Discuss whether it is possible to improve upon the ‘pull’ model of service discovery by
multicasting (or broadcasting) and caching replies to queries.
What will be an ideal response?
We start with the ‘pull’ model described in the chapter but turn it into a hybrid with the ‘push’ model by having
services multicast/broadcast their existence when a query occurs. All potential client devices can then hear and
cache the service advertisements. When a component on the device requires a service, it first consults the local
cache. If no matching services are found or if a more up-to-date list of matching services is required, then the
device still multicasts its query. However, now it includes information about any matching services in its
cache. Other potential clients may now learn about those services’ existence. Moreover, only services not in
the query need reply.
While it is intuitively reasonable, this hybrid scheme needs validation through simultaion or experimentation
against the required implementation parameters. The extra multicasts incur a cost.
You might also like to view...
When you define a C++ class so that the result is an ADT, which of the following remarks about whether to make a member variable or function public or private are correct?
a. Make them all public. It simplifies life and makes things more efficient to be able access members anywhere. b. Don’t make member variables public. c. Make all member functions public. d. There are some member functions that shouldn’t be public, but most should be public.
Case-based Critical Thinking QuestionsCase 13-1Judy wants to be able to validate the XML documents that she uses for recipes. These documents include numeric elements that specify ingredient amounts and cooking times, so you recommend that she use a schema instead of a DTD, and you teach her some of the key facts about schemas. Judy has an attribute called "recipeType" that she uses to record whether the recipe is for an appetizer, entree, dessert, or other type of dish. This attribute only contains text. Which of the following would be a valid XML schema definition for this attribute?
A.
Which is not a quantitative document available for interpretation in any business?
A) records B) reports used for decision making C) performance reports D) data capture records
Authentication technologies are used by many organizations to _____.
A. verify the accuracy of their product descriptions and prices B. secure sensitive data during e-commerce C. confirm the uniform resource locator (URL) of their suppliers' Websites D. confirm the identity of a user requesting access to information or assets