You are on page 1of 31

differ? c. How do their competitive strategies differ? d.

How is the “feel” of the content of


their Websites different? e. H

Will the increasing use of the Internet by firms with global business operations change their
move toward a transnational business strategy? Explain.

a. State the text’s definition of job security. b. Evaluate the text’s definition of job
security. Is it effective? If you think not, offer a better definition of job security. c. As a team, do
you agree that improving your skills on the four dimensions in Collaboration Exercises 1 through
4 will increase your jo

What has been the impact of information technologies on the work relationships, activities, and
resources of managers?

See Full Question And Answer at solutionrank.com

The following pairs of Web storefronts have market segments that overlap in some way. Briefly
visit each site of each pair:

Whether to allow employees to use their own smart phones (or other devices yet to be invented)
on corporate networks is quickly becoming a contested issue. What do companies stand to gain,
or lose, in either case? What about employees? Break into small groups with your classmates to
discuss these questions.

Unlike Apple and Google, Microsoft controls Windows Server, a server operating system. Does
that provide an advantage to Microsoft in this race? There are rumors, in fact, that Apple runs
Windows Server in its iCloud data center. If true, does it matter?

Microsoft offers free licenses of certain software products to students at colleges and universities
that participate in its DreamSpark program. If your college or university participates in this
program, you have the opportunity to obtain hundreds of dollars of software for free. Here is a
partial list of the software

Abstract reasoning a. Define abstract reasoning, and explain why it is an important skill for
business professionals. b. Explain how a list of items in inventory and their quantity on hand is
an abstraction of a physical inventory. c. Give three other examples of abstractions commonly
used in business. d. Explain h

See Full Question And Answer at solutionrank.com

Go online to research the topic of executive succession planning and the different approaches in
use by companies today. Are there any differences for those in information technology, as
opposed to other functional areas, because of the dynamics of technology change and evolution?
Which competencies are being targeted
Suppose that your roommate, a political science major, asks you to help her purchase a new
laptop computer. She wants to use the computer for email, Internet access, and note-taking in
class. She wants to spend less than $1,000. a. What CPU, memory, and disk specifications do
you recommend? b. What software does she

Consider costs of a system in light of the five components: costs to buy and maintain the
hardware; costs to develop or acquire licenses to the software programs and costs to maintain
them; costs to design databases and fill them with data; costs of developing procedures and
keeping them current; and finally, human cos

How are Internet technologies affecting the structure and work roles of modern organizations?
For example, will middle management wither away? Will companies consist primarily of self-
directed project teams of knowledge workers? Explain your answers.

1. What is the underlying issue behind endpoint security, and why is it becoming even more
difficult for companies to address it? Define the problem in your own words using examples
from the case. 2. What are the different approaches taken by the organizations in the case to
address this issue? What are the advantages

See Full Question And Answer at solutionrank.com

Suppose you are discussing 3D printing with Kelly at AllRoad and assume you do not have a
process abstraction like that in Figure 2-3. Describe how you would explain your concerns about
3D printing at AllRoad. Now, assume you do have the abstraction in Figure 2-3. Again, describe
how you would explain your concerns. Ho

List the sources of costs for each of the two processes you chose in your answer to step 2.

Refer to the Real World Case on BP’s IT transformation in the chapter. Dana Deasy
discusses the long-term benefits of “embedded IT” while noting the need to centralize the
department in the short term. How does one organization make the transition from one approach
to the other? What does it take to be successful

Assuming that costs for other colleges are the same as for the College of Business (an unrealistic
assumption; law and medicine probably have higher costs), what is the total cost forthe two
processes you selected for your university, in total?

Describe the revenue model of each site.

See Full Question And Answer at solutionrank.com

Should an IT department hire a more expensive vendor because the vendor shares its own
company’s ethics standards, or should it go with a lower-cost provider that doesn’t? This
is an important question posed in the case above. What do you think? Break into small groups
with your classmates to discuss your positions
According to the latest data, how has the market share of these three companies changed? Has
Apple made continued inroads on Android phones? Has Surface made inroads on the iPad?
What’s happened to the Kindle? And what about Microsoft’s measly 2 percent of the
phone market? Has Surface helped? Or has Microsoft fina

More than one billion people take their electrical and telecommunications systems for granted.
However, for billions more, the service-on-demand mentality remains a distant dream and
Internet access only a rumor. Recognizing the need to promote global information and
communications technologies (GICT), the World Bank h

Suppose you work at AllRoad and Kelly asks you to list five criteria she should use when
considering whether AllRoad should develop a thin- or thick-client application for mobile
devices. Justify your criteria.

Microsoft enjoys incredible success in the PC market, but it has, at least so far, never been able
to succeed with a phone, and, as of May 2013, Microsoft Surface does not seem very successful.
Christopher Mims thinks it's time for Microsoft to give up on consumers and focus on
businesses, especially business back-offi

See Full Question And Answer at solutionrank.com

Until June 2012, PixelSense was called Surface. At that time, Microsoft repurposed the name to
use on its tablet devices. Surface was changed to PixelSense. What conclusions do you draw
from these naming decisions?

In October 2011, Microsoft purchased Skype. Does Skype contribute to Surface? Can you find
announcements that indicate there is some convergence there?

Both organizations featured in the case have been quite successful with their global rollouts.
Search the Internet for examples of less-than-thriving global or international system
implementations. How do they compare to the ones in the case? What differences in the
approaches taken by the successful and unsuccessful c

People sometimes stretch the truth, or even lie, on matching sites. Describe one innovative way
that one of the two companies your team chose could use information systems to reduce the
impact of this tendency. As you prepare your team’s answer, keep the availability of nearly
free data communications and data storag

List business processes involved in starting a new term. Examples are processes to develop the
roster of classes, to staff classes, and to enroll students. Name as many more of the processes
required as you can. Examine the list of processes presented in the case study above and
addprocesses that you think may have bee

See Full Question And Answer at solutionrank.com


1. In your own words, define dogfooding. Do you think dogfooding is likely to predict product
success? Why or why not? When would dogfooding not predict product success? 2. Summarize
the ways that this text’s development team used information systems technology to improve
its process efficiency. 3. The case doesnâ€

1. The case mentions the dependence of BP’s IT organization on external contractors. Why
would this be an issue? When is it a good idea for IT departments to hire contractors, and when
is it not? Discuss some scenarios. 2. The culture of the IT organization is mentioned as an
important issue. How do you think it chan

1. Review the principles of competitive advantage in Figure 3-7. Which types of competitive
advantage has BOSU used to defeat copycat products? 2. What role did information systems play
in your answer to question 3-4? 3. What additional information systems could Fitness Quest
develop to create barriers to entry to t

YourFire Inc. is a small business owned by Curt and Julie Robards. Based in Brisbane, Australia,
YourFire manufactures and sells a lightweight camping stove called the YourFire. Curt, who
previously worked as an aerospace engineer, invented and patented a burning nozzle that enables
the stove to stay lit in very high w

Use Google or Bing (or another Internet search engine) to search for the phrase “quarter
versus semester.” Read several of the opinions,then adjust and augment the tableof pros and
cons.

