EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 2, Problem P26P

a)

Program Plan Intro

Given Information:

Bob joins a BitTorrent torrent. Bob does not want to upload any data to other peers which is called free riding.

Bob claims that he can receive a complete copy of the file that is shared by the swarm.

b)

Program Plan Intro

Given Information:

Bob joins a BitTorrent torrent. Bob does not want to upload any data to other peers which is called free riding.

Bob claims that he can further make his “free-riding” more efficient by using a collection of multiple computers with distinct IP addresses in the computer lab in his department.

Blurred answer
Students have asked these similar questions
Https is a protocol used to secure websites from being tampered with by other parties without proper authorization. it bridges the gap between sender and receiver.Using protocols like secure socket layer/TLS, HTTPS encrypts data sent over the internet, making it unreadable to anybody who shouldn't have it.This prevents a "man in the middle" assault on the system.Such assaults intercept messages before they reach their intended recipient.It then transmits the revised information to the user.It guarantees the server's authenticity, too.
In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers redistribute the blocks to each other. Without any protection, an attacker can easily wreak havoc in a torrent by masquerading as a benevolent peer and sending bogus blocks to a small subset of peers in the torrent. These unsuspecting peers then redistribute the bogus blocks to other peers, which in turn redistribute the bogus blocks to even more peers. Thus, it is critical for BitTorrent to have a mechanism that allows a peer to verify the integrity of a block, so that it doesn’t redistribute bogus blocks. Assume that when a peer joins a torrent, it initially gets a .torrent file from a fully trusted source. Describe a simple scheme that allows peers to verify the integrity of blocks.
The token bucket algorithm is a popular method for traffic shaping (recapthe algorithm in textbook Ch. 5.3.2). A computer uses a token bucket with a capacity of 400megabytes (MB), and a rate of 10 MB per second. The machine starts generating 20 MB persecond continuously when the bucket contains 200 MB. How long will it take to send 1000 MB?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education