历年网络工程师英文真题翻译.
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
04上半年网络工程师英文真题、译文及答案[1]
For each blank, choose the best answer from the four choices and write down on the answer sheet.
(66is a protocol that a host uses to inform a router when it join or leaves an Internet multicat group.
(67is an error detection code that most data communication networks use.
(68is an interior gateway protocol that uses a distance vector algorithm to propagate routing information.
(69is a transfer mode in which all types of information are organized into fixed form cells on an asynchronous or non-periodic basis over a range media .
(70is an identifier of a web page.
(66A. ICMP B. SMTP C. IGMP D. ARP
(67A. 4B/5B B. CRC C. Manchester D. Huffman Code
(68A. OSPF B. RIP C. RARP D. BGP
(69A. ISDN B. X.25 C. Frame Relay D. A TM
(70A. HTTP B. URL C. HTML D. TAG
参考译文
IGMP协议是接收者发现协议。
IGMP协议运行在主机和路由器之间,用于路由器维护组播组是否有组成员。
IGMP只维护组播级是否有成员,而不维护组播组有哪些成员,因此状态信息不会因组播组成员的增加而增加。
循环冗余校验(cyclic redundancy check,CRC是由分组线性码的分解而来,其主要应用是二元码组,主要应用于数据传输过和中的差错控制。
OSPF是一个内部网关协议(Interior Gateway Protocol,IGP,用于在单一自治系统(autonomous system,AS内决策路由。
与RIP相对,OSPF是链路状态路由协议,而RIP 是距离向量路由协议。
它是依靠距离,即跳数来衡量理条路径的好坏。
通过距离向量路由算法来传播路由信息。
A TM是异步传输模式,实现OSI物理层和链路层功能。
ATM以独有的ATM
信元进行数据传输,每个ATM信元为53个字节。
ATM不严格要求信元交替地从不同的源到来,每一列从各个源来的信元,没有特别的模式,信元可以从任意不同的源到来,而且不要求从一台计算机来的信元流是连续的,数据信元可以有间隔,这些间隔由特殊的空闲信元(idle cell填充。
URL(Uniform Resource Locator是单一资源定位符,是一种用来鉴别文件与资源在WWW中地址的专用表示。
参考答案
(71C (72B (73B (74D (75B
04上半年网络工程师英文真题、译文及答案[2]
In the flowing essay ,each blank has four choices. Choose the best answer and write down on the anser sheet.
Spread spectrum simply means that data is sent in small pieces over a number of the (71 frequencies available for use at any time in the specified rang. Devices using
(72spread spectrum(DSSS communicate by (73each byte of data into several parts and sending them concurrently on different (74. DSSS uses a lot of the available (75, about 22 megaherts (MHZ.
(71A. continuous B.high C. low D.discrete
(72A. direct-sequence B. discrect-sequence
C. duplicate-sequence
D. dedicate-sequence
(73A. splitting B. combining C.packing pacting
(74A. bits B. frequencies C. packets D. messages
(75A. rate B. velocity C. bandwidth D.period
参考译文
这段描述是关于无线局域网中直序扩频(direct sequence spread spectrum,DSSS 的说明。
扩频技术更加精确的定义是,通过注入一个更高频率的信号将基带信号扩展到一个更宽的频带内的射频通信系统,即发射信号的能量被扩展到一个更宽的频带内,使其看起来如同噪声一样。
扩展带宽与初始信号之比称作处理增益(单位为dB,典型的扩频处理增益可以是20~60dB。
直接序列扩频技术是将原来的信号[1]或[0],利用10个以上的chips来代表[1]或[0]位,使得原来较高功率、较窄的频率变成具有较宽频的低功率频率。
每个位使用多少个chips称作spreading chips,一个较高的spreading chips可以增加抗噪声干扰,而一个较低spreading chips可以增加用户的使用人数。
简单的翻译如下:
简单地说,扩频就是在一个可以随时使用的特定频率范围内,把数据用小块(chip 在大量不连续的频率上同时发送。
使用直序扩频的设备相互之间通信是通过把每个字节的数据分成几个部分在不同的频率上同时传送。
直序扩频使用了大约22MB
的有效带宽。
参考答案
(71D (72A (73A (74B (75C
04下半年网络工程师英文真题、译文及答案[1] Networks can be interconnected by different devices. In the physical layer,networks can be connected by (66or hubs, which just move the bits from one network to an identical network. One layer up we find bridges and switches, which operate at data link layer.They can accept (67, examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer, we have routers that can connect two networks. If two networks have (68network layer, the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which can interface between two transport connections. Finally, in the application layer, application gateways translate message (69. As an example, gateways between Internet e-mail and X.400 e-mail must (70the e-mail message and change various header fields.
