大连交通大学《计算机网络》期末考试复习习题(精简版)

合集下载

2022年大连交通大学计算机网络技术专业《计算机网络》科目期末试卷A(有答案)

2022年大连交通大学计算机网络技术专业《计算机网络》科目期末试卷A(有答案)

2022年大连交通大学计算机网络技术专业《计算机网络》科目期末试卷A(有答案)一、选择题1、假设OS1参考模型的应用层欲发送400B的数据(无拆分),除物理层和应用层之外,其他各层在封装PDU时均引入20B的额外开销,则应用层数据传输率约为()。

A.80%B.83%C.87%D.91%2、比特的传播时延与链路带宽的关系是()。

A.没有关系B.反比关系C.正比关系D.无法确定3、UDP数据报比IP数据报多提供了()服务。

A.流量控制B.拥塞控制C.端口功能D.路由转发4、在一个网络中,最大TPDU尺寸为256B,最大的TPDU存活时间为20s,使用8位序列号,则每条连接的最大数据传输速率是()。

A.16112bit/sB.26112bitsC.36112bi/sD.461l2bit/s5、以太网帧的最小长度是()。

A.32B.64C.128D.2566、下列关于交换机的叙述中,正确的是()A.以太网交换机本质上是一种多端口网桥B.通过交换机互连的一组工作站构成一个冲突域C.交换机每个端口所连网络构成一个独立的广播域D.以太网交换机可实现采用不同网络层协议的网络互连7、为了使模拟信号传输得更远,可以采用的设备是()。

A.中继器B.放大器C.交换机D.路由器8、因特网上的数据交换方式是()。

A.电路交换B.报文交换C.分组交换D.光交换9、下列关于单模光纤的描述中,正确的是()A.单模光纤的成本比多模光纤的成本低B.单模光纤传输距离比多模光纤短C.光在单模光纤中通过内部反射来传播D.单模光纤的直径一般比多模光纤小10、通过"Internet信息服务(IIS)管理器”管理单元可以配置FTP服务器,若将控制端口设置为2222,则数据端口自动设置为()。

A.20B.21C.2223D.222111、在TCP/IP协议簇中,应用层的各种服务是建立在传输层提供服务的基础上的。

下列协议组中()需要使用传输层的TCP建立连接。

2022年大连交通大学公共课《大学计算机基础》期末试卷A(有答案)

2022年大连交通大学公共课《大学计算机基础》期末试卷A(有答案)

2022年大连交通大学公共课《大学计算机基础》期末试卷A(有答案)一、单项选择题1、下列数据中,最小数是()A.(10111100)2B. (162)sC. (264)10D. (CD)162、下面关于二进制的运算中,错误的是()A.10+01=11 B.11+01=111 C.11-01=10 D.10-01=013、与二进制数0111对应的十进制数是()A.5B.6C.7D.84、下面关于二进制的运算中,错误的是()A.10+01=11 B.11+01=111 C.11-01=10 D.10-01=015、计算机病毒造成的危害是()A.使磁盘发霉B.破坏计算机系统C.使计算机内存芯片损坏D.使计算机系统突然掉电6、目前,一张直径为12cm的单面单层DVD光盘存储容量一般可以达到()A.650KBB.3.2GBC. 4.7GBD.6.5GB7、微型计算机硬件系统中最核心的部件是()A. 显示器B. CPUD. I/O设备8、在Windows 7用户账户管理中,标准账户可以()A.在本地计算机安装新软件和硬件B.使用本地计算机中的软件C.更改计算机安全设置D.创建高级用户9、在Windows 7中,显示3D桌面效果的快捷键是()A.Windows+D 键B.Windows+P 键C.Windows+Tab 键D.Windows+Alt 键10、对于鼠标操作,下列叙述不正确的是()A.双击速度可调B.可以双击C.可以三击D.左右键功能不可交换11、要移动Windows 7应用程序窗口,可用鼠标拖动窗口中的()A.边框B.滚动条D.控制菜单12、在Windows 7资源管理器中,删除U盘中文件的操作是将文件()A.放入回收站B.暂时保存到硬盘中C.从U盘中清除D.改名后保存在U盘中13、在Windows 7中,终止应用程序的正确方法是()A.用鼠标双击该应用程序窗口左上角的控制菜单图标B.将应用程序窗口最小化成图标C.用鼠标双击应用程序窗口右上角的还原按钮D.用鼠标双击应用程序窗口中的标题栏14、在Word2010中,对已选中的浮于文字上方的图片位置向上微调应使用()A "Alt+向上键"B"Ctrl+向上键"C"Esc+向上键"D"Shif+向上键"15、在Word 2010中,对同一个文档的两次不同的修订版本进行比较,应选择。

《计算机网络》期末考试试卷(A卷)试题答案

《计算机网络》期末考试试卷(A卷)试题答案

《计算机网络》期末考试试卷(A卷)试题答案一、填空题(每小题2分,共20分)DDCCD DBBBB二、填空题(每小题1分,共10分)1、拓扑结构;2、请求;3、网络接口层;4、分组交换;5、成帧与帧同步;6、广播;7、网络;8、路由选择;9、UDP、UDP;10、单向函数三、简答题(每小题4分,共20分)1、列出OSI参考模型和TCP/IP参考模型的主要相同点和不同点。

答:⑴相同点:①都基于分层协议,都有网络层、传输层和应用层;②传输服务都能提供可靠的端对端的字节流。

(2分)⑵不同点:①层的数目不同;②TCP/IP支持网络互连,OSI不支持网络互连;③TCP/IP网络层只提供无连接的服务,OSI中既有面向连接的服务,也有无连接的服务。

(2分)2、分析PPPoE协议过程。

答:PPPoE协议过程包括两个阶段,即:发现阶段和会话阶段。

(1分)发现阶段主要是选择访问集中器,确定所要建立的PPP会话标识符,同时获取对方点到点的连接信息。

典型的发现阶段分为4个步骤:⑴PPPoE活动发现启动PADI;⑵PPPoE活动发现响应PADO;⑶PPPoE活动发现请求PADR;⑷PPPoE活动发现确认PADS。

(2分)在完成了上述4个步骤之后,双方就可以进入会话阶段了。

PPPoE会话阶段执行标准的PPP过程。

(1分)3、说明CSMA/CD方法的基本工作原理。

答:CSMA/CD,即带碰撞检测的载波侦听多路访问协议,基本原理是:站点使用CSMA协议进行数据发送;(1分)在发送期间如果检测到碰撞,立即终止发送,并发出一个瞬间干扰信号,使所有的站点都知道发生了碰撞;(1分)在发出干扰信号后,等待一段随机时间,再重复上述过程。

(1分)因此,CSMA/CD的工作状态分为传输周期、竞争周期和空闲周期。

(1分)4、从多个角度比较虚电路和数据报这两种服务的优缺点。

答:数据报服务和虚电路服务是分组交换广域网向高层提供的两类服务,即无连接的网络服务和面向连接的网络服务的具体实现。

计算机网络期末复习资料(试题及答案)

计算机网络期末复习资料(试题及答案)

计算机网络期末复习资料(试题及答案)第一部分:选择题1. 在计算机网络中,ARQ是指()。

A. 自动请求重传B. 自适应重传请求C. 自动重复请求D. 自适应重复请求答案:A2. 以下哪种协议属于面向连接的可靠传输协议?A. UDPB. TCPC. ICMPD. IP答案:B3. 数据链路层的主要功能是()。

A. 封装和解封装B. 路由选择C. 差错控制D. 数据加密答案:A4. 网络拓扑结构中,所有节点通过一个公共的传输媒介连接在一起的是()拓扑。

A. 总线型B. 星型C. 环型D. 网状型答案:A5. 在TCP/IP协议中,IP属于()层。

A. 应用层B. 传输层C. 网络层D. 数据链路层答案:C第二部分:简答题1. 简述分组交换和电路交换的区别。

答:分组交换与电路交换是两种常见的数据交换技术。

电路交换是一种预先建立连接并一直保持连接状态的数据交换方式,占用资源较多,但传输稳定。

分组交换则将数据划分为较小的数据包进行传输,不需要预先建立连接,资源利用率较高,但传输过程中可能出现数据丢包或延迟等问题。

2. 简述TCP协议的传输过程。

答:TCP协议是一种面向连接的可靠传输协议。

在传输数据之前,发送方和接收方需要建立连接。

传输过程中,发送方将数据分割成较小的数据块,每个数据块被封装成TCP报文段。

发送方发送TCP报文段到接收方,接收方接收到报文段后进行确认,并按序组装数据。

如果发送方没有接收到确认信息,会进行重传。

传输完成后,发送方和接收方进行连接释放。

第三部分:应用题1. 假设一个局域网内有4台计算机,IP地址分别为192.168.1.1、192.168.1.2、192.168.1.3、192.168.1.4,子网掩码为255.255.255.0。

请问这4台计算机是否在同一个子网下?答:是的,因为这4台计算机的IP地址前三个字节相同,且子网掩码相同,所以它们在同一个子网下。

2. 自动重传请求(ARQ)是一种常用的差错控制技术,请简述ARQ的工作原理。

资料:计算机网络题库(大连交通大学)chapter4

资料:计算机网络题库(大连交通大学)chapter4

Chapter 4 The Network Layer1.What is the name of a network-layer packet?()A.messageB.segmentC.datagramD.frame2.What are the two most important network-layer functions in a datagram network? ()A.forwarding & routingB.forwarding & filteringC.routing & detectingD.routing & checking3.When a packet arrives at a router’s input link, the router must move the packet to the appropriate output link, this action is called ____? ()A.ForwardingB.routingC.cut throughD.filtering4.The network layer must determine the path taken by packets as they flow from a sender to a receiver. This action is called____? ()A.ForwardingB.routingC.cut throughD.examine5.A router forwards a packet by examining the value of a field in the arriving packet’s header, and then using this value to index into the router’s forwarding table, this value is? ()A.destination IP addressB.source IP addressC.destination MAC addressD.source MAC address6.IP belongs to ____ layer? ()A.transportworkC.data linkD.physical7.Which layer provides host-to-host services? ()A.transportworkC.data linkD.physical8.Which layer provides a connection service called virtual-circuit networks and a connectionless service called datagram networks? ()A.transportworkC.data linkD.physical9.IPV4 has a ___ bit address? ()A.48B.16C.32D.6410.MAC address is ____ bits? ()A.48B.16C.32D.6411.The Internet’s network layer has three major component s, the first component is the IP protocol, the second component is the routing protocol, the final componentis____? ()A.forwardingB.address translationC.checkD.ICMP12.How many bits specify the IP protocol version in a datagram? ()A. 1 bitB. 2 bitsC. 4 bitsD.8 bits13.Most IPV4 datagram do not contain option field, how many bytes a header has in a typical IP datagram? ()A. 4 bytesB.8 bytesC.16 bytesD.20 bytes14.How many bits used in IP datagram express total length of the IP datagram? ()A. 4 bitsB.8 bitsC.16 bitsD.20 bits15.Data-grams are rarely larger than ____?()A.1500 bytesB.65535 bytesC.500 bytesD.1024 bytes16.New version of IP----IPV6 does not allow fragment in ____?()A.RouterB.HostC.Both of aboveD.None of above17.How does the TTL changed by one each time the datagram is processed by a router? ()A.decreaseB.increaseC.no changeD.always 018.Which layer protocol is indicated by the value of protocol field in IP datagram? ()A.applicationB.transportworkD.data link19.IP option is dropped in the ____ header. ()A.IPv6B.IPv4C.TCPD.UDP20.The data field in IP datagram can carry many types of data except ____. ()A.TCPB.UDPC.ICMPD.MAC21.ICMP is used for____?()A.Reliable data transferB.Error reportingC.Flow controlD.Congestion control22.Suppose you receive an IP datagram from one link and check your forwarding table to determine the outgoing link, but this outgoing link has an MTU that is smaller than the length of IP datagram. Which technology will be used? ()A.resendB.discardC.fragmentD.none23.The designer of IPv4 decided to put the job of datagram reassembly in____.()A.routerB.switchC.hubD.end system24.IP addressing assigns an address to 223.10.198.250/29, the network address for this network is____.()A.223.10.198.248B.223.10.198.250C.223.10.198.0D.223.10.0.025.If all data-grams arriving at the router from WAN have the same destination IP address, then how does the router know the internal host to which it should forward a given datagram? The trick is to use ____ table at router, and include port numbers as well as IP address in the table entries. ()A.routingB.forwardingC.ARPD.NAT translation26.When running a Telnet, FTP, or HTTP session, you may have encountered an error message such as “Destination network un-reachable”, This message had its origin in ____. ()A.IGMPB.EGPC.ICMPD.BGP27.The well-known ping program sends an (a) ____ type 8 code 0 message to the specified host. The destination hosts seeing the echo request, send back a type 0 code0 ICMP echo reply. ()A.ICMPB.IGMPC.TCPD.UDP28.Tracer-out is implemented with ____ messages. ()A.IGMPB.TCPC.UDPD.ICMP29.The standard Tracer-out program actually sends sets of ____ packets with the same TTL. ()A.oneB.twoC.threeD.four30.IPv6 increases the size of the IP address from 32bit to ____ bit. ()A.64B.128C.256D.51231.How many bytes are there in header of IPv6? ()A.8B.20C.40D.3232.IPv6 does not allow for fragmentation and reassembly at inter-media ____. ()A.routersB.switchesC.end systemD.hubs33.From sender to receivers, all packets will take the same path, this is we use a ____ service. ()A.datagramB.VCC.circuitD.Ethernet34.____ means moving packets from router’s input port to appropriate router output port? ()A.forwardingB.filteringC.routingD.switching35.____ means determining route taken by packets from source to destination?()A.forwardingB.filteringC.routingD.switching36.A router works in ____ layer? ()workingB.Data linkC.ApplicationD.Physical37.A switch works in ____ layer? ()workingB.Data linkC.ApplicationD.Physical38.Networking layer provides services between two ____.()A.HostsB.ProcessesC.ApplicationsD.Machines39.Link layer provides services between two ____. ()A.HostsB.ProcessesC.ApplicationsD.Machines40.The internet’s network layer provides a single service----that is ____.()A.Reliable data transferB.Flow controlC.Congestion controlD.Best-effort-service41.Datagram network provides network-layer____.()A.connectionless serviceB.connection serviceC.both of aboveD.neither of A and B42.VC network provides network-layer ____. ()A.connectionless serviceB.connection serviceC.both of aboveD.neither of A and B43.In VC network, each packet carries ____. ()A.VC identifierB.destination host addressC.IP addressD.Mac address44.A VC consists of three part, this three parts do not include____. ()A.Path from source to destinationB.VC numbers, one number for each link along pathC.Entries in forwarding tables in routers along pathD.Destination address45.In ____ networking, a series of packet may follow different paths and may arrive out of order? ()A.DatagramB.VCC.TCPD.None of above46.The internet is a (an) ____ network? ()A.DatagramB.VCC.Both of aboveD.None of above47.The four components of a router do not include____? ()A.Input and output portsB.Switch fabricC.Routing processorD.Switching processor48.There are three kinds of switch fabric for a router normally, those three switchfabric do not includes____?()A.Switching via memoryB.Switching via a busC.Switching via an Interconnection-NetworkD.Packet switching49.Which of the following protocol is used for error reporting? ()A.ICMPB.TCPC.IPD.UDP50.Which of the following is not a routing protocol? ()A.TCPB.RIPC.OSPFD.BGP51.IPV4 has a ___ bits address? ()A.32B.64C.16D.12852.IP address is identifier for ____. ()A.HostB.Router interfaceC.Both of aboveD.None of above53.“233.1.1.0/24”, where the /24 notation, sometimes known as a____. ()A.Subnet maskworking addressC.Host addressD.None of above54.Subnets with an 8-, ____-, and 24-bit subnet addresses were know as class A, B, and C networks respectively. ()A.9B.10C.12D.1655.IPV6 has a ___ bits address? ()A.32B.64C.16D.12856.____ means that IPv6 nodes also have a complete IPv4 implementation as well? ()A.Dual stackB.TunnelingC.Bridge connectionD.Forwarding57.____ means that IPv6 carried as payload in IPv4 data-gram among IPv4 routers? ()A.Dual stackB.TunnelingC.Bridge connectionD.Forwarding58.Typically a host is attached directly to one router, the ____ for the host. ()A.Default routerB.Source routerC.Destination routerD.Core router59.The default router of the source host is known as ____.()A.Default routerB.Source routerC.Destination routerD.Core router60.The default router of the destination host is known as ____. ()A.Default routerB.Source routerC.Destination routerD.Core router61.A path between the source and destination that has beast cost is known as____. ()A.Least cost pathB.Shortest pathrgest cost pathD.None of above62.The path with the smallest number of links between the source and the destination is known as ____. ()A.Least cost pathB.Shortest pathrgest cost pathD.None of above63.Which of following about DV is not correct? ()A.IterativeB.SynchronousC.DistributedD.Self-terminating64.Which of the following is not intra-AS routing protocol? ()A.RIPB.OSPFC.IGRPD.BGP65.RIP is a kind of ____ algorithm. ()A.DVB.LSC.Both of aboveD.Neither of A and B66.OSPF is a kind of ____ algorithm. ()A.DVB.LSC.Both of aboveD.Neither of A and B67.The router in non-backbone areas and perform only intra-AS routing is known as ____. ()A.Internal routersB.Area border routersC.Backbone routersD.Boundary routers68.____“summarize” distances to nets in own area, advertise to other Area Border routers. ()A.Internal routersB.Area border routersC.Backbone routersD.Boundary routers69.____ runs OSPF routing limited to backbone. ()A.Internal routersB.Area border routersC.Backbone routersD.Boundary routers70.____ connect to other AS’s. ()A.Internal routersB.Area border routersC.Backbone routersD.Boundary routers71.Which of the following is an inter-autonomous system routing protocol? ()A.RIPB.OSPFC.IGRPD.BGP72.____means sending a packet to all other nodes in the network. ()A.BroadcastB.MulticastC.Any-castD.Uni-cast73.A ____ packet is delivered to only a subset of network nodes. ()A.BroadcastB.MulticastC.Any-castD.Uni-cast74.Means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link. ()A.store-and-forward transmissionB.FDMC.End-to-end connectionD.TDM75.Datagram networks and virtual-circuit networks differ in ____.()A.Datagram networks are circuit-switched networks, and virtual-circuitnetworks are packet-switched networks.B.Datagram networks are packet-switched networks, and virtual-circuitnetworks are circuit-switched networks.C.Datagram networks use destination addresses and virtual-circuit networksuse VC. Numbers to forward packets toward their destination.D.Datagram networks use VC. Numbers and virtual-circuit networks usedestination addresses to forward packets toward their destination.76.The Internet’s network layer is responsible for moving network-layer packets known as ____ from one host to another. ()A.frameB.datagramC.segmentD.message77.The protocols of various layers are called ____. ()A.the protocol stackB.TCP/IPC.ISPwork protocol78.The two important network-layer functions are ____. ()A.multiplexing and de-multiplexingB.routing and forwardingC.lookup and forwardingD.routing and IP addressing79.The virtual circuit includes three identifiable phases but ____. ()A.setupB.data transferC.forwarding VC numbersD.teardown80.There are some ways to accomplish the switching in the router, which one is not included? ()A.switching via memoryB.switching via a busC.switching via hubD.switching via an interconnection81.In the router, the packet queues can form at ____.()A.institutional cacheB.switch fabricC.input portD.routing processor82.In IPV4 datagram header, which field is to ensure that datagram do not circulate forever in the network? ()A.type of serviceB.time-to-liveC.header checksumD.version83.Suppose one IP datagram of 5,000 bytes (20 bytes of IP header) and it must be forwarded to a link with an MTU of 1,500 bytes, the offset and flag of the second fragment in header are ____. ()A.185, 0B.185, 1C.370, 1D.370,084.Given the IP address 202.96.104.8/20, its subnet address is ____. ()A.202.96.104.0B.202.96.96.0C.202.96.104.255D.202.96.111.25585.If the subnet mask is 255.255.240.0, then how many bits indicate the host address? ()A.20B.24C.12D.1686.In the following four fields, which is in IPV6 header but not in IPV4? ()A.source addressB.destination addressC.versionD.flow label87.One host is attached directly to one router, the router is ____.()A.NAT routerB.gateway routerC.first-hop routerD.interval router88.The Internet’s network layer includes the following components but ____.()A.IP protocolB.the Internet Message Control ProtocolC.Routing ProtocolD.Channel Partitioning Protocol89.In the following protocols, which one is inter-AS routing protocol? ()A.RIPB.OSPFC.BGPD.ICMP90.In the following four descriptions about autonomous system, which one is not correct? ()A.An autonomous system is a collection of routers under the sameadministrative and technical control.B.All routers in an autonomous system run the same routing protocol.C.The routing algorithm running within an autonomous system is called anintra-AS routing protocol.D.The routers that connect AS-s to each other are called default router.91.In the loop of the Dijkstra’s algorithm, for node x, add y to N’, and update the cost of y’s neighbor v, then D(v) is ____. ()A.c(x, v)B.min{D(v), D(x)+c(x, v)}C.min{D(v), D(y)+c(y, v)}D.c(y, v)92.Consider the data D is 01110010001, if use even parity checking approach, the parity bit is ( ), if use odd parity checking approach, the parity bit is ____. ()A.0, 0B.0, 1C.1, 0D.1, 193.The ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces is ____.()A.filteringB.forwardingC.self-learningD.optimal routing94.Given that costs are assigned to various edge in the graph abstraction. In the following four descriptions, which one is not correct? ()A.The shortest path is the path with smallest number of links between thesource and destination.B.The least cost path is not always the shortest path.C.If all edges have same cost, the least cost path must be the shortest path.D.If all edges have various costs, the least cost path must not be the shortestpath.95.Given the IP address 202.96.104.8/20, its broadcast address is ____. ()A.202.96.104.0B.202.96.96.0C.202.96.104.255D.202.96.111.25596.If the subnet mask is 255.240.0.0, then how many bits indicate the host address? ()A.20B.12C.24D.1697.In IPV6 datagram header, the field Next-header is equivalent to the field ( ) in IPV4. ()A.upper-layer protocolB.time-to-liveC.header checksumD.version98.For one host, its source router is also called ____. ()A.NAT routerB.gateway routerC.first-hop routerD.interval router99.In the following four descriptions about link-state (LS) algorithm, which one is not correct? ()A.The LS algorithm must be aware of the cost of each link in the network.B.The LS algorithm is a decentralized algorithmC.The LS algorithm computes the least cost path between a source anddestination using complete global knowledge about the networkD.The calculation of LS algorithm can be run at one site or multiple sites 100.In the initialization of the Dijkstra’s algorithm, for node x, if y is not a neighbor of x, then D(y) is ____. ()A.0B. 1C.∞D.c(x, y)101.In DV algorithm, when one node updates its distance vector, it must ____.()A.send the updated routing table to its neighborsB.send the updated routing table to all the nodes in the ASC.send the updated routing table at randomD.do nothing102.Now we had known IP address is 211.197.3.158/26, Please compute :(1). Network address?(2). Broadcast address?(3). How many hosts are there in the network?(4). Fist host IP address?(5). Last host IP address?103.For the given topology of the network, use Dijstra’s shortest path algorithm to compute the shortest path from A to all network nodes. Give a shortest path tree and node A’s routing table.104.The topology of a network shown as below. Using Link State routing algorithm to calculate the routing table in the node A. The vectors arrive to node C as bellow: B:( 4, 0, 8, 12, 6, 2 ); D:( 13, 10, 6, 0, 9, 10 ); E:( 7, 6, 3, 9, 0, 14 ). The delays measured from C to B, D, E are 4, 2, and 3 separately. Update router C ’s route table please.1 EABDCF12522153A B C DFE。

计算机网络期末试题和答案计算机网络期末试题[完整]

计算机网络期末试题和答案计算机网络期末试题[完整]

计算机网络期末试题及答案A卷填空题(每空 1 分.共 30 分)1、在计算机网络的定义中.一个计算机网络包含多台具有__自主____功能的计算机;把众多计算机有机连接起来要遵循规定的约定和规则.即__协议_____;计算机网络的最基本特征是__资源共享_______。

2、常见的计算机网络拓扑结构有:__星型________、__网状________、总线型、和___树型________。

3、常用的传输介质有两类:有线和无线。

有线介质有__双绞线______、____同轴电缆______、__光纤________。

4、网络按覆盖的范围可分为广域网、_局域网______、___城域网____。

5、TCP/IP协议参考模型共分了_4__层.其中3、4层是_应用层______、___传输层____。

6、电子邮件系统提供的是一种___存储转发_______服务.WWW服务模式为____B/S__________。

7、B类IP地址的范围是_______________________。

8、目前无线局域网采用的拓扑结构主要有________、________、___________。

9、计算机网络的基本分类方法主要有:根据网络所覆盖的范围、根据网络上主机的组网方式.另一种是根据____信息交换方式_____。

10、数据传输的同步技术有两种:_同步传输___________和异步传输。

11、用双绞线连接两台交换机.采用_交叉线______线。

586B的标准线序是_________________________________________。

12、多路复用技术是使多路信号共同使用一条线路进行传输.或者将多路信号组合在一条物理信道上传输.以充分利用信道的容量。

多路复用分为:_______频分_________、______波分__________、______时分__________和码分多路复用。

13、VLAN(虚拟局域网)是一种将局域网从_逻辑_____上划分网段.而不是从__物理____上划分网段.从而实现虚拟工作组的新兴数据交换技术。

大连交通大学《计算机网络》期末考试复习习题(精简版)

大连交通大学《计算机网络》期末考试复习习题(精简版)

⼤连交通⼤学《计算机⽹络》期末考试复习习题(精简版)计算机⽹络复习题⼀、单项选择1.Which of following is not an application-layer protocol? ( B)A. HTTPB. TCPC.SMTPD.FTP2.The PDU of network-layer is called ( C).A. messageB. segmentC. datagramD. frame3. An HTTP client often uses the (B ) method when the user fills out a form.A.GETB. POSTC. HEADD. PUT4.The default port number of DNS is(C )A.80B.21C.53D.255.Which of the following is not a mail access protocol? ( C)A.POP3B.IMAPC.HTTPD.SMTP6.Which protocol is not a network-layer protocol? (C )A.ICMP ProtocolB.routing protocolC.PPPD.IP Protocol7.The SYN segment is used for(B ).A. TCP flow controlB. TCP connection setupC. TCP congestion controlD. Closing a TCP connection8.Which field in a TCP segment is used for flow control? ( A)A. receive windowB. sequence numberC. acknowledgementD. Internet checksum9.A (A ) is the interface between the application layer and the transport layer within a host.A. socketB. bridgeC. EthernetD. hub10.In network-layer, which protocol is used for reporting errors? ( B)A.SMTPB.ICMPC.ARPD.CSMA11.Which protocol is an intra-autonomous system routing protocol? ( D)A. ARPB. ICMPC. BGPD. RIP12.MAC address is ( B) bits long.A.32B.48C.128D.6413. ( A ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A. store-and-forward transmissionB. FDMC. end-to-end connectionD. TDM14. In the following four descriptions, which one is correct? ( C )A In C/S architecture, clients communicate with each other directly.B In C/S architecture, client has a fixed well-known address.C In P2P architecture, peers communicate with each other directly.D In P2P architecture, peer has a fixed well-known address.15.Which of following is not an application-layer protocol? ( B )A. HTTPB. TCPC. DNSD. SMTP16. ( B ) header line indicates the time and date when the object was created or last modified.A. Date:B. Last-Modified:C. Connection:D.If-Modified-Since:17.A ( A ) provides logical communication between processes runningon different hosts. A ( ) provides logical communication between hosts.A. transport-layer protocol, network-layer protocolB. network-layer protocol, transport-layer protocolC. transport-layer protocol, application-layer protocolD. network-layer protocol, link-layer protocol18.Suppose TCP sender is in slow start state and the CongWin is8, then what’s the value of CongWin after one RTT? ( D )A. 9B. 10C. 4D. 1619.( B ) header allows the receiving user agent to take an appropriate action on the message.A. Content-Transfer-Encoding:B. Content-Type:C. From:D. To:20. The request message in the conditional GET must include the header line.C/doc/8fa2aaff48649b6648d7c1c708a1284ac8500507.html st-Modified/doc/8fa2aaff48649b6648d7c1c708a1284ac8500507.html st-ReferencedC.If-Modified-SinceD.If –Referenced-Since21. Which of the following services is not provided by TCP? (A)A.Delay guarantees and bandwidth guaranteesB.Reliable data transferC.Congestion controlD.Flow control22. In the LAN,(C )protocol dynamically assign IP addresses to hosts.A.DNSB.ARPC.DHCPD.IP23. ___A_ is the ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces.A.ForwardingB.FilteringC.RoutingD.Switching24. Which of the following is not a routing protocol?( A)A.TCPB.RIPC.OSPFD. BGP25. For 10BaseT, the maximum length of the connection between an adapterand the hub is A meters.A.100B.200C.500D.1026. In a TCP segment, ___A_ is the byte-stream number of the first bytein the segment.A.sequence numberB.aCK numberC.checksumD.port number27. A ( A ) provides logical communication between processes runningon different hosts. A ( ) provides logical communication between hosts.A. transport-layer protocol, network-layer protocolB. network-layer protocol, transport-layer protocolC. transport-layer protocol, application-layer protocolD. network-layer protocol, link-layer protocol⼆、填空1. A total nodal delay includes nodal processing delay, queuing delay,transmission delay , and propagation delay.2.In the context of a communication session between a pair of processes,the process that initiates the communication is labeled as the client . The process that waits to be contacted to begin the sessionis the server .3. A process sends messages into ,and receives messages from, thenetwork through its socket .4.FTP uses two parallel TCP connections to transfer a file, they aredata connection and control connection .5. DNS protocol translates hostname to IP address.6. A transport-layer protocol provides logical communication betweenprocesses running on different hosts. A network-layer protocolprovides logical communication between hosts .7.In IPv6 datagram format, IP address is 128 bits long.8.There are three 16-bit words: 0110011001100000, 0101010101010101,1000111100001100. Their checksum is 1011 0101 0011 1101 .9.RcvBuffer=100, LastByteRcvd=58, LastByteRead=23, then RcvWindow=6510. ARP protocol can convert the IP address to MAC address.11.R TT is the time it takes for a small packet to travel from clientto server and then back to the client.12.T he Internet mail system has three components which they are user。

计算机网络期末考试试卷与答案解析

计算机网络期末考试试卷与答案解析

计算机网络期末考试试卷及答案1、网络协议的三个要素为(语法)、(语义)和(同步)。

2、TCP/IP 体系的电子系统规定电子地址的格式为(收件人名所在主机的域名)。

3、数据链路层解决的三个基本问题是(封装成帧)、(透明传输)和(差错检测)。

4、用于在主机IP地址与MAC地址进行解析的协议称为(地址解析协议ARP )协议。

5、自治系统部使用最多的路由协议是( RIP)和( OSPF 协议)。

BGP 协议外部6、已知IP地址是141.14.72.26,子网掩码是255.255.192.0,其网络地址为( 141.14.64.0 )。

7、传输层是为应用进程之间提供(端到端的逻辑通信),主要包括面向连接的( TCP )和无连接的(UDP )两个协议。

8、负责将域名翻译成IP地址的系统叫做()。

一、选择题(每题2分,共计30分)1、广域网覆盖的地理围从几十公里到几千公里。

它的通信子网主要使用( B )A、报文交换技术B、分组交换技术C、文件交换技术D、电路交换技术2、数据链路层中的数据块常被称为( C )A、信息B、分组C、帧D、比特流3、关于TCP/IP的IP层协议描述不正确的是( D )A、是点到点的协议B、不能保证IP报文的可靠传送C、是无连接的数据报传输机制D、每一个IP数据包都需要对方应答4、以下哪项不是IP路由器应具备的主要功能(C )A、转发所收到的IP数据报B、为需要转发的IP数据报选择最佳路径C、分析IP数据报所携带的TCP容D、维护路由表信息5、用集线器连接的工作站集合( A )A、同属一个冲突域,也同属一个广播域B、不属一个冲突域,但同属一个广播域C、不属一个冲突域,也不属一个广播域D、同属一个冲突域,但不属一个广播域6、标准TCP不支持的功能是( D )。

A、可靠数据传输B、全双工通信C、流量控制和拥塞控制D、组播通信7、IP地址为224.0.0.11属于( D)地址。

A、 A 类B、 B类C、C类D、D类8、高层互连是指传输层及其以上各层协议不同的网络之间的互连。

计算机网络期末考试题(含答案)

计算机网络期末考试题(含答案)

计算机网络期末考试题(含答案)第一题题目:请列举三种常见的网络拓扑结构,并简要说明每种拓扑结构的特点。

答案:1. 总线拓扑:该拓扑结构中,所有设备都连接到同一条总线上。

它的优点是简单、易于扩展,但是当总线发生故障时,整个网络将受到影响。

总线拓扑:该拓扑结构中,所有设备都连接到同一条总线上。

它的优点是简单、易于扩展,但是当总线发生故障时,整个网络将受到影响。

2. 星型拓扑:该拓扑结构中,所有设备都连接到一个中央设备(称为集线器或交换机)。

它的优点是易于安装和管理,但是如果中央设备发生故障,整个网络将无法正常工作。

星型拓扑:该拓扑结构中,所有设备都连接到一个中央设备(称为集线器或交换机)。

它的优点是易于安装和管理,但是如果中央设备发生故障,整个网络将无法正常工作。

3. 环型拓扑:该拓扑结构中,所有设备通过一个环形链路连接。

它的优点是每个设备都具有平等的通信权限,但是当环路中的一个设备发生故障,整个网络将被切断。

环型拓扑:该拓扑结构中,所有设备通过一个环形链路连接。

它的优点是每个设备都具有平等的通信权限,但是当环路中的一个设备发生故障,整个网络将被切断。

第二题题目:简要解释TCP/IP协议族中的三次握手过程。

答案:TCP/IP协议族中的三次握手过程用于建立可靠的数据传输连接。

1. 第一次握手:客户端向服务器发送一个SYN段(同步序列编号),用于请求建立连接。

客户端会将自己的初始序列号随机选择,并设置SYN标志位为1。

第一次握手:客户端向服务器发送一个SYN段(同步序列编号),用于请求建立连接。

客户端会将自己的初始序列号随机选择,并设置SYN标志位为1。

2. 第二次握手:服务器接收到客户端的SYN段后,确认请求建立连接,并发送一个带有SYN和ACK(确认)标志位的段作为响应。

服务器要在该段中将客户端的初始序列号+1,并设置自己的初始序列号。

第二次握手:服务器接收到客户端的SYN段后,确认请求建立连接,并发送一个带有SYN和ACK(确认)标志位的段作为响应。

资料:计算机网络题库(大连交通大学)chapter2

资料:计算机网络题库(大连交通大学)chapter2

Chapter 2 Application Layer1. In the following four descriptions, which one is correct?A In C/S architecture, clients communicate with each other directly.B In C/S architecture, client has a fixed well-known address.C In P2P architecture, peers communicate with each other directly.D In P2P architecture, peer has a fixed well-known address.2. In the context of a communication session between a pair of process, the process that initiates the communication is labeled as the , the process that waits to be contacted to begin the session is labeled as the .A client process, server processB sending process, receiving processC input process, output processD communicating process, connecting process3. A socket is the interface between within a host.A the network layer and the link layerB the link layer and the physical layerC the application layer and the transport layerD the transport layer and the network layer4. In the following applications, which one is a loss-tolerant application?A E-mailB file transferC instant messagingD real-time audio5. In the following applications, which one is a bandwidth-sensitive application?A E-mailB web applicationC real-time audioD file transfer6. The service of TCP can’t guarantee .A delivery of all data without errorB delivery of all data in the proper orderC the rate of deliveryD congestion control7. In the following applications, which one uses UDP?A E-mailB web applicationC file transferD DNS8. In the following descriptions about HTTP, which one is not correct?A HTTP uses non-persistent connections in its default mode.B HTTP uses TCP as its underlying transport protocol.C HTTP is a stateless protocol.D HTTP is client-server architecture.9. Suppose a web page consists of a base HTML file, 5 JEPG images and a java applet, and also suppose HTTP uses persistent connection without pipelining, the total response time is .A 2RTTB 8RTTC 12 RTTD 14RTT10. In HTTP response message, if the requested HTTP protocol version is not supported, the status code is .A 200B 301C 400D 50511. The port number of web application is .A 25B 20C 80D 5312. A network entity that satisfies HTTP requests on the behalf of an origin web server is .A server farmB server stackC proxy serverD edge server13. In the following descriptions about persistent connection, which one is not correct?A The server leaves the TCP connection open after sending a response.B Each TCP connection is closed after the server sending one object.C There are two versions of persistent connection: without pipelining and with pipelining.D The default mode of HTTP uses persistent connection with pipelining.14. FTP uses two parallel TCP connections to transfer a file, there are .A control connection and data connectionB receiving connection and sending connectionC client connection and sever connectionD program connection and process connection15. In the following descriptions about FTP, which one is correct?A FTP is p2p architecture.B FTP sends its control information out-of-band.C FTP uses persistent connection.D FTP is a stateless protocol.17. The Internet mail system has three components which they are .A user agent, SMTP, POP3B SMTP, POP3, IMAPC user agent, SMTP, IMAPD user agent, SMTP, mail server18. If the status code in HTTP response message is 404, it means .A Request succeeded.B The requested document doesn’t exit on this server.C This is a generic error code indicating that the request could not be understood by the server.D Requested object has been permanently mover.19. Comparison HTTP with SMTP, the correct is .A HTTP is a push protocol, and SMTP is a pull protocol.B In the default mode, both of them use persistent connection.C HTTP places all of the message’s objects into one message, and SMTP sends every object one by one.D HTTP requires each message to be in 7-bit ASCII format, and SMTP doesn’t impose this restriction.20. The headers in the MIME message must include except .A FromB Content-typeC Content-transfer-encodingD MIME version21. In the following protocol, which one is stateless?A POP3B SMTPC FTPD IMAP22. DNS means .A Data Name SystemB Data National SystemC Domain Name SystemD Domain National System23. There are three classes of DNS server except .A Root DNS serverB Local DNS serverC TLD server D Authoritative DNS server24. DNS provides some services except .A Host aliasingB Mail server aliasingC Load distributionD A single point of failure28. The time it takes for a small packet to travel from client to server and then back to the client is .A round-travel timeB next-hop timeC round-trip timeD prefix-matching time29. Suppose A ( with a Web-based e-mail account ) sends a message to B ( who accesses his mail server using POP3), which application-layer protocol is not used?A HTTPB SMTPC POP3D IMAP30. In the four following options, which protocol is included in Mail Access Protocol?A SMTPB DHCPC IMAPD FTP31. In FTP commands, is used to send user password to the server.A UserB PassC RetrD Stor32. The function of the additional header field in MIME Content-Type is .A to convert the message body to its origin non-ASCII formB to determine what actions it should take on message bodyC to send an E-mail to the receiving user agentD to indicate what type the message is33. In the four following options, which application is organized as hybrid of C/S and P2P architecture?A E-mailB OICQC File transferD Web application35.In the following options, from the application developer’s perspective, which is no t correct?A the network architecture is fixedB the network architecture provides a specific set of services to applicationsC the application architecture is designed by the physical devicesD the application architecture dictates how the application is organized over the various end systems36. There are three predominant architectures used in modern network applications, which one is not included?A the client-server architectureB the P2P architectureC a hybrid of the client-server and P2P architectureD a hybrid of the client-server and browser-server architecture37. In the following options about C/S architecture, which is not correct?A In C/S architecture, there is an always-on host, called the server.B In C/S architecture, there is an always-on host, called the client.C The server has a fixed, well-known address, called IP address.D Clients do not directly communicate with each other.39. A process sends messages into, and receives messages from, the network through its .A socketB programC clientD peer40. Which one is not defined by an application-layer protocol?A the types of messages exchangedB the syntax of various message typesC the semantics of the fieldsD rules for determining when and how to translate the socket41. HTTP can use two types of connections, which are .A persistent and non-persistent connectionB connection with pipelining and without pipeliningC TCP and UDPD parallel and serial connection42. takes for a small packet to travel from client to server and then back to the client.A RDTB thresholdC RTTD overhead43. The default mode of HTTP uses .A non-persistent connection with pipeliningB non-persistent connection without pipeliningC persistent connection with pipeliningD persistent connection without pipelining44. In HTTP request messages, the request line has three fields, there are .A the method field, the URL field and the HTTP version fieldB the method, the connection and URL fieldC the user-agent, the method and HTTP version fieldD the user-agent, the URL and the HTTP version field45. In the header lines of HTTP request message, if the field of Connection is close, it specifies .A the host on which object residesB what type of the user agentC that the browser wants the server to close the connection after sending the requested objectD which language can the browser receive46. In HTTP response message, if the status code is 404, it means .A request succeeded and the information is returned in the responseB requested object has been permanently movedC the requested HTTP protocol version is not supported by the serverD the requested document does not exist on this server47. is a network entity that satisfies HTTP requests on the behalf of an origin Web server.A proxy serverB local serverC DNS serverD Web server48. In the following four options about web cache, which one is not correct?A A web cache is both a server and a client at the same time.B A web cache is purchased and installed by an ISP.C A web cache can raise the response time for a client request.D A web cache can reduce traffic on an ins titution’s access link to the Internet.49. The request message in the conditional GET must include the header line.A Last-ModifiedB Last-ReferencedC If-Modified-SinceD If –Referenced-Since50. FTP uses two parallel connections to transfer a file, they are .A TCP and UDP connectionB connection with pipelining and without pipeliningC control an data connectionD client-server and browser-server connection51. In FTP commands, which one is used to ask the server to send back a list of all files in the current remote directory?A USERB PASSC LISTD RETR52. In the Internet mail system, allow users to read, reply to, forward, save and compose message.A User agentsB mail serversC SMTPD TCP53. The two key MIME headers for supporting multimedia are .A Content-Type and MIME-VersionB Content-Type and Content-Transfer-EncodingC Content-Transfer-Encoding and MIME-VersionD MIME-Version and MIME-Type54. For Internet mail, the mail access protocol is used to .A transfer mail from the recipient’s mail server to the recipient’s user agentB transfer mail from the sender’s mail server to the recipient’s mail serverC translate the mail from the sender’s mail serverD translate the mail into the recipient’s mail server55. POP3 progresses through three phases, which they are .A authorization, translation and transactionB authorization, translation and updateC authorization, transaction and updateD translation, transaction and update56. In the following four services, which one can not provide by DNS?A Host aliasingB Mail server aliasingC translate hostname to IP addressesD translate MAC addresses to IP addresses57. There are three classes of DNS servers, there are .A root DNS server, top-level domain DNS server and local DNS serverB root DNS server, top-level domain DNS server and authoritative DNS serverC root DNS server, local DNS server and authoritative DNS serverD root DNS server, local DNS server and top-level domain DNS server58. In the following four options about POP3, which one is not correct?A The user agent employed only three commands: List, Retr and QuitB The server does not carry state information across POP3 sessionsC The port number is 110D The POP3 protocol does not provide any means for a user to create remote folders and assign messages to folders.64. In the following four options about P2P file-sharing, which one is not correct?A P2P file-sharing is highly scalable.B P2P file-sharing relies on P2P architecture.C The means for locating content in different P2P file-sharing are different.D P2P file-sharing systems not only share MP3s,but also videos, software, documents and images.66. If the header line Connection is close, it means that the client wants .A persistent connection with pipeliningB persistent connection without pipeliningC nonpersistent connectionD not connection67. In HTTP request message, the entity body is empty with the method, but is used with the method.A GET, POSTB POST,GETC GET, HEAD D POST, HEAD68. In HTTP response message, if the Date: header ;one indicates the time Fri. 08 Aug. 2008 12:00:00 GMT, the Last-Modified: header line can not be .A Fri. 08 Aug. 2008 11:00:00 GMTB Fri. 08 Aug. 2008 11:30:00 GMTC Fri. 08 Aug. 2008 12:00:00 GMTD Fri. 08 Aug. 2008 12:30:00 GMT69. In the following four options, which one is not the part of cookie technology?A Cookie header lines in the HTTP response message and request message.B One cookie header file kept on the user’s end system and managed by the user’s browser.C A network entity that satisfies HTTP requests on the behalf of an origin Web server.D A back-end database at the Web site70. On-top of stateless HTTP, can be used to create a user session layer.A proxy serverB Web cacheC cookieD socket71. Processes communicate with each other by reading from and writing to .A programsB threadsC socketsD channels72. In the following four options about network architecture, which one is not correct?A The network architecture is fixed.B The network architecture provides a specific set of services to application.C The network architecture is designed by application developer.D The network architecture dictates how the application is organized over special server.73. In Client-Server architecture, the clients visit the server’s through .A client’s socketB client’s IP addressC server’s socketD server’s IP address74. can be thought of as a program that is running within end system.A processB threadC socketD context75. API means .A Application Program InterfaceB Application Process InterfaceC Appellation Program InterfaceD Appellation Process Interface76. One host can be running many network applications, so the system assigns them differentto distinguish each other.A IP addressB port numberC hostnameD section77. In the following four applications, which one is both bandwith-sensitive and require tight timing constraints?A real-time audioB file transferC E-mailD Web documents78. The port number of the Web server is .A 25B 20C 80D 808079. The port number of the mail server is .A 25B 20C 80D 808080. Look the URL /rjxy/index.html, the object’s path name is .A B /rjxyC /rjxy/index.htmlD index.html81. Each URL has components, they are .A transport protocol and object’s path nameB host name and object’s path nameC transport protocol and host nameD client name and server name1. Consider an HTTP client will request a WEB page from a WEB server. Suppose the URL of the page is /somedepartment /somedir/exp.html. The client does not want to use persistent connections and want to receive French version of the object. The user agent is Windows NT 5.1. Give the request message according to the given format.Request line:Header lines:2. Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.Solution:Request line:Header lines:3. Suppose within you Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT1,…,RTT n. Further suppose that the Web page associated with the link contains exactly one object, consisting of a small HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object?5. Suppose that you send an e-mail message whose only data is a microsoft excell attachment. What might the header lines (including MIME lines) look like?。

大学计算机网络工程期末试卷试题及答案

大学计算机网络工程期末试卷试题及答案

大学计算机网络工程期末试卷试题及答案一、选择题(每题2分,共20分)1. 下列哪个协议不属于TCP/IP协议族中的传输层协议?A. HTTPB. TCPC. UDPD. FTP答案:D2. 在OSI模型中,哪一层负责数据传输的可靠性?A. 网络层B. 传输层C. 应用层D. 链路层答案:B3. 下列哪种网络拓扑结构具有高度冗余性?A. 星型B. 环型C. 扁平型D. 树型答案:B4. 在IP地址分类中,下列哪个IP地址属于A类地址?A. 192.168.0.1B. 10.0.0.1C. 172.16.0.1D. 224.0.0.1答案:B5. 下列哪种传输方式属于异步传输?A. HDLCB. FTPC. SMTPD. Telnet答案:A6. 在TCP协议中,SYN标志位用于表示?A. 确认B. 同步C. 结束D. 数据传输答案:B7. 下列哪种网络设备用于连接不同网络的设备?A. 路由器B. 交换机C. 集线器D. 网桥答案:A8. 在网络编程中,下列哪个函数用于创建套接字?A. socket()B. bind()C. listen()D. accept()答案:A9. 下列哪种网络攻击方式属于拒绝服务攻击?A. SQL注入B. DDoSC. 木马D. 拒绝服务答案:B10. 在网络管理中,下列哪种协议用于传输网络管理信息?A. SNMPB. HTTPC. FTPD. SMTP答案:A二、填空题(每题2分,共20分)1. 在TCP/IP协议族中,IP协议属于______层。

答案:网络层2. 在OSI模型中,物理层的主要功能是实现______。

答案:比特流的传输3. 下列网络拓扑结构中,______具有高度冗余性。

答案:环型4. 在IP地址分类中,A类地址的范围是______。

答案:1.0.0.0 - 126.255.255.2555. 在TCP协议中,______标志位用于表示结束。

答案:FIN6. 在网络编程中,______函数用于接收客户端的连接请求。

计算机网络题库(大连交通大学)chapter1

计算机网络题库(大连交通大学)chapter1

Chapter 1 Computer Networks and the Internet1.The ( ) is a worldwide computer network, that is, a network that interconnects millions of computing devices throughout the world.ppt3A public InternetB IntranetC switch netD television net2.Which kind of media is not a guided media? ( )A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel3.Which kind of media is a guided media? ( )A geostationary satelliteB low-altitude satelliteC fiber opticsD wireless LAN4.The units of data exchanged by a link-layer protocol are called ( ).A FramesB SegmentsC DatagramsD bit streams5.Which of the following option belongs to the circuit-switched networks? ( )A FDMB TDMC VC networksD both A and B6.( )makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure7.( ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Store-and-forward transmissionB FDMC End-to-end connectionD TDM8.Datagram networks and virtual-circuit networks differ in that ( ).A datagram networks are circuit-switched networks, andvirtual-circuit networks are packet-switched networks.B datagram networks are packet-switched networks, andvirtual-circuit networks are circuit-switched networks.C datagram networks use destination addresses and virtual-circuitnetworks use VC. numbers to forward packets toward theirdestination.D datagram networks use VC. numbers and virtual-circuit networksuse destination addresses to forward packets toward their destination. 9.In the following options, which one is not a guided media? ( )A twisted-pair wireB fiber opticsC coaxial cableD satellite10.Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet11.In the following four descriptions, which one is correct? ( )A The traffic intensity must be greater than 1.B The fraction of lost packets increases as the traffic intensitydecreases.C If the traffic intensity is close to zero, the average queuing delaywill be close to zero.D If the traffic intensity is close to one, the average queuing delaywill be close to one.12.The Internet’s network layer is responsible for moving network-layer packets known as ( ) from one host to another.A frameB datagramC segmentD message13.The protocols of various layers are called ( ).A the protocol stackB TCP/IPC ISPD network protocol14.There are two classes of packet-switched networks: ( ) networks and virtual-circuit networks.A datagramB circuit-switchedC televisionD telephone15.Access networks can be loosely classified into three categories: residential access, company access and ( ) access.A cabledB wirelessC campusD city areaQuestion 16~17Suppose, a is the average rate at which packets arrive at the queue, R is the transmission rate, and all packets consist of L bits, then the traffic intensity is ( 16 ), and it should no greater than ( 17 ).16. A LR/aB La/RC Ra/LD LR/a17.A 2B 1C 0D -118.In the Internet, the equivalent concept to end systems is ( ).A hostsB serversC clientsD routers19.In the Internet, end systems are connected together by ( ).A copper wireB coaxial cableC communication linksD fiber optics20.End systems access to the Internet through its ( ).A modemsB protocolsC ISPD sockets21.End systems, packet switches, and other pieces of the Internet, run ( ) that control the sending and receiving of information within theInternet.A programsB processesC applicationsD protocols22.There are many private networks, such as many corporate and government networks, whose hosts cannot exchange messages withhosts outside of the private network. These private networks are often referred to as ( ).A internetsB LANC intranetsD WAN23.The internet allows ( ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications24.The Internet provides two services to its distributed applications: a connectionless unreliable service and () service.A flow controlB connection-oriented reliableC congestion controlD TCP25.It defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on thetransmission and/or receipt of a message or other event. The sentence describes ( ).A InternetB protocolC intranetD network26.In the following options, which does not define in protocol? ( )A the format of messages exchanged between two or morecommunicating entitiesB the order of messages exchanged between two or morecommunicating entitiesC the actions taken on the transmission of a message or other eventD the transmission signals are digital signals or analog signals 27.In the following options, which is defined in protocol? ( )A the actions taken on the transmission and/or receipt of a message orother eventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts28.In the following options, which does not belong to the network edge? ( )A end systemsB routersC clientsD servers29.In the following options, which belongs to the network core? ( )A end systemsB routersC clientsD servers30.In the following options, which is not the bundled with the Internet’s connection-oriented service? ( )A reliable data transferB guarantee of the transmission timeC flow controlD congestion-control31.An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes ( ).A flow controlB congestion-controlC reliable data transferD connection-oriented service32.It makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer33.It helps prevent the Internet from entering a state of gridlock. When a packet switch becomes congested, its buffers can overflow and packet loss can occur. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer34.The Internet’s connection-oriented service has a name, it is ( ).A TCPB UDPC TCP/IPD IP35.In the following options, which service does not be provided to an application by TCP?( )A reliable transportB flow controlC video conferencingD congestion control36.The Internet’s connectionless service is called ( ).A TCPB UDPC TCP/IPD IP37.In the following options, which does not use TCP?( )A SMTPB internet telephoneC FTPD HTTP38.In the following options, which does not use UDP?( )A Internet phoneB video conferencingC streaming multimediaD telnet39.There are two fundamental approaches to building a network core, ( ) and packet switching.A electrical current switchingB circuit switchingC data switchingD message switching 40.In ( ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration of the communication session.A packet-switchedB data-switchedC circuit-switchedD message-switched41.In ( ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched42.In a circuit-switched network, if each link has n circuits, for each link used by the end-to-end connection, the connection gets ( ) of thelink’s bandwidth for the duration of the connection.A a fraction 1/nB allC 1/2D n times43.For ( ), the transmission rate of a circuit is equal to the frame rate multiplied by the number of bits in a slot.A CDMAB packet-switched networkC TDMD FDM44.( ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A Queuing delayB Store-and-forward transmissionC Packet lossD Propagation45.The network that forwards packets according to host destination addresses is called ( ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram46.The network that forwards packets according to virtual-circuit numbers is called ( ) network.A circuit-switchedB packet-switchedC virtual-circuitD datagram47.In the following entries, which is not a kind of access network?( )A residential accessB company accessC wireless accessD local access48.Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 and R2,respectively. Assuming that the switch uses store-and-forward packetswitching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing delay, propagation delay, and processing delay.)( )A L/R1+L/R2B L/R1C L/R2D none of the above49.The time required to examine the packet’s header and determine where to direct the packet is part of the ( ).A queuing delayB processing delayC propagation delayD transmission delay50.The time required to propagate from the beginning of the link to the next router is ( ).A queuing delayB processing delayC propagation delayD transmission delay51.Consider sending a packet of 3000bits over a path of 5 links. Each link transmits at 1000bps. Queuing delays, propagation delay and processing delay are negligible. (6 points)(1).Suppose the network is a packet-switched virtual circuit network. VC setup time is 0.1 seconds. Suppose the sending layers add a total of 500 bits of header to each packet. How long does it take to send the file from source to destination?(2).Suppose the network is a packet-switched datagram network and a connectionless service is used. Now suppose each packet has 200 bits of header. How long does it take to send the file?(3).Suppose that the network is a circuit-switched network. Further suppose that the transmission rate of the circuit between source and destination is 200bps. Assuming 0.02s setup time and 200 bits of header appended to the packet, how long does it take to send the packet?。

本科《计算机网络》期末考试试卷及答案(K12教育文档)

本科《计算机网络》期末考试试卷及答案(K12教育文档)

本科《计算机网络》期末考试试卷及答案(word版可编辑修改)本科《计算机网络》期末考试试卷及答案(word版可编辑修改)编辑整理:尊敬的读者朋友们:这里是精品文档编辑中心,本文档内容是由我和我的同事精心编辑整理后发布的,发布之前我们对文中内容进行仔细校对,但是难免会有疏漏的地方,但是任然希望(本科《计算机网络》期末考试试卷及答案(word版可编辑修改))的内容能够给您的工作和学习带来便利。

同时也真诚的希望收到您的建议和反馈,这将是我们进步的源泉,前进的动力。

本文可编辑可修改,如果觉得对您有帮助请收藏以便随时查阅,最后祝您生活愉快业绩进步,以下为本科《计算机网络》期末考试试卷及答案(word版可编辑修改)的全部内容。

第 2 页共 2 页《计算机网络》试题开卷( ) 闭卷(√)考试时长:100分钟一、单项选择题(15*2=30分)每小题备选答案中,只有一个符合题意的正确答案.请将选定的答案,按答题卡的要求进行填涂。

多选、错选、不选均不得分。

1、快速以太网的介质访问控制方法是( )。

A.CSMA/CD B.令牌总线C.令牌环 D.100VG-AnyLan2、X.25网络是()。

A.分组交换网 B.专用线路网C.线路交换网 D.局域网3、Internet 的基本结构与技术起源于()A。

DECnet B。

ARPANETC。

NOVELL D。

UNIX 4、计算机网络中,所有的计算机都连接到一个中要传输数据,首先传输到中心节点上,然后由中心连接结构被称为 ( )A.总线结构 B.环型结构C.星型结构 D.网状结构5、NOVELL NETWARE 是()操作系统.A、网络B、通用C、实6、物理层上信息传输的基本单位称为 ( A。

段 B. 位C。

帧 D. 报文7、网桥是在()上实现不同网络的互连设备A、数据链路层B、网络层C、对话层D、物理层8、ARP协议实现的功能是:( )A、域名地址到IP地址的解析第 2 页共2 页B、IP地址到域名地址的解析C、IP地址到物理地址的解析D、物理地址到IP地址的解析9、学校内的一个计算机网络系统,属于()A.PANNC.MAN D。

计算机网络题库(大连交通大学)chapter3

计算机网络题库(大连交通大学)chapter3

Chapter 3 Transport Layer1. A transport-layer protocol provides for logical communication between ____.A Application processesB HostsC RoutersD End systems2. Transport-layer protocols run in ____.A ServersB ClientsC RoutersD End systems3. In transport layer, the send side breaks application messages into ____, passes to network layer.A FramesB SegmentsC Data-gramsD bit streams4. Services provided by transport layer include ____.A HTTP and FTPB TCP and IPC TCP and UDPD SMTP5. Which of the following services is not provided by TCP?A Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD In-order data transfers6. These two minimal transport-layer services----____ and ____----are the only two services that UDP provides!A process-to-process data delivery, error checkingB congestion control, reliable data transferC flow control, congestion controlD In-order data transfer, error checking7. Port number’s scop e is ____ to ____.A 0, 1023B 0, 65535C 0, 127D 0,2558. The port numbers ranging from ____to ____ are called well-known port number and are restricted.A 0, 1023B 0, 65535C 0, 1279. UDP socket identified by two components, they are ____.A source IP addresses and source port numbersB source IP addresses and destination IP addressesC destination IP address and destination port numbersD destination port numbers and source port numbers10. TCP socket identified by a (an) ____.A 1-tupleB 2-tupleC 3-tupleD 4-tuple11. Which of the following applications normally uses UDP services?A SMTPB Streaming multimediaC FTPD HTTP18. Which of the following about TCP connection is not correct?A It is a broadcast connectionB It is a point-to-point connectionC It is a pipelined connectionD It is a full duplex connection19. The SYN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection20. The FIN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection21.How does TCP sender perceive congestion?A Through a timeout eventB Through a receiving duplicate ACK-s eventC Both A and BD Either A or B22. Extending host-to-host delivery to process-to-process delivery is called transport-layer ____ and .A multiplexing and de-multiplexingB storing and forwardingC forwarding and filteringD switching and routing23. UDP is a ____ service while TCP is a connection-oriented service.A ConnectionlessC Connection-orientedD In-order24. The UDP header has only four fields, they are____.A Source port number, destination port number, length and checksumB Source port number, destination port number, source IP and destination IPC source IP, destination IP, source MAC address and destination MAC addressD source IP, destination IP, sequence number and ACK sequence number25. There are two 16-bit integers: 1110 0110 0110 0110, 1101 0101 0101 0101. Their checksum is____.A 0100010001000011B 1011101110111100C 1111111111111111D 100000000000000026.The maximum amount of data that can be grabbed and placed in a segment is limited by the____.A Maximum segment size (MSS)B MTUC ChecksumD Sequence number27.The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host----the so-called____.A Maximum transmission unit (MTU)B MSSC ChecksumD Sequence number28. A File size of 500,000bytes, MSS equals 1000bytes. When we want to transmit this file with TCP, the sequence number of the first segment is 0, and the sequence number of the second segment is ____.A 1000B 999C 1001D 50000029.Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide____.A Cumulative acknowledgementsB Selective acknowledgementsC 3 duplicate ACKsD positive ACKs30. Provided α=0.125, current value of Estimated-RTT is 0.4s, Sample-RTT is 0.8s, then the new value of Estimated-RTT is ____s.A 0.45B 0.6C 0.7D 0.831.Provided RcvBuffer=20,LastByteRcvd=20,LastByteRead=15, thenRcvWindow=____.A 14B 15C 16D 1032. TCP service does not provide____.A Reliable data transferB Flow controlC Delay guaranteeD Congestion control33. There are two states in TCP congestion control, which are ____.A slow start and congestion avoidanceB safe start and congestion avoidanceC slow start and congestion abandonD safe start and congestion abandon34. The transport-layer protocol provides logical communication between ____, and the network-layer protocol provides logical communication ____.A hosts, processesB processes, hostsC threads, processesD processes, threads36. If an application developer chooses ____ protocol, then the application process is almost directly talking with IP.A HTTPB RIPC CSMA/CDD UDP37. ____ maintains connection-state in the end systems. This connection state includes receive and send buffers, congestion-control parameters, and sequence and acknowledgment number parameters.A UDPB TCPC DNSD HTTP38. The host that initiates the session in the Internet is labeled as ____.A serverB user agentC clientD router39. With TCP there is no _____ between sending and receiving transport-layer entities.A flow controlB handshakingC. congestion control D VC setup40. The Internet’s ____ service helps prevent the Internet from e ntering a state of gridlock.A datagramB congestion controlC sliding windowD timeout event41. Connection setup at the transport layer involves ____.A serverB only the two end systemsC clientD router42. A ____layer protocol provides for logical communication between applications.A transportB applicationC networkingD MAC43. In static congestion window, if it satisfies W*S/R > RTT + S/R, the Latency is ____.A W*S/R – ( RTT+ S/R)B 2RTT + O/RC 2RTT + O/R + (k-1)[W* S/R- (RTT + S/R)]D 2RTT + S/R44. The receive side of transport layer reassembles segments into messages, passes to ____layer.A ApplicationB NetworkingC PhysicalD MAC45. In the following four options, which one is correct?A The variations in the SampleRTT are smoothed out in the computation of the EstimatedRTTB The timeout s hould be less than the connection’s RTTC Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current value of TimeoutInterval will necessarily be≥1 secD Suppose that the last SampleRTT in a TCP connection is equal to 1 sec. Then the current value of TimeoutInterval will necessarily be≤1 sec46. The port number used by HTTP is ____.A 80B 25C 110D 5347. The port number used by SMTP is ____.A 80B 25C 110D 5348. The port number used by pop3 is ____.A 80B 25C 110D 5349. The port number used by DNS is ____.A 80B 25C 11050. The port number used by FTP is ____.A 20 and 21B 20C 21D 5351. A UDP socket identified by a ____ tuple(s).A 2B 4C 1D 352. A TCP socket identified by a ____ tuple(s).A 2B 4C 1D 353. A TCP socket does not include____.A Source MAC addressB Source port numberC Destination IP addressD Destination port number54. Which of following about UDP is not correct.A It is a reliable data transfer protocolB It is connectionlessC no handshaking between UDP sender, receiverD it is a best effort service protocol55. DNS uses ____ service.A TCPB UDPC Both TCP and UDPD None of above56. Which of following about UDP is correct?A Finer application-level control over what data is sent, and whenB No connection establishment (which can add delay), so no delay for establish a connectionC No connection state (so, UDP can typically support many active clients)D Large packet header overhead (16-B)57. Streaming media uses a ____ service normally.A TCPB UDPC Both TCP and UDPD None of above58. The UDP header has only ____ fields.A 2C 1D 359. Which of the following does not included in UDP header.A Source port numberB Destination port numberC ChecksumD Sequence number60. Which of the following is not a pipelining protocol.A Rdt1.0B Go-Back-NC Selective repeatD TCP61. In the following four descriptions about MSS and MTU, which one is not correct?A The MSS is the maximum amount of application-layer data in the segmentB The MSS is the maximum size of the TCP segment including headersC The MSS is typically set by MTUD The MTU means the largest link-layer frame62. The job of gathering data chunks, encapsulating each data chunk with header information to create segments and passing the segments to the network is called ____.A multiplexingB de-multiplexingC forwardingD routing63. In the following four descriptions about the relationship between the transport layer and the network layer, which one is not correct?A The transport-layer protocol provides logical communication between hostsB The transport-layer protocol provides logical communication between processesC The services that a transport-layer protocol can provide are often constrained by the service model of the network-layer protocolD A computer network may make available multiple transport protocols64. Suppose the following three 8-bit bytes: 01010101, 01110000, 01001100. What’s the 1s complement of the sum of these 8-bit bytes?A 00010001B 11101101C 00010010D 1000100065. The following four descriptions about multiplexing and de-multiplexing, which one is correct?A A UDP socket is identified by a two-tuples consisting of a source port number and a destination port number.B If two UDP segment have different source port number, they may be directed to the same destination process.C If two TCP segments with different source port number, they may be directed to the same destination process.D If two TCP segments with same destination IP address and destination port number, they must be the same TCP connection.66. UDP and TCP both have the fields except ____.A source port numberB destination port numberC checksumD receive window67. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval [nextseqnum,base+N-1] corresponds to packet that ____.A can be sent immediatelyB have already been transmitted and acknowledgedC cannot be usedD have been sent but not yet acknowledged68. Which of the following about TCP is not correct?A It is a connectionless protocolB Point-to-point protocolC Reliable, in-order byte steam protocolD Pipelined protocol69. Which of the following about TCP is not correct?A It is a connectionless protocolB full duplex data transfer protocolC connection-oriented protocolD flow controlled protocol70. The maximum amount of data that can be grabbed and placed in a segment is limited by the ____.A Maximum segment size (MSS)B MTUC Sequence numberD Check sum71. The MSS is typically set by first determining the length of the largest link-layer frame that can be sent by the local sending host (the so-called____), and then will fit into a single link-layer frame.A Maximum segment size (MSS)B MTUC Sequence numberD Check sum72. The MSS is the maximum amount of ____layer data in the segment, not the maximum size of the TCP segment including headers.A ApplicationB TransportC NetworkingD Link73. Which of the following field is not used for connection setup and teardown?A Sequence numberB TSTC SYND FIN74. ____ is the byte stream number of first byte in the segment.A Sequence numberB ACK numberC ChecksumD port number75. ____ is the byte sequence numbers of next byte expected from other side.A Sequence numberB ACK numberC ChecksumD port number76. Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is said to provide ____ acknowledgements.A CumulativeB SelectiveC SingleD Negative77. Fast retransmit means in the case that ____ duplicate ACK-s are received, the TCP sender resend segment before timer expires.A 3B 4C 5D 678. TCP____ me ans sender won’t overflow receiver’s buffer by tran smitting too much, too fast.A Flow controlB Congestion controlC Reliable data transferD Connection-oriented service79. TCP provides flow control by having the sender maintain a variable called the ____.A Receive windowB Congestion windowC Sliding windowD buffer80. How does TCP sender perceive congestion?A TimeoutB 3 duplicate ACK-sC Both A and BD None of above81. Transport protocols run in ____.A ServersB ClientsC RoutersD End systems82. Which of the following services is not provided by TCP?A Delay guarantees and bandwidth guaranteesB Reliable data transfers and flow controlsC Congestion controlsD In-order data transfers83. Which service does UDP not provide?A multiplexingB de-multiplexingC error-detectionB error-correction84. There are three major events related to data transmission and retransmission in the TCP sender, which one is not in it?A data received from application aboveB de-multiplexing segmentC timer timeoutD ACK receipt85. Which of the following applications normally uses UDP services?A SMTPB Streaming multimediaC FTPD HTTP86. Which of the following about TCP connection is not correct?A It is a broadcast connectionB It is a point-to-point connectionC It is a pipelined connectionD It is a full duplex connection87. The SYN segment is used for____.A TCP connection setupB TCP flow controlC TCP congestion controlD Closing a TCP connection88. Which service helps prevent the internet from entering a state of gridlock?A reliable data transferB flow controlC congestion controlD handshaking procedure89. The Internet’s _____is responsible for moving packets from one host to another.A application layerB transport layerC network layerD link layer90.In the following applications, which one is a bandwidth-sensitive application?A E-mailB web applicationC real-time audioD file transfer91. In the following applications, which one uses UDP?A E-mailB web applicationC file transferD DNS92. In the following four descriptions, which one is correct?A I f one host’s transport layer uses TCP, then its network layer must use virtual-circuit network.B Datagram network provides connection serviceC The transport-layer connection service is implemented in the routerD The network-layer connection service is implemented in the router as well as in the end system.93.____ is a speeding-matching service---matching the rate which the sender is sending against the rate at which the receiving application is reading.A congestion controlB flow controlC sliding-window controlD variable control94. In the following four descriptions about Rcv-Window, which one is correct?A The size of the TCP RcvWindow never changes throughout the duration of the connectionB The size of the TCP RcvWindow will change with the size of the TCP RcvBufferC The size of the TCP RcvWindow must be less than or equal to the size of the TCP RcvBufferD Suppose host A sends a file to host B over a TCP connection, the number of unacknowledged bytes that A sends cannot exceed the size of the size of the RcvWindow.95. There are 6 flag fields. Which one is to indicate that the receiver should pass the data to the upper layer immediately?A PSHB URGC ACKD RST96. Suppose the TCP receiver receives the segment that partially or completely fills in gap in received data, it will ____.A immediately send ACKB immediately send duplicate ACKC wait some time for arrival of another in-order segmentD send single cumulative97. _____ imposes constrain on the rate at which a TCP sender can send traffic into the network.A sliding windowB congestion windowC receive windowD variable window98. Flow control and congestion control are same at that they all limit the rate of the sender, but differ in that ____.A flow control limits its rate by the size of RcvWindow, but congestion control by the traffic on the linkB congestion control limits its rate by the size of RcvWindow, but flow control by the traffic on the linkC flow control mainly is accomplished by the sender, but congestion control by the receiver.D flow control mainly is accomplished by the receiver, but congestion control by the link.99. This job of delivering the data in a transport-layer segment to the correct socket is called ____.A multiplexingB de-multiplexingC forwardingD routing100. If we define N to be the window size, base to be the sequence number of the oldest unacknowledged packet, and next-seq-num to be the smallest unused sequence number, then the interval [base, nextseqnum-1] corresponds to packet that ____.A can be sent immediatelyB have already been transmitted and acknowledgedC cannot be usedD have been sent but not yet acknowledged101. ____ are the two types of transport services that the Internet provides to the applications.A TCP and UDPB connection-oriented and connectionless serviceC TCP and IPD reliable data transfer and flow control102. In the following descriptions about persistent connection, which one is not correct?A The server leaves the TCP connection open after sending a responseB Each TCP connection is closed after the server sending one objectC There are two versions of persistent connection: without pipelining and with pipeliningD The default mode of HTTP uses persistent connection with pipelining103. The field of Length in UDP segment specifies the length of ____.A the UDP segment, not including the headerB the UDP segment, including the headerC the UDP segment’s headerD the Length field104. In TCP segment header, which field can implement the reliable data transfer?A source port number and destination port numberB sequence number and ACK numberC urgent data pointerD Receive window105. In the following four descriptions about TCP connection management, which one is not correct?A Either of the two processes participating in a TCP connection can end the connectionB If the FIN bit is set to 1, it means that it wants to close the connectionC In the first two step of the three-way handshake, the client and server randomly choose an initial sequence numberD In the three segments of the three-way handshake, the SYN bit must be set to 1 106. Suppose host A sends two TCP segments back to back to host B over a TCP connection. The first segment has sequence number 42, and the second has sequence number 110. If the 1st is lost and 2nd arrives at host B. What will be the acknowledgment number?A 43B ACK42C 109D ACK1101.Consider sending an object of size O=500,000bytes from server to client. Let S=500 bytes and RTT=0.2s. Suppose the transport protocol uses static windows with window size 5. For a transmission rate of 100Kbps, determine the latency for sending the whole object. Recall the number of windows K=O/ WS), and there is K-1 stalled state (that is idle time gaps).2.Consider the following plot of TCP congestion window size as a function of time.Fill in the blanks as follow:a) The initial value of Threshold at the first transmission round is ____.b) The value of Threshold at the 11st transmission round is ____.c) The value of Threshold at the 21st transmission round is ____.d) After the 9th transmission round, segment loss detected by ____.(A) Timeout(B) Triple duplicate ACKe) After the 19th transmission round, segment loss detected by ____.(A) Timeout(B) Triple duplicate ACKf) During ____ transmission round, the 18th segment is sent.3.Consider the TCP reliable data transfer in the given graph. If in Segment 1’s Sequence number =10,data=“AC”, please fill in the following blanks.a) In Segment 2, ACK number=____;b) In Segment 3, Sequence number =____; data=“0123456789”c) If there are some bits corrupted in segment 3 when it arrives Host B, then the ACK number in Segment 5 is ____; and the ACK number in Segment 6 is ____.0 0 0 Congestion window size Transmission round4. The client A wants to request a Web page from Server B. Suppose the URL of the page is 172.16.0.200/experiment, and also it wants to receive French version of object. The time-sequence diagram is shown below, please fill in the blanks.Packet ① to Packet ③ are TCP connection’s segment, then:Packet ①: SYN flag bit= aACK flag bit= bSequence number= 92Packet ②: SYN flag bit=1ACK flag bit= cSequence number=100Packet ③: SYN flag bit= dACK flag bit=1Sequence number= e5. Consider sending an object of size O=100 Kbytes from server to client. Let S=536 bytes and RTT=100msec. Suppose the transport protocol uses static windows with window size W.(1) For a transmission rate of 25 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency.(2) Repeat (1) for 100 kbps.6. Consider the following plot of TCP congestion window size as a function of time. Please fill in the blanks as below.a) The initial value of Threshold at the first transmission round is____.b) The value of Threshold at the 11th transmission round is_____.c) The value of Threshold at the 21st transmission round is_____.d) After the 9th transmission round, _____ occurs.e) After the 19th transmission round, ____ are detected.Congestion window size Transmission round。

计算机网络题库(大连交通大学)chapter5

计算机网络题库(大连交通大学)chapter5

Chapter 5 The Link Layer and Local Area Network1.A ( ) protocol is used to move a datagram over an individual link.A application-layerB transport-layerC network-layerD link-layer2.The units of data exchanged by a link-layer protocol are called ( ).A datagramsB framesC segmentsD messages3.Which of the following protocols is not a link-layer protocol? ( )A EthernetB PPPC HDLCD IP4.In the following four descriptions, which one is not correct? ( )A link-layer protocol has the node-to-node job of moving network-layer datagrams over a single link in the path.B The services provided by the link-layer protocols may be different.C A datagram must be handled by the same link-layer protocols on the different links in the path.D The actions taken by a link-layer protocol when sending and receiving frames include error detection, flow control and random access.5.Which of the following services can not offered by a link-layer protocol? ( )A congestion controlB Link AccessC Error controlD Framing6.( ) protocol serves to coordinate the frame transmissions of the many nodes when multiple nodes share a single broadcast link.A ARPB MACC ICMPD DNS7.In the following four descriptions about the adapter, which one is not correct? ( )A The adapter is also called as NIC.B The adapter is a semi-autonomous unit.C The main components of an adapter are bus interface and the link interface.D The adapter can provide all the link-layer services.8.Consider CRC error checking approach, the four bit generator G is 1011, and suppose that the data D is 10101010, then the value of R is( ).A 010B 100C 011D 1109.In the following four descriptions about random access protocol, which one is not correct? ( )A I n slotted ALOHA, nodes can transmit at random time.B I n pure ALOHA, if a frame experiences a collision, the node will immediately retransmit it with probability p.C T he maximum efficiency of a slotted ALOHA is higher than a pure ALOHA.D I n CSMA/CD, one node listens to the channel before transmitting.10.In the following descriptions about MAC address, which one is not correct? ( )A T he MAC address is the address of one node’s adapter.B N o two adapters have the same MAC address.C T he MAC address doesn’t change no matter where the adapter goes.D M AC address has a hierarchical structure.11.The ARP protocol can translate ( ) into ( ). ( )A h ost name, IP addressB h ost name, MAC addressC I P address, MAC addressD broadcast address, IP address12.The value of Preamble field in Ethernet frame structure is ( )A 10101010 10101010……10101010 11111111B 10101011 10101011……10101011 10101011C 10101010 10101010……10101010 10101011D 10101010 10101010……10101010 1010101013.There are four steps in DHCP, the DHCP server can complete ( ).A DHCP server discoveryB DHCP server offersC DHCP requestD DHCP response14.In CSMA/CD, the adapter waits some time and then returns to sensing the channel. In the following four times, which one is impossible? ( )A 0 bit timesB 512 bit timesC 1024 bit timesD 1028 bit times15.The most common Ethernet technologies are 10BaseT and 100BaseT. “10” and “100” indicate( ).A the maximum length between two adaptersB the minimum length between two adaptersC the transmission rate of the channelD the transmission rate of the node16.The principal components of PPP include but not( ).A framingB physical-control protocolC link-layer protocolD network-layer protocol17.In the following four options, which service can not be provided by switch? ( )A filteringB self-learningC forwardingD optimal routing18.In the following four services, which one was be required in PPP? ( )A packet framingB error detectionC error correctionD multiple types of link19.The ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces is( ).A filteringB forwardingC self-learningD optimal routing20.In ( ) transmission(s), the nodes at both ends of a link may transmit packets at the same time.A full-duplexB half-duplexC single-duplexD both full-duplex and half-duplex21.Consider the data D is 01110010001, if use even parity checking approach, the parity bit is( ① ), if use odd parity checking approach, the parity bit is( ② ). ( )A ①0 ②1B ①0 ②0C ①1 ②1D ①1 ②022.In the following four descriptions about parity checks, which one is correct? ( )A Single-bit parity can detect all errors.B Single-bit parity can correct one errors.C Two-dimensional parity not only can detect a single bit error, but also can correct that error.D Two-dimensional parity not only can detect any combination of two errors, but also can correct them.23.MAC address is ( ) bits long.A 32B 48C 128D 6424.Wireless LAN using protocol ( ).A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.1125.The following protocols are belonging to multiple access protocols except for ( ).A channel partitioning protocolsB routing protocolsC random access protocolsD taking-turns protocols26.Which of the following is not belonging to channel partitioning protocols? ( )A CSMAB FDMC CDMAD TDM27.In the following four descriptions about CSMA/CD, which one is not correct? ( )A A node listens to the channel before transmitting.B If someone else begins talking at the same time, stop talking.C A transmitting node listens to the channel while it is transmitting.D With CSMA/CD, the collisions can be avoided completely.28.( ) provides a mechanism for nodes to translate IP addresses to link-layer address.A IPB ARPC RARPD DNS29.A MAC address is a ( )address.A physical-layerB application-layerC link-layerD network-layer30.Which of the following is correct? ( )A No two adapters have the same MAC address.B MAC broadcast address is FF-FF-FF-FF-FF-FF.C A portable computer with an Ethernet card always has the same MAC address, no matter where the computer goes.D All of the above31.In the following four descriptions, which one is not correct? ( )A ARP resolves an IP address to a MAC address.B DNS resolves hostnames to IP addresses.C DNS resolves hostnames for hosts anywhere in the Internet.D ARP resolves IP addresses for nodes anywhere in the Internet.32.In the LAN, ( )protocol dynamically assign IP addresses to hosts.A DNSB ARPC DHCPD IP33.DHCP protocol is a four-step process: ①DHCP request. ②DHCP ACK. ③DHCP server discovery. ④DHCP server offer(s). The correct sequence is ( )A ①②③④B ③②①④C ③④①②D ①④③②34.In the Ethernet frame structure, the CRC field is ( )bytes.A 2B 4C 8D 3235.In the Ethernet frame structure, the Data field carries the ( ).A IP datagramB segmentC frameD message36.In the following four descriptions, which one is not correct? ( )A Ethernet uses baseband transmission.B All of the Ethernet technologies provide connection-oriented reliable service to the network layer.C The Ethernet 10Base2 technology uses a thin coaxial cable for the bus.D The Ethernet 10BaseT technology uses a star topology.37.Ethernet’s multiple access protocol is ( ).A CDMAB CSMA/CDC slotted ALOHAD token-passing protocol38.In the following four descriptions about CSMA/CD, which one is not correct? ( )A An adapter may begin to transmit at any time.B An adapter never transmits a frame when it senses that some other adapter is transmitting.C A transmitting adapter aborts its transmission as soon as it detects that another adapter is also transmitting.D An adapter retransmits when it detects a collision.39.Which of the following descriptions about CSMA/CD is correct? ( )A No slots are used.B It uses carrier sensing.C It uses collision detection.D All of the above.40.The Ethernet 10BaseT technology uses( )as its physical media.A fiber opticsB twisted-pair copper wireC coaxial cableD satellite radio channel41.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( )meters.A 100B 200C 500D 1042.A ( )is a physical-layer device that acts on individual bits rather than on frames.A switchB hubC routerD gateway43.A hub is a ( )device that acts on individual bits rather than on frames.A physical-layerB link-layerC network-layerD ransport-layer44.A switch is a( )device that acts on frame.A physical-layerB link-layerC network-layerD transport-layer45.In the following four descriptions, which one is not correct? ( )A Switches can interconnect different LAN technologies.B Hubs can interconnect different LAN technologies.C There is no limit to how large a LAN can be when switches are used to interconnect LAN segments.D There is restriction on the maximum allowable number of nodes in a collision domain when hubs are used to interconnect LAN segments.46.The ability to determine whether a frame should be forwarded to some interface or should just be dropped is ( ).A f ilteringB f orwardingC s elf-learningD o ptimal routing47.Which of the following devices is not a plug and play device? ( )A hubB routerC switchD repeater48.Which of the following devices is not cut-through device? ( )A hubB routerC switchD repeater49.In the following four descriptions, which one is not correct? ( )A Switches do not offer any protection against broadcast storms.B Routers provide firewall protection against layer-2 broadcast storms.C Both switches and routers are plug and play devices.D A router is a layer-3 packet switch, a switch is a layer-2 packet switch. 50.Which device has the same collision domain? ( )A HubB SwitchC RouterD Bridge51.IEEE802.2 protocol belong to ( )layerA networkB MACC LLCD physical52.IEEE802.11 protocol defines ( )rules.A Ethernet BusB wireless WANC wireless LAND Token Bus53.In data link-layer, which protocol is used to share bandwidth? ( )A SMTPB ICMPC ARPD CSMA/CD54.When two or more nodes on the LAN segments transmit at the same time, there will be a collision and all of the transmitting nodes well enter exponential back-off, that is all of the LAN segments belong to the same( ).A collision domainB switchC bridgeD hub55.( )allows different nodes to transmit simultaneously and yet have their respective receivers correctly receive a sender’s encoded data bits.A CDMAB CSMAC CSMA/CDD CSMA/CA56.Because there are both network-layer addresses (for example, Internet IP addresses) and link-layer addresses (that is, LAN addresses), there is a need totranslate between them. For the Internet, this is the job of ( ).A RIPB OSPFC ARPD IP57.PPP defines a special control escape byte, ( ). If the flag sequence, 01111110 appears anywhere in the frame, except in the flag field, PPP precedes that instance of the flag pattern with the control escape byte.A 01111110B 01111101C 10011001D 1011111058.The device ( ) can isolate collision domains for each of the LAN segment.A modemB switchC hubD NIC59.In the following four descriptions about PPP, which one is not correct? ( )A PPP is required to detect and correct errors.B PPP is not required to deliver frames to the link receiver in the same order in which they were sent by the link sender.C PPP need only operate over links that have a single sender and a single receiver.D PPP is not required to provide flow control.60.In the PPP data frame, the( ) field tells the PPP receivers the upper-layer protocol to which the received encapsulated data belongs.A flagB controlC protocolD checksum61.PPP’s link-control protocols (LCP) accomplish ( ).A initializing the PPP linkB maintaining the PPP linkC taking down the PPP linkD all of the above62.The PPP link always begins in the ( ) state and ends in the ( ) state. ( )A open, terminatingB open, deadC dead, deadD dead, terminating63.For( ) links that have a single sender at one end of the link and a single receiver at the other end of the link.A point-to-pointB broadcastC multicastD all of the above64.With ( )transmission, the nodes at both ends of a link may transmit packets at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous65.With ( ) transmission, a node can not both transmit and receive at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous66.Which of the following functions can’t be implemented in the NIC? ( )A encapsulation and decapsulationB error detectionC multiple access protocolD routing67.Which of the following four descriptions is wrong? ( )A The bus interface of an adapter is responsible for communication with the adapter’s parent node.B The link interface of an adapter is responsible for implementing the link-layer protocol.C The bus interface may provide error detection, random access functions.D The main components of an adapter are the bus interface and the link interface. 68.For odd parity schemes, which of the following is correct? ( )A 011010001B 111000110C 110101110D 00011011069.( )divides time into time frames and further divides each time frame into N time slots.A FDMB TMDC CDMAD CSMA70.With CDMA, each node is assigned a different ( )A codeB time slotC frequencyD link71.Which of the following four descriptions about random access protocol is not correct? ( )A A transmission node transmits at the full rate of the channelB When a collision happens, each node involved in the collision retransmits at once.C Both slotted ALOHA and CSMA/CD are random access protocols.D With random access protocol, there may be empty slots.72.PPP defines a special control escape byte 01111101. If the data is b1b201111110b3b4b5, the value is( )after byte stuffing.A b1b20111110101111110b3b4b5B b1b20111111001111101b3b4b5C b5b4b30111111001111101b2b1D b5b4b30111110101111110b2b173.MAC address is in ( ) of the computer.A RAMB NICC hard diskD cache74.Which of the following is wrong? ( )A ARP table is configured by a system administratorB ARP table is built automaticallyC ARP table is dynamicD ARP table maps IP addresses to MAC addresses75.NIC works in ( )layer.A physicalB linkC networkD transport76.In LAN, if UTP is used, the common connector is( ).A AUIB BNCC RJ-45D NNI77.The modem’s function(s) is(are) ( ).A translates digital signal into analog signalB translates analog signal into digital signalC both translates analog signal into digital signal and translates digital signal into analog signalD translates one kind of digital signal into another digital signal78.( )defines Token-Ring protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.279.( )defines Token-Bus protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.280.( ) defines CSMA/CD protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.281.The computer network that concentrated in a geographical area, such as in a building or on a university campus, is ( )A a LANB a MANC a WAND the Internet82.The MAC address is ( ) bits long.A 32B 48C 128D 25683.Which of the following four descriptions about MAC addresses is wrong? ( )A a MAC address is burned into the adapter’s ROMB No two adapters have the same addressC An adapter’s MAC address is dynamicD A MAC address is a link-layer address84.Which of the following four descriptions about DHCP is correct? ( )A DHCP is C/S architectureB DHCP uses TCP as its underlying transport protocolC The IP address offered by a DHCP server is valid foreverD The DHCP server will offer the same IP address to a host when the host requests an IP address85.The ( )field permits Ethernet to multiplex network-layer protocols.A preambleB typeC CRCD destination MAC address86.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( ) meters.A 50B 100C 200D 50087.An entry in the switch table contains the following information excepts for ( )A the MAC address of a nodeB the switch interface that leads towards the nodeC the time at which the entry for the node was placed in the tableD the IP address of a node88.Consider the 4-bit generator , G is 1001, and suppose that D has the value 101110000. What is the value of R?89.Consider the following graph of the network. Suppose Host A will send a datagram to Host B, Host A run OICQ on port 4000, Host B run OICQ on port 8000. All of ARP tables are up to date. Enumerate all the steps when message “Hello” is sent from host A to host B.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

