StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Network and Management - Case Study Example

Cite this document
Summary
Therefore, all segments highlighted with red background in the above table would most probably experience premature timeout.
Web Cache, also called Proxy Cache, is a shared…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Computer Network and Management
Read Text Preview

Extract of sample "Computer Network and Management"

Download file to see previous pages

When web cache receives the request, it first examines the cache’s inventory of stored objects to verify the existence of the requested web content. If the desired object is found, web cache determines the ‘freshness’ of the stored object by examining the object’s creation date, storage date, expiration date, and client and server preferences. If the stored object is found to be valid and up-to-date (fresh), then it is retrieved from the cache’s object store and sent as an HTTP response to the client, hence, saving time and bandwidth (Hofmann & Beaumont 2005).

In case if the requested web object is not found, then the web cache transforms and forward the client request to the origin server, receives the response from the origin server, and forwards the response to the client. After sending the response to the client, web cache decides whether or not to store a copy of the object into its object store. This decision is based on (i) replacement rules, and (ii) dynamic object rules (Hofmann & Beaumont 2005). Web cache has finite capacity and therefore, once the cache is full, it is important to decide whether or not to store the current web object after removing and replacing some another stored object.

There are several ways to select the object to be removed and replaced; some popular strategies listed by Hofmann & Beaumont (2005) are: Web cache uses dynamic object rules to find the approximate future value of the object through examining its characteristics in order to determine whether or not the object is valuable enough to be stored in the object store. Dynamic web content, such as stock quotes, news headlines, and weather reports changes very frequently and therefore, their value is dropped very rapidly.

Personal information, such as family pictures, journals, and travel plans has a very low future value as it attracts only a few numbers of clients. Likewise, private

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Network and Management Case Study Example | Topics and Well Written Essays - 7000 words”, n.d.)
Computer Network and Management Case Study Example | Topics and Well Written Essays - 7000 words. Retrieved from https://studentshare.org/miscellaneous/1566038-computer-network-and-management
(Computer Network and Management Case Study Example | Topics and Well Written Essays - 7000 Words)
Computer Network and Management Case Study Example | Topics and Well Written Essays - 7000 Words. https://studentshare.org/miscellaneous/1566038-computer-network-and-management.
“Computer Network and Management Case Study Example | Topics and Well Written Essays - 7000 Words”, n.d. https://studentshare.org/miscellaneous/1566038-computer-network-and-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Network and Management

Computer Network Management in Transcom Tax Analysis Ltd

The paper "computer network Management in Transcom Tax Analysis Ltd " discusses that the network will interconnect all the functional areas of the company, Transcom Tax Analysis Ltd and their interconnection will help in the data communication process.... hellip; In general, the company, Transcom Tax Analysis Ltd, is also concerned about its network security.... The ring-shaped network basically uses baseband transmission with the token access method....
8 Pages (2000 words) Case Study

Network Infrastructure Basics

The paper "Network Infrastructure Basics" describes that the network and sharing center is a tool like a network mapping and network location that allows viewing and specific additional settings and profiling of networks.... There are numerous TCP/IP protocol suites, and the wider category include web browsing, security protocols, file transfer, E-mail, network services, network management, transport protocols, and control protocols.... The application can also be used for network connectivity troubleshooting issues....
4 Pages (1000 words) Assignment

Hardening Computer Networks

At the present, the majority of organizations carry out their business activities using computers and when the number of computers increases they need to form a computer network.... A computer network allows a number of employees to access and process data simultaneously.... In view… the fact that a computer network is an essential part of almost every organization that processes data on a regular basis hence it becomes essential for them to secure their computer network from a wide variety of security threats....
7 Pages (1750 words) Essay

Next Generation Telecommunications Networks

The software allows computers to interact with other computers through the management of resources.... Through the Database management System (DBMS), users have the ability to create, maintain, and access a database.... The other component is the availability of a network.... There are various requirements for computer communication.... Such components include computer hardware.... These are the tangible physical components of the computer....
4 Pages (1000 words) Essay

Evolution of Computer Networks and Their Improvement

The term computer network is used to refer to a network that is based on the system of telecommunications and it enables more than one computer to share and transfer data with other computers and this is why it is even recognized as data network.... During the period of 1950s the first and the foremost computer network was experienced in the shape of a radar system that was utilized by the armed forces and this radar system was recognized as SAGE (Semi-Automatic Ground Environment) (Casey, 2011, p....
8 Pages (2000 words) Essay

Data Privacy and Security

This essay "Data Privacy and Security" presented some of the important features of computer security those need to be maintained for the sake of effective security management.... hellip; The data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network.... oreover, the term “computer security” is very commonly used, though; the information and data saved on a computer are in danger to few risks unless the computer is connected to other systems using a network....
8 Pages (2000 words) Essay

France Vacances Project Implementation and Design

?? A secondary goal of this project was to develop a booking system management server to setup, host and to deal with transaction between clients and the travel agency.... This can be considered essential specifically in the completion of the requirements related to the performance of operations management....
10 Pages (2500 words) Assignment

A Computer Network as a group of Computers Linked Together

A computer network is a group of computers which are linked together.... A computer network is a group of computers which are linked together.... Additionally, the organization seeks to improve information sharing between branches so as to integrate the various departments of each branch with the central management.... Network Designs/ Topologies The management of the hotel can determine the topology to adapt depending on the nature of information sharing....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us