See Full Question And Answer at solutionrank.com

1. What is the business value of these global system developments for the companies mentioned
in the case? How did they achieve these benefits? What were the major obstacles they had to
overcome? 2. What are the advantages and disadvantages of a full blown versus a phased
approach for system implementations in general

1. Which of Porter’s four competitive strategies (from Chapter 3) does Apple engage in?
Explain. 2. What do you think are the three most important factors in Apple’s past success?
Justify your answer. 3. Steve Jobs passed away in October 2011.Until his death, he had been the
heart and soul of Apple’s innovation

a. Define collaboration, and explain why it is an important skill for business professionals. b.
Explain how you are using collaboration to answer these questions. Describe what is working
with regards to your group’s process and what is not working. c. Is the work product of your
team better than what any one of y

Go online and search for other examples of large multinational organizations facing similar
challenges. Summarize your findings and compare them to the ones chronicled in the case. Can
you find any new ones not mentioned here?
Evaluate each of the three sequences that you selected in question 5.Identify which sequence you
think is best.

See Full Question And Answer at solutionrank.com

Suppose you actually did this at your university. Explain how you could use this experience to
demonstrate yourcapabilities in a job interview.

How might cultural, political, or geo-economics challenges affect a global company’s use of
the Internet? Give several examples.

Go back and reread the last two paragraphs in the case. What do you think Deasy means when he
discusses the nonlinear and iterative nature of the process? What does he mean by
“temptation”? Break into small groups with your classmates to discuss these questions.

1. With hypermedia, documents include embedded references to audio, text, images, video, and
other documents. True or False? 2. Educational institutions (such as California State University)
are identified with COM as their top-level domain. True or False? 3. Web 1.0 refers to the trend
toward Web applications that a

What are three examples of popular messaging systems?

See Full Question And Answer at solutionrank.com

Compared to conventional bar codes, what are three features that QR codes offer?

What are three major components of a virtual reality system?

Consider the two different bike rental companies in Figure 3-6. Think about the bikes that they
rent. Clearly, the student bikes will be just about anything that can be ridden out of the shop. The
bikes for the business executives, on the other hand, must be new, shiny, clean, and in tip-top
shape. a. Compare and cont

1. Regulatory compliance is one of the cloud computing risks. True or False? 2. Researchers are
developing nano capsules for a "clot-busting" drug. True or False? 3. Infrastructure as a service
(IaaS), is also called software as a service (SaaS). True or False? 4. One of the following is used
to create a personal ar

What is self-sourcing? What are three disadvantages of self-sourcing?

See Full Question And Answer at solutionrank.com

Twitter has become a very popular personal as well as business social networking site. After
reading the information presented in this chapter and other sources, write a one-page paper that
summarizes five ways that a business can use Twitter in order to increase its revenue. What does
"trending" mean on Twitter? What
After reading the information presented in this chapter and other sources, write a two-page paper
that describes five business applications of convergence. Which industries are expected to gain
the most from the convergence trend?

What is inbound logistics? How is it related to Michael Porter's value chain?

What are five categories of NLP systems?

What are two examples of companies or organizations that are using AR? For which purpose AR
is being used?

See Full Question And Answer at solutionrank.com

What are two capabilities of Google's Home as an intelligent assistant?

1. How has Walmart improved its data communication systems for suppliers? 2. What are some
typical data communication applications in Walmart? 3. What are some of the applications of
wireless technology at Walmart? 4. What are some of the features and capabilities of VMS?

What are four advantages of integrating AI technologies into decision support systems?

1. Green logistics advocates a type of SCM that minimizes the environmental impacts including
climate change, air pollution, water pollution, soil degradation, solid waste, noise, vibration, and
accidents. True or False? 2. 3D printing will significantly increase lead times in manufacturing.
True or False? 3. Marketi

What is an e-marketplace?

See Full Question And Answer at solutionrank.com

What are three business applications of social networking sites?

1. Airline reservation systems are considered the first large-scale interactive global system. True
or False? 2. A global database and information-sharing technologies are two major components
of a GIS. True or False? 3. In a multinational structure, production, sales, and marketing are
decentralized and financial ma

What are two features of the robot named Cozmo?

What is collaborative filtering (CF)?

What are two reasons for the failure of an EIS?

See Full Question And Answer at solutionrank.com

A startup Internet company has generated the following cash balance for the first six years of its
IS projects: -$250,000, -$180,000, $225,000, $340,000, $410,000, and $425,000. Using the NPV
function in Excel, calculate the net present value of this project at an 8.5 percent interest rate.
What is the IRR of this proj

1. What are some typical applications of crowdsourcing? 2. What are some advantages of
crowdsourcing? 3. How could crowdsourcing bring down the systems design cost?

As of June 2016, how many people were using the Internet worldwide?

1. When was The Garden launched? 2. What are some key features of The Garden? 3. Why has
The Garden been so successful? 4. What is the purpose of The Vine?

1. What are some examples of security risks associated with a mobile device? 2. How can these
devices automatically track a user's location? 3. What are a couple of recommendations for
protecting your mobile device against these threats?

See Full Question And Answer at solutionrank.com

What are the differences between a managerial and a technical designer of a DSS?

1. How does the Internet put small businesses on the same footing as large organizations? 2.
What are two ways social networking sites such as Twitter can help a small business? 3. How
can a site such as Yelp help small businesses?

What are three major components of a social media information system?

What is the impact of mobile computing on globalization?

How and why GISs are used in real estate industry?

See Full Question And Answer at solutionrank.com

What are two challenges in using mobile payment systems that should be overcome?

What is a network topology? What are the five popular types?

What are three examples of generic top-level domains?

What are five dimensions of feasibility study?

What are three examples of best practices in B2B e-commerce environment?

See Full Question And Answer at solutionrank.com

Define artificial intelligence (AI).

1. What are some of the challenges that MNCs face as far as intellectual properties are
concerned? 2. What are some of the environmental challenges MNCs face? 3. How information
technology can assist with counterfeit items? 4. How information technology can assist with
logistics?

1. RAD is also known as low-code or no-code systems development approach. True or False? 2.
A request for proposal (RFP) is a written document with detailed specifications that is used to
request bids for equipment, supplies, or services from vendors. True or False? 3. The first phase
of the SDLC approach is implemen

What is an omni channel? How does it combat showrooming?

What are four recommendations for designing a successful MSS?

See Full Question And Answer at solutionrank.com

1. What is the goal of Macy's omnichannel imitative? 2. With the omnichannel initiative, which
three operations or technologies are integrated? 3. What is the role of RFID in the success of this
initiative? 4. For which purpose is Macy's using RFID tags within its shoe departments?

1. What is the function of Apple's iBeacon? 2. What are the differences between iBeacon and
GPS? 3. How might a retail business benefit from iBeacon? 4. What are some of the concerns
that customers may have about this technology?

1. Bandwidth is the amount of data that can be transferred from one point to another in a certain
time period, usually one second. True or False? 2. Fiber optics is an example of conducted
media. True or False? 3. A network interface card (NIC), is a software component that enables
computers to communicate over a net

What are four types of conversion methods?

1. What was the main reason for using an ERP system at JHI? 2. How did the ERP system that
JHI adopted help address technical challenges? 3. What did the ERP system achieve at JHI?

See Full Question And Answer at solutionrank.com

What are the four options when using cloud computing?

What is one major difference between expert systems and case-based reasoning systems?

1. Contextual computing refers to a computing environment that is always present, can feel our
surroundings, and-based on who we are, where we are, and whom we are with-offer
recommendations. True or False? 2. An artificial neural network is a type of machine learning
system. True or False? 3. Robots are one of the l

What are four capabilities of Google Apps for Work?

What are three examples of new generation of electronic meeting systems?


See Full Question And Answer at solutionrank.com

What are three popular applications of the Internet?

What is machine learning?

What is the goal of a proof-of-concept prototype?

Define transborder data flow (TDF).

1. What is My Starbucks Idea? 2. What has the Starbucks CRM achieved? How does it help the
bottom line? 3. Which software platform is behind the Starbucks CRM system? 4. Is My
Starbucks Idea a typical crowdsourcing project? Discuss.

See Full Question And Answer at solutionrank.com

What are two advantages and two disadvantages of e-commerce?

What are three types or forms of the SaaS model?

What is convergence? What are two business applications of convergence?

What is the role of a unified database in an ERP system?

What is a vertical market?

See Full Question And Answer at solutionrank.com

What are three factors that could hinder the success of a GIS?

In which year did the Advanced Research Projects Agency Network (ARPANET) start?

1. What role do global networks play in the effective implementation of JIT? 2. What role does
the "Dealer Daily" system play in Toyota's implementation of a GIS? 3. What is the function of
Vehicle Order Management (VOM)? 4. How many counties will be impacted by VOM and in
which part of the world?

Define the client/server model. Which type is the most popular type?

What is joint application design (JAD)?

See Full Question And Answer at solutionrank.com

What is a green SCM?

Why face recognition technology as a biometric measure is fundamentally different than other
biometric measures such as fingerprint or retina identification?
What are two advantages of crowdsourcing?

What are three drawbacks of mobile and wireless networks?

What are three reasons that an information system may fail?

See Full Question And Answer at solutionrank.com

What are two applications of 3D printing in SCM?

What are two applications of push technology?

1. What processes did the Lotus platform automate and streamline? 2. What are some benefits of
the new Web interface? 3. Which of the development methods discussed in this chapter would be
most suitable at SEB Latvia?

What are the seven layers of the Open Systems Interconnection (OSI) model?

The availability and speed of Internet connections play a major role in the success of a GIS.
After reading the information presented in this chapter and other sources, write a one-page paper
that lists the 10 countries with the fastest Internet connections. Is the United States among the top
10?

See Full Question And Answer at solutionrank.com

What are three applications of IoTs?

What is a data flow diagram (DFD) used for?

What are four ways that a knowledge management system could help an organization?

What are three features or capabilities of a DSS?

1. By 2020 how many smartphones will be available globally? 2. Who are the two companies
that generate the biggest revenue from mobile ads? 3. What does PlaceIQ do for businesses? 4.
For what purpose is Audi using the services offered by PlaceIQ?

See Full Question And Answer at solutionrank.com

What are two examples of industries that could benefit from IoM?

1. Social commerce is a subset of e-commerce that is influenced by social networks and other
online media. True or False? 2. Search engine optimization (SEO) is a method for improving the
volume or quality of traffic to a Web site. True or False? 3. App-based marketing is not among
the popular mobile marketing strate
1. What are some of the reasons that IHG is moving into cloud computing? 2. Which platform is
used for IHG CRM applications? 3. Which applications run in IHG's private cloud? 4. What are
the three cloud delivery models used at IHG?

What is the function of an inference engine in an expert system?

What is an executive information system (EIS)?

See Full Question And Answer at solutionrank.com

1. What problems were Scotts Miracle Gro facing? 2. Which software was used to analyze data
collected by Scotts? 3. How does a software tool such as Luminoso analyze data? 4. What are
some strategic applications of software tool such as Luminoso?

What are two Web sites that support the Alibaba's global operations?

1. Unstructured decisions are typically one-time decisions, with no standard operating procedure
pertaining to them. True or False? 2. A digital dashboard integrates information from multiple
sources and presents it in a unified, understandable format, often as charts and graphs. True or
False? 3. An EIS captures, st

1. What are the three main components of Camden's Real Time Tactical Information Center? 2.
By what percentages have the three major crimes been reduced? 3. How is the system able to
reduce 911 response times from 9 minutes nationally to 90 seconds in Camden? 4. What is the
role of 120 cameras located around the cit

What is one major difference between virtual and augmented reality?

See Full Question And Answer at solutionrank.com

What are the two major issues related to the E.U. lawsuit against Facebook?

What are two ways that drones might be used in SCM?

Define a hyper-social organization? Provide two examples of such organizations.

Define collaborative planning, forecasting, and replenishment (CPFR).

What are two advantages of high coordination in a GIS environment?

See Full Question And Answer at solutionrank.com

Consider a scenario in which Host A and Host B want to send messages to Host C. Hosts A and
C are connected by a channel that can lose and corrupt (but not reorder) messages. Hosts Band C
are connected by another channel (independent of the channel connecting A and C) with the
same properties. The transport layer at Ho
1. What does ORION stand for? 2. What are three advantages of using ORION at UPS? 3. What
are three main components of ORION?

What are three suggestions for making a company's Web site more appealing to a global
audience?

Define an extranet. What are two applications of an extranet?

Because an integer in [0, 2/n - I] can be expressed as an n-bit binary number in a DHT, each key
can be expressed as k =(k0' k1 . .. , k0_1,), and each peer idenn tifier can be expressed P =(p0' Pl'
... ,Pn-1 ,). Let's now define the XOR distance between a key k and peer P as Describe how this
metric can be used to as

See Full Question And Answer at solutionrank.com

Suppose that your department has a local DNS server for all computers in the department. You
are an ordinary user (i.e ., not a network/system administrator). Can you come up a way to
determine if an external Web site was very likely accessed from a computer in your department a
couple of seconds ago? Explain.

Suppose that in UDPClient.java we replace the line DatagramSocket clientSocket = new


DatagramSocket(); With DatagramSocket clientSocket = new DatagramSocket(5432); Will it
become necessary to change UDPServer.java? What are the port numbers for the sockets in
UDPClient and UDPServer? What were they before making th

The text below shows the reply sent from the server in response to the HTTP GET message in
the question above. Answer the following questions, indicating where in the message below you
find the answer. HTTP/1.1 200 OKDate: Tue, 07 Mar 2008 12:39:45GMTServer: Apache/2.0.52
(Fedora) Last-Modified: Sat, 10 Dec2005 18:2

In our rdt protocols, why did we need to introduce timers?

Consider a circular DHT with node and key identifiers in the range [0,63]. Suppose there are
eight peers with identifiers 0, 8, 16, 24, 32,40,48, and 56. a. Suppose each peer can have one
shortcut peer. For each of the eight peers, determine its shortcut peer so that the number of
messages sent for any query (beginnin

See Full Question And Answer at solutionrank.com

Suppose you would like to urgently deliver 40 terabytes data from Boston to Los Angeles. You
have available a 100 Mbps dedicated link for data transfer. Would you prefer to transmit the data
via this link or instead use FedEx overnight delivery? Explain.

Consider the network shown in Scenario 2 in Section 3.6. 1. Suppose both sending hosts A and B
have some fixed timeout values. a. Argue that increasing the size of the finite buffer of the router
might possibly decrease the throughput (λout)' b. Now suppose both hosts dynamically adjust
their timeout values (like w

Read RFC 5321 for SMTP. What does MTA stand for? Consider the following received spam
email (modified from a real spam email). Assuming only the originator of this spam email is
malacious and all other hosts are honest, identify the malacious host that has generated this spam
email. From - Fri Nov 07 13:41:30 2008 Re

Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also
initiates a Telnet session with Server S. Provide possible source and destination port numbers for
a. The segments sent from A to S. b. The segments sent from B to S. c. The segments sent from S
to A. d. The segments se

In what way is instant messaging with a centralized index a hybrid of c1ientserver and P2P
architectures?

See Full Question And Answer at solutionrank.com

List at least four different applications that are naturally suitable for P2P architecture.

Consider a channel that can lose packets but has a maximum delay that is known. Modify
protocol rdt2. 1 to include sender timeout and retransmit. Informally argue why your protocol
can communicate correctly over this channel.

What is an overlay network? Does it include routers? What are the edges in the overlay network?
How is the query-flooding overlay network created and maintained?

Suppose Alice, with a Web-based e-mail account (such as Hotmail or gmail), sends a message to
Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets
from Alice's host to Bob's host. Be sure to list the series of application-layer protocols that are
used to move the message between the

Suppose a process in Host C has a UDP socket with port number 6789. Suppose both Host A and
Host B each send a UDP segment to Host C with destination port number 6789. Will both of
these segments be directed to the same socket at Host C? If so, how will the process at Host C
know that these two segments originated from

See Full Question And Answer at solutionrank.com

Read the POP3 RFC, RFC 1939. What is the purpose of the UIDL POP3 command?

What is the difference between network architecture and application architecture?

Answer true or false se to the following questions and briefly justify your answer: a. With the SR
protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its
current window. b. With GBN, it is possible for the sender to receive an ACK for a packet that
falls outside of its curren

True or false? a. A user requests a Web page that consists of some text and three images. For this
page, the client will send one request message and receive four response messages. b. Two
distinct Web pages (for example, www.mit.edu/research.html and www . mit . edu / students.
html) can be sent over the same persis

Consider a new peer Alice that joins BitTorrent without possessing any chunks . Without any
chunks, she cannot become a top-four uploader for any of the other peers, since she has nothing
to upload. How then will Alice get her first chunk?

See Full Question And Answer at solutionrank.com

Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station
on Earth. Every minute the satellite takes a digital photo and sends it to the base station. Assume
a propagation speed of 2.4•108 meters/sec. a. What is the propagation delay of the link? b.
What is the bandwidth-delay

Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a direct
link of R = 2 Mbps. Suppose the propagation speed over the link is 2.5.108 meters/sec. a.
Calculate the bandwidth-delay product, R • dprop b. Consider sending a file of 800,000 bits
from Host A to Host B. Suppose the file

Obtain the HTTP/l.l specification (RFC 2616). Answer the following questions: a. Explain the
mechanism used for signaling between the client and server to indicate that a persistent
connection is being closed. Can the client, the server, or both signal the close of a connection? b.
What encryption services are provid

a. What is a who is database? b. Use various who is databases on the Internet to obtain the names
of two DNS servers. Indicate which who is databases you used. c. Use nslookup on your local
host to send DNS queries to three DNS servers: your local DNS server and the two DNS servers
you found in part (b). Try queryin

In modern packet-switched networks, the source host segments long, application-layer messages
(for example, an image or a music file) into smaller packets and sends the packets into the
network. The receiver then reassembles the packets back into the original message. We refer to
this process as message segmentation. F

See Full Question And Answer at solutionrank.com

Suppose you can access the caches in the local DNS servers of your department. Can you
propose a way to roughly determine the Web servers (outside your department) that are most
popular among the users in your department? Explain.
For the client-server application over TCP described in Section 2.7, why must the server program
be executed before the client program? For the clientserver application over UDP described in
Section 2.8, why may the client program be executed before the server program?

In the circular DHT example in Section 2.6.2, suppose that peer 3 learns that peer 5 has left. How
does peer 3 update its successor state information? Which peer is now its first successor? Its
second successor?

For a P2P file-sharing application, do you agree with the statement, "There is no notion of client
and server sides of a communication session"? Why or why not?

Read RFC 959 for FTP. List all of the client commands that are supported by the RFC.

See Full Question And Answer at solutionrank.com

Print out the header of an e-mail message you have recently received. How many Received:
header lines are there? Analyze each of the header lines in the message.

Suppose within your Web browser you click on a link to obtain a Web page. The IP address for
the associated URL is not cached in your local host, so a DNS lookup is necessary to obtain the
IP address. Suppose that n DNS servers are visited before y ur host receives the IP address from
DNS; the successive visits incur a

Suppose an application uses rdt 3.0 as its transport layer protocol. As the stop-and-wait protocol
has very low channel utilization (shown in the cross country example), the designers of this
application let the receiver keep sending back a number (more than two) of alternating ACK 0
and ACK I even if the corresponding

Consider a short, l0-meter link, over which a sender can transmit at a rate of 150 bits/sec in both
directions. Suppose that packets containing data are 100,000 bits long, and packets containing
only control (e.g., ACK or handshaking) are 200 bits long. Assume that N parallel connections
each get I/N of the link bandwi

From a user's perspective, what is the difference between the download-and delete mode and the
download-and-keep mode in POP3?

See Full Question And Answer at solutionrank.com

As DHTs are overlay networks, they may not necessarily match the underlay physical network
well in the sense that two neighboring peers might be physically very far away; for example, one
peer could be in Asia and its neighbor could be in North America. If we randomly and uniformly
assign identifiers to newly joined pe

Consider a packet of length L which begins at end system A and travels over three links to a
destination end system. These three links are connected by two packet switches. Let dp, sp and
Ri denote the length, propagation speed, and the transmission rate of link i, for i = I, 2, 3. The
packet switch delays each packet

Host A and B are communicating over a TCP connection, and Host B has already received from
A all bytes up through byte 126. Suppose Host A then sends two segments to Host B back-to-
back. The first and second segments contain 70 and 50 bytes of data, respectively. In the first
segment, the sequence number is 127, the so

Suppose users share a 3 Mbps link. Also suppose each user requires I50 kbps when transmitting,
but each user transmits only 10 percent of the time. (See the discussion of statistical multiplexing
in Section 1.3.) a. When circuit switching is used, how many users can be supported? b. For the
remainder of this problem,

List the four broad classes of services that a transport protocol can provide. For each of the
service classes, indicate if either UDP or TCP (or both) provides such a service.

See Full Question And Answer at solutionrank.com

Describe why an application developer might choose to run an application over UDP rather than
TCP.

True or false? a. Host A is sending Host B a large file over a TCP connection. Assume Host B
has no data to send Host A. Host B will not send acknowledgments to Host A because Host B
cannot piggyback the acknowledgments on data. b. The size of the TCP rwnd never changes
throughout the duration of the connection . c.

Refer again to problem P24. a. How long does it take to send the file, assuming it is sent
continuously? b. Suppose now the file is broken up into 20 packets with each packet containing
40,000 bits. Suppose that each packet is acknowledged by the receiver and the transmission time
of an acknowledgment packet is negl

Telnet into a Web server and send a multiline request message. Include in the request message
the If-modified-since: header line to force a response message with the 304 Not Modified status
code.

Consider distrihuting a file of F bits to N peers using a P2P architecture. Assume a fluid model.
For simplicity assume that dmin is very large, so that peer download bandwidth is never a
bottleneck. a. Suppose that μs ≤ (us + μ1 + ... + uN)/N. Specify a distribution scheme that
has a distribution time of F/us. b

See Full Question And Answer at solutionrank.com

Consider a planet where everyone belongs to a family of six, every family lives in its own house,
each house has a unique address, and each person in a given house has a unique name. Suppose
this planet has a mail service that delivers letters from source house to destination house. The
mail service requires that (i) t

Consider the scenario introduced in the previous problem. Now suppose that the link is shared by
Bob with four other users. Bob uses parallel instances of non-persistent HTTP, and the other four
users use non-persistent HTTP without parallel downloads. a. Do Bob's parallel connections help
him get Web pages more quick

Consider problem P24 but now with a link of R =1 Gbps. a. Calculate the bandwidth-delay
product, R • dprop b. Consider sending a file of 800,000 bits from Host A to Host B. Suppose
the file is sent continuously as one big message. What is the maximum number of bits that will
be in the link at any given time? c. Wh

Consider Figure 3.5. What are the source and destination port values in the segments flowing
from the server back to the clients' processes? What are the IP addresses in the network-layer
data grams carrying the transport - layer segments?

