1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sattari [20]
3 years ago
5

In BitTorrent, suppose Alice provides chunks to Bob throughout a 30-second interval. Will Bob necessarily return the favor and p

rovide chunks to Alice in this same interval? Why or why not? What is an overlay network? Does it include routers? What are the edges in the overlay network?
Computers and Technology
1 answer:
MakcuM [25]3 years ago
5 0

Answer:

It will not necessary that bob will provide chunks to Alice.

Explanation:

Alice has four neighbors of Bob so he will send message to her, but this might not occur if Alice provides chunks to Bob.

Overlay is the network that build at the top of other network.It is a telecommunication network that supported by its own infrastructure.

It encapsulates one packet inside an other packet.

It is a method of creating layers of network that can be used to run multiple virtualized layers on the top pf other network.

It provides new security benefits.

Does Overlay include Routers

Overlay is a file sharing system in which nodes participating and create logical links between them.So overlay network does not include routers.

Edge in overlay

 It is a logical network in which nodes are connected using virtual or logical links.

You might be interested in
S.B. manages the website for the student union at Bridger College in Bozeman, Montana. The student union provides daily activiti
Varvara68 [4.7K]

Answer:

hi

Explanation:

i did not known answers

3 0
3 years ago
When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the interna
EastWind [94]

Answer:

decode( )

Explanation:

We can use the method decode( ) to decode the string using the codec registered for encoding.

There are two parameters

encoding: We can encode with this parameter.

errors: If used to manage the errors.

For example:

String = "this is string example....wow!!!";

String = Str.encode('base64','strict');

If we print these variables we have:

String = b'dGhpcyBpcyBzdHJpbmcgZXhhbXBsZS4uLi53b3chISE='

String = this is string example....wow!!!

7 0
3 years ago
Please help. will give u brainliest!! khan academy computers and the internet!!
Oxana [17]

Answer:

a or c

Explanation:

think of which answer seems illogical.

5 0
3 years ago
What is the definition of bug?​
salantis [7]
In what way is it used?
3 0
3 years ago
You need to prevent the use of tftp through your firewall. which port would you block?
xz_007 [3.2K]
Hello <span>Huber5598 </span>


Question: <span>You need to prevent the use of tftp through your firewall. which port would you block?
</span><span>
Answer: You should block UDP port 69 to block TFTP


I Hope This Helps You :-)
-Chris</span>
4 0
3 years ago
Other questions:
  • Press the _______ key to move to the next cell in a row.
    12·2 answers
  • How does LinkedIn differ from other popular social media platforms? What are the similarities?
    6·1 answer
  • CAD workstations
    11·1 answer
  • 1. Insert a Header that has the following in excel​
    14·1 answer
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    8·1 answer
  • Lily obtained data from five trails 50 kcal 72 kcal 12 kcal and 50 kcal which best decribes her data
    11·1 answer
  • What stipulates that the source code of any software published under its license must be freely available.
    14·1 answer
  • What was the first computer
    5·1 answer
  • What is bigger that terbites
    10·2 answers
  • What are the different elements of a window?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!