Consider the rdt 3.0 protocol. Draw a diagram showing that if the network connection between the sender and receiver can reorder messages (that is, that two messages propagating in the medium between...
Consider a scenario in which Host A wants to simultaneously send packets III Hosts Band C. A is connected to Band C via a broadcast channel-a packet sent by A is carried by the channel to both Band...
Host A and B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sending to Host B an enormous file over this connection. Host A can send its...
Consider a modification to TCP's congestion control algorithm. Instead of additive increase, we can use multiplicative increase. A TCP sender increases its window size by a small positive constant ...
In this problem. we consider the delay introduced by the TCP slow-start phase. Consider a client and a Web server directly connected by one link of rate R. Suppose the client wants to retrieve an...
Consider our motivation for correcting protocol rdt2.1. Show that the receiver, shown in Figure 3.57, when operating with the sender shown in Figure 3.11, can lead the sender and receiver to enter...
In protocol rdt3. 0, the ACK packets flowing from the receiver 10 the sender do not have sequence numbers (although they do have an ACK field that contains the sequence number of the packet they are...
Give a trace of the operation of protocol rdt3. 0 when data packets and acknowledgment packets are garbled. Your trace should be similar to that used in Figure 3.16.
Consider a router that interconnects three subnets: Subnet I, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1 .17/24. Also...
In Problem P9 you are asked to provide a forwarding table (using longest prefix matching). Rewrite this forwarding table using the a.b.c.d/x notation instead of the binary string notation.
Consider the network shown below, and assume that each node initially knows the costs to each of its neighbors. Consider the distance-vector algorithm and show the distance table entries at node z. 1...
Consider the count-to-infinity problem in the distance vector routing. Will the count-to-infinity problem occur if we decrease the cost of a link? Why? How about if we connect two nodes which do not...
In Figure 4.42, consider the path information that reaches stub networks W, X, and Y. Based on the information available at Wand X, what are their respective views of the network topology? Justify...
Design (give a pseudocode description of) an application-level protocol that maintains the host addresses of all hosts participating in a multicast group. Specifically identify the network service...
Describe polling and token-passing protocols using the analogy of cocktail party interactions.
Suppose the information content of a packet is the bit pattern 1110 10 II 100 I 1101 and an even parity scheme is being used, What would the value of the field containing the parity bits be for the...
Suppose four active nodes-nodes A, B, C and D-are competing for access to a channel using slotted ALOHA. Assume each node has an infinite number of packets to send. Each node attempts to transmit in...
Consider a VC network with a 2-bit field for the VC number. Suppose that the network wants to set up a virtual circuit over four links: link A, link B, link C, and link D. Suppose that each of these...
Suppose nodes A and B are on the same 10 Mbps Ethernet bus, and the propagation delay between the two nodes is 245 bit times. Suppose A and B send frames at the same time, the frames collide, and...
In Section 5.3, we provided an outline of the derivation of the efficiency of slotted ALOHA, in this problem we'll complete the derivation, a, Recall that when there are N active nodes, the...
Repeat P23 but assume that r =2. Assume again that the bucket is initially full.
Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice's certificate. In what step of the SSL handshake algorithm will Bob discover...
Consider the figure below (which is similar to Figure 7.5). A sender begins sending packetized audio periodically at f =I. The first packet arrives at the receiver at f =8. a. What are the delays...
Consider the figure below, which shows a leaky bucket policer being fed by a stream of packets. The token buffer can hold at most two tokens, and is initially full at t =O. New tokens (uTive at a...
Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair (K+B,K-B)' and Alice has Bob's certificate. But Alice does not have a public, private key pair. Alice and Bob (and the...
Consider the example in Figure 8.29. Suppose Trudy is a woman-in-themiddle, who can insert datagrams into the stream of datagrams going from R1 and R2. As part of a replay attack. Trudy sends a...
Suppose Alice wants to communicate with Bob using symmetric key cryptography using a session key KS. In Section 8.2, we learned how public-key cryptography can be used to distribute the session key...
Consider the block cipher in Figure 8.5. Suppose that each block cipher T; simply reverses the order of the eight input bits (so that, for example, 11110000 becomes 00001111). Further suppose that...
In Section 9.3 we saw that it was preferable to transport SNMP messages in unreliable UDP datagrams. Why do you think the designers of SNMP chose UDP rather than TCP as the transport protocol of...
Make the following calculations on the raw data in order to explore how different measures color the conclusions one can make. (Doing these exercises will be much easier using a spreadsheet.) a....
