计算机网络第五版(英文版)
- 格式:ppt
- 大小:5.79 MB
- 文档页数:88
P63 #5 Consider sending a packet of F bits over a path of Q links. Each link transmits at R bps. The network is lightly loaded so that there are no queuing delays. Propagation delay is negligible.a.Suppose the network is a packet-switched virtual-circuit network. Denote the VC setup time by t s seconds. Suppose the sending layers add a total of h bits of header to the packet. How long does it take to send the file from source to destination?t s+[(F+h)/R]Qb.Suppose the network is a packet-switched datagram network and a connectionless service is used. Now suppose each packet has 2h bits of header. How long does it take to send the packet?[(F+2h)/R]Qc.Finally, suppose that the network is a circuit-switched network. Further suppose that the transmission rate of the circuit between source and destination is R bps. Assuming ts setup time and h bits of header appended to the packet, how long does it take to send the packet?t s+(F+h)/RP64 #6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters and suppose that the propagation speed along the link is s meters/sec. Host A sends a packet of size L bits to host B.[a] Express the propagation delay, d prop, in terms of m and s.[b] Determine the transmission time of the packet, d trans, in terms of L and R.[c] Ignoring processing and queueing delays, obtain an expression for the end-to-end delay.[d] Suppose Host A begins to transmit the packets at time t=0. At time t=d trans, where is the last bit of the packet?[e] Suppose d prop is greater than d trans. At time t=d trans, where is the first bit of the packet?[f] Suppose d prop is less than d trans. At time t=d trans, where is the first bit of the packet?[g] Suppose s=2.5 x 108, L=100 bits and R=28kbps. Find the distance m so that d prop = d trans.[a] d prop = m/s[b] d trans = L/R[c] end-to-end delay = d prop + d trans=m/s+L/R[d] The beginning position of the link.[e] On the channel between A and B.[f] On the host B.[g] m/s = L/R = > m = sL/R = > m = 892.86 kmP65 #10 Consider the queueing delay in a router buffer. Suppose that all packets are L bits, the transmission rate is R bps, and that N packets simultaneously arrive at the buffer every LN/R seconds. Find the average queueing delay of a packet (in terms of L, R and N). (Hint: The queueing delay for the first packet is zero; for the second packet L/R; for the third packet 2L/R. The Nth packet has already been transmitted when the second batch of packets arrives.)As the Nth packet has already been transmitted when the next batch of packets arrive, we only need to consider the delay for a single batch of packets.Average delay = Total delay / Number of packetsDelay for 1st packet = 0Delay for 2nd packet = L/RDelay for 3rd packet = 2L/R......Delay for Nth packet = (N-1)L/RTotal delay for N packets = (0 + 1 + 2 ... +(N-1) ) * (L/R)Using the formulas for sum of integer series, this can be written as: Total delay for N packets = (N-1) * (N/2) * (L/R)Therefore, average delay for N packets = ((N-1) * L) / 2RP170 #12 What is the difference between persistent HTTP with pipelining and persistent HTTP without pipelinning? Which of the two is used by HTTP/1.1?For the persistent connection without pipelining, the client issues a new request only when the previous has been received. In this case, the client experiences one RTT in order to request and receive each of the referenced objects.For the persistent connection with pipelining, the client issues a request as soon as it encounters a reference. It is possible for only RTT to be expended for all the referenced objects.P170 #14 Telnet into a Web server and send a multiline request message. Include in the request message theIf-modified-since: header line to force a response message with the 304 Not Modified status code.GET/somedir/exp.html HTTP/1.1Host: Connection: closeUser-agent: Mozilla/4.0If-Modified-Since: Thu, 30 May 2007 12:00:00 GMTAccept-language: frP172 #6 Suppose within your web browser you click on a link to obtain a web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT (Round Trip Time) of RTT1, ... RTTn. Further suppose that the web page associated with the link contains exactly one object, consisting of a small amount of HTTP text. Let RTT0 denote the RTT between the local host and the remote server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object? (Hint: read pages 90 .. 93)Time to visit DNS servers and get IP address = RTT1 + RTT2 + ... + RTTnTime to establish TCP connection (SYN and SYNACK) = RTT0Time to send HTTP request and receive reply = RTT0Total time = 2 * RTT0 + (RTT1 + RTT2 + ... + RTTn)P171 #16 Suppose Alice with a Web-based e-mail account (such as Yahoo! Mail or Hotmail) sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.The series of application-layer protocols: HTTP、SMTP、POP3Suppose that you send an e-mail message whose only data is a Microsoft Excel attachment. What might the header lines (including MIME lines) look like?From:***********To:***********Subject: helloMIME-Version: 1.0Content-Transfer-Encoding: base64Content-Type: Application/MS-ExcelP286 #5 Suppose host A sends two TCP segments back to back to host B over a TCP connection. The first segment has sequence number 90: the second has sequence number 110.a.How much data is in the first segment?a.20 bytesb.Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgement that host B sends to host A, what will be the acknowledgement number?b.ACK90P291 #27 Consider the following plot of TCP window size as a function of time. (reproduced below for you) Assuming TCP Reno is the protocol experiencing the behavior shown above, answer the following questions. In all cases, you should provide a short discussion justifying your answer.a. Identify the intervals of time when TCP slow start is operating.b. Identify the intervals of time when TCP congestion avoidance is operating.c. After the 16th transmission round, is segment loss detected by a tripleduplicate ACK or by a timeout?d. After the 22nd transmission round, is segment loss detected by a triple duplicate ACK or by a timeout?e. What is the initial value of Threshold at the first transmission round?f. What is the value of Threshold at the 18th transmission round?g. What is the value of Threshold at the 24th transmission round?h. During what transmission round is the 70th segment sent?i. Assuming a packet loss is detected after the 26th round by the receipt of a triple duplicate ACK, what will be the values of the congestion-window size and of Threshold?Solution:a.1-6, 23-26b.6-16, 17-22c.a triple duplicate ACKd.timeoute.32f.21g.13h.7i.4, 4P293 #34 Consider sending an object of size O = 100 Kbytes from server to client. Let S = 536 bytes and RTT = 100 msec. suppose the transport protocol uses static windows with window size W. (See Section 3.7.2)a.For a transmission rate of 28 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency.b.Repeat (a) for 100 kbps.tency=28.8s W=2tency=8.2s W=4P405 #8 Consider a datagram network using 8-bit host addresses. Suppose a router uses longest prefix matching and has t he following forwarding table:-----------------------------------------------------Prefix Match Interface-----------------------------------------------------00 001 110 211 3-----------------------------------------------------For each of the four interfaces, give the associated range of destination host addresses and the number of addresses in the range.6P407 #15 Consider sending a 3000-byte datagram into a link that has a MTU of 500 bytes. Suppose the original datagram is stamped with the identification number 422. How many fragments are generated? What are their characteristics?there are「2980/480」=7 fragments be generatedP408 #22 Consider the network shown in Problem 21 (reproduced below). Using Dijkstra’s algorithm, and showing your work using a table similar to Table 4.3, do the following:a. Compute the shortest path from s to all network nodesSteps D(t),P(t) D(u),P(u)D(v),P(v)D(w),P(w)D(x),P(x)D(y),P(y)D(z),P(z)0 1,s 4,s ∞∞∞∞∞1 3.t 10,t ∞∞5,t 3,t2 4,u 6,u ∞5,t 3,t3 4,u 6,u ∞5,t4 5,v 7,v 5,v5 6,w 5,v6 6,wPlease fill in the following tables using DV algorithm:For the node Z in the graph shown in the 22nd topic (P408), please fill in the following routing table in the router z about the initial distance-vector Destination node Next hop Current shortest distancevalue-DzS —∞T T 2U —∞V —∞W —∞X —∞Y Y 14Z Z 0following rout-ing table in the node z to update this routing tableDestination node Currentdistance-DyDestination node Current distance-DtS 5 S 1 T 4 T 0 U 2 U 2P493 #7 How big is the MAC address space?The IPv4 address space?The IPv6 address space?MAC address: 6 bytes, MAC address space 2^48IPV4 address: 4 bytes, IPV4 address space 2^32IPV6 address: 16 bytes, IPV6 address space 2^128P494 #4 Consider the 4-bit generator, G, shown in Figure 5.8, and suppose the D has the value 10101010. What is the value of R?G=1001, D=10101010, R=101。
计算机网络第五版答案完整版Computers have become an integral part of our lives, and computer networking plays a crucial role in connecting various devices and enabling communication between them. In the fifth edition of the book "Computer Networks," the authors provide comprehensive answers and solutions to various exercises and questions, giving readers a complete understanding of the concepts and principles of computer networking.1. Introduction to Computer NetworksComputer networks are essential for transmitting data and enabling communication between devices. In this chapter, the authors explain the basics of networks, including the OSI model, network topology, and types of networks. They also provide answers to exercises that help readers grasp the fundamental concepts of computer networking.2. Physical LayerThe physical layer is responsible for transmitting raw bits over a communication channel. The authors cover topics such as analog and digital signals, transmission media, and modulation techniques. Through detailed explanations and examples, readers gain a solid understanding of the physical layer's functions and mechanisms.3. Data Link LayerThe data link layer ensures reliable data transfer between two connected nodes. This chapter focuses on topics like error detection and correction, flow control, and media access control. The authors provide accurateanswers to questions related to these concepts, enabling readers to comprehend the data link layer's role in establishing error-free communication.4. Network LayerThe network layer facilitates the delivery of data packets across multiple networks. Addressing, routing algorithms, and internet protocols are among the key topics discussed in this chapter. By examining the provided answers, readers can enhance their knowledge of the network layer's functionalities and protocols.5. Transport LayerThe transport layer provides end-to-end communication between applications running on different hosts. This chapter explores topics like multiplexing, demultiplexing, reliable data transfer protocols, and congestion control. The authors offer complete solutions to exercises, allowing readers to grasp the complexities and mechanisms of the transport layer.6. Application LayerThe application layer enables network applications to communicate with each other. This chapter covers topics such as domain name system (DNS), email protocols, and World Wide Web (WWW) protocols. The authors present accurate and detailed answers, enabling readers to understand the application layer's role in facilitating various network services.7. Network SecurityNetwork security is essential to protect data from unauthorized access and malicious activities. This chapter discusses topics like symmetric and asymmetric encryption, public key infrastructure (PKI), and network security protocols. The authors provide comprehensive answers, helping readers to comprehend the importance of network security and the techniques used to safeguard data.8. Multimedia NetworkingIn the modern era, multimedia applications require robust networking capabilities. This chapter delves into topics such as streaming and real-time applications, multimedia protocols, and quality of service (QoS) mechanisms. By examining the provided answers, readers can gain a deeper understanding of the challenges and solutions in multimedia networking.9. Network ManagementEfficient network management is crucial for ensuring the smooth operation of computer networks. This chapter covers topics like Simple Network Management Protocol (SNMP), network monitoring, and network troubleshooting. The authors provide accurate and comprehensive answers, allowing readers to learn about the tools and techniques used in network management.By providing complete and accurate answers to exercises, the fifth edition of "Computer Networks" equips readers with the knowledge and understanding required to master the field of computer networking. The authors' attention to detail, clear explanations, and concise yet informative solutions make this book an invaluable resource for students, professionals, and anyone interested in computer networks.。
计算机网络(第5版)•内容简介:《计算机网络(第5版)》是国内外使用zui广泛、专业的计算机网络经典教材。
全书按照网络协议模型自下而上(物理层、数据链路层、介质访问控制层、网络层、传输层和应用层)有系统地介绍了计算机网络的基本原理,并结合Internet给出了大量的协议实例。
在讲述网络各层次内容的同时,还与时俱进地引入了全新的网络技术,包括无线网络、3G蜂窝网络、RFID与传感器网络、内容分发与P2P网络、流媒体传输与IP语音,以及延迟容忍网络等。
另外,本书针对当前网络应用中日益突出的安全问题,用了一整章的篇幅对计算机网络的安全性进行了深入讨论,而且把相关内容与全新网络技术结合起来阐述。
《计算机网络(第5版)》的适用对象非常广泛。
由于本书的重点立足于计算机网络的基本原理,同时兼顾了Internet体系结构与TCP/IP协议等内容,因此对于学习计算机网络课程的本科生和研究生,本书都是的教材或教学参考书。
本书每章后面给出了大量练习题,有助于教师根据教学目的酌情安排课后练习。
此外,本书对于从事网络相关技术研究和网络应用开发的广大科研工作者也具有重要的参考价值。
•作者简介:Andrew S.Tanenbaum,获得过美国麻省理工学院的理学学士学位和加利福尼亚大学伯克利分校的哲学博士学位,目前是荷兰阿姆斯特丹Vrije大学的计算机科学系的教授,并领导着一个计算机系统的研究小组。
同时,他还是一家计算与图象处理学院的院长,这是由几家大学合作成立的研究生院。
尽管社会工作很多,但他并没有中断学术研究。
多年来,他在编译技术、操作系统、网络及局域分布式系统方面进行了大量的研究工作。
目前的主要研究方向是设计规模达数百万用户的广域分布式系统。
在进行这些研究项目的基础上,他在各种学术杂志及会议上发表了70多篇论文。
他同时还是5本计算机专著的作者。
Tanenbaum教授,开发了大量的软件。
他是Amsterdan编译器的原理设计师,这是一个被广泛使用的;用来编写可移植编译器的工具箱。