Consider distributing a file of F = 15 Gbits to N peers. The server has an upload rate of μs, = 30
Mbps, and each peer has a download rate of di =2 Mbps and an upload rate of μ. For N =10,
100, and 1,000 and u = 300 Kbps, 700 Kbps, and 2 Mbps, prepare a chart giving the minimum
distribution time for each of the combi

See Full Question And Answer at solutionrank.com

Consider the GBN protocol with a sender window size of 3 and a sequence number range of
1,024. Suppose that at time t. the next in-order packet that the receiver is expecting has a
sequence number of k. Assume that the medium does not reorder messages. Answer the
following questions : a. What are the possible sets of

Consider the GBN and SR protocols. Suppose the sequence number space is of size k. What is
the largest allowable sender window that will avoid the occurrence of problems such as that in
Figure 3.27 for each of these protocols?

The sender side of rdt3 • 0 simply ignores (that is, takes no action on) all received packets that
are either in error or have the wrong value in the acknum field of an acknowledgment packet.
Suppose that in such circumstances, rdt3. 0 were simply to retransmit the current data packet.
Would the protocol still work?

We have said that an application may choose UDP for a transport protocol because UDP offers
finer application control (than TCP) of what data is sent in a segment and when. a. Why does an
application have more control of what data is sent in a segment? b. Why does an application have
more control on when the segment

Why is it said that FTP sends control information "out-of-band"?


See Full Question And Answer at solutionrank.com

Consider a generalized version of the scheme described in the previous problem. Instead of using
binary numbers, we now treat key and peer identifiers as base-b numbers where b > 2, and then
use the metric in the previous problem to design a DHT (with 2 replace with b). Compare this
DHT based on base-b numbers with the

Suppose Bob joins a BitTorrent torrent, but he does not want to upload any data to any other
peers (so called free-riding). a. Bob claims that he can receive a complete copy of the file that is
shared by the swarm. Is Bob's claim possible? Why or why not? b. Bob further claims that he can
further make his "free-ridin

Consider accessing your e-mail with POP3. a. Suppose you have configured your POP mail
client to operate in the download-and-deIete mode. Complete the following transaction: c: list S:
1 498 S: 2 912 S: • C: retr 1 S: blah blah • • • S: •......... blah S: • ? ? b. Suppose
you have configured you

Suppose you wanted to do a transaction from a remote client to a server as fast as possible.
Would you use UDP or TCP? Why?

In the generic SR protocol that we studied in Section 3.4.4, the sender transmits a message as
soon as it is available (if it is in the window) without waiting for an acknowledgment. Suppose
now that we want an SR protocol that sends messages two at a time. That is, the sender will send
a pair of messages and will send

See Full Question And Answer at solutionrank.com

In the circular DHT example in Section 2.6.2, suppose that a new peer 6 wants to join the DHT
and peer 6 initially only knows peer I5's IP address. What steps are taken?

Consider the foll owing string of ASCll characters that were captured by Wireshark when the
browser sent an HTTP GET message (i .e., this is the actual content of an HTTPGET message).
The characters are carriage return and line-feed characters (that is, the italized character string in
the text below represents the s

Consider the cross-country example shown in Figure 3. 17. How big would the window size
have to be for the channel utilization to be greater than 95 percent? Suppose that the size of a
packet is 1,500 bytes, including both header fields and data.

Host A and B are directly connected with a 100 Mbps link. There is one TCP connection
between the two hosts, and Host A is sending to Host B an enormous file over this connection.
Host A can send its application data into its TCP socket at a rate as high as 120 Mbps but Host B
can read out of its TCP receive buffer at
Consider transfelTing an enormous file of L bytes from Host A to Host B. Assume an MSS of
536 bytes. a. What is the maximum value of L such that TCP sequence numbers are not
exhausted? Recall that the TCP sequence number field has 4 bytes. b. For the L you obtain in (a),
find how long it takes to transmit the file.

See Full Question And Answer at solutionrank.com

Consider a scenario in which Host A wants to simultaneously send packets III Hosts Band C. A
is connected to Band C via a broadcast channel-a packet sent by A is carried by the channel to
both Band C. Suppose that the broadcast channel connecting A, B, and C can independently lose
and corrupt packets (and so, for examp

Referring to problem P24, suppose we can modify R. For what value of R is the width of a bit as
long as the length of the link? Problem 24 Suppose two hosts, A and B, are separated by 20,000
kilometers and are connected by a direct link of R = 2 Mbps. Suppose the propagation speed over
the link is 2.5. 108 meters/sec

Suppose the network layer provides the following service. The network layer in the source host
accepts a segment of maximum size l,200 bytes and a destination host address from the transport
layer. The network layer then guarantees to deliver the segment to the transport layer at the
destination host. Suppose many netw

Consider sending a large file of F bits from Host A to Host B. There are three links (and two
switches) between A and B, and the links are uncongested (that is, no queuing delays). Host A
segments the file into segments of S bits each and adds 80 bits of header to each segment,
forming packets of L = 40 + S bits. Each

Assume that we know the bottleneck link along the path from the server to the client is the first
link with rate R, bits/sec. Suppose we send a pair of packets back to back from the server to the
client, and there is no other traffic on this path. Assume each packet of size L bits, and both links
have the same propagat

See Full Question And Answer at solutionrank.com

Suppose that the roundtrip delay between sender and receiver is constant and known to the
sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost?
Explain.

Consider the discussion in Section 1.3 of statistical multiplexing in which an example is


provided with a I Mbps link. Users are generating data at a rate of 100 kbps when busy, but are
busy generating data only with probability p =0.1. Suppose that the I Mbps link is replaced by a I
Gbps link. a. What is N, the maxim
Install and compile the Java programs TCPClient and UDPClient on one host and TCPServer
and UDPServer on another host. a. Suppose you run TCPClient before yon run TCPServer. What
happens? Why? b. Suppose you run UDPClient before you nm UDPServer. What happens•)
Why? c. What happens if you use different port numbers

Consider Figure 2. 12, for which there is an institutional network connected to the Internet.
Suppose that the average object size is 850,000 bits and that the average request rate from the
institution's browsers to the origin servers is 16 requests per second. Also suppose that the
amount of time it takes from when th

Consider the circuit-switched network in Figure 1.12. Recall that there are n circuits on each
link. a. What is the maximum number of simultaneous connections that can be in progress at
anyone time in this network? b. Suppose that all connections are between the switch in the
upper-left-hand corner and the switch in

See Full Question And Answer at solutionrank.com

SYN cookies were discussed in Section 3.5.6. a. Why is it necessary for the server to use a
special initial sequence number in the SYNACK? b. Suppose an attacker knows that a target host
uses SYN cookies. Can the attacker create half-open or fully open connections by simply
sending an ACK packet to the target? Why or

Write a simple TCP program for a server that accepts lines of input from a client and prints the
lines onto the server's standard output. (You can do this by modifying the TCPServer java
program in the text.) Compile and execute your program. On any other machine that contains a
Web browser, set the proxy server in the

This elementary problem begins to explore propagation delay and transmission delay, two
central concepts in data networking. Consider two hosts, A and B, connected by a single link of
rate R bps. Suppose that the two hosts are separated by m meters, and suppose the propagation
speed along the link is s meters/sec. Host

Is it possible for an organization's Web server and mail server to have exactly the same alias for a
hostname (for example, foo. com)? What would be the type for the RR that contains the host
name of the mail server?

