...disasters, by replicating their data within or even across continents. Spanner’s main focus is managing cross-datacenter. Many applications at google have chosen to use Megastore because of its data model and support for synchronous replication despite poor throughput. Applications can specify con-straints to control which datacenters contain which data, how far data is from its users how far replicas are from each other an how many replicas are maintained can also be known. Spanner has two features that are difficult to implement i.e providing externally consistent reads and writes, and globally-consistent reads across the database at a time-stamp. If a transaction t1 commits before another transaction t2 starts, then t1’s commit timestamp is...
Words: 2222 - Pages: 9
...Community Specific Temporal Topic Discovery from Social Media Zhiting Hu Chong Wang Junjie Yao Department of Computer Science,Peking University Machine Learning Department Carnegie Mellon University huzhiting@pku.edu.cn chongw@cs.cmu.edu Department of Computer Science,University of California, Santa Barbara arXiv:1312.0860v1 [cs.SI] 3 Dec 2013 Eric Xing Hongzhi Yin jjyao@cs.ucsb.edu Bin Cui Machine Learning Department Carnegie Mellon University Department of Computer Science,Peking University Department of Computer Science,Peking University epxing@cs.cmu.edu bestzhi@pku.edu.cn bin.cui@pku.edu.cn ABSTRACT quick-updated texts, exhibiting rich temporal dynamics. Understanding these dynamics provides important insights into people’s changing online behaviors. Extensive research is devoted to uncover the temporal dynamics of online content [11, 26, 23]. However, most of these existing work only explores global temporal variation, or the overall trends of topics. This ignores an important aspect of social media—the communities. A community is a collection of users with more or/and better interactions amongst its members than the rest of the global network [10]. Communities play a crucial role in social media, and provide the basis for user participation and engagement. Members in the same community typically bear similar content preferences and often communicate on shared topics [21, 20]. Given that the content...
Words: 10413 - Pages: 42
...Question 8-2: Five equal-size datagrams belonging to the same message leave for the destination one after another. However, they travel through different paths as shown in Table 8.1. We assume that the delay for each switch (including waiting and processing) is 3, 10, 20, 7, and 20 ms respectively. Assuming that the propagation speed is 2 x 10^8 m, find the order the datagrams arrive at the destination and the delay for each. Ignore any other delays in transmission. Answer: The order of datagram arrival: 3, 5, 2, 4, 1 1: (3200) / (2 * 108 m/s) + (3 + 20 + 20) = 59.0 ms 2: (11700) / (2 * 108 m/s) + (3 + 10 + 20) = 91.5 ms 3: (12200) / (2 * 108 m/s) + (3 + 10+ 20 + 20) = 114.0 ms 4: (10200) / (2 * 108 m/s) + (3 + 7 + 20) = 81.0 ms 5: (10700) / (2 * 108 m/s) + (3 + 7 + 20 + 20) = 103.5 ms Question 8-9: Answer the following questions: a. Can a routing table in a datagram network have two entries with the same destination address? Explain. * There cannot be two entries with the same destination address in a datagram network because they are unique, meaning there is no address alike in the routing table. b. Can a switching table in a virtual-circuit network have two entries with the same input port number? With the same output port number? With the same incoming VCls? With the same outgoing VCls? With the same incoming values (port, VCI)? With the same outgoing values (port, VCI)? * In terms of a virtual-circuit network, Virtual Circuit Identifiers (VCI) are local...
Words: 367 - Pages: 2
...routing table above. Routing protocol | Destination Network | Metric | Outbound Interface | | | | | | | | | | | | | #3. Write the CLI command to verify connectivity from the ISP Router to 1. Dallas Server: ------------------------------------------------- 2. Dallas Host: ------------------------------------------------- 3. Chicago Server: ------------------------------------------------- 4. Chicago Host: ------------------------------------------------- Task 3—Deny Upper TCP ports from suspicious hosts to Dallas Server Port scan packets and other malicious activities have been detected by an Instruction Detection System (IDS) deployed in Dallas LAN. They are upper TCP port packets arriving to Dallas Server from the Attack PC. #4. Your task as a network administrator is to configure an ACL in Dallas Router to prevent malicious packets entering Dallas LAN. These packets are from the Attack PC with TCP port numbers greater than 255 can. At the same time, the ACL should allow any other traffic to enter Dallas LAN. Copy below Dallas router’s running-config from page 3, and add the commands needed to create and apply the ACL in the router. #5. Do you use a standard or extended ACL in Dallas router? Why? ------------------------------------------------- ------------------------------------------------- #6. What is the use of wildcard in ACL command? Provide an example....
Words: 329 - Pages: 2
...provided by the TCP or UDP protocols at the Transport layer, for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port numbers to determine what protocol incoming traffic should be directed to. Some characteristics of ports are listed below: • Ports allow a single host with a single IP address to run network services. Each port number identifies a distinct service. • Each host can have over 65,000 ports per IP address. • Port use is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN). ICANN specifies three categories for ports. • Well known ports range from 0 to 1023 and are assigned to common protocols and services. • Registered ports range from 1024 to 49151 and are assigned by ICANN to a specific service. • Dynamic (also called private or high) ports range from 49,152 to 65,535 and can be used by any service on an ad hoc basis. Ports are assigned when a session is established, and released when the session ends. The following table lists the well known ports that correspond to common Internet services. |Port(s) |Service | |20 TCP |File Transfer Protocol (FTP) | |21 TCP | | |22 TCP and UDP |Secure Shell (SSH) | |23 TCP ...
Words: 349 - Pages: 2
...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security...
Words: 278 - Pages: 2
...Student Name ________________________________ Date 05/09/2013_____________ SEC572 Security Testing iLab Task 1 – Verify Connectivity between Router and Hosts Complete the table below based on the dynamic routes displayed in the routing table: Routing protocol Destination Network Metric Outbound Interface R - RIP 192.168.100.0/24 1 Serial0/0 R- RIP 192.168.200.0/24 1 Serial0/1 • Select the Task 1 commands and output in the Virtual CLI using the mouse. Click on the Copy button. Use V to paste the commands into your Lab Document. ISP_Router con0 is now available Press RETURN to get started. ISP_Router> ISP_Router> ISP_Router> ISP_Router> ISP_Router>enable ISP_Router#show ip interface brief Interface IP Address OK? Method Status FastEthernet0/0 200.100.0.1 YES NVRAM up FastEthernet1/0 200.100.40.1 YES NVRAM up Serial0/0 200.100.10.1 YES NVRAM up Serial0/1 200.100.20.1 YES NVRAM up ISP_Router#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2 * - candidate default Gateway of last resort is not set Displaying routing table from result of FLAN table R 192.168.100.0/24 [120/1] via 00.100.10...
Words: 538 - Pages: 3
...1. nibble, byte, word, double word- define 2. how does the RAM know when its on and off, full and half 3. converting binary’s 4. how are the tracks and setctors separated on a hard drive 5. pg 12 adding binary 6. Read about file systems 7. Video compression and what is it for 8. 9. Internet core 10. How do you define a network (more than one computer) 11. Topologies (bus,ring,star,and mesh) 12. Networking standards 13. Defacto standards vs vendor standards vs vendor group standards 14. Tcp/ip 15. Open networking model and the osi model 16. Ip routing 17. Pg 136 authors note 18. Frame and packet 19. IP addressing 20. IP addressing 21. Physical layer, layer 1 of the OSI model 22. Lab 3.1.1 (wouldn’t be able to communicate) 23. Data link layer 24. LAN vs WAN 25. Different between ac and dc currents 26. Difference between the circitury and node 27. Full duplex vs half duplex 28. Sending data through electricity foucusing on sound waves 29. RJ 45 connectors 30. Fiber optics 31. The wireless standards 32. CSMA CSCA 33. When you have a fiber optic cable and two buildings, which would you use single mode or multi mode? Multi mode 34. Copper cable and standards. (EMI) 35. Two types of utp cable a and b, cross over and straight cable 36. Max distance for UTP cables (100M) 37. FORFIT! 38. What is trouble shooting bottom up and...
Words: 366 - Pages: 2
...A Firewall is a network security system , it could be software or hardware based , but the ideal firewall configuration will consist of both . It acts as a barrier controlling the flow of data which is either incoming or outgoing On a set of rules . Firewall also controls the access to the resources of a network through a positive control model , this means that the only traffic allowed onto the network must be defined in the firewall policy ; all other traffic is denied . Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. Most hardware firewalls will have a minimum of four network ports to connect other computers . Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer . Firewall was first established when organizations began moving from "Mainframe Computers" to "Client-Server model" . The ability to control access to the server became a priority , before firewalls showed up in the late 1980s , the only real form of network security was performed by "Access Control List (ACLs)" residing on routers . "ACLs" determined which IP addresses were granted or denied access to the network. Firewalls are used to protect...
Words: 406 - Pages: 2
...listening for TCP connections using public addresses. The local host is using well-known port numbers to identify the source ports. The local host is performing the three-way handshake with 192.168.1.101:1037. 2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server? 13 53 80 1024 1728 3. Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination 4. Which is an important characteristic of UDP? acknowledgement of data delivery minimal delays in data delivery high reliability of data delivery same order data delivery 5. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? create a Layer 1 jam signal reach a timeout and resend the data that needs to be acknowledged send a RESET bit to the host change the window size in the Layer 4 header 6. Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed? session establishment segment retransmit data transfer session disconnect 7. Refer to the exhibit. The initial TCP exchange of...
Words: 973 - Pages: 4
...Chapter 6 Answer the following review questions. 1. PC1 is using TCP and has a window size of 4000. PC1 sends four segments to PC2 with 1000 bytes of data each, with sequence numbers 2000, 3000, 4000, and 5000. PC1 does not receive an acknowledgment within its current timeout value for this connection. What should PC1 do next? a. Increase its window to 5000 or more segments b. Send the next segment, with sequence number 6000 c. Resend the segment whose sequence number was 5000 d. Resend all four previously sent segments 2. Which of the following are not features of a protocol that is considered to match OSI Layer 4? e. Error recovery f. Flow control g. Segmenting of application data h. Conversion from binary to ASCII 3. Which of the following header fields identify which TCP/IP application gets data received by the computer? i. Ethernet Type j. SNAP Protocol Type k. IP Protocol Field l. TCP Port Number m. UDP Port Number n. Application ID 4. Which of the following are not typical functions of TCP? o. Windowing p. Error recovery q. Multiplexing using port numbers r. Routing s. Encryption t. Ordered data transfer 5. Which of the following functions is performed by both TCP and UDP? u. Windowing v. Error recovery w. Multiplexing using port numbers x. Routing y. Encryption ...
Words: 797 - Pages: 4
...layer protocols that can be met by the TCP/IP network layer protocol? C 2. Which of the following answers list a need of application layer protocols that can be met by the TCP/IP transport layer protocol?(choose three answers.) A,B,E 3. Which of the following answers lists a service provided by an application layer protocol to the application? A 4. A user opens email client software on her tablet computer after connecting to the Internet. The user successfully downloads her latest email. Another student happens by and starts spouting off about how the first student has been using. Email,POP3,IP,TCP,HTTP,802.11 and other acronyms all just to check email. The first student just stares at this second student, but it does cause the first student to wonder. Which of the following answers accurately describes where some of these features are implemented on the tablet? D 5. A user of a tablet computer goes to a coffee chop and connects to the internet through a wireless LAN. The user then connects to the web server somewhere far away in the internet. Which of the following statements are true about the messages that flow from the tablet’s web browser towards the web server? (Choose two answers.)B,C 6. Which of the following answers accurately describe the size of the TCP,UDP, and IP headers, assuming that the headers include no additional optional field?(Choose three answers.)A,B,C 7. When thinking about the messages that flow inside a TCP/IP network, you can think about the header...
Words: 1059 - Pages: 5
...Timothy Knox 8/21/2015 Dr. North Unit 10 10.1.1 TCP can connect two hosts with the capability to retransmit dropped packets, maintain ordering, and check for errors. A TCP connection is established with a three-way handshake in which a connection is established and acknowledged. What are the three messages that form this handshake sequence? Why is this important for establishing the connection? Use your textbook and Internet research to compose your answer. The messages that are used to form the handshake are SYN, SYN-ACK, and ACK. They are important because it allows for both ends to initiate and communicate using different TCP sockets at once. 10.1.2 By establishing a TCP connection, you allow one host to verify expected communication to and from the connected host. This provides two important features: windowing/sequencing and error checking/recovery. Windowing and sequencing are used to determine whether messages have been seen and are delivered in the correct order to the recipient. Error checking makes sure that all the packets are delivered as expected, providing reliability. Why are reliability and sequencing important in message delivery? Give an example of when each would be necessary. Its important because it allows for the organization of multiple messages so that the right message is sent in its proper order. Sequencing is the other important part because it makes sure things are in order and also that they are received in the right time frame and...
Words: 530 - Pages: 3
...Skip to main content Chrome: developer DEVTOOLS MULTI-DEVICE PLATFORM Learn Basics Use Tools Inspecting & Tweaking Debugging JavaScript Device Mode & Mobile Emulation Remote Debugging on Android Saving Changes with Workspaces Performance & Profiling Reference Contents Requirements Setting up your Android device Discovering devices in Chrome Debugging remote browser tabs Debugging WebViews Live screencasting Port forwarding Virtual host mapping Troubleshooting Additional information Remote Debugging on Android with Chrome The way your web content behaves on mobile can be dramatically different from the desktop experience. Remote debugging with Chrome DevTools lets you debug live content on your Android device from your development machine. Debugging Chrome for Android using the Chrome Developer Tools Remote debugging on Android supports: Debugging websites in browser tabs. Debugging WebViews in native Android apps. Screencasting live to your development machine from your Android device. Accessing your development server on Android using port forwarding and virtual host mapping. Requirements To begin remote debugging, you need: Chrome 32 or later installed on your development machine. A USB cable to connect your Android device. For browser debugging: Android 4.0+ and Chrome for Android. For app debugging: Android 4.4+ and a WebView configured for debugging. Note: Remote debugging requires your version of desktop Chrome to be newer...
Words: 2425 - Pages: 10
...Analysis of Wireless Protocols Analysis of Wireless Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction...
Words: 285 - Pages: 2