计算机网络自顶向下 第七版 第六章答案

合集下载

计算机网络自顶向下答案第六章中文版

计算机网络自顶向下答案第六章中文版

6复习题1.APs周期性的发送信标帧,AP的一个信标帧通过11个信道中的一个发送。

信标帧允许附近的无线基站发现和识别AP。

2.1)基于无线主机的MAC地址;2)用户名和密码的结合。

在这2中情况中,AP把信息传送给认证服务器。

3.不对4.2个原因:1)无线信道中误码率比较高;2)在有线的以太网中,发送站点能够检测到是否有碰撞发生,然而在802.11中站点不能检测到碰撞。

5.不对6.每一个无线基站都可以设置一个RTS阈值,因此只有当将要传送的数据帧长度长于这个阈值时,RTS/CTS序列才会被用到。

7.没有好处。

假设有2个站点同时想发送数据,并且他们都使用RTS/CTS。

如果RTS/CTS的帧长和数据帧长一样时,信道就会被浪费,因为发送RTS/CTS的时间和发送数据的时间一样。

因此RTS/CTS交换只有当RTS/CTS 帧长远小于数据帧长时才有用。

8.开始时,交换机在其转发表中有一个表项标识了无线站点和前一个AP的联系。

当无线基站和新的AP联系时,新的AP将创建一个包括无线基站MAC地址以及以太网广播帧的帧。

当交换机收到该帧时,更新其转发表,使得无线站点可以通过新的AP到达。

9.UMTS源于GSM,CDMA200源于IS-95。

习题1.输出d1 = [-1,1,-1,1,-1,1,-1,1];d0 = [1,-1,1,-1,1,-1,1,-1]2.发送方2的输出= [1,-1,1,1,1,-1,1,1]; [ 1,-1,1,1,1,-1,1,1]3.4.a)两个AP有不同的SSID和MAC地址。

一个到达咖啡馆的无线站点将会和其中一个AP的联系。

发生联系后,在新的站点和AP之间会建立一条虚链路。

把两个ISP的AP标识为AP1和AP2。

假设新的站点和AP1相关联。

当它发送一个帧的时候,它将会到达AP1。

虽然AP2也会收到这个帧,但是它不会处理这个帧,因为这个帧发送给它的。

因此这两个ISP能在相同的信道上平行地工作。

计算机网络第七版课后答案完整版

计算机网络第七版课后答案完整版

计算机网络第七版课后答案完整版计算机网络是现代社会中不可或缺的一部分,它架起了人与人、人与信息的桥梁,促进了信息的传递和共享。

而针对计算机网络这门课程,学生通常会留下一些问题疑惑。

本文将为大家提供《计算机网络第七版》课后答案的完整版,帮助学生更好地理解和掌握相关知识。

第一章网络基础1. 什么是计算机网络?计算机网络是指利用通信设备和网络连接技术,将地理位置不同的计算机及其外部设备组合成一个完成协同工作的系统。

2. 计算机网络的分类有哪些?计算机网络可分为局域网(LAN)、城域网(MAN)、广域网(WAN)和互联网。

3. 什么是协议?协议是网络通信中计算机之间进行信息交换所必需遵循的规范和约定。

4. OSI参考模型是什么?OSI参考模型是国际标准化组织(ISO)制定的一种通信协议的参考模型,共分为七层,分别是物理层、数据链路层、网络层、传输层、会话层、表示层和应用层。

5. TCP/IP参考模型是什么?TCP/IP参考模型是计算机网络互联中广泛使用的一个协议参考模型,共分为四层,分别是网络接口层、网络层、传输层和应用层。

6. 什么是HTTP协议?HTTP(Hypertext Transfer Protocol)是一种用于传输超文本的应用层协议,是Web浏览器和Web服务器之间进行交互的基础。

7. 什么是UDP协议?UDP(User Datagram Protocol)是一种面向无连接的传输层协议,主要用于在网络上发送短报文。

与TCP协议相比,它传输速度更快,但可靠性较差。

第二章物理层1. 物理层的主要功能是什么?物理层主要负责传输比特流,将比特流转换为物理信号进行传输。

2. 什么是编码?编码是将数字信号转换为模拟信号或数字信号的过程。

3. 常见的编码方式有哪些?常见的编码方式有不归零编码(NRZ)、曼彻斯特编码、差分曼彻斯特编码等。

4. 什么是调制?调制是将数字信号转换为模拟信号的过程,常用的调制方式有调幅(AM)、调频(FM)和调相(PM)。

计算机网络教程自顶向下方法选择题及答案

计算机网络教程自顶向下方法选择题及答案

Chapter 4 Network Layer1.Packetizing at the network layer involvesA) Encapsulating the payload at the sourceB) Adds a header that contains the source and destination informationC) Decapsulating the payload at the destinationD) All of the choices are correct2.Routers in the path are not allowed to ___________________________.A) fragment the packet they receiveB) decapsulate the packetC) change source or destination addressD) All of the choices are correct3.The network layer in the Internet provides _________________.A) comprehensive error and flow control.B) limited error control, but no flow control.C) comprehensive error control but limited flow control.D) All of the choices are correct4.In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct5.In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct6.The performance of a network can be measured in terms of ________.A) delayB) throughputC) packet lossD) all of the choices are correct7.Transmission delay (time) is the ratio of ______________________.A) transmission rate to packet lengthB) transmission rate to distanceC) packet length to transmission rateD) processing time to transmission rate8.Propagation delay (time) is the ratio of ______________________.A) transmission rate to propagation speedB) propagation speed to distanceC) packet length to propagation speedD) distance to propagation speed9.When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.A) increases sharply; its minimumB) increases sharply; its maximumC) decreases sharply; its minimumD) decreases sharply; its maximum10.In open-loop congestion control, policies are applied ____________________.A) to prevent congestion before it happensB) to alleviate congestion after it happensC) to either prevent congestion before it happens or to alleviate congestion after it happensD) None of the choices are correct11.The __________________ technique is one of the open-loop congestion policyA) backpressureB) choke packetC) implicit signalingD) None of the choices are correct12.The __________________ technique is one of the close-loop congestion policyA) acknowledgment policyB) choke packetC) discarding policyD) None of the choices are correct13.IP is a _________ protocol.A) connection-oriented unreliableB) connection-oriented reliableC) connectionless unreliableD) connectionless reliable14.An HLEN value of decimal 10 means _______.A) there are 10 bytes of optionsB) there are 10 bytes in the headerC) there are 40 bytes of optionsD) there are 40 bytes in the header15.If the fragment offset has a value of 100, it means that _______.A) the datagram has not been fragmentedB) the datagram is 100 bytes in sizeC) the first byte of the datagram is byte 800D) None of the choices are correct16.What is needed to determine the number of the last byte of a fragment?A) offset numberB) total lengthC) both offset number and the total lengthD) None of the choices are correct17.The IP header size is _______ bytes long.A) 20 to 60B) 20C) 60D) None of the choices are correct18.Packets in the IP layer are called _________.A) segmentsB) datagramsC) framesD) None of the choices are correct19.The total length field defines the total length of the datagram _________.A) including the headerB) excluding the headerC) excluding the option lengthD) None of the choices are correct20.When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.A) MUTB) MATC) MTUD) None of the choices are correct21.An IPv4 address is normally represented in base ____ in dotted-decimal notation.A) 16B) 256C) 10D) None of the choices are correct22.In classful addressing, the IPv4 address space is divided into _______ classes.A) 3B) 4C) 5D) None of the choices are correct23.The number of addresses assigned to an organization in classless addressing _______.A) can be any numberB) must be a multiple of 256C) must be a power of 2D) None of the choices are correct24.The first address assigned to an organization in classless addressing _______.A) must be evenly divisible by the number of addresses in the organizationB) must be divisible by 128C) must belong to one of the A, B, or C classesD) None of the choices are correct25.In subnetting, the number of addresses in each subnet must _______.A) be a power of 2B) be a multiple of 128C) be divisible by 128D) None of the choices are correct26.What is the default prefix length for class A in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct27.What is the default prefix length for class B in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct28.What is the default prefix length for class C in CIDR notation?A) 24B) 8C) 16D) None of the choices are correct29.DHCP is a (an) ___________ layer protocol.A) applicationB) transportC) networkD) data-link30.In DHCP, the client uses ________ port and the server uses _________ port.A) an ephemeral; a well-knownB) a well-known; a well-knownC) a well-known; an ephemeralD) None of the choices are correct31.DHCP uses the services of _______.A) UDPB) TCPC) IPD) None of the choices are correct32._________ allows a site to use a set of private addresses for internal communication and a set ofglobal Internet addresses for communication with the rest of the world.A) DHCPB) NATC) IMCPD) None of the choices are correct33.The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________ addressing.A) classfulB) classlessC) classful or classlessD) None of the choices are correct34.The use of hierarchy in routing tables can ________ the size of the routing tables.A) reduceB) increaseC) neither reduce nor increaseD) None of the choices are correct35.ICMP is a (an) _________ layer protocol.A) application-layer protocol that helps TCP/IP at the network layerB) transport-layer protocol that helps TCP/IP at the network layerC) network-layer protocol.D) data-link layer protocol that helps TCP/IP at the network layer36.Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated for a fragmented datagram.C) An ICMP error message may be generated for a multicast datagram.D) None of the choices are correct37.Routing inside an autonomous system is referred to as ________ routing.A) interdomainB) intradomainC) out-of-domainD) None of the choices are correct38.Routing between autonomous systems is referred to as ______ routing.A) interdomain routingB) intradomain routingC) out-of-domainD) None of the choices are correct39.In _______ routing, the least cost route between any two nodes is the route with the minimum distance.A) path vectorB) distance vectorC) link stateD) None of the choices are correct40.In ________, each node maintains a vector (table) of minimum distances to every node.A) path vectorB) distance vectorC) link stateD) None of the choices are correct41.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.A) every other nodeB) its immediate neighborsC) one neighborD) None of the choices are correct42.The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct43.The metric used by _______ is the hop count.A) OSPFB) RIPC) BGPD) None of the choices are correct44.In RIP, the ________ timer controls the advertising of regular update messages.A) garbage collectionB) expirationC) periodicD) None of the choices are correct45.In RIP, the ________ timer is used to purge invalid routes from the table.A) garbage collectionB) expirationC) periodicD) None of the choices are correct46.In RIP, the ________ timer controls the validity of the route.A) garbage collectionB) expirationC) periodicD) None of the choices are correct47.RIP uses the services of _______.A) TCPB) UDPC) IPD) None of the choices are correct48.The _________ routing uses the Dijkstra algorithm to build a routing table.A) distance vectorB) link stateC) path vectorD) None of the choices are correct49.The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct50.The _______ protocol allows the administrator to assign a cost, called the metric, to each route.A) OSPFB) RIPC) BGPD) None of the choices are correct51.In OSPF, a ________ link connects two routers without any other host or router in between.A) point-to-pointB) transientC) stubD) None of the choices are correct52.In OSPF, a _______ link is a network with several routers attached to it.A) point-to-pointB) transientC) stubD) None of the choices are correct53.In OSPF, a ________ link is a network connected to only one router.A) point-to-pointB) transientC) stubD) None of the choices are correct54.In OSPF, a ________ defines the links of a network.A) network linkB) router linkC) summary link to networkD) None of the choices are correct55.___________ is an interdomain routing protocol using path vector routing.A) BGPB) RIPC) OSPFD) None of the choices are correct56.A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct57.A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct58.A one-to-one communication between one source and one destination is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct59.In ______, the router forwards the received packet through only one of its interfaces.A) unicastingB) multicastingC) broadcastingD) None of the choices are correct60.In multicast routing, each involved router needs to construct a ________ path tree for each group.A) averageB) longestC) shortestD) None of the choices are correct61.In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.A) group-sharedB) source-basedC) destination-basedD) None of the choices are correct62.The Multicast Open Shortest Path First (MOSPF) routing uses the _______ tree approach.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct63.The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct64.In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.A) shortestB) longestC) averageD) None of the choices are correct65.RPF eliminates the ________ in the flooding process.A) forwardingB) backwardingC) floodingD) None of the choices are correct66.RPB creates a shortest path _______ tree from the source to each destination.A) unicastB) multicastC) broadcastD) None of the choices are correct67.RPB guarantees that each destination receives _________ of the packet.A) only one copyB) no copiesC) multiple copiesD) None of the choices are correct68.In ________, the multicast packet must reach only those networks that have active members for that particular group.A) RPFB) RPBC) RPMD) None of the choices are correct69._______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.A) RPM; RPBB) RPB; RPMC) RPF; RPMD) None of the choices are correct70.__________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.A) MOSPFB) DVMRPC) CBTD) None of the choices are correct71.DVMRP is a ________ routing protocol, based on RIP.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct72.Pruning and grafting are strategies used in _______.A) RPFB) RPBC) RPMD) None of the choices are correct73.PIM-DM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct74.PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct75.An IPv6 address is _________ bits long.A) 32B) 64C) 128D) 25676.An IPv6 address consists of ________ bytes (octets);A) 4B) 8C) 16D) None of the choices are correct77.In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.A) 8; 2B) 8; 3C) 8; 4D) None of the choices are correct78.An IPv6 address can have up to __________ hexadecimal digits.A) 16B) 32C) 8D) None of the choices are correct79.In IPv6, the _______ field in the base header restricts the lifetime of a datagram.A) versionB) priorityC) hop limitD) None of the choices are correct80.The _________ in IPv6 is designed to provide special handling for a particular flow of data.A) flow labelB) next headerC) hop limitD) None of the choices are correct81.When two computers using IPv6 want to communicate but the packet must pass through an IPv4 region, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct82.When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct83.The protocols __________________________ in version 4 are combined into one single protocol, ICMPv6.A) ARP and IGMPB) ICMP and IGMPC) ICMP, ARP, and IGMPD) None of the choices are correctDCBCB DCCBA DBCDC CABAC BCCAA BCAAB ABBAC DBABB BABCA BBBBA ABCAA CBAAC BABAD CACAB ACABC CCBCA ABC。

计算机网络自顶向下方法,第7版——习题解答

计算机网络自顶向下方法,第7版——习题解答

计算机⽹络⾃顶向下⽅法,第7版——习题解答⽬录前⾔本⽂包含了Computer Networking A Top-Down Approach, 7th Edition中部分回顾性习题的问题与解答,主要参考了英⽂第7版和中⽂第7版的正⽂内容,欢迎各位的交流与指正!CHAPTER 1SECTION 1.1R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server anend system?在计算机⽹络中,⼆者的含义是相同的。

端系统列举:⼿机、平板电脑、环境传感器等⽹络服务器是端系统R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?There are two meanings of the word "protocol". In the legal sense, it is defined as an international agreement that supplements or amends a treaty. In the diplomatic sense, the term refers to the set of rules, procedures, conventions and ceremonies that relate to relations between states. In general, protocol represents the recognized and generally accepted system of international courtesy.“协议”⼀词有两种含义。

计算机网络:自顶向下方法-课本课后习题答案(4-6)

计算机网络:自顶向下方法-课本课后习题答案(4-6)

课后习题答案(4-6单元):Chapter 4 Review Questionsreview questions:1,2,3,4,8,10,15,16,18,20,23,27,33,34,361.网络层的分组名称是数据报.路由器是根据包的IP地址转发包;而链路层是根据包的MAC地址来转发包.2.数据报网络中网络层两个最重要的功能是:转发,选路.虚电路网络层最重要的三个功能是:转发,选路,和呼叫建立.3.转发是当一个分组到达路由器的一条输入链路时,该路由器将该分组移动到适当的输出链路.选路是当分组从发送方流向接收方时,网络层必须决定这些分组所采用的路由或路径.4.是,都使用转发表,要描述转发表,请参考4.2节.在虚电路网络中,该网络的路由器必须为进行中的连接维持连接状态信息。

每当跨越一台路由器则创建一个新连接,一个新的连接项必须加到该路由器转发表中;每当释放一个连接,必须从该表中删除该项。

注意到即使没有VC号转换,仍有必要维持连接状态信息,该信息将VC号与输出接口号联系起来。

每当一个端系统要发送分组时,它就为该分组加上目的地端系统的地址,然后将该分组推进网络中。

完成这些无需建立任何虚电路。

在数据报网络中的路由器不维护任何有关虚电路的状态信息。

每个路由器有一个将目的地址影射到链路接口的转发表;当分组到达路由器时,该路由器使用该分组的目的地址在该转发表中查找适当的输出链路接口。

然后路由其将该分组项该输出链路接口转发。

虽然在数据报网络中不维持连接状态信息,它们无论如何在其转发表中维持了转发状态信息。

在数据报网络中的转发表是由选录算法修改的,通常每1到5分钟左右更新转发表。

在虚电路网络中,无论何时通过路由器拆除一条现有的连接,路由器中的转发表就更新。

8.(1)经内存交换:在输入和输出端口之间的交换是在CPU控制下完成的.输入与输出端口的作用就像在传统操作系统中的I/O设备一样.一个分组到达一个输入端口,该端口会先通过中断方式向选路处理器发出信号.于是,该分组就被拷贝到处理器内存中.选路处理器从分组首部中取出目的地址,在转发表中找出适当的输出端口,并将该分组拷贝到输出端口的缓存中.(2)经一根总线交换:输入端口经一根总线将分组直接传送到输出端口,不需要选路处理器的干预.由于总线是共享的,故一次只能有一个分组通过总线传送.(3)经一个互联网络交换:使用一个纵横的网络,是一个由2n条总线组成的互联网络,它将n个输出端口和n个输入端口连接,一个到达某个端口的分组沿着连到输出端口的水平总线穿行,直至该水平总线与连到所希望的输出端口的垂直总线之交点.10.因为输出线速率慢而导致输出端队列长度加大,最终将耗尽输出端口的存储空间,在这样的情况下,分组就被丢弃了。

计算机网络自顶向下课后答案及解析

计算机网络自顶向下课后答案及解析

7第一章R11 L/R1 + L/R2R13a. 两个用户b. 每个用户需要1Mbps进行传输,若两个或更少用户同时进行传输,则带宽需求量最大为2Mbps,由于链路总带宽为2Mbps,所以无排队时延;若三个或更多用户同时进行传输,带宽需求超过3Mbps,多于链路总带宽,因此会出现排队时延。

c. 0.27d. 0.008;0.008R19a. 500kbpsb. 64sc. 100kbps;320sR23应用层:网络应用程序及应用层协议存留的地方;传输层:在应用程序端点之间传送应用层报文;网络层:将网络层分组(数据报)从一台主机移动到另一台主机;链路层:将分组从一个结点移动到路径上的下一个结点;物理层:将帧(链路层分组)中的一个一个比特从一个结点移动到下一个结点。

R25路由器:网络层,链路层,物理层链路层交换机:链路层,物理层主机:所有五层P3a. 电路交换网。

因为应用包含可预测的稳定带宽需求的长运行时间,由于传输率已知且非猝发,可在无明显浪费的情况下为每个应用周期预留带宽。

且建立与中断连接的总开销可被均摊在应用长时间的运行时间中。

b. 在最坏的情况下,所有应用同时经一条或多条链路传输。

然而由于每条链路都有足够带宽提供给所有应用,不会出现拥塞情况,因此不需要拥塞控制。

第二章R5目的主机的IP地址与目的进程套接字的端口号R12当用户首次访问网站时,服务器创建一唯一标识码,在其后端服务器中创建一入口,将该唯一标识码作为Cookie 码返回,该cookie 码储存在用户主机中,由浏览器管理。

在后来每次的访问与购买中,浏览器将cookie 码发送给网站,因此当该用户(准确地说,该浏览器)访问该网站时,网站会立即获知。

R15FTP 使用两平行TCP 连接,一条连接发送控制信息(例如文件传输请求),另一条连接用作实际传输文件。

由于控制信息不会通过与文件传输相同的连接发送,因此FTP 在“带外”发送控制信息。

R19是的,一个机构的邮件服务器和Web 服务器可以有完全相同的主机名别名。

计算机网络教程自顶向下方法选择题及答案

计算机网络教程自顶向下方法选择题及答案

Chapter 4 Network Layer1.Packetizing at the network layer involvesA) Encapsulating the payload at the sourceB) Adds a header that contains the source and destination informationC) Decapsulating the payload at the destinationD) All of the choices are correct2.Routers in the path are not allowed to ___________________________.A) fragment the packet they receiveB) decapsulate the packetC) change source or destination addressD) All of the choices are correct3.The network layer in the Internet provides _________________.A) comprehensive error and flow control.B) limited error control, but no flow control.C) comprehensive error control but limited flow control.D) All of the choices are correct4.In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct5.In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct6.The performance of a network can be measured in terms of ________.A) delayB) throughputC) packet lossD) all of the choices are correct7.Transmission delay (time) is the ratio of ______________________.A) transmission rate to packet lengthB) transmission rate to distanceC) packet length to transmission rateD) processing time to transmission rate8.Propagation delay (time) is the ratio of ______________________.A) transmission rate to propagation speedB) propagation speed to distanceC) packet length to propagation speedD) distance to propagation speed9.When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.A) increases sharply; its minimumB) increases sharply; its maximumC) decreases sharply; its minimumD) decreases sharply; its maximum10.In open-loop congestion control, policies are applied ____________________.A) to prevent congestion before it happensB) to alleviate congestion after it happensC) to either prevent congestion before it happens or to alleviate congestion after it happensD) None of the choices are correct11.The __________________ technique is one of the open-loop congestion policyA) backpressureB) choke packetC) implicit signalingD) None of the choices are correct12.The __________________ technique is one of the close-loop congestion policyA) acknowledgment policyB) choke packetC) discarding policyD) None of the choices are correct13.IP is a _________ protocol.A) connection-oriented unreliableB) connection-oriented reliableC) connectionless unreliableD) connectionless reliable14.An HLEN value of decimal 10 means _______.A) there are 10 bytes of optionsB) there are 10 bytes in the headerC) there are 40 bytes of optionsD) there are 40 bytes in the header15.If the fragment offset has a value of 100, it means that _______.A) the datagram has not been fragmentedB) the datagram is 100 bytes in sizeC) the first byte of the datagram is byte 800D) None of the choices are correct16.What is needed to determine the number of the last byte of a fragment?A) offset numberB) total lengthC) both offset number and the total lengthD) None of the choices are correct17.The IP header size is _______ bytes long.A) 20 to 60B) 20C) 60D) None of the choices are correct18.Packets in the IP layer are called _________.A) segmentsB) datagramsC) framesD) None of the choices are correct19.The total length field defines the total length of the datagram _________.A) including the headerB) excluding the headerC) excluding the option lengthD) None of the choices are correct20.When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.A) MUTB) MATC) MTUD) None of the choices are correct21.An IPv4 address is normally represented in base ____ in dotted-decimal notation.A) 16B) 256C) 10D) None of the choices are correct22.In classful addressing, the IPv4 address space is divided into _______ classes.A) 3B) 4C) 5D) None of the choices are correct23.The number of addresses assigned to an organization in classless addressing _______.A) can be any numberB) must be a multiple of 256C) must be a power of 2D) None of the choices are correct24.The first address assigned to an organization in classless addressing _______.A) must be evenly divisible by the number of addresses in the organizationB) must be divisible by 128C) must belong to one of the A, B, or C classesD) None of the choices are correct25.In subnetting, the number of addresses in each subnet must _______.A) be a power of 2B) be a multiple of 128C) be divisible by 128D) None of the choices are correct26.What is the default prefix length for class A in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct27.What is the default prefix length for class B in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct28.What is the default prefix length for class C in CIDR notation?A) 24B) 8C) 16D) None of the choices are correct29.DHCP is a (an) ___________ layer protocol.A) applicationB) transportC) networkD) data-link30.In DHCP, the client uses ________ port and the server uses _________ port.A) an ephemeral; a well-knownB) a well-known; a well-knownC) a well-known; an ephemeralD) None of the choices are correct31.DHCP uses the services of _______.A) UDPB) TCPC) IPD) None of the choices are correct32._________ allows a site to use a set of private addresses for internal communication and a set ofglobal Internet addresses for communication with the rest of the world.A) DHCPB) NATC) IMCPD) None of the choices are correct33.The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________ addressing.A) classfulB) classlessC) classful or classlessD) None of the choices are correct34.The use of hierarchy in routing tables can ________ the size of the routing tables.A) reduceB) increaseC) neither reduce nor increaseD) None of the choices are correct35.ICMP is a (an) _________ layer protocol.A) application-layer protocol that helps TCP/IP at the network layerB) transport-layer protocol that helps TCP/IP at the network layerC) network-layer protocol.D) data-link layer protocol that helps TCP/IP at the network layer36.Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated for a fragmented datagram.C) An ICMP error message may be generated for a multicast datagram.D) None of the choices are correct37.Routing inside an autonomous system is referred to as ________ routing.A) interdomainB) intradomainC) out-of-domainD) None of the choices are correct38.Routing between autonomous systems is referred to as ______ routing.A) interdomain routingB) intradomain routingC) out-of-domainD) None of the choices are correct39.In _______ routing, the least cost route between any two nodes is the route with the minimum distance.A) path vectorB) distance vectorC) link stateD) None of the choices are correct40.In ________, each node maintains a vector (table) of minimum distances to every node.A) path vectorB) distance vectorC) link stateD) None of the choices are correct41.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.A) every other nodeB) its immediate neighborsC) one neighborD) None of the choices are correct42.The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct43.The metric used by _______ is the hop count.A) OSPFB) RIPC) BGPD) None of the choices are correct44.In RIP, the ________ timer controls the advertising of regular update messages.A) garbage collectionB) expirationC) periodicD) None of the choices are correct45.In RIP, the ________ timer is used to purge invalid routes from the table.A) garbage collectionB) expirationC) periodicD) None of the choices are correct46.In RIP, the ________ timer controls the validity of the route.A) garbage collectionB) expirationC) periodicD) None of the choices are correct47.RIP uses the services of _______.A) TCPB) UDPC) IPD) None of the choices are correct48.The _________ routing uses the Dijkstra algorithm to build a routing table.A) distance vectorB) link stateC) path vectorD) None of the choices are correct49.The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct50.The _______ protocol allows the administrator to assign a cost, called the metric, to each route.A) OSPFB) RIPC) BGPD) None of the choices are correct51.In OSPF, a ________ link connects two routers without any other host or router in between.A) point-to-pointB) transientC) stubD) None of the choices are correct52.In OSPF, a _______ link is a network with several routers attached to it.A) point-to-pointB) transientC) stubD) None of the choices are correct53.In OSPF, a ________ link is a network connected to only one router.A) point-to-pointB) transientC) stubD) None of the choices are correct54.In OSPF, a ________ defines the links of a network.A) network linkB) router linkC) summary link to networkD) None of the choices are correct55.___________ is an interdomain routing protocol using path vector routing.A) BGPB) RIPC) OSPFD) None of the choices are correct56.A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct57.A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct58.A one-to-one communication between one source and one destination is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct59.In ______, the router forwards the received packet through only one of its interfaces.A) unicastingB) multicastingC) broadcastingD) None of the choices are correct60.In multicast routing, each involved router needs to construct a ________ path tree for each group.A) averageB) longestC) shortestD) None of the choices are correct61.In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.A) group-sharedB) source-basedC) destination-basedD) None of the choices are correct62.The Multicast Open Shortest Path First (MOSPF) routing uses the _______ tree approach.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct63.The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct64.In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.A) shortestB) longestC) averageD) None of the choices are correct65.RPF eliminates the ________ in the flooding process.A) forwardingB) backwardingC) floodingD) None of the choices are correct66.RPB creates a shortest path _______ tree from the source to each destination.A) unicastB) multicastC) broadcastD) None of the choices are correct67.RPB guarantees that each destination receives _________ of the packet.A) only one copyB) no copiesC) multiple copiesD) None of the choices are correct68.In ________, the multicast packet must reach only those networks that have active members for that particular group.A) RPFB) RPBC) RPMD) None of the choices are correct69._______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.A) RPM; RPBB) RPB; RPMC) RPF; RPMD) None of the choices are correct70.__________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.A) MOSPFB) DVMRPC) CBTD) None of the choices are correct71.DVMRP is a ________ routing protocol, based on RIP.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct72.Pruning and grafting are strategies used in _______.A) RPFB) RPBC) RPMD) None of the choices are correct73.PIM-DM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct74.PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct75.An IPv6 address is _________ bits long.A) 32B) 64C) 128D) 25676.An IPv6 address consists of ________ bytes (octets);A) 4B) 8C) 16D) None of the choices are correct77.In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.A) 8; 2B) 8; 3C) 8; 4D) None of the choices are correct78.An IPv6 address can have up to __________ hexadecimal digits.A) 16B) 32C) 8D) None of the choices are correct79.In IPv6, the _______ field in the base header restricts the lifetime of a datagram.A) versionB) priorityC) hop limitD) None of the choices are correct80.The _________ in IPv6 is designed to provide special handling for a particular flow of data.A) flow labelB) next headerC) hop limitD) None of the choices are correct81.When two computers using IPv6 want to communicate but the packet must pass through an IPv4 region, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct82.When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct83.The protocols __________________________ in version 4 are combined into one single protocol, ICMPv6.A) ARP and IGMPB) ICMP and IGMPC) ICMP, ARP, and IGMPD) None of the choices are correctDCBCB DCCBA DBCDC CABAC BCCAA BCAAB ABBAC DBABB BABCA BBBBA ABCAA CBAAC BABAD CACAB ACABC CCBCA ABC。

《计算机网络》第七版答案解析

《计算机网络》第七版答案解析

计算机网络第七版答案第一章概述1-01 计算机网络向用户可以提供那些服务?答:连通性和共享1-02 简述分组交换的要点。

答:(1)报文分组,加首部(2)经路由器储存转发(3)在目的地合并1-03 试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

答:(1)电路交换:端对端通信质量因约定了通信资源获得可靠保障,对连续传送大量数据效率高。

(2)报文交换:无须预约传输带宽,动态逐段利用传输带宽对突发式数据通信效率高,通信迅速。

(3)分组交换:具有报文交换之高效、迅速的要点,且各分组小,路由灵活,网络生存性能好。

1-04 为什么说因特网是自印刷术以来人类通信方面最大的变革?答:融合其他通信网络,在信息化过程中起核心作用,提供最好的连通性和信息共享,第一次提供了各种媒体形式的实时交互能力。

1-05 因特网的发展大致分为哪几个阶段?请指出这几个阶段的主要特点。

答:从单个网络APPANET向互联网发展;TCP/IP协议的初步成型建成三级结构的Internet;分为主干网、地区网和校园网;形成多层次ISP结构的Internet;ISP首次出现。

1-06 简述因特网标准制定的几个阶段?答:(1)因特网草案(Internet Draft) ——在这个阶段还不是 RFC 文档。

(2)建议标准(Proposed Standard) ——从这个阶段开始就成为 RFC 文档。

(3)草案标准(Draft Standard)(4)因特网标准(Internet Standard)1-07小写和大写开头的英文名internet 和Internet在意思上有何重要区别?答:(1) internet(互联网或互连网):通用名词,它泛指由多个计算机网络互连而成的网络。

;协议无特指(2)Internet (因特网):专用名词,特指采用 TCP/IP 协议的互联网络。

区别:后者实际上是前者的双向应用1-08 计算机网络都有哪些类别?各种类别的网络都有哪些特点?答:按范围:(1)广域网WAN:远程、高速、是Internet的核心网。

计算机网络自顶向下(第七版)课后答案—英文

计算机网络自顶向下(第七版)课后答案—英文

Computer Networking: A Top-Down Approach,7th EditionSolutions to Review Questions and Problems Version Date: December 2016This document contains the solutions to review questions and problems for the 7th edition of Computer Networking: A Top-Down Approach by Jim Kurose and Keith Ross. These solutions are being made available to instructors ONLY. Please do NOT copy or distribute this document to others (even other instructors). Please do not post any solutions on a publicly-available Web site. We’ll be happy to provide a copy (up-to-date) of this solution manual ourselves to anyone who asks.Acknowledgments:Over the years, several students and colleagues have helped us prepare this solutions manual. Special thanks goes to Honggang Zhang, Rakesh Kumar, Prithula Dhungel, and Vijay Annapureddy. Also thanks to all the readers who have made suggestions and corrected errors.All material © copyright 1996-2016 by J.F. Kurose and K.W. Ross. All rights reserved Chapter 1 Review Questions1.There is no difference. Throughout this text, the words “host” and “end system” areused interchangeably. End systems include PCs, workstations, Web servers, mail servers, PDAs, Internet-connected game consoles, etc.2.From Wikipedia: Diplomatic protocol is commonly described as a set of internationalcourtesy rules. These well-established and time-honored rules have made it easier for nations and people to live and work together. Part of protocol has always been the acknowledgment of the hierarchical standing of all present. Protocol rules are based on the principles of civility.3.Standards are important for protocols so that people can create networking systemsand products that interoperate.4. 1. Dial-up modem over telephone line: home; 2. DSL over telephone line: home orsmall office; 3. Cable to HFC: home; 4. 100 Mbps switched Ethernet: enterprise; 5.Wifi (802.11): home and enterprise: 6. 3G and 4G: wide-area wireless.5.HFC bandwidth is shared among the users. On the downstream channel, all packetsemanate from a single source, namely, the head end. Thus, there are no collisions in the downstream channel.6.In most American cities, the current possibilities include: dial-up; DSL; cable modem;fiber-to-the-home.7. Ethernet LANs have transmission rates of 10 Mbps, 100 Mbps, 1 Gbps and 10 Gbps.8. Today, Ethernet most commonly runs over twisted-pair copper wire. It also can runover fibers optic links.9. Dial up modems: up to 56 Kbps, bandwidth is dedicated; ADSL: up to 24 Mbpsdownstream and 2.5 Mbps upstream, bandwidth is dedicated; HFC, rates up to 42.8 Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; 10-20 Mbps download; bandwidth is not shared.10. There are two popular wireless Internet access technologies today:a)Wifi (802.11) In a wireless LAN, wireless users transmit/receive packets to/from anbase station (i.e., wireless access point) within a radius of few tens of meters. The base station is typically connected to the wired Internet and thus serves to connect wireless users to the wired network.b)3G and 4G wide-area wireless access networks. In these systems, packets aretransmitted over the same wireless infrastructure used for cellular telephony, with the base station thus being managed by a telecommunications provider. This provides wireless access to users within a radius of tens of kilometers of the base station.11. At time t0the sending host begins to transmit. At time t1 = L/R1, the sending hostcompletes transmission and the entire packet is received at the router (no propagationdelay). Because the router has the entire packet at time t 1, it can begin to transmit the packet to the receiving host at time t 1. At time t 2 = t 1 + L/R 2, the router completes transmission and the entire packet is received at the receiving host (again, no propagation delay). Thus, the end-to-end delay is L/R 1 + L/R 2.12. A circuit-switched network can guarantee a certain amount of end-to-end bandwidth for the duration of a call. Most packet-switched networks today (including the Internet) cannot make any end-to-end guarantees for bandwidth. FDM requires sophisticated analog hardware to shift signal into appropriate frequency bands .13. a) 2 users can be supported because each user requires half of the link bandwidth.b) Since each user requires 1Mbps when transmitting, if two or fewer users transmit simultaneously, a maximum of 2Mbps will be required. Since the available bandwidth of the shared link is 2Mbps, there will be no queuing delay before the link. Whereas, if three users transmit simultaneously, the bandwidth required will be 3Mbps which is more than the available bandwidth of the shared link. In this case, there will be queuing delay before the link.c) Probability that a given user is transmitting = 0.2d) Probability that all three users are transmitting simultaneously = ()333133--⎪⎪⎭⎫ ⎝⎛p p = (0.2)3 = 0.008. Since the queue grows when all the users are transmitting, thefraction of time during which the queue grows (which is equal to the probability that all three users are transmitting simultaneously) is 0.008.14. If the two ISPs do not peer with each other, then when they send traffic to each other they have to send the traffic through a provider ISP (intermediary), to which they have to pay for carrying the traffic. By peering with each other directly, the two ISPs can reduce their payments to their provider ISPs. An Internet Exchange Points (IXP) (typically in a standalone building with its own switches) is a meeting point where multiple ISPs can connect and/or peer together. An ISP earns its money by charging each of the the ISPs that connect to the IXP a relatively small fee, which may depend on the amount of traffic sent to or received from the IXP.15. Google's private network connects together all its data centers, big and small. Traffic between the Google data centers passes over its private network rather than over the public Internet. Many of these data centers are located in, or close to, lower tier ISPs. Therefore, when Google delivers content to a user, it often can bypass higher tier ISPs. What motivates content providers to create these networks? First, the content provider has more control over the user experience, since it has to use few intermediary ISPs. Second, it can save money by sending less traffic into provider networks. Third, if ISPs decide to charge more money to highly profitable content providers (in countries where net neutrality doesn't apply), the content providers can avoid these extra payments.16. The delay components are processing delays, transmission delays, propagation delays,and queuing delays. All of these delays are fixed, except for the queuing delays, which are variable.17. a) 1000 km, 1 Mbps, 100 bytesb) 100 km, 1 Mbps, 100 bytes18. 10msec; d/s; no; no19. a) 500 kbpsb) 64 secondsc) 100kbps; 320 seconds20. End system A breaks the large file into chunks. It adds header to each chunk, therebygenerating multiple packets from the file. The header in each packet includes the IP address of the destination (end system B). The packet switch uses the destination IP address in the packet to determine the outgoing link. Asking which road to take is analogous to a packet asking which outgoing link it should be forwarded on, given the packet’s destination address.21. The maximum emission rate is 500 packets/sec and the maximum transmission rate is350 packets/sec. The corresponding traffic intensity is 500/350 =1.43 > 1.Loss will eventually occur for each experiment;but the time when loss first occurs will be different from one experiment to the next due to the randomness in the emission process.22. Five generic tasks are error control, flow control, segmentation and reassembly,multiplexing, and connection setup. Yes, these tasks can be duplicated at different layers. For example, error control is often provided at more than one layer.23. The five layers in the Internet protocol stack are –from top to bottom –theapplication layer, the transport layer, the network layer, the link layer, and the physical layer. The principal responsibilities are outlined in Section 1.5.1.24. Application-layer message: data which an application wants to send and passed ontothe transport layer; transport-layer segment: generated by the transport layer and encapsulates application-layer message with transport layer header; network-layer datagram: encapsulates transport-layer segment with a network-layer header; link-layer frame: encapsulates network-layer datagram with a link-layer header.25. Routers process network, link and physical layers (layers 1 through 3). (This is a littlebit of a white lie, as modern routers sometimes act as firewalls or caching components, and process Transport layer as well.) Link layer switches process link and physical layers (layers 1 through2). Hosts process all five layers.26. a) VirusRequires some form of human interaction to spread. Classic example: E-mail viruses.b) WormsNo user replication needed. Worm in infected host scans IP addresses and portnumbers, looking for vulnerable processes to infect.27. Creation of a botnet requires an attacker to find vulnerability in some application orsystem (e.g. exploiting the buffer overflow vulnerability that might exist in an application). After finding the vulnerability, the attacker needs to scan for hosts that are vulnerable. The target is basically to compromise a series of systems by exploiting that particular vulnerability. Any system that is part of the botnet can automatically scan its environment and propagate by exploiting the vulnerability. An important property of such botnets is that the originator of the botnet can remotely control and issue commands to all the nodes in the botnet. Hence, it becomes possible for the attacker to issue a command to all the nodes, that target a single node (for example, all nodes in the botnet might be commanded by the attacker to send a TCP SYN message to the target, which might result in a TCP SYN flood attack at the target).28. Trudy can pretend to be Bob to Alice (and vice-versa) and partially or completelymodify the message(s) being sent from Bob to Alice. For example, she can easily change the phrase “Alice, I owe you $1000” to “Alice, I owe you $10,000”.Furthermore, Trudy can even drop the packets that are being sent by Bob to Alice (and vise-versa), even if the packets from Bob to Alice are encrypted.Chapter 1 ProblemsProblem 1There is no single right answer to this question. Many protocols would do the trick. Here's a simple answer below:Messages from ATM machine to ServerMsg name purpose-------- -------HELO <userid> Let server know that there is a card in theATM machineATM card transmits user ID to ServerPASSWD <passwd> User enters PIN, which is sent to server BALANCE User requests balanceWITHDRAWL <amount> User asks to withdraw moneyBYE user all doneMessages from Server to ATM machine (display)Msg name purpose-------- -------PASSWD Ask user for PIN (password)OK last requested operation (PASSWD, WITHDRAWL)OKERR last requested operation (PASSWD, WITHDRAWL)in ERRORAMOUNT <amt> sent in response to BALANCE requestBYE user done, display welcome screen at ATM Correct operation:client serverHELO (userid) --------------> (check if valid userid)<------------- PASSWDPASSWD <passwd> --------------> (check password)<------------- OK (password is OK)BALANCE --------------><------------- AMOUNT <amt>WITHDRAWL <amt> --------------> check if enough $ to coverwithdrawl<------------- OKATM dispenses $BYE --------------><------------- BYEIn situation when there's not enough money:HELO (userid) --------------> (check if valid userid)<------------- PASSWDPASSWD <passwd> --------------> (check password)<------------- OK (password is OK)BALANCE --------------><------------- AMOUNT <amt>WITHDRAWL <amt> --------------> check if enough $ to cover withdrawl<------------- ERR (not enough funds)error msg displayedno $ given outBYE --------------><------------- BYEProblem 2At time N*(L/R) the first packet has reached the destination, the second packet is stored in the last router, the third packet is stored in the next-to-last router, etc. At time N*(L/R) + L/R, the second packet has reached the destination, the third packet is stored in the last router, etc. Continuing with this logic, we see that at time N*(L/R) + (P-1)*(L/R) = (N+P-1)*(L/R) all packets have reached the destination.Problem 3a) A circuit-switched network would be well suited to the application, because theapplication involves long sessions with predictable smooth bandwidth requirements.Since the transmission rate is known and not bursty, bandwidth can be reserved for each application session without significant waste. In addition, the overhead costs of setting up and tearing down connections are amortized over the lengthy duration of a typical application session.b) In the worst case, all the applications simultaneously transmit over one or morenetwork links. However, since each link has sufficient bandwidth to handle the sum of all of the applications' data rates, no congestion (very little queuing) will occur.Given such generous link capacities, the network does not need congestion control mechanisms.Problem 4a)Between the switch in the upper left and the switch in the upper right we can have 4connections. Similarly we can have four connections between each of the 3 other pairs of adjacent switches. Thus, this network can support up to 16 connections.b)We can 4 connections passing through the switch in the upper-right-hand corner andanother 4connections passing through the switch in the lower-left-hand corner, giving a total of 8 connections.c) Yes. For the connections between A and C, we route two connections through B and two connections through D. For the connections between B and D, we route two connections through A and two connections through C. In this manner, there are at most 4 connections passing through any link.Problem 5Tollbooths are 75 km apart, and the cars propagate at 100km/hr. A tollbooth services a car at a rate of one car every 12 seconds.a) There are ten cars. It takes 120 seconds, or 2 minutes, for the first tollbooth to service the 10 cars. Each of these cars has a propagation delay of 45 minutes (travel 75 km) before arriving at the second tollbooth. Thus, all the cars are lined up before the second tollbooth after 47 minutes. The whole process repeats itself for traveling between the second and third tollbooths. It also takes 2 minutes for the third tollbooth to service the 10 cars. Thus the total delay is 96 minutes.b) Delay between tollbooths is 8*12 seconds plus 45 minutes, i.e., 46 minutes and 36 seconds. The total delay is twice this amount plus 8*12 seconds, i.e., 94 minutes and 48 seconds.Problem 6a) s m d prop /= seconds.b) R L d trans /= seconds.c) )//(R L s m d end to end +=-- seconds.d) The bit is just leaving Host A.e) The first bit is in the link and has not reached Host B.f) The first bit has reached Host B. g) Want()536105.2105612083=⨯⨯==s R L m km.Problem 7Consider the first bit in a packet. Before this bit can be transmitted, all of the bits in the packet must be generated. This requires31064856⨯⋅sec=7msec.The time required to transmit the packet is6102856⨯⋅sec=μ224sec.Propagation delay = 10 msec.The delay until decoding is7msec +μ224sec + 10msec = 17.224msecA similar analysis shows that all bits experience a delay of 17.224 msec.Problem 8a) 20 users can be supported.b) 1.0=p .c) ()n n p p n --⎪⎪⎭⎫ ⎝⎛1201120. d) ()∑=--⎪⎪⎭⎫ ⎝⎛-20012011201n n n p p n . We use the central limit theorem to approximate this probability. Let j X be independentrandom variables such that ()p X P j ==1.(P “21 or more users”)⎪⎪⎭⎫ ⎝⎛≤-=∑=2111201j j X P⎪⎪⎪⎭⎫ ⎝⎛⋅⋅≤⋅⋅-=⎪⎪⎭⎫ ⎝⎛≤∑∑==9.01.012099.01.0120122112011201j j j j X P X P ()74.2286.39≤=⎪⎭⎫ ⎝⎛≤≈Z P Z P 997.0=when Z is a standard normal r.v. Thus (P “21 or more users”)003.0≈.Problem 9a) 10,000b) ()∑+=--⎪⎪⎭⎫ ⎝⎛M N n n M n p p n M 11Problem 10The first end system requires L/R1 to transmit the packet onto the first link; the packet propagates over the first link in d1/s1; the packet switch adds a processing delay of d proc; after receiving the entire packet, the packet switch connecting the first and the second link requires L/R2 to transmit the packet onto the second link; the packet propagates over the second link in d2/s2. Similarly, we can find the delay caused by the second switch and the third link: L/R3, d proc, and d3/s3.Adding these five delays givesd end-end = L/R1 + L/R2 + L/R3 + d1/s1 + d2/s2 + d3/s3+ d proc+ d procTo answer the second question, we simply plug the values into the equation to get 6 + 6 + 6 + 20+16 + 4 + 3 + 3 = 64 msec.Problem 11Because bits are immediately transmitted, the packet switch does not introduce any delay; in particular, it does not introduce a transmission delay. Thus,d end-end = L/R + d1/s1 + d2/s2+ d3/s3For the values in Problem 10, we get 6 + 20 + 16 + 4 = 46 msec.Problem 12The arriving packet must first wait for the link to transmit 4.5 *1,500 bytes = 6,750 bytes or 54,000 bits. Since these bits are transmitted at 2 Mbps, the queuing delay is 27 msec. Generally, the queuing delay is (nL + (L - x))/R.Problem 13a)The queuing delay is 0 for the first transmitted packet, L/R for the second transmittedpacket, and generally, (n-1)L/R for the n th transmitted packet. Thus, the average delay for the N packets is:(L/R + 2L/R + ....... + (N-1)L/R)/N= L/(RN) * (1 + 2 + ..... + (N-1))= L/(RN) * N(N-1)/2= LN(N-1)/(2RN)= (N-1)L/(2R)Note that here we used the well-known fact:1 +2 + ....... + N = N(N+1)/2b) It takes R LN / seconds to transmit the N packets. Thus, the buffer is empty when a each batch of N packets arrive. Thus, the average delay of a packet across all batches is the average delay within one batch, i.e., (N-1)L /2R .Problem 14a) The transmission delay is R L /. The total delay isI RL R L I R IL -=+-1/)1(b) Let R L x /=.Total delay = axx-1For x=0, the total delay =0; as we increase x, total delay increases, approaching infinity as x approaches 1/a.Problem 15Total delay aa R aL R L I R L -=-=-=-=μμμ1/1/1/1/1/.Problem 16The total number of packets in the system includes those in the buffer and the packet that is being transmitted. So, N=10+1.Because d a N ⋅=, so (10+1)=a*(queuing delay + transmission delay). That is, 11=a*(0.01+1/100)=a*(0.01+0.01). Thus, a=550 packets/sec.Problem 17a) There are Q nodes (the source host and the 1-Q routers). Let qproc d denote the processing delay at the q th node. Let q R be the transmission rate of the q th link and letq qtrans R L d /=. Let q prop d be the propagation delay across the q th link. Then[]∑=--++=Qq qprop q trans q proc end to end d d d d 1.b) Let qqueue d denote the average queuing delay at node q . Then[]∑=--+++=Qq qqueue q prop q trans q proc end to end d d d d d 1.Problem 18On linux you can use the commandtraceroute and in the Windows command prompt you can usetracert In either case, you will get three delay measurements. For those three measurements you can calculate the mean and standard deviation. Repeat the experiment at different times of the day and comment on any changes .Here is an example solution:Traceroutes between San Diego Super Computer Center and a)The average (mean) of the round-trip delays at each of the three hours is 71.18 ms,71.38 ms and 71.55 ms, respectively. The standard deviations are 0.075 ms, 0.21 ms,0.05 ms, respectively.b)In this example, the traceroutes have 12 routers in the path at each of the three hours.No, the paths didn’t change during any of the hours.c)Traceroute packets passed through four ISP networks from source to destination. Yes,in this experiment the largest delays occurred at peering interfaces between adjacent ISPs.Traceroutes from (France) to (USA).d)The average round-trip delays at each of the three hours are 87.09 ms, 86.35 ms and86.48 ms, respectively. The standard deviations are 0.53 ms, 0.18 ms, 0.23 ms,respectively. In this example, there are 11 routers in the path at each of the three hours. No, the paths didn’t change during any of the hours. Traceroute packets passed three ISP networks from source to destination. Yes, in this experiment the largest delays occurred at peering interfaces between adjacent ISPs.Problem 19An example solution:Traceroutes from two different cities in France to New York City in United States a)In these traceroutes from two different cities in France to the same destination host inUnited States, seven links are in common including the transatlantic link.b)In this example of traceroutes from one city in France and from another city inGermany to the same host in United States, three links are in common including the transatlantic link.Traceroutes to two different cities in China from same host in United Statesc) Five links are common in the two traceroutes. The two traceroutes diverge before reaching ChinaProblem 20Throughput = min{R s , R c , R/M}Problem 21If only use one path, the max throughput is given by:}},,,m in{,},,,,min{},,,,m ax {m in{212222111211MN M M N N R R R R R R R R R .If use all paths, the max throughput is given by ∑=Mk kN k k R R R 121},,,min{ .Problem 22Probability of successfully receiving a packet is: p s = (1-p)N .The number of transmissions needed to be performed until the packet is successfully received by the client is a geometric random variable with success probability p s . Thus, the average number of transmissions needed is given by: 1/p s . Then, the average number of re-transmissions needed is given by: 1/p s -1.Problem 23Let’s call the first packet A and call the second packet B.a) If the bottleneck link is the first link, then packet B is queued at the first link waiting for the transmission of packet A. So the packet inter-arrival time at the destination is simply L/R s .b) If the second link is the bottleneck link and both packets are sent back to back, it must be true that the second packet arrives at the input queue of the second link before the second link finishes the transmission of the first packet. That is,L/R s + L/R s + d prop < L/R s + d prop + L/R cThe left hand side of the above inequality represents the time needed by the second packet to arrive at the input queue of the second link (the second link has not startedtransmitting the second packet yet). The right hand side represents the time needed by the first packet to finish its transmission onto the second link.If we send the second packet T seconds later, we will ensure that there is no queuing delay for the second packet at the second link if we have:L/R s + L/R s + d prop + T >= L/R s + d prop + L/R cThus, the minimum value of T is L/R c L/R s .Problem 2440 terabytes = 40 * 1012 * 8 bits. So, if using the dedicated link, it will take 40 * 1012 * 8 / (100 *106 ) =3200000 seconds = 37 days. But with FedEx overnight delivery, you can guarantee the data arrives in one day, and it should cost less than $100.Problem 25a)160,000 bitsb)160,000 bitsc)The bandwidth-delay product of a link is the maximum number of bits that can be inthe link.d)the width of a bit = length of link / bandwidth-delay product, so 1 bit is 125 meterslong, which is longer than a football fielde) s/RProblem 26s/R=20000km, then R=s/20000km= 2.5*108/(2*107)= 12.5 bpsProblem 27a)80,000,000 bitsb)800,000 bits, this is because that the maximum number of bits that will be in the linkat any given time = min(bandwidth delay product, packet size) = 800,000 bits.c).25 metersProblem 28a)t trans + t prop = 400 msec + 80 msec = 480 msec.b)20 * (t trans + 2 t prop) = 20*(20 msec + 80 msec) = 2 sec.c) Breaking up a file takes longer to transmit because each data packet and its corresponding acknowledgement packet add their own propagation delays.Problem 29Recall geostationary satellite is 36,000 kilometers away from earth surface. a) 150 msec b) 1,500,000 bits c) 600,000,000 bitsProblem 30Let’s suppose the passenger and his/her bags correspond to the data unit arriving to the top of the protocol stack. When the passenger checks in, his/her bags are checked, and a tag is attached to the bags and ticket. This is additional information added in the Baggage layer if Figure 1.20 that allows the Baggage layer to implement the service or separating the passengers and baggage on the sending side, and then reuniting them (hopefully!) on the destination side. When a passenger then passes through security and additional stamp is often added to his/her ticket, indicating that the passenger has passed through a security check. This information is used to ensure (e.g., by later checks for the security information) secure transfer of people.Problem 31a)Time to send message from source host to first packet switch = sec 4sec 10210866=⨯⨯With store-and-forward switching, the total time to move message from source host to destination host = sec 123sec 4=⨯hopsb)Time to send 1st packet from source host to first packet switch = . sec 5sec 10210164m =⨯⨯. Time at which 2nd packet is received at the first switch = time at which 1st packet is received at the second switch = sec 10sec 52m m =⨯c)Time at which 1st packet is received at the destination host = sec 153sec 5m hops m =⨯. After this, every 5msec one packet will be received; thus time at which last (800th ) packet is received = sec 01.4sec 5*799sec 15=+m m . It can be seen that delay in using message segmentation is significantly less (almost 1/3rd ). d)i. Without message segmentation, if bit errors are not tolerated, if there is asingle bit error, the whole message has to be retransmitted (rather than a single packet).ii. Without message segmentation, huge packets (containing HD videos, forexample) are sent into the network. Routers have to accommodate these hugepackets. Smaller packets have to queue behind enormous packets and suffer unfair delays.e)i. Packets have to be put in sequence at the destination.ii. Message segmentation results in many smaller packets. Since header size is usually the same for all packets regardless of their size, with message segmentation the total amount of header bytes is more.Problem 32Yes, the delays in the applet correspond to the delays in the Problem 31.The propagation delays affect the overall end-to-end delays both for packet switching and message switching equally.Problem 33There are F /S packets. Each packet is S=80 bits. Time at which the last packet is receivedat the first router is SFR S ⨯+80sec. At this time, the first F/S-2 packets are at thedestination, and the F/S-1 packet is at the second router. The last packet must then be transmitted by the first router and the second router, with each transmission taking R S 80+sec. Thus delay in sending the whole file is )2(80+⨯+=S FR S delay To calculate the value of S which leads to the minimum delay, F S delay dS d400=⇒=Problem 34The circuit-switched telephone networks and the Internet are connected together at "gateways". When a Skype user (connected to the Internet) calls an ordinary telephone, a circuit is established between a gateway and the telephone user over the circuit switched network. The skype user's voice is sent in packets over the Internet to the gateway. At the gateway, the voice signal is reconstructed and then sent over the circuit. In the other direction, the voice signal is sent over the circuit switched network to the gateway. The gateway packetizes the voice signal and sends the voice packets to the Skype user.。

计算机网络自上向下第七版Chapter_6_V7.01

计算机网络自上向下第七版Chapter_6_V7.01
Down Approach If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this
sending host
frame
sending side: • encapsulates datagram in frame • adds error checking bits, rdt, flow control, etc.
datagram
ide • looks for errors, rdt, flow control, etc. • extracts datagram, passes to upper layer at receiving side
6.5 link virtualization: MPLS
6.6 data center networking
6.7 a day in the life of a web request
Link Layer and LANs 6-10
Error detection
EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields • Error detection not 100% reliable!
each link protocol provides different services
• e.g., may or may not provide rdt over link

计算机网络自顶向下课后习题答案答案

计算机网络自顶向下课后习题答案答案

1复习题1.没有不同。

主机和端系统可以互换。

端系统包括PC,工作站,WEB服务器,邮件服务器,网络连接的PDA,网络电视等等。

2.假设爱丽丝是国家A的大使,想邀请国家B的大使鲍勃吃晚餐。

爱丽丝没有简单的打个电话说“现在我没一起吃晚餐吧”。

而是她先打电话给鲍勃建议吃饭的日期与时间。

鲍勃可能会回复说那天不行,另外一天可以。

爱丽丝与鲍勃不停的互发讯息直到他们确定一致的日期与时间。

鲍勃会在约定时间(提前或迟到不超过15分钟)出现再大使馆。

外交协议也允许爱丽丝或者鲍勃以合理的理由礼貌的退出约会。

3.联网(通过网络互联)的程序通常包括2个,每一个运行在不同的主机上,互相通信。

发起通信的程序是客户机程序。

一般是客户机请求和接收来自服务器程序的服务。

4.互联网向其应用提供面向连接服务(TCP)和无连接服务(UDP)2种服务。

每一个互联网应用采取其中的一种。

面相连接服务的原理特征是:①在都没有发送应用数据之前2个端系统先进行“握手”。

②提供可靠的数据传送。

也就是说,连接的一方将所有应用数据有序且无差错的传送到连接的另一方。

③提供流控制。

也就是,确保连接的任何一方都不会过快的发送过量的分组而淹没另一方。

④提供拥塞控制。

即管理应用发送进网络的数据总量,帮助防止互联网进入迟滞状态。

无连接服务的原理特征:①没有握手②没有可靠数据传送的保证③没有流控制或者拥塞控制5.流控制和拥塞控制的两个面向不同的对象的不同的控制机理。

流控制保证连接的任何一方不会因为过快的发送过多分组而淹没另一方。

拥塞控制是管理应用发送进网络的数据总量,帮助防止互联网核心(即网络路由器的缓冲区里面)发生拥塞。

6.互联网面向连接服务通过使用确认,重传提供可靠的数据传送。

当连接的一方没有收到它发送的分组的确认(从连接的另一方)时,它会重发这个分组。

7.电路交换可以为呼叫的持续时间保证提供一定量的端到端的带宽。

今天的大多数分组交换网(包括互联网)不能保证任何端到端带宽。

计算机网络第七版课后答案完整版

计算机网络第七版课后答案完整版

计算机网络第七版课后答案完整版第一章:概述计算机网络是指将地理位置不同的多台计算机和计算机设备连接起来,通过通信线路实现数据传输和资源共享的系统。

本章将介绍计算机网络的基本概念和发展历程。

1.1 计算机网络的定义及分类计算机网络是指多台计算机和计算机设备通过通信线路连接起来,实现数据传输和资源共享。

根据网络规模的大小,可以将计算机网络分为局域网、城域网和广域网等不同类型。

1.2 计算机网络的发展历程计算机网络起源于上世纪60年代的ARPANET,随着互联网和移动互联网的普及,计算机网络得以迅速发展。

目前,计算机网络已经成为人们日常生活和工作中必不可少的一部分。

第二章:物理层物理层是计算机网络的基础层,主要负责传输实际的数据比特流。

本章将介绍物理层的基本概念和常见的传输介质。

2.1 物理层的功能和特点物理层主要负责传输比特流,其功能包括编码、调制、解调和传输介质的选择等。

物理层的特点包括传输速率、传输距离和传输方式等。

2.2 传输介质传输介质是物理层传输数据的媒介,常见的传输介质包括双绞线、同轴电缆和光纤等。

不同的传输介质有不同的特点和适用范围。

第三章:数据链路层数据链路层是计算机网络的第二层,主要负责将物理层的比特流转化为数据包,并控制数据的传输。

本章将介绍数据链路层的基本概念和常见的链路控制协议。

3.1 数据链路层的功能和特点数据链路层主要负责将物理层传输的比特流转化为数据包,并控制数据的传输。

数据链路层的特点包括可靠性、传输效率和流量控制等。

3.2 链路控制协议链路控制协议是数据链路层中常用的协议,常见的链路控制协议包括停止等待协议和滑动窗口协议等。

不同的链路控制协议有不同的传输方式和效果。

第四章:网络层网络层是计算机网络的第三层,主要负责实现不同网络之间的数据传输。

本章将介绍网络层的基本概念和常见的网络互联技术。

4.1 网络层的功能和特点网络层主要负责实现不同网络之间的数据传输,其功能包括寻址、路由选择和拥塞控制等。

计算机网络自顶向下答案第六章中文版

计算机网络自顶向下答案第六章中文版

6复习题1.APs周期性的发送信标帧,AP的一个信标帧通过11个信道中的一个发送。

信标帧允许附近的无线基站发现和识别AP。

2.1)基于无线主机的MAC地址;2)用户名和密码的结合。

在这2中情况中,AP把信息传送给认证服务器。

3.不对4.2个原因:1)无线信道中误码率比较高;2)在有线的以太网中,发送站点能够检测到是否有碰撞发生,然而在802.11中站点不能检测到碰撞。

5.不对6.每一个无线基站都可以设置一个RTS阈值,因此只有当将要传送的数据帧长度长于这个阈值时,RTS/CTS序列才会被用到。

7.没有好处。

假设有2个站点同时想发送数据,并且他们都使用RTS/CTS。

如果RTS/CTS的帧长和数据帧长一样时,信道就会被浪费,因为发送RTS/CTS的时间和发送数据的时间一样。

因此RTS/CTS交换只有当RTS/CTS 帧长远小于数据帧长时才有用。

8.开始时,交换机在其转发表中有一个表项标识了无线站点和前一个AP的联系。

当无线基站和新的AP联系时,新的AP将创建一个包括无线基站MAC地址以及以太网广播帧的帧。

当交换机收到该帧时,更新其转发表,使得无线站点可以通过新的AP到达。

9.UMTS源于GSM,CDMA200源于IS-95。

习题1.输出d1 = [-1,1,-1,1,-1,1,-1,1];d0 = [1,-1,1,-1,1,-1,1,-1]2.发送方2的输出= [1,-1,1,1,1,-1,1,1]; [ 1,-1,1,1,1,-1,1,1]3.4.a)两个AP有不同的SSID和MAC地址。

一个到达咖啡馆的无线站点将会和其中一个AP的联系。

发生联系后,在新的站点和AP之间会建立一条虚链路。

把两个ISP的AP标识为AP1和AP2。

假设新的站点和AP1相关联。

当它发送一个帧的时候,它将会到达AP1。

虽然AP2也会收到这个帧,但是它不会处理这个帧,因为这个帧发送给它的。

因此这两个ISP能在相同的信道上平行地工作。

计算机网络谢希仁第七版课后答案完整版

计算机网络谢希仁第七版课后答案完整版

计算机网络第七版答案第一章概述1-01 计算机网络向用户可以提供那些服务答:连通性和共享1-02 简述分组交换的要点。

答:(1)报文分组,加首部(2)经路由器储存转发(3)在目的地合并1-03 试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

答:(1)电路交换:端对端通信质量因约定了通信资源获得可靠保障,对连续传送大量数据效率高。

(2)报文交换:无须预约传输带宽,动态逐段利用传输带宽对突发式数据通信效率高,通信迅速。

(3)分组交换:具有报文交换之高效、迅速的要点,且各分组小,路由灵活,网络生存性能好。

1-04 为什么说因特网是自印刷术以来人类通信方面最大的变革答:融合其他通信网络,在信息化过程中起核心作用,提供最好的连通性和信息共享,第一次提供了各种媒体形式的实时交互能力。

1-05 因特网的发展大致分为哪几个阶段请指出这几个阶段的主要特点。

答:从单个网络APPANET向互联网发展;TCP/IP协议的初步成型建成三级结构的Internet;分为主干网、地区网和校园网;形成多层次ISP结构的Internet;ISP首次出现。

1-06 简述因特网标准制定的几个阶段答:(1)因特网草案(Internet Draft) ——在这个阶段还不是 RFC 文档。

(2)建议标准(Proposed Standard) ——从这个阶段开始就成为 RFC 文档。

(3)草案标准(Draft Standard)(4)因特网标准(Internet Standard) 1-07小写和大写开头的英文名internet 和Internet在意思上有何重要区别答:(1) internet(互联网或互连网):通用名词,它泛指由多个计算机网络互连而成的网络。

;协议无特指(2)Internet(因特网):专用名词,特指采用 TCP/IP 协议的互联网络。

区别:后者实际上是前者的双向应用1-08 计算机网络都有哪些类别各种类别的网络都有哪些特点答:按范围:(1)广域网WAN:远程、高速、是Internet的核心网。

计算机网络谢希仁第七版课后答案完整版之欧阳科创编

计算机网络谢希仁第七版课后答案完整版之欧阳科创编

计算机网络第七版谜底第一章概述101 计算机网络向用户可以提供那些办事?答:连通性和共享102 简述分组交换的要点。

答:(1)报文分组,加首部(2)经路由器贮存转发(3)在目的地合并103 试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

答:(1)电路交换:端对端通信质量因约定了通信资源获得可靠包管,对连续传送年夜量数据效率高。

(2)报文交换:无须预约传输带宽,静态逐段利用传输带宽对突发式数据通信效率高,通信迅速。

(3)分组交换:具有报文交换之高效、迅速的要点,且各分组小,路由灵活,网络生存性能好。

104 为什么说因特网是自印刷术以来人类通信方面最年夜的变动?答:融合其他通信网络,在信息化过程中起核心作用,提供最好的连通性和信息共享,第一次提供了各种媒体形式的实时交互能力。

105 因特网的成长年夜致分为哪几个阶段?请指出这几个阶段的主要特点。

答:从单个网络APPANET向互联网成长;TCP/IP协议的初步成型建成三级结构的Internet;分为主干网、地区网和校园网;形成多条理ISP结构的Internet;ISP首次呈现。

106 简述因特网标准制定的几个阶段?答:(1)因特网草案(Internet Draft) ——在这个阶段还不是RFC 文档。

(2)建议标准(Proposed Standard) ——从这个阶段开始就成为RFC 文档。

(3)草案标准(Draft Standard)(4)因特网标准(Internet Standard)107小写和年夜写开头的英文名internet 和Internet在意思上有何重要区别?答:(1)internet(互联网或互连网):通用名词,它泛指由多个计算机网络互连而成的网络。

;协议无特指(2)Internet(因特网):专用名词,特指采取TCP/IP 协议的互联网络。

区别:后者实际上是前者的双向应用108 计算机网络都有哪些类别?各种类另外网络都有哪些特点?答:按规模:(1)广域网WAN:远程、高速、是Internet 的核心网。

Test6计算机网络自顶向下方法...

Test6计算机网络自顶向下方法...

Test6计算机网络自顶向下方法...
1. 在下面的空格中填入“谁的什么密钥”:
(1)A向B发送一个一次性会话密钥,A用B的公钥加密该会话密钥。

(2) 用自己的私钥为签发公钥证书。

(3) A向B发送一个签名的报文,A用自己的私钥生成这个数字签名。

(4)A向B发送一个可供鉴别的报文,A用与B共享的密钥生成报文鉴别码(写出一种方法即可)。

2. 在下面的空格中填入可实现相应安全服务的安全机制:
机密性数据加密完整性报文鉴别
防抵赖数字签名防假冒端点鉴别
3. 在下面的空格中填入需要用到的算法或函数的序号:①对称密钥算法,②公开密钥算法,③散列函数,④密码散列函数。

(报文鉴别码写出一种方法即可)
生成数字签名③②数据加密①
生成报文鉴别码③①或④或③②加密会话密钥②
4. 是非判断题:
1)一对主机通过IPSec运行TCP,封装重发的TCP包时,ESP头中的序号不同。


2)一对主机通过IPSec传输分组流,对每个发送的分组都要创建一个新的SA。

错。

计算机网络自顶向下 第七版 第六章答案

计算机网络自顶向下 第七版 第六章答案

Computer Networking: A Top-Down Approach, 7th Edition计算机网络自顶向下第七版Solutions to Review Questions and ProblemsChapter 6 Review Questions1.The transportation mode, e.g., car, bus, train, car.2.Although each link guarantees that an IP datagram sent over the link will bereceived at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order. With IP,datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order. Also, IP can lose packets due to routing loops or equipment failures.3.Framing: there is also framing in IP and TCP; link access; reliable delivery: thereis also reliable delivery in TCP; flow control: there is also flow control in TCP;error detection: there is also error detection in IP and TCP; error correction; full duplex: TCP is also full duplex.4.There will be a collision in the sense that while a node is transmitting it will startto receive a packet from the other node.5.Slotted Aloha: 1, 2 and 4 (slotted ALOHA is only partially decentralized, since itrequires the clocks in all nodes to be synchronized). Token ring: 1, 2, 3, 4.6.After the 5th collision, the adapter chooses from {0, 1, 2,…, 31}. The probabilitythat it chooses 4 is 1/32. It waits 204.8 microseconds.7.In polling, a discussion leader allows only one participant to talk at a time, witheach participant getting a chance to talk in a round-robin fashion. For token ring, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.8.When a node transmits a frame, the node has to wait for the frame to propagatearound the entire ring before the node can release the token. Thus, if L/R is small as compared to t prop, then the protocol will be inefficient.9.248 MAC addresses; 232 IPv4 addresses; 2128 IPv6 addresses.10.C’s adapter will process the frames, but the adapter will not pass the datagrams upthe protocol stack. If the LAN broadcast address is used, then C’s adapter will both process the frames and pass the datagrams up the protocol stack.11.An ARP query is sent in a broadcast frame because the querying host does notwhich adapter address corresponds to the IP address in question. For the response, the sending node knows the adapter address to which the response should be sent, so there is no need to send a broadcast frame (which would have to be processed by all the other nodes on the LAN).12.No it is not possible. Each LAN has its own distinct set of adapters attached to it,with each adapter having a unique LAN address.13.The three Ethernet technologies have identical frame structures.14.2 (the internal subnet and the external internet)15.In 802.1Q there is a 12- bit VLAN identifier. Thus 212 = 4,096 VLANs can besupported.16.We can string the N switches together. The first and last switch would use oneport for trunking; the middle N-2 switches would use two ports. So the totalnumber of ports is 2+ 2(N-2) = 2N-2 ports.Chapter 6 ProblemsProblem 11 1 1 0 10 1 1 0 01 0 0 1 01 1 0 1 11 1 0 0 0Problem 2Suppose we begin with the initial two-dimensional parity matrix:0 0 0 01 1 1 10 1 0 11 0 1 0With a bit error in row 2, column 3, the parity of row 2 and column 3 is now wrong in the matrix below:0 0 0 01 1 0 10 1 0 11 0 1 0Now suppose there is a bit error in row 2, column 2 and column 3. The parity of row 2 is now correct! The parity of columns 2 and 3 is wrong, but we can't detect in which rows the error occurred!0 0 0 01 0 0 10 1 0 11 0 1 0The above example shows that a double bit error can be detected (if not corrected).Problem 301001100 01101001+ 01101110 01101011------------------------------10111010 11010100+ 00100000 01001100------------------------------11011011 00100000+ 01100001 01111001-----------------------------00111100 10011010 (overflow, then wrap around)+ 01100101 01110010------------------------------10100010 00001100The one's complement of the sum is 01011101 11110011Problem 4a)To compute the Internet checksum, we add up the values at 16-bit quantities:00000001 0000001000000011 0000010000000101 0000011000000111 0000100000001001 00001010-------------------------00011001 00011110The one's complement of the sum is 11100110 11100001.b)To compute the Internet checksum, we add up the values at 16-bit quantities: 01000010 0100001101000100 0100010101000110 0100011101001000 0100100101001010 01001011-------------------------10011111 10100100The one's complement of the sum is 01100000 01011011c)To compute the Internet checksum, we add up the values at 16-bit quantities: 01100010 0110001101100100 0110010101100110 0110011101101000 0110100101101010 01101011-------------------------00000000 00000101The one's complement of the sum is 11111111 11111010.Problem 5If we divide 10011 into 1010101010 0000, we get 1011011100, with a remainder of R=0100. Note that, G=10011 is CRC-4-ITU standard.Problem 6a) we get 1000110000, with a remainder of R=0000.b) we get 010*******, with a remainder of R=1111.c) we get 1011010111, with a remainder of R=1001.Problem 7a) Without loss of generality, suppose ith bit is flipped, where 0<= i <= d+r-1 and assume that the least significant bit is 0th bit.A single bit error means that the received data is K=D*2r XOR R + 2i. It is clear that if we divide K by G, then the reminder is not zero. In general, if G contains at least two 1’s, then a single bit error can always be detected.b) The key insight here is that G can be divided by 11 (binary number), but any number of odd-number of 1’s cannot be divided by 11. Thus, a sequence (not necessarily contiguous) of odd-number bit errors cannot be divided by 11, thus it cannot be divided by G.Problem 8a)1)1()(--=N p Np p E21)1)(1()1()('------=N N p N Np p N p E))1()1(()1(2----=-N p p p N NN p p E 1*0)('=⇒=b)N N N N N N p E N N N 11)11()11()11(1*)(11--=-=-=-- 1)11(lim =-∞→N N e N N N 1)11(lim =-∞→ Thuse p E N 1*)(lim =∞→Problem 9)1(2)1()(--=N p Np p E)3(2)2(2)1)(1(2)1()('------=N N p N Np p N p E))1(2)1(()1()3(2----=-N p p p N N121*0)('-=⇒=N p p E)1(2)1211(12*)(----=N N N N p E e e p E N 21121*)(lim =⋅=∞→Problem 10a) A’s average throughput is given by pA(1-pB).Total efficiency is pA(1-pB) + pB(1-pA).b) A’s throughput is pA(1-pB)=2pB(1-pB)= 2pB- 2(pB)2.B’s throughput is pB(1-pA)=pB(1-2pB)= pB- 2(pB)2.Clearly, A’s throughput is not twice as large as B’s.In order to make pA(1-pB)= 2 pB(1-pA), we need that pA= 2 – (pA / pB).c)A’s throughput is 2p(1-p)N-1, and any other node has throughput p(1-p)N-2(1-2p).Problem 11a)(1 – p(A))4 p(A)where, p(A) = probability that A succeeds in a slotp(A) = p(A transmits and B does not and C does not and D does not)= p(A transmits) p(B does not transmit) p(C does not transmit) p(D does not transmit)= p(1 – p) (1 – p)(1-p) = p(1 – p)3Hence, p(A succeeds for first time in slot 5)= (1 – p(A))4 p(A) = (1 – p(1 – p)3)4 p(1 – p)3b)p(A succeeds in slot 4) = p(1-p)3p(B succeeds in slot 4) = p(1-p)3p(C succeeds in slot 4) = p(1-p)3p(D succeeds in slot 4) = p(1-p)3p(either A or B or C or D succeeds in slot 4) = 4 p(1-p)3(because these events are mutually exclusive)c)p(some node succeeds in a slot) = 4 p(1-p)3p(no node succeeds in a slot) = 1 - 4 p(1-p)3Hence, p(first success occurs in slot 3) = p(no node succeeds in first 2 slots) p(some node succeeds in 3rd slot) = (1 - 4 p(1-p)3)2 4 p(1-p)3d)efficiency = p(success in a slot) =4 p(1-p)3Problem 12Problem 13The length of a polling round is)/(poll d R Q N +.The number of bits transmitted in a polling round is NQ . The maximum throughput therefore isQR d R d R Q N NQ poll poll +=+1)/( Problem 14a), b) See figure below.c)1. Forwarding table in E determines that the datagram should be routed to interface 192.168.3.002.2. The adapter in E creates and Ethernet packet with Ethernet destination address 88-88-88-88-88-88.3. Router 2 receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to 198.162.2.002.4.Router 2 then sends the Ethernet packet with the destination address of 33-33-33-33-33-33 and source address of 55-55-55-55-55-55 via its interface with IP address of 198.162.2.003.5.The process continues until the packet has reached Host B.a)ARP in E must now determine the MAC address of 198.162.3.002. Host E sendsout an ARP query packet within a broadcast Ethernet frame. Router 2 receives the query packet and sends to Host E an ARP response packet. This ARP response packet is carried by an Ethernet frame with Ethernet destination address 77-77-77-77-77-77.Problem 15a)No. E can check the subnet prefix of Host F’s IP address, and then learn that F ison the same LAN. Thus, E will not send the packet to the default router R1. Ethernet frame from E to F:Source IP = E’s IP addressDestination IP = F’s IP addressSource MAC = E’s MAC addressDestination MAC = F’s MAC addressb)No, because they are not on the same LAN. E can find this out by checking B’s IPaddress.Ethernet frame from E to R1:Source IP = E’s IP addressDestination IP = B’s IP addressSource MAC = E’s MAC addressDestination MAC = The MAC address of R1’s interface connecting to Subnet 3.c)Switch S1 will broadcast the Ethernet frame via both its interfaces as the receivedARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router R1 also receives this ARP request message, but R1 won’t forward the message to Subnet 3.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switch S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Lets call the switch between subnets 2 and 3 S2. That is, router R1 between subnets 2 and 3 is now replaced with switch S2.a) No. E can check the subnet prefix of Host F’s IP address, and then learn that F is on the same LAN segment. Thus, E will not send the packet to S2. Ethernet frame from E to F: Source IP = E’s IP address Destination IP = F’s IP address Source MAC = E’s MAC addressDestination MAC = F’s MAC addressb) Yes, because E would like to find B’s MAC address. In this case, E will send an ARP query packet with destination MAC address being the broadcast address. This query packet will be re-broadcast by switch 1, and eventually received by Host B. Ethernet frame from E to S2: Source IP = E’s IP address Destination IP = B’s IP address Source MAC = E’s MAC addressDestination MAC = broadcast MAC address: FF-FF-FF-FF-FF-FF.c) Switch S1 will broadcast the Ethernet frame via both its interfaces as the received ARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet 1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router S2 also receives this ARP request message, and S2 will broadcast this query packet to all its interfaces.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switc h S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Problem 17Wait for 51,200 bit times. For 10 Mbps, this wait is12.51010102.5163=⨯⨯bps bitsmsecFor 100 Mbps, the wait is 512 μsec.At 0=t A transmits. At 576=t , A would finish transmitting. In the worst case, B begins transmitting at time t=324, which is the time right before the first bit of A’s frame arrives at B. At time t=324+325=649 B 's first bit arrives at A . Because 649> 576, A finishes transmitting before it detects that B has transmitted. So A incorrectly thinks that its frame was successfully transmitted without a collision.Problem 19Because A 's retransmission reaches B before B 's scheduled retransmission time (805+96), B refrains from transmitting while A retransmits. Thus A and B do not collide. Thus the factor 512 appearing in the exponential backoff algorithm is sufficiently large.Problem 20a) Let Y be a random variable denoting the number of slots until a success:1)1()(--==m m Y P ββ,where β is the probability of a success.This is a geometric distribution, which has mean β/1. The number of consecutive wasted slots is 1-=Y X thatββ-=-==11][][Y E X E x1)1(--=N p Np β11)1()1(1-----=N N p Np p Np xefficiency11)1()1(1-----+=+=N N p Np p Np k kxk kb)Maximizing efficiency is equivalent to minimizing x , which is equivalent tomaximizing β. We know from the text that β is maximized at Np 1=.c)efficiency 11)11()11(1-----+=N N NN k k∞→N lim efficiency 1/1/11-+=-+=e k kee k kd) Clearly, 1-+e k kapproaches 1 as ∞→k .Problem 21i) from A to left router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 22-22-22-22-22-22Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from the left router to the right router: Source MAC address: 33-33-33-33-33-33Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from the right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003Problem 22i) from A to switch: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from switch to right router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003111.111.111.00311-11-11-11-11-11122.222.222.00466-66-66-66-66Problem 23If all the 11=9+2 nodes send out data at the maximum possible rate of 100 Mbps, a total aggregate throughput of 11*100 = 1100 Mbps is possible.Problem 24Each departmental hub is a single collision domain that can have a maximum throughput of 100 Mbps. The links connecting the web server and the mail server has a maximum throughput of 100 Mbps. Hence, if the three collision domains and the web server and mail server send out data at their maximum possible rates of 100 Mbps each, a maximum total aggregate throughput of 500 Mbps can be achieved among the 11 end systems.Problem 25All of the 11 end systems will lie in the same collision domain. In this case, the maximum total aggregate throughput of 100 Mbps is possible among the 11 end sytems. Problem 26Problem 27a) The time required to fill 8⋅L bits is.sec 16sec 1012883m LL =⨯⋅b) For ,500,1=L the packetization delay is.sec 75.93sec 161500m m =For ,50=L the packetization delay is.sec 125.3sec 1650m m =c) Store-and-forward delay RL 408+⋅=For 500,1=L , the delay issec 4.19sec 1062240815006μ≈⨯+⋅For ,50=L store-and-forward delay sec 1μ<.d) Store-and-forward delay is small for both cases for typical link speeds. However, packetization delay for 1500=L is too large for real-time voice applications.Problem 28The IP addresses for those three computers (from left to right) in EE department are: 111.111.1.1, 111.111.1.2, 111.111.1.3. The subnet mask is 111.111.1/24.The IP addresses for those three computers (from left to right) in CS department are: 111.111.2.1, 111.111.2.2, 111.111.2.3. The subnet mask is 111.111.2/24.The router’s interface card that connects to port 1 can be configured to contain two sub-interface IP addresses: 111.111.1.0 and 111.111.2.0. The first one is for the subnet of EE department, and the second one is for the subnet of CS department. Each IP address is associated with a VLAN ID. Suppose 111.111.1.0 is associated with VLAN 11, and 111.111.2.0 is associated with VLAN 12. This means that each frame that comes from subnet 111.111.1/24 will be added an 802.1q tag with VLAN ID 11, and each frame that comes from 111.111.2/24 will be added an 802.1q tag with VLAN ID 12. Suppose that host A in EE department with IP address 111.111.1.1 would like to send an IP datagram to host B (111.111.2.1) in CS department. Host A first encapsulates the IP datagram (destined to 111.111.2.1) into a frame with a destination MAC address equal to the MAC address of the router’s interface card that connects to port 1 of the switch. Once the router receives the frame, then it passes it up to IP layer, which decides that the IP datagram should be forwarded to subnet 111.111.2/24 via sub-interface 111.111.2.0. Then the router encapsulates the IP datagram into a frame and sends it to port 1. Note that this frame has an 802.1q tag VLAN ID 12. Once the switch receives the frame port 1, it knows that this frame is destined to VLAN with ID 12, so the switch will send the frame to Host B which is in CS department. Once Host B receives this frame, it will remove the 802.1q tag.Problem 30(The following description is short, but contains all major key steps and key protocols involved.)Your computer first uses DHCP to obtain an IP address. You computer first creates a special IP datagram destined to 255.255.255.255 in the DHCP server discovery step, and puts it in a Ethernet frame and broadcast it in the Ethernet. Then following the steps in the DHCP protocol, you computer is able to get an IP address with a given lease time.A DHCP server on the Ethernet also gives your computer a list of IP addresses of first-hop routers, the subnet mask of the subnet where your computer resides, and the addresses of local DNS servers (if they exist).Since your computer’s ARP cache is initially empty, your computer will use ARP protocol to get the MAC addresses of the first-hop router and the local DNS server.Your computer first will get the IP address of the Web page you would like to download. If the local DNS server does not have the IP address, then your computer will use DNS protocol to find the IP address of the Web page.Once your computer has the IP address of the Web page, then it will send out the HTTP request via the first-hop router if the Web page does not reside in a local Web server. The HTTP request message will be segmented and encapsulated into TCP packets, and then further encapsulated into IP packets, and finally encapsulated into Ethernet frames. Your computer sends the Ethernet frames destined to the first-hop router. Once the router receives the frames, it passes them up into IP layer, checks its routing table, and then sends the packets to the right interface out of all of its interfaces.Then your IP packets will be routed through the Internet until they reach the Web server. The server hosting the Web page will send back the Web page to your computer via HTTP response messages. Those messages will be encapsulated into TCP packets and then further into IP packets. Those IP packets follow IP routes and finally reach yourfirst-hop router, and then the router will forward those IP packets to your computer by encapsulating them into Ethernet frames.Problem 32a) Each flow evenly shares a link’s capacity with other flows traversing that link, then the 80 flows crossing the B to access-router 10 Gbps links (as well as the access router to border router links) will each only receive 10 Gbps / 80 = 125 Mbpsb) In Topology of Figure 5.31, there are four distinct paths between the first and third tier-2 switches, together providing 40 Gbps for the traffic from racks 1-4 to racks 9-12. Similarly, there are four links between second and fourth tier-2 switches, together providing 40 Gbps for the traffic from racks 5-8 to 13-16. Thus the total aggregate bandwidth is 80 Gbps, and the value per flow rate is 1 Gbps.c) Now 20 flows will need to share each 1 Gbps bandwidth between pairs of TOR switches. So the host-to-host bit rate will be 0.5 Gbps.Problem 33a)Both email and video application uses the fourth rack for 0.1 percent of the time.b)Probability that both applications need fourth rack is 0.001*0.001 = 10-6.c)Suppose the first three racks are for video, the next rack is a shared rack for bothvideo and email, and the next three racks are for email. Let's assume that thefourth rack has all the data and software needed for both the email and video applications. With the topology of Figure 5.31, both applications will have enough intra-bandwidth as long as both are not simultaneously using the fourth rack.From part b, both are using the fourth rack for no more than .00001 % of time, which is within the .0001% requirement.。

计算机网络第七版答案

计算机网络第七版答案

计算机网络第七版答案第一章概述1-02 简述分组交换的要点。

答:(1)报文分组,加首部(2)经路由器储存转发(3)在目的地合并1-03 试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

答:(1)电路交换:端对端通信质量因约定了通信资源获得可靠保障,对连续传送大量数据效率高。

(2)报文交换:无须预约传输带宽,动态逐段利用传输带宽对突发式数据通信效率高,通信迅速。

(3)分组交换:具有报文交换之高效、迅速的要点,且各分组小,路由灵活,网络生存性能好。

1-08 计算机网络都有哪些类别?各种类别的网络都有哪些特点?答:按范围:(1)广域网WAN:远程、高速、是Internet的核心网。

(2)城域网:城市范围,链接多个局域网。

(3)局域网:校园、企业、机关、社区。

(4)个域网PAN:个人电子设备按用户:公用网:面向公共营运。

专用网:面向特定机构。

1-10 试在下列条件下比较电路交换和分组交换。

要传送的报文共x(bit)。

从源点到终点共经过k段链路,每段链路的传播时延为d(s),数据率为b(b/s)。

在电路交换时电路的建立时间为s(s)。

在分组交换时分组长度为p(bit),且各结点的排队等待时间可忽略不计。

问在怎样的条件下,分组交换的时延比电路交换的要小?(提示:画一下草图观察k段链路共有几个结点。

)答:线路交换时延:kd+x/b+s, 分组交换时延:kd+(x/p)*(p/b)+ (k-1)*(p/b),其中(k-1)*(p/b)表示K段传输中,有(k-1)次的储存转发延迟,当s>(k-1)*(p/b)时,电路交换的时延比分组交换的时延大,当x>>p,相反。

1-14 计算机网络有哪些常用的性能指标?答:速率,带宽,吞吐量,时延,时延带宽积,往返时间RTT,利用率1-15 假定网络利用率达到了90%。

试估计一下现在的网络时延是它的最小值的多少倍?解:设网络利用率为U。

,网络时延为D,网络时延最小值为D0U=90%;D=D0/(1-U)---->D/ D0=10 现在的网络时延是最小值的10倍1-17 收发两端之间的传输距离为1000km,信号在媒体上的传播速率为2×108m/s。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Computer Networking: A Top-Down Approach, 7th Edition计算机网络自顶向下第七版Solutions to Review Questions and ProblemsChapter 6 Review Questions1.The transportation mode, e.g., car, bus, train, car.2.Although each link guarantees that an IP datagram sent over the link will bereceived at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order. With IP,datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order. Also, IP can lose packets due to routing loops or equipment failures.3.Framing: there is also framing in IP and TCP; link access; reliable delivery: thereis also reliable delivery in TCP; flow control: there is also flow control in TCP;error detection: there is also error detection in IP and TCP; error correction; full duplex: TCP is also full duplex.4.There will be a collision in the sense that while a node is transmitting it will startto receive a packet from the other node.5.Slotted Aloha: 1, 2 and 4 (slotted ALOHA is only partially decentralized, since itrequires the clocks in all nodes to be synchronized). Token ring: 1, 2, 3, 4.6.After the 5th collision, the adapter chooses from {0, 1, 2,…, 31}. The probabilitythat it chooses 4 is 1/32. It waits 204.8 microseconds.7.In polling, a discussion leader allows only one participant to talk at a time, witheach participant getting a chance to talk in a round-robin fashion. For token ring, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.8.When a node transmits a frame, the node has to wait for the frame to propagatearound the entire ring before the node can release the token. Thus, if L/R is small as compared to t prop, then the protocol will be inefficient.9.248 MAC addresses; 232 IPv4 addresses; 2128 IPv6 addresses.10.C’s adapter will process the frames, but the adapter will not pass the datagrams upthe protocol stack. If the LAN broadcast address is used, then C’s adapter will both process the frames and pass the datagrams up the protocol stack.11.An ARP query is sent in a broadcast frame because the querying host does notwhich adapter address corresponds to the IP address in question. For the response, the sending node knows the adapter address to which the response should be sent, so there is no need to send a broadcast frame (which would have to be processed by all the other nodes on the LAN).12.No it is not possible. Each LAN has its own distinct set of adapters attached to it,with each adapter having a unique LAN address.13.The three Ethernet technologies have identical frame structures.14.2 (the internal subnet and the external internet)15.In 802.1Q there is a 12- bit VLAN identifier. Thus 212 = 4,096 VLANs can besupported.16.We can string the N switches together. The first and last switch would use oneport for trunking; the middle N-2 switches would use two ports. So the totalnumber of ports is 2+ 2(N-2) = 2N-2 ports.Chapter 6 ProblemsProblem 11 1 1 0 10 1 1 0 01 0 0 1 01 1 0 1 11 1 0 0 0Problem 2Suppose we begin with the initial two-dimensional parity matrix:0 0 0 01 1 1 10 1 0 11 0 1 0With a bit error in row 2, column 3, the parity of row 2 and column 3 is now wrong in the matrix below:0 0 0 01 1 0 10 1 0 11 0 1 0Now suppose there is a bit error in row 2, column 2 and column 3. The parity of row 2 is now correct! The parity of columns 2 and 3 is wrong, but we can't detect in which rows the error occurred!0 0 0 01 0 0 10 1 0 11 0 1 0The above example shows that a double bit error can be detected (if not corrected).Problem 301001100 01101001+ 01101110 01101011------------------------------10111010 11010100+ 00100000 01001100------------------------------11011011 00100000+ 01100001 01111001-----------------------------00111100 10011010 (overflow, then wrap around)+ 01100101 01110010------------------------------10100010 00001100The one's complement of the sum is 01011101 11110011Problem 4a)To compute the Internet checksum, we add up the values at 16-bit quantities:00000001 0000001000000011 0000010000000101 0000011000000111 0000100000001001 00001010-------------------------00011001 00011110The one's complement of the sum is 11100110 11100001.b)To compute the Internet checksum, we add up the values at 16-bit quantities: 01000010 0100001101000100 0100010101000110 0100011101001000 0100100101001010 01001011-------------------------10011111 10100100The one's complement of the sum is 01100000 01011011c)To compute the Internet checksum, we add up the values at 16-bit quantities: 01100010 0110001101100100 0110010101100110 0110011101101000 0110100101101010 01101011-------------------------00000000 00000101The one's complement of the sum is 11111111 11111010.Problem 5If we divide 10011 into 1010101010 0000, we get 1011011100, with a remainder of R=0100. Note that, G=10011 is CRC-4-ITU standard.Problem 6a) we get 1000110000, with a remainder of R=0000.b) we get 010*******, with a remainder of R=1111.c) we get 1011010111, with a remainder of R=1001.Problem 7a) Without loss of generality, suppose ith bit is flipped, where 0<= i <= d+r-1 and assume that the least significant bit is 0th bit.A single bit error means that the received data is K=D*2r XOR R + 2i. It is clear that if we divide K by G, then the reminder is not zero. In general, if G contains at least two 1’s, then a single bit error can always be detected.b) The key insight here is that G can be divided by 11 (binary number), but any number of odd-number of 1’s cannot be divided by 11. Thus, a sequence (not necessarily contiguous) of odd-number bit errors cannot be divided by 11, thus it cannot be divided by G.Problem 8a)1)1()(--=N p Np p E21)1)(1()1()('------=N N p N Np p N p E))1()1(()1(2----=-N p p p N NN p p E 1*0)('=⇒=b)N N N N N N p E N N N 11)11()11()11(1*)(11--=-=-=-- 1)11(lim =-∞→N N e N N N 1)11(lim =-∞→ Thuse p E N 1*)(lim =∞→Problem 9)1(2)1()(--=N p Np p E)3(2)2(2)1)(1(2)1()('------=N N p N Np p N p E))1(2)1(()1()3(2----=-N p p p N N121*0)('-=⇒=N p p E)1(2)1211(12*)(----=N N N N p E e e p E N 21121*)(lim =⋅=∞→Problem 10a) A’s average throughput is given by pA(1-pB).Total efficiency is pA(1-pB) + pB(1-pA).b) A’s throughput is pA(1-pB)=2pB(1-pB)= 2pB- 2(pB)2.B’s throughput is pB(1-pA)=pB(1-2pB)= pB- 2(pB)2.Clearly, A’s throughput is not twice as large as B’s.In order to make pA(1-pB)= 2 pB(1-pA), we need that pA= 2 – (pA / pB).c)A’s throughput is 2p(1-p)N-1, and any other node has throughput p(1-p)N-2(1-2p).Problem 11a)(1 – p(A))4 p(A)where, p(A) = probability that A succeeds in a slotp(A) = p(A transmits and B does not and C does not and D does not)= p(A transmits) p(B does not transmit) p(C does not transmit) p(D does not transmit)= p(1 – p) (1 – p)(1-p) = p(1 – p)3Hence, p(A succeeds for first time in slot 5)= (1 – p(A))4 p(A) = (1 – p(1 – p)3)4 p(1 – p)3b)p(A succeeds in slot 4) = p(1-p)3p(B succeeds in slot 4) = p(1-p)3p(C succeeds in slot 4) = p(1-p)3p(D succeeds in slot 4) = p(1-p)3p(either A or B or C or D succeeds in slot 4) = 4 p(1-p)3(because these events are mutually exclusive)c)p(some node succeeds in a slot) = 4 p(1-p)3p(no node succeeds in a slot) = 1 - 4 p(1-p)3Hence, p(first success occurs in slot 3) = p(no node succeeds in first 2 slots) p(some node succeeds in 3rd slot) = (1 - 4 p(1-p)3)2 4 p(1-p)3d)efficiency = p(success in a slot) =4 p(1-p)3Problem 12Problem 13The length of a polling round is)/(poll d R Q N +.The number of bits transmitted in a polling round is NQ . The maximum throughput therefore isQR d R d R Q N NQ poll poll +=+1)/( Problem 14a), b) See figure below.c)1. Forwarding table in E determines that the datagram should be routed to interface 192.168.3.002.2. The adapter in E creates and Ethernet packet with Ethernet destination address 88-88-88-88-88-88.3. Router 2 receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to 198.162.2.002.4.Router 2 then sends the Ethernet packet with the destination address of 33-33-33-33-33-33 and source address of 55-55-55-55-55-55 via its interface with IP address of 198.162.2.003.5.The process continues until the packet has reached Host B.a)ARP in E must now determine the MAC address of 198.162.3.002. Host E sendsout an ARP query packet within a broadcast Ethernet frame. Router 2 receives the query packet and sends to Host E an ARP response packet. This ARP response packet is carried by an Ethernet frame with Ethernet destination address 77-77-77-77-77-77.Problem 15a)No. E can check the subnet prefix of Host F’s IP address, and then learn that F ison the same LAN. Thus, E will not send the packet to the default router R1. Ethernet frame from E to F:Source IP = E’s IP addressDestination IP = F’s IP addressSource MAC = E’s MAC addressDestination MAC = F’s MAC addressb)No, because they are not on the same LAN. E can find this out by checking B’s IPaddress.Ethernet frame from E to R1:Source IP = E’s IP addressDestination IP = B’s IP addressSource MAC = E’s MAC addressDestination MAC = The MAC address of R1’s interface connecting to Subnet 3.c)Switch S1 will broadcast the Ethernet frame via both its interfaces as the receivedARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router R1 also receives this ARP request message, but R1 won’t forward the message to Subnet 3.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switch S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Lets call the switch between subnets 2 and 3 S2. That is, router R1 between subnets 2 and 3 is now replaced with switch S2.a) No. E can check the subnet prefix of Host F’s IP address, and then learn that F is on the same LAN segment. Thus, E will not send the packet to S2. Ethernet frame from E to F: Source IP = E’s IP address Destination IP = F’s IP address Source MAC = E’s MAC addressDestination MAC = F’s MAC addressb) Yes, because E would like to find B’s MAC address. In this case, E will send an ARP query packet with destination MAC address being the broadcast address. This query packet will be re-broadcast by switch 1, and eventually received by Host B. Ethernet frame from E to S2: Source IP = E’s IP address Destination IP = B’s IP address Source MAC = E’s MAC addressDestination MAC = broadcast MAC address: FF-FF-FF-FF-FF-FF.c) Switch S1 will broadcast the Ethernet frame via both its interfaces as the received ARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet 1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router S2 also receives this ARP request message, and S2 will broadcast this query packet to all its interfaces.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switc h S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Problem 17Wait for 51,200 bit times. For 10 Mbps, this wait is12.51010102.5163=⨯⨯bps bitsmsecFor 100 Mbps, the wait is 512 μsec.At 0=t A transmits. At 576=t , A would finish transmitting. In the worst case, B begins transmitting at time t=324, which is the time right before the first bit of A’s frame arrives at B. At time t=324+325=649 B 's first bit arrives at A . Because 649> 576, A finishes transmitting before it detects that B has transmitted. So A incorrectly thinks that its frame was successfully transmitted without a collision.Problem 19Because A 's retransmission reaches B before B 's scheduled retransmission time (805+96), B refrains from transmitting while A retransmits. Thus A and B do not collide. Thus the factor 512 appearing in the exponential backoff algorithm is sufficiently large.Problem 20a) Let Y be a random variable denoting the number of slots until a success:1)1()(--==m m Y P ββ,where β is the probability of a success.This is a geometric distribution, which has mean β/1. The number of consecutive wasted slots is 1-=Y X thatββ-=-==11][][Y E X E x1)1(--=N p Np β11)1()1(1-----=N N p Np p Np xefficiency11)1()1(1-----+=+=N N p Np p Np k kxk kb)Maximizing efficiency is equivalent to minimizing x , which is equivalent tomaximizing β. We know from the text that β is maximized at Np 1=.c)efficiency 11)11()11(1-----+=N N NN k k∞→N lim efficiency 1/1/11-+=-+=e k kee k kd) Clearly, 1-+e k kapproaches 1 as ∞→k .Problem 21i) from A to left router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 22-22-22-22-22-22Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from the left router to the right router: Source MAC address: 33-33-33-33-33-33Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from the right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003Problem 22i) from A to switch: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from switch to right router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003111.111.111.00311-11-11-11-11-11122.222.222.00466-66-66-66-66Problem 23If all the 11=9+2 nodes send out data at the maximum possible rate of 100 Mbps, a total aggregate throughput of 11*100 = 1100 Mbps is possible.Problem 24Each departmental hub is a single collision domain that can have a maximum throughput of 100 Mbps. The links connecting the web server and the mail server has a maximum throughput of 100 Mbps. Hence, if the three collision domains and the web server and mail server send out data at their maximum possible rates of 100 Mbps each, a maximum total aggregate throughput of 500 Mbps can be achieved among the 11 end systems.Problem 25All of the 11 end systems will lie in the same collision domain. In this case, the maximum total aggregate throughput of 100 Mbps is possible among the 11 end sytems. Problem 26Problem 27a) The time required to fill 8⋅L bits is.sec 16sec 1012883m LL =⨯⋅b) For ,500,1=L the packetization delay is.sec 75.93sec 161500m m =For ,50=L the packetization delay is.sec 125.3sec 1650m m =c) Store-and-forward delay RL 408+⋅=For 500,1=L , the delay issec 4.19sec 1062240815006μ≈⨯+⋅For ,50=L store-and-forward delay sec 1μ<.d) Store-and-forward delay is small for both cases for typical link speeds. However, packetization delay for 1500=L is too large for real-time voice applications.Problem 28The IP addresses for those three computers (from left to right) in EE department are: 111.111.1.1, 111.111.1.2, 111.111.1.3. The subnet mask is 111.111.1/24.The IP addresses for those three computers (from left to right) in CS department are: 111.111.2.1, 111.111.2.2, 111.111.2.3. The subnet mask is 111.111.2/24.The router’s interface card that connects to port 1 can be configured to contain two sub-interface IP addresses: 111.111.1.0 and 111.111.2.0. The first one is for the subnet of EE department, and the second one is for the subnet of CS department. Each IP address is associated with a VLAN ID. Suppose 111.111.1.0 is associated with VLAN 11, and 111.111.2.0 is associated with VLAN 12. This means that each frame that comes from subnet 111.111.1/24 will be added an 802.1q tag with VLAN ID 11, and each frame that comes from 111.111.2/24 will be added an 802.1q tag with VLAN ID 12. Suppose that host A in EE department with IP address 111.111.1.1 would like to send an IP datagram to host B (111.111.2.1) in CS department. Host A first encapsulates the IP datagram (destined to 111.111.2.1) into a frame with a destination MAC address equal to the MAC address of the router’s interface card that connects to port 1 of the switch. Once the router receives the frame, then it passes it up to IP layer, which decides that the IP datagram should be forwarded to subnet 111.111.2/24 via sub-interface 111.111.2.0. Then the router encapsulates the IP datagram into a frame and sends it to port 1. Note that this frame has an 802.1q tag VLAN ID 12. Once the switch receives the frame port 1, it knows that this frame is destined to VLAN with ID 12, so the switch will send the frame to Host B which is in CS department. Once Host B receives this frame, it will remove the 802.1q tag.Problem 30(The following description is short, but contains all major key steps and key protocols involved.)Your computer first uses DHCP to obtain an IP address. You computer first creates a special IP datagram destined to 255.255.255.255 in the DHCP server discovery step, and puts it in a Ethernet frame and broadcast it in the Ethernet. Then following the steps in the DHCP protocol, you computer is able to get an IP address with a given lease time.A DHCP server on the Ethernet also gives your computer a list of IP addresses of first-hop routers, the subnet mask of the subnet where your computer resides, and the addresses of local DNS servers (if they exist).Since your computer’s ARP cache is initially empty, your computer will use ARP protocol to get the MAC addresses of the first-hop router and the local DNS server.Your computer first will get the IP address of the Web page you would like to download. If the local DNS server does not have the IP address, then your computer will use DNS protocol to find the IP address of the Web page.Once your computer has the IP address of the Web page, then it will send out the HTTP request via the first-hop router if the Web page does not reside in a local Web server. The HTTP request message will be segmented and encapsulated into TCP packets, and then further encapsulated into IP packets, and finally encapsulated into Ethernet frames. Your computer sends the Ethernet frames destined to the first-hop router. Once the router receives the frames, it passes them up into IP layer, checks its routing table, and then sends the packets to the right interface out of all of its interfaces.Then your IP packets will be routed through the Internet until they reach the Web server. The server hosting the Web page will send back the Web page to your computer via HTTP response messages. Those messages will be encapsulated into TCP packets and then further into IP packets. Those IP packets follow IP routes and finally reach yourfirst-hop router, and then the router will forward those IP packets to your computer by encapsulating them into Ethernet frames.Problem 32a) Each flow evenly shares a link’s capacity with other flows traversing that link, then the 80 flows crossing the B to access-router 10 Gbps links (as well as the access router to border router links) will each only receive 10 Gbps / 80 = 125 Mbpsb) In Topology of Figure 5.31, there are four distinct paths between the first and third tier-2 switches, together providing 40 Gbps for the traffic from racks 1-4 to racks 9-12. Similarly, there are four links between second and fourth tier-2 switches, together providing 40 Gbps for the traffic from racks 5-8 to 13-16. Thus the total aggregate bandwidth is 80 Gbps, and the value per flow rate is 1 Gbps.c) Now 20 flows will need to share each 1 Gbps bandwidth between pairs of TOR switches. So the host-to-host bit rate will be 0.5 Gbps.Problem 33a)Both email and video application uses the fourth rack for 0.1 percent of the time.b)Probability that both applications need fourth rack is 0.001*0.001 = 10-6.c)Suppose the first three racks are for video, the next rack is a shared rack for bothvideo and email, and the next three racks are for email. Let's assume that thefourth rack has all the data and software needed for both the email and video applications. With the topology of Figure 5.31, both applications will have enough intra-bandwidth as long as both are not simultaneously using the fourth rack.From part b, both are using the fourth rack for no more than .00001 % of time, which is within the .0001% requirement.。

相关文档
最新文档