1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
3 years ago
11

When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re

quest for a cache entry when simulating the Redmond traffic, whereas only 1.8 were required for the Cambridge traffic. Explain this and show that it supports the theoretical performance claimed for Pastry.
Computers and Technology
1 answer:
bogdanovich [222]3 years ago
4 0

Answer:An external caching scheme stores copies of web objects

or meta-data so that clients can avoid requests to a web

server. The best known example of an external cache is a

web proxy, but with the rapid spread of web technologies,

many other caching scenarios can be identified. Caching

is central to performance in the web, both because it re-

duces load on servers, and because cached data is normally

cheaper to access from another machine that is closer in the

network. Although cooperation between cache managers is

not a common feature of existing web architectures, coop-

erative caching supported by peer-to-peer architectures has

great potential [9, 13]. When sets of client systems have sim-

ilar interests and fast low-latency interconnections, shared

caching could bring significant benefits.

The peer-to-peer mechanisms referred to

Explanation:

You might be interested in
Noi needs to send some documents to a client in another company. Which device can she use to make digital copies of the paper fi
soldier1979 [14.2K]
D scanner She can scan the files and email a digital copy.
4 0
2 years ago
Read 2 more answers
Which element is located on the top left of the Word screen?
victus00 [196]
The <span>element located on the top left of the Word screen is the Quick Access Toolbar.  </span>On the quick access toolbar, you can find some of the common functions that you will need to use on a regular basis, it contains commands that are used most often, for example Redo, Undo and Save etc.
7 0
2 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
To inspire unit 1 App
Tasya [4]
Is there more to this or ?
5 0
2 years ago
Which of the following best describes the safety of blogging
Pavlova-9 [17]
We need the options
3 0
3 years ago
Other questions:
  • Analyzing Uses for PDFs
    6·1 answer
  • my airpods just do not seem to connect if i try to pair them, reset them, they have this continuous green light, please help me
    12·1 answer
  • You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap
    15·2 answers
  • Why when I move stuff in Roblox Studio like an object or a Character. It tilts the opposite direction I'm moving it to with the
    6·2 answers
  • Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
    15·2 answers
  • We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination
    12·1 answer
  • They are correct? thank you!
    6·2 answers
  • 9. These particular machines can be decentralized.
    9·1 answer
  • Why does rating an incorrect answer as 1 star raise its score on brainly?
    8·2 answers
  • Quick I need help ASAP
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!