计算机网络chapter1
- 格式:ppt
- 大小:1.95 MB
- 文档页数:46
计算机网络第一章客观题Computer NetworksChapter 1(答案见末尾)1.1 In the following options, which does not define in protocol? ( )A the format of messages exchanged between two or more communicating entitiesB the order of messages exchanged between two or more communicating entitiesC the actions taken on the transmission of a message or other eventD the transmission signals are digital signals or analog signals1.2 In the following options, which is defined in protocol? ( )A the actions taken on the transmission and/or receipt of a message or other eventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts1.3 An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes ( ).A flow controlB congestion-controlC reliable data transferD connection-oriented service1.4 The Internet’s connection-oriented service has a name, it is ( ).B UDPC TCP/IPD IP1.5 The Internet’s connectionless service is called ( ).A TCPB UDPC TCP/IPD IP1.6 Which of the following nodes belongs to the network core?A. a Web ServerB. a Host with Win2003 ServerC. a Router with NAT serviceD. a Supernode on Skype Network1.7 In the Internet, the equivalent concept to end systems is ( ).A hostsB serversC clientsD routers1.8 In the Internet, end systems are connected together by ( ).A copper wireB coaxial cableC communication linksD fiber optics1.9 End systems access to the Internet through its ( ).A modemsB protocolsD sockets1.10 In the following options, which belongs to the network core? ( )A end systemsB routersC clientsD servers1.11 End systems, packet switches, and other pieces of the Internet, run ( ) that control the sending and receiving of information within the Internet.A programsB processesC applicationsD protocols1.12 The internet allows ( ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications1.13 The protocols of various layers are called ( ).A the protocol stackB TCP/IPC ISPD network protocol1.14 The lower layers of the OSI model are, in correct orderA. physical, system, network, logicalB. physical, logical, network, systemC. physical, transport, network, data linkD. physical, data link, network, transport1.15 The Internet Protocol (IP) generally corresponds to which OSI layer?A. Network (layer three)B. Transport (layer four)C. Data link (layer two)D. Session (layer five)1.16 What layer of the OSI model is designed to perform error detection functions?A. PhysicalB. Data linkC. NetworkD. transport1.17 Which of the following protocol layers is not explicitly part of the Internet Protocol Stack? _________A. application layerB. session layerC. data link layerD. transport layer1.18 The 5-PDU is called___A. messageB. segmentC. datagramD. frame1.19 The Int ernet’s network layer is responsible for moving network-layer packets known as ( ) from one host to another.A frameB datagramC segmentD message1.20 Transport-layer packets are called:A. messageB. segmentC. datagramD. frame1.21 The units of data exchanged by a link-layer protocol are called ( ).A FramesB SegmentsC DatagramsD bit streams1.22 There are two fundamental approaches to building a network core, ( ) and packet switching.A electrical current switchingB circuit switchingC data switchingD message switching1.23 Datagram networks and virtual-circuit networks differ in that ( ).A datagram networks are circuit-switched networks, and virtual-circuit networks are packet-switched networks.B datagram networks are packet-switched networks, and virtual-circuit networks are circuit-switched networks.C datagram networks use destination addresses and virtual-circuit networks use VC. numbers to forward packets toward their destination.D datagram networks use VC. numbers and virtual-circuit networks use destination addresses to forward packets toward their destination.1.24 ( ) means that the switch must receive the entire packetbefore it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM1.25 In ( ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration of the communication session.A packet-switchedB data-switchedC circuit-switchedD message-switched1.26 In ( ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched1.27 In a circuit-switched network, if each link has n circuits, for each link used by the end-to-end connection, the connection gets ( ) of the link’s bandwidth for the duration of the connection.A a fraction 1/nB allC 1/2D n times1.28 For ( ), the transmission rate of a circuit is equal to the frame rate multiplied by thenumber of bits in a slot.A CDMAB packet-switched networkC TDMD FDM1.29 The network that forwards packets according to host destination addresses is called ( ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram1.30 The network that forwards packets according to virtual-circuit numbers is called ( ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram1.31 The time required to propagate from the beginning of the link to the next router is ( ).A queuing delayB processing delayC propagation delayD transmission delay1.32 Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet1.33 In the following four descriptions, which one is correct? ( )A The traffic intensity must be greater than 1.B The fraction of lost packets increases as the traffic intensity decreases.C If the traffic intensity is close to zero, the average queuing delay will be close to zero.D If the traffic intensity is close to one, the average queuing delay will be close to one.1.34 Suppose, a is the average rate at which packets arrive at the queue, R is the transmission rate, and all packets consist of L bits, then the traffic intensity is ( ),A LR/aB La/RC Ra/LD LR/a1.35 Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing delay, propagation delay, and processing delay.) ( )A L/R1+L/R2B L/R1C L/R2D none of the above1.36 We are sending a 30 Mbit MP3 file from a source host to a destination host. Suppose there is only one link between source and destination and the link has a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km.Also suppose that message switching is used, with the message consisting of the entire MP3 file. How many bits will the source have transmitted when the first bit arrives at the destination?A. 1 bitB. 30,000,000 bitsC. 500,000 bitsD. none of the above1.37 In the following entries, which is not a kind of access network?( )A residential accessB company accessC wireless accessD local access1.38 The following technologies may be used for residential access, exceptA. HFCB. DSLC. Dial-up modemD. FDDI1.39 Which kind of media is not a guided media? ( )A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel1.40 在OSI 参考模型中,直接为会话层提供服务的是____。
课后习题答案:Chapter 1:Review questions: 1,4,11,13,15,16,18,19,23,25,261没有不同,在本文书中,“主机”和“终端系统”可以互换使用。
终端系统包括PCs ,工作站,Web 服务器,电子邮件服务器,连接Internet 的PDA ,WebTV 等。
41 通过电话线拨号调制解调器:住宅2 通过电话线的DSL :住宅或小型办公室3 光纤电缆:住宅4 100 Mbps 交换以太网:公司5 无线LAN :移动电话6 蜂窝移动接入(例如WAP ):移动电话11电路交换网络可以为一个通话保证特定数量的端到端带宽。
大多数现在分组交换网络(包括Internet )可以提供所有端到端带宽保证。
13在时间t0发送主机开始传输。
在t1 = L/R1时,发送主机完成传输并且整个分组到达路由器(没有传播延迟)。
因为路由器在时间t1拥有整个分组,所以它在时间t1开始向接收主机传输此分组。
在时间t2 = t1 + L/R2,路由器完成传输并且接收主机接收整个分组(也没有传播延迟)。
因此端到端延迟是L/R1 + L/R2。
15a) 可以支持两个用户因为每个用户需要一半的链路带宽。
b) 因为在传输过程中每个用户需要1Mbps ,如果两个或更上用户同时传输,那么最大需要2Mbs 。
因为共享的链路的可用带宽是2Mbps ,所以在链接之前没有排队延迟。
然而,如果三个用户同时传输,那么需要的带宽将是3Mbps ,它大于共享链路的可用带宽,在这种情况下在链接前存在排队延迟。
c) 给定用户传输的概率是0.2。
d) 所有三个用户同时传输的概率是()333133--⎪⎪⎭⎫ ⎝⎛p p = (0.2)3 = 0.008。
因为当所有用户都传输时,队列增加,所以在队列增加的分数(它等于所有三个用户同时传输的概率)是0.008。
16延迟组件是处理延迟,传输延迟,传播延迟和排队延迟。
除了排队延迟是变化的,其它所有延迟都是固定的。