The main reliability measure is MTTF. We will now look at different systems and how design decisions affect their reliability. Refer to Figure 1.25 for company statistics. a. We have a single...
For the simple implementation given above, this execution order would be nonideal for the input matrix. However, applying a loop interchange optimization would create a nonideal order for the output...
Assume a five-stage single-pipeline microarchitecture (fetch, decode, execute, memory, write back) and the code in Figure 2.41. All ops are 1 cycle except LW and SW, which are 1 + 2 cycles, and...
Explain the following terms briefly: attribute, domain, entity, relationship, entity set, relationship set, one-to-many relationship, many-to-many relationship, participation constraint, overlap...
Consider the university database from Exercise 2.3 and the ER diagram you designed. Write SQL statements to create the corresponding relations and capture as many of the constraints as possible. If...
Consider the ER diagram that you designed for the Prescriptions-R-X chain of pharmacies in Exercise 2.7. Define relations corresponding to the entity sets and relationship sets in your design using...
This part of our case study will focus on the amount of instruction-level parallelism available to the run time hardware scheduler under the most favorable execution scenarios (the ideal case)....
In this exercise, you are asked to write the functionality of a generic shopping basket; you will use this in several subsequent project exercises. Write a set of JSP pages that displays a shopping...
Consider a relation R with five attributes ABCDE. 1. For each of the following instances of R, state whether it violates (a) the FD BC D and (b) the MVD BC D: (a) { } (i.e., empty relation) (b)...
Consider the following information about a university database: Professors have an SSN, a name, an age, a rank, and a research specialty. Projects have a project number, a sponsor name (e.g., NSF),...
Consider the following relations: Student(snum: integer, sname: string, major: string, level: string, age: integer) Class(name: string, meets at: string, room: string, fid: integer) Enrolled(snum:...
We described variations of the join operation called outer joins in Section 5.6.4. One approach to implementing an outer join operation is to first evaluate the corresponding (inner) join and then...
Consider the query A,B,C,D (R A=CS). Suppose that the projection routine is based on sorting and is smart enough to eliminate all but the desired attributes during the initial pass of the sort and...
Consider the following BCNF schema for a portion of a simple corporate database (type information is not relevant to this question and is omitted): Emp (eid, ename, addr, sal, age, yrs, deptid) Dept...
Consider the following BCNF relation, which lists the ids, types (e.g., nuts or bolts), and costs of various parts, along with the number available or in stock: Parts (pid, pname, cost, num avail)...
1. Which the following statements about the base keyword is false? a.A constructor can use at most one base statement. b.A constructor cannot use both a base statement and a this statement. c.The...
(a) Write an if statement that increases pay by 3% if score is greater than 90. (b) Write an if statement that increases pay by 3% if score is greater than 90, otherwise increases pay by 1%.
List four activities of a typical operating system.
Write an application that displays a box, an oval, an arrow and a diamond using asterisks (*), as follows:
1.Suppose the MovedEventHandler delegate is defined by the statement delegate void MovedEventHandler(). Which of the following correctly declares the Moved event? a.public MovedEventHandler...
A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield sign. (Use stars to represent the sides of the triangle.)
A network router has a failure rate of 0.02 percent per 1,000 hours. What is the MTBF of that component?
Which type of application benefits the most by bypassing write cache? Justify your answer.
1. Which object does the variable mySet inherit from? Int[] mySet = new int[5]; a.System.Collection b.System.Collection.List c.System.Array d.None, this is a value type. 2. Which type should you use...
Write a Java code segment that creates a blank image and converts its pixels to green. Your code should use an enhanced for loop.
One of the bit patterns 01011 and 11011 represents a value stored in excess 16 notation and the other represents the same value stored in two's complement notation. a. What can be determined about...
Research RAID 6 and its second parity computation.
A storage array dials a support center automatically whenever an error is detected. The vendor's representative at the support center can log on to the service processor of the storage array through...
A software company sells three packages, Package A, Package B, and Package C, which retail for $99, $199, and $299, respectively. Quantity discounts are given according to the following table:...
A retail store has a preferred customer plan where customers may earn discounts on all their purchases. The amount of a customer's discount is determined by the amount of the customer's cumulative...
Design a class to represent a credit card. Think about the attributes of a credit card; that is, what data is on the card? What behaviors might be reasonable for a credit card? Use the answers to...
Consider the following relation: CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt) Assume that a car may be sold by multiple salespeople, and hence {Car#, Salesperson#} is the...
If you have a PC, identify some situations in which you can take advantage of its multitasking capabilities.
Suppose three items R, S, and T are placed in a queue in that order. Then one item is removed from the queue before a fourth item, X, is placed in the queue. Then one item is removed from the queue,...
Write a method that parses a binary number as a string into a decimal integer. The method header is as follows: public static int binary to Decimal(String binaryString) For example, binary string...
Create an application that stores data about your DVD collection in a file. The application should have a structure to hold the following fields: Video Name, Year Produced, Running Time, and Rating....
Design a database for your model. Your design should include a specification of tables and attributes as well as primary, candidate, and foreign keys. Also specify how you will enforce minimum...
Write an SQL statement to join EMPLOYEE, ASSIGNMENT, and PROJECT using the JOIN ON syntax. Run this statement.
What are the four elements that exist when an effective SCM system is implemented? Discuss each briefly.
A movie theater only keeps a percentage of the revenue earned from ticket sales. The remainder goes to the distributor. Write a program that calculates a theater's gross and net box office profit for...
What three instances call for expediting a systems project?
List all paths and calculate and determine the critical path for the Interviewing Users PERT diagram. List all paths and calculate and determine the critical path for the Interviewing Users PERT...
List 7 of the 14 app development steps that deal with design.
Chip, Dot, and Mike participated in several brainstorming sessions resulting in the outlining of several reports. Design (or modify using Access) the HARDWARE MASTER REPORT. This report is large, and...
Design the INSTALLED COMPUTER REPORT, showing personal computers that have been installed in each room. Use the CAMPUS DESCRIPTION and group print by CAMPUS DESCRIPTION and ROOM LOCATION. The...
Cher Ware has remarked several times that a good form would make the task of adding new software much easier. It would also provide permanent paper documentation for software additions. Design a form...
Explain why ERP served with a cloud platform might be more affordable to small and medium businesses than traditional ERP installations.
Lexsteel, a manufacturer of steel furniture, has facilities throughout the United States. Problems with the accounts payable system have prompted Lexsteel's external auditor to recommend a detailed...
At present, no Berwick employees have auditing experience. To staff its new internal audit function, Berwick could train some of its computer specialists in auditing, hire experienced auditors and...
The local community feels that secondary school education is a necessity in our society and that lack of education leads to a number of social problems. As a result, the local school board has...
One control that is applicable for almost any system is "enter data close to the originating source." A customer entering a purchase into a sales system (such as at Amazon.com) is an excellent...
a. What is an accounts receivable aging report? b. Why is an accounts receivable aging report needed for an audit? c. What is an accounts receivable aging report used for in normal company...
Prepare a context diagram and a Level 0 DFD for each of the following situations. a. Prepare and file a tax return with the tax owed to the Internal Revenue Service. b. A customer pays an invoice...
Wonder Corporation has an opportunity to buy stock in XL, Inc. The directors decide that, instead of Wonder buying the stock, the directors will buy it. Yvon, a Wonder shareholder, learns of the...
Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats? a. A purchasing agent orders materials from a supplier that he partially owns....
How do the systems described in this case provide business intelligence?
Analyze Sears, using the competitive forces and value chain models.
Don's Lumber Company on the Hudson River features a large selection of materials for flooring, decks, moldings, windows, siding, and roofing. The prices of lumber and other building materials are...
What is a database and how does a relational database organize data? 1. Define a database. 2. Define and explain the significance of entities, attributes, and key fields. 3. Define a relational...
What business benefits did the companies and services described in this case achieve by analyzing and using big data?
Identify two decisions at the organizations described in this case that were improved by using big data and two decisions that big data did not improve.
List and describe the limitations to using big data.
Analyze Walmart and Amazon.com, using the competitive forces and value chain models.
What role does information technology play in each of these businesses? How is it helping them refine their business strategies?
Describe two advantages of high-level language programming over machine-language programming?
A grayscale image is one in which each pixel can be white, or black, or various shades of gray in between. Assuming that there are 256 discernable shades of gray, how many bits would a bitmap require...
Estimate the average number of bytes per frame for an MPEG file you own. That is, divide the size of the file by the approximate number of frames (you may assume 24 frames per second). Is this...
Augment your cipher.html page so that it can both encode and decode messages. You will need to define a new function named Decode, which decodes the message in the text area using the entered cipher...
Define a function named Minimum that is similar to the Average function from Figure 17.11, but that takes an array of numbers as input and returns the smallest value from that array. For example, the...
For each of the following statements, draw the memory cell associated with the variable after the assignment has been made: