This problem is about query flooding in P2P networks. Here, we explore the reverse-path routing of...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
This problem is about query flooding in P2P networks. Here, we explore the reverse-path routing of the QueryHit messages in Gnutella. Suppose that Alice issues a Query message. Furthermore, suppose that Bob receives the Query message (which may have been forwarded by several intermediate peers) and has a file that matches the query. 5.1. As we know when a peer has a matching file, it sends a QueryHit message along the reverse path of the corresponding Query message. An alternative design would be for Bob to establish a direct TCP connection with Alice and send the QueryHit message over this connection. What are the advantages and disadvantages of such an alternative design? 5.2 In the Gnutella protocol, when the peer Alice generates a Query message, it inserts a unique ID in the message's MessagelD field. When the peer Bob has a match, it generates a QueryHit message using the same MessageID as the Query message. Describe how peers can use the MessagelD field and local routing tables to accomplish reverse-path routing. 5.3. An alternative approach, which does not use message identifiers, is as follows. When a query message reaches a peer, before forwarding the message, the peer augments the query message with its IP address. Describe how peers can use this mechanism to accomplish reverse-path routing. Ps. APA referencing needed. This problem is about query flooding in P2P networks. Here, we explore the reverse-path routing of the QueryHit messages in Gnutella. Suppose that Alice issues a Query message. Furthermore, suppose that Bob receives the Query message (which may have been forwarded by several intermediate peers) and has a file that matches the query. 5.1. As we know when a peer has a matching file, it sends a QueryHit message along the reverse path of the corresponding Query message. An alternative design would be for Bob to establish a direct TCP connection with Alice and send the QueryHit message over this connection. What are the advantages and disadvantages of such an alternative design? 5.2 In the Gnutella protocol, when the peer Alice generates a Query message, it inserts a unique ID in the message's MessagelD field. When the peer Bob has a match, it generates a QueryHit message using the same MessageID as the Query message. Describe how peers can use the MessagelD field and local routing tables to accomplish reverse-path routing. 5.3. An alternative approach, which does not use message identifiers, is as follows. When a query message reaches a peer, before forwarding the message, the peer augments the query message with its IP address. Describe how peers can use this mechanism to accomplish reverse-path routing. Ps. APA referencing needed.
Expert Answer:
Answer rating: 100% (QA)
51 Advantages of establishing a direct TCP connection with Alice and sending the QueryHit message over this connection Reduced network traffic The Que... View the full answer
Related Book For
Computer Networking A Top-Down Approach
ISBN: 978-0136079675
5th edition
Authors: James F. Kurose, Keith W. Ross
Posted Date:
Students also viewed these computer network questions
-
How would you make the safety data sheets (SDSs) available to employees, and what procedures would you use to evaluate the effectiveness of the program?
-
Assume the same four independent distributions as in Problem C:10-23. Fill in the blanks in that problem assuming the only change in the facts is that the distributions are now liquidating...
-
What would motivate a "consumer" of the blog/website to visit the blog/website? What needs does the blog/website satisfy (refer to what we covered in class on the topic of motivation)? Does the blog...
-
In Problem 10.16, we projected financial statements for Walmart Stores for Years +1 through +5. The data in Chapter 12s Exhibits 12.1612.18 include the actual amounts for 2008 and the projected...
-
The following circle graph shows the percent of the land area of the continents of Earth. Use this graph for below Exercises. 1. Which continent is the smallest? 2. What percent of the land on Earth...
-
How does factor weighting incorporate personal preference in location choices?
-
True or False. The principle of the electrodynamic transducer can be used in vibration exciters.
-
A new systems development project is Pete's first experience as a project manager, and he has led his team successfully to the programming phase of the project. The project has not always gone...
-
What competencies and skills are critical for a successful mediator in high-stakes conflict resolution, and how can these be developed and assessed ?
-
A counter-current gas-absorption column is to be designed to remove CO 2 from an inert gas stream by reaction with an amine solution at 20C. At this temperature, CO 2 reacts with the amine according...
-
MSFT stock sells at $183 and the 6-month 190-strike put is selling at $14.50. The risk-free rate is 4% and the stock will pay a dividend of $2 in 3 months. We assume that all options are...
-
Which of the following may be used as a vector in a gene-cloning experiment? a. mRNA b. Plasmid c. Virus d. Either b or c
-
In an EMSA, the binding of a protein to DNA a. prevents the DNA from being digested with a restriction enzyme. b. causes the DNA to migrate more slowly through a gel. c. causes the DNA to migrate...
-
The Oviedo Company is considering the purchase of a new machine to replace an obsolete one. The machine being used for the operation has a book value and a market value of zero. However, the machine...
-
Which of the following methods use(s) a labeled nucleic acid probe, such as a labeled fragment of DNA? a. Site-directed mutagenesis c. Western blotting b. Northern blotting d. Both...
-
Describe how colchicine can be used to alter chromosome number.
-
Which organ is the main digester and absorber of food? A) Stomach B) Liver C) Colon D) Small intestine
-
If 2 5 9 - k 5 8 = 2 5 8 , what is the value of k?
-
Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host...
-
What does it mean for a wireless network to be operating in "infrastructure mode"? If the network is not ill infrastructure mode, what mode of operation is it in, and what is the different between...
-
Suppose Alice wants to communicate with Bob using symmetric key cryptography using a session key KS. In Section 8.2, we learned how public-key cryptography can be used to distribute the session key...
-
Museum directors today need both an advanced degree in art history and curatorial experience, as well as the financial acumen and managerial skills of a chief executive. In this economic environment,...
-
Consider the four generations of workers now in the workplace. Identify a worker you know from each generation. How do they fi t into their generational stereotype? How do they differ? Are there...
-
A survey by the Center for State and Local Government Excellence conducted among members of the International Public Management Association for Human Resources and the National Association of State...
Study smarter with the SolutionInn App