Chapter 1 Computer Networks and the Internet networks use VC. numbers to forward packets toward their1.The ( ) is a worldwide computer network, that is, a network that destination.interconnects millions of computing devices throughout the world. D datagram networks use VC. numbers and virtual-circuit networks ppt3 use destination addresses to forward packets toward their destination.A public Internet 9.In the following options, which one is not a guided media? ( )B Intranet A twisted-pair wireC switch net B fiber opticsD television net C coaxial cable2.Which kind of media is not a guided media? ( ) D satelliteA twisted-pair copper wire 10.Processing delay does not include the time to ( ).B a coaxial cable A examine the packet’s headerC fiber optics B wait to transmit the packet onto the linkD digital satellite channel C determine where to direct the packetD check bit-error in the packet3.Which kind of media is a guided media? ( )11.In the following four descriptions, which one is correct? ( )A geostationary satelliteB low-altitude satelliteC fiber opticsD wireless LAN A The traffic intensity must be greater than 1.B The fraction of lost packets increases as the traffic intensity decreases.C If the traffic intensity is close to zero, the average queuing delay 4.The units of data exchanged by a link-layer protocol are called ( ).will be close to zero. A FramesD If the traffic intensity is close to one, the average queuing delay B Segmentswill be close to one. C Datagrams12.The Internet’s network layer is responsible for moving network-layer D bit streamspackets known as ( ) from one host to another. 5.Which of the following option belongs to the circuit-switched networks?A frame ( )B datagram A FDMC segment B TDMD message C VC networks13.The protocols of various layers are called ( ). D both A and BA the protocol stack 6.( )makes sure that neither side of a connection overwhelms the otherB TCP/IPside by sending too many packets too fast.C ISPA Reliable data transferD network protocolB Flow control14.There are two classes of packet-switched networks: ( ) networks andC Congestion controlvirtual-circuit networks.D Handshaking procedureA datagram7.( ) means that the switch must receive the entire packet before it canB circuit-switchedbegin to transmit the first bit of the packet onto the outbound link.C television A Store-and-forward transmissionB FDMD telephoneC End-to-end connection 15.Access networks can be loosely classified into three categories:D TDM residential access, company access and ( ) access.8.Datagram networks and virtual-circuit networks differ in that ( ).A cabledA datagram networks are circuit-switched networks, andB wirelessvirtual-circuit networks are packet-switched networks.B datagram networks are packet-switched networks, andC campusD city areavirtual-circuit networks are circuit-switched networks.Question 16~17 C datagram networks use destination addresses and virtual-circuit1D distributed applicationsSuppose, a is the average rate at which packets arrive at the queue, R is24.The Internet provides two services to its distributed applications: a the transmission rate, and all packets consist of L bits, then the trafficintensity is ( 16 ), and it should no greater than ( 17 ). connectionless unreliable service and () service.A flow control16. A LR/aB connection-oriented reliableB La/RC congestion controlC Ra/LD TCP25.It defines the format and the order of messages exchanged between twoD LR/aor more communicating entities, as well as the actions taken on the 17.A 2B 1 transmission and/or receipt of a message or other event. The sentence describes ( ).C 0A InternetD -1B protocol 18.In the Internet, the equivalent concept to end systems is ( ).C intranet A hostsD network B servers26.In the following options, which does not define in protocol? ( )C clientsA the format of messages exchanged between two or more D routerscommunicating entities 19.In the Internet, end systems are connected together by ( ).B the order of messages exchanged between two or more A copper wirecommunicating entities B coaxial cableC the actions taken on the transmission of a message or other eventC communication linksD the transmission signals are digital signals or analog signals 模拟D fiber optics信号20.End systems access to the Internet through its ( ).27.In the following options, which is defined in protocol? ( ) A modemsA the actions taken on the transmission and/or receipt of a message orB protocolsother eventC ISPB the objects exchanged between communicating entities D socketsC the content in the exchanged messages21.End systems, packet switches, and other pieces of the Internet, run ( )D the location of the hosts that control the sending and receiving of information within the28.In the following options, which does not belong to the network edge?Internet.( )A programsA end systemsB processesB routersC applicationsC clientsD protocolsD servers22.There are many private networks, such as many corporate and29.In the following options, which belongs to the network core? ( ) government networks, whose hosts cannot exchange messages withA end systemshosts outside of the private network. These private networks are oftenB routersreferred to as ( ).C clientsA internetsD serversB LAN30.In the following options, which is not the bundled with the Internet ’s C intranetsconnection-oriented service? ( ) D WANA reliable data transfer23.The internet allows ( ) running on its end systems to exchange dataB guarantee of the transmission timewith each other.C flow control***A clients applicationsD congestion-controlB server applications31.An application can rely on the connection to deliver all of its data C P2P applicationswithout error and in the proper order. The sentence describes ( ).2***A flow control C data switchingB congestion-control D message switchingC reliable data transfer 40.In ( ) networks, the resources needed along a path to provide forD connection-oriented service communication between the end system are reserved for the duration 持续of the communication session. 32.It makes sure that neither side of a connection overwhelms 淹没压倒the other side by sending too many packets too fast. The sentence A packet-switcheddescribes ( ). B data-switchedA flow control C circuit-switchedB congestion-control D message-switchedC connection-oriented service 41.In ( ) networks, the resources are not reserved; a session’s messagesD reliable data transfer use the resources on demand, and as a consequence, may have to wait 33.It helps prevent the Internet from entering a state of gridlock. When a for access to communication link.packet switch becomes congested, its buffers can overflow and packet A packet-switchedloss can occur. The sentence describes ( ). B data-switchedA flow control C circuit-switchedB congestion-control D message-switchedC connection-oriented service 42.In a circuit-switched network, if each link has n circuits, for each linkD reliable data transfer used by the end-to-end connection, the connection gets ( ) of the 34.The Internet’s connection-oriented service has a name, it is ( ). link ’s bandwidth for the duration of the connection.A TCP A a fraction 1/nB UDP B allC TCP/IP C 1/2D IP D n times35.In the following options, which service does not be provided to an 43.For ( ), the transmission rate of a circuit is equal to the frame rate application by TCP?( ) multiplied by the number of bits in a slot.A reliable transport A CDMAB flow control B packet-switched networkC video conferencing C TDMD congestion control D FDM36.The Internet’s connectionless service is called ( ). 44.( ) means that the switch must receive the entire packet before it canA TCP begin to transmit the first bit of the packet onto the outbound link.B UDP A Queuing delayC TCP/IP B Store-and-forward transmissionD IP C Packet loss37.In the following options, which does not use TCP?( ) D PropagationA SMTP 45.The network that forwards packets according to host destinationB internet telephone addresses is called ( ) network.C FTP A circuit-switchedD HTTP B packet-switched38.In the following options, which does not use UDP?( ) C virtual-circuitA Internet phone D datagramB video conferencing 46.The network that forwards packets according to virtual-circuit numbersC streaming multimedia is called ( ) network.D telnet A circuit-switched39.There are two fundamental approaches to building a network core, ( ) B packet-switchedand packet switching. C virtual-circuitA electrical current switching D datagramB circuit switching3。
自顶向下和互联网特色基于实验和探究式教学计算机网络Chapter 1 Introduction宁波大学信息科学与工程学院1-1这真的是一个问题!Packet switching allows more users to use network!报交换允许用户使用网络!比如:1M链路每个用户使用时需要100kbps,10%的使用率电路交换:10个用户包交换:35个用户(假设:超过10个用户同时使用的概率小于0.17%小于10个用户同时使用的概率为99.83%)对突发数据较好:资源共享简单,没有呼叫建立过分拥挤:包延迟或丢失协议需要数据重传和拥塞控制Q:如何提供接近电路的特性?音频和视频应用需要带宽保障(QOS)以R速率传输L数据需要化L/R秒(一次存储转发)整个包需要在能够被传送到下一个链接前到达路由器总的延迟=SUM(每次延迟)=3L/R (图例)1-28Now break up the message 1 msec to transmit packet on each link works in 1ms*5000+3ms=5.003 sec!如果将整个消息分隔为5000个包:每个包1500bits1500bits/1.5Mbps =1ms 传输到下一个链接并行传输:每个链接并行工作延迟由15s 减到1ms*5000+2ms=5.002sDelay and Loss.数据包在路由器的缓存中排队包到达速度会超过输出速度包就要排队,等待转发可用缓存:如果不足到达的包就会被丢弃(丢包)数据包延迟的4种原因:1.节点处理检查位错误决定输出链路2.排队等待输出发送的时间取决于路由器的拥塞层度在包交换网络中的延迟:3.发送延迟R=链路速度bpsL=包长度bits发送到链路的时间=L/R(如果考虑先全部接收再转发,整体时延=2L/R)4.传播延迟d=物理链路长度s=在媒体中的传播速度传播延迟=d/s注意:s和R是完全不同的(数量级和性质)节点延迟节点延迟=处理延迟+排队延迟+发送延迟+传播延迟处理延迟:典型的是毫秒级目的是决定输出链路排队延迟:依赖于拥塞状况(会造成延迟和丢失)发送延迟:在低速链路会较大传播延迟:几毫秒到几千毫秒卫星链路传播延迟会超过发送延迟1-59q❑Cars “propagate” at 100 km/hrq❑Toll booth takes 12 sec to service a car (transmission time)mcar~=bit; m caravan ~= packetq❑Q: How long until caravan is lined up before 2nd toll booth?q❑Time to “push” entire caravan through toll booth onto highway = 12*10 = 120 secq❑Time for last car to propagate from 1st to 2nd toll booth: 100km/(100km/hr)= 1 hrq❑TOTAL=120s+1hr= 62 minutestoll booth tollbooth ten-carcaravan 100 km100 km人类的车队类比:车辆传播(行驶)速度:100km/hr收费站每辆车:12s车辆=数据位,车队=数据包Q:车队到达第二个收费站要多长时间?整个车队通过第一个收费站上高速=12*10=120s 最后一辆车从第一个收费站到第二个收费站=100km/(100km/hr)=1hr 总计=120s+1hr=62mins1-60q❑Cars now “propagate” at 1000 km/hrq❑Toll booth now takes 1 min to service a carq❑Q: Will cars arrive to 2nd booth before all cars serviced at 1st booth?q❑Yes! After 7 min m1st car at 2nd booth m leave 3 cars still at 1st booth.q❑1st bit of packet can arrive at 2nd router before packet is fully transmitted at 1st router! (See also CSMA/CD in chap 5)toll booth tollbooth ten-carcaravan 100 km100 km车辆传播(行驶)速度:1000km/hr收费站每辆车:1minsQ:整个车队通过第一个前有车辆会到收费站吗?是的,7min 后:第一辆车到达第二个收费站 至少还有三辆车还在第一个收费站(我们要保证:)整个数据包在其第一个bit 到达第二个路由器前,必须还在第一个路由器上发送。
计算机网络英文题库附答案c h a p t e r精编W O R D版IBM system office room 【A0816H-A0912AAAHH-GX8Q8-GNTHHJ8】Chapter 1 Computer Networks and the Internet 1.The ( ) is a worldwide computer network, that is, a network that interconnects millions of computing devices throughout the world.ppt3A public InternetB IntranetC switch netD television net2.Which kind of media is not a guided media ( )A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel3.Which kind of media is a guided media ( )A geostationary satelliteB low-altitude satelliteC fiber opticsD wireless LAN4.The units of data exchanged by a link-layer protocol are called ( ).A FramesB SegmentsC DatagramsD bit streams5.Which of the following option belongs to the circuit-switched networks ( )A FDMB TDMC VC networksD both A and B6.( )makes sure that neither side of aconnection overwhelms the other side bysending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure7.( ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM8.Datagram networks and virtual-circuit networks differ in that ( ).A datagram networks are circuit-switchednetworks, and virtual-circuit networks arepacket-switched networks.B datagram networks are packet-switchednetworks, and virtual-circuit networks arecircuit-switched networks.C datagram networks use destinationaddresses and virtual-circuit networks useVC. numbers to forward packets towardtheir destination.D datagram networks use VC. numbersand virtual-circuit networks use destinationaddresses to forward packets toward theirdestination.9.In the following options, which one is not a guided media ( )A twisted-pair wireB fiber opticsC coaxial cableD satellite10.Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet11.In the following four descriptions, which one is correct ( )A The traffic intensity must be greaterthan 1.B The fraction of lost packets increases asthe traffic intensity decreases.C If the traffic intensity is close to zero,the average queuing delay will be close tozero.D If the traffic intensity is close to one, theaverage queuing delay will be close to one.12.The Internet’s network layer isresponsible for moving network-layerpackets known as ( ) from one host toanother.A frameB datagramC segmentD message13.The protocols of various layers are called ( ).A the protocol stackB TCP/IPC ISPD network protocol14.There are two classes of packet-switched networks: ( ) networks and virtual-circuitnetworks.A datagramB circuit-switchedC televisionD telephone15.Access networks can be loosely classified into three categories: residential access,company access and ( ) access.A cabledB wirelessC campusD city areaQuestion 16~17Suppose, a is the average rate at which packets arrive at the queue, R is the transmission rate, and all packets consist of L bits, then the traffic intensity is ( 16 ), and it should no greater than ( 17 ).16.A LR/aB La/RC Ra/LD LR/a 17.A 2B 1C 0D -118.In the Internet, the equivalent concept to end systems is ( ).A hostsB serversC clientsD routers19.In the Internet, end systems are connected together by ( ).A copper wireB coaxial cableC communication linksD fiber optics20.End systems access to the Internet through its ( ).A modemsB protocolsC ISPD sockets21.End systems, packet switches, and other pieces of the Internet, run ( ) that controlthe sending and receiving of informationwithin the Internet.A programsB processesC applicationsD protocols22.There are many private networks, such as many corporate and government networks,whose hosts cannot exchange messageswith hosts outside of the private network.These private networks are often referredto as ( ).A internetsB LANC intranetsD WAN23.The internet allows ( ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications24.The Internet provides two services to its distributed applications: a connectionlessunreliable service and () service.A flow controlB connection-oriented reliableC congestion controlD TCP25.It defines the format and the order of messages exchanged between two or morecommunicating entities, as well as theactions taken on the transmission and/orreceipt of a message or other event. Thesentence describes ( ).A InternetB protocolC intranetD network26.In the following options, which does not define in protocol ( )A the format of messages exchangedbetween two or more communicatingentitiesB the order of messages exchangedbetween two or more communicatingentitiesC the actions taken on the transmission ofa message or other eventD the transmission signals are digitalsignals or analog signals27.In the following options, which is defined in protocol ( )A the actions taken on the transmissionand/or receipt of a message or othereventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts28.In the following options, which does not belong to the network edge ( )A end systemsB routersC clientsD servers29.In the following options, which belongs to the network core ( )A end systemsB routersC clientsD servers30.In the following options, which is not the bundled with the Internet’s connection-oriented service( )A reliable data transferB guarantee of the transmission timeC flow controlD congestion-control31.An application can rely on the connection to deliver all of its data without error andin the proper order. The sentencedescribes ( ).A flow controlB congestion-controlC reliable data transferD connection-oriented service32.It makes sure that neither side of aconnection overwhelms the other side bysending too many packets too fast. Thesentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer33.It helps prevent the Internet from enteringa state of gridlock. When a packet switchbecomes congested, its buffers canoverflow and packet loss can occur. Thesentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer34.The Internet’s connection-oriented service has a name, it is ( ).A TCPB UDPC TCP/IPD IP 35.In the following options, which service does not be provided to an application by TCP( )A reliable transportB flow controlC video conferencingD congestion control36.The Internet’s connectionless service is called ( ).A TCPB UDPC TCP/IPD IP37.In the following options, which does not use TCP()A SMTPB internet telephoneC FTPD HTTP38.In the following options, which does not use UDP( )A Internet phoneB video conferencingC streaming multimediaD telnet39.There are two fundamental approaches to building a network core, ( ) and packetswitching.A electrical current switchingB circuit switchingC data switchingD message switching40.In ( ) networks, the resources needed along a path to provide forcommunication between the end systemare reserved for the duration of thecommunication session.A packet-switchedB data-switchedC circuit-switchedD message-switched41.In ( ) networks, the resources are not reserved; a session’s messages use theresources on demand, and as aconsequence, may have to wait for accessto communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched42.In a circuit-switched network, if each link has n circuits, for each link used by theend-to-end connection, the connectiongets ( ) of the link’s bandwidth for theduration of the connection.A a fraction 1/nB allC 1/2D n times43.For ( ), the transmission rate of a circuit is equal to the frame rate multiplied by thenumber of bits in a slot.A CDMAB packet-switched networkC TDMD FDM 44.