What are the transport protocols

Assignment Help Basic Computer Science
Reference no: EM13493287

Assignments

Answer the questions succinctly and clearly, explain your answer, and show your work.  Answers, even if right but without an explanation, will get no credit.  The explanations need to be brief, but complete, logical, and to the point.  Do notcopy/paste from any resources, use your own words and properly list your references.  Answer in the space provided or add lines if really needed.

 

1.  (10 pts) Match each of the following terms with its definition.

[1]. Client
[2]. Middleware
[3]. Server
[4]. API
[5]. SQL

a)   A set of function and call programs that allow clients and servers to intercommunicate.

b)   A computer that houses information for manipulation by networked clients.

c)   A networked information requester that can query a database or other information.

d)  A method for addressing, creating, updating, or querying relational databases.

e)   Software that improves connectivity between a client application and a server. 

 

2. (10 pts) What transport protocols are used in the following applications? 

a)   Simple connection-oriented streaming voice/video without control for pause, stop, resume, forward, backward.

b)   Unreliable, no handshaking, no ordering, no retransmission of data.

c)   SS7 transport.

d)  Connection-oriented, reliable and ordered 3-way handshaking streaming of data transmission,

e)   Streaming voice/video with control for pause, stop, resume, forward, backward.

f)    Connection-oriented, reliable and ordered 3-way handshaking blocks (chunks) of stream data transmission.

g)   Reservation of transmission bandwidth without real-time traffic feedback.

h)   Reservation of transmission bandwidth with real-time traffic feedback.

i)     Providing secure but not reliable transmission.

j)     Providing secure and reliable transmission of data.

3. (10 pts) What mechanism is used to detect/avoid/correct data transmission collision in Layer 2, such as Ethernet and WiFi? Describe the mechanism in sufficient details. 

4. (10 pts) Which data analysis/process method is most suitable for Big Data (e.g. Petra Bytes or more)? Justify your answer.

5. (10 pts) Two data centers used for retail credit authorization are located in two different major population centers, which are separated from each other by a large zone of very little population. Each data center is intended to cover a particular geographical area and thus contains data that reflect the account status of the card holders in that area (only). Terminals for each are connected to the corresponding data center. Communication between both data centers occurs only in case a card holder from one geographical area shops in a retail credit establishment of the geographical area covered by the other data center.

 a) Classify the relationship between each terminal and the corresponding data center as either client/server or peer-to-peer. Explain your answer.

 b) Classify the relationship between both data centers as either client/server or peer-to-peer. Explain your answer.

 

6. (10 pts) What is Distance-Vector Routing? What is Link-State Routing? What is Dijkstra’s Algorithm? What is Bellman-Ford Algorithm ?

7. (10 pts) Explain how SOAP, RPC, HTTP, and XML are used in inter-process communications. Provide sufficient details to distinguish each protocol.

8. (10 pts) Explain why Cloud Interoperability, Portability, and Federation are becoming more and more serious considerations. What are the latest developments in these areas?

9. (10 pts) Explain how a cell phone obtains its IP address in the 3GPP/IMS packet switching system.

10. (10 pts) Consider a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk between each end office and the intermediate switch. The average telephone is used to make four phone calls per 8-hour workday, with a mean call duration of six minutes. Ten percent of the calls are long distance. What is the maximum number of telephones an end office can support?

Reference no: EM13493287

Questions Cloud

Explain how many grams of barium sulfate are produced : How many grams of barium sulfate are produced if 25.34mL of 0.1133 M BaCl2 completely react given the reaction. BaCl2(aq)+Na2SO4-BaSO4(s)+2NaCl(aq)
How much power do the radio waves carry : A source of radio waves is emitted from the center of our galaxy 1.8 x 104 light years away. How much power do the radio waves carry
Define cell is constructed of two hydrogen electrodes : A concentration cell is constructed of two hydrogen electrodes. The pressure of H2 is 1.00 atm in each hydrogen electrode. One of the electrodes is immersed in a solution with [H+] = 1.0 M and the other in a solution with 0.62 M NH3. What will be ..
How much work does the kid do on the toy : A kid picks up a toy of mass 139g, from the floor. The kid lifts the toy 42.2cm above the floor. How much work does the kid do on the toy
What are the transport protocols : What mechanism is used to detect/avoid/correct data transmission collision in Layer 2, such as Ethernet and WiFi? Describe the mechanism in sufficient details.
Describes what ethics and professional conduct means : Ethics and professional conduct are extremely important in the workplace and different professions have different requirements and expectations of the people within the professions.
Evaluate the solubility of this compound in g/l : The Ksp of calcium carbonate, CaCO3, is 3.36 × 10-9. Calculate the solubility of this compound in g/L.
Communicate together securely : There are two offices in different locations that must communicate together securely.
Explain the concentration of hso4- in the battery : Suppose that a fully charged lead-acid battery contains 1.16 L of 5.00 M H2SO4. What will be the concentration of HSO4- in the battery after 2.83 A of current is drawn from the battery for 6.3 h? Pb(s) + PbO2(s) + 2H+(aq) + 2HSO4?(aq) ? 2PbSO4(s) ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design a program that prompts the user to enter a string

Design a program that prompts the user to enter a string. The program should then display the number of vowels and the number of consonants in the string. I am absolutely lost and don't even know how to start, any assistance would be appreciated.

  Describe method to keep the data local caches in sync across

describe method to keep the data local caches in sync across multiple processors (i.e. cache coherence). discuss implementations issues

  Construct an fa (finite automata)

Construct an FA (finite automata) that accepts all binary strings with an even number of 0's and the number of 1's is a multiple of 3.

  What arguments make for single language for all programming

What arguments can you make FOR the idea of a single language for all programming domains? "For" the idea, not the against!

  Why is it necessary to include both wmfc and mfc

Why is it necessary to include both WMFC and MFC in the logic expression for Counter_enable given in Section 5.6.2?

  How many data in the number of bytes can be hold in cache

What is the size of the cache, i.e., how many data in the number of bytes can be hold in the cache?

  Tools or tactics for risks for computing infrastructure

As part of project to assess security risks for computing infrastructure, you have found that other managers often have different idea. List any tools or tactics that could be used.

  What is the vulnerabilities of information system conference

What is the Vulnerabilities of information system Conference?

  Determine the effective miss rate

For the following repeating sequence of 1w address (given in hex) and cache configurations... Assuming least recently used (LRU) replacement for associative caches,

  Explain why do you think that so much of the software which

why do you think that so much of the software that ran on large-scale computers was custom written by programmers

  How computer tackles loss of power to limit loss

In short talk about how computer tackles loss of power to limit loss of all work that has been done. In discussion, you may wish to consider concepts like: multiprogramming, time-sharing, time-slice, and interrupts.

  Create the data model segment for business rules

The FlyRight Aircraft Maintenance (FRAM) division of FlyRight Company (FRC) does all maintenance for FRC's aircraft. Create the data model segment which reflects the following business rules.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd