COMPUTER SCIENCE ASSIGNMENT
1. Show how to construct a send-constrained channel from a receive-constrained channel, and vice versa. Hint: use a trusted node connected to the given channel.
2. Discuss the applicability to mobile and ubiquitous systems of techniques drawn from the areas of:
i) peer-to-peer systems
ii) coordination and agreement protocols
iii) replication.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.