( ) means that the switch must receive the entire packet before it can begin totransmit the first bit of the packet onto theoutbound link.A Queuing delayB Store-and-forward transmissionC Packet lossD Propagation45.The network that forwards packetsaccording to host destination addresses iscalled ( ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram46.The network that forwards packetsaccording to virtual-circuit numbers iscalled ( ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram47.In the following entries, which is not a kind of access network()A residential accessB company accessC wireless accessD local access48.Suppose there is exactly one packet switch between a sending host and a receivinghost. The transmission rates between thesending host and the switch and betweenthe switch and the receiving host are R1and R2, respectively. Assuming that theswitch uses store-and-forward packetswitching, what is the total end-to-enddelay to send a packet of length L (Ignorequeuing delay, propagation delay, andprocessing delay.) ( )A L/R1+L/R2B L/R1C L/R2D none of the above49.The time required to examine thepacket’s header and determine where todirect the packet is part of the ( ).A queuing delayB processing delayC propagation delayD transmission delay50.The time required to propagate from the beginning of the link to the next router is( ).A queuing delayB processing delayC propagation delayD transmission delay51.Consider sending a packet of 3000bits over a path of 5 links. Each link transmits at 1000bps. Queuing delays, propagation delay and processing delay are negligible. (6 points) (1).Suppose the network is a packet-switched virtual circuit network. VC setup time is 0.1 seconds. Suppose the sending layers add a total of 500 bits of header to each packet. How long does it take to send the file from source to destination?(2).Suppose the network is a packet-switched datagram network and a connectionless serviceis used. Now suppose each packet has 200 bitsof header. How long does it take to send the file?(3).Suppose that the network is a circuit-switched network. Further suppose that the transmission rate of the circuit between sourceand destination is 200bps. Assuming 0.02s setuptime and 200 bits of header appended to the packet, how long does it take to send the packet?So lution:(1).t=5*(3000+500)/1000+0.1=17.6s( 2).t=5*(3000+200)/1000=16s( 3).t=(3000+200)/200+0.02=16.02s。
计算机信息网络国际联网安全保护管理办法Computer Information Network and Internet Security, Protectionand Management Regulations(1997年12月11日国务院批准, 1997年12月30日公安部发布)(Approved by the State Council on December 11, 1997 and promulgated by the Ministry of Public Security on December 30,1997)第一章总则Chapter I. Comprehensive Regulations第一条为了加强对计算机信息网络国际联网的安全保护,维护公共秩序和社会稳定,根据《中华人民共和国计算机信息系统安全保护条例》、《中华人民共和国计算机信息网络国际联网管理暂行规定》和其他法律、行政法规的规定,制定本办法。
Article 1.In order to strengthen the security and the protection of computer information networks and of the Internet, and to preserve the social order and social stability,these regulations have been established on the basis of the ”PRC Computer Information Network Protection Regulations",the ”PRC Temporary Regulations on Computer Information Networks and the Internet" and other laws and administrative regulations。
计算机网络第四版(课后练习+答案)计算机网络第四版(课后练习+答案)Introduction:计算机网络是现代信息技术的基础,它涉及到计算机与计算机之间如何进行数据交换和通信。
《计算机网络第四版》是一本权威指南,提供了大量的课后练习和答案,帮助读者加强对计算机网络的理解。
本文将对《计算机网络第四版》课后练习和答案进行综述,以便读者更好地掌握网络通信的关键概念和原理。
Chapter 1: Introduction to Networking在第一章中,课后练习的内容涵盖了计算机网络的基本概念和发展历程。
学习者可以通过这些练习加深对网络通信的了解,例如描述计算机网络的基本组成部分、定义OSI模型的七层结构以及解释分组交换和电路交换的区别。
Chapter 2: Network Models第二章课后练习着重介绍了计算机网络的各种模型,包括OSI模型和TCP/IP模型。
练习题目涵盖了每个模型的层次结构和功能,同时还要求学习者能够比较这两个模型之间的异同点。
Chapter 3: Physical Layer and Media物理层和传输介质是计算机网络的基础,第三章课后练习起到了巩固和扩展这些概念的作用。
学习者将通过回答问题和解决实际情况的案例,深入理解诸如数据信号的调制和解调、传输介质的特性以及常见的物理层设备等内容。
Chapter 4: Data Link Layer数据链路层构建在物理层之上,并处理节点到节点之间的数据传输。
第四章的课后练习要求学习者熟练掌握数据链路层的基本概念,包括帧的封装和解封装、错误检测和纠正技术以及介绍局域网和广域网等。
Chapter 5: Network Layer网络层负责数据包的转发和路由选择,在第五章的练习题中,学习者需要回答关于IP地址的分配和路由表的设计的问题,深入理解网络层的功能和特性。
还会涉及到IP协议的各种细节,例如子网划分、地址转换和网络控制协议等。
Chapter 6: Transport Layer传输层提供端到端的可靠数据传输服务,第六章的课后练习通过设计案例和讨论问题的方式,帮助学习者掌握TCP和UDP协议的细节和应用场景。
Chapter 1 Computer Networks and the Internet 1.The The ( ( ) ) is is is a a a worldwide worldwide worldwide computer computer computer network, network, network, that that that is, is, is, a a a network network network that that interconnects millions of computing devices throughout the world. ppt3 A public Internet B Intranet C switch net D television net 2.Which kind of media is not a guided media? ( ) A twisted-pair copper wire B a coaxial cable C fiber optics D digital satellite channel 3.Which kind of media is a guided media? ( ) A geostationary satellite B low-altitude satellite C fiber optics D wireless LAN 4.The units of data exchanged by a link-layer protocol are called ( ). A Frames B Segments C Datagrams D bit streams 5.Which of the following option belongs to the circuit-switched networks? ( ) A FDM B TDM C VC networks D both A and B 6.( )makes sure that that neither neither neither side side side of of of a a a connection overwhelms connection overwhelms the the other other side by sending too many packets too fast. A Reliable data transfer B Flow control C Congestion control D Handshaking procedure 7.( ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link. A Store-and-forward transmission B FDM C End-to-end connection D TDM 8.Datagram networks and virtual-circuit networks differ in that ( ). A datagram networks are circuit-switched networks, and virtual-circuit networks are packet-switched networks. B datagram networks are packet-switched networks, and virtual-circuit networks are circuit-switched networks. C datagram networks use destination addresses and virtual-circuit networks use VC. numbers to forward packets toward their destination. D datagram networks use VC. numbers and virtual-circuit networks use destination addresses to forward packets toward their destination. 9.In the following options, which one is not a guided media? ( ) A twisted-pair wire B fiber optics C coaxial cable D satellite 10.Processing delay does not include the time to ( ). A examine the packet ’s header B wait to transmit the packet onto the link C determine where to direct the packet D check bit-error in the packet 11.In the following four descriptions, which one is correct? ( ) A The traffic intensity must be greater than 1. B The fraction of lost packets increases as the traffic intensity decreases. C If the traffic intensity is close to zero, the average queuing delaywill be close to zero. D If the traffic intensity is close to one, the average queuing delay will be close to one. 12.The The Internet Internet Internet’’s s network network network layer layer layer is is is responsible responsible responsible for for for moving moving moving network-layer network-layer packets known as ( ) from one host to another. A frame B datagram C segment D message 13.The protocols of various layers are called ( ). A the protocol stack B TCP/IP C ISP D network protocol 14.There are two classes of packet-switched networks: ( ) networks and virtual-circuit networks. A datagram B circuit-switched C television D telephone 15.Access networks can be loosely classified into three categories: residential access, company access and ( ) access. A cabled B wireless C campus D city area Question 16~17 Suppose, a is the average rate at which packets arrive at the queue, R is the the transmission transmission transmission rate, rate, rate, and and and all all all packets packets packets consist consist consist of of L bits, bits, then then then the the the traffic traffic intensity is ( 16 ), and it should no greater than ( 17 ). 