1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
5

In BitTorrent, suppose Alice provides chunks to Bob throughout a 30-second interval. Will Bob necessarily return the favor and p

rovide chunks to Alice in this same interval? Why or why not? What is an overlay network? Does it include routers? What are the edges in the overlay network?
Computers and Technology
1 answer:
MakcuM [25]3 years ago
5 0

Answer:

It will not necessary that bob will provide chunks to Alice.

Explanation:

Alice has four neighbors of Bob so he will send message to her, but this might not occur if Alice provides chunks to Bob.

Overlay is the network that build at the top of other network.It is a telecommunication network that supported by its own infrastructure.

It encapsulates one packet inside an other packet.

It is a method of creating layers of network that can be used to run multiple virtualized layers on the top pf other network.

It provides new security benefits.

Does Overlay include Routers

Overlay is a file sharing system in which nodes participating and create logical links between them.So overlay network does not include routers.

Edge in overlay

 It is a logical network in which nodes are connected using virtual or logical links.

You might be interested in
The tag that describes the content of the web page is ________________
makkiz [27]

Answer:

<body>

Explanation:

the content of the web page must be body.

4 0
3 years ago
Some IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption glo
marta [7]

Answer:

A

Explanation:

Using hashes is preferred because encrypted IOS passwords can be easily decrypted.

8 0
3 years ago
Convert to binary140
marshall27 [118]

00110001 00110100 00110000

5 0
3 years ago
Point mode allows you to select cells for use in a formula by using your finger or the pointer
Serga [27]
That statement is true

in excel, you could enter point mode by pressing any keyboard navigation such as page down, page up, or the arrow keys or by clicking any cells in the worksheet

This mode will select a cell or range as formula operand


7 0
3 years ago
When she manages a software development project, Candace uses a program called __________, because it supports a number of progr
alexandr402 [8]

Answer:

PLS programming language supporting.

Explanation:

7 0
3 years ago
Other questions:
  • How to track flash socket server connections wireshark?
    10·1 answer
  • Which computer network component allows data transfers from one computer to another through a telephone line?
    11·2 answers
  • Tiffany is an instructor at a college that is run on student tuition and not state taxes. Which statement best describes her emp
    6·2 answers
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
    9·1 answer
  • A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must gi
    7·1 answer
  • In his digital portfolio, Ben wants to locate each work he created. Where can he list details about the work in his digital port
    7·2 answers
  • Irene wants to connect your smart phone wirelessly to her laptop in order to transfer images. which two images could she reasona
    15·1 answer
  • Which of the following statements is FALSE?
    5·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!