Chapter1_Computer Networks and the Internet

合集下载

计算机网络与互联网(英语)chap1-3

计算机网络与互联网(英语)chap1-3

Server Station
What is a Computer Network?
Switch
Switch Server Station
Frame Client Station Switch
Switch
Mobile Client Station
Frames may pass through multiple switches; Each switch reads the frame And passes it on
Server Station
What is a Computer Network?
Access links connect stations to the first switch Usually copper wire
Access Link Access Link Access Link
Access Link
What is asummary, a network is a system of hardware, software and transmission components that collectively(共同地) allow two application programs on two different stations connected to the network to communicate well
You Will Learn (continued)

Network applications




Client-server paradigm(范例) Domain name system (DNS) File transfer (FTP) Remote login (TELNET) Email transfer (SMTP) Web technologies and protocols

计算机网络英文版课件1

计算机网络英文版课件1

Development of computer network
T
T
HOST
T
T
T
T
T
HOST

TTT
T
T
HOST CCP
T
T
H
T
T
C
CCP
T
HOST
T
T
CCP
C CommunicaCt
T
HOST
T T
ion subnet
H
H
T
T
T
T
Resource subnet
T
computer network vs. distributed system
Wide Area Networks(2)
❖A stream of packets from sender to receiver. ❖Store-and-forward (packet-switched): a packet
is stored in an intermediate router in its entirety, stored there until the required output line is free, and then forwarded.
❖ Software: This is what actually makes computer networks–not the hardware!
➢ Protocols: describe how two communicating parties exchange
information.
➢ Services: describe what a network offers to parties that want

计算机网络(第四版)英文原版Chapter1.Introduction

计算机网络(第四版)英文原版Chapter1.Introduction

计算机网络(第四版)英文原版Chapter1.Introduction[ Team LiB ]Chapter 1. IntroductionEach of the past three centuries has been dominated by a single technology. The 18th century was the era of the great mechanical systems accompanying the Industrial Revolution. The 19th century was the age of the steam engine. During the 20th century, the key technology was information gathering, processing, and distribution. Among other developments, we saw the installation of worldwide telephone networks, the invention of radio and television, the birth and unprecedented growth of the computer industry, and the launching of communication satellites.As a result of rapid technological progress, these areas are rapidly converging and the differences between collecting, transporting, storing, and processing information are quickly disappearing. Organizations with hundreds of offices spread over a wide geographical area routinely expect to be able to examine the current status of even their most remote outpost at the push of a button. As our ability to gather, process, and distribute information grows, the demand for ever more sophisticated information processing grows even faster.Although the computer industry is still young compared to other industries (e.g., automobiles and air transportation), computers have made spectacular progress in a short time. During the first two decades of their existence, computer systems were highly centralized, usually within a single large room. Not infrequently, this room had glass walls, through which visitorscould gawk at the great electronic wonder inside. A medium-sized company or university might have had one or two computers, while large institutions had at most a few dozen. The idea that within twenty years equally powerful computers smaller than postage stamps would be mass produced by the millions was pure science fiction.The merging of computers and communications has had a profound influence on the way computer systems are organized. The concept of the ''computer center'' as a room with a large computer to which users bring their work for processing is now totally obsolete. The old model of a single computer serving all of the organization's computational needs has been replaced by one in which a large number of separate but interconnected computers do the job. These systems are called computer networks. The design and organization of these networks are the subjects of this book.Throughout the book we will use the term ''computer network'' to mean a collection of autonomous computers interconnected by a single technology. Two computers are said to be interconnected if they are able to exchange information. The connection need not be via a copper wire; fiber optics, microwaves, infrared, and communication satellites can also be used. Networks come in many sizes, shapes and forms, as we will see later. Although it may sound strange to some people, neither the Internet nor the World Wide Web is a computer network. By the end of this book, it should be clear why. The quick answer is: the Internet is not a single network but a network of networks and the Web is a distributed system that runs on top of the Internet.There is considerable confusion in the literature between acomputer network and a distributed system. The key distinction is that in a distributed system, a collection of independent computers appears to its users as a single coherent system. Usually, it has a single model or paradigm that it presents to the users. Often a layer of software on top of the operating system, called middleware, is responsible for implementing this model. A well-known example of a distributed system is the World Wide Web, in which everything looks like a document (Web page).In a computer network, this coherence, model, and software are absent. Users are exposed to the actual machines, without any attempt by the system to make the machines look and act in a coherent way. If the machines have different hardware and different operating systems, that is fully visible to the users. If a user wants to run a program on a remote machine, he [] has to log onto that machine and run it there.[] ''He'' should be read as ''he or she'' throughout this book.In effect, a distributed system is a software system built on top of a network. The software gives it a high degree of cohesiveness and transparency. Thus, the distinction between a network and a distributed system lies with the software (especially the operating system), rather than with the hardware.Nevertheless, there is considerable overlap between the two subjects. For example, both distributed systems and computer networks need to move files around. The difference lies in who invokes the movement, the system or the user. Although this book primarily focuses on networks, many of the topics are also important in distributed systems. For more information about distributed systems, see (Tanenbaum and Van Steen, 2002).[ Team LiB ]。

