Describe the ways in which the request-reply protocol masks the heterogeneity of operating systems and of computer networks.

What will be an ideal response?


(i) Different operating systems may provide a variety of different interfaces to the communication protocols. These interfaces are concealed by the interfaces of the request-reply protocol.

(ii) Although the Internet protocols are widely available, some computer networks may provide other protocols. The request-reply protocol may equally be implemented over other protocols.
[In addition it may be implemented over either TCP or UDP.]

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Algebraic expressions must be typed in straight-line form using Python’s op-erators. b. The following code multiplies 10 times the quantity 5 + 3, yielding the result 80: 10 * (5 + 3) c. Parentheses in an expression are said to be redundant (unnecessary) if re-moving them yields the same result. d. The parentheses in part b) above are redundant.

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. Usually reflects the name of the business represented by a website. B. An internal website without public access. C. Technology used to provide faster access to the Internet than a dial-up modem. D. Location of a file in relation to any folders in the website. E. A folder that might store all of the non-HTML files in a website.

Computer Science & Information Technology

There are a number of different versions of the 802.11 standard; the 802.11g, 802.11n, and 802.11ac standards are the most widely used today. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) The foreach statement can be used only with one-dimensional arrays. 2) One could iterate through multi-dimensional arrays by using nested for loops. 3) Variable-length argument lists allow you to create methods that receive an arbitrary number of arguments. 4) The params modifier can be used anywhere in the method’s header. 5) When an app is executed from the Command Prompt, the execution environment passes the command-line arguments to the Main method as a string.

Computer Science & Information Technology