Describe the ways in which the request-reply protocol masks the heterogeneity of operating
systems and of computer networks.

What will be an ideal response?

(i) Different operating systems may provide a variety of different interfaces to the communication protocols.
These interfaces are concealed by the interfaces of the request-reply protocol.
(ii) Although the Internet protocols are widely available, some computer networks may provide other
protocols. The request-reply protocol may equally be implemented over other protocols.
[In addition it may be implemented over either TCP or UDP.]

Computer Science & Information Technology

You might also like to view...

In the Outlook Web App, the Reading Pane is on the right side of the screen by default

Indicate whether the statement is true or false

Computer Science & Information Technology

To follow the principle of least privilege, the selectionSort function should receive the array to be sorted as:

a. A nonconstant pointer to nonconstant data. b. A nonconstant pointer to constant data. c. A constant pointer to nonconstant data. d. A constant pointer to constant data.

Computer Science & Information Technology