16. A LR /aB La /RC Ra /L D LR /a 17.A 2 B 1 C 0 D -1 18.In the Internet, the equivalent concept to end systems is ( ). A hosts B servers C clients D routers 19.In the Internet, end systems are connected together by ( ). A copper wire B coaxial cable C communication links D fiber optics 20.End systems access to the Internet through its ( ). A modems B protocols C ISP D sockets 21.End systems, packet switches, and other pieces of the Internet, run ( ) that control the sending and receiving of information within the Internet. A programs B processes C applications D protocols 22.There are many private networks, such as many corporate and government networks, whose hosts cannot exchange messages with hosts outside of the private network. These private networks are often referred to as ( ). A internets B LANC intranets D W AN 23.The internet allows ( ) running on its end systems to exchange data with each other. A clients applications B server applications C P2P applications D distributed applications 24.The Internet provides two services to its distributed applications: a connectionless unreliable service and () service. A flow control B connection-oriented reliable C congestion control D TCP 25.It defines the format and the order of messages exchanged between twoor more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event. The sentence describes ( ). A Internet B protocol C intranet D network 26.In the following options, which does not define in protocol? ( ) A the format of messages exchanged between two or more communicating entities B the order of messages exchanged between two or more communicating entities C the actions taken on the transmission of a message or other evenD the transmission signals are digital signals or analog signals 27.In the following options, which is defined in protocol? ( ) A the actions taken on the transmission and/or receipt of a message oother event B the objects exchanged between communicating entities C the content in the exchanged messages D the location of the hosts 28.In the following options, which does not belong to the network edge( ) A end systems B routers C clients D servers 29.In the following options, which belongs to the network core? ( ) A end systems B routers C clients D servers 30.In the following options, which is not the bundled with the Internet ’s connection-oriented service? ( ) A reliable data transfer B guarantee of the transmission time C flow control D congestion-control 31.An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes ( ). A flow control B congestion-control C reliable data transfer D connection-oriented service 32.It makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast. The sentence describes ( ). A flow control B congestion-control C connection-oriented service D reliable data transfer 33.It helps prevent the Internet from entering a state of gridlock. When a packet switch becomes congested, its buffers can overflow and packet loss can occur. The sentence describes ( ). A flow control B congestion-control C connection-oriented service D reliable data transfer 34.The Internet ’s connection-oriented service has a name, it is ( ). A TCP B UDP C TCP/IP D IP 35.In In the the the following following following options, options, options, which which which service service service does does does not not not be be be provided provided provided to to to an an application by TCP?( ) A reliable transport B flow control C video conferencing D congestion control 36.The Internet ’s connectionless service is called ( ). A TCP B UDP C TCP/IP D IP 37.In the following options, which does not use TCP?( ) A SMTP B internet telephone C FTP D HTTP 38.In the following options, which does not use UDP?( ) A Internet phone B video conferencing C streaming multimedia D telnet 39.There are two fundamental approaches to building a network core, ( ) and packet switching. A electrical current switching B circuit switching C data switching D message switching 40.In ( ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration ofthe communication session. A packet-switched B data-switched C circuit-switched D message-switched 41.In ( ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link. A packet-switched B data-switched C circuit-switched D message-switched 42.In a circuit-switched network, if each link has n circuits, for each link used by the end-to-end connection, the connection gets ( ) of the link link’’s bandwidth for the duration of the connection. A a fraction 1/n B all C 1/2 D n times 43.For ( ), the transmission rate of a circuit is equal to the frame rate multiplied by the number of bits in a slot. A CDMA B packet-switched network C TDM D FDM 44.( ) means that the switch must receive the entire packet before it canbegin to transmit the first bit of the packet onto the outbound link. A Queuing delay B Store-and-forward transmission C Packet loss D Propagation 45.The network that forwards packets according to host destination addresses is called ( ) network. A circuit-switched B packet-switched C virtual-circuit D datagram 46.The network that forwards packets according to virtual-circuit numbers is called ( ) network. A circuit-switched B packet-switched C virtual-circuit D datagram 47.In the following entries, which is not a kind of access network?( ) A residential access B company access C wireless access D local access 48.Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R 1 and R 2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L ? (Ignore queuing delay, propagation delay, and processing delay.) ( )A L /R 1+L /R 2 B L /R 1C L /R 2D none of the above 49.The time required to examine the packet ’s header and determine where to direct the packet is part of the ( ). A queuing delay B processing delay C propagation delay D transmission delay 50.The time required to propagate from the beginning of the link to the next router is ( ). A queuing delay B processing delay C propagation delay D transmission delay 51.Consider sending a packet of 3000bits over a path of 5 links. Each link transmits transmits at at at 1000bps. 1000bps. 1000bps. Queuing Queuing Queuing delays, delays, delays, propagation propagation propagation delay delay delay and and and processing processing delay are negligible. (6 points) (1).Suppose (1).Suppose the the the network network network is is is a a a packet-switched packet-switched packet-switched virtual virtual virtual circuit circuit circuit network. network. network. VC VC setup time is 0.1 seconds. Suppose the sending layers add a total of 500 bits of header to each packet. How long does it take to send the file from source to destination? (2).Suppose the the network network network is is is a a a packet-switched packet-switched datagram datagram network network network and and and a a connectionless connectionless service service service is is is used. used. used. Now Now Now suppose suppose suppose each each each packet packet packet has has has 200 200 200 bits bits bits of of header. How long does it take to send the file? (3).Suppose that the network is a circuit-switched network. Further suppose that that the the the transmission transmission transmission rate rate rate of of of the the the circuit circuit circuit between between between source source source and and and destination destination destination is is 200bps. Assuming 0.02s setup time and 200 bits of header appended to the packet, how long does it take to send the packet? Solution: (1). t=5*(3000+500)/1000+0.1=17.6s(2). t=5*(3000+200)/1000=16s(3). t=(3000+200)/200+0.02=16.02s。
Computer Networking: A Top-Down Approach Featuring the Internet, 3rd EditionSolutions to Review Questions and Problems Note: These solutions are incomplete. Complete solutions will be available by 1 September 2005Version Date: July 1, 2004This document contains the solutions to review questions and problems for the 3rd edition of Computer Networking: A Top-Down Approach Featuring the Internet by Jim Kurose and Keith Ross. These solutions are being made available to instructors ONLY. Please do NOT copy or distribute this document to others (even other instructors). Please do not post any solutions on a publicly-available Web site. We’ll be happy to provide a copy (up-to-date) of this solution manual ourselves to anyone who asks.All material © copyright 1996-2004 by J.F. Kurose and K.W. Ross. All rights reservedChapter 1 Review Questions1.There is no difference. Throughout this text, the words “host” and “end system” areused interchangeably. End systems include PCs, workstations, Web servers, mail servers, Internet-connected PDAs, WebTVs, etc.2.Suppose Alice, an ambassador of country A wants to invite Bob, an ambassador ofcountry B, over for dinner. Alice doesn’t simply just call Bob on the phone and say, “come to our dinner table now”. Instead, she calls Bob and suggests a date and time.Bob may respond by saying he’s not available that particular date, but he is available another date. Alice and Bob continue to send “messages” back and forth until they agree on a date and time. Bob then shows up at the embassy on the agreed date, hopefully not more than 15 minutes before or after the agreed time. Diplomatic protocols also allow for either Alice or Bob to politely cancel the engagement if they have reasonable excuses.3. A networking program usually has two programs, each running on a different host,communicating with each other. The program that initiates the communication is the client. Typically, the client program requests and receives services from the server program.4.The Internet provides its applications a connection-oriented service (TCP) and aconnectionless service (UDP). Each Internet application makes use of one these two services. The two services will be discussed in detail in Chapter 3. Some of the principle characteristics of the connection-oriented service are:•Two end-systems first “handshake” before either starts to send application data to the other.•Provides reliable data transfer, i.e., all application data sent by one side of the connection arrives at the other side of the connection in order and without any gaps.•Provides flow control, i.e., it makes sure that neither end of a connection overwhelms the buffers in the other end of the connection by sending to many packets to fast.•Provides congestion control, i.e., regulates the amount of data that an application can send into the network, helping to prevent the Internet from entering a state of grid lock.The principle characteristics of connectionless service are:•No handshaking•No guarantees of reliable data transfer•No flow control or congestion control5.Flow control and congestion control are two distinct control mechanisms with distinctobjectives. Flow control makes sure that neither end of a connection overwhelms the buffers in the other end of the connection by sending to many packets to fast.Congestion control regulates the amount of data that an application can send into the network, helping to prevent congestion in the network core (i.e., in the buffers in the network routers).6.The Internet’s connection-oriented service provides reliable data transfer by usingacknowledgements and retransmissions. When one side of the connection doesn’t receive an acknowledgement (from the other side of the connection) for a packet it transmitted, it retransmits the packet.7. A circuit-switched network can guarantee a certain amount of end-to-end bandwidthfor the duration of a call. Most packet-switched networks today (including the Internet) cannot make any end-to-end guarantees for bandwidth.8.In a packet switched network, the packets from different sources flowing on a link donot follow any fixed, pre-defined pattern. In TDM circuit switching, each host gets the same slot in a revolving TDM frame.9.At time t0the sending host begins to transmit. At time t1 = L/R1, the sending hostcompletes transmission and the entire packet is received at the router (no propagation delay). Because the router has the entire packet at time t1, it can begin to transmit the packet to the receiving host at time t1. At time t2= t1 + L/R2, the router completes transmission and the entire packet is received at the receiving host (again, no propagation delay). Thus, the end-to-end delay is L/R1 + L/R2.10.In a VC network, each packet switch in the network core maintains connection stateinformation for each VC passing through it. Some of this connection state information is maintained to a VC-number translation table. (See page 25)11.The cons of VCs include (i) the need to have a signaling protocol to set-up and tear-down the VCs; (ii) the need to maintain connection state in the packet switches. For the pros, some researchers and engineers argue that it is easier to provide QoS services - such as services that guarantee a minimum transmission rate or services that guarantee maximum end-to-end packet delay – when VCs are used.12.1. Dial-up modem over telephone line: residential; 2. DSL over telephone line:residential or small office; 3. Cable to HFC: residential; 4. 100 Mbps switched Etherent: company; 5. Wireless LAN: mobile; 6. Cellular mobile access (for example, WAP): mobile13.A tier-1 ISP connects to all other tier-1 ISPs; a tier-2 ISP connects to only a few ofthe tier-1 ISPs. Also, a tier-2 ISP is a customer of one or more tier-114.A POP is a group of one or more routers in an ISPs network at which routers in otherISPs can connect. NAPs are localized networks at which many ISPs (tier-1, tier-2 and lower-tier ISPs) can interconnect.15.HFC bandwidth is shared among the users. On the downstream channel, all packetsemanate from a single source, namely, the head end. Thus, there are no collisions in the downstream channel.16.Ethernet LANs have transmission rates of 10 Mbps, 100 Mbps, 1 Gbps and 10 Gbps.For an X Mbps Ethernet (where X = 10, 100, 1,000 or 10,000), a user can continuously transmit at the rate X Mbps if that user is the only person sending data.If there are more than one active user, then each user cannot continuously transmit at X Mbps.17.Ethernet most commonly runs over twisted-pair copper wire and “thin” coaxial cable.It also can run over fibers optic links and thick coaxial cable.18.Dial up modems: up to 56 Kbps, bandwidth is dedicated; ISDN: up to 128 kbps,bandwidth is dedicated; ADSL: downstream channel is .5-8 Mbps, upstream channel is up to 1 Mbps, bandwidth is dedicated; HFC, downstream channel is 10-30 Mbps and upstream channel is usually less than a few Mbps, bandwidth is shared.19.The delay components are processing delays, transmission delays, propagation delays,and queuing delays. All of these delays are fixed, except for the queuing delays, which are variable.20.Five generic tasks are error control, flow control, segmentation and reassembly,multiplexing, and connection setup. Yes, these tasks can be duplicated at different layers. For example, error control is often provided at more than one layer.21.The five layers in the Internet protocol stack are –from top to bottom –theapplication layer, the transport layer, the network layer, the link layer, and the physical layer. The principal responsibilities are outlined in Section 1.7.1.22.application-layer message: data which an application wants to send and passed ontothe transport layer; transport-layer segment: generated by the transport layer and encapsulates application-layer message with transport layer header; network-layer datagram: encapsulates transport-layer segment with a network-layer header; link-layer frame: encapsulates network-layer datagram with a link-layer header.23.Routers process layers 1 through 3. (This is a little bit of a white lie, as modernrouters sometimes act as firewalls or caching components, and process layer four as well.)Link layer switches process layers 1 through 2. Hosts process all five layers.Chapter 1 ProblemsProblem 1.There is no single right answer to this question. Many protocols would do the trick. Here's a simple answer below:Messages from ATM machine to ServerMsg name purpose-------- -------HELO <userid> Let server know that there is a card in theATM machineATM card transmits user ID to ServerPASSWD <passwd> User enters PIN, which is sent to server BALANCE User requests balanceWITHDRAWL <amount> User asks to withdraw moneyBYE user all doneMessages from Server to ATM machine (display)Msg name purpose-------- -------PASSWD Ask user for PIN (password)OK last requested operation (PASSWD, WITHDRAWL)OKERR last requested operation (PASSWD, WITHDRAWL)in ERRORAMOUNT <amt> sent in response to BALANCE requestBYE user done, display welcome screen at ATM Correct operation:client serverHELO (userid) --------------> (check if valid userid)<------------- PASSWDPASSWD <passwd> --------------> (check password)<------------- OK (password is OK)BALANCE --------------><------------- AMOUNT <amt>WITHDRAWL <amt> --------------> check if enough $ to coverwithdrawl<------------- OKATM dispenses $BYE --------------><------------- BYEIn situation when there's not enough money:HELO (userid) --------------> (check if valid userid)<------------- PASSWDPASSWD <passwd> --------------> (check password)<------------- OK (password is OK)BALANCE --------------><------------- AMOUNT <amt>WITHDRAWL <amt> --------------> check if enough $ to cover withdrawl<------------- ERR (not enough funds)error msg displayedno $ given outBYE --------------><------------- BYEProblem 2.a) A circuit-switched network would be well suited to the application described, because the application involves long sessions with predictable smooth bandwidth requirements. Since the transmission rate is known and not bursty, bandwidth can be reserved for each application session circuit with no significant waste. In addition, we need not worry greatly about the overhead costs of setting up and tearing down a circuit connection, which are amortized over the lengthy duration of a typical application session.b)Given such generous link capacities, the network needs no congestion control mechanism. In the worst (most potentially congested) case, all the applications simultaneously transmit over one or more particular network links. However, since each link offers sufficient bandwidth to handle the sum of all of the applications' data rates, no congestion (very little queueing) will occur.Problem 3.a)We can n connections between each of the four pairs of adjacent switches. This givesa maximum of 4n connections.b)We can n connections passing through the switch in the upper-right-hand corner andanother n connections passing through the switch in the lower-left-hand corner, giving a total of 2n connections.Problem 4.Tollbooths are 100 km apart, and the cars propagate at 100km/hr. A tollbooth services a car at a rate of one car every 12 seconds.