(66A.reapers B.relays C.connectors D.modems
(67A.frames B.packets C.packages D.cells
(68A.special B.dependent C.similar D.dissimilar
(69A.syntax B.semantics nguage D.format
(70A.analyze B.parse C.delete D.create
参考译文
网络可以用不同的设备互连。
在物理层,用中继器或集线器互连,这些设备只是在相同的网络之间传送比特串。
在上面的数据链路层,可以使用网桥或交换机,这些设备接收数据帧,检查MAC地址,并可以实现少量的协议转换,把数据帧转发到不同的网络中。
在网络层,我们使用路由器连接两个网络。
如果两上网络的网络层不同,路由器能够对分组格式进
行转换。
在传输层,我们使用传输风头,它可以在两个传输连接之间建立接口。
最后,在应用层,应用网关实现消息语法之间的翻译。
例如,在Internet邮件和X.400邮件之间的网关可以对邮件报文进行语法分析,对报文的各个报头字段做出改变。
参考答案
(66A (67A (68D (69A (70B
04下半年网络工程师英文真题、译文及答案[2]
The purpose of the requirements definition phase is to produce a clear, complete, consistent, and testable (71of the technical requirements for the software product.
During the requirements definition phase, the requirements definition team uses an iterative process to expand a broad statement of the system requirements into a complete and detailed specification of each function that the software must perform and each
(72that it must meet. The starting point is usually a set of high-level requirements from the (73that describe the project or problem.
In either case, the requirements definition team formulates an overall concept for the system and then defines (74showing how the system will be operated, publishes the system and operations concept document, and conducts a system concept review(SCR.
Following the SCR, the team derives (75requirements for the system from the high level requirements and the system and operations concept. Using structured or object-oriented analysis the team specifies the software functions and algorithms needed to satisfy each detailed requirement.
(71A.function B.definition C.specification D.statement
(72A.criterion B.standard C.model D.system
(73A.producer B.customer C.programmer D.analyser
(74A.rules B.principles C.scenarios D.scenes
(75A.detailed B.outlined C.total plete
参考译文
需求定义阶段的作用就是为软件产品产生一个清晰的、完整的、一致的、可测试的技术需求规格说明。
在需求定义阶段,需求定义团队通过迭代过程把有关系统需求的宽泛的陈述扩展成系统必须实现的各个功能的、完整而详细的规格说明,以及系统应该满足的各种准则。
这个过程的起点通常是由用户提供的描述项目或问题的一组高级需求。
在任何情况下,需求定义团队应该阐明与系统有关的整体概念,并且设定一种能够显示系统如何动作的情景,发布有关系统和运行的概念文档,并进行系统概念的评审(SCR。
在SCR之后,团队应该根据高级需求和系统运行概念导出详细的系统需求。
通过结构化的或面向对象的分析技术,团队可以规范系统功能,说明满足每一细节需求的算法。
参考答案
(71C (72A (73B (74A (75B
05上半年网络工程师英文真题、译文及答案[1]
DOM is a platform-and language-(66API that allows programs and scripts to dynamically access and update the content, structure and style of WWW
documents(currently, definitions for HTML and XML documents are part of the specification. The document can be further processed and the results of that processing can be incorporated back into the presented (67. DOM is a
(68-based API to documents,which requires the whole document to be represented in (69 while processing it. A simpler alternative to DOM is the event-based SAX,which can be used to process very large (70documents that do not fit info the memory available for processing.
(66A.specific B.neutral C.contained D.related
(67A.text B.image C.page D.graphic
(68A.table B.tree C.control D.event
(69A.document B.processor C.disc D.memory
(70A.XML B.HTML C.script D.web
参考译文
DOM是一种与平台和语言无关的应用程序接口(API,它可以动态地访问程序和脚本,更新其内容、结构和WWW文档的风格(目前,HTML和XML文档是通过说明部分定义的。
文档可以进一步被处理,处理的结果可以加入到当前的页面。
DOM是一种基于树的API文档,它要求在处理过程中整个文档都表示在存储器中。
另外一种简单的API是基于事件的SAX,它可以用于处理很大的XML文档,由于大,所以不适合全部放在存储器中处理。
参考答案
(66B (67C (68B (69D (70A
05上半年网络工程师英文真题、译文及答案[2]
Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an (71from a friend who asks you to open it.This is what happens with Melissa and several other similar email (72. Upon running,such worms usuall y proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages (73.
As administrators seek to block dangerous email attachments through the recognition of well-known (74, virus writers use other extensions to circumvent such protection.Executable (.exefiles are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.
Frequently,hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation,simultaneously runs commands in the background to steal your passwords and give the (75access to your network.
(71A.attachment B.packet C.datagram D.message
(72A.virtual B.virus C.worms D.bacteria
(73A.memory B.caches C.ports D.registers
(s B.cookies C.software D.extensions
(75A.cracker er C.customer D.client
参考译文
Melissa和LoveLetter利用了朋友和同事之间的信任。
设想你收到了一个附件,朋友要求你打开它。
这就是Melissa和其他类似的电子邮件蠕虫危害的方式。
一旦被运行,这种蠕虫常常就从被害人的地址簿、以前的电子邮件、Web页面缓存区等地方发现邮件地址,并且把它们发送出去。
在管理人员通过识别众所周知的扩展名企图阻挡危险的email附件时,病毒的作者们则使用了其他的扩展名来破坏这种保护。
可执行文件(.exe被重新命名为.bat 和.cmd,再加上其他的扩展名,而且仍然可以运行,成功地危害目标用户。
黑客们经常试图穿透网络发送一种像是flash影像的附件,当这种flash演示引
人入胜的动画时,同时就在后台运行命令来偷窃你的口令,给了那些解密高手访问你的网络的机会。
参考答案
(71A (72C (73B (74D (75A
05下半年网络工程师英文真题、译文及答案[1]
MIDI enables people to use (66computers and electronic musical instruments. There are actually three components to MIDI, the communications " (67", the Hardware Interface and a distribution (68called "Standard MIDI Files". In the context of the WWW, the most interesting component is the (69Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (70are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.
(66A. personal B. electronic C. multimedia D. network
(67A. device B. protocol C. network D. controller
(68A. format B. text C. wave D. center
(69A. Video B. Faxmail C. Graphic D. Audio
(70A. messages B. packets C. frame D. information
参考译文
MIDI使得人们能够使用多媒体计算机和电子乐器。
实际上MIDI有3种元素:通信协议、硬件接口和被称为标准MIDI文件的发布格式。
在WWW环境中,最重要的元素是音频格式。
在原理上,MIDI文件包含了MIDI协议报文序列。
然而当
MIDI协议报文被存储在MIDI文件中时,事件都被加上了时间戳,以便于按照适当的顺序回放。
由MIDI文件提供的音乐是MIDI当前最通常的应用。
参考答案
(66C (67B (68A (69D (70A
05下半年网络工程师英文真题、译文及答案[2] Certificates are (71documents attesting to the (72of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (73someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (74date, the name of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (75of the certificate issuer. The most widely accepted format for certificates is X.509 , thus, Certificates can be read or written by any application complying with X.509.
(71A. text B. data C. digital D. structured
(72A. connecting B. binding C. composing D. conducting
(73A. impersonate B. personate C. damage D. control
(74A. communication B. computation C. expectation D. expiration
(75A. signature B. mark C. stamp D. hypertext
参考译文
证书是一种数字文档,用于表明把一个公钥绑定到一个人或其他实体。
用它可以验证一个给定的公钥确实属于某一个人。
证书可以防止某些人使用假冒的密钥去冒充别人。
最简单的证书包含一个公钥和一个名字。
通常使用的证书也包含超时日
期、发行证书的CA的名字、一个序列号,以及其他信息。
最重要的是,它包含了证书发行者的数字签名。
最广泛接受的
证书格式是X.509,这样的证书可以被任何服从X.509标准的应用读或写。
参考答案
(71C (72B (73A (74D (75A
06上半年网络工程师英文真题、译文及答案[1] Originally introduced by Netscape Communications, (66are a general mechanism which HTTP Server side applications, such as CGI (67, can use to both store and retrieve information on the HTTP (68side of the connection. Basically, Cookies can be used to compensate for the (69 nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based (70.
(66A.Browsers B.Cookies C.Connections D.Scripts
(67A.graphics B.processes C.scripts D.texts
(68A.Client B.Editor C.Creator D.Server
(69A.fixed B.flexible C.stable D.stateless
(70A.programs B.applications C.frameworks D.constrains
参考译文
Cookies原来是由Netscape公司引入的,这是HTTP服务器方应用程序的一种通信机制,就像CGI脚本一要产,它可以由HTTP连接的客户方用于存储和检索信息。
Cookies的基本功能是弥补HTTP无状态的缺陷。
它能通过简单而持续地维护客户方的状态来扩展基于WWW的应用能力。
参考答案
(66B (67C (68A (69D (70B
06上半年网络工程师英文真题、译文及答案[2]
Web SQL is a SQL-like (71language for extracting information from the web. Its capabilities for performing navigation of web(72make it a useful tool for automating several web-related tasks that require the systematic processing of either ail the links in a (73, all the pages that can be reached from a given URL through (74that match a ' pattern, or a
combination of both. WebSQL also provides transparent access to index servers that can be queried via the Common (75Interface.
(71A.query B.transaction munication D.programming
(72A.browsers B.servers C.hypertexts D.clients
(73A.hypertext B.page C.protocol D.operation
(74A.paths B.chips C.tools D.directories
(75A.Router B.Device puter D.Gateway
参考译文
WebSQL是一种类似于SQL的查询语言,用于从Web中提取信息。
它能够在Web超文本中巡航,这使得它成为自动操作一个页面中有关链接的有用工具,或是作为搜索从一个给定的URL可以到达的、所有匹配某种模式的页面的有用工具。
WebSQL也提供透明地访问索引服务器的手段,这种服务器可以通过公共网关接口进行查询。
参考答案
(71A (72C (73B (74A (75D
06下半年网络工程师英文真题、译文及答案[1]
NAC's(Network Access Controlrole is to restrict network access to only compliant endpoints and (66users.However, NAC is not a complete LAN (67solution; additional proactive and (68security measures must be implemented.Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 100Gbps, ensuring a high level of security plus application availability and performance.Nevis integrates NAC as the first line of LAN security (69In addition to NAC,enterprises need to implement role-based network access control as well as critical proactive security measures-real-time, multilevel (70 inspection and microsecond threat containment.
(66A.automated B.distinguished C.authenticated D.destructed
(67A.crisis B.security C.favorable D.excellent
(68A.constructive B.reductive C.reactive D.productive
(69A.defense B.intrusion C.inbreak D.protection
(70A.port B.connection C.threat D.insurance
参考译文
网络访问控制(NAC的作用是限制对网络的访问,只允许注册的终端和认证的用户访问网络。
然而NAC不是一个完整的LAN安全解决方案,另外还要实现主动的和被动的安全手段。
Nevis是第一个也是仅有的全面的LAN安全解决方案,它以
10Gbps的速率对每一个分组进行深度的安全处理,在提供高级别安全的同时能保证网络应用的可利用性和适当的性能。
Nevis集成了NAC作为LAN的第一道安全防线。
此外,企业还需要实现基于角色
的网络访问控制以及起关键作用的主动安全测试--实时的多级安全威胁检测和微妙级的安全威胁堵截。
集中的安全策略配置、管理和报告使其能够迅速地对问题进行分析,对用户的活动进行跟踪,这些都是实时可见的,也是历史可查的。
参考答案
(66C (67B (68C (69A (70C
06下半年网络工程师英文真题、译文及答案[2] Virtualization is an approach to IT that pools and shares (71so that utilization is optimized and supplies automatically meet demand.Traditional IT environments are often silos, where both technology and human (72are aligned around an application or business function.With a virtualized (73, people, processes, and technology are focused on meeting service levels, (74 is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible.We offer a broad spectrum of virtualization (75that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.
(71A.advantages B.resources C.benefits D.precedents
(72A.profits B.costs C.resources D.powers
(73A.system B.infrastructure C.hardware D.link
(74A.content B.position C.power D.capacity
(75A.solutions works C.interfaces D.connections
参考译文
虚拟化是IT行业缓存和共享资源的一种方法,通过这种方法可以更好地利用资源,并且自动提供资源以满足需求。
传统的IT环境通常是一个竖井,技术和人力资源都是围绕应用或商业功能来安排的。
利用虚拟化的构架,人员、过程和技术都集中于满足服务的程度,生产量被动态地分配,资源得到优化,而且整个构架得以简化,变得
很灵活。
我们提供了广泛的虚拟化解决方案,允许客户为他们的IT资源的基础构架选择最适用的路线和优化的重点。
参考答案
(71B (72C (73B (74D (75A
07上半年网络工程师英文真题、译文及答案
Serialization delay and (71delay are the two components of network delay that are improved by increasing bandwidth. Serialization delay, i.e. the amount of time it takes to put the (72on the wire, and queuing delay (depth of the queue are improved by increasing the (73from a 128Kbps circuit to a T1. However, three other components of delay, routing/switching delay, distance delay, and protocol delay are components that can not bepositively affected by an (74 in bandwidth. If the circuits are not over-utilized, thenincreasing the bandwidth to improve the (75of the application will only result in an increased bandwidth with no positive effects on performance.
(71A. buffering B. queuing C. receiving D. timing
(72A. electricity B. digital C. data D. variable
(73A. memory B. cache C. bandwidth D. delay
(74A. increase B. decrease C. maintenance D. extension
(75A. capability B. cost C. amount D. performance
参考译文
串行排序延迟和队列延迟是网络延迟的两个主要因素,这些是可以通过增加带宽加以改进的。
串行排序延迟(将数据输出到线路上需要的时间和队列延迟(队列的长度可以通过把带宽从128Kbps增加到T1得到改善。
然而,另外三种延迟因素--路
由/交换延迟、距离延迟和协议处理延迟是不能通过增加带宽来改进的。
如果线路没有超量使用,则通过增加带宽来改进应用软件性能的企图只能产生一种结果,那就是带宽的增加对性能并没有产生正面的影响。
参考答案
(71B (72C (73C (74A (75D
07下半年网络工程师英文真题、译文及答案
Traditional Internet access methods like dial-up were so slow that host computers were connected to the dial-up (71at the customer premise over slow (72ports. PPP was designed to run directly over these serial links. But with the advent of broadband Internet (73 technologies such as ADSL and cable modems there has been a considerable increase in the bandwidth delivered to the end users. This means that the host computers at the customer premise connect to the (74or cable "modem" over a much faster medium such as Ethernet. It also means that multiple (75 can connect to the Internet through the same connection.
(71A. buffer B. modem C. computer D. server
(72A. parallel B. digital C. serial D. variable
(73A. access B. cache C. cast D. storage
(74A. FDDI B. HDSL C. ADSL D. CDMA
(75A. cables B. hosts C. servers D. modems
参考译文
传统的Internet接入方法(例如拨号接入速度很慢,这种方式要求客户端主机通过低速串口连接到拨号Modem,在串行链路上运行PPP协议。
但是随着宽带
Internet接入技术--例如ADSL和线缆调制解调器的发展,提供给端用户的带宽已经有相当大的增加。
这意味着客户端主机可以连接到ADSL或者线缆调制解调器,从而获得比以太网还要快得多的传输介质。
这也意味着多个主机可以通过同一连接访问Internet。
参考答案
(71B (72C (73A (74C (75B
08上半年网络工程师英文真题、译文及答案WLANs are increasingly popular because they enable cost-effective connections among people and applications that were not possible in the past. For example, WLAN-based applications can enable fine-grained management of supply (71to improve their efficiency and reduce (72. WLANs can also enable entirely new business processes. To cite but one example, hospitals are using WLAN-enabled point-of-care (73to reduce errors and improve overall patient care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventing (74through rogue access points. They can improve overall network management by integ rating with customers’ existing systems. Fortunately, it isn’t necessary to measure these benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-(75deployment and administrative chores.
(71A. custom B. server C. chains D. chances
(72)A. overhead B. connection C. supply D. effect (73)A. transportations B. applications C. connections D. translations (74)A. integration B. interest C. instruction D. intrusion (75)A. capable B. consuming C. effective D. connected 参考译文无线
局域网(WLAN)日益普及起来,这是因为它能在用户和应用之间有效地建立连接,这在过去是难以做到的。
例如基于 WLAN 的应用可以对供应链进行细粒度的管理,从而改进效率,减少开销。
WLAN 也可以创造全新的商业过程。
仅举出其中的一个例子,医院使用基于 WLAN 的护理点应用来减少差错,全面改进病员护
理。
WLAN 管理解决方案提供的各种实质上的好处是很难度量的。
例如,它可以保护公司的数据,防止恶意的访问。
它可以全面地改进网络管理,并集成到用户现有的系统中。
幸好,我们无需量化这些收益来证明 WLAN 解决方案的合理性,因为它能很快地补偿由于部署这些应用和管理事务而付出的时间开销。
参考答案(71)C (72)A (73)B (74)D (75)B 08 下半年网络工程师英文真题、译文及答案下半年网络工程师英文真题、 The usual way to ensure reliable delivery is to provide the (71) with some feedback about what is happening at the other end of the line. Typically, the protocol calls for the receiver to send back special (72) frame bearing positive or negative (73) about the incoming frames. If the sender receives a positive acknowledgement about a frame, it knows the frame has arrived safely. On the other hand, a negative acknowledgement means that something has gone wrong, and the frame must be transmitted again. An additional complication comes from the possibility that hardware troubles may cause a frame to (74) completely. In this case, the receiver will not react at all, since it has no any reason to react. It should be clear that a protocol in which the sender transmits a frame and then waits for an acknowledgement, positive or negative, will hang forever if a frame is ever lost due to, for example, (75) hardware. (71)A. receiver B. controller C. sender D. customer (72)A. data B. control C. request D. session (73)A. application B. connection C. stream D. acknowledgement (74)A. vanish B. vary C. appear D. incline (75)A. acting B. working C. malfunctioning D. functioning 参考译文保证可靠提交的常用方法是向发送端提供一些反馈信息,使它知道在线路的另一端发生了什么情况。
典型的情况是:协议要求接收端回送一个承载有关输入帧的肯定或否定应答的特殊控制帧。
如果发送端收到了有关帧的肯定应答,它就知道发送的帧已经安全到达。
另一方面,否定应答则意味着出现了某种错误,应该重新发送出错的帧。
还有一些复杂的情况可能发生,硬件故障可能引起帧完全消失。
在这种情况下,接收端完全没有反应,因为它根本无法反应。
显然,如果一个帧由于硬件失效而丢失了,那么这样的协议--发送端发出一个帧然后等待肯定或否定应答,就会被永远地挂起了。
参考答案(71)C (72)B (73)D (74)A (75)C
09 上半年网络工程师英文真题、译文及答案上半年网络工程师英文真题、The Border Gateway Protocol (BGP is an interautonomous system (71) protocol.The primary function of a BGP speaking system is to exchange network (72) information with other BGP system. This network reachability information includes information on the list of Autonomous System (ASs that reachability information traverses. BGP-4 provides a new set of mechanisms for supporting (73) interdomain routing. These mechanisms include support for advertising an IP (74) and eliminate the concept of network class within BGP.BGP-4 also introduces mechanisms that allow aggregation of routes, including (75) of AS paths. These changes provide support for the proposed supernettting scheme. (71)A. connecting B. resolving C. routing D. supernettting (72)A. secubility B. reachability C. capability D. reliability (73)A. answerless B. connectionless C. confirmless D. classless (74)A. prefix B. suffix C. infix D. reflex (75)A. reservation B. relation C. aggregation D. connection 参考译文边界网关协议BGP 是自治系统时间的路由协议。
BGP 发布系统的基本功能就是与其他 BGP 系统交换网络可达性信息。
这种网络可到达性信息包含了可到达性信息穿越的自治系统的列表。
BGP-4 提供了一系列新的机制来支持无类别的域间路由。
这些机制包括支持发布 IP 前缀,从而在 BGP 中排除了网络类别的概念。
BGP-4 也引入了路由聚合机制,包括 AS 通路的聚合。
这些改变提供了对提议的超网方案的支持。
参考答案(71)C (72)B (73)D (74)A (75)C。