历年网络工程师英文真题及译文
- 格式:doc
- 大小:92.50 KB
- 文档页数:11
精心整理Chapter1ComputerNetworksandtheInternet1.The()isaworldwidecomputernetwork,thatis,anetworkthatinterconnectsmillionsofcomputingdevicesthroughouttheworld.ppt3A publicInternetB IntranetC switchnetD televisionnet2.Whichkindofmediaisnotaguidedmedia?()A twisted-paircopperwireB acoaxialcableC fiberopticsD digitalsatellitechannel3.Whichkindofmediaisaguidedmedia?()A geostationarysatelliteB low-altitudesatelliteC fiberopticsD wirelessLAN4.ed().A FramesB SegmentsC DatagramsD bitstreams5.ABCD6.()makessurethatneithersideofaconnectionoverwhelmstheothersidebysendingtoomanypacketstoofast.A ReliabledatatransferB FlowcontrolC CongestioncontrolD Handshakingprocedure7.()meansthattheswitchmustreceivetheentirepacketbeforeitcanbegintotransmitthefirstbitofthepacketontotheoutboundlink.A Store-and-forwardtransmissionB FDMC End-to-endconnectionD TDM8.Datagramnetworksandvirtual-circuitnetworksdifferinthat().Adatagramnetworksarecircuit-switchednetworks,andvirtual-circuitnetworksarepacket-switchednetworks.Bdatagramnetworksarepacket-switchednetworks,andvirtual-circuitnetworksarecircuit-switchednetworks.D satellite10.Processingdelaydoesnotincludethetimeto().A examinethepacket’sheaderB waittotransmitthepacketontothelinkC determinewheretodirectthepacketD checkbit-errorinthepacket11.Inthefollowingfourdescriptions,whichoneiscorrect?()A Thetrafficintensitymustbegreaterthan1.BThefractionoflostpacketsincreasesasthetrafficintensitydecreases.CIfthetrafficintensityisclosetozero,theaveragequeuingdelaywillbeclosetozero.DIfthetrafficintensityisclosetoone,theaveragequeuingdelaywillbeclosetoone.12.TheInternet’snetworklayerisresponsibleformovingnetwork-layerpacketsknownas()fromonehosttoanother.A frameB datagramC segmentD message13.Theprotocolsofvariouslayersarecalled().A theprotocolstackB TCP/IPC ISPD networkprotocol14.Therearetwoclassesofpacket-switchednetworks:()networksandvirtual-circuitnetworks.A datagramB circuit-switchedC televisionD telephone15.Accessnetworkscanbelooselyclassifiedintothreecategories:residentialaccess,companyaccessand()access.A cabledB wirelessC campusD cityareaQuestion16~17Suppose,a istheaveragerateatwhichpacketsarriveatthequeue,Rhan(17).16. A LR/aB LaC RaD LR17.A 2B 1C 0D -118.IntheInternet,theequivalentconcepttoendsystemsis().A hostsB serversC clientsD routers19.IntheInternet,endsystemsareconnectedtogetherby().A copperwireB coaxialcableC communicationlinksD fiberoptics20.EndsystemsaccesstotheInternetthroughits().A modemsB protocolsC ISPD sockets21.Endsystems,packetswitches,andotherpiecesoftheInternet,run()thatcontrolthesendingandreceivingofinformationwithintheInternet.A programsB processesC applicationsD protocols22.Therearemanyprivatenetworks,suchasmanycorporateandgovernmentnetworks,whosehostscannotexchangemessage24.TheInternetprovidestwoservicestoitsdistributedapplications:aconnectionlessunreliableserviceand()service.A flowcontrolB connection-orientedreliableC congestioncontrolD TCP25.Itdefinestheformatandtheorderofmessagesexchangedbetweentwoormorecommunicatingentities,aswellastheactionstakenonthetransmissionand/orreceiptofamessageorotherevent.Thesentencedescribes().A InternetB protocolC intranetD network26.Inthefollowingoptions,whichdoesnotdefineinprotocol?()AtheformatofmessagesexchangedbetweentwoormorecommunicatingentitiesBtheorderofmessagesexchangedbetweentwoormorecommunicatingentitiesCtheactionstakenonthetransmissionofamessageorothereventDthetransmissionsignalsaredigitalsignalsoranalogsignals27.Inthefollowingoptions,whichisdefinedinprotocol?()Atheactionstakenonthetransmissionand/orreceiptofamessageorothereventB theobjectsexchangedbetweencommunicatingentitiesC thecontentintheexchangedmessagesD thelocationofthehosts28.Inthefollowingoptions,whichdoesnotbelongtothenetworkedge?()A endsystemsB routersC clientsD servers29.Inthefollowingoptions,whichbelongstothenetworkcore?()A endsystemsB routersC clientsD servers30.nternet’A reliabledatatransferBCD31.A flowcontrolB congestion-controlC reliabledatatransferD connection-orientedservice32.Itmakessurethatneithersideofaconnectionoverwhelmstheothersidebysendingtoomanypacketstoofast.Thesentencedescribes().A flowcontrolB congestion-controlC connection-orientedserviceD reliabledatatransfer33.IthelpspreventtheInternetfromenteringastateofgridlock.Whenapacketswitchbecomescongested,itsbufferscanoverflowandpacketlosscanoccur.Thesentencedescribes().A flowcontrolB congestion-controlC connection-orientedserviceD reliabledatatransfer34.TheInternet’sconnection-orientedservicehasaname,itis().A TCPB UDPC TCP/IPD IPA SMTPB internettelephoneC FTPD HTTP38.Inthefollowingoptions,whichdoesnotuseUDP?()A InternetphoneB videoconferencingC streamingmultimediaD telnet39.Therearetwofundamentalapproachestobuildinganetworkcore,()andpacketswitching.A electricalcurrentswitchingB circuitswitchingC dataswitchingD messageswitching40.In()networks,theresourcesneededalongapathtoprovideforcommunicationbetweentheendsystemarereservedforthedurationofthecommunicationsession.A packet-switchedB data-switchedC circuit-switchedD message-switched41.In()networks,theresourcesarenotreserved;asession’smessagesusetheresourcesondemand,andasaconsequence,mayhavetowaitforaccesstocommunicationlink.A packet-switchedB data-switchedC circuit-switchedD message-switched42.Inacircuit-switchednetwork,ifeachlinkhas n circuits,foreachlinkusedbytheend-to-endconnection,theconnectiongets()ofthelink’sbandwidthforthedurationoftheconnection.A afraction1/nB allC 1/2D ntimes43.For(),thetransmissionrateofacircuitisequaltotheframeratemultipliedbythenumberofbitsinaslot.A CDMAB packet-switchednetworkC TDMD FDM44.()meansthattheswitchmustreceivetheentirepacketbefoeoutboundlink.A QueuingdelayBC PacketlossD Propagation45.ABCD46.Thenetworkthatforwardspacketsaccordingtovirtual-circuitnumbersiscalled()network.A circuit-switchedB packet-switchedC virtual-circuitD datagram47.Inthefollowingentries,whichisnotakindofaccessnetwork?()A residentialaccessB companyaccessC wirelessaccessD localaccess48.Supposethereisexactlyonepacketswitchbetweenasendinghostandareceivinghost.Thetransmissionratesbetweenthesendinghostandtheswitchandbetweentheswitchandthereceivinghostare R1and R2,respectively.Assumingthattheswitchusesstore-and-forwardpacketswitching,whatisthetotalend-to-enddelaytosendapacketoflength L?(Ignorequeuingdelay,propagationdelay,andprocessingdelay.)()A L/R1+L/R2B L/R1C L/R2D noneoftheabove51.Considersendingapacketof3000bitsoverapathof5links.Eachlinktransmitsat1000bps.Queuingdelays,propagationdelayandprocessingdelayarenegligible.(6points)(1).Supposethenetworkisapacket-switchedvirtualcircuitnetwork.VCsetuptimeis0.1seconds.Supposethesendinglayersaddatotalof500bitsofheadertoeachpacket.Howlongdoesittaketosendthefilefromsourcetodestination?(2).Supposethenetworkisapacket-switcheddatagramnetworkandaconnectionlessserviceisused.Nowsupposeeachpackethas200bitsofheader.Howlongdoesittaketosendthefile?(3).Supposethatthenetworkisacircuit-switchednetwork.Furthersupposethatthetransmissionrateofthecircuitbetweensourceanddestinationis200bps.Assuming0.02ssetuptimeand200bitsofheaderappendedtothepacket,howlongdoesittaketosendthepacket?Solution:?(1).?t=5*(3000+500)/1000+0.1=17.6s???(2).?t=5*(3000+200)/1000=16s???(3).?t=(3000+200)/200+0.02=16.02s??/:。
计算机网络英文题库(附答案)chapter1精心整理Chapter1ComputerNetworksandtheInternet1.The()isaworldwidecomputernetwork,thatis,anetworktha tinterconnectsmillionsofcomputingdevicesthroughoutt heworld.ppt3A publicInternetB IntranetC switchnetD televisionnet 2.Whichkindofmediaisnotaguidedmedia?()A twisted-paircopperwireB acoaxialcableC fiberopticsD digitalsatellitechannel 3.Whichkindofmediaisaguidedmedia?()A geostationarysatelliteB low-altitudesatelliteC fiberopticsD wirelessLAN4.ed().A FramesB SegmentsC DatagramsD bitstreams5.ABCD6.()makessurethatneithersideofaconnectionoverwhelmsth eothersidebysendingtoomanypacketstoofast.A ReliabledatatransferB FlowcontrolC CongestioncontrolD Handshakingprocedure7.()meansthattheswitchmustreceivetheentirepacketbefor eitcanbegintotransmitthefirstbitofthepacketontotheo utboundlink.A Store-and-forwardtransmissionB FDMC End-to-endconnectionD TDM8.Datagramnetworksandvirtual-circuitnetworksdifferint hat().Adatagramnetworksarecircuit-switchednetworks,a ndvirtual-circuitnetworksarepacket-switchednetworks.Bdatagramnetworksarepacket-switchednetworks,an dvirtual-circuitnetworksarecircuit-switchednetworks.D satellite 10.Processingdelaydoesnotincludethetimeto().A examinethepacket’sheaderB waittotransmitthepacketontothelinkC determinewheretodirectthepacketD checkbit-errorinthepacket 11.Inthefollowingfourdescriptions,whichoneiscorrect?() A Thetrafficintensitymustbegreaterthan1.B Thefractionoflostpacketsincreasesasthetraffic intensitydecreases.CIfthetrafficintensityisclosetozero,theaverage queuingdelaywillbeclosetozero.DIfthetrafficintensityisclosetoone,theaverageq ueuingdelaywillbeclosetoone.12.TheInternet’snetwo rklayerisresponsibleformovingne twork-layerpacketsknownas()fromonehosttoanother.A frameB datagramC segmentD message 13.Theprotocolsofvariouslayersarecalled().A theprotocolstackB TCP/IPC ISPD networkprotocol 14.Therearetwoclassesofpacket-switchednetworks:()netw orksandvirtual-circuitnetworks.A datagramB circuit-switchedC televisionD telephone 15.Accessnetworkscanbelooselyclassifiedintothreecateg ories:residentialaccess,companyaccessand()access.A cabledB wirelessC campusD cityareaQuestion16~17Suppose,a istheaveragerateatwhichpacketsarriveatthe queue,Rhan(17).16. A LR/aB LaC RaD LR17.A 2B 1C 0D -118.IntheInternet,theequivalentconcepttoendsystemsis().A hostsB serversC clientsD routers19.IntheInternet,endsystemsareconnectedtogetherby().A copperwireB coaxialcableC communicationlinksD fiberoptics20.EndsystemsaccesstotheInternetthroughits().A modemsB protocolsC ISPD sockets21.Endsystems,packetswitches,andotherpiecesoftheInter net,run()thatcontrolthesendingandreceivingofinformationwithintheInternet.A programsB processesC applicationsD protocols22.Therearemanyprivatenetworks,suchasmanycorporatean dgovernmentnetworks,whosehostscannotexchangemessage 24.TheInternetprovidestwoservicestoitsdistributedapplications:aconnectionlessunreliableserviceand()service.A flowcontrolB connection-orientedreliableC congestioncontrolD TCP25.Itdefinestheformatandtheorderofmessagesexchangedb etweentwoormorecommunicatingentities,aswellastheactionstakenonthetransmissionand/orreceiptofamessageorotherevent.Thesentencedescribes().A InternetB protocolC intranetD network26.Inthefollowingoptions,whichdoesnotdefineinprotocol ()AtheformatofmessagesexchangedbetweentwoormorecommunicatingentitiesBtheorderofmessagesexchangedbetweentwoormorecommunicatingentitiesC theactionstakenonthetransmissionofamessageoro thereventD thetransmissionsignalsaredigitalsignalsoranal ogsignals27.Inthefollowingoptions,whichisdefinedinprotocol?() Atheactionstakenonthetransmissionand/orreceipt ofamessageorothereventB theobjectsexchangedbetweencommunicatingentitiesC thecontentintheexchangedmessagesD thelocationofthehosts 28.Inthefollowingoptions,whichdoesnotbelongtothenetwo rkedge?()A endsystemsB routersC clientsD servers29.Inthefollowingoptions,whichbelongstothenetworkcore ()A endsystemsB routersC clientsD servers30.nternet’A reliabledatatransferBCD31.A flowcontrolB congestion-controlC reliabledatatransferD connection-orientedservice 32.Itmakessurethatneithersideofaconnectionoverwhelmst heothersidebysendingtoomanypacketstoofast.Thesente ncedescribes().A flowcontrolB congestion-controlC connection-orientedserviceD reliabledatatransfer33.IthelpspreventtheInternetfromenteringastateofgridlock.Whenapacketswitchbecomescongested,itsbufferscanoverflowandpacketlosscanoccur.Thesentencedescribes().A flowcontrolB congestion-controlC connection-orientedserviceD reliabledatatransfer34.TheInternet’sconnection-orientedservicehasaname,i tis().A TCPB UDPC TCP/IPD IPA SMTPB internettelephoneC FTPD HTTP38.Inthefollowingoptions,whichdoesnotuseUDP?()A InternetphoneB videoconferencingC streamingmultimediaD telnet39.Therearetwofundamentalapproachestobuildinganetwor kcore,()andpacketswitching.A electricalcurrentswitchingB circuitswitchingC dataswitchingD messageswitching40.In()networks,theresourcesneededalongapathtoprovide forcommunicationbetweentheendsystemarereservedfort hedurationofthecommunicationsession.A packet-switchedB data-switchedC circuit-switchedD message-switched41.In()networks,theresourcesarenotreserved;asession’smessagesusetheresourcesondemand,andasaconsequence ,mayhavetowaitforaccesstocommunicationlink.A packet-switchedB data-switchedC circuit-switchedD message-switched42.Inacircuit-switchednetwork,ifeachlinkhas n circuits, foreachlinkusedbytheend-to-endconnection,theconnec tiongets()ofthelink’sbandwidthfor thedurationofthe connection.A afraction1/nB allC 1/2D ntimes43.For(),thetransmissionrateofacircuitisequaltothefra meratemultipliedbythenumberofbitsinaslot.A CDMAB packet-switchednetworkC TDMD FDM44.()meansthattheswitchmustreceivetheentirepacketbefo eoutboundlink.A QueuingdelayBC PacketlossD Propagation45.ABCD 46.Thenetworkthatforwardspacketsaccordingtovirtual-ci rcuitnumbersiscalled()network.A circuit-switchedB packet-switchedC virtual-circuitD datagram47.Inthefollowingentries,whichisnotakindofaccessnetwo rk?()A residentialaccessB companyaccessC wirelessaccessD localaccess 48.Supposethereisexactlyonepacketswitchbetweenasendin ghostandareceivinghost.Thetransmissionratesbetween thesendinghostandtheswitchandbetweentheswitchandth ereceivinghostare R1and R2,respectively.Assumingthattheswitchusesstore-and-forwardpacketswitching,whatisthetotalend-to-enddelaytosendapacketoflength L?(Ignorequeuingdelay,propagationdelay,andprocessingdelay.)()A L/R1+L/R2B L/R1C L/R2D noneoftheabove51.Considersendingapacketof3000bitsoverapathof5links.Eachlinktransmitsat1000bps.Queuingdelays,propagationde layandprocessingdelayarenegligible.(6points)(1).Supposethenetworkisapacket-switchedvirtualcircuitnetwork.VCsetuptimeis0.1seconds.Supposethesendinglayersaddatotalo f500bitsofheadertoeachpacket.Howlongdoesittaketosendthefilefro msourcetodestination?(2).Supposethenetworkisapacket-switcheddatagramnetworkandaconnectionlessserviceisused.Nowsupposeeachpackethas200bi tsofheader.Howlongdoesittaketosendthefile?(3).Supposethatthenetworkisacircuit-switchednetwork.Furthersupposethatthetransmissionrateofthecircuitbetweensourceandde stinationis200bps.Assuming0.02ssetuptimeand200bitsofheaderappe ndedtothepacket,howlongdoesittaketosendthepacket?Solution:?(1).?t=5*(3000+500)/1000+0.1=17.6s?(2).?t=5*(3000+200)/1000=16s?? (3).?t=(3000+200)/200+0.02=16.02s?? /:。
Unit OneUse of English6. – How are you getting on with your study?–A) Thanks. And you?B) I hope all goes well with you.C) Terrible.D) Not at all.8. – How do you do?–A) How do you do?B) Ok.C) No, thanks.D) Nice to meet you, too.9. – Haven’t seen you for ages. How’s it going?–A) Haven’t seen you for ages.B) Yes, long time no see.C) How are you?D) Everything is all right.6.【解析】答案C当对方问“最近你学习怎么样”的时候,你应该告诉对方你的真实情况,而不是道谢或言他。
8. 【解析】答案A 当对方问How do you do 的时候,我们一般只能用同样的句子作答。
9.【解析】答案D 当对方说:“好久不见。
你好吗”的时候,我们一般根据真实情况作答。
Vocabulary & Structure31.When we learn a foreign language, we should hold that no culture is inferior _____ the others.A. forB. toC. asD. under【题解】答案B固定搭配be inferior to 的意思是“比……低等,低级”【译文】学外语时,我们必须一直坚信:文化是平等的,没有高低贵贱之分。
36.In the first class in this semester, the teacher started ______ a story she experienced during thesummer holiday.A. asB. atC. inD. with【题解】答案D固定搭配start with 的意思是“以……开始”【译文】在这学期的第一堂课上,老师一开始就讲了一个她暑期中经历的故事。
1.1 The Invention of the ComputerIt is hard to say exactly when the modern computer wasinvented. Starting in the 1930s and through the 1940s, a numberof machines were developed that were like computers. But mostof these machines did not have all the characteristics that weassociate with computers today. These characteristics are thatthe machine is electronic, that it has a stored program, and thatit is general purpose.很难确切地说现代计算机是什么时候发明的。
从2 0世纪3 0年代到4 0年代,制造了许多类似计算机的机器。
但是这些机器大部分没有今天我们所说的计算机的所有特征。
这些特性是:机器是电子的,具有储存的程序, 而且是通用的。
1.1 The Invention of the ComputerOne of the first computerlike devices was developed in Germany byKonrad Zuse in 1941. Called the Z3, it was general-purpose, stored-program machine with many electronic parts, but it had a mechanicalmemory. Another electromechanical computing machine was developed byHoward Aiken, with financial assistance from IBM, at Harvard Universityin 1943. It was called the Automatic Sequence Control Calculator Mark I, or simply the Harvard Mark I. Neither of these machines was a true computer, however, because they were not entirely electronic.第一个类似计算机的装置之一是1 941年由德国的K onradZuse研制的,叫做Z 3,它是通用型储存程序机器,具有许多电子部件,但是它的存储器是机械的。
Chapter 3 Transport Layer1. A transport-layer protocol provides for logical communication between ____.A Application processesB HostsC RoutersD End systems2. Transport-layer protocols run in ____.A ServersBClientsCRoutersDEnd systems3. In transport layer, the send side breaks application messages into ____, passes to network layer.A FramesB SegmentsC Data-gramsD bit streams4. Services provided by transport layer include ____.A HTTP and FTPB TCP and IPC TCP and UDPD SMTP5. Which of the following services is not provided by TCP?A Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD In-order data transfers6. These two minimal transport-layer services----____ and ____----are the only two services that UDP provides!A process-to-process data delivery, error checkingB congestion control, reliable data transferC flow control, congestion controlD In-order data transfer, error checking7. Port number’s scope is ____ to ____.A 0, 1023B 0, 65535C 0, 127D 0,2558. The port numbers ranging from ____to ____ are called well-known port number and are restricted.A 0, 1023B 0, 65535C 0, 127D 0,2559. UDP socket identified by two components, they are____.A source IP addresses and source port numbersB source IP addresses and destination IP addressesC destination IP address and destination port numbersD destination port numbers and source port numbers10. TCP socket identified by a (an) ____.A 1-tupleB 2-tupleC 3-tupleD 4-tuple11. Which of the following applications normally uses UDP services?A SMTPB Streaming multimediaC FTPD HTTP12.Reliable data transfer protocol over a perfectly reliable channel is ____.A rdt1.0B rdt2.0C rdt3.0D rdt2.113.Reliable data transfer protocol over a channel with bit errors and packet losses is____.A rdt1.0B rdt2.0C rdt3.0D rdt2.114.Which of the following about reliable data transfer over a channel with bit errors is not correct?A RDT2.0:assuming ACK and NAK will not be corruptedB RDT2.1:assuming ACK and NAK can be corruptedC RDT2.2:only use ACK-sD RDT2.2:use both ACK-s and NAK-s15.Which of the following protocols is not pipelining protocols?A TCPB rdt3.0C GO-BACK-ND selective repeat16.Which of the following is not correct about GBN protocol?A Only using ACK-sB Using cumulative ACK-sC Receiver discards all out-of-order packetsD It is not pipelined protocol17.Which of the following is not correct about SR protocol?A receiver individually acknowledges all correctly received packetsB sender only resends packets for which ACK not receivedC It limits sequence number of sent but un-ACK-ed packetsD It is not a pipelined protocol18. Which of the following about TCP connection is not correct?A It is a broadcast connectionB It is a point-to-point connectionC It is a pipelined connectionD It is a full duplex connection19. The SYN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection20. The FIN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection21.How does TCP sender perceive congestion?A Through a timeout eventB Through a receiving duplicate ACK-s eventC Both A and BD Either A or B22. Extending host-to-host delivery to process-to-process delivery is called transport-layer____ and .A multiplexing and de-multiplexingB storing and forwardingC forwarding and filteringD switching and routing23. UDP is a ____ service while TCP is a connection-oriented service.A ConnectionlessB ReliableC Connection-orientedD In-order24. The UDP header has only four fields, they are____.A Source port number, destination port number, length and checksumB Source port number, destination port number, source IP and destination IPC source IP, destination IP, source MAC address and destination MAC addressD source IP, destination IP, sequence number and ACK sequence number25. There are two 16-bit integers: 1110 0110 0110 0110, 1101 0101 0101 0101. Their checksum is____.A 00011B 11100C 11111D 0000026.The maximum amount of data that can be grabbed and placed in a segment is limited by the____.A Maximum segment size (MSS)B MTUC ChecksumD Sequence number27.The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host----the so-called____.A Maximum transmission unit (MTU)B MSSC ChecksumD Sequence number28. A File size of 500,000bytes, MSS equals 1000bytes. When we want to transmit this file with TCP, the sequence number of the first segment is 0, and the sequence number of the second segment is ____.A 1000B 999C 1001D 50000029.Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide____.A Cumulative acknowledgementsB Selective acknowledgementsC 3 duplicate ACKsD positive ACKs30. Provided α=0.125, current value of Estimated-RTT is 0.4s, Sample-RTT is 0.8s, then the new value of Estimated-RTT is ____s.A 0.45B 0.6C 0.7D 0.831.Provided RcvBuffer=20,LastByteRcvd=20,LastByteRead=15, thenRcvWindow=____.A 14B 15C 16D 1032. TCP service does not provide____.A Reliable data transferB Flow controlC Delay guaranteeD Congestion control33. There are two states in TCP congestion control, which are ____.A slow start and congestion avoidanceB safe start and congestion avoidanceC slow start and congestion abandonD safe start and congestion abandon34. The transport-layer protocol provides logical communication between ____, and the network-layer protocol provides logical communication ____.A hosts, processesB processes, hostsC threads, processesD processes, threads35.To implement the multicast services the Internet employs the__ __protocol.A FTPB TCPC IGMPD UDP36. If an application developer chooses ____ protocol, then the application process is almost directly talking with IP.A HTTPB RIPC CSMA/CDD UDP37. ____ maintains connection-state in the end systems. This connection state includes receive and send buffers, congestion-control parameters, and sequence and acknowledgment number parameters.A UDPB TCPC DNSD HTTP38. The host that initiates the session in the Internet is labeled as ____.A serverB user agentC clientD router39. With TCP there is no _____ between sending and receiving transport-layer entities.A flow controlB handshakingC.congestion control D VC setup40. The Internet’s ____ service helps prevent the Internet from entering a state of gridlock.A datagramB congestion controlC sliding windowD timeout event41. Connection setup at the transport layer involves ____.A serverB only the two end systemsC clientD router42. A ____layer protocol provides for logical communication between applications.A transportB applicationC networkingD MAC43. In static congestion window, if it satisfies W*S/R > RTT + S/R, the Latency is ____.A W*S/R – ( RTT+ S/R)B 2RTT + O/RC 2RTT + O/R + (k-1)[W* S/R- (RTT + S/R)]D 2RTT + S/R44. The receive side of transport layer reassembles segments into messages, passes to ____layer.A ApplicationB NetworkingC PhysicalD MAC45. In the following four options, which one is correct?A The variations in the SampleRTT are smoothed out in the computation of theEstimatedRTTB The timeout should be less than the connection’s RTTC Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current value of TimeoutInterval will necessarily be≥1 secD Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current value of TimeoutInterval will necessarily be≤1 sec46. The port number used by HTTP is ____.A 80B 25C 110D 5347. The port number used by SMTP is ____.A 80B 25C 110D 5348. The port number used by pop3 is ____.A 80B 25C 110D 5349. The port number used by DNS is ____.A 80B 25C 110D 5350. The port number used by FTP is ____.A 20 and 21B 20C 21D 5351. A UDP socket identified by a ____ tuple(s).A 2B 4C 1D 352. A TCP socket identified by a ____ tuple(s).A 2B 4C 1D 353. A TCP socket does not include____.A Source MAC addressB Source port numberC Destination IP addressD Destination port number54. Which of following about UDP is not correct.A It is a reliable data transfer protocolB It is connectionlessC no handshaking between UDP sender, receiverD it is a best effort service protocol55. DNS uses ____ service.A TCPB UDPC Both TCP and UDPD None of above56. Which of following about UDP is correct?A Finer application-level control over what data is sent, and whenB No connection establishment (which can add delay), so no delay for establish a connectionC No connection state (so, UDP can typically support many active clients)D Large packet header overhead (16-B)57. Streaming media uses a ____ service normally.A TCPB UDPC Both TCP and UDPD None of above58. The UDP header has only ____ fields.A 2B 4C 1D 359. Which of the following does not included in UDP header.A Source port numberB Destination port numberC ChecksumD Sequence number60. Which of the following is not a pipelining protocol.A Rdt1.0B Go-Back-NC Selective repeatD TCP61. In the following four descriptions about MSS and MTU, which one is not correct?A The MSS is the maximum amount of application-layer data in the segmentB The MSS is the maximum size of the TCP segment including headersC The MSS is typically set by MTUD The MTU means the largest link-layer frame62. The job of gathering data chunks, encapsulating each data chunk with headerinformation to create segments and passing the segments to the network is called ____.A multiplexingB de-multiplexingC forwardingD routing63. In the following four descriptions about the relationship between the transport layer and the network layer, which one is not correct?A The transport-layer protocol provides logical communication between hostsB The transport-layer protocol provides logical communication between processesC The services that a transport-layer protocol can provide are often constrained by the service model of the network-layer protocolD A computer network may make available multiple transport protocols64. Suppose the following three 8-bit bytes: 01010101, 01110000, 01001100. What’s the 1s complement of the sum of these 8-bit bytes?A 00010001B 11101101C 00010010D 1000100065. The following four descriptions about multiplexing and de-multiplexing, which one is correct?A A UDP socket is identified by a two-tuples consisting of a source port number and adestination port number.B If two UDP segment have different source port number, they may be directed to the same destination process.C If two TCP segments with different source port number, they may be directed to the same destination process.D If two TCP segments with same destination IP address and destination port number, they must be the same TCP connection.66. UDP and TCP both have the fields except ____.A source port numberB destination port numberC checksumD receive window67. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval [nextseqnum,base+N-1] corresponds to packet that ____.A can be sent immediatelyB have already been transmitted and acknowledgedC cannot be usedD have been sent but not yet acknowledged68. Which of the following about TCP is not correct?A It is a connectionless protocolB Point-to-point protocolC Reliable, in-order byte steam protocolD Pipelined protocol69. Which of the following about TCP is not correct?A It is a connectionless protocolB full duplex data transfer protocolC connection-oriented protocolD flow controlled protocol70. The maximum amount of data that can be grabbed and placed in a segment is limited by the ____.A Maximum segment size (MSS)B MTUC Sequence numberD Check sum71. The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host (the so-called____), and then will fit into a single link-layer frame.A Maximum segment size (MSS)B MTUC Sequence numberD Check sum72. The MSS is the maximum amount of ____layer data in the segment, not the maximum size of the TCP segment including headers.A ApplicationB TransportC NetworkingD Link73. Which of the following field is not used for connection setup and teardown?A Sequence numberB TSTC SYND FIN74. ____ is the byte stream number of first byte in the segment.A Sequence numberB ACK numberC ChecksumD port number75. ____ is the byte sequence numbers of next byte expected from other side.A Sequence numberB ACK numberC ChecksumD port number76. Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide ____ acknowledgements.A CumulativeB SelectiveC SingleD Negative77. Fast retransmit means in the case that ____ duplicate ACK-s are received, the TCP sender resend segment before timer expires.A 3B 4C 5D 678. TCP____ means sender won’t overflow receiver’s buffer by transmitting too much, too fast.A Flow controlB Congestion controlC Reliable data transferD Connection-oriented service79. TCP provides flow control by having the sender maintain a variable called the ____.A Receive windowB Congestion windowC Sliding windowD buffer80. How does TCP sender perceive congestion?A TimeoutB 3 duplicate ACK-sC Both A and BD None of above81. Transport protocols run in ____.A ServersB ClientsC RoutersD End systems82. Which of the following services is not provided by TCP?A Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD In-order data transfers83. Which service does UDP not provide?A multiplexingB de-multiplexingC error-detectionDerror-correction84. There are three major events related to data transmission and retransmission in the TCP sender, which one is not in it?A data received from application aboveB de-multiplexing segmentC timer timeoutD ACK receipt85. Which of the following applications normally uses UDP services?A SMTPB Streaming multimediaC FTPD HTTP86. Which of the following about TCP connection is not correct?A It is a broadcast connectionB It is a point-to-point connectionC It is a pipelined connectionD It is a full duplex connection87. The SYN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection88. Which service helps prevent the internet from entering a state of gridlock?A reliable data transferB flow controlC congestion controlD handshaking procedure89. The Internet’s _____is responsible for moving packets from one host to another.A application layerB transport layerC network layerD link layer90.In the following applications, which one is a bandwidth-sensitive application?A E-mailB web applicationC real-time audioD file transfer91. In the following applications, which one uses UDP?A E-mailB web applicationC file transferD DNS92. In the following four descriptions, which one is correct?A If one host’s transport layer uses TCP, then its network layer must use virtual-circuit network.B Datagram network provides connection serviceC The transport-layer connection service is implemented in the routerD The network-layer connection service is implemented in the router as well as in the end system.93.____ is a speeding-matching service---matching the rate which the sender is sending against the rate at which the receiving application is reading.A congestion controlB flow controlC sliding-window controlD variable control94. In the following four descriptions about Rcv-Window, which one is correct?A The size of the TCP RcvWindow never changes throughout the duration of the connectionB The size of the TCP RcvWindow will change with the size of the TCP RcvBufferC The size of the TCP RcvWindow must be less than or equal to the size of the TCP RcvBufferD Suppose host A sends a file to host B over a TCP connection, the number of unacknowledged bytes that A sends cannot exceed the size of the size of the RcvWindow.95. There are 6 flag fields. Which one is to indicate that the receiver should pass the data to the upper layer immediately?A PSHB URGC ACKD RST96. Suppose the TCP receiver receives the segment that partially or completely fills ingap in received data, it will ____.A immediately send ACKB immediately send duplicate ACKC wait some time for arrival of another in-order segmentD send single cumulative97. _____ imposes constrain on the rate at which a TCP sender can send traffic into the network.A sliding windowB congestion windowC receive windowD variable window98. Flow control and congestion control are same at that they all limit the rate of the sender, but differ in that ____.A flow control limits its rate by the size of RcvWindow, but congestion control by the traffic on the linkB congestion control limits its rate by the size of RcvWindow, but flow control by the traffic on the linkC flow control mainly is accomplished by the sender, but congestion control by the receiver.D flow control mainly is accomplished by the receiver, but congestion control by the link.99. This job of delivering the data in a transport-layer segment to the correct socket iscalled ____.A multiplexingB de-multiplexingC forwardingD routing100. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval [base, nextseqnum-1] corresponds to packet that ____.A can be sent immediatelyB have already been transmitted and acknowledgedC cannot be usedD have been sent but not yet acknowledged101. ____ are the two types of transport services that the Internet provides to the applications.A TCP and UDPB connection-oriented and connectionless serviceC TCP and IPD reliable data transfer and flow control102. In the following descriptions about persistent connection, which one is not correct?A The server leaves the TCP connection open after sending a responseB Each TCP connection is closed after the server sending one objectC There are two versions of persistent connection: without pipelining and with pipeliningD The default mode of HTTP uses persistent connection with pipelining103. The field of Length in UDP segment specifies the length of ____.A the UDP segment, not including the headerB the UDP segment, including the headerC the UDP segment’s headerD the Length field104. In TCP segment header, which field can implement the reliable data transfer?A source port number and destination port numberB sequence number and ACK numberC urgent data pointerD Receive window105. In the following four descriptions about TCP connection management, which one is not correct?A Either of the two processes participating in a TCP connection can end the connectionB If the FIN bit is set to 1, it means that it wants to close the connectionC In the first two step of the three-way handshake, the client and server randomly choose an initial sequence numberD In the three segments of the three-way handshake, the SYN bit must be set to 1 106. Suppose host A sends two TCP segments back to back to host B over a TCPconnection. The first segment has sequence number 42, and the second has sequence number 110. If the 1st is lost and 2nd arrives at host B. What will be the acknowledgment number?A 43B ACK42C 109D ACK1101.Consider sending an object of size O=500,000bytes from server to client. Let S=500bytes and RTT=0.2s. Suppose the transport protocol uses static windows with window size 5. For a transmission rate of 100Kbps, determine the latency for sending the whole object. Recall the number of windows K=O/ WS), and there is K-1 stalled state (that is idle time gaps).2.Consider the following plot of TCP congestion window size as a function of time.Fill in the blanks as follow:a) The initial value of Threshold at the first transmission round is ____. b) The value of Threshold at the 11st transmission round is ____. c) The value of Threshold at the 21st transmission round is ____. d) After the 9th transmission round, segment loss detected by ____.(A) Timeout (B) Triple duplicate ACKe) After the 19th transmission round, segment loss detected by ____.14 180 26 3000 2 6 4 8 10 12 16 20 22 240 28 32Congestion window sizeTransmission round481216(A)Timeout(B)Triple duplicate ACKf)During ____ transmission round, the 18th segment is sent.3.Consider the TCP reliable data transfer in the given graph. If in Segment 1’s Sequence number =10,data=“AC〞, please fill in the following blanks.a)In Segment 2, ACK number=____;b)In Segment 3, Sequence number =____; data=“0123456789”c)If there are some bits corrupted in segment 3 when it arrives Host B, then the ACKnumber in Segment 5 is ____; and the ACK number in Segment 6 is ____.12345674. The client A wants to request a Web page from Server B. Suppose the URL of the page is 172.16.0.200/experiment, and also it wants to receive French version of object. The time-sequence diagram is shown below, please fill in the blanks.12345Packet① to Packet③ are TCP connection’s segment, then:Packet ①: SYN flag bit= aACK flag bit= bSequence number= 92Packet ②: SYN flag bit=1ACK flag bit= cSequence number=100Packet ③: SYN flag bit= dACK flag bit=1Sequence number= e5. Consider sending an object of size O=100 Kbytes from server to client. Let S=536 bytes and RTT=100msec. Suppose the transport protocol uses static windows with window size W.(1) For a transmission rate of 25 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency.(2) Repeat (1) for 100 kbps.6. Consider the following plot of TCP congestion window size as a function of time. Please fill in the blanks as below.a) The initial value of Threshold at the first transmission round is____. b)The value of Threshold at the 11th transmission round is_____. c) The value of Threshold at the 21st transmission round is_____. d) After the 9th transmission round, _____ occurs.e) After the 19th transmission round, ____ are detected.14 18 26 30 0 2 6 4 8 10 12 16 20 22 24 28 32 Congestion window size Transmission round 4 8 12 16。
Chapter 1 Computer Networks and the Internet1.The ( ) is a worldwide computer network, that is, a network that interconnects millions of computing devices throughout the world. ppt3A public InternetB IntranetC switch netD television net2.Which kind of media is not a guided media? ( )A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel3.Which kind of media is a guided media? ( )A geostationary satelliteB low-altitude satelliteC fiber opticsD wireless LAN4.The units of data exchanged by a link-layer protocol are called ( ).A FramesB SegmentsC DatagramsD bit streams5.Which of the following option belongs to the circuit-switched networks? ( )A FDMB TDMC VC networksD both A and B6.( )makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure7.( ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM8.Datagram networks and virtual-circuit networks differ in that ( ).A datagram networks are circuit-switchednetworks, and virtual-circuit networks arepacket-switched networks.B datagram networks are packet-switchednetworks, and virtual-circuit networks arecircuit-switched networks.C datagram networks use destinationaddresses and virtual-circuit networks useVC. numbers to forward packets toward theirdestination.D datagram networks use VC. numbers andvirtual-circuit networks use destinationaddresses to forward packets toward theirdestination.9.In the following options, which one is not a guided media? ( )A twisted-pair wireB fiber opticsC coaxial cableD satellite10.Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet11.In the following four descriptions, which one is correct? ( )A The traffic intensity must be greater than1.B The fraction of lost packets increases asthe traffic intensity decreases.C If the traffic intensity is close to zero,the average queuing delay will be close tozero.D If the traffic intensity is close to one,the average queuing delay will be close toone.12.The Internet’s network layer is responsible for moving network-layer packets known as ( ) from one host to another.A frameB datagramC segmentD message13.The protocols of various layers are called ( ).A the protocol stackB TCP/IPC ISPD network protocol14.There are two classes of packet-switched networks: ( ) networks and virtual-circuit networks.A datagramB circuit-switchedC televisionD telephone15.Access networks can be loosely classified into three categories: residential access, company access and ( ) access.A cabledB wirelessC campusD city areaQuestion 16~17Suppose, a is the average rate at which packets arrive at the queue, R is the transmission rate, and all packets consist of L bits, then the traffic intensity is ( 16 ), and it should no greater than ( 17 ).16. A LR/aB La/RC Ra/LD LR/a17.A 2B 1C 0D -118.In the Internet, the equivalent concept to end systems is ( ).A hostsB serversC clientsD routers19.In the Internet, end systems are connected together by ( ).A copper wireB coaxial cableC communication linksD fiber optics20.End systems access to the Internet through its ( ).A modemsB protocolsC ISPD sockets21.End systems, packet switches, and other pieces of the Internet, run ( ) that control thesending and receiving of information within the Internet.A programsB processesC applicationsD protocols22.There are many private networks, such as many corporate and government networks, whose hosts cannot exchange messages with hosts outside of the private network. These private networks are often referred to as ( ).A internetsB LANC intranetsD WAN23.The internet allows ( ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications24.The Internet provides two services to its distributed applications: a connectionlessunreliable service and () service.A flow controlB connection-oriented reliableC congestion controlD TCP25.It defines the format and the order of messagesexchanged between two or more communicatingentities, as well as the actions taken on the transmission and/or receipt of a message orother event. The sentence describes ( ).A InternetB protocolC intranetD network26.In the following options, which does not define in protocol? ( )A the format of messages exchanged betweentwo or more communicating entitiesB the order of messages exchanged betweentwo or more communicating entitiesC the actions taken on the transmission ofa message or other eventD the transmission signals are digitalsignals or analog signals27.In the following options, which is defined in protocol? ( )A the actions taken on the transmission and/orreceipt of a message or other eventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts28.In the following options, which does not belong to the network edge? ( )A end systemsB routersC clientsD servers29.In the following options, which belongs to the network core? ( )A end systemsB routersC clientsD servers30.In the following options, which is not the bundled with the Internet’sconnection-oriented service? ( )A reliable data transferB guarantee of the transmission timeC flow controlD congestion-control31.An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes ( ).A flow controlB congestion-controlC reliable data transferD connection-oriented service32.It makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer33.It helps prevent the Internet from entering a state of gridlock. When a packet switch becomes congested, its buffers can overflow and packet loss can occur. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer34.The Internet’s connection-oriented service has a name, it is ( ).A TCPB UDPC TCP/IPD IP35.In the following options, which service does not be provided to an application by TCP?( )A reliable transportB flow controlC video conferencingD congestion control36.The Internet’s connectionless service is called ( ).A TCPB UDPC TCP/IPD IP37.In the following options, which does not use TCP?( )A SMTPB internet telephoneC FTPD HTTP38.In the following options, which does not use UDP?( )A Internet phoneB video conferencingC streaming multimediaD telnet39.There are two fundamental approaches to buildinga network core, ( ) and packet switching.A electrical current switchingB circuit switchingC data switchingD message switching40.In ( ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration of the communication session.A packet-switchedB data-switchedC circuit-switchedD message-switched41.In ( ) networks, the resources are not reserved;a session’s messages use the resources ondemand, and as a consequence, may have to wait for access to communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched42.In a circuit-switched network, if each link has n circuits, for each link used by the end-to-end connection, the connection gets ( ) of thelink’s bandwidth for the duration of theconnection.A a fraction 1/nB allC 1/2D n times43.For ( ), the transmission rate of a circuit is equal to the frame rate multiplied by the number of bits in a slot.A CDMAB packet-switched networkC TDMD FDM44.( ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Queuing delayB Store-and-forward transmissionC Packet lossD Propagation45.The network that forwards packets according to host destination addresses is called ( )network.A circuit-switchedB packet-switchedC virtual-circuitD datagram46.The network that forwards packets according to virtual-circuit numbers is called ( ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram47.In the following entries, which is not a kind of access network?( )A residential accessB company accessC wireless accessD local access48.Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and thereceiving host are R1 and R2, respectively.Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignorequeuing delay, propagation delay, andprocessing delay.) ( )A L/R1+L/R2B L/R1C L/R2D none of the above49.The time required to examine the packet’s headerand determine where to direct the packet is part of the ( ).A queuing delayB processing delayC propagation delayD transmission delay50.The time required to propagate from the beginning of the link to the next router is ( ).A queuing delayB processing delayC propagation delayD transmission delay51.Consider sending a packet of 3000bits over a path of 5 links. Each link transmits at 1000bps. Queuing delays, propagation delay and processing delay are negligible. (6 points)(1).Suppose the network is a packet-switched virtual circuit network. VC setup time is 0.1 seconds. Suppose the sending layers add a total of 500 bits of header to each packet. How long does it take to send the file from source to destination?(2).Suppose the network is a packet-switched datagram network and a connectionless service is used. Now suppose each packet has 200 bits of header. How long does it take to send the file?(3).Suppose that the network is a circuit-switched network. Further suppose that the transmission rate of the circuit between source and destination is 200bps. Assuming 0.02s setup time and 200 bits of header appended to the packet, how long does it take to send the packet?Solution:?(1) .?t=5*(3000+500)/1000+0.1=17.6s?(2). t=5*(3000+200)/1000=16s(3). t=(3000+200)/200+0.02=16.02s。
计算机网络英文题库(附答案)c h a p t e r2(总17页) -本页仅作为预览文档封面,使用时请删除本页-Chapter 2 Application Layer1. In the following four descriptions, which one is correctA In C/S architecture, clients communicate with each other directly.B In C/S architecture, client has a fixed well-known address.C In P2P architecture, peers communicate with each other directly.D In P2P architecture, peer has a fixed well-known address.2. In the context of a communication session between a pair of process, the process that initiates the communication is labeled as the , the process that waits to be contacted to begin the session is labeled as the .A client process, server processB sending process, receiving processC input process, output processD communicating process, connecting process3. A socket is the interface between within a host.A the network layer and the link layerB the link layer and the physical layerC the application layer and the transport layerD the transport layer and the network layer4. In the following applications, which one is a loss-tolerant applicationA E-mailB file transferC instant messagingD real-time audio5. In the following applications, which one is a bandwidth-sensitive applicationA E-mailB web applicationC real-time audioD file transfer6. The service of TCP can’t guarantee .A delivery of all data without errorB delivery of all data in the proper orderC the rate of deliveryD congestion control7. In the following applications, which one uses UDPA E-mailB web applicationC file transferD DNS8. In the following descriptions about HTTP, which one is not correctA HTTP uses non-persistent connections in its default mode.B HTTP uses TCP as its underlying transport protocol.C HTTP is a stateless protocol.D HTTP is client-server architecture.9. Suppose a web page consists of a base HTML file, 5 JEPG images and a java applet, and also suppose HTTP uses persistent connection without pipelining, the total response timeis .A 2RTTB 8RTTC 12 RTTD 14RTT10. In HTTP response message, if the requested HTTP protocol version is not supported, the status code is .A 200B 301C 400D 5051~5 CACDC 6~10 CDABD11. The port number of web application is .A 25B 20C 80D 5312. A network entity that satisfies HTTP requests on the behalf of an origin web server is .A server farmB server stackC proxy serverD edge server13. In the following descriptions about persistent connection, which one is not correctA The server leaves the TCP connection open after sending a response.B Each TCP connection is closed after the server sending one object.C There are two versions of persistent connection: without pipelining and with pipelining.D The default mode of HTTP uses persistent connection with pipelining.14. FTP uses two parallel TCP connections to transfer a file, there are .A control connection and data connectionB receiving connection and sending connectionC client connection and sever connectionD program connection and process connection15. In the following descriptions about FTP, which one is correctA FTP is p2p architecture.B FTP sends its control information out-of-band.C FTP uses persistent connection.D FTP is a stateless protocol.16. In the commands of FTP, which one does not have parameterA USERB PASSC LISTD STOR17. The Internet mail system has three components which they are .A user agent, SMTP, POP3B SMTP, POP3, IMAPC user agent, SMTP, IMAPD user agent, SMTP, mail server18. If the status code in HTTP response message is 404, it means .A Request succeeded.B The requested document doesn’t exit on this server.C This is a generic error code indicating that the request could not be understood by the server.D Requested object has been permanently mover.19. Comparison HTTP with SMTP, the correct is .A HTTP is a push protocol, and SMTP is a pull protocol.B In the default mode, both of them use persistent connection.C HTTP place s all of the message’s objects into one message, and SMTP sends every object one by one.D HTTP requires each message to be in 7-bit ASCII format, and SMTP doesn’t impose this restriction.20. The headers in the MIME message must include except .A FromB Content-typeC Content-transfer-encodingD MIME version11~15CCBAB 16~20 DDBBD21. In the following protocol, which one is statelessA POP3B SMTPC FTPD IMAP22. DNS means .A Data Name SystemB Data National SystemC Domain Name SystemD Domain National System23. There are three classes of DNS server except .A Root DNS serverB Local DNS serverC TLD server D Authoritative DNS server24. DNS provides some services except .A Host aliasingB Mail server aliasingC Load distributionD A single point of failure25. There are three architectures for locating content in P2P file sharing, KaZaA uses .A Centralized Directory (Napster)B Query Flooding(Gnutella)C Exploiting Heterogeneity (p141)D Incentive Priorities26. There are three architectures for locating content in P2P file sharing, Napster uses .A Centralized Directory (p137)B Query FloodingC Exploiting HeterogeneityD Incentive Priorities27. The following architectures in P2P file sharing, which is an overlay networkA Centralized DirectoryB Query Flooding(p139)C Exploiting HeterogeneityD Incentive Priorities28. The time it takes for a small packet to travel from client to server and then back to the client is .A round-travel timeB next-hop timeC round-trip timeD prefix-matching time29. Suppose A ( with a Web-based e-mail account ) sends a message to B ( who accesses his mail server using POP3), which application-layer protocol is not usedA HTTPB SMTPC POP3D IMAP30. In the four following options, which protocol is included in Mail Access ProtocolA SMTPB DHCPC IMAPD FTP31. In FTP commands, is used to send user password to the server.A UserB PassC RetrD Stor32. The function of the additional header field in MIME Content-Type is .A to convert the message body to its origin non-ASCII formB to determine what actions it should take on message bodyC to send an E-mail to the receiving user agentD to indicate what type the message is33. In the four following options, which application is organized as hybrid of C/S and P2P architectureA E-mailB OICQC File transferD Web application34. In the four following options, which is not a centralized DNS design’s problemA a single point of failureB traffic volumeC distant centralized databaseD slow (maintenance)35.In the following options, from the application developer’s perspective, which is not correctA the network architecture is fixedB the network architecture provides a specific set of services to applicationsC the application architecture is designed by the physical devicesD the application architecture dictates how the application is organized over the various end systems36. There are three predominant architectures used in modern network applications, which one is not includedA the client-server architectureB the P2P architectureC a hybrid of the client-server and P2P architectureD a hybrid of the client-server and browser-server architecture37. In the following options about C/S architecture, which is not correctA In C/S architecture, there is an always-on host, called the server.B In C/S architecture, there is an always-on host, called the client.C The server has a fixed, well-known address, called IP address.D Clients do not directly communicate with each other.38. are often used to create a powerful virtual server in C/S architecture.A PeersB Server farmC server stackD local server39. A process sends messages into, and receives messages from, the network through its .A socketB programC clientD peer40. Which one is not defined by an application-layer protocolA the types of messages exchangedB the syntax of various message typesC the semantics of the fieldsD rules for determining when and how to translate the socket41. HTTP can use two types of connections, which are .A persistent and non-persistent connectionB connection with pipelining and without pipeliningC TCP and UDPD parallel and serial connection42. takes for a small packet to travel from client to server and then back to the client.A RDTB thresholdC RTTD overhead43. The default mode of HTTP uses .A non-persistent connection with pipeliningB non-persistent connection without pipeliningC persistent connection with pipeliningD persistent connection without pipelining44. In HTTP request messages, the request line has three fields, there are .A the method field, the URL field and the HTTP version fieldB the method, the connection and URL fieldC the user-agent, the method and HTTP version fieldD the user-agent, the URL and the HTTP version field45. In the header lines of HTTP request message, if the field of Connection is close, it specifies .A the host on which object residesB what type of the user agentC that the browser wants the server to close the connection after sending the requested objectD which language can the browser receive46. In HTTP response message, if the status code is 404, it means .A request succeeded and the information is returned in the responseB requested object has been permanently movedC the requested HTTP protocol version is not supported by the serverD the requested document does not exist on this server47. is a network entity that satisfies HTTP requests on the behalf of an origin Web server.A proxy serverB local serverC DNS serverD Web server48. In the following four options about web cache, which one is not correctA A web cache is both a server and a client at the same time.B A web cache is purchased and installed by an ISP.C A web cache can raise the response time for a client request.D A web cache can reduce traffic on an institution’s access link to the Internet.49. The request message in the conditional GET must include the header line.A Last-ModifiedB Last-ReferencedC If-Modified-SinceD If –Referenced-Since50. FTP uses two parallel connections to transfer a file, they are .A TCP and UDP connectionB connection with pipelining and without pipeliningC control an data connectionD client-server and browser-server connection51. In FTP commands, which one is used to ask the server to send back a list of all files in the current remote directoryA USERB PASSC LISTD RETR52. In the Internet mail system, allow users to read, reply to, forward, save and compose message.A User agentsB mail serversC SMTPD TCP53. The two key MIME headers for supporting multimedia are .A Content-Type and MIME-VersionB Content-Type and Content-Transfer-EncodingC Content-Transfer-Encoding and MIME-VersionD MIME-Version and MIME-Type54. For Internet mail, the mail access protocol is used to .A transfer mail from the recipient’s mail server to the recipient’s user agentB transfer mail from the sender’s mail server to the recipient’s mail serverC translate the mail fr om the sender’s mail serverD translate the mail into the recipient’s mail server55. POP3 progresses through three phases, which they are .A authorization, translation and transactionB authorization, translation and updateC authorization, transaction and updateD translation, transaction and update56. In the following four services, which one can not provide by DNSA Host aliasingB Mail server aliasingC translate hostname to IP addressesD translate MAC addresses to IP addresses57. There are three classes of DNS servers, there are .A root DNS server, top-level domain DNS server and local DNS serverB root DNS server, top-level domain DNS server and authoritative DNS serverC root DNS server, local DNS server and authoritative DNS serverD root DNS server, local DNS server and top-level domain DNS server58. In the following four options about POP3, which one is not correctA The user agent employed only three commands: List, Retr and QuitB The server does not carry state information across POP3 sessionsC The port number is 110D The POP3 protocol does not provide any means for a user to create remote folders and assign messages to folders.59. A resource record in DNS distributed database is a four-tuple, which field can be ignored(p132) A Name B Value C Type D TTL 60. In the following four options about DNSresource record, which one is correctA The meaning of Name and Value depend on Type.B The meaning of Value and Type depend on Name.C If Type=A, then Name is a domain and Value is the IP address for the hostname.D If Type=MX, then Name is domain and Value is the IP address for the hostname.61. In the following four options about DNS messages, which one is not correctA There are only two kinds of DNS message.(p133)B Both query and reply message have the same format.C The header section in DNS message has 12 bytes.D The authority section contains the resource records for the same that was originally queri ed.62. In DNS message, contains information about the query that is being made.(p133)A authority sectionB question sectionC answer sectionD additional section63. There are three techniques are employed in most any P2P file-sharing systems, which one is not include (p144)A Request queuingB incentive prioritiesC parallel downloadingD Response queuing64. In the following four options about P2P file-sharing, which one is not correctA P2P file-sharing is highly scalable.B P2P file-sharing relies on P2P architecture.C The means for locating content in different P2P file-sharing are different.D P2P file-sharing systems not only share MP3s,but also videos, software, documents and images.65. In MIME header lines, specifies the name of the SMTP server that sent the message (f rom),the name of the SMTP server that received the message (by), and the time an which the rec eiving server received the message.A ReceivedB FromC ToD MIME-Version66. If the header line Connection is close, it means that the client wants .A persistent connection with pipeliningB persistent connection without pipeliningC nonpersistent connectionD not connection67. In HTTP request message, the entity body is empty with the method, but is used with the method.A GET, POSTB POST,GETC GET, HEAD D POST, HEAD68. In HTTP response message, if the Date: header ;one indicates the time Fri. 08 Aug. 2008 12:00:00 GMT, the Last-Modified: header line can not be .A Fri. 08 Aug. 2008 11:00:00 GMTB Fri. 08 Aug. 2008 11:30:00 GMTC Fri. 08 Aug. 2008 12:00:00 GMTD Fri. 08 Aug. 2008 12:30:00 GMT69. In the following four options, which one is not the part of cookie technologyA Cookie header lines in the HTTP response message and request message.B One cookie header file kept on the user’s end system and managed by the user’s browser.C A network entity that satisfies HTTP requests on the behalf of an origin Web server.D A back-end database at the Web site70. On-top of stateless HTTP, can be used to create a user session layer.A proxy serverB Web cacheC cookieD socket71. Processes communicate with each other by reading from and writing to .A programsB threadsC socketsD channels72. In the following four options about network architecture, which one is not correctA The network architecture is fixed.B The network architecture provides a specific set of services to application.C The network architecture is designed by application developer.D The network architecture dictates how the application is organized over special server.73. In Client-Server architecture, the clients visit the server’s through .A client’s socketB client’s IP addressC server’s socketD server’s IP address74. can be thought of as a program that is running within end system.A processB threadC socketD context75. API means .A Application Program InterfaceB Application Process InterfaceC Appellation Program InterfaceD Appellation Process Interface76. One host can be running many network applications, so the system assigns them differentto distinguish each other.A IP addressB port numberC hostnameD section77. In the following four applications, which one is both bandwith-sensitive and require tight timing constraintsA real-time audioB file transferC E-mailD Web documents78. The port number of the Web server is .A 25B 20C 80D 808079. The port number of the mail server is .A 25B 20C 80D 808080. Look the URL the object’s path name is .A B /rjxy/ D81. Each URL has components, they are .A transport protocol and object’s path nameB host name and object’s path nameC transport protocol and host nameD client name and server name1. Consider an HTTP client will request a WEB page from a WEB server. Suppose the URL of the page is /somedir/. The client does not want to use persistent connections and want to receive French version of the object. The user agent is Windows NT . Give the request message according to the given format.Request line:Header lines:2. Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.Solution:Request line:Header lines:3. Suppose within you Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT1,…,RTT n. Further suppose that the Web page associated with the link contains exactly one object, consisting of a small HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object5. Suppose that you send an e-mail message whose only data is a microsoft excell attachment. What might the header lines (including MIME lines) look like。
计算机⽹络英⽂题库(含答案)Chapter1ComputerNetworksandtheI。
计算机⽹络英⽂题库Chapter 1 Computer Networks and the Internet1.The ( A ) is a worldwide computer network, that is, a network that interconnects millions of computing devices throughout the world.A public InternetB IntranetC switch netD television net2.Which kind of media is not a guided media? ( D )A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel3.Which kind of media is a guided media? ( C )A geostationary satelliteB low-altitude satelliteC fiber opticsD wireless LAN4.The units of data exchanged by a link-layer protocol are called (A ).A FramesB SegmentsC DatagramsD bit streams5.Which of the following option belongs to the circuit-switched networks? ( D )A FDMB TDMC VC networksD both A and B6.(B) makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure7.( A ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM8.Datagram networks and virtual-circuit networks differ in that ( C ).A datagram networks are circuit-switched networks, and virtual-circuit networks are packet-switched networks.B datagram networks are packet-switched networks, and virtual-circuit networks are circuit-switched networks.C datagram networks use destination addresses and virtual-circuit networks use VC. numbers to forward packets toward their destination.D datagram networks use VC. numbers and virtual-circuit networks use destination addresses to forward packets toward their destination.数据报⽹络(datagram networks)和虚电路⽹络(virtual-circuitnetworks)都是属于分组交换⽹络(packet-switched networks)。
Chapter 2 Application Layer1. In the following four descriptions, which one is correct"A In C/S architecture, clients municate with each other directly.B In C/S architecture, client has a fixed well-known address.C In P2P architecture, peers municate with each other directly.D In P2P architecture, peer has a fixed well-known address.2. In the context of a munication session between a pair of process, the process that initiates the munication is labeled as the , the process that waits to be contacted to begin the session is labeled as the .A client process, server processB sending process, receiving processC input process, output processD municating process, connecting process3. A socket is the interface between within a host.A the network layer and the link layerB the link layer and the physical layerC the application layer and the transport layerD the transport layer and the network layer4. In the following applications, which one is a loss-tolerant application"A B file transfer C instant messaging D real-time audio5. In the following applications, which one is a bandwidth-sensitive application"A B web application C real-time audio D file transfer6. The service of TCP can’t guarantee .A delivery of all data without errorB delivery of all data in the proper orderC the rate of deliveryD congestion control7. In the following applications, which one uses UDP"A B web application C file transfer D DNS8. In the following descriptions about HTTP, which one is not correct"A HTTP uses non-persistent connections in its default mode.B HTTP uses TCP as its underlying transport protocol.C HTTP is a stateless protocol.D HTTP is client-server architecture.9. Suppose a web page consists of a base HTML file, 5 JEPG images and a java applet, and also suppose HTTP uses persistent connection without pipelining, the total response time is .A 2RTTB 8RTTC 12 RTTD 14RTT10. In HTTP response message, if the requested HTTP protocol version is not supported, the status code is .A 200B 301C 400D 5051~5CACDC6~10CDABD11. The port number of web application is .A 25B 20C 80D 5312. A network entity that satisfies HTTP requests on the behalf of an origin web server is .A server farmB server stackC proxy serverD edge server13. In the following descriptions about persistent connection, which one is not correct"A The server leaves the TCP connection open after sending a response.B Each TCP connection is closed after the server sending one object.C There are two versions of persistent connection: without pipelining and with pipelining.D The default mode of HTTP uses persistent connection with pipelining.14. FTP uses two parallel TCP connections to transfer a file, there are .A control connection and data connectionB receiving connection and sending connectionC client connection and sever connectionD program connection and process connection15. In the following descriptions about FTP, which one is correct"A FTP is p2p architecture.B FTP sends its control information out-of-band.C FTP uses persistent connection.D FTP is a stateless protocol.16.In the mands of FTP,which one does not have parameter"A USERB PASSC LISTD STOR17. The Internet mail system has three ponents which they are .A user agent, SMTP, POP3B SMTP, POP3, IMAPC user agent, SMTP, IMAPD user agent, SMTP, mail server18. If the status code in HTTP response message is 404, it means .A Request succeeded.B The requested document doesn’t exit on this server.C This is a generic error code indicating that the request could not be understood by the server.D Requested object has been permanently mover.19. parison HTTP with SMTP, the correct is .A HTTP is a push protocol, and SMTP is a pull protocol.B In the default mode, both of them use persistent connection.C HTTP places all of the message’s objects into one message, and SMTP sends every objectone by one.D HTTP requires each message to be in 7-bit ASCII format, and SMTP doesn’t impose this restriction.20. The headers in the MIME message must include except .A FromB Content-typeC Content-transfer-encodingD MIME version11~15CCBAB16~20DDBBD21. In the following protocol, which one is stateless"A POP3B SMTPC FTPD IMAP22. DNS means .A Data Name SystemB Data National SystemC Domain Name SystemD Domain National System23. There are three classes of DNS server except .A Root DNS serverB Local DNS serverC TLD server D Authoritative DNS server24. DNS provides some services except .A Host aliasingB Mail server aliasingC Load distributionD A single point of failure25.TherearethreearchitecturesforlocatingcontentinP2Pfilesharing,KaZaAuses. ACentralizedDirectory〔Napster〕B Query Flooding(Gnutella)C Exploiting Heterogeneity(p141)D Incentive Priorities26.There are three architectures for locating content in P2P file sharing,Napster uses.A Centralized Directory(p137)B Query FloodingC Exploiting HeterogeneityD Incentive Priorities27.The following architectures in P2P file sharing,which is an overlay network"A Centralized DirectoryB Query Flooding(p139)C Exploiting HeterogeneityD Incentive Priorities28. The time it takes for a small packet to travel from client to server and then back to the client is .A round-travel timeB next-hop timeC round-trip timeD prefix-matching time29. Suppose A ( with a Web-based account ) sends a message to B ( who accesses his mail server using POP3), which application-layer protocol is not used"A HTTPB SMTPC POP3D IMAP30. In the four following options, which protocol is included in Mail Access Protocol"A SMTPB DHCPC IMAPD FTP31. In FTP mands, is used to send user password to the server.AUser BPass C Retr D Stor32. The function of the additional header field in MIME Content-Type is .A to convert the message body to its origin non-ASCII formB to determine what actions it should take on message bodyC to send an to the receiving user agentD to indicate what type the message is33. In the four following options, which application is organized as hybrid of C/S and P2P architecture"A B OICQ C File transfer D Web application34.In the four following options,which is not a centralized DNS design’s problem"A a single point of failureB traffic volumeC distant centralized databaseD slow(maintenance)35.In the following options, from the application developer’s perspective, which is not correct"A the network architecture is fixedB the network architecture provides a specific set of services to applicationsC the application architecture is designed by the physical devicesD the application architecture dictates how the application is organized over the various end systems36. There are three predominant architectures used in modern network applications, which one is not included"A the client-server architectureB the P2P architectureC a hybrid of the client-server and P2P architectureD a hybrid of the client-server and browser-server architecture37. In the following options about C/S architecture, which is not correct"A In C/S architecture, there is an always-on host, called the server.B In C/S architecture, there is an always-on host, called the client.C The server has a fixed, well-known address, called IP address.D Clients do not directly municate with each other.38.are often used to create a powerful virtual server in C/S architecture.A PeersB Server farmC server stackD local server39. A process sends messages into, and receives messages from, the network through its .A socketB programC clientD peer40. Which one is not defined by an application-layer protocol"A the types of messages exchangedB the syntax of various message typesC the semantics of the fieldsD rules for determining when and how to translate the socket41. HTTP can use two types of connections, which are.A persistent and non-persistent connectionB connection with pipelining and without pipeliningC TCP and UDPD parallel and serial connection42. takes for a small packet to travel from client to server and then back to the client.A RDTB thresholdC RTTD overhead43. The default mode of HTTP uses .A non-persistent connection with pipeliningB non-persistent connection without pipeliningC persistent connection with pipeliningD persistent connection without pipelining44. In HTTP request messages, the request line has three fields, there are .A the method field, the URL field and the HTTP version fieldB the method, the connection and URL fieldC the user-agent, the method and HTTP version fieldD the user-agent, the URL and the HTTP version field45. In the header lines of HTTP request message, if the field of Connection is close, it specifies .A the host on which object residesB what type of the user agentC that the browser wants the server to close the connection after sending the requested objectD which language can the browser receive46. In HTTP response message, if the status code is 404, it means .A request succeeded and the information is returned in the responseB requested object has been permanently movedC the requested HTTP protocol version is not supported by the serverD the requested document does not exist on this server47. is a network entity that satisfies HTTP requests on the behalf of an origin Web server.A proxy serverB local serverC DNS serverD Web server48. In the following four options about web cache, which one is not correct"A A web cache is both a server and a client at the same time.B A web cache is purchased and installed by an ISP.C A web cache can raise the response time for a client request.D A web cache can reduce traffic on an institution’s access link to the Internet.49. The request message in the conditional GET must include the header line.A Last-ModifiedB Last-ReferencedC If-Modified-SinceD If –Referenced-Since50. FTP uses two parallel connections to transfer a file, they are .A TCP and UDP connectionB connection with pipelining and without pipeliningC control an data connectionD client-server and browser-server connection51. In FTP mands, which one is used to ask the server to send back a list of all files in the current remote directory"A USERB PASSC LISTD RETR52. In the Internet mail system, allow users to read, reply to, forward, save and pose message.A User agentsB mail serversC SMTPD TCP53. The two key MIME headers for supporting multimedia are .A Content-Type and MIME-VersionB Content-Type and Content-Transfer-EncodingC Content-Transfer-Encoding and MIME-VersionD MIME-Version and MIME-Type54. For Internet mail, the mail access protocol is used to .A transfer mail from the recipient’s mail server to the recipient’s user agentB transfer mail from the sender’s mail server to the recipient’s mail serverC translate the mail from the sender’s mail serverD translate the mail into the recipient’s mail server55. POP3 progresses through three phases, which they are .A authorization, translation and transactionB authorization, translation and updateC authorization, transaction and updateD translation, transaction and update56. In the following four services, which one can not provide by DNS"A Host aliasingB Mail server aliasingC translate hostname to IP addressesD translate MAC addresses to IP addresses57. There are three classes of DNS servers, there are .A root DNS server, top-level domain DNS server and local DNS serverB root DNS server, top-level domain DNS server and authoritative DNS serverC root DNS server, local DNS server and authoritative DNS serverD root DNS server, local DNS server and top-level domain DNS server58. In the following four options about POP3, which one is not correct"A The user agent employed only three mands: List, Retr and QuitB The server does not carry state information across POP3 sessionsC The port number is 110D The POP3 protocol does not provide any means for a user to create remote folders and assign messages to folders.59.A resource record in DNS distributed database is a four-tuple,which field can be ignored"(p132)A Name B Value C Type D TTL60.In the following four options about DNSresource record,which one is correct"A The meaning of Name and Value depend on Type.B The meaning of Value and Type depend on Name.C If Type=A,then Name is a domain and Value is the IP address for the hostname.D If Type=MX,then Name is domain and Value is the IP address for the hostname.61.In the following four options about DNS messages,which one is not correct"A There are only two kinds of DNS message.(p133)B Both query and reply message have the same format.C The header section in DNS message has12bytes.D The authority section contains the resource records for the same that was originally queried .62.In DNS message,contains information about the query that is being made.(p133)A authority sectionB question sectionC answer sectionD additional section63.TherearethreetechniquesareemployedinmostanyP2Pfile-sharingsystems,whichoneisnotinclu de"〔p144〕A Request queuingB incentive prioritiesC parallel downloadingD Response queuing64. In the following four options about P2P file-sharing, which one is not correct"A P2P file-sharing is highly scalable.B P2P file-sharing relies on P2P architecture.C The means for locating content in different P2P file-sharing are different.D P2P file-sharing systems not only share MP3s,but also videos, software, documents andimages.65.In MIME header lines,specifies the name of the SMTP server that sent the message(fr om),the name of the SMTP server that received the message(by),and the time an which the receivi ng server received the message.A ReceivedB FromC ToD MIME-Version66. If the header line Connection is close, it means that the client wants .A persistent connection with pipeliningB persistent connection without pipeliningC nonpersistent connectionD not connection67. In HTTP request message, the entity body is empty with the method, but is used with the method.A GET, POSTB POST,GETC GET, HEAD D POST, HEAD68. In HTTP response message, if the Date: header ;one indicates the time Fri. 08 Aug. 2008 12:00:00 GMT, the Last-Modified: header line can not be .A Fri. 08 Aug. 2008 11:00:00 GMTB Fri. 08 Aug. 2008 11:30:00 GMTC Fri. 08 Aug. 2008 12:00:00 GMTD Fri. 08 Aug. 2008 12:30:00 GMT69. In the following four options, which one is not the part of cookie technology"A Cookie header lines in the HTTP response message and request message.B One cookie header file kept on the user’s end system and managed by the user’s browser.C A network entity that satisfies HTTP requests on the behalf of an origin Web server.D A back-end database at the Web site70. On-top of stateless HTTP, can be used to create a user session layer.A proxy serverB Web cacheC cookieD socket71. Processes municate with each other by reading from and writing to .A programsB threadsC socketsD channels72. In the following four options about network architecture, which one is not correct"A The network architecture is fixed.B The network architecture provides a specific set of services to application.C The network architecture is designed by application developer.D The network architecture dictates how the application is organized over special server.73. In Client-Server architecture, the clients visit the server’s through .A client’s socketB client’s IP addressC server’s socketD server’s IP address74. can be thought of as a program that is running within end system.A processB threadC socketD context75. API means .A Application Program InterfaceB Application Process InterfaceC Appellation Program InterfaceD Appellation Process Interface76. One host can be running many network applications, so the system assigns them different to distinguish each other.A IP addressB port numberC hostnameD section77. In the following four applications, which one is both bandwith-sensitive and require tight timing constraints"A real-time audioB file transferCD Web documents78. The port number of the Web server is .A 25B 20C 80D 808079. The port number of the mail server is .A 25B 20C 80D 808080. Look the URL ./rjxy/index.html, the object’s path name is .A .B ./rjxyC /rjxy/index.htmlD index.html81. Each URL has ponents, they are .A transport protocol and object’s path nameB host name and object’s path nameC transport protocol and host nameD client name and server name1. Consider an HTTP client will request a WEB page from a WEB server. Suppose the URL of the page is ./somedepartment /somedir/exp.html. The client does not want to use persistent connections and want to receive French version of the object. The user agent is Windows NT 5.1. Give the request message according to the given format.Request line:Header lines:2. Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.Solution:Request line:Header lines:3. Suppose within you Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT1,…,RTT n. Further suppose that the Web page associated with the link contains exactly one object, consisting of a small HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object"5. Suppose that you send an message whose only data is a microsoft excell attachment.What might the header lines (including MIME lines) look like"。
04上半年网络工程师英文真题、译文及答案[1] For each blank, choose the best answer from the four choices and write down on the answer sheet. (66) is a protocol that a host uses to inform a router when it join or leaves an Internet multicat group. (67) is an error detection code that most data communication networks use. (68) is an interior gateway protocol that uses a distance vector algorithm to propagate routing information. (69) is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range media . (70) is an identifier of a web page. (66)A. ICMP B. SMTP C. IGMP D. ARP (67)A. 4B/5B B. CRC C. Manchester D. Huffman Code (68)A. OSPF B. RIP C. RARP D. BGP (69)A. ISDN B. X.25 C. Frame Relay D. ATM (70)A. HTTP B. URL C. HTML D. TAG 参考译文 IGMP协议是接收者发现协议。IGMP协议运行在主机和路由器之间,用于路由器维护组播组是否有组成员。IGMP只维护组播级是否有成员,而不维护组播组有哪些成员,因此状态信息不会因组播组成员的增加而增加。 循环冗余校验(cyclic redundancy check,CRC)是由分组线性码的分解而来,其主要应用是二元码组,主要应用于数据传输过和中的差错控制。 OSPF是一个内部网关协议(Interior Gateway Protocol,IGP),用于在单一自治系统(autonomous system,AS)内决策路由。与RIP相对,OSPF是链路状态路由协议,而RIP是距离向量路由协议。它是依靠距离,即跳数来衡量理条路径的好坏。通过距离向量路由算法来传播路由信息。 ATM是异步传输模式,实现OSI物理层和链路层功能。ATM以独有的ATM信元进行数据传输,每个ATM信元为53个字节。ATM不严格要求信元交替地从不同的源到来,每一列从各个源来的信元,没有特别的模式,信元可以从任意不同的源到来,而且不要求从一台计算机来的信元流是连续的,数据信元可以有间隔,这些间隔由特殊的空闲信元(idle cell)填充。 URL(Uniform Resource Locator)是单一资源定位符,是一种用来鉴别文件与资源在WWW中地址的专用表示。 参考答案 (71)C (72)B (73)B (74)D (75)B
04上半年网络工程师英文真题、译文及答案[2]
In the flowing essay ,each blank has four choices. Choose the best answer and write down on the anser sheet. Spread spectrum simply means that data is sent in small pieces over a number of the (71) frequencies available for use at any time in the specified rang. Devices using (72) spread spectrum(DSSS) communicate by (73) each byte of data into several parts and sending them concurrently on different (74). DSSS uses a lot of the available (75), about 22 megaherts (MHZ). (71)A. continuous B.high C. low D.discrete (72)A. direct-sequence B. discrect-sequence C. duplicate-sequence D. dedicate-sequence (73)A. splitting B. combining C.packing D.compacting (74)A. bits B. frequencies C. packets D. messages (75)A. rate B. velocity C. bandwidth D.period 参考译文 这段描述是关于无线局域网中直序扩频(direct sequence spread spectrum,DSSS)的说明。 扩频技术更加精确的定义是,通过注入一个更高频率的信号将基带信号扩展到一个更宽的频带内的射频通信系统,即发射信号的能量被扩展到一个更宽的频带内,使其看起来如同噪声一样。扩展带宽与初始信号之比称作处理增益(单位为dB),典型的扩频处理增益可以是20~60dB。 直接序列扩频技术是将原来的信号[1]或[0],利用10个以上的chips来代表[1]或[0]位,使得原来较高功率、较窄的频率变成具有较宽频的低功率频率。每个位使用多少个chips称作spreading chips,一个较高的spreading chips可以增加抗噪声干扰,而一个较低spreading chips可以增加用户的使用人数。 简单的翻译如下: 简单地说,扩频就是在一个可以随时使用的特定频率范围内,把数据用小块(chip)在大量不连续的频率上同时发送。使用直序扩频的设备相互之间通信是通过把每个字节的数据分成几个部分在不同的频率上同时传送。直序扩频使用了大约22MB的有效带宽。 参考答案 (71)D (72)A (73)A (74)B (75)C
04下半年网络工程师英文真题、译文及答案[1]
Networks can be interconnected by different devices. In the physical layer,networks can be connected by (66) or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer.They can accept (67), examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (68) network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (69). As an example, gateways between Internet e-mail and X.400 e-mail must (70) the e-mail message and change various header fields. (66)A.reapers B.relays C.connectors D.modems (67)A.frames B.packets C.packages D.cells (68)A.special B.dependent C.similar D.dissimilar (69)A.syntax B.semantics C.language D.format (70)A.analyze B.parse C.delete D.create 参考译文 网络可以用不同的设备互连。在物理层,用中继器或集线器互连,这些设备只是在相同的网络之间传送比特串。在上面的数据链路层,可以使用网桥或交换机,这些设备接收数据帧,检查MAC地址,并可以实现少量的协议转换,把数据帧转发到不同的网络中。在网络层,我们使用路由器连接两个网络。如果两上网络的网络层不同,路由器能够对分组格式进行转换。在传输层,我们使用传输风头,它可以在两个传输连接之间建立接口。最后,在应用层,应用网关实现消息语法之间的翻译。例如,在Internet邮件和X.400邮件之间的网关可以对邮件报文进行语法分析,对报文的各个报头字段做出改变。 参考答案 (66)A (67)A (68)D (69)A (70)B
04下半年网络工程师英文真题、译文及答案[2]
The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (71) of the technical requirements for the software product. During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each (72) that it must meet. The starting point is usually a set of high-level requirements from the (73) that describe the project or problem. In either case, the requirements definition team formulates an overall concept for the system and then defines (74) showing how the system will be operated, publishes the system and operations concept document, and conducts a system concept review(SCR). Following the SCR, the team derives (75) requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis the team specifies the software functions and algorithms needed to satisfy each detailed requirement. (71)A.function B.definition C.specification D.statement (72)A.criterion B.standard C.model D.system (73)A.producer B.customer C.programmer D.analyser (74)A.rules B.principles C.scenarios D.scenes (75)A.detailed B.outlined C.total D.complete 参考译文 需求定义阶段的作用就是为软件产品产生一个清晰的、完整的、一致的、可测试的技术需求规格说明。 在需求定义阶段,需求定义团队通过迭代过程把有关系统需求的宽泛的陈述扩展成系统必须实现的各个功能的、完整而详细的规格说明,以及系统应该满足的各种准则。这个过程的起点通常是由用户提供的描述项目或问题的一组高级需求。 在任何情况下,需求定义团队应该阐明与系统有关的整体概念,并且设定一种能够显示系统如何动作的情景,发布有关系统和运行的概念文档,并进行系统概念的评审(SCR)。 在SCR之后,团队应该根据高级需求和系统运行概念导出详细的系统需求。通过结构化的或面向对象的分析技术,团队可以规范系统功能,说明满足每一细节需求的算法。 参考答案 (71)C (72)A (73)B (74)A (75)B