(a) There are ten cars. It takes 120 seconds, or two minutes, for the first tollbooth to service the 10 cars. Each of these cars have a propagation delay of 60 minutes before arriving at the second tollbooth. Thus, all the cars are lined up before the second tollbooth after 62 minutes. The whole process repeats itself for traveling between the second and third tollbooths. Thus the total delay is 124 minutes.(b) Delay between tollbooths is 7*12 seconds plus 60 minutes, i.e., 61 minutes and 24 seconds. The total delay is twice this amount, i.e., 122 minutes and 48 seconds.Problem 5.a) The time to transmit one packet onto a link is R h L /)(+. The time to deliver the packet over Q links is R h L Q /)(+. Thus the total latency is R h L Q t s /)(++.b) R h L Q /)2(+c) Because there is no store-and-forward delays at the links, the total delay isR L h t s /)(++.Problem 6.a) s m d prop /= seconds.b) R L d trans /= seconds.c) )//(R L s m d end to end +=-- seconds.d) The bit is just leaving Host A.e) The first bit is in the link and has not reached Host B.f) The first bit has reached Host B.g) Want()893105.2102810083=⨯⨯==S R L m km.Problem 7.Consider the first bit in a packet. Before this bit can be transmitted, all of the bits in the packet must be generated. This requires31064848⨯⋅sec=6msec.The time required to transmit the packet is6101848⨯⋅sec=μ384sec.Propagation delay = 2 msec.The delay until decoding is6msec +μ384sec + 2msec = 8.384msecA similar analysis shows that all bits experience a delay of 8.384 msec.Problem 8.a) 10 users can be supported because each user requires one tenth of the bandwidth.b) 1.0=p .c) ()n n p p n --⎪⎪⎭⎫ ⎝⎛40140. d) ()∑=--⎪⎪⎭⎫ ⎝⎛-90401401n n n p p n . We use the central limit theorem to approximate this probability. Let j X be independent random variables such that ()p X P j ==1.(P “11 or more users”)⎪⎪⎭⎫ ⎝⎛≤-=∑=101401j j X P⎪⎪⎪⎭⎫ ⎝⎛⋅⋅≤⋅⋅-=⎪⎪⎭⎫ ⎝⎛≤∑∑==9.01.04069.01.040410401401j j j j X P X P ()16.36.36≤=⎪⎭⎫ ⎝⎛≤≈Z P Z P 999.0=when Z is a standard normal r.v. Thus (P “10 or more users”)001.0≈.Problem 9.a) 10,000b) ()∑+=--⎪⎪⎭⎫ ⎝⎛M N n n M n p p n M 11Problem 10.It takes R LN / seconds to transmit the N packets. Thus, the buffer is empty when a batch of N packets arrive.The first of the N packets has no queueing delay. The 2nd packet has a queueing delay of R L / seconds. The n th packet has a delay of R L n /)1(- seconds.The average delay is2)1(2)1(11/)1(1101-=-==-∑∑-==N R L N N N R L n N R L R L n N N n N n .Problem 11.a) The transmission delay is R L /. The total delay isIR L R L I R IL -=+-1/)1( b) Let R L x /=. Total delay = axx -1Problem 12.a) There are Q nodes (the source host and the 1-N routers). Let q proc d denote theprocessing delay at the q th node. Let q R be the transmission rate of the q th link and let q q trans R L d /=. Let q prop d be the propagation delay across the q th link. Then[]∑=--++=Q q q prop q trans q proc end to end d d d d 1.b) Let q queue d denote the average queueing delay at node q . Then[]∑=--+++=Q q q queue q prop q trans q proc end to end d d d d d 1.Problem 13.The command:traceroute -q 20 www.eurecom.frwill get 20 delay measurements from the issuing host to the host, www.eurecom.fr. The average and standard deviation of these 20 measurements can then be collected. Do you see any differences in your answers as a function of time of day?Problem 14.a) 40,000 bitsb) 40,000 bitsc) the bandwidth-delay product of a link is the maximum number of bits that can be inthe linkd) 1 bit is 250 meters long, which is longer than a football fielde) s/RProblem 15.25 bpsProblem 16.a) 40,000,000 bitsb) 400,000 bitsc) .25 metersProblem 17.a) t trans + t prop = 400 msec + 40 msec = 440 msecb) 10 * (t trans + 2 t prop ) = 10*(40 msec + 80 msec) = 1.2 secProblem 18.a) 150 msecb) 1,500,000 bitsc) 600,000,000 bitsProblem 19.Let’s suppose the passenger and his/her bags correspond to the data unit arriving to the top of the protocol stack. When the passenger checks in, his/her bags are checked, and a tag is attached to the bags and ticket. This is additional information added in theBaggage layer if Figure 1.20 that allows the Baggage layer to implement the service or separating the passengers and baggage on the sending side, and then reuniting them(hopefully!) on the destination side. When a passenger then passes through security, and additional stamp is often added to his/her ticket, indicating the at the passenger haspassed through a security check. This information is used to ensure (e.g., by later checks for the security information) secure transfer of people.Problem 20.a) time taken to send message from source host to first packet switch =sec 5sec 105.1105.766=⨯⨯. With store-and-forward switching, the total time to move message from source host to destination host = sec 153sec 5=⨯hopsb) time taken to send 1st packet from source host to first packet switch = .sec 1sec 105.1105.163m =⨯⨯. Time at which 2nd packet is received at the first switch = time at which 1st packet is received at the second switch = sec 2sec 12m m =⨯ c) time at which 1st packet is received at the destination host = .sec 33sec 1m hops m =⨯. After this, every 1msec one packet will be received, thus time at which last (5000th ) packet is received =sec 002.5sec 1*4999sec 3=+m m . It can be seen that delay in using message segmentation is significantly less (almost 1/3rd ).d) drawbacks:i. packets have to be put in sequence at the destination.ii. Message segmentation results in many smaller packets. Sinceheader size is usually the same for packets regardless of its size,with message segmentation total amount of header bytes sentincreases.Problem 21.Java AppletProblem 22.Time at which the 1st packet is received at the destination =240⨯+R S sec. After this, one packet is received by the destination every RS 40+sec. Thus delay in sending the whole file = )1(40)40()1(240+⨯+=+⨯-+⨯+=SF R S R S S F R S delay To calculate the value of S which leads to the minimum delay,F S R SS S R F S delay 4001)401(02=⇒=++-⇒=∂∂Chapter 2 Review Questions1.The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.work architecture refers to organization of communication into layers (e.g., thefive-layer Internet architecture). Application architecture, on the other hand, is designed by an application developer and dictates how the application is (e.g., client-server or P2P)3.Instant Messaging involves the initiator to contact a centralized server to locate theaddress (IP address.) of the receiver: client server model. After this, the instant messaging can be peer to peer – message between the two communicating parties are sent directly between them.4.The process which initiates a service request is the client; the process that waits to becontacted is the server.5.No. As stated in the text, all communication sessions have a client side and a serverside. In a P2P file-sharing application, the peer that is receiving a file is typically the client and the peer that is sending the file is typically the server.6.The IP address of the destination hosts and the port numbers of the destination socket.7.You probably use a browser and a mail reader on a daily basis. You may also use anFTP user agent, a Telnet user agent, an audio/video player user agent (such as a Real Networks player), an instant messaging agent, a P2P file-sharing agent, etc.8.There are no good examples of an