复习题chapter1

复习题chapter1

Chapter 1 Computer Networks and the Internet1.The ( ) is a worldwide computer network, that is, a network that interconnects millions of computing devices throughout the world.ppt3A public Internet 公共网络B Intranet 企业内部互联网C switch net 交换网D television net 电视网2.Which kind of media is not a guided media(引导媒体)? ( )A twisted-pair copper wire 双绞线铜线B a coaxial cable 同轴电缆C fiber optics 纤维光学D digital satellite channel 数字卫星频道3.Which kind of media is a guided media? ( )A geostationary satellite 地球同步卫星B low-altitude satellite 低空卫星C fiber optics 纤维光学D wireless LAN 无线局域网4.The units of data exchanged by a link-layer protocol are called ( ).A FramesB SegmentsC DatagramsD bit streams5.Which of the following option belongs to the circuit-switched(电路交换) networks? ( )A FDMB TDMC VC networksD both A and B6.( )makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure8.Datagram networks and virtual-circuit networks differ in that ( ).A datagram networks are circuit-switched networks, andvirtual-circuit networks are packet-switched networks.B datagram networks are packet-switched networks, andvirtual-circuit networks are circuit-switched networks.C datagram networks use destination addresses and virtual-circuitnetworks use VC. numbers to forward packets toward theirdestination.D datagram networks use VC. numbers and virtual-circuit networksuse destination addresses to forward packets toward their destination. 9.In the following options, which one is not a guided media? ( )A twisted-pair wireB fiber opticsC coaxial cableD satellite10.Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet12.The Internet’s network layer is responsible for moving network-layer packets known as ( ) from one host to another.A frameB datagramC segmentD message13.The protocols of various layers are called ( ).A the protocol stackB TCP/IPC ISPD network protocol14.There are two classes of packet-switched networks: ( ) networks and virtual-circuit networks.A datagramB circuit-switchedC televisionD telephone15.Access networks can be loosely classified into three categories: residential access, company access and ( ) access.A cabledB wirelessC campusD city area18.In the Internet, the equivalent concept to end systems is ( ).A hostsB serversC clientsD routers19.In the Internet, end systems are connected together by ( ).A copper wireB coaxial cableC communication links 通信链路D fiber optics20.End systems access to the Internet through its ( ).A modemsB protocolsC ISP 网络运营商D sockets121.End systems, packet switches, and other pieces of the Internet, run ( ) that control the sending and receiving of information within theInternet.A programsB processesC applicationsD protocols22.There are many private networks, such as many corporate and government networks, whose hosts cannot exchange messages withhosts outside of the private network. These private networks are often referred to as ( ).A internetsB LANC intranetsD WAN23.The internet allows ( ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications24.The Internet provides two services to its distributed applications: a connectionless unreliable service and () service.A flow controlB connection-oriented reliableC congestion controlD TCP25.It defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on thetransmission and/or receipt of a message or other event. The sentence describes ( ).A InternetB protocolC intranetD network26.In the following options, which does not define in protocol? ( )A the format of messages exchanged between two or morecommunicating entitiesB the order of messages exchanged between two or morecommunicating entitiesC the actions taken on the transmission of a message or other eventD the transmission signals are digital signals or analog(模拟)signals27.In the following options, which is defined in protocol? ( )A the actions taken on the transmission and/or receipt of a message orother eventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts28.In the following options, which does not belong to the network edge?( )A end systemsB routersC clientsD servers29.In the following options, which belongs to the network core? ( )A end systemsB routersC clientsD servers30.In the following options, which is not the bundled with the Internet’s connection-oriented service? (在下面选择,哪一个不是捆绑了互联网的面向连接的服务?)A reliable data transferB guarantee of the transmission timeC flow controlD congestion-control31.An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes ( ).A flow controlB congestion-controlC reliable data transferD connection-oriented service32.It makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer33.It helps prevent the Internet from entering a state of gridlock. When a packet switch becomes congested, its buffers can overflow and packetloss can occur. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer34.The Internet’s connection-oriented service has a name, it is ( ).A TCPB UDPC TCP/IPD IP35.In the following options, which service does not be provided to an application by TCP?( )A reliable transportB flow controlC video conferencing 视频会议2D congestion control36.The Internet’s connectionless service is called ( ).A TCPB UDPC TCP/IPD IP37.In the following options, which does not use TCP?( )A SMTPB internet telephoneC FTPD HTTP38.In the following options, which does not use UDP?( )A Internet phoneB video conferencingC streaming multimediaD telnet39.There are two fundamental approaches to building a network core(有2个基本方法建立一个网络核心),()and packet switching.A electrical current switchingB circuit switchingC data switchingD message switching40.In ( ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration of the communication session.A packet-switchedB data-switchedC circuit-switchedD message-switched41.In ( ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched44.( )(是指交换机必须接收整个数据包之前就可以开始传递的第一位的数据包上出站链接。

计算机网络与技术(双语)课程计算机网络教学大纲(双语)

计算机网络与技术(双语)课程计算机网络教学大纲(双语)

《Computer Network》课程教学大纲二、课堂教学时数及课后作业题数分配三、单元教学目的、教学重难点和内容设置L1 Course Preparation【teaching objective】to help students know Sentence analyzing of the scientific English and some terms of the computer and communication technology.【keys and difficulties 】Long Sentence analyzing and terms memorizingL2 Introduction of the computer networks【teaching objective】to help students know the basic knowledge of network applications and Communication media, local asynchronous communication and long distance communication. 【keys and difficulties 】understanding the concept and principal of local asynchronous communication and long distance communication.L3 Packet transmission 1【teaching objective】to help students know the basic concept of transmission errors and error detection , LAN topologies, Addressing principal.【keys and difficulties 】understanding the concept of error detection the method to avoid transmission error.L4 Packet transmission 2【teaching objective】to help students know the basic concept fiber modems, repeater, bridges switches ATM technology and W AN technology, to understand the principal of the loop digital technology and Routing ,【keys and difficulties 】understanding the Routing principal and applications of WANL5 Packet transmission 3【teaching objective】to help students know network Characteristics, to understand the relation of the seven layers【keys and difficulties 】understanding the sketch of Information transmission among layers.L6 Internetworking1【teaching objective】to help students know network concepts architecture and protocols, and understand the address resolution.【keys and difficulties 】understanding the principal and work mechanism of ARP protocol.L7 Internetworking2【teaching objective】to help students know concepts of IP datagram, datagram forwarding, IP encapsulation, fragmentation and reassembly, and understand the mechanism of error reporting. 【keys and difficulties 】understanding the principal and work mechanism of error reporting and correcting.L8 Internetworking3【teaching objective】to help students know how to guarantee the reliable transport service andunderstand the mechanism of the address translation and internet routing.【keys and difficulties 】understanding t he mechanism of the address translation and internet routing.L9 and L10 work Application1【teaching objective】to help students know some applications of the computer networks and improve scientific English reading ability.【keys and difficulties 】understanding the concept and use of Computer security。

Homework Chapter 2

Homework Chapter 2

《Computer Networks and Internet》Chapter 21. Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i.e., this is the actual content of an HTTP GET message). The characters <cr><lf> are carriage return and line-feed characters (that is, the italized character string <cr> in the text below represents the single carriage-return character that was contained at that point in the HTTP header). Answer the following questions, indicating where in the HTTP GET message below you find the answer.GET /cs453/index.html HTTP/1.1<cr><lf>Host: <cr><lf>User-Agent: Mozilla/5.0 (Windows;U; Windows NT 5.1; en-US; rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax) <cr><lf>Accept:ext/xml, application/xml, application/xhtml+xml, text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5<cr><lf>Accept-Language:en-us,en;q=0.5<cr><lf>Accept-Encoding: zip,deflate<cr><lf>Accept-Charset:ISO-8859-1,utf-8;q=0.7,*;q=0.7<cr><lf>Keep-Alive:300<cr><lf>Connection:keep-alive<cr><lf><cr><lf>a. What is the URL of the document requested by the browser?b. What version of HTTP is the browser running?c. Does the browser request a non-persistent or a persistent connection?d. What is the IP address of the host on which the browser is running?e. What type of browser initiates this message? Why is the browser type needed in anHTTP request message?考虑以下的ASCII字符字符串被Wireshark当浏览器发送一个HTTP GET消息(即。

ComputerNetworksandInternets[001]

ComputerNetworksandInternets[001]

– 然后二者按管理协议交换请求和响应信息
为避免产生混淆,使用其它术语
– 管理员(Manager) == 客户; 运行于网管机上的客户应用
– 代理(Agent) == 服务器; 运行于网络设备上的应用
7 管理员向代理提出请求,代理响应
2020/8/13
网管 为何使用传统网络和传统通信协议?
坏处:协议失效或底层硬件失效均会阻止设备发 出或接收数据,从而失去对它的控制。
– 诊断困难
4
2020/8/13
间歇性隐性实效的问题 Problem with hidden failures
隐匿问题
– 硬件丢弃了错误帧 – 网络协议可以重传坏帧
尽管网络硬件和协议软件含有自动检测失效并重 传数据包的机制,但仍然需要网管检测并改正底 层问题,因为重新传输降低了共享网络中所有计 算机的性能。
索引是隐含的
– 管理者必须知道所操作的对象是一个数组 – 管理者必须将索引信息附加到对象名称后以正确存取数组的表

19
2020/8/13
数组例子 Array example
路由表是一个数组: ip.ipRoutingTable
路由表入口列表以 IP 地址 为了标识一个表值:
– ip.ipRoutingTable.ipRouteEntry.ipRouteNextHop.IPdestaddr – ipRouteEntry :索引 – ipRouteNextHop :路由表入口中的一个字段 – IPdestaddr : 32-bit IP address
– 获取(Fetch) 从设备处获得一个值 – 存储(Store) 在设备中设置一个值
– 每个对象均可通过唯一的名称进行获取或存储

chapter 1 computer networks and the Internet

chapter 1 computer networks and the Internet

描述Tier-1 ISP的四个特点。

1)链路速率高,一般为Gbps。

2)到所有其他Tier-1 ISP有直接连接。

3)与多数Tier-2 ISP有连接。

4)覆盖国际范围传播延迟:一个长度为1000字节的分组在距离为5000Km的链路上传播,其传播延迟是多大?假设传播速度为2.5×108m/s,链路的传输速率为1Mbps。

一般化,如果链路的长度为d公里,传输速率为R bps,传播速率为s米/秒。

则长度为L字节分组的传播延迟为多少?传播延迟与分组的长度L有关系吗?传播延迟与链路的传输速率有关系吗?20mses; d/s; no;no。

传输延迟:一个长度为1000字节的分组在距离为5000Km的链路上传播,其传输延迟是多大?假设传播速度为2.5×108m/s,链路的传输速率为1Mbps。

一般化,如果链路的长度为d公里,传输速率为R bps,传播速率为s米/秒。

则长度为L字节的分组的传输播延迟为多少?传输延迟与分组的长度L有关系吗?传输延迟与链路的传输速率有关系吗?8msec;L/R;no;no;传输延迟和传播延迟:假设两台分组交换机之间利用长度为5000Km的链路直接互连,信号传播速度为2.5×108m/s,链路的传输速率为1Mbps。

将长度为1000字节的分组从一个交换机传输到另一台交换机需要多长时间?一般化,在长度为d、传播速度为s、传输速率为R bps传输长度为L的分组需要耗费多长时间?端到端延迟等于传输延迟和传播延迟之和。

更准确点,总的延迟等于向输出链路发送分组的时间加上分组的最后一位在链路上传播所需时间之和。

根据第8和9题知,总延迟为28msec;L/R+d/s。

多条链路上的延迟:考虑从端系统发送长度为L的分组开始,通过第1条链路到达一台交换机,再经过第2条链路到达目的端系统。

设d i、S i、R i分别表示链路i的长度、传播速度和传输速率,其中i=1,2。

设分组在交换机中的处理延迟为d proc。

Chapter1_Computer networks and the internet(1.2)

Chapter1_Computer networks and the internet(1.2)
Bandwidth division into “pieces” Dedicated allocation Resource reservation
resource contention: aggregate resource demand can exceed amount available congestion: packets queue, wait for link use store and forward: packets move one hop at a time
11
Packet switching versus circuit switching
Packet switching allows more users to use network!
• 1 Mb/s link • each user:
– 100 kb/s when “active” – active 10% of time
… … 时分复用帧 T
CH15 CH16 CH17 CH31
… 时分复用帧
8 bit
时分复用帧
t
CH0
CH1 CH2

CH15 CH16 CH17
T = 125 ms
4

CH30 CH31 CH0
15 个话路
15 个话路
时分复用可能会造成 线路资源的浪费
用户
时分复用
A B
a
b b c c
a
t

t ②
– All links are 1.536 Mbps – Each link uses TDM with 24 slots/sec – 500 msec to establish end-to-end circuit

CHAPTER 1 Introduction to Computers 5. Networks and the Internet 课件-优课-人教高中选修计算机英语精

CHAPTER 1 Introduction to Computers 5. Networks and the Internet 课件-优课-人教高中选修计算机英语精

Communication between networks is called internetworking
The Internet, as we know it today, is essentially the ultimate wide-area network, spanning the entire globe
TYPES OF NETWORKS
• Local-area network (LAN)
A network that connects a relatively small number of machines in a relatively close geographical area
TYPES OF NETWORKS
• Wide-area network (WAN)
A network that connects two or more local-area networks over a potentially large geographic distance
Often one particular node on a LAN is set up to serve as a gateway to handle all communication going between that LAN and other networks
TYPES OF
• A bus technology called Ethernet has become the industry
standard for local-area networks
TYPES OF NETWORKS
Well, nobody does. No single person or company owns the Internet or even controls it entirely. As a wide-area network, it is made up of many smaller networks. These smaller networks are often owned and managed by a person or organization. The Internet, then, is really defined by how connections can be made between these networks.

chapter1-计算机网络

chapter1-计算机网络
1-10
Some questions about the network mail system

Networking is similar to the mail system
1-11
Reading Assignment: Chapter 1
Introduction
1-12
Chapter 1: Introduction
Each packet is individually routed. No time guarantee for delivery. No guarantee of delivery in sequence. No guarantee of delivery at all!

Things get lost Acknowledgements Retransmission
What’s the Internet: a service view
communication
distributed applications: Web, VoIP, email, games, e-commerce, file sharing communication services provided to apps: reliable data delivery from source to destination “best effort” (unreliable) data delivery
World’s smallest web server /~shri/iPic.html
Internet phones
Introduction 1-16
What’s the Internet: “nuts and bolts” view

计算机网络英文题库(附答案)chapter1

计算机网络英文题库(附答案)chapter1

Chapter 1 Computer Networks and the Internet 1.The The ( ( ) ) is is is a a a worldwide worldwide worldwide computer computer computer network, network, network, that that that is, is, is, a a a network network network that that interconnects millions of computing devices throughout the world. ppt3 A public Internet B Intranet C switch net D television net 2.Which kind of media is not a guided media? ( ) A twisted-pair copper wire B a coaxial cable C fiber optics D digital satellite channel 3.Which kind of media is a guided media? ( ) A geostationary satellite B low-altitude satellite C fiber optics D wireless LAN 4.The units of data exchanged by a link-layer protocol are called ( ). A Frames B Segments C Datagrams D bit streams 5.Which of the following option belongs to the circuit-switched networks? ( ) A FDM B TDM C VC networks D both A and B 6.( )makes sure that that neither neither neither side side side of of of a a a connection overwhelms connection overwhelms the the other other side by sending too many packets too fast. A Reliable data transfer B Flow control C Congestion control D Handshaking procedure 7.( ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link. A Store-and-forward transmission B FDM C End-to-end connection D TDM 8.Datagram networks and virtual-circuit networks differ in that ( ). A datagram networks are circuit-switched networks, and virtual-circuit networks are packet-switched networks. B datagram networks are packet-switched networks, and virtual-circuit networks are circuit-switched networks. C datagram networks use destination addresses and virtual-circuit networks use VC. numbers to forward packets toward their destination. D datagram networks use VC. numbers and virtual-circuit networks use destination addresses to forward packets toward their destination. 9.In the following options, which one is not a guided media? ( ) A twisted-pair wire B fiber optics C coaxial cable D satellite 10.Processing delay does not include the time to ( ). A examine the packet ’s header B wait to transmit the packet onto the link C determine where to direct the packet D check bit-error in the packet 11.In the following four descriptions, which one is correct? ( ) A The traffic intensity must be greater than 1. B The fraction of lost packets increases as the traffic intensity decreases. C If the traffic intensity is close to zero, the average queuing delaywill be close to zero. D If the traffic intensity is close to one, the average queuing delay will be close to one. 12.The The Internet Internet Internet’’s s network network network layer layer layer is is is responsible responsible responsible for for for moving moving moving network-layer network-layer packets known as ( ) from one host to another. A frame B datagram C segment D message 13.The protocols of various layers are called ( ). A the protocol stack B TCP/IP C ISP D network protocol 14.There are two classes of packet-switched networks: ( ) networks and virtual-circuit networks. A datagram B circuit-switched C television D telephone 15.Access networks can be loosely classified into three categories: residential access, company access and ( ) access. A cabled B wireless C campus D city area Question 16~17 Suppose, a is the average rate at which packets arrive at the queue, R is the the transmission transmission transmission rate, rate, rate, and and and all all all packets packets packets consist consist consist of of L bits, bits, then then then the the the traffic traffic intensity is ( 16 ), and it should no greater than ( 17 ). 16. A LR /aB La /RC Ra /L D LR /a 17.A 2 B 1 C 0 D -1 18.In the Internet, the equivalent concept to end systems is ( ). A hosts B servers C clients D routers 19.In the Internet, end systems are connected together by ( ). A copper wire B coaxial cable C communication links D fiber optics 20.End systems access to the Internet through its ( ). A modems B protocols C ISP D sockets 21.End systems, packet switches, and other pieces of the Internet, run ( ) that control the sending and receiving of information within the Internet. A programs B processes C applications D protocols 22.There are many private networks, such as many corporate and government networks, whose hosts cannot exchange messages with hosts outside of the private network. These private networks are often referred to as ( ). A internets B LANC intranets D W AN 23.The internet allows ( ) running on its end systems to exchange data with each other. A clients applications B server applications C P2P applications D distributed applications 24.The Internet provides two services to its distributed applications: a connectionless unreliable service and () service. A flow control B connection-oriented reliable C congestion control D TCP 25.It defines the format and the order of messages exchanged between twoor more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event. The sentence describes ( ). A Internet B protocol C intranet D network 26.In the following options, which does not define in protocol? ( ) A the format of messages exchanged between two or more communicating entities B the order of messages exchanged between two or more communicating entities C the actions taken on the transmission of a message or other evenD the transmission signals are digital signals or analog signals 27.In the following options, which is defined in protocol? ( ) A the actions taken on the transmission and/or receipt of a message oother event B the objects exchanged between communicating entities C the content in the exchanged messages D the location of the hosts 28.In the following options, which does not belong to the network edge( ) A end systems B routers C clients D servers 29.In the following options, which belongs to the network core? ( ) A end systems B routers C clients D servers 30.In the following options, which is not the bundled with the Internet ’s connection-oriented service? ( ) A reliable data transfer B guarantee of the transmission time C flow control D congestion-control 31.An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes ( ). A flow control B congestion-control C reliable data transfer D connection-oriented service 32.It makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast. The sentence describes ( ). A flow control B congestion-control C connection-oriented service D reliable data transfer 33.It helps prevent the Internet from entering a state of gridlock. When a packet switch becomes congested, its buffers can overflow and packet loss can occur. The sentence describes ( ). A flow control B congestion-control C connection-oriented service D reliable data transfer 34.The Internet ’s connection-oriented service has a name, it is ( ). A TCP B UDP C TCP/IP D IP 35.In In the the the following following following options, options, options, which which which service service service does does does not not not be be be provided provided provided to to to an an application by TCP?( ) A reliable transport B flow control C video conferencing D congestion control 36.The Internet ’s connectionless service is called ( ). A TCP B UDP C TCP/IP D IP 37.In the following options, which does not use TCP?( ) A SMTP B internet telephone C FTP D HTTP 38.In the following options, which does not use UDP?( ) A Internet phone B video conferencing C streaming multimedia D telnet 39.There are two fundamental approaches to building a network core, ( ) and packet switching. A electrical current switching B circuit switching C data switching D message switching 40.In ( ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration ofthe communication session. A packet-switched B data-switched C circuit-switched D message-switched 41.In ( ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link. A packet-switched B data-switched C circuit-switched D message-switched 42.In a circuit-switched network, if each link has n circuits, for each link used by the end-to-end connection, the connection gets ( ) of the link link’’s bandwidth for the duration of the connection. A a fraction 1/n B all C 1/2 D n times 43.For ( ), the transmission rate of a circuit is equal to the frame rate multiplied by the number of bits in a slot. A CDMA B packet-switched network C TDM D FDM 44.( ) means that the switch must receive the entire packet before it canbegin to transmit the first bit of the packet onto the outbound link. A Queuing delay B Store-and-forward transmission C Packet loss D Propagation 45.The network that forwards packets according to host destination addresses is called ( ) network. A circuit-switched B packet-switched C virtual-circuit D datagram 46.The network that forwards packets according to virtual-circuit numbers is called ( ) network. A circuit-switched B packet-switched C virtual-circuit D datagram 47.In the following entries, which is not a kind of access network?( ) A residential access B company access C wireless access D local access 48.Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R 1 and R 2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L ? (Ignore queuing delay, propagation delay, and processing delay.) ( )A L /R 1+L /R 2 B L /R 1C L /R 2D none of the above 49.The time required to examine the packet ’s header and determine where to direct the packet is part of the ( ). A queuing delay B processing delay C propagation delay D transmission delay 50.The time required to propagate from the beginning of the link to the next router is ( ). A queuing delay B processing delay C propagation delay D transmission delay 51.Consider sending a packet of 3000bits over a path of 5 links. Each link transmits transmits at at at 1000bps. 1000bps. 1000bps. Queuing Queuing Queuing delays, delays, delays, propagation propagation propagation delay delay delay and and and processing processing delay are negligible. (6 points) (1).Suppose (1).Suppose the the the network network network is is is a a a packet-switched packet-switched packet-switched virtual virtual virtual circuit circuit circuit network. network. network. VC VC setup time is 0.1 seconds. Suppose the sending layers add a total of 500 bits of header to each packet. How long does it take to send the file from source to destination? (2).Suppose the the network network network is is is a a a packet-switched packet-switched datagram datagram network network network and and and a a connectionless connectionless service service service is is is used. used. used. Now Now Now suppose suppose suppose each each each packet packet packet has has has 200 200 200 bits bits bits of of header. How long does it take to send the file? (3).Suppose that the network is a circuit-switched network. Further suppose that that the the the transmission transmission transmission rate rate rate of of of the the the circuit circuit circuit between between between source source source and and and destination destination destination is is 200bps. Assuming 0.02s setup time and 200 bits of header appended to the packet, how long does it take to send the packet? Solution: (1). t=5*(3000+500)/1000+0.1=17.6s(2). t=5*(3000+200)/1000=16s(3). t=(3000+200)/200+0.02=16.02s。

Chapter1_Computer Networks and the Internet——第4版

Chapter1_Computer Networks and the Internet——第4版
22 School of Computer Science & Technology
1.1 什么是因特网?-小结
具体构成描述
构成Internet的基本硬件和软件组件
服务描述
Internet是一种能为分布式应用程序提供服 务的网络基础设施
协议
定义了在两个或多个通信实体之间交换的 报文格式和次序,以及在报文传输和/或接 收或其他事件方面所采取的动作
你好
几点了
2:00
<file>
3 什么是协议?
网络协议:
1.1 ? 什 接收、发送消息的实体不是人,而是在 host中的硬件和软件实体 么 是 因特网中的所有活动都受协议的制 因 约 特 协议定义了在两个或多个通信实体之间 网 交换的报文格式和次序,以及在报文传 输和/或接收或其他事件方面所采取的 动作
边缘路由器(edge router) :从源主机到目的主机 路径上的第一个路由器
1.2
分类
住宅接入:Residential access 公司接入:Company access 无线接入:wireless access 注意:
•接入网的带宽
•共享/专用
School of Computer Science & Technology 30
7 School of Computer Science & Technology
1 具体构成描述
1.1 什 么 是 因 特 网 ?
端系统通常通过分组交换机 (packet switches)间接地连接在一 起。
路由器(Router)和链路层交换机 (Link-layer switch) 根据分组首部字段的值通过网络转发分组
Introduction

计算机网络英文题库(含答案)Chapter1ComputerNetworksandtheI。。。

计算机网络英文题库(含答案)Chapter1ComputerNetworksandtheI。。。

计算机⽹络英⽂题库(含答案)Chapter1ComputerNetworksandtheI。

计算机⽹络英⽂题库Chapter 1 Computer Networks and the Internet1.The ( A ) is a worldwide computer network, that is, a network that interconnects millions of computing devices throughout the world.A public InternetB IntranetC switch netD television net2.Which kind of media is not a guided media? ( D )A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel3.Which kind of media is a guided media? ( C )A geostationary satelliteB low-altitude satelliteC fiber opticsD wireless LAN4.The units of data exchanged by a link-layer protocol are called (A ).A FramesB SegmentsC DatagramsD bit streams5.Which of the following option belongs to the circuit-switched networks? ( D )A FDMB TDMC VC networksD both A and B6.(B) makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure7.( A ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM8.Datagram networks and virtual-circuit networks differ in that ( C ).A datagram networks are circuit-switched networks, and virtual-circuit networks are packet-switched networks.B datagram networks are packet-switched networks, and virtual-circuit networks are circuit-switched networks.C datagram networks use destination addresses and virtual-circuit networks use VC. numbers to forward packets toward their destination.D datagram networks use VC. numbers and virtual-circuit networks use destination addresses to forward packets toward their destination.数据报⽹络(datagram networks)和虚电路⽹络(virtual-circuitnetworks)都是属于分组交换⽹络(packet-switched networks)。

相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Chapter 1: Introduction
Our goal:
get “feel” and
Overview:
what’s the Internet?
what’s a protocol? network edge; hosts, access
terminology more depth, detail later in course approach: use Internet as example
Introduction
1-2
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
Introduction 1-11
A closer look at network structure:
network edge:
applications and hosts access networks, physical media: wired, wireless communication links
networks”

loosely hierarchical public Internet versus private intranet
Institutional network
Introduction
1-7
1.1.2 What’s the Internet: a service view
COMPUTER NETWORKING
A Top Down Approach , 4th edition.
Jim Kurose, Keith Ross
张雪 E-mail: snow_wonder@ Tel: 86223623 Office:A302 网络教研室
Introduction
1-1
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network
structure
1.4 Delay, loss and throughput in packetswitched networks 1.5 Protocol layers, service models
that interconnects millions of computing devices throughout the world. A nuts-and-Bolts description A services description
Introduction
1-4
1.1.1 What’s the Internet: “nuts and bolts” view

Introduction
1-13
1.2.1 Client and Server Programs
client/server
model(C/S)


client host requests, receives service from always-on server Server host provides service e.g. Web browser/server; peer-peer email client/server client/server
Internet standards RFC: Request for comments IETF: Internet Engineering Task Force
Mobile network Global ISP
Home network Regional ISP

Internet: “network of
Goal: data transfer

between end systems
same as before!
App’s using TCP:
HTTP (Web), FTP (file
UDP - User Datagram
Protocol [RFC 768]: connectionless unreliable data transfer no flow control no congestion control
Get /kurose-ross
2:00
<file>
time Q: Other human protocols?
Introduction 1-10
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
1.4 Delay, loss and throughput in packetswitched networks 1.5 Protocol layers, service models
Introduction 1-3
1.1 What’s the Internet?
The Internet is a computer network
Home network Regional ISP
Institutional network
TCP/IP

e.g., TCP, IP, HTTP, SMTP, ARP, ICMP, RIP
Introduction 1-6
1.1.1 What’s the Internet: “nuts and bolts” view
network core:
interconnected routers network of networks

Introduction
1-12
1.2 The network edge:
end systems (hosts):
Computers and other devices connected to the Internet run application programs e.g. Web, email at “edge of network”
Introduction 1-8
infrastructure enables
1.1.3 What’s a protocol?
human protocols: “what’s the time?” “I have a question” introductions network protocols: machines rather than humans all communication activity in Internet governed by protocols
Goal: data transfer
between end systems handshaking: setup (prepare for) data transfer ahead of time

TCP service [RFC 793]

reliable, in-order bytestream data transfer
Introduction 1-9
1.1.3 What’s a protocol?
a human protocol and a computer network protocol: Hi Hi
Got the time?
TCP connection request TCP connection response
Introduction 1-15
TCP - Transmission

congestion control:

Control Protocol

Internet’s reliable data transfer service
Network edge: best effort (unreliable) data transfer service
transfer), Telnet (remote login), SMTP (email)
App’s using UDP:
PC server
millions of connected
Mobile network Global ISP
wireless laptop cellular handheld
hosts = end systems running network apps communication links
Internet through ISP (Internet Service Provider)


Protocols controlling the
sending and receiving of information within the Internet.

Local ISP Regional ISP
fiber, copper, radio, satellite transmission rate = bandwidth routers: forward packets (chunks of data)

computing devices:
Home network Regional ISP

Hello, hello back human protocol set up “state” in two communicating hosts
相关文档
最新文档