What is utc and why is it used

Assignment Help Computer Networking
Reference no: EM13325731

Question:

On modern networked computers, maintaining the correct time on each machine is important. Computers on a LAN or WAN with di erent times can cause problems. In about a page and in your own words explain why it is important for computers to maintaining the correct time and more importantly explain how do they do it.

In your explanation make certain to include discussions on the following linked topics:

The computer's hardware clock (also called the Real Time Clock or RTC)
The computer's software clock (also called the kernel or system clock)
In Linux, how they are syncronised and why do they need to be syncronised? (See Exercise 2.35 from the Study Book)  What is UTC and why is it used? (UTC: Coordinated Universal Time, or Temps Universel Coordonne, and if you want|you can explain what is going on with the acronym!)

What is NTP and what are \clock strata"?

Notes:

a. The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together.

b. List all resources used in answering this question.

c. Please do not cut and paste slabs of text from a Wikipedia article. The question explicitly says in your own words!

d. Please do not fall into the trap of answering the question by using unexplained technical terms|you must explain all technical terms used especially if they have not been used anywhere else in the course.

 

Reference no: EM13325731

Questions Cloud

Find the magnitude of the cats centripetal acceleration : A cat rides a merry-go-round while turning with uniform circular motion. At time t1 = 2.00 s, the cat's velocity is v1 = (5.50) i + (4.00 m/s) j, What is the magnitude of the cat's centripetal acceleration
Explain how you installed the cryptmount package : She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.
The rise of social media : The rise of social media and its power to instantaneously connect people to others is a testament to just how interconnected the world has become. Social media has become an important way to form and maintain relationships. Many use social media plat..
Evaluate the time it will take to flush 99% of the discharge : Estimate the time it will take to flush 99% of the discharge from the lake. Immediately after the spill, the lake, completely mixed, has a pH of 8 and the total molar concentration of nitrogen species (NH3 and NH4+) is 7.1×10-4 mol/L. what is the ..
What is utc and why is it used : The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together.
Find the acceleration of the rocket : A 125-kg (including all the contents) rocket has an engine that produces a constant vertical force (the thrust) of 1720 N. Inside this rocket, Find the acceleration of the rocket
Define what is the final temperature of the mixture : If you have 410.0 mL of water at 25.00 °C and add 140.0 mL of water at 95.00 °C, what is the final temperature of the mixture. Use 1.00 g/mL as the density of water.
Calculate the magnitude of the force on the proton : A proton moving with a speed of 4.00 · 105 m/s in the positive y-direction enters a uniform magnetic field of 0.400 T pointing in the positive x-direction
Finance and budgeting within the organization : Ethical considerations related to finance and budgeting within the organization and technological considerations for improving the efficiency or effectiveness of finance and budgeting within the organization

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe threats to information security

Explain the relationship between privacy and IT. Describe some of the threats to information security and some of the measures you can take to protect information resources.

  Determining the size of data in frame

How many fram need to sent? Determine the size of data in each frame?

  Separation of a lan from the outside world

Discuss how may two routers be used to give separation of a LAN from the outside world?

  Describe basic wireless network maintenance functions

Describe basic wireless network maintenance functions. Producers are continuously releasing firmware upgrades for their products. If you were manager of WLAN.

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

  Create diagram for proposed network topology

Use Microsoft Visio 2007 to create diagram for proposed network topology. Write down the proposal for research group explaining why that design would best meet their requirements.

  Network discussion - application layer collapse

Application layer protocols such as HTTP, FTP, SMTP, DNS, and P2P networks. Pick up one protocol that you are familiar with and write a brief overview using your own words.

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Advantage of deterministic local area network protocol

State the primary advantage of a deterministic local area network protocol over a nondeterministic local area network protocol.Give a real-life example of this advantage.

  Explain multiprogramming and time-sharing environment

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

  Explain advantages of server-side software

Explain advantages of server-side software and how it gives mobile users with access to particualr kinds of communications and information.

  Starting and ending security and integrity levels of object

In Lipner's model consider moving the program from development into production. Write down the starting and ending security and integrity levels of this object.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd