Computer Science Discussion
1. Show how to construct a send-constrained channel from a receive-constrained channel, and vice versa. Hint: use a trusted node connected to the given channel.
2. Discuss the applicability to mobile and ubiquitous systems of techniques drawn from the areas of: i) peer-to-peer systems; ii) coordination and agreement protocols; iii) replication.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.