计算机网络(第4版)习题答案(英文版)

合集下载

(完整版)计算机网络原理课后习题答案

(完整版)计算机网络原理课后习题答案

(完整版)计算机⽹络原理课后习题答案《计算机⽹络》(第四版)谢希仁第1章概述作业题1-03、1-06、1-10、1-13、1-20、1-221-03.试从多个⽅⾯⽐较电路交换、报⽂交换和分组交换的主要优缺点。

答:(1)电路交换它的特点是实时性强,时延⼩,交换设备成本较低。

但同时也带来线路利⽤率低,电路接续时间长,通信效率低,不同类型终端⽤户之间不能通信等缺点。

电路交换⽐较适⽤于信息量⼤、长报⽂,经常使⽤的固定⽤户之间的通信。

(2)报⽂交换报⽂交换的优点是中继电路利⽤率⾼,可以多个⽤户同时在⼀条线路上传送,可实现不同速率、不同规程的终端间互通。

但它的缺点也是显⽽易见的。

以报⽂为单位进⾏存储转发,⽹络传输时延⼤,且占⽤⼤量的交换机内存和外存,不能满⾜对实时性要求⾼的⽤户。

报⽂交换适⽤于传输的报⽂较短、实时性要求较低的⽹络⽤户之间的通信,如公⽤电报⽹。

(3)分组交换分组交换⽐电路交换的电路利⽤率⾼,⽐报⽂交换的传输时延⼩,交互性好。

1-06.试将TCP/IP和OSI的体系结构进⾏⽐较。

讨论其异同点。

答:(1)OSI和TCP/IP的相同点是:都是基于独⽴的协议栈的概念;⼆者均采⽤层次结构,⽽且都是按功能分层,层功能⼤体相似。

(2)OSI和TCP/IP的不同点:①OSI分七层,⾃下⽽上分为物理层、数据链路层、⽹络层、运输层、应⽤层、表⽰层和会话层;⽽TCP/IP具体分五层:应⽤层、运输层、⽹络层、⽹络接⼝层和物理层。

严格讲,TCP/IP⽹间⽹协议只包括下三层,应⽤程序不算TCP/IP的⼀部分②OSI层次间存在严格的调⽤关系,两个(N)层实体的通信必须通过下⼀层(N-1)层实体,不能越级,⽽TCP/IP可以越过紧邻的下⼀层直接使⽤更低层次所提供的服务(这种层次关系常被称为“等级”关系),因⽽减少了⼀些不必要的开销,提⾼了协议的效率。

③OSI 只考虑⽤⼀种标准的公⽤数据⽹。

TCP/IP ⼀开始就考虑到多种异构⽹的互连问题,并将⽹际协议IP 作为TCP/IP 的重要组成部分。

计算机网络基础(第4版)(微课版)-习题答案 (4)[3页]

计算机网络基础(第4版)(微课版)-习题答案 (4)[3页]

1.关于IPv4地址的说法,错误的是( C )。

A.IP地址是由网络地址和主机地址两部分组成B.网络中的每台主机分配了唯一的IP地址C.IP地址只有三类:A,B,CD.随着网络主机的增多,IP地址资源将要耗尽2.某公司申请到一个C 类网络,由于有地理位置上的考虑必须切割成5 个子网,请问子网掩码要设为(A)A.255.255.255.224 B.255.255.255.192C.255.255.255.254 D.255.285.255.2403.IP地址127.0.0.1(D )。

A.是一个暂时未用的保留地址B.是一个属于B类的地址C.是一个表示本地全部节点的地址D.是一个表示本节点的地址4.从IP地址195.100.20.11中我们可以看出(C)。

A.这是一个A类网络的主机B.这是一个B类网络的主机C.这是一个C类网络的主机D.这是一个保留地址5.要将一个IP地址是220.33.12.0的网络划分成多个子网,每个子网包括25个主机并要求有尽可能多的子网,指定的子网掩码应是为( B )。

A.255.255.255.192 B.255.255.255.224C.255.255.255.240 D.255.255.255.248 6.一个A类网络已经拥有60个子网,若还要添加两个子网,并且要求每个子网有尽可能多的主机,应指定子网掩码为( B )。

A.255.240.0.0 B.255.248.0.0C.255.252.0.0 D.255.254.0.07下面哪个是合法的IPV6 地址(B)A.1080:0:0:0:8:800:200C:417K B.23F0::8:D00:316C:4A7FC.FF01::101::100F D.0.0:0:0:0:0:0:0:18、8.下列哪一个IPv6 地址是错误地址?(D)A.::FFFF B.::1C.::1:FFFF D.::1::FFFF9.下列关于IPv6 协议优点的描述中,准确的是。

计算机网络第4版(自顶向下方法)英文版ppt

计算机网络第4版(自顶向下方法)英文版ppt

connect adjacent nodes along communication path are links



wired links wireless links LANs
layer-2 packet is a frame,
encapsulates datagram
data-link layer has responsibility of transferring datagram from one node to adjacent node over a link
services:

error detection, correction sharing a broadcast channel: multiple access link layer addressing reliable data transfer, flow control: done!
each link protocol
tourist = datagram
provides different services

transport segment =
e.g., may or may not provide rdt over link
communication link transportation mode = link layer protocol travel agent = routing algorithm
5-11
Parity Checking
Single Bit Parity:
Detect single bit errors
Two Dimensional Bit Parity:

《计算机英语(第4版)》课后练习参考答案.8-12selectA

《计算机英语(第4版)》课后练习参考答案.8-12selectA

Unit Eight: The InternetUnit Eight/Section AI.Fill in the blanks with the information given in the text:1.research2.ICANN或the Internet Corporation for Assigned Names and Numbers3.router; gateway4.temporary/dial-up; permanent/dedicated5.ISP或Internet service providerwork; host7.decimal8.mnemonicII.Translate the following terms or phrases from English into Chinese and vice versa:1.cell phone 蜂窝电话,移动电话,手机2.IP address 网际协议地址,IP地址3.autonomous system 自主系统4.dial-up connection 拨号连接work identifier 网络标识符6.binary notation 二进制记数法7.mnemonic name 助记名,缩写名8.Internet-wide directory system 因特网范围的目录系统 server 名称服务器10.Internet infrastructure 因特网基础结构11.助记地址mnemonic address12.网吧cyber cafe13.宽带因特网访问broadband Internet access14.顶级域名top-level domain (TLD)15.因特网编址Internet addressing16.点分十进制记数法dotted decimal notation17.因特网服务提供商Internet service provider (ISP)18.专用因特网连接dedicated Internet connection19.主机地址host address20.硬件与软件支持hardware and software supportIII.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:Early computer networks used leased telephone company lines for their connections.Telephone company systems of that time established a single connection between sender and receiver for each telephone call, and that connection carried all data along a single path. Whena company wanted to connect computers it owned at two different locations, the companyplaced a telephone call to establish the connection, and then connected one computer to each end of that single connection.The U.S. Defense Department was concerned about the inherent risk of this single-channel method for connecting computers, and its researchers developed a different method of sending information through multiple channels. In this method, files and messages are broken into packets that are labeled electronically with codes for their origins, sequences, and destinations. In 1969, Defense Department researchers in the Advanced Research Projects Agency (ARPA) used this network model to connect four computers into a network called the ARPANET. The ARPANET was the earliest of the networks that eventually combined to become what we now call the Internet. Throughout the 1970s and 1980s, many researchers in the academic community connected to the ARPANET and contributed to the technological developments that increased its speed and efficiency.IV.Translate the following passage from English into Chinese:因特网只是提供了将许许多多的计算机连接在一起的物理与逻辑基础结构。

计算机网络(第四版)英文原版1.9 Summary

计算机网络(第四版)英文原版1.9 Summary
To have multiple computers talk to each other requires a large amount of standardization, both in the hardware and software. Organizations such as the ITU-T, ISO, IEEE, and IAB manage different parts of the standardization process.
A factor in the delay of a store-and-forward packet-switching system is how long it takes to store and forward a packet through a switch. If switching time is 10 μsec, is this likely to be a major factor in the response of a client-server system where the client is in New York and the server is in California? Assume the propagation speed in copper and fiber to be 2/3 the speed of light in vacuum.
Well-known networks include the Internet, ATM networks, Ethernet, and the IEEE 802.11 wireless LAN. The Internet evolved from the ARPANET, to which other networks were added to form an internetwork. The present Internet is actually a collection of many thousands of networks, rather than a single network. What characterizes it is the use of the TCP/IP protocol stack throughout. ATM is widely used inside the telephone system for long-haul data traffic. Ethernet is the most popular LAN and is present in most large companies and universities. Finally, wireless LANs at surprisingly high speeds (up to 54 Mbps) are beginning to be widely deployed.