In this problem we consider sending real-time voice from Host A to Host B over a packet-
switched network (VoIP). Host A converts analog voice to a digital 64 kbps bit stream on the fly.
Host A then groups the bits into 56-byte packets. There is one link between Host A and B; its
transmission rate is 2 Mbps and its prop

See Full Question And Answer at solutionrank.com

What is the difference between MAIL FROM: in SMTP and From: in the mail message itself?
In this problem, we use the useful tool dig tool available on Unix and Linux hosts to explore the
hierarchy of DNS servers. Recall that in Figure 2.21 , a DNS server higher in the DNS hierarchy
delegates a DNS query to a DNS server lower in the hierarchy, by sending back to the DNS
client the name of that lower-level D

Referring to Problem P7, suppose the HTML file references eight very small objects on the same
server. Neglecting transmission times, how much time elapses with a. Non-persistent HTTP with
no parallel TCP connections? b. Non-persistent HTTP with the browser configured for 5 parallel
connections? c. Persistent HTIP?

Consider the Telnet example discussed in Section 3.5. A few seconds after the user types the
letter 'C,' the user types the letter 'R.' After typing the letter 'R,' how many segments are sent, and
what is put in the sequence number and acknowledgment fields of the segments?

Recall that TCP can be enhanced with SSL to provide process-to-process security services,
including encryption. Does SSL operate at the transport layer or the application layer? If the
application developer wants TCP to be enhanced with SSL, what does the developer have to do?

See Full Question And Answer at solutionrank.com

Consider distributing a file of F bits to N peers using a client-server architecture. Assume a fluid
model where the server can simultaneously transmit to multiple peers, transmitting to each peer
at different rates, as long as the combined rate does not exceed μs. a. Suppose that us/N ≤
dmin. Specify a distributio

Describe how Web caching can reduce the delay in receiving a requested object. Will Web
caching reduce the delay for all objects requested by a user or for only some of the objects?
Why?

Consider a DHT with a mesh overlay topology (that is, every peer tracks all peers in the system).
What are the advantages and disadvantages of such a design? What are the advantages and
disadvantages of a circular DHT (with no shortcuts)?

The UDP server described in Section 2.8 needed only one socket, whereas the TCP server
described in Section 2.7 needed two sockets. Why? If the TCP server were to Support n
simultaneous connections, each from a different client host, how many sockets would the TCP
server need?

Consider the rdt 3.0 protocol. Draw a diagram showing that if the network connection between
the sender and receiver can reorder messages (that is, that two messages propagating in the
medium between the sender and receiver can be reordered), then the alternating-bit protocol will
not work correctly (make sure you clea

See Full Question And Answer at solutionrank.com


Consider an e-commerce site that wants to keep a purchase record for each of its customers.
Describe how this can be done with cookies.

Consider the airline travel analogy in our discussion of layering in Section 1.5, and the addition
of headers to protocol data units as they flow down the protocol stack. Is there an equivalent
notion of header information that is added to passengers and baggage as they move down the
airline protocol stack?

How does SMTP mark the end of a message body? How about HTTP? Can HTTP use the same
method as SMTP to mark the end of a message body? Explain.

In this problem. we are interested in finding out the efficiency of a BitTorrent- like P2P file
sharing system . Consider two peers Bob and Alice. They join a torrent with M peers in total
(including Bob and Alice) that are sharing a file consisting of N chunks. Assume that at a
particular time t, the chunks that a pee

Suppose that a Web server runs in Host C on port 80. Suppose this Web server uses persistent
connections, and is currently receiving requests from two different Hosts, A and B. Are all of the
requests being sent through the same socket at Host C? If they are being passed through different
sockets, do both of the socket

See Full Question And Answer at solutionrank.com

Consider a reliable data transfer protocol that uses only negative acknowledgments. Suppose the
sender sends data only infrequently. Would a NAK-only protocol be preferable to a protocol that
uses ACKs? Why? Now suppose the sender has a lot of data to send and the end-to-end
connection experiences few losses. In this s

Review the car-caravan analogy in Section lA. Assume a propagation speed of 100 kmJhour. a.
Suppose the caravan travels 150 km, beginning in front of one tollbooth, passing through a
second tollbooth, and finishing just after a third tollbooth. What is the end-to-end delay? b.
Repeat (a), now assuming that there are

Consider the adaptive playout strategy described in Section 7.3. a. How can two successive
packets received at the destination have timestamps that differ by more than 20 msecs when the
two packets belong to the same talk spurt? b. How can the receiver use sequence numbers to
determine whether a packet is the first p

Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the
handshake, Trudy sends Bob Alice's certificate. In what step of the SSL handshake algorithm
will Bob discover that he is not communicating with Alice?

Suppose Alice wants to communicate with Bob using symmetric key cryptography using a
session key KS. In Section 8.2, we learned how public-key cryptography can be used to
distribute the session key from Alice to Bob. In this problem, we explore how the session key
can be distributed-without public key cryptography-usin

See Full Question And Answer at solutionrank.com

Provide a filter table and a connection table for a stateful firewall that is restrictive as possible
but accomplishes the following: a. Allows all internal users to establish Telnet sessions with
external hosts. b. Allows external users to surf the company Web site at 222.22.0.12. c. But
otherwise blocks all inboun

Suppose we have two network entities, A and B. B has a supply of data messages that will be
sent to A according to the following conventions. When A gets a request from the layer above to
get the next data (D) message from B, A must send a request (R) message to B on the A-to-B
channel. Only when B receives an R messag

Suppose N people want to communicate with each of N - I other people using symmetric key
encryption. All communication between any two people, i and j, is visible to all other people in
this group of N, and no other person in this group should be able to decode their communication.
How many keys are required in the sys

In what way does the public-key encrypted message hash provide a better digital signature than
the public-key encrypted message?

What does it mean for a signed document to be verifiable and non-forgeable?

See Full Question And Answer at solutionrank.com

The OSPF routing protocol uses a MAC rather than digital signatures to provide message
integrity. Why do you think a MAC was chosen over digital signatures?

Why would a network manager benefit from having network management tools? Describe five
scenarios.

Show that Trudy's known-plaintext attack, in which she knows the (ciphertext, plaintext)
translation pairs for seven letters, reduces the number of possible substitutions to be checked in
the example in Section 8.2.1 by approximately 109.

Define the following terms: managing entity, managed device, management agent, MIB, network
management protocol.

In Section 9.3 we saw that it was preferable to transport SNMP messages in unreliable UDP
datagrams. Why do you think the designers of SNMP chose UDP rather than TCP as the
transport protocol of choice for SNMp?

See Full Question And Answer at solutionrank.com


In the BitTorrent P2P file distribution protocol (see Chapter 2), the seed breaks the file into
blocks, and the peers redistribute the blocks to each other. Without any protection, an attacker
can easily wreak havoc in a torrent by masquerading as a benevolent peer and sending bogus
blocks to a small subset of peers in

What is the difference between network management and service management?

Suppose Alice wants to send an e-mail to Bob. Bob has a public-private key pair (K+B,K-B)' and
Alice has Bob's certificate. But Alice does not have a public, private key pair. Alice and Bob
(and the entire world) Share the same hash function H(•). a. In this situation, is it possible to
design a scheme so that Bob ca

Consider the 3-bit block cipher in Table 8.1. Suppose the plaintext is 100100100. (a) Initially
assume that CBC is not used . What is the resulting ciphertext? (b) Suppose Trudy sniffs the
ciphertext. Assuming she knows that a 3-bit block cipher without CBC is being employed (but
doesn't know the specific cipher), wh

Suppose Alice and Bob share two secret keys: an authentication key S1 and a symmetric
encryption key S2 Augment Figure 8.9 so that both integrity and confidentiality are provided.

See Full Question And Answer at solutionrank.com

In Section 8.5.1. it is shown that without sequence numbers. Trudy (a woman-in-the middle) can
wreak havoc in an SSL session by interchanging TCP segments. Can Tmdy do something similar
by deleting a TCP segment? What does she need to do to succeed at the deletion attack? What
effect will it have?

Consider the polyalphabetic system shown in Figure 8.4. Will a chosenplaintext attack that is
able to get the plaintext encoding of the message "The quick brown fox jumps over the lazy
dog." be sufficient to decode all messages? Why or why not?

(a) Using RSA, choose p = 3 and q = 11, and encode the word "dog" by encrypting each letter
separately. Apply the decryption algorithm to the encrypted version to recover the original
plaintext message. (b) Repeat part (a) but now encrypt "dog" as one message m.

Consider our authentication protocol in Figure 8.16 in which Alice authenticates herself to Bob,
which we saw works well (i.e., we found no flaws in it). Now suppose that while Alice is
authenticating herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which
Trudy, pretending 10 be Alice, can now

What is the role of ASN.1 in the ISO/OSI reference model 's presentation layer?

See Full Question And Answer at solutionrank.com

Can you "decrypt" a hash of a message to get the original message? Explain your answer.
Consider RSA with p =5 and q = II. a. What are nand z. b. Let e be 3. Why is this an acceptable
choice for e? c. Find d such that de = I (mod z) and d < 160. d. Encrypt the message m = 8 using
the key (n, e). Let c denote the corresponding ciphertext. Show all work. To simplify the
calculations, use the fact: [(a

From a service perspective, what is an important difference between a symmetric-key system and
a public-key system?

Suppose Alice has a message that she is ready to seod to anyone who asks. Thousands of people
want to obtain Alice's message, but each wants to be sure of the integrity of the message. In this
context, do you think a MAC-based or a digital-signature-based integrity scheme is more
suitable? Why?

What is an important difference between a request-response message and a trap message in


SNMP?

See Full Question And Answer at solutionrank.com

Consider the Wircshark output below for a portion of an SSL session. a. Is Wireshark packet 112
sent by the client or server? b. What is the server's IP address and port number? c. Assuming no
loss and no retransmissions, what will be the sequence number of the next TCP segment sent by
the client? d. How many SSL r

In what way does a hash provide a better message integrity check than a checksum (such as the
Internet checksum)?

Consider the example in Figure 8.29. Suppose Trudy is a woman-in-themiddle, who can insert
datagrams into the stream of datagrams going from R1 and R2. As part of a replay attack. Trudy
sends a duplicate copy of one of the datagrams sent from R1 to R2. Will R2 decrypt the duplicate
datagram and forward it into the bran

What are the differences between message confidentiality and message integrity? Can you have
confidentiality without integrity? Can you have integrity without confidentiality? Justify your
answer.

Figure 8.20 shows the operations that Alice must perform with PGP to provide confidentiality,
authentication, and integrity. Diagram the corresponding perations that Bob must perform on the
package received from Alice.

See Full Question And Answer at solutionrank.com

Suppose Alice wants to visit the Web site activist.com using TOR-like service. This service uses
two non-colluding proxy servers Proxy I and Proxy2. Alice first obtains the certificates (each
containing a public key) for Proxy 1 and Proxy2 from some central server. Denote K+1( ),
K+2( ), K-1( ), and K-2.( ) for the enc
Consider the two ways in which communication occurs between a managing entity and a
managed device: request-response mode and trapping. What are the pros and cons of these two
approaches, in terms of (I) overhead, (2) notification time when exceptional events occur, and (3)
robustness with respect to lost messages betw

Why must an application gateway work in conjunction with a router filter to be effective?

Consider the following pseudo-WEP protocol. The key is 4 bits and the IV is 2 bits . The IV is
appended to the end of the key when generating the keystream. Suppose that the shared secret
key is 10 IO. The keystreams for the four possible inputs are as follows : 101000: 001010
1101010101001011 010100100... 10100l: 10

Compute a third message, different from the two messages in Figure 8.8, that has the same
checksum as the messages in Figure 8.8.

See Full Question And Answer at solutionrank.com

Consider a variation of the MAC algorithm (Figure 8.9) where the sender sends (m, H(m) + s),
where H(m) + s is the concatenation of H(m) and s. Is this variation flawed? Why or why not?

Suppose n = 10,000, a = 10,023, and b = 10,004. Use an identity of modular arithmetic to


calculate in your head (a • b) mod n.

Consider the block cipher in Figure 8.5. For a given "key" Alice and Bob would need to keep
eight tables, each 8 bits by 8 bits. For Alice (or Bob) to store all eight tables, how many bits of
storage are necessary? How does this number compare with the number of bits required for a
full-table 64-bit block cipher?

The following True/False questions pertain to Figure 8.29. a. When a host in 172.16.1124 sends
a datagram to an Amazon.com server, the router R I will encrypt the datagram using IPsec. b.
When a host in 172.16.1124 sends a datagram to a host in 172.16.2/24, the router R I will change
the source and destination addres

In the man-in-the-middle attack in Figure 8.19, Alice has not authenticated Bob. If Alice were to
require Bob to authenticate himself using the publickey authentication protocol, would the man-
in-the-middle attack be avoided? Explain your reasoning.

See Full Question And Answer at solutionrank.com

What is the man-in-the-middle attack? Can this attack occur when symmetric keys are used?

In this problem, we explore the Diffie-Hellman (DH) public-key encryption algorithm, which
allows two entities to agree on a shared key. The DH algorithm makes use of a large prime
number p and another large number g less than p. Both p and g are made public (so that an
attacker would know them). In DH, Alice and Bob e
Three soccer teams A. B, and C, play each other once. Each match is between two (earns, and
can be won, drawn, or lost. Each team has a fixed, unknown degree of quality— an integer
ranging from 0 to 3—and the outcome of a match depends probabilistically on the difference in
quality between the two teams. a. Constru

Prior to 1999, teams in the National Hockey League received 2 points for a win, 1 for a tie, and 0
for a loss. Is this a constant-sum game? In 1999, the rules were amended so that a team receives
1 point for a loss in overtime. The winning team still gets 2 points. 1-low does this modification
change the answers to the

Implement a data structure for layered, feed-forward neural networks, remembering to provide
the information needed for both forward evaluation and backward propagation. Using this data
structure, write a function NEURAL-NETWORK-OUTPUT that takes an example and a
network and computes the appropriate output values.

See Full Question And Answer at solutionrank.com

In our analysis of the wumpus world, we used the fact that each square contains a pit with
probability 0.2, independently of the contents of the other squares. Suppose instead that exactly
N/5 pits are scattered uniformly at random among the N squares other than [1, 1]. Are the
variables P and P i, j and P k, l still i

Consider the block cipher in Figure 8.5. Suppose that each block cipher T; simply reverses the
order of the eight input bits (so that, for example, 11110000 becomes 00001111). Further
suppose that the 64-bit scrambler does not modify any bits (so that the output value of the mth bit
is equal to the input value of the m

In this exercise, we analyze in more detail the persistent-failure model for the battery sensor in
Figure (a). a. Figure (b) stops at t = 32. Describe qualitatively what should happen as t → ∞ if
the sensor continues to read 0. b. Suppose that the external temperature affects the battery sensor
in such a way that

We outlined a flawed procedure for finding the most likely state sequence, given an observation
sequence. The procedure involves finding the most likely state at each time step, using
smoothing, and returning the sequence composed of these slates. Show that, for some temporal
probability models and observation sequence

We never test the same attribute twice along one path in a decision tree. Why not?

See Full Question And Answer at solutionrank.com

In the chapter we noted that attributes with many different possible values can cause problems
with the gain measure. Such attributes tend to split the examples into numerous small classes or
even singleton classes, thereby appearing to be highly relevant according to the gain measure.
The gain ratio criterion selects

In your local nuclear power station, there is an alarm that senses when a temperature gauge
exceeds a given threshold. The gauge measures the temperature of the core. Consider the
Boolean variables A (alarm sounds), FA (alarm is faulty), and FG (gauge is faulty) and the multi-
valued nodes G (gauge reading) and T (actua

Suppose you had a neural network with linear activation functions. That is, for each unit the
output is some constant times the weighted sum of the inputs. a. Assume that the network has
one hidden layer. For a given assignment to the weights W, write down equations for the value
of the units in the output layer as a f

Consider the 4 x 3 world shown in Figure. a. implement an environment simulator for this
environment, such that the specific geography of the environment is easily altered. Some code
for doing this is already in the online code repository. b. Create an agent that uses policy
iteration, and measure its performance in th

Show that dominant strategy equilibrium is Nash equilibrium, hut not vice versa.

See Full Question And Answer at solutionrank.com

The Markov blanket of a variable is defined. a. Prove that a variable is independent of all other
variables in the network, given its Markov blanket. b. Derive Equation (14.11).

This exercise develops a space-efficient variant of the forward—backward algorithm described


in Figure. We wish to compute P (X k│e l; t) for k = 1... t. This will be done with a divide-and-
conquer approach. a. Suppose, for simplicity, that t is odd, and let the halfway point he h = (t +
1)/2. Show that P (X k│e

Defined a proper policy for an MDP as one that is guaranteed to reach a terminal state, show that
it is possible for a passive ADP agent to learn a transition model for which its policy π is
improper even if π is proper for the true MDP with such models, the value determination step
may fail if γ = 1. Show that this

Show that any second-order Markov process can be rewritten as a first-order Markov process
with an augmented set of state variables. Can this always he done parsimoniously that is, without
increasing the number of parameters needed to specify the transition model?

How can the value determination algorithm be used to calculate the expected loss experienced by
an agent using a given set of utility estimates U and an estimated model M, compared with an
agent using correct values?

See Full Question And Answer at solutionrank.com


Consider m data points (x j, y j), where the y j s are generated from the x j s according to the
linear Gaussian model in Equation (20.5). Find the values of θ1, θ2 and σ that maximize the
conditional log likelihood of the data.

Draw a decision tree for the problem of deciding whether to move forward at a road intersection,
given that the light has just turned green.

Modify and extend the Bayesian network code in the code repository to provide for creation and
evaluation of decision networks and the calculation of information value.

Repeat Exercise 18.1 for the case of learning to play tennis (or some other sport with which you
are familiar) is this supervised learning or reinforcement learning?

For the 4 x 3 world shown in Figure, calculate which squares can he reached from (1, 1) by the
action sequence (Up, Up, Right, Right, Right and with what probabilities. Explain how this
computation is related to the task of projecting a hidden Markovmodel.

See Full Question And Answer at solutionrank.com

Consider the problem of generating a random sample Iron, a specified distribution on a single
variable. You can assume that a random number generator is available that returns a random
number uniformly distributed between 0 and 1. b. Now suppose we want to generate N samples
of X, where N > k. Explain how to do this wi

Suppose you are running a learning experiment on a new algorithm. You have a data set
consisting of 2 examples of each of two classes. Yon plan to use leave-one-nut cross-validation.
As a baseline, you run your experimental setup on a simple majority classifier. (A majority
classifier is given a set of training data an

Suppose you are given a bag containing n unbiased coins. You are told that n — 1 of these coins
are normal, with heads on one side arid tails on the other, whereas one coin is a fake, with heads
on both sides. a. Suppose you reach into the bag, pick out a coin uniformly at random, flip it, and
get a head. What is the

The data used for Figure can be viewed as being generated by h5. For each of the other four
hypotheses, generate a data set of length 100 and plot the corresponding graphs for P (hi│d1...
dm) and P (D m + 1 = lime│d1. . . dm). Comment on your results.

Suppose that a training set contains only a single example, repeated 100 times. In 80 of the 100
cases, the single output value is I; in the other 20, it is 0. What will a back- propagation network
predict for this example, assuming that it has been trained and reaches a global optimum?

See Full Question And Answer at solutionrank.com


How much is a micro-mort worth to you? Devise a protocol to determine this. Ask questions
based both on paying to avoid risk and being paid to accept risk.

Suppose that an attribute splits the set of examples E into subsets E i and that each subset has p,
positive examples and n negative examples. Show that the attribute has strictly positive
information gain unless the ratio pi/ (p i + n i) is the same for all i.

Let us examine the behavior of the variance update in Equation (15.1). a. Plot the value of σ2t as
a function of t, given various values for σ2x and σ2z. b. Show that the update has a fixed point
u σ2 such that σ2t →, σ2 as t →∞ and calculate the value of σ2 c. Give a qualitative
explanation for what ha

For each of the following determinations write down the logical representation and explain why
the determination is true (if it is): a. Zip code determines the state (U.S.). b. Design and
denomination determine the mass of a coin. c. For a given program, input determines output. d.
Climate, food intake, exercise, and m

(Adapted from Pearl (1988)) Suppose you are a witness to a nighttime hit-and-run accident
involving a taxi in Athens. All taxis in Athens are blue or green. You swear, under oath, that the
taxi was blue. Extensive testing shows that, under the dim lighting conditions, discrimination
between blue and green is 75% reliab

See Full Question And Answer at solutionrank.com

Show how to represent an HMM as a recursive relational probabilistic model, as suggested in


Section 14.6.

Adapt the vacuum world for reinforcement learning by including rewards for picking up each
piece of dirt and for getting home and switching off. Make the world accessible by providing
suitable percepts. Now experiment with different reinforcement learning agents. Is function
approximation necessary for success? What so

Repeat Exercise 20.1, this time plotting the values of P (D m+1 = lime│h MAP) and P (D m+1
= lime│hML).

The probit distribution defined, describes the probability distribution for a Boolean child, given a
single continuous parent. a. How might the definition be extended to cover multiple continuous
parents? b. How might it be extended to handle a multivalued child variable? Consider both
cases where the child’s values

In the children’s game of rock-paper-scissors each player reveals at the same time a choice of
rock, paper, or scissors. Paper wraps rock, rock blunts scissors, and scissors cut paper. In the
extended version rock—paper—scissors—fire—water, fire beats rock, paper and scissors;
rock, paper and scissors beat wa

You might also like