. YOU SHOULD mention one technique and write more details about it
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT