What is the meaning of each of the four states in the MESI protocol?
What are some of the key benefits of clustering?
What is the difference between failover and failback?
What are the differences among UMA, NUMA, and CC-NUMA?
Some of the diagrams show horizontal rows that are partially filled. In other cases, there are rows that are completely blank. These represent two different types of loss of efficiency. Explain.
The following FORTRAN program is to be executed on a computer, and a parallel version is to be executed on a 32-computer cluster. Suppose lines 2 and 4 each take two machine cycle times, including...
Consider a situation in which two processors in an SMP configuration, over time, require access to the same line of data from main memory. Both processors have a cache and use the MESI protocol....
Consider Figure 20.20. Assume that each gate produces a delay of 10 ns. Thus, the sum output is valid after 30 ns and the carry output after 0 ns. What is the total add time for a. 32-bit adder a....
Construct a truth table for the following Boolean expressions: a. b. c. d. ABC A BC ABC ABC A B C A(BC + BC) (A +B)(A C)(A B)
A combinational circuit is used to control a seven-segment display of decimal digits, as shown in Figure 20.36. The circuit has four inputs, which provide the four-bit code used in packed decimal...
Describe the effect of this instruction: cmp eax, 1 Assume that the immediately preceding instruction updated the contents of eax.
How much time does your employer give you to read about current events related to your job?
How does reading current news articles help IT security professionals in their daily jobs?
Brute force is used to crack a 100-bit key. The key is cracked in only 5,000 tries. How can this be?
In practice, public key authentication is used heavily for initial authentication but rarely for message-by-message authentication. Given the intense processing power required for public key...
Can you use the longest hash possible? How long is good enough?
How will diverse computing platforms affect IT security?
a) What can users do to enhance browser security? b) Under Internet Options in IE, what can the user do on the Security tab? d) In which tab are cookies controlled?
An employee working at home complains that some of her messages to fellow employees at the firm's headquarters site are not getting through. What might be the problem?
a) What is Data Loss Prevention (DLP)? b) Are there some types of data that are too risky to collect? c) What is PII? Please give a couple examples of PII. d) What is data masking?
How much data would you lose if your computer's hard drive crashed right now? Could you reduce the amount of data that would be lost? How?
How might a corporation be hurt by acknowledging a large-scale data loss?
a) What is the major attraction of a HIDS? b) What are the two weaknesses of host IDSs? c) List some things at which host operating system monitors look?
When IDSs generate alerts, it can send them to a console in the security center, to a mobile phone, or via e-mail. Discuss the pros and cons of each?
Consider the following relations for a database that keeps track of business trips of salespersons in a sales office: SALESPERSON (SSN, Name, Start_Year, Dept_No) TRIP (SSN, From_City, To_City,...
Write appropriate SQL DDL statements for declaring the LIBRARY relational database schema of Figure 4.6. Specify the keys and referential triggered actions.
Specify the following queries in SQL on the database schema of Figure 1.2. (a) Retrieve the names of all senior students majoring in 'COSC' (computer science). (b) Retrieve the names of all courses...
In SQL, specify the following queries on the database specified in Figure 3.5 using the concept of nested queries and the concepts described in this chapter. a. Retrieve the names of all employees...
Show the result of each of the sample queries in Section 6.5 as it would apply to the database state in Figure 3.6.
Consider the two tables T1 and T2 shown in Figure 6.15. Show the results of the following operations:
Show an alternative design for the attribute described in Exercise 7.17 that uses only entity types (including weak entity types if needed) and relationship types.
A database is being constructed to keep track of the teams and games of a sports league. A team has a number of players, not all of whom participate in each game. It is desired to keep track of the...
Cardinality ratios often dictate the detailed design of a database. The cardinality ratio depends on the real-world meaning of the entity types involved and is defined by the specific application....
Convert the example of GEOMETRY_OBJECTS given in section 11.1.5 from the functional notation to the notation given in Figure 11.2 that distinguishes between attributes and operations. Use the keyword...
Compare inheritance in the EER model (see Chapter 8) to inheritance in the OO model described in Section 11.1.5.
Show two rules that have a confidence of 0.7 or greater for an itemset containing three items from Exercise 28.14.
Repeat exercise 15.24 for the following different set of functional dependencies G = { {A, B} -> {C}, {B, D} -> {E, F}, {A, D} -> {G, H}, {A} -> {I}, {H} -> {J} }.
Consider the relation REFRIG(MODEL#, YEAR, PRICE, MANUF_PLANT, COLOR), which is abbreviated as REFRIG(M, Y, P, MP, C), and the following set of F of functional dependencies: F={M -> MP, {M,Y} -> P,...
A PARTS file with Part# as hash key includes records with the following Part# values: 2369, 3760, 4692, 4871, 5659, 1821, 1074, 7115, 1620, 2428, 3943, 4750, 6975, 4981, 9208. The file uses 8...
Prove that cautious waiting avoids deadlock.
Apply the timestamp ordering algorithm to the schedules of Figure 21.8 (b) and (c), and determine whether the algorithm will allow the execution of the schedules.
Repeat Exercise 22.25, but use the multiversion timestamp ordering method.
Describe the most popular wireless Internet access technologies today. Compare and contrast them.
List six access technologies. Classify each one as residential access, company access, or mobile access.
In the above problem, suppose R1 =R2 =R3 =R and dproc = 0. Further suppose the packet switch does not store-and-forward packets but instead immediately transmits each bit it receives before waiting...
Suppose you can access the caches in the local DNS servers of your department. Can you propose a way to roughly determine the Web servers (outside your department) that are most popular among the...
Assume that we know the bottleneck link along the path from the server to the client is the first link with rate R, bits/sec. Suppose we send a pair of packets back to back from the server to the...
Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a direct link of R = 2 Mbps. Suppose the propagation speed over the link is 2.5.108 meters/sec. a. Calculate the...
Referring to problem P24, suppose we can modify R. For what value of R is the width of a bit as long as the length of the link? Problem 24 Suppose two hosts, A and B, are separated by 20,000...
Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of s, = 30 Mbps, and each peer has a download rate of di =2 Mbps and an upload rate of . For N =10, 100, and...
In the generic SR protocol that we studied in Section 3.4.4, the sender transmits a message as soon as it is available (if it is in the window) without waiting for an acknowledgment. Suppose now that...
Consider the foll owing string of ASCll characters that were captured by Wireshark when the browser sent an HTTP GET message (i .e., this is the actual content of an HTTPGET message). The characters...
Consider the rdt 3.0 protocol. Draw a diagram showing that if the network connection between the sender and receiver can reorder messages (that is, that two messages propagating in the medium between...
Consider a scenario in which Host A wants to simultaneously send packets III Hosts Band C. A is connected to Band C via a broadcast channel-a packet sent by A is carried by the channel to both Band...
Host A and B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection. Host A can send its...
Consider a modification to TCP's congestion control algorithm. Instead of additive increase, we can use multiplicative increase. A TCP sender increases its window size by a small positive constant ...
In this problem. we consider the delay introduced by the TCP slow-start phase. Consider a client and a Web server directly connected by one link of rate R. Suppose the client wants to retrieve an...
Consider our motivation for correcting protocol rdt2.1. Show that the receiver, shown in Figure 3.57, when operating with the sender shown in Figure 3.11, can lead the sender and receiver to enter...
In protocol rdt3. 0, the ACK packets flowing from the receiver 10 the sender do not have sequence numbers (although they do have an ACK field that contains the sequence number of the packet they are...
Give a trace of the operation of protocol rdt3. 0 when data packets and acknowledgment packets are garbled. Your trace should be similar to that used in Figure 3.16.
Consider a router that interconnects three subnets: Subnet I, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1 .17/24. Also...
In Problem P9 you are asked to provide a forwarding table (using longest prefix matching). Rewrite this forwarding table using the a.b.c.d/x notation instead of the binary string notation.
Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance-vector algorithm and show the distance table entries at node z. 1...
Consider the count-to-infinity problem in the distance vector routing. Will the count-to-infinity problem occur if we decrease the cost of a link? Why? How about if we connect two nodes which do not...
In Figure 4.42, consider the path information that reaches stub networks W, X, and Y. Based on the information available at Wand X, what are their respective views of the network topology? Justify...
Design (give a pseudocode description of) an application-level protocol that maintains the host addresses of all hosts participating in a multicast group. Specifically identify the network service...
Describe polling and token-passing protocols using the analogy of cocktail party interactions.
Suppose the information content of a packet is the bit pattern 1110 10 II 100 I 1101 and an even parity scheme is being used, What would the value of the field containing the parity bits be for the...
Suppose four active nodes-nodes A, B, C and D-are competing for access to a channel using slotted ALOHA. Assume each node has an infinite number of packets to send. Each node attempts to transmit in...
Consider a VC network with a 2-bit field for the VC number. Suppose that the network wants to set up a virtual circuit over four links: link A, link B, link C, and link D. Suppose that each of these...
Suppose nodes A and B are on the same 10 Mbps Ethernet bus, and the propagation delay between the two nodes is 245 bit times. Suppose A and B send frames at the same time, the frames collide, and...
In Section 5.3, we provided an outline of the derivation of the efficiency of slotted ALOHA, in this problem we'll complete the derivation, a, Recall that when there are N active nodes, the...
Repeat P23 but assume that r =2. Assume again that the bucket is initially full.
Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice's certificate. In what step of the SSL handshake algorithm will Bob discover...
Consider the figure below (which is similar to Figure 7.5). A sender begins sending packetized audio periodically at f =I. The first packet arrives at the receiver at f =8. a. What are the delays...
Consider the figure below, which shows a leaky bucket policer being fed by a stream of packets. The token buffer can hold at most two tokens, and is initially full at t =O. New tokens (uTive at a...
Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair (K+B,K-B)' and Alice has Bob's certificate. But Alice does not have a public, private key pair. Alice and Bob (and the...
Consider the example in Figure 8.29. Suppose Trudy is a woman-in-themiddle, who can insert datagrams into the stream of datagrams going from R1 and R2. As part of a replay attack. Trudy sends a...
Suppose Alice wants to communicate with Bob using symmetric key cryptography using a session key KS. In Section 8.2, we learned how public-key cryptography can be used to distribute the session key...
Consider the block cipher in Figure 8.5. Suppose that each block cipher T; simply reverses the order of the eight input bits (so that, for example, 11110000 becomes 00001111). Further suppose that...
In Section 9.3 we saw that it was preferable to transport SNMP messages in unreliable UDP datagrams. Why do you think the designers of SNMP chose UDP rather than TCP as the transport protocol of...
Make the following calculations on the raw data in order to explore how different measures color the conclusions one can make. (Doing these exercises will be much easier using a spreadsheet.) a....
The main reliability measure is MTTF. We will now look at different systems and how design decisions affect their reliability. Refer to Figure 1.25 for company statistics. a. We have a single...
For the simple implementation given above, this execution order would be nonideal for the input matrix. However, applying a loop interchange optimization would create a nonideal order for the output...
Assume a five-stage single-pipeline microarchitecture (fetch, decode, execute, memory, write back) and the code in Figure 2.41. All ops are 1 cycle except LW and SW, which are 1 + 2 cycles, and...
Explain the following terms briefly: attribute, domain, entity, relationship, entity set, relationship set, one-to-many relationship, many-to-many relationship, participation constraint, overlap...
Consider the university database from Exercise 2.3 and the ER diagram you designed. Write SQL statements to create the corresponding relations and capture as many of the constraints as possible. If...
This part of our case study will focus on the amount of instruction-level parallelism available to the run time hardware scheduler under the most favorable execution scenarios (the ideal case)....
Consider the ER diagram that you designed for the Prescriptions-R-X chain of pharmacies in Exercise 2.7. Define relations corresponding to the entity sets and relationship sets in your design using...
Consider the following information about a university database: Professors have an SSN, a name, an age, a rank, and a research specialty. Projects have a project number, a sponsor name (e.g., NSF),...
In this exercise, you are asked to write the functionality of a generic shopping basket; you will use this in several subsequent project exercises. Write a set of JSP pages that displays a shopping...
Consider a relation R with five attributes ABCDE. 1. For each of the following instances of R, state whether it violates (a) the FD BC D and (b) the MVD BC D: (a) { } (i.e., empty relation) (b)...
Consider the following relations: Student(snum: integer, sname: string, major: string, level: string, age: integer) Class(name: string, meets at: string, room: string, fid: integer) Enrolled(snum:...
We described variations of the join operation called outer joins in Section 5.6.4. One approach to implementing an outer join operation is to first evaluate the corresponding (inner) join and then...
Consider the query A,B,C,D (R A=CS). Suppose that the projection routine is based on sorting and is smart enough to eliminate all but the desired attributes during the initial pass of the sort and...
Consider the following BCNF schema for a portion of a simple corporate database (type information is not relevant to this question and is omitted): Emp (eid, ename, addr, sal, age, yrs, deptid) Dept...
Consider the following BCNF relation, which lists the ids, types (e.g., nuts or bolts), and costs of various parts, along with the number available or in stock: Parts (pid, pname, cost, num avail)...
1. Which the following statements about the base keyword is false? a.A constructor can use at most one base statement. b.A constructor cannot use both a base statement and a this statement. c.The...
1.Suppose the MovedEventHandler delegate is defined by the statement delegate void MovedEventHandler(). Which of the following correctly declares the Moved event? a.public MovedEventHandler...
(a) Write an if statement that increases pay by 3% if score is greater than 90. (b) Write an if statement that increases pay by 3% if score is greater than 90, otherwise increases pay by 1%.