application that requires no data loss and timing. Ifyou know of one, send an e-mail to the authors.9. A protocol uses handshaking if the two communicating entities first exchange controlpackets before sending data to each other. SMTP uses handshaking at the application layer whereas HTTP does not.10.The applications that use those protocols require that all application data is receivedin the correct order and without gaps. TCP provides this service whereas UDP does not.11.In both cases, the site must keep a database record for the user. With cookies, the userdoes not explicitly provide a username and password each time it visits the site.However, browser identifies the user by sending the user’s cookie number each time the user accesses the site.12.In persistent HTTP without pipelining, the browser first waits to receive a HTTPresponse from the server before issuing a new HTTP request. In persistent HTTP withpipelining, the browser issues requests as soon as it has a need to do so, without waiting for response messages from the server.13.Web caching can bring the des ired content “closer” to the user, perhaps to the sameLAN to which the user’s host is connected. Web caching can reduce the delay for all objects, even objects that are not cached, since caching reduces the traffic on links. 15.FTP uses two parallel TCP connections, one connection for sending controlinformation (such as a request to transfer a file) and another connection for actually transferring the file. Because the control information is not sent over the same connection that the file is sent over, FTP sends control information out of band.16.Message is sent from Alice’s host to her mail server over HTTP. Alice’s mailserver then sends the message to Bob’s mail server over SMTP. Bob then transfers the message from his mail server to his host over POP3.18.With download and delete, after a user retrieves its messages from a POP server, themessages are deleted. This poses a problem for the nomadic user, who may want to access the messages from many different machines (office PC, home PC, etc.). In the download and keep configuration, messages are not deleted after the user retrieves the messages. This can also be inconvenient, as each time the user retrieves the stored messages from a new machine, all of non-deleted messages will be transferred to the new machine (including very old messages).19.Yes an organization’s mail server and Web server can have the same alias for a hostname. The MX record is used to map the mail server’s host name to its IP address 20.The overlay network in a P2P file sharing system consists of the nodes participatingin the file sharing system and the logical links between the nodes. There is a logical directed link (a “directed edge” in graph theory terms) from node A to node B if nodeA sends datagrams that are explicitly addressed to node B’s IP address. An overlaynetwork does not include routers. With Gnutella, when a node wants to join the Gnutella network, it first discovers (“out of band”) the IP address of one or more nodes already in the network. It then sends join messages to these nodes. When the node receives confirmations, it becomes a member of the of Gnutella network. Nodes maintain their logical links with periodic refresh messages.21.Three companies as of this writing (August 2002) are KaZaA, eDonkey, Bit Torrent.22.With the UDP server, there is no welcoming socket, and all data from different clientsenters the server through this one socket. With the TCP server, there is a welcoming socket, and each time a client initiates a connection to the server, a new socket is created. Thus, to support n simultaneous connections, the server would need n+1 sockets.23.For the TCP application, as soon as the client is executed, it attempts to initiate a TCPconnection with the server. If the TCP server is not running, then the client will fail to make a connection. For the UDP application, the client does not initiate connections (or attempt to communicate with the UDP server) immediately upon execution Chapter 2 ProblemsProblem 1.a) Fb) Tc) Fd) FProblem 2.Access control commands:USER, PASS, ACT, CWD, CDUP, SMNT, REIN, QUIT.Transfer parameter commands:PORT, PASV, TYPE STRU, MODE.Service commands:RETR, STOR, STOU, APPE, ALLO, REST, RNFR, RNTO, ABOR, DELE, RMD, MRD, PWD, LIST, NLST, SITE, SYST, STAT, HELP, NOOP. Problem 3.SFTP: 115, NNTP: 119.Problem 4.Application layer protocols: DNS and HTTPTransport layer protocols: UDP for DNS; TCP for HTTPProblem 5.Persistent connections are discussed in section 8 of RFC 2616 (the real goal of this question was to get you to retrieve and read an RFC). Sections 8.1.2 and 8.1.2.1 of the RFC indicate that either the client or the server can indicate to the other that it is going toclose the persistent connection. It does so by including the including the connection-token "close" in the Connection-header field of the http request/reply.Problem 6.The total amount of time to get the IP address isn RTT RTT RTT +++ 21.Once the IP address is known, O RTT elapses to set up the TCP connection and another O RTT elapses to request and receive the small object. The total response time isn o RTT RTT RTT RTT ++++ 212Problem 7.a)o o n RTT RTT RTT RTT 2321⋅++++n o RTT RTT RTT +++= 18.b)o o n RTT RTT RTT RTT 221++++n o RTT RTT RTT +++= 14.c)o o n RTT RTT RTT RTT ++++21n o RTT RTT RTT +++= 13.Problem 8.HTTP/1.0: GET, POST, HEAD.HTTP/1.1: GET, POST, HEAD, OPTIONS, PUT, DELETE, TRACE, CONNECT.See RFCs for explanations.Problem 9.a) The time to transmit an object of size L over a link or rate R is L/R . The average time is the average size of the object divided by R :∆= (900,000 bits)/(1,500,000 bits/sec) = .6 secThe traffic intensity on the link is (1.5 requests/sec)(.6 msec/request) = .9. Thus, the average access delay is (.6 sec)/(1 - .9) = 6 seconds. The total average response time is therefore 6 sec + 2 sec = 8 sec.b) The traffic intensity on the access link is reduced by 40% since the 40% of therequests are satisfied within the institutional network. Thus the average access delayis (.6 sec)/[1 – (.6)(.9)] = 1.2 seconds. The response time is approximately zero if the request is satisfied by the cache (which happens with probability .4); the averageresponse time is 1.2 sec + 2 sec = 3.2 sec for cache misses (which happens 60% of the time). So the average response time is (.4)(0 sec) + (.6)(3.2 sec) = 1.92 seconds. Thus the average response time is reduced from 8 sec to 1.92 sec.Problem 11.UIDL abbreviates “unique-ID listing”. When a POP3 client issues the UIDL command, the server responds with the unique message ID for all of the messages present in the users mailbox. This command is useful for “download and keep”. By keeping a file that lists the messages retrieved in earlier sessions, the client can use the UIDL command to determine which messages on the server have already been seen.Problem 13.a)For a given input of domain name (such as ), IP address or networkadministrator name, whois database can be used to locate the corresponding registrar, whois server, dns server, etc.f)An attacker can use the whois database and nslookup tool to determine the IP addressranges, DNS server addresses, etc. for the target institution.g)If under an attack a victim can analyze the source address of packets, the victim canthen use whois to obtain information about domain from which attack is coming and possibly inform the administrators of the origin domain.Problem 14.No. Because the link is full duplex, you have 128 kbps in each direction, and the uploading does not interfere with the downloading.Problem 15.There are N nodes in the overlay network. There are N(N-1)/2 edges.Problem 16.a) In this case, each of the five Gnutella clients immediately learns that it has one less neighbor. Consider one of these five clients, called, Bob. Suppose Bob has only three neighbors after X drops out. Then Bob needs to establish a TCP connection with another peer. Bob should have a fresh list of active peers; he sequentially contacts peers on this list until one accepts his TCP connection attempt.b) In this case, Bob does not immediately know that X has departed. Bob will only learn about X’s departure when it attempts to send a message (query or ping) to X. When Bob attempts to send a message, Bob’s TCP w ill make several unsuccessful attempts to send the message to B. Bob’s TCP will then inform the Gnutella client that X is down. Bob。