计算机网络复习题一、单项选择1.Which of following is not an application-layer protocol? ( B)A. HTTPB. TCPC.SMTPD.FTP2.The PDU of network-layer is called ( C).A. messageB. segmentC. datagramD. frame3. An HTTP client often uses the (B ) method when the user fills out a form.A.GETB. POSTC. HEADD. PUT4.The default port number of DNS is(C )A.80B.21C.53D.255.Which of the following is not a mail access protocol? ( C)A.POP3B.IMAPC.HTTPD.SMTP6.Which protocol is not a network-layer protocol? (C )A.ICMP ProtocolB.routing protocolC.PPPD.IP Protocol7.The SYN segment is used for(B ).A. TCP flow controlB. TCP connection setupC. TCP congestion controlD. Closing a TCP connection8.Which field in a TCP segment is used for flow control? ( A)A. receive windowB. sequence numberC. acknowledgementD. Internet checksum9.A (A ) is the interface between the application layer and the transport layer within a host.A. socketB. bridgeC. EthernetD. hub10.In network-layer, which protocol is used for reporting errors? ( B)A.SMTPB.ICMPC.ARPD.CSMA11.Which protocol is an intra-autonomous system routing protocol? ( D)A. ARPB. ICMPC. BGPD. RIP12.MAC address is ( B) bits long.A.32B.48C.128D.6413. ( A ) means that the switch must receive the entire packet before it can begin to transmit the first bit of the packet onto the outbound link.A. store-and-forward transmissionB. FDMC. end-to-end connectionD. TDM14. In the following four descriptions, which one is correct? ( C )A In C/S architecture, clients communicate with each other directly.B In C/S architecture, client has a fixed well-known address.C In P2P architecture, peers communicate with each other directly.D In P2P architecture, peer has a fixed well-known address.15.Which of following is not an application-layer protocol? ( B )A. HTTPB. TCPC. DNSD. SMTP16. ( B ) header line indicates the time and date when the object was created or last modified.A. Date:B. Last-Modified:C. Connection:D.If-Modified-Since:17.A ( A ) provides logical communication between processes runningon different hosts. A ( ) provides logical communication between hosts.A. transport-layer protocol, network-layer protocolB. network-layer protocol, transport-layer protocolC. transport-layer protocol, application-layer protocolD. network-layer protocol, link-layer protocol18.Suppose TCP sender is in slow start state and the CongWin is8, then what’s the value of CongWin after one RTT? ( D )A. 9B. 10C. 4D. 1619.( B ) header allows the receiving user agent to take an appropriate action on the message.A. Content-Transfer-Encoding:B. Content-Type:C. From:D. To:20. The request message in the conditional GET must include the header line.Cst-Modifiedst-ReferencedC.If-Modified-SinceD.If –Referenced-Since21. Which of the following services is not provided by TCP? (A)A.Delay guarantees and bandwidth guaranteesB.Reliable data transferC.Congestion controlD.Flow control22. In the LAN,(C )protocol dynamically assign IP addresses to hosts.A.DNSB.ARPC.DHCPD.IP23. ___A_ is the ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces.A.ForwardingB.FilteringC.RoutingD.Switching24. Which of the following is not a routing protocol?( A)A.TCPB.RIPC.OSPFD. BGP25. For 10BaseT, the maximum length of the connection between an adapterand the hub is A meters.A.100B.200C.500D.1026. In a TCP segment, ___A_ is the byte-stream number of the first bytein the segment.A.sequence numberB.aCK numberC.checksumD.port number27. A ( A ) provides logical communication between processes runningon different hosts. A ( ) provides logical communication between hosts.A. transport-layer protocol, network-layer protocolB. network-layer protocol, transport-layer protocolC. transport-layer protocol, application-layer protocolD. network-layer protocol, link-layer protocol二、填空1. A total nodal delay includes nodal processing delay, queuing delay,transmission delay , and propagation delay.2.In the context of a communication session between a pair of processes,the process that initiates the communication is labeled as the client . The process that waits to be contacted to begin the sessionis the server .3. A process sends messages into ,and receives messages from, thenetwork through its socket .4.FTP uses two parallel TCP connections to transfer a file, they aredata connection and control connection .5. DNS protocol translates hostname to IP address.6. A transport-layer protocol provides logical communication betweenprocesses running on different hosts. A network-layer protocolprovides logical communication between hosts .7.In IPv6 datagram format, IP address is 128 bits long.8.There are three 16-bit words: 0110011001100000, 0101010101010101,1000111100001100. Their checksum is 1011 0101 0011 1101 .9.RcvBuffer=100, LastByteRcvd=58, LastByteRead=23, then RcvWindow=6510. ARP protocol can convert the IP address to MAC address.11.R TT is the time it takes for a small packet to travel from clientto server and then back to the client.12.T he Internet mail system has three components which they are useragent, SMTP , mail server .13.T here are currently a number of popular mail access protocols,including POP3 , IMAP , and SMTP.14.DNS protocol can convert the hostname to IP address.15.This job of delivering the data in a transport-layer segment to thecorrect socket is called demultiplexing . The job of gathering data chunks at the source host from different sockets, encapsulating each data chunk with header information to create segments, and passing the segments to the network layer is called multiplexing.16.F iltering is the ability of a switch to determine whether a frameshould be forwarded to some interface or should just be dropped.Forwarding is the ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces.17.C onsider the data D is 01110010001, if use even parity checkingapproach, the parity bit is 1 , if use odd parity checking approach, the parity bit is 0 .18.T he units of data exchanged by a network-layer protocol are called(datagram ).19.There are two classes of packet-switched networks: (virtual circuit)networks and datagram networks.20.Provided RcvBuffer=200,LastByteRcvd=150,LastByteRead=80, thenRcvWindow=( 130 ).21.T he two most important network-layer functions in a datagram networkare ( forwarding ) and ( routing ).has a ( 32 )bit address , and MAC address is ( 48 ) bits.22.I PV423.T he ( ARP ) protocol can translate IP address into MAC address,and the ( DNS ) protocol can translate hostname into IP address 三、判断对错1.The propagation delay is the amout of time required to push all of the packet’s bits into the link.(F)2.The size of the TCP RcvWindow never changes throughout the duration of the connection.(F)3.Ethernet’s multiple access protocol is CDMA.(F)4.The Internet is a kind of vircuit curcuit network.(F) 5.Currently, the Internet does not provides a service that makes promises about how long it will take to deliver the data from sender to receiver.(T)6.TCP and UDP don’t guarantee a minimum transmission rate, but theyprovide delay guarantees. (F)7.HTTP uses TCP as its underlying transport protocol rather than running on top of UDP.(T)8.The sequence number for a segment is therefore the byte-stream number of the first byte in the segment.(T)9.Both routers and switches are plug and play devices. (F)10.TCP provides flow control by having the sender maintain a variable called the receive window.(T)11.With persistent connections, the server leaves the TCP connection open after sending a response.(T)12.The Last-modified: header in the HTTP response message indicates when the object in the response message was last modified.(F) 13.The job of delivering the data in a transport-layer segment to the correct socket is called multiplexing.( F)14. A datagram may be handled by different link-layer protocols on the different links in the path.( T)四、Consider the following plot of TCP congestion window size as a function of time.Fill in the blanks as follow:a) The initial value of Threshold at the first transmission round is __12 __.b) The value of Threshold at the 11st transmission round is ___ 8 _.c) The value of Threshold at the 21st transmission round is __ 7 __.d) After the 9th transmission round, segment loss detected by _timeout_.e) After the 19th transmission round, segment loss detected by _3 duplicate ACKs__. f) During __ 5 __ transmission round, the 18th segment is sent.五、For the given topology of the network, use Dijstra ’s shortest path algorithm to compute the shortest path from B to all network nodes. Give a shortest path tree and node B ’s routing table.Answer:0 0 0 Congestion window size Transmission roundN ’D(A),P(A) D(C),P(C) D(D),P(D) D(E),P(E) D(F),P(F) B5,B 1,B ∞ ∞ ∞ B,C3,C 6,C ∞ 3,C B,C,A4,A 5,A 3,C B,C,A,F4,A 4,F B,C,A,F,D4,F B,C,A,F,D,EDest.Next Top AC B- CC DC EC FC六、Suppose that you send a mail to ****************.cn.Your mailbox is************.cn.The mail includes a excel attachment. Subject is “Problemabout exam ”, What might the header lines (including MIME lines) look like?Answer:From:************.cnTo:****************.cnSubject: Problem about examMIME-version : 1.0 Content-transfer-encoding: base64Content-type: application/MSexcel七、Consider the data D =101110000, that the receiving node receives from thenetwork. The generator G =1001. Use CRC method and compute whether thereis a bit-error. If there is an error, please give the value of the remainder R .1 E D C F 12 2 1 A B八、Now we had known IP address is 203.100.113.80/22,Please compute :1) Network address,2) Broadcast address,3) How many hosts are there in the network? 4) First host IP address,5)Last host IP addressAnswer:1)Network address is 203.100.112.02)Broadcast address is 203.100.115.2553)there are 1022 hosts in the network4)First host IP address is 203.100.112.15)Last host IP address is 203.100.115.254。

相关文档
最新文档