计算机英语(第4版)课文翻译与课后答案

计算机英语(第4版)课文翻译与课后答案

第一部分《计算机英语》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。

要不是由于计算机的发展,现代的高科技世界是不可能产生的。

不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯?帕斯卡于1642年设计的,它是数字计算机的先驱。

这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。

17世纪70年代,德国哲学家和数学家戈特弗里德?威廉?莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽?雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼?何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家和发明家查尔斯?巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔?埃达?拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

计算机网络(第四版)课后习题(英文)+习题答案(中英文)

计算机网络(第四版)课后习题(英文)+习题答案(中英文)

ANDREW S. TANENBAUM 秒,约533 msec.----- COMPUTER NETWORKS FOURTH EDITION PROBLEM SOLUTIONS 8. A collection of five routers is to be conn ected in a poi nt-to-poi nt sub net.Collected and Modified By Yan Zhe nXing, Mail To: Betwee n each pair of routers, the desig ners may put a high-speed line, aClassify: E aEasy, M ^Middle, H Hard , DaDeleteGree n: Importa nt Red: Master Blue: VI Others:Know Grey:—Unnecessary ----------------------------------------------------------------------------------------------ML V Chapter 1 In troductio nProblems2. An alter native to a LAN is simply a big timeshari ng system with termi nals forall users. Give two adva ntages of a clie nt-server system using a LAN.(M)使用局域网模型可以容易地增加节点。

如果局域网只是一条长的电缆,且不会因个别的失效而崩溃(例如采用镜像服务-------------------------------------------器)的情况下,使用局域网模型会更便宜。

计算机专业英语教程第四版翻译课后练习题含答案

计算机专业英语教程第四版翻译课后练习题含答案

计算机专业英语教程第四版翻译课后练习题含答案简介《计算机专业英语教程》是针对计算机专业学生编写的一本英语教材。

本书旨在帮助学生通过学习计算机领域的专业英语词汇和语法,提升他们的英语能力和技能。

本文将为读者提供该教材第四版的课后练习题及答案。

第一课练习题1.将下列单词从易到难排序:chip, computer, algorithm, software,desktop2.将下列单词从中文翻译为英文:程序设计,硬件,操作系统,输入,输出3.请解释下列缩略语的全称:RAM,CPU,OS答案1.desktop, chip, computer, software, algorithm2.programming, hardware, operating system, input, output3.RAM(Random Access Memory),CPU(Central Processing Unit),OS(Operating System)第二课练习题1.请翻译下列句子:计算机的功能越来越强大,它可以执行许多任务。

2.请解释下列单词的意思:interface,protocol,server,router答案puters are becoming more and more powerful and they canperform many tasks.2.interface(接口), protocol(协议),server(服务器),router(路由器)第三课练习题1.请将下列单词按字母顺序排列:database,file,program,server,storage2.请填写下列句子的空格:计算机会读取从硬盘 __ (into)内存。

3.请解释下列单词的意思:database,algorithm,client,browser答案1.algorithm,database,file,program,server,storage2.into3.database(数据库),algorithm(算法),client(客户端),browser(浏览器)第四课练习题1.请翻译下列句子:今天我学会了如何编写计算机程序。

大学计算机(第4版) 课本习题答案

大学计算机(第4版) 课本习题答案

十二五规划教材《大学计算机(第4版)》第1章习题答案1.计算机的发展经历了机械式计算机、(B)式计算机和电子计算机三个阶段。

(A)电子管(B)机电(C)晶体管(D)集成电路2.英国数学家巴贝奇曾设计了一种程序控制的通用(D)。

(A)加法器(B)微机(C)大型计算机(D)分析机3. 1939年,美国爱荷华州立大学研制成功了一台大型通用数字电子计算机(D)。

(A)ENIAC (B)Z3 (C)IBM PC (D)ABC4.爱德华·罗伯茨1975年发明了第一台微机(C)。

(A)Apple II (B)IBM PC (C)牛郎星(D)织女星5.1981年IBM公司推出了第一台(B)位个人计算机IBM PC 5150。

(A)8 (B)16 (C)32 (D)646.我国大陆1985年自行研制成功了第一台PC兼容机(C)0520微机。

(A)联想(B)方正(C)长城(D)银河7.摩尔定律指出,微芯片上集成的晶体管数目每(C)个月翻一番。

(A)6 (B)12 (C)18 (D)248.第四代计算机采用大规模和超大规模(B)作为主要电子元件。

(A)微处理器(B)集成电路(C)存储器(D)晶体管9.计算机朝着大型化和(C)化两个方向发展。

(A)科学(B)商业(C)微机(D)实用10.计算机中最重要的核心部件是(A)。

(A)CPU (B)DRAM (C)CD-ROM (D)CRT11.计算机类型大致可以分为:大型计算机、(A)、嵌入式系统三类。

(A)微机(B)服务器(C)工业PC (D)笔记本微机12.大型集群计算机技术是利用许多台单独的(D)组成一个计算机群。

(A)CPU (B)DRAM (C)PC (D)计算机13.(C)系统是将微机或微机核心部件安装在某个专用设备之内。

(A)大型计算机(B)网络(C)嵌入式(D)服务器14.冯结构计算机包括:输入设备、输出设备、存储器、控制器、(B)五大组成部分。

(A)处理器(B)运算器(C)显示器(D)模拟器15.在冯·诺伊曼计算机模型中,存储器是指(A)单元。

计算机网络第四版参考答案第四章

计算机网络第四版参考答案第四章

第四章局域网(P135)1、局域网的主要特点是什么为什么说局域网是一个通信网答:局域网LAN是指在较小的地理范围内,将有限的通信设备互联起来的计算机通信网络。

从功能的角度来看,局域网具有以下几个特点:①共享传输信道。

在局域网中,多个系统连接到一个共享的通信媒体上。

②地理范围有限,用户个数有限。

通常局域网仅为一个单位服务,只在一个相对独立的局部范围内连网,如一座楼或集中的建筑群内。

一般来说,局域网的覆盖范围约为10m~10km内或更大一些。

③传输速率高。

局域网的数据传输速率一般为1~100Mbps,能支持计算机之间的高速通信,所以时延较低。

④误码率低。

因近距离传输,所以误码率很低,一般在10-8~10-11之间。

⑤多采用分布式控制和广播式通信。

在局域网中各站是平等关系而不是主从关系,可以进行广播或组播。

从网络的体系结构和传输控制规程来看,局域网也有自己的特点:①低层协议简单。

在局域网中,由于距离短、时延小、成本低、传输速率高、可靠性高,因此信道利用率已不是人们考虑的主要因素,所以低层协议较简单。

②不单独设立网络层。

局域网的拓扑结构多采用总线型、环型和星型等共享信道,网内一般不需要中间转接,流量控制和路由选择功能大为简化,通常在局域网不单独设立网络层。

因此,局域网的体系结构仅相当与OSI/RM的最低两层。

③采用多种媒体访问控制技术。

由于采用共享广播信道,而信道又可用不同的传输媒体,所以局域网面对的问题是多源、多目的的链路管理。

由此引发出多种媒体访问控制技术。

在OSI的体系结构中,一个通信子网只有最低的三层。

而局域网的体系结构也只有OSI的下三层,没有第四层以上的层次。

所以说局域网只是一种通信网。

3、一个7层楼,每层有一排共15间办公室。

每个办公室的楼上设有一个插座,所有的插座在一个垂直面上构成一个正方形栅格组成的网的结点。

设任意两个插座之间都允许连上电缆(垂直、水平、斜线……均可)。

现要用电缆将它们连成(1)集线器在中央的星形网;(2)总线式以太网。

《计算机英语(第4版)》课后练习答案

《计算机英语(第4版)》课后练习答案

《计算机英语(第4版)》练习参考答案Unit One: Computer and Computer ScienceUnit One/Section AI.Fill in the blanks with the information given in the text:1. Charles Babbage; Augusta Ada Byron2. input; output3. VLSI4. workstations; mainframes5. vacuum; transistors6. instructions; software7. digit; eight; byte8. microminiaturization; chipII.Translate the following terms or phrases from English into Chinese and vice versa:1. artificial intelligence 人工智能2. paper-tape reader 纸带阅读器3. optical computer 光计算机4. neural network 神经网络5. instruction set 指令集6. parallel processing 并行处理7. difference engine 差分机8. versatile logical element 通用逻辑元件9. silicon substrate 硅衬底10. vacuum tube 真空管11. 数据的存储与处理the storage and handling of data12. 超大规模集成电路very large-scale integrated circuit13. 中央处理器central processing unit14. 个人计算机personal computer15. 模拟计算机analogue computer16. 数字计算机digital computer17. 通用计算机general-purpose computer18. 处理器芯片processor chip19. 操作指令operating instructions20. 输入设备input deviceIII.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:We can define a computer as a device that accepts input, processes data, stores data, and produces output. According to the mode of processing, computers are either analog or digital.They can also be classified as mainframes, minicomputers, workstations, or microcomputers.All else (for example, the age of the machine) being equal, this categorization provides somespeed, size, cost, and abilities.indication of th e computer’sEver since the advent of computers, there have been constant changes. First-generation computers of historic significance, such as UNIVAC(通用自动计算机), introduced in the early 1950s, were based onvacuum tubes. Second-generation computers, appearing in the early 1960s, were those in which transistors replaced vacuum tubes. In third-generation computers, dating from the 1960s,integrated circuits replaced transistors. In fourth-generation computers such as microcomputers, which first appeared in the mid-1970s, large-scale integration enabled thousands of circuitsto be incorporated on onechip. Fifth-generation computers are expected to combine very-large-scale integration with sophisticated approaches to computing, including artificial intelligence and true distributed processing.IV. Translate the following passage from English into Chinese:计算机将变得更加先进,也将变得更加容易使用。

计算机网络第四版(课后练习+答案)

计算机网络第四版(课后练习+答案)

计算机网络第四版(课后练习+答案)计算机网络第四版(课后练习+答案)Introduction:计算机网络是现代信息技术的基础,它涉及到计算机与计算机之间如何进行数据交换和通信。

《计算机网络第四版》是一本权威指南,提供了大量的课后练习和答案,帮助读者加强对计算机网络的理解。

本文将对《计算机网络第四版》课后练习和答案进行综述,以便读者更好地掌握网络通信的关键概念和原理。

Chapter 1: Introduction to Networking在第一章中,课后练习的内容涵盖了计算机网络的基本概念和发展历程。

学习者可以通过这些练习加深对网络通信的了解,例如描述计算机网络的基本组成部分、定义OSI模型的七层结构以及解释分组交换和电路交换的区别。

Chapter 2: Network Models第二章课后练习着重介绍了计算机网络的各种模型,包括OSI模型和TCP/IP模型。

练习题目涵盖了每个模型的层次结构和功能,同时还要求学习者能够比较这两个模型之间的异同点。

Chapter 3: Physical Layer and Media物理层和传输介质是计算机网络的基础,第三章课后练习起到了巩固和扩展这些概念的作用。

学习者将通过回答问题和解决实际情况的案例,深入理解诸如数据信号的调制和解调、传输介质的特性以及常见的物理层设备等内容。

Chapter 4: Data Link Layer数据链路层构建在物理层之上,并处理节点到节点之间的数据传输。

第四章的课后练习要求学习者熟练掌握数据链路层的基本概念,包括帧的封装和解封装、错误检测和纠正技术以及介绍局域网和广域网等。

Chapter 5: Network Layer网络层负责数据包的转发和路由选择,在第五章的练习题中,学习者需要回答关于IP地址的分配和路由表的设计的问题,深入理解网络层的功能和特性。

还会涉及到IP协议的各种细节,例如子网划分、地址转换和网络控制协议等。

Chapter 6: Transport Layer传输层提供端到端的可靠数据传输服务,第六章的课后练习通过设计案例和讨论问题的方式,帮助学习者掌握TCP和UDP协议的细节和应用场景。

计算机网络系统方法英文版课后习题及解答

计算机网络系统方法英文版课后习题及解答

第一章(1.2 1.3节)5.Calculate the total time required to transfer a 1,000-KB file in the following cases, assuming an RTT of 100 ms, a packet size of 1-KB data, and an initial 2 ×RTT of “handshaking”before data is sent.(a) The bandwidth is 1.5 Mbps, and data packets can be sent continuously.(b) The bandwidth is 1.5 Mbps, but after we finish sending each data packetwe must wait one RTT before sending the next.(c) The bandwidth is “infinite,”meaning that we take transmit time to bezero, and up to 20 packets can be sent per RTT.(d) The bandwidth is infinite, and during the first RTT we can send onepacket (21−1), during the second RTT we can send two packets (22−1),during the third we can send four (23−1), and so on. (A justification forsuch an exponential increase will be given in Chapter 6.)7. Consider a point-to-point link 2 km in length. At what bandwidth would propagation delay (at a speed of 2 ×108m/sec) equal transmit delay for 100-byte packets? What about 512-byte packets?13.How “wide”is a bit on a 1-Gbps link? How long is a bit in copper wire, where the speed of propagation is 2.3 ×108 m/s?15.Suppose a 100-Mbps point-to-point link is being set up between Earth and a new lunar colony. The distance from the moon to Earth is approximately 385,000 km, and data travels over the link at the speed of light—3 ×108 m/s.(a) Calculate the minimum RTT for the link.(b) Using the RTT as the delay, calculate the delay ×bandwidth product forthe link.(c) What is the significance of he delay ×bandwidth product computedin (b)?(d) A camera on the lunar base takes pictures of Earth and saves them in digitalformat to disk. Suppose Mission Control on Earth wishes to download themost current image, which is 25 MB. What is the minimum amount oftime that will elapse between when the request for the data goes out andthe transfer is finished?18. Calculate the latency (from first bit sent to last bit received) for the following:(a) A 10-Mbps Ethernet with a single store-and-forward switch in the path,and a packet size of 5,000 bits. Assume that each link introduces a propaga-tion delay of 10 µs, and that the switch begins retransmitting immediatelyafter it has finished receiving the packet.(b) Same as (a) but with three switches.(c) Same as (a) but assume the switch implements “cut-through”switching: itis able to begin retransmitting the packet after the first 200 bits have beenreceived.第二章(除2.7 2.9 节)1.Show the NRZ, Manchester, and NRZI encodings for the bit pattern shown in Figure2.46. Assume that the NRZI signal starts out low.23.Consider an ARQ algorithm running over a 20-km point-to-point fiber link.(a) Compute the propagation delay for this link, assuming that the speed oflight is 2 ×108 m/s in the fiber.(b) Suggest a suitable timeout value for the ARQ algorithm to use.(c) Why might it still be possible for the ARQ algorithm to time out andretransmit a frame, given this timeout value?26.The text suggests that the sliding window protocol can be used to implement flow control. We can imagine doing this by having the receiver delay ACKs, that is, not send the ACK until there is free buffer space to hold the next frame. In doing so, each ACK would simultaneously acknowledge the receipt of the last frame and tell the source that there is now free buffer space available to hold the next frame. Explain why implementing flow control in this way is not a good idea.44.Let A and B be two stations attempting to transmit on an Ethernet. Each has steady queue of frames ready to send; A’s frames will be numbered A 1, A2 , and so on, and B’s similarly. Let T = 51.2 µs be the exponential backoff base unit. Suppose A and B simultaneously attempt to send frame 1, collide, and happen to choose backoff times of 0 ×T and 1 ×T, respectively, meaning A wins the race and transmits A 1 while B waits. At the end of this transmission, B will attempt to retransmit B1 while A will attempt to transmit A2 . These first attempts will collide, but now A backs off for either 0 ×T or 1 ×T, while B backs off for time equal to one of 0 ×T, . . . , 3 ×T.(a) Give the probability that A wins this second backoff race immediately after this firstcollision , that is, A’s first choice of backoff time k ×51.2 is less than B’s.(b) Suppose A wins this second backoff race. A transmits A 3 , and when it isfinished, A and B collide again as A tries to transmit A4 and B tries oncemore to transmit B1. Give the probability that A wins this third backoffrace immediately after the first collision.(c) Give a reasonable lower bound for the probability that A wins all the re-maining backoff races.(d) What then happens to the frame B1?This scenario is known as the Ethernet capture effect.48. Repeat the previous exercise, now with the assumption that Ethernet is p -persistent with p = 0.33 (that is, a waiting station transmits immediately with probability p when the line goes idle, and otherwise defers one 51.2-µs slot time and repeats the process). Your timeline should meet criterion (1) of the previous problem, but in lieu of criterion (2), you should show at least one collision and at least one run of four deferrals on an idle line. Again, note that many solutions are possible.第三章(3.1 3.2节)ing the example network given in Figure 3.30, give the virtual circuit tables for all the switches after each of the following connections is established. Assume that the sequence of connections is cumulative, that is, the first connection is still up when the second connection is established, and so on. Also assume that the VCI assignment always picks the lowest unused VCI on each link, starting with 0.(a) Host A connects to host B.(b) Host C connects to host G.(c) Host E connects to host I.(d) Host D connects to host B.(e) Host F connects to host J.(f) Host H connects to host A.3.For the network given in Figure 3.31, give the datagram forwarding table for each node. The links are labeled with relative costs; your tables should forward each packet via the lowest-cost path to its destination.5. Consider the virtual circuit switches in Figure 3.33. Table 3.6 lists, for each switch, what port, VCI (or VCI, interface) pairs are connected to other. Connections are bidirectional. List all endpoint-to-endpoint connections.13. Given the extended LAN shown in Figure 3.34, indicate which ports are not selected bythe spanning tree algorithm.15. Consider the arrangement of learning bridges shown in Figure 3.35. Assuming all are initially empty, give the forwarding tables for each of the bridges B1–B4 after the following transmissions:■ A sends to C.■ C sends to A.■ D sends to C.Identify ports with the unique neighbor reached directly from that port, thatis, the ports for B1 are to be labeled “A”and “B2.”17.Consider hosts X, Y, Z, W and learning bridges B1, B2, B3, with initially empty forwarding tables, as in Figure 3.36.(a) Suppose X sends to Z. Which bridges learn where X is? Does Y’s networkinterface see this packet?(b) Suppose Z now sends to X. Which bridges learn where Zis? Does Y’s network interface see this packet?(c) Suppose Y now sends to X. Which bridges learn where Y is? Does Z’s net-work interface see this packet?(d) Finally, suppose Z sends to Y. Which bridges learn where Z is? Does W’snetwork interface see this packet?第四章(4.1 4.2 4.3.1 4.3.5 4.5 节)4.Suppose a TCP message that contains 2,048 bytes of data and 20 bytes of TCP header is passed to IP for delivery across two networks of the Internet (i.e., from the source host to a router to the destination host). The first network uses 14-byte headers and has an MTU of 1,024 bytes; the second uses 8-byte headers with an MTU of 512 bytes. Each network’s MTU gives the size of the largest IP datagram that can be carried in a link layer frame. Give the sizes and offsets of the sequence of fragments delivered to the network layer at the destination host. Assume all IP headers are 20 bytes.21.Suppose a router has built up the routing table shown in Table 4.14. The router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers R2, R3, or R4. Describe what the router does with a packet addressed to each of the following destinations:(a) 128.96.39.10.(b) 128.96.40.12.(c) 128.96.40.151.(d) 192.4.153.17.(e) 192.4.153.90.45.Table 4.16 is a routing table using CIDR. Address bytes are in hexadecimal. The notation “/12”in C4.50.0.0/12 denotes a netmask with 12 leading 1 bits, that is, FF.F0.0.0. Note that the last three entries cover every address and thus serve in lieu of a default route. State to what next hop the following will be delivered.(a) C4.5E.13.87.(b) C4.5E.22.09.(c) C3.41.80.02.(d) 5E.43.91.12.(e) C4.6D.31.2E.(f) C4.6B.31.2E.第五章(5.1 5.2节)10. You are hired to design a reliable byte-stream protocol that uses a sliding window (like TCP). This protocol will run over a 1-Gbps network. The RTT of the network is 140 ms, and the maximum segment lifetime is 60 seconds. How many bits would you include in the AdvertisedWindow and SequenceNum fields of your protocol header?第六章(6.5节)第九章(9.1节)。

计算机网络第四版课后习题--答案--谢希仁

计算机网络第四版课后习题--答案--谢希仁

计算机网络学习用书计算机网络第四版(谢希仁编著)1、计算机网络的发展阶段第一阶段:(20世纪60年代)以单个计算机为中心的面向终端的计算机网络系统。

这种网络系统是以批处理信息为主要目的。

第二阶段:(20世纪70年代)以分组交换网为中心的多主机互连的计算机网络系统。

它的主要特点是:①采用的是静态分配策略;②这种交换技术适应模拟信号的数据传输。

③计算机数据的产生往往是“突发式”的。

第三阶段:(20世纪80年代)具有统一的网络体系结构,遵循国际标准化协议的计算机网络。

第四阶段:(20世纪90年代)网络互连与高速网络。

2、简述分组交换的要点。

(1)报文分组,加首部(2)经路由器储存转发(3)在目的地合并3、试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

(1)电路交换:端对端通信质量因约定了通信资源获得可靠保障,对连续传送大量数据效率高。

(2)报文交换:无须预约传输带宽,动态逐段利用传输带宽对突发式数据通信效率高,通信迅速。

(3)分组交换:具有报文交换之高效、迅速的要点,且各分组小,路由灵活,网络生存性能好。

4、为什么说因特网是自印刷术以来人类通信方面最大的变革?答:融合其他通信网络,在信息化过程中起核心作用,提供最好的连通性和信息共享,第一次提供了各种媒体形式的实时交互能力。

8、计算机网络中的主干网和本地接入网的主要区别是什么?答:主干网:提供远程覆盖\高速传输\和路由器最优化通信。

本地接入网:主要支持用户的访问本地,实现散户接入,速率低。

9、一个计算机网络应当有三个主要的组成部分:(1)若干个主机,它们向各用户提供服务;(2)一个通信子网,它由一些专用的结点交换机和连接这些结点的通信链路所组成;(3)一系列的协议。

这些协议是为在主机之间或主机和子网之间的通信而用的。

10、试在下列条件下比较电路交换和分组交换。

要传送的报文共x(bit)。

从源点到终点共经过k段链路,每段链路的传播时延为d(s),数据率为b(b/s)。

计算机网络(谢希仁)答案解析[完整版]

计算机网络(谢希仁)答案解析[完整版]

《计算机网络》课后习题答案第一章概述1-1 计算机网络向用户可以提供哪些服务?答:计算机网络向用户提供的最重要的功能有两个,连通性和共享。

1-2 试简述分组交换的特点答:分组交换实质上是在“存储——转发”基础上发展起来的。

它兼有电路交换和报文交换的优点。

分组交换在线路上采用动态复用技术传送按一定长度分割为许多小段的数据——分组。

每个分组标识后,在一条物理线路上采用动态复用的技术,同时传送多个数据分组。

把来自用户发端的数据暂存在交换机的存储器内,接着在网内转发。

到达接收端,再去掉分组头将各数据字段按顺序重新装配成完整的报文。

分组交换比电路交换的电路利用率高,比报文交换的传输时延小,交互性好。

1-3 试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

答:(1)电路交换电路交换就是计算机终端之间通信时,一方发起呼叫,独占一条物理线路。

当交换机完成接续,对方收到发起端的信号,双方即可进行通信。

在整个通信过程中双方一直占用该电路。

它的特点是实时性强,时延小,交换设备成本较低。

但同时也带来线路利用率低,电路接续时间长,通信效率低,不同类型终端用户之间不能通信等缺点。

电路交换比较适用于信息量大、长报文,经常使用的固定用户之间的通信。

(2)报文交换将用户的报文存储在交换机的存储器中。

当所需要的输出电路空闲时,再将该报文发向接收交换机或终端,它以“存储——转发”方式在网内传输数据。

报文交换的优点是中继电路利用率高,可以多个用户同时在一条线路上传送,可实现不同速率、不同规程的终端间互通。

但它的缺点也是显而易见的。

以报文为单位进行存储转发,网络传输时延大,且占用大量的交换机内存和外存,不能满足对实时性要求高的用户。

报文交换适用于传输的报文较短、实时性要求较低的网络用户之间的通信,如公用电报网。

(3)分组交换分组交换实质上是在“存储——转发”基础上发展起来的。

它兼有电路交换和报文交换的优点。

分组交换在线路上采用动态复用技术传送按一定长度分割为许多小段的数据——分组。

(完整版)计算机网络英文题库(附答案)chapter3

(完整版)计算机网络英文题库(附答案)chapter3

Chapter 3 Transport Layer1. A transport-layer protocol provides for logical communication between ____.A Application processesB HostsC RoutersD End systems2. Transport-layer protocols run in ____.A ServersB ClientsC RoutersD End systems3. In transport layer, the send side breaks application messages into ____, passes to network layer.A FramesB SegmentsC Data-gramsD bit streams4. Services provided by transport layer include ____.A HTTP and FTPB TCP and IPC TCP and UDPD SMTP5. Which of the following services is not provided by TCP?A Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD In-order data transfers6. These two minimal transport-layer services----____ and ____----are the only two services that UDP provides!A process-to-process data delivery, error checkingB congestion control, reliable data transferC flow control, congestion controlD In-order data transfer, error checking7. Port number’s scop e is ____ to ____.A 0, 1023B 0, 65535C 0, 127D 0,2558. The port numbers ranging from ____to ____ are called well-known port number and are restricted.A 0, 1023B 0, 65535C 0, 127D 0,2559. UDP socket identified by two components, they are ____.A source IP addresses and source port numbersB source IP addresses and destination IP addressesC destination IP address and destination port numbersD destination port numbers and source port numbers10. TCP socket identified by a (an) ____.A 1-tupleB 2-tupleC 3-tupleD 4-tuple11. Which of the following applications normally uses UDP services?A SMTPB Streaming multimediaC FTPD HTTP12. Reliable data transfer protocol over a perfectly reliable channel is____.A rdt1.0B rdt2.0C rdt3.0D rdt2.113. Reliable data transfer protocol over a channel with bit errors and packet losses is _ ___.A rdt1.0B rdt2.0C rdt3.0D rdt2.114. Which of the following about reliable data transfer over a channel with bit errors i s not correct?A RDT2.0: assuming ACK and NAK will not be corruptedB RDT2.1: assuming ACK and NAK can be corruptedC RDT2.2: only use ACK-sD RDT2.2: use both ACK-s and NAK-s15. Which of the following protocols is not pipelining protocols?A TCPB rdt3.0C GO-BACK-ND selective repeat16. Which of the following is not correct about GBN protocol?A Only using ACK-sB Using cumulative ACK-sC Receiver discards all out-of-order packetsD It is not pipelined protocol17. Which of the following is not correct about SR protocol?A receiver individually acknowledges all correctly received packetsB sender only resends packets for which ACK not receivedC It limits sequence number of sent but un-ACK-ed packetsD It is not a pipelined protocol18. Which of the following about TCP connection is not correct?A It is a broadcast connectionB It is a point-to-point connectionC It is a pipelined connectionD It is a full duplex connection19. The SYN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection20. The FIN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection21.How does TCP sender perceive congestion?A Through a timeout eventB Through a receiving duplicate ACK-s eventC Both A and BD Either A or B22. Extending host-to-host delivery to process-to-process delivery is called transport-layer ____ and .A multiplexing and de-multiplexingB storing and forwardingC forwarding and filteringD switching and routing23. UDP is a ____ service while TCP is a connection-oriented service.A ConnectionlessB ReliableC Connection-orientedD In-order24. The UDP header has only four fields, they are____.A Source port number, destination port number, length and checksumB Source port number, destination port number, source IP and destination IPC source IP, destination IP, source MAC address and destination MAC addressD source IP, destination IP, sequence number and ACK sequence number25. There are two 16-bit integers: 1110 0110 0110 0110, 1101 0101 0101 0101. Their checksum is____.A 0100010001000011B 1011101110111100C 1111111111111111D 100000000000000026.The maximum amount of data that can be grabbed and placed in a segment is limited by the____.A Maximum segment size (MSS)B MTUC ChecksumD Sequence number27.The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host----the so-called____.A Maximum transmission unit (MTU)B MSSC ChecksumD Sequence number28. A File size of 500,000bytes, MSS equals 1000bytes. When we want to transmit this file with TCP, the sequence number of the first segment is 0, and the sequence number of the second segment is ____.A 1000B 999C 1001D 50000029.Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide____.A Cumulative acknowledgementsB Selective acknowledgementsC 3 duplicate ACKsD positive ACKs30. Provided α=0.125, current value of Estimated-RTT is 0.4s, Sample-RTT is 0.8s, then the new value of Estimated-RTT is ____s.A 0.45B 0.6C 0.7D 0.831.Provided RcvBuffer=20,LastByteRcvd=20,LastByteRead=15, thenRcvWindow=____.A 14B 15C 16D 1032. TCP service does not provide____.A Reliable data transferB Flow controlC Delay guaranteeD Congestion control33. There are two states in TCP congestion control, which are ____.A slow start and congestion avoidanceB safe start and congestion avoidanceC slow start and congestion abandonD safe start and congestion abandon34. The transport-layer protocol provides logical communication between ____, and the network-layer protocol provides logical communication ____.A hosts, processesB processes, hostsC threads, processesD processes, threads35. To implement the multicast services the Internet employs the ____ protocol.A FTPB TCPC IGMPD UDP36. If an application developer chooses ____ protocol, then the application process is almost directly talking with IP.A HTTPB RIPC CSMA/CDD UDP37. ____ maintains connection-state in the end systems. This connection state includes receive and send buffers, congestion-control parameters, and sequence and acknowledgment number parameters.A UDPB TCPC DNSD HTTP38. The host that initiates the session in the Internet is labeled as ____.A serverB user agentC clientD router39. With TCP there is no _____ between sending and receiving transport-layer entities.A flow controlB handshakingC. congestion control D VC setup40. The Internet’s ____service helps prevent the Internet from entering a state of gridlock.A datagramB congestion controlC sliding windowD timeout event41. Connection setup at the transport layer involves ____.A serverB only the two end systemsC clientD router42. A ____layer protocol provides for logical communication between applications.A transportB applicationC networkingD MAC43. In static congestion window, if it satisfies W*S/R > RTT + S/R, the Latency is ____.A W*S/R – ( RTT+ S/R)B 2RTT + O/RC 2RTT + O/R + (k-1)[W* S/R- (RTT + S/R)]D 2RTT + S/R44. The receive side of transport layer reassembles segments into messages, passes to ____layer.A ApplicationB NetworkingC PhysicalD MAC45. In the following four options, which one is correct?A The variations in the SampleRTT are smoothed out in the computation of the EstimatedRTTB The timeout should be less than the connection’s RTTC Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current value of TimeoutInterval will necessarily be≥1 secD Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current value of TimeoutInterval will necessarily be≤1 sec46. The port number used by HTTP is ____.A 80B 25C 110D 5347. The port number used by SMTP is ____.A 80B 25C 110D 5348. The port number used by pop3 is ____.A 80B 25C 110D 5349. The port number used by DNS is ____.A 80B 25C 110D 5350. The port number used by FTP is ____.A 20 and 21B 20C 21D 5351. A UDP socket identified by a ____ tuple(s).A 2B 4C 1D 352. A TCP socket identified by a ____ tuple(s).A 2B 4C 1D 353. A TCP socket does not include____.A Source MAC addressB Source port numberC Destination IP addressD Destination port number54. Which of following about UDP is not correct.A It is a reliable data transfer protocolB It is connectionlessC no handshaking between UDP sender, receiverD it is a best effort service protocol55. DNS uses ____ service.A TCPB UDPC Both TCP and UDPD None of above56. Which of following about UDP is correct?A Finer application-level control over what data is sent, and whenB No connection establishment (which can add delay), so no delay for establish a connectionC No connection state (so, UDP can typically support many active clients)D Large packet header overhead (16-B)57. Streaming media uses a ____ service normally.A TCPB UDPC Both TCP and UDPD None of above58. The UDP header has only ____ fields.A 2B 4C 1D 359. Which of the following does not included in UDP header.A Source port numberB Destination port numberC ChecksumD Sequence number60. Which of the following is not a pipelining protocol.A Rdt1.0B Go-Back-NC Selective repeatD TCP61. In the following four descriptions about MSS and MTU, which one is not correct?A The MSS is the maximum amount of application-layer data in the segmentB The MSS is the maximum size of the TCP segment including headersC The MSS is typically set by MTUD The MTU means the largest link-layer frame62. The job of gathering data chunks, encapsulating each data chunk with header information to create segments and passing the segments to the network is called ____.A multiplexingB de-multiplexingC forwardingD routing63. In the following four descriptions about the relationship between the transport layer and the network layer, which one is not correct?A The transport-layer protocol provides logical communication between hostsB The transport-layer protocol provides logical communication between processesC The services that a transport-layer protocol can provide are often constrained by the service model of the network-layer protocolD A computer network may make available multiple transport protocols64. Suppose the following three 8-bit bytes: 01010101, 01110000, 01001100. What’s the 1s complement of the sum of these 8-bit bytes?A 00010001B 11101101C 00010010D 1000100065. The following four descriptions about multiplexing and de-multiplexing, which one is correct?A A UDP socket is identified by a two-tuples consisting of a source port number and a destination port number.B If two UDP segment have different source port number, they may be directed to the same destination process.C If two TCP segments with different source port number, they may be directed to the same destination process.D If two TCP segments with same destination IP address and destination port number, they must be the same TCP connection.66. UDP and TCP both have the fields except ____.A source port numberB destination port numberC checksumD receive window67. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval [nextseqnum,base+N-1] corresponds to packet that ____.A can be sent immediatelyB have already been transmitted and acknowledgedC cannot be usedD have been sent but not yet acknowledged68. Which of the following about TCP is not correct?A It is a connectionless protocolB Point-to-point protocolC Reliable, in-order byte steam protocolD Pipelined protocol69. Which of the following about TCP is not correct?A It is a connectionless protocolB full duplex data transfer protocolC connection-oriented protocolD flow controlled protocol70. The maximum amount of data that can be grabbed and placed in a segment is limited by the ____.A Maximum segment size (MSS)B MTUC Sequence numberD Check sum71. The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host (the so-called____), and then will fit into a single link-layer frame.A Maximum segment size (MSS)B MTUC Sequence numberD Check sum72. The MSS is the maximum amount of ____layer data in the segment, not the maximum size of the TCP segment including headers.A ApplicationB TransportC NetworkingD Link73. Which of the following field is not used for connection setup and teardown?A Sequence numberB TSTC SYND FIN74. ____ is the byte stream number of first byte in the segment.A Sequence numberB ACK numberC ChecksumD port number75. ____ is the byte sequence numbers of next byte expected from other side.A Sequence numberB ACK numberC ChecksumD port number76. Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide ____ acknowledgements.A CumulativeB SelectiveC SingleD Negative77. Fast retransmit means in the case that ____ duplicate ACK-s are received, the TCP sender resend segment before timer expires.A 3B 4C 5D 678. TCP____ means sender won’t overflow receiver’s buffer by tran smitting too much, too fast.A Flow controlB Congestion controlC Reliable data transferD Connection-oriented service79. TCP provides flow control by having the sender maintain a variable called the ____.A Receive windowB Congestion windowC Sliding windowD buffer80. How does TCP sender perceive congestion?A TimeoutB 3 duplicate ACK-sC Both A and BD None of above81. Transport protocols run in ____.A ServersB ClientsC RoutersD End systems82. Which of the following services is not provided by TCP?A Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD In-order data transfers83. Which service does UDP not provide?A multiplexingB de-multiplexingC error-detectionD error-correction84. There are three major events related to data transmission and retransmission in the TCP sender, which one is not in it?A data received from application aboveB de-multiplexing segmentC timer timeoutD ACK receipt85. Which of the following applications normally uses UDP services?A SMTPB Streaming multimediaC FTPD HTTP86. Which of the following about TCP connection is not correct?A It is a broadcast connectionB It is a point-to-point connectionC It is a pipelined connectionD It is a full duplex connection87. The SYN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection88. Which service helps prevent the internet from entering a state of gridlock?A reliable data transferB flow controlC congestion controlD handshaking procedure89. The Internet’s _____is responsible for moving packets from one host to another.A application layerB transport layerC network layerD link layer90.In the following applications, which one is a bandwidth-sensitive application?A E-mailB web applicationC real-time audioD file transfer91. In the following applications, which one uses UDP?A E-mailB web applicationC file transferD DNS92. In the following four descriptions, which one is correct?A If one host’s transport layer uses TCP, then its network layer must use virtual-circuit network.B Datagram network provides connection serviceC The transport-layer connection service is implemented in the routerD The network-layer connection service is implemented in the router as well as in the end system.93.____ is a speeding-matching service---matching the rate which the sender is sending against the rate at which the receiving application is reading.A congestion controlB flow controlC sliding-window controlD variable control94. In the following four descriptions about Rcv-Window, which one is correct?A The size of the TCP RcvWindow never changes throughout the duration of the connectionB The size of the TCP RcvWindow will change with the size of the TCP RcvBufferC The size of the TCP RcvWindow must be less than or equal to the size of the TCP RcvBufferD Suppose host A sends a file to host B over a TCP connection, the number of unacknowledged bytes that A sends cannot exceed the size of the size of the RcvWindow.95. There are 6 flag fields. Which one is to indicate that the receiver should pass the data to the upper layer immediately?A PSHB URGC ACKD RST96. Suppose the TCP receiver receives the segment that partially or completely fills in gap in received data, it will ____.A immediately send ACKB immediately send duplicate ACKC wait some time for arrival of another in-order segmentD send single cumulative97. _____ imposes constrain on the rate at which a TCP sender can send traffic into the network.A sliding windowB congestion windowC receive windowD variable window98. Flow control and congestion control are same at that they all limit the rate of the sender, but differ in that ____.A flow control limits its rate by the size of RcvWindow, but congestion control by the traffic on the linkB congestion control limits its rate by the size of RcvWindow, but flow control by the traffic on the linkC flow control mainly is accomplished by the sender, but congestion control by the receiver.D flow control mainly is accomplished by the receiver, but congestion control bythe link.99. This job of delivering the data in a transport-layer segment to the correct socket is called ____.A multiplexingB de-multiplexingC forwardingD routing100. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval [base, nextseqnum-1] corresponds to packet that ____.A can be sent immediatelyB have already been transmitted and acknowledgedC cannot be usedD have been sent but not yet acknowledged101. ____ are the two types of transport services that the Internet provides to the applications.A TCP and UDPB connection-oriented and connectionless serviceC TCP and IPD reliable data transfer and flow control102. In the following descriptions about persistent connection, which one is not correct?A The server leaves the TCP connection open after sending a responseB Each TCP connection is closed after the server sending one objectC There are two versions of persistent connection: without pipelining and with pipeliningD The default mode of HTTP uses persistent connection with pipelining103. The field of Length in UDP segment specifies the length of ____.A the UDP segment, not including the headerB the UDP segment, including the headerC the UDP segment’s headerD the Length field104. In TCP segment header, which field can implement the reliable data transfer?A source port number and destination port numberB sequence number and ACK numberC urgent data pointerD Receive window105. In the following four descriptions about TCP connection management, which one is not correct?A Either of the two processes participating in a TCP connection can end the connectionB If the FIN bit is set to 1, it means that it wants to close the connectionC In the first two step of the three-way handshake, the client and server randomly choose an initial sequence numberD In the three segments of the three-way handshake, the SYN bit must be set to 1 106. Suppose host A sends two TCP segments back to back to host B over a TCP connection. The first segment has sequence number 42, and the second has sequence number 110. If the 1st is lost and 2nd arrives at host B. What will be the acknowledgment number?A 43B ACK42C 109D ACK1101.Consider sending an object of size O=500,000bytes from server to client. LetS=500 bytes and RTT=0.2s. Suppose the transport protocol uses static windows with window size 5. For a transmission rate of 100Kbps, determine the latency for sending the whole object. Recall the number of windows K=O/ WS), and there is K-1 stalled state (that is idle time gaps).2.Consider the following plot of TCP congestion window size as a function of time.Fill in the blanks as follow:a) The initial value of Threshold at the first transmission round is ____. b) The value of Threshold at the 11st transmission round is ____. c) The value of Threshold at the 21st transmission round is ____. d) After the 9th transmission round, segment loss detected by ____.(A) Timeout(B) Triple duplicate ACKe) After the 19th transmission round, segment loss detected by ____.(A) Timeout(B) Triple duplicate ACKf) During ____ transmission round, the 18th segment is sent.3.Consider the TCP reliable data transfer in the given graph. If in Segment 1’s Sequence number =10,data=“AC”, please fill in the following blanks. a) In Segment 2, ACK number=____;b) In Segment 3, Sequence number =____; data=“0123456789”c) If there are some bits corrupted in segment 3 when it arrives Host B, then the ACK number in Segment 5 is ____; and the ACK number in Segment 6 is ____.14 180 26 3000 2 6 4 8 10 12 16 20 22 240 28 32Congestion window sizeTransmission round48121612345674. The client A wants to request a Web page from Server B. Suppose the URL of the page is 172.16.0.200/experiment, and also it wants to receive French version of object. The time-sequence diagram is shown below, please fill in the blanks.12345Packet① to Packet③are TCP connection’s segment, then:Packet ①: SYN flag bit= aACK flag bit= bSequence number= 92Packet ②: SYN flag bit=1ACK flag bit= c Sequence number=100 Packet ③: SYN flag bit= d ACK flag bit=1Sequence number= e5. Consider sending an object of size O=100 Kbytes from server to client. Let S=536 bytes and RTT=100msec. Suppose the transport protocol uses static windows with window size W.(1) For a transmission rate of 25 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency. (2) Repeat (1) for 100 kbps.6. Consider the following plot of TCP congestion window size as a function of time. Please fill in the blanks as below.a) The initial value of Threshold at the first transmission round is____. b) The value of Threshold at the 11th transmission round is_____. c) The value of Threshold at the 21st transmission round is_____.14 18 26 30 0 2 6 4 8 10 12 16 20 22 24 28 32 Congestion window sizeTransmission round481216d) After the 9th transmission round, _____ occurs.e) After the 19th transmission round, ____ are detected.。

计算机网络第四版(课后练习+答案)

计算机网络第四版(课后练习+答案)

计算机⽹络第四版(课后练习+答案)第 1 章概述1.假设你已经将你的狗Berníe 训练成可以携带⼀箱3 盒8mm 的磁带,⽽不是⼀⼩瓶内哇地. (当你的磁盘满了的时候,你可能会认为这是⼀次紧急事件。

)每盒磁带的窑最为7GB 字节;⽆论你在哪⾥,狗跑向你的速度是18km/h 。

请问,在什么距离范围内Berníe的数据传输速率会超过⼀条数据速率为150Mbps的传输线?答:狗能携带21千兆字节或者168千兆位的数据。

18 公⾥/⼩时的速度等于0.005 公⾥/秒,⾛过x公⾥的时间为x / 0.005 = 200x 秒,产⽣的数据传输速度为168/200x Gbps或者840 /x Mbps。

因此,与通信线路相⽐较,若x<5.6 公⾥,狗有更⾼的速度。

6. ⼀个客户·服务器系统使⽤了卫星⽹络,卫星的⾼度为40 000km. 在对⼀个请求进⾏响应的时候,最佳情形下的延迟是什么?答:由于请求和应答都必须通过卫星,因此传输总路径长度为160,000千⽶。

在空⽓和真空中的光速为300,000 公⾥/秒,因此最佳的传播延迟为160,000/300,000秒,约533 msec。

9.在⼀个集中式的⼆叉树上,有2n-1 个路出器相互连接起来:每个树节点上都布⼀个路由器。

路由器i 为了与路由器j 进⾏通信,它要给树的根发送⼀条消息。

然后树根将消息送下来给j 。

假设所有的路由器对都是等概率出现的,请推导出当n很⼤时,每条消息的平均跳数的⼀个近似表达式。

答:这意味着,从路由器到路由器的路径长度相当于路由器到根的两倍。

若在树中,根深度为1,深度为n,从根到第n层需要n-1跳,在该层的路由器为0.50。

从根到n-1 层的路径有router的0.25和n-2跳步。

因此,路径长度l为:18.OSI 的哪⼀层分别处理以下问题?答:把传输的⽐特流划分为帧——数据链路层决定使⽤哪条路径通过⼦⽹——⽹络层.28.⼀幅图像的分辨率为1024X 768 像素,每个像素⽤3 字节来表⽰。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

COMPUTER NETWORKSFOURTH EDITIONPROBLEM SOLUTIONSANDREW S. TANENBAUMVrije UniversiteitAmsterdam, The NetherlandsPRENTICE HALL PTRUPPER SADDLE RIVER, NJ 07458© 2003 Pearson Education, Inc.Publishing as Prentice Hall PTRUpper Saddle River, New Jersey 07458All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher.Printed in the United States of America10987654321ISBN0-13-046002-8Pearson Education LTD.Pearson Education Australia PTY, LimitedPearson Education Singapore, Pte. Ltd.Pearson Education North Asia Ltd.Pearson Education Canada, Ltd.Pearson Educación de Mexico, S.A. de C.V.Pearson Education — JapanPearson Education Malaysia, Pte. Ltd.PROBLEM SOLUTIONS1 SOLUTIONS TO CHAPTER1PROBLEMS1.The dog can carry21gigabytes,or168gigabits.A speed of18km/hourequals0.005km/sec.The time to travel distance x km is x/0.005=200x sec, yielding a data rate of168/200x Gbps or840/x Mbps.For x<5.6km,the dog has a higher rate than the communication line.2.The LAN model can be grown incrementally.If the LAN is just a long cable.it cannot be brought down by a single failure(if the servers are replicated)It is probably cheaper.It provides more computing power and better interactive interfaces.3.A transcontinentalfiber link might have many gigabits/sec of bandwidth,butthe latency will also be high due to the speed of light propagation over thousands of kilometers.In contrast,a56-kbps modem calling a computer in the same building has low bandwidth and low latency.4.A uniform delivery time is needed for voice,so the amount of jitter in the net-work is important.This could be expressed as the standard deviation of the delivery time.Having short delay but large variability is actually worse thana somewhat longer delay and low variability.5.No.The speed of propagation is200,000km/sec or200meters/µsec.In10µsec the signal travels2km.Thus,each switch adds the equivalent of2km of extra cable.If the client and server are separated by5000km,traversing even50switches adds only100km to the total path,which is only2%.Thus, switching delay is not a major factor under these circumstances.6.The request has to go up and down,and the response has to go up and down.The total path length traversed is thus160,000km.The speed of light in air and vacuum is300,000km/sec,so the propagation delay alone is 160,000/300,000sec or about533msec.7.There is obviously no single correct answer here,but the following pointsseem relevant.The present system has a great deal of inertia(checks and bal-ances)built into it.This inertia may serve to keep the legal,economic,and social systems from being turned upside down every time a different party comes to power.Also,many people hold strong opinions on controversial social issues,without really knowing the facts of the matter.Allowing poorly reasoned opinions be to written into law may be undesirable.The potential effects of advertising campaigns by special interest groups of one kind or another also have to be considered.Another major issue is security.A lot of people might worry about some14-year kid hacking the system and falsifying the results.2PROBLEM SOLUTIONS FOR CHAPTER 18.Call the routers A ,B ,C ,D ,and E.There are ten potential lines:AB ,AC ,AD ,AE ,BC ,BD ,BE ,CD ,CE ,and DE .Each of these has four possibilities (three speeds or no line),so the total number of topologies is 410=1,048,576.At 100ms each,it takes 104,857.6sec,or slightly more than 29hours to inspect them all.9.The mean router-router path is twice the mean router-root path.Number the levels of the tree with the root as 1and the deepest level as n.The path from the root to level n requires n −1hops,and 0.50of the routers are at this level.The path from the root to level n −1has 0.25of the routers and a length of n −2hops.Hence,the mean path length,l ,is given byl =0.5×(n −1)+0.25×(n −2)+0.125×(n −3)+...orl =i =1Σ∞n (0.5)i −i =1Σ∞i (0.5)i This expression reduces to l =n −2.The mean router-router path is thus 2n −4.10.Distinguish n +2events.Events 1through n consist of the correspondinghost successfully attempting to use the channel,i.e.,without a collision.The probability of each of these events is p (1−p )n −1.Event n +1is an idle channel,with probability (1−p )n .Event n +2is a collision.Since these n +2events are exhaustive,their probabilities must sum to unity.The proba-bility of a collision,which is equal to the fraction of slots wasted,is then just 1−np (1−p )n −1−(1−p )n .11.Among other reasons for using layered protocols,using them leads to break-ing up the design problem into smaller,more manageable pieces,and layering means that protocols can be changed without affecting higher or lower ones,12.No.In the ISO protocol model,physical communication takes place only inthe lowest layer,not in every layer.13.Connection-oriented communication has three phases.In the establishmentphase a request is made to set up a connection.Only after this phase has been successfully completed can the data transfer phase be started and data trans-ported.Then comes the release phase.Connectionless communication does not have these phases.It just sends the data.14.Message and byte streams are different.In a message stream,the networkkeeps track of message boundaries.In a byte stream,it does not.For exam-ple,suppose a process writes 1024bytes to a connection and then a little later writes another 1024bytes.The receiver then does a read for 2048bytes.With a message stream,the receiver will get two messages,of 1024bytesPROBLEM SOLUTIONS FOR CHAPTER 13each.With a byte stream,the message boundaries do not count and the receiver will get the full 2048bytes as a single unit.The fact that there were originally two distinct messages is lost.15.Negotiation has to do with getting both sides to agree on some parameters orvalues to be used during the communication.Maximum packet size is one example,but there are many others.16.The service shown is the service offered by layer k to layer k +1.Anotherservice that must be present is below layer k ,namely,the service offered to layer k by the underlying layer k −1.17.The probability,P k ,of a frame requiring exactly k transmissions is the proba-bility of the first k −1attempts failing,p k −1,times the probability of the k -th transmission succeeding,(1−p ).The mean number of transmission is then justk =1Σ∞kP k =k =1Σ∞k (1−p )p k −1=1−p 1 18.(a)Data link layer.(b)Network layer.19.Frames encapsulate packets.When a packet arrives at the data link layer,theentire thing,header,data,and all,is used as the data field of a frame.The entire packet is put in an envelope (the frame),so to speak (assuming it fits).20.With n layers and h bytes added per layer,the total number of header bytesper message is hn ,so the space wasted on headers is hn .The total message size is M +nh ,so the fraction of bandwidth wasted on headers is hn /(M +hn ).21.Both models are based on layered protocols.Both have a network,transport,and application layer.In both models,the transport service can provide a reliable end-to-end byte stream.On the other hand,they differ in several ways.The number of layers is different,the TCP/IP does not have session or presentation layers,OSI does not support internetworking,and OSI has both connection-oriented and connectionless service in the network layer.22.TCP is connection oriented,whereas UDP is a connectionless service.23.The two nodes in the upper-right corner can be disconnected from the rest bythree bombs knocking out the three nodes to which they are connected.The system can withstand the loss of any two nodes.24.Doubling every 18months means a factor of four gain in 3years.In 9years,the gain is then 43or 64,leading to 6.4billion hosts.My intuition says that is much too conservative,since by then probably every television in the world and possibly billions of other appliances will be on home LANs connected to4PROBLEM SOLUTIONS FOR CHAPTER1the Internet.The average person in the developed world may have dozens of Internet hosts by then.25.If the network tends to lose packets,it is better to acknowledge each oneseparately,so the lost packets can be retransmitted.On the other hand,if the network is highly reliable,sending one acknowledgement at the end of the entire transfer saves bandwidth in the normal case(but requires the entirefile to be retransmitted if even a single packet is lost).26.Small,fixed-length cells can be routed through switches quickly,and com-pletely in hardware.Small,fixed-size cells also make it easier to build hardware that handles many cells in parallel.Also,they do not block transmission lines for very long,making it easier to provide quality-of-service guarantees.27.The speed of light in coax is about200,000km/sec,which is200meters/µsec.At10Mbps,it takes0.1µsec to transmit a bit.Thus,the bit lasts0.1µsec in time,during which it propagates20meters.Thus,a bit is20meters long here.28.The image is1024×768×3bytes or2,359,296bytes.This is18,874,368bits.At56,000bits/sec,it takes about337.042sec.At1,000,000bits/sec,it takes about18.874sec.At10,000,000bits/sec,it takes about1.887sec.At 100,000,000bits/sec,it takes about0.189sec.29.Think about the hidden terminal problem.Imagine a wireless network offivestations,A through E,such that each one is in range of only its immediate neighbors.Then A can talk to B at the same time D is talking to E.Wireless networks have potential parallelism,and in this way differ from Ethernet. 30.One disadvantage is security.Every random delivery man who happens to bein the building can listen in on the network.Another disadvantage is reliabil-ity.Wireless networks make lots of errors.A third potential problem is bat-tery life,since most wireless devices tend to be mobile.31.One advantage is that if everyone uses the standard,everyone can talk toeveryone.Another advantage is that widespread use of any standard will give it economies of scale,as with VLSI chips.A disadvantage is that the political compromises necessary to achieve standardization frequently lead to poor standards.Another disadvantage is that once a standard has been widely adopted,it is difficult to change,,even if new and better techniques or methods are discovered.Also,by the time it has been accepted,it may be obsolete.32.There are many examples,of course.Some systems for which there is inter-national standardization include compact disc players and their discs,Walk-man tape players and audio cassettes,cameras and35mmfilm,and automatedPROBLEM SOLUTIONS FOR CHAPTER 15teller machines and bank cards.Areas where such international standardiza-tion is lacking include VCRs and videotapes (NTSC VHS in the U.S.,PAL VHS in parts of Europe,SECAM VHS in other countries),portable tele-phones,lamps and lightbulbs (different voltages in different countries),electr-ical sockets and appliance plugs (every country does it differently),photo-copiers and paper (8.5x 11inches in the U.S.,A4everywhere else),nuts and bolts (English versus metric pitch),etc.SOLUTIONS TO CHAPTER 2PROBLEMS1.a n =πn−1 ,b n =0,c =1.2.A noiseless channel can carry an arbitrarily large amount of information,no matter how often it is sampled.Just send a lot of data per sample.For the 4kHz channel,make 8000samples/sec.If each sample is 16bits,the channel can send 128kbps.If each sample is 1024bits,the channel can send 8.2Mbps.The key word here is ‘‘noiseless.’’With a normal 4kHz channel,the Shannon limit would not allow this.ing the Nyquist theorem,we can sample 12million times/sec.Four-level signals provide 2bits per sample,for a total data rate of 24Mbps.4.A signal-to-noise ratio of 20dB means S/N =100.Since log 2101is about6.658,the Shannon limit is about 19.975kbps.The Nyquist limit is 6kbps.The bottleneck is therefore the Nyquist limit,giving a maximum channel capacity of 6kbps.5.To send a T1signal we need H log 2(1+S /N )=1.544×106with H =50,000.This yields S /N =230−1,which is about 93dB.6.A passive star has no electronics.The light from one fiber illuminates a number of others.An active repeater converts the optical signal to an electri-cal one for further processing.e ∆f =c ∆λ/λ2with ∆λ=10−7meters and λ=10−6meters.This gives a bandwidth (∆f )of 30,000GHz.8.The data rate is 480×640×24×60bps,which is 442Mbps.For simplicity,let us assume 1bps per Hz.From Eq.(2-3)we get ∆λ=λ2∆f /c .We have ∆f =4.42×108,so ∆λ=2.5×10−6microns.The range of wavelengths used is very short.9.The Nyquist theorem is a property of mathematics and has nothing to do with technology.It says that if you have a function whose Fourier spectrum does not contain any sines or cosines above f ,then by sampling the function at a6PROBLEM SOLUTIONS FOR CHAPTER2frequency of2f you capture all the information there is.Thus,the Nyquist theorem is true for all media.10.In the text it was stated that the bandwidths(i.e.,the frequency ranges)of thethree bands were approximately equal.From the formula∆f=c∆λ/λ2,it is clear that to get a constant∆f,the higher the frequency,the larger∆λhas to be.The x-axis in thefigure isλ,so the higher the frequency,the more∆λyou need.In fact,∆λis quadratic inλ.The fact that the bands are approxi-mately equal is an accidental property of the kind of silicon used.11.Start withλf=c.We know that c is3×108m/s.Forλ=1cm,we get30GHz.Forλ=5m,we get60MHz.Thus,the band covered is60MHz to30 GHz.12.At1GHz,the waves are30cm long.If one wave travels15cm more thanthe other,they will arrive out of phase.The fact that the link is50km long is irrelevant.13.If the beam is off by1mm at the end,it misses the detector.This amounts toa triangle with base100m and height0.001m.The angle is one whosetangent is thus0.00001.This angle is about0.00057degrees.14.With66/6or11satellites per necklace,every90minutes11satellites passoverhead.This means there is a transit every491seconds.Thus,there will be a handoff about every8minutes and11seconds.15.The satellite moves from being directly overhead toward the southern hor-izon,with a maximum excursion from the vertical of2φ.It takes24hours to go from directly overhead to maximum excursion and then back.16.The number of area codes was8×2×10,which is160.The number ofprefixes was8×8×10,or640.Thus,the number of end offices was limited to102,400.This limit is not a problem.17.With a10-digit telephone number,there could be1010numbers,althoughmany of the area codes are illegal,such as000.However,a much tighter limit is given by the number of end offices.There are22,000end offices, each with a maximum of10,000lines.This gives a maximum of220million telephones.There is simply no place to connect more of them.This could never be achieved in practice because some end offices are not full.An end office in a small town in Wyoming may not have10,000customers near it,so those lines are wasted.18.Each telephone makes0.5calls/hour at6minutes each.Thus,a telephoneoccupies a circuit for3minutes/hour.Twenty telephones can share a circuit, although having the load be close to100%(ρ=1in queueing terms)implies very long wait times).Since10%of the calls are long distance,it takes200 telephones to occupy a long-distance circuit full time.The interoffice trunkPROBLEM SOLUTIONS FOR CHAPTER27 has1,000,000/4000=250circuits multiplexed onto it.With200telephones per circuit,an end office can support200×250=50,000telephones.19.The cross-section of each strand of a twisted pair isπ/4square mm.A10-kmlength of this material,with two strands per pair has a volume of 2π/4×10−2m3.This volume is about15,708cm3.With a specific gravity of9.0,each local loop has a mass of141kg.The phone company thus owns1.4×109kg of copper.At3dollars each,the copper is worth about4.2bil-lion dollars.20.Like a single railroad track,it is half duplex.Oil canflow in either direction,but not both ways at once.21.Traditionally,bits have been sent over the line without any error correctingscheme in the physical layer.The presence of a CPU in each modem makes it possible to include an error correcting code in layer1to greatly reduce the effective error rate seen by layer2.The error handling by the modems can be done totally transparently to layer2.Many modems now have built in error correction.22.There are four legal values per baud,so the bit rate is twice the baud rate.At1200baud,the data rate is2400bps.23.The phase shift is always0,but two amplitudes are used,so this is straightamplitude modulation.24.If all the points are equidistant from the origin,they all have the same ampli-tude,so amplitude modulation is not being used.Frequency modulation is never used in constellation diagrams,so the encoding is pure phase shift key-ing.25.Two,one for upstream and one for downstream.The modulation schemeitself just uses amplitude and phase.The frequency is not modulated.26.There are256channels in all,minus6for POTS and2for control,leaving248for data.If3/4of these are for downstream,that gives186channels for downstream.ADSL modulation is at4000baud,so with QAM-64(6 bits/baud)we have24,000bps in each of the186channels.The total bandwidth is then4.464Mbps downstream.27.A5-KB Web page has40,000bits.The download time over a36Mbps chan-nel is1.1msec.If the queueing delay is also1.1msec,the total time is2.2 msec.Over ADSL there is no queueing delay,so the download time at1 Mbps is40msec.At56kbps it is714msec.28.There are ten4000Hz signals.We need nine guard bands to avoid anyinterference.The minimum bandwidth required is4000×10+400×9= 43,600Hz.8PROBLEM SOLUTIONS FOR CHAPTER229.A sampling time of125µsec corresponds to8000samples per second.According to the Nyquist theorem,this is the sampling frequency needed to capture all the information in a4kHz channel,such as a telephone channel.(Actually the nominal bandwidth is somewhat less,but the cutoff is not sharp.)30.The end users get7×24=168of the193bits in a frame.The overhead istherefore25/193=13%.31.In both cases8000samples/sec are possible.With dibit encoding,two bitsare sent per sample.With T1,7bits are sent per period.The respective data rates are16kbps and56kbps.32.Ten frames.The probability of some random pattern being010*******(on adigital channel)is1/1024.33.A coder accepts an arbitrary analog signal and generates a digital signal fromit.A demodulator accepts a modulated sine wave only and generates a digital signal.34.(a)64kbps.(b)32kbps.(c)8kbps.35.The signal must go from0to A in one quarter of a wave—that is,in a timeT/4.In order to track the signal,8steps mustfit into the quarter wave,or32 samples per full wave.The time per sample is1/x so the full period must be long enough to contain32samples—that is,T>32/x or f max=x/32.36.A drift rate of10−9means1second in109seconds or1nsec per second.AtOC-1speed,say,50Mbps,for simplicity,a bit lasts for20nsec.This means it takes only20seconds for the clock to drift off by one bit.Consequently, the clocks must be continuously synchronized to keep them from getting too far apart.Certainly every10sec,preferably much more often.37.Of the90columns,86are available for user data in OC-1.Thus,the usercapacity is86×9=774bytes/frame.With8bits/byte,8000frames/sec,and 3OC-1carriers multiplexed together,the total user capacity is 3×774×8×8000,or148.608Mbps.38.VT1.5can accommodate8000frames/sec×3columns×9rows×8bits=1.728Mbps.It can be used to accommodate DS-1.VT2can accommodate8000frames/sec×4columns×9rows×8bits=2.304Mbps.It can be used to accommodate European CEPT-1service.VT6can accommodate8000 frames/sec×12columns×9rows×8bits=6.912Mbps.It can be used to accommodate DS-2service.39.Message switching sends data units that can be arbitrarily long.Packetswitching has a maximum packet size.Any message longer than that is split up into multiple packets.40.The OC-12c frames are12×90=1080columns of9rows.Of these,12×3=36columns are taken up by line and section overhead.This leaves an SPE of1044columns.One SPE column is taken up by path overhead, leaving1043columns for user data.Since each column holds9bytes of8 bits,an OC-12c frame holds75,096user data bits.With8000frames/sec,the user data rate is600.768Mbps.41.The three networks have the following properties:star:best case=2,average case=2,worst case=2ring:best case=1,average case=n/4,worst case=n/2full interconnect:best case=1,average case=1,worst case=142.With circuit switching,at t=s the circuit is set up;at t=s+x/b the last bitis sent;at t=s+x/b+kd the message arrives.With packet switching,the last bit is sent at t=x/b.To get to thefinal destination,the last packet must be retransmitted k−1times by intermediate routers,each retransmission tak-ing p/b sec,so the total delay is x/b+(k−1)p/b+kd.Packet switching is faster if s>(k−1)p/b.43.The total number of packets needed is x/p,so the total data+header traffic is(p+h)x/p bits.The source requires(p+h)x/pb sec to transmit these bits.The retransmissions of the last packet by the intermediate routers take up a total of(k−1)(p+h)/b sec.Adding up the time for the source to send all the bits,plus the time for the routers to carry the last packet to the destination, thus clearing the pipeline,we get a total time of(p+h)x/pb+ (p+h)(k−1)/b sec.Minimizing this quantity with respect to p,wefind hx/(k−1).p=√44.Each cell has six neighbors.If the central cell uses frequency group A,its sixneighbors can use B,C,B,C,B,and C respectively.In other words,only3 unique cells are needed.Consequently,each cell can have280frequencies.45.First,initial deployment simply placed cells in regions where there was highdensity of human or vehicle population.Once they were there,the operator often did not want to go to the trouble of moving them.Second,antennas are typically placed on tall buildings or mountains.Depending on the exact loca-tion of such structures,the area covered by a cell may be irregular due to obs-tacles near the transmitter.Third,some communities or property owners do not allow building a tower at a location where the center of a cell falls.In such cases,directional antennas are placed at a location not at the cell center.46.If we assume that each microcell is a circle100m in diameter,then each cellhas an area of2500π.If we take the area of San Francisco,1.2×108m2and divide it by the area of1microcell,we get15,279microcells.Of course,it is impossible to tile the plane with circles(and San Francisco is decidedly three-dimensional),but with20,000microcells we could probably do the job.47.Frequencies cannot be reused in adjacent cells,so when a user moves fromone cell to another,a new frequency must be allocated for the call.If a user moves into a cell,all of whose frequencies are currently in use,the user ’s call must be terminated.48.It is not caused directly by the need for backward compatibility.The 30kHzchannel was indeed a requirement,but the designers of D-AMPS did not have to stuff three users into it.They could have put two users in each channel,increasing the payload before error correction from 260×50=13kbps to 260×75=19.5kbps.Thus,the quality loss was an intentional trade-off to put more users per cell and thus get away with bigger cells.49.D-AMPS uses 832channels (in each direction)with three users sharing a sin-gle channel.This allows D-AMPS to support up to 2496users simultane-ously per cell.GSM uses 124channels with eight users sharing a single channel.This allows GSM to support up to 992users simultaneously.Both systems use about the same amount of spectrum (25MHz in each direction).D-AMPS uses 30KHz ×892=26.76MHz.GSM uses 200KHz ×124=24.80MHz.The difference can be mainly attributed to the better speech quality provided by GSM (13Kbps per user)over D-AMPS (8Kbps per user).50.The result is obtained by negating each of A ,B ,and C and then adding thethree chip sequences.Alternatively the three can be added and then negated.The result is (+3+1+1−1−3−1−1+1).51.By de finitionS d T ≡m 1 i =1ΣmS i T i If T sends a 0bit instead of 1bit,its chip sequence is negated,with the i -th element becoming −T i .Thus,S d T ≡m 1 i =1Σm S i (−T i )=−m 1 i =1ΣmS i T i =052.When two elements match,their product is +1.When they do not match,their product is −1.To make the sum 0,there must be as many matches as mismatches.Thus,two chip sequences are orthogonal if exactly half of the corresponding elements match and exactly half do not match.53.Just compute the four normalized inner products:(−1+1−3+1−1−3+1+1)d (−1−1−1+1+1−1+1+1)/8=1(−1+1−3+1−1−3+1+1)d (−1−1+1−1+1+1+1−1)/8=−1(−1+1−3+1−1−3+1+1)d (−1+1−1+1+1+1−1−1)/8=0(−1+1−3+1−1−3+1+1)d (−1+1−1−1−1−1+1−1)/8=1The result is that A and D sent 1bits,B sent a 0bit,and C was silent.54.Ignoring speech compression,a digital PCM telephone needs 64kbps.If wedivide 10Gbps by 64kbps we get 156,250houses per cable.Current systems have hundreds of houses per cable.55.It is both.Each of the 100channels is assigned its own frequency band(FDM),and on each channel the two logical streams are intermixed by TDM.This example is the same as the AM radio example given in the text,but nei-ther is a fantastic example of TDM because the alternation is irregular.56.A 2-Mbps downstream bandwidth guarantee to each house implies at most 50houses per coaxial cable.Thus,the cable company will need to split up the existing cable into 100coaxial cables and connect each of them directly to a fiber node.57.The upstream bandwidth is ing QPSK with 2bits/Hz,we get 74Mbps upstream.Downstream we have ing QAM-64,this is ing QAM-256,this is 1600Mbps.58.Even if the downstream channel works at 27Mbps,the user interface isnearly always 10-Mbps Ethernet.There is no way to get bits to the computer any faster than 10-Mbps under these circumstances.If the connection between the PC and cable modem is fast Ethernet,then the full 27Mbps may be ually,cable operators specify 10Mbps Ethernet because they do not want one user sucking up the entire bandwidth.SOLUTIONS TO CHAPTER 3PROBLEMS1.Since each frame has a chance of 0.8of getting through,the chance of the whole message getting through is 0.810,which is about 0.107.Call this value p .The expected number of transmissions for an entire message is thenE =i =1Σ∞ip (1−p )i −1=p i =1Σ∞i (1−p )i −1To reduce this,use the well-known formula for the sum of an in finite geometric series,S =1=1Σ∞αi =1−α1 Differentiate both sides with respect to αto get S ′=i =1Σ∞i αi −1=(1−α)21Now useα=1−p to get E=1/p.Thus,it takes an average of1/0.107,or about9.3transmissions.2.The solution is(a)0000010001000111111000111110000001111110(b)0111111001000111111000111110000011100000111000000111111001111110(c)0111111001000111110100011111000000011111010011111103.After stuffing,we get A B ESC ESC C ESC ESC ESC FLAG ESC FLAG D.4.If you could always count on an endless stream of frames,oneflag byte mightbe enough.But what if a frame ends(with aflag byte)and there are no new frames for15minutes.How will the receiver know that the next byte is actu-ally the start of a new frame and not just noise on the line?The protocol is much simpler with starting and endingflag bytes.5.The output is011110111110011111010.6.It is possible.Suppose that the original text contains the bit sequence01111110as data.After bit stuffing,this sequence will be rendered as 011111010.If the second0is lost due to a transmission error,what is received is01111110,which the receiver sees as end of frame.It then looks just before the end of the frame for the checksum and verifies it.If the check-sum is16bits,there is1chance in216that it will accidentally be correct, leading to an incorrect frame being accepted.The longer the checksum,the lower the probability of an error getting through undetected,but the probabil-ity is never zero.7.If the propagation delay is very long,as in the case of a space probe on ornear Mars or Venus,forward error correction is indicated.It is also appropri-ate,in a military situation in which the receiver does not want to disclose his location by transmitting.If the error rate is low enough that an error-correcting code is good enough,it may also be simpler.Finally,real-time systems cannot tolerate waiting for retransmissions.8.Making one change to any valid character cannot generate another valid char-acter due to the nature of parity bits.Making two changes to even bits or two changes to odd bits will give another valid character,so the distance is2.9.Parity bits are needed at positions1,2,4,8,and16,so messages that do notextend beyond bit31(including the parity bits)fit.Thus,five parity bits are sufficient.The bit pattern transmitted is01101011001100111010110.The encoded value is101001001111.。

相关文档
最新文档