计算机网络自顶向下 第七版 第六章答案
计算机网络自顶向下答案第六章中文版

6复习题1.APs周期性的发送信标帧,AP的一个信标帧通过11个信道中的一个发送。
信标帧允许附近的无线基站发现和识别AP。
2.1)基于无线主机的MAC地址;2)用户名和密码的结合。
在这2中情况中,AP把信息传送给认证服务器。
3.不对4.2个原因:1)无线信道中误码率比较高;2)在有线的以太网中,发送站点能够检测到是否有碰撞发生,然而在802.11中站点不能检测到碰撞。
5.不对6.每一个无线基站都可以设置一个RTS阈值,因此只有当将要传送的数据帧长度长于这个阈值时,RTS/CTS序列才会被用到。
7.没有好处。
假设有2个站点同时想发送数据,并且他们都使用RTS/CTS。
如果RTS/CTS的帧长和数据帧长一样时,信道就会被浪费,因为发送RTS/CTS的时间和发送数据的时间一样。
因此RTS/CTS交换只有当RTS/CTS 帧长远小于数据帧长时才有用。
8.开始时,交换机在其转发表中有一个表项标识了无线站点和前一个AP的联系。
当无线基站和新的AP联系时,新的AP将创建一个包括无线基站MAC地址以及以太网广播帧的帧。
当交换机收到该帧时,更新其转发表,使得无线站点可以通过新的AP到达。
9.UMTS源于GSM,CDMA200源于IS-95。
习题1.输出d1 = [-1,1,-1,1,-1,1,-1,1];d0 = [1,-1,1,-1,1,-1,1,-1]2.发送方2的输出= [1,-1,1,1,1,-1,1,1]; [ 1,-1,1,1,1,-1,1,1]3.4.a)两个AP有不同的SSID和MAC地址。
一个到达咖啡馆的无线站点将会和其中一个AP的联系。
发生联系后,在新的站点和AP之间会建立一条虚链路。
把两个ISP的AP标识为AP1和AP2。
假设新的站点和AP1相关联。
当它发送一个帧的时候,它将会到达AP1。
虽然AP2也会收到这个帧,但是它不会处理这个帧,因为这个帧发送给它的。
因此这两个ISP能在相同的信道上平行地工作。
计算机网络第七版课后答案完整版

计算机网络第七版课后答案完整版计算机网络是现代社会中不可或缺的一部分,它架起了人与人、人与信息的桥梁,促进了信息的传递和共享。
而针对计算机网络这门课程,学生通常会留下一些问题疑惑。
本文将为大家提供《计算机网络第七版》课后答案的完整版,帮助学生更好地理解和掌握相关知识。
第一章网络基础1. 什么是计算机网络?计算机网络是指利用通信设备和网络连接技术,将地理位置不同的计算机及其外部设备组合成一个完成协同工作的系统。
2. 计算机网络的分类有哪些?计算机网络可分为局域网(LAN)、城域网(MAN)、广域网(WAN)和互联网。
3. 什么是协议?协议是网络通信中计算机之间进行信息交换所必需遵循的规范和约定。
4. OSI参考模型是什么?OSI参考模型是国际标准化组织(ISO)制定的一种通信协议的参考模型,共分为七层,分别是物理层、数据链路层、网络层、传输层、会话层、表示层和应用层。
5. TCP/IP参考模型是什么?TCP/IP参考模型是计算机网络互联中广泛使用的一个协议参考模型,共分为四层,分别是网络接口层、网络层、传输层和应用层。
6. 什么是HTTP协议?HTTP(Hypertext Transfer Protocol)是一种用于传输超文本的应用层协议,是Web浏览器和Web服务器之间进行交互的基础。
7. 什么是UDP协议?UDP(User Datagram Protocol)是一种面向无连接的传输层协议,主要用于在网络上发送短报文。
与TCP协议相比,它传输速度更快,但可靠性较差。
第二章物理层1. 物理层的主要功能是什么?物理层主要负责传输比特流,将比特流转换为物理信号进行传输。
2. 什么是编码?编码是将数字信号转换为模拟信号或数字信号的过程。
3. 常见的编码方式有哪些?常见的编码方式有不归零编码(NRZ)、曼彻斯特编码、差分曼彻斯特编码等。
4. 什么是调制?调制是将数字信号转换为模拟信号的过程,常用的调制方式有调幅(AM)、调频(FM)和调相(PM)。
计算机网络教程自顶向下方法选择题及答案

Chapter 4 Network Layer1.Packetizing at the network layer involvesA) Encapsulating the payload at the sourceB) Adds a header that contains the source and destination informationC) Decapsulating the payload at the destinationD) All of the choices are correct2.Routers in the path are not allowed to ___________________________.A) fragment the packet they receiveB) decapsulate the packetC) change source or destination addressD) All of the choices are correct3.The network layer in the Internet provides _________________.A) comprehensive error and flow control.B) limited error control, but no flow control.C) comprehensive error control but limited flow control.D) All of the choices are correct4.In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct5.In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct6.The performance of a network can be measured in terms of ________.A) delayB) throughputC) packet lossD) all of the choices are correct7.Transmission delay (time) is the ratio of ______________________.A) transmission rate to packet lengthB) transmission rate to distanceC) packet length to transmission rateD) processing time to transmission rate8.Propagation delay (time) is the ratio of ______________________.A) transmission rate to propagation speedB) propagation speed to distanceC) packet length to propagation speedD) distance to propagation speed9.When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.A) increases sharply; its minimumB) increases sharply; its maximumC) decreases sharply; its minimumD) decreases sharply; its maximum10.In open-loop congestion control, policies are applied ____________________.A) to prevent congestion before it happensB) to alleviate congestion after it happensC) to either prevent congestion before it happens or to alleviate congestion after it happensD) None of the choices are correct11.The __________________ technique is one of the open-loop congestion policyA) backpressureB) choke packetC) implicit signalingD) None of the choices are correct12.The __________________ technique is one of the close-loop congestion policyA) acknowledgment policyB) choke packetC) discarding policyD) None of the choices are correct13.IP is a _________ protocol.A) connection-oriented unreliableB) connection-oriented reliableC) connectionless unreliableD) connectionless reliable14.An HLEN value of decimal 10 means _______.A) there are 10 bytes of optionsB) there are 10 bytes in the headerC) there are 40 bytes of optionsD) there are 40 bytes in the header15.If the fragment offset has a value of 100, it means that _______.A) the datagram has not been fragmentedB) the datagram is 100 bytes in sizeC) the first byte of the datagram is byte 800D) None of the choices are correct16.What is needed to determine the number of the last byte of a fragment?A) offset numberB) total lengthC) both offset number and the total lengthD) None of the choices are correct17.The IP header size is _______ bytes long.A) 20 to 60B) 20C) 60D) None of the choices are correct18.Packets in the IP layer are called _________.A) segmentsB) datagramsC) framesD) None of the choices are correct19.The total length field defines the total length of the datagram _________.A) including the headerB) excluding the headerC) excluding the option lengthD) None of the choices are correct20.When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.A) MUTB) MATC) MTUD) None of the choices are correct21.An IPv4 address is normally represented in base ____ in dotted-decimal notation.A) 16B) 256C) 10D) None of the choices are correct22.In classful addressing, the IPv4 address space is divided into _______ classes.A) 3B) 4C) 5D) None of the choices are correct23.The number of addresses assigned to an organization in classless addressing _______.A) can be any numberB) must be a multiple of 256C) must be a power of 2D) None of the choices are correct24.The first address assigned to an organization in classless addressing _______.A) must be evenly divisible by the number of addresses in the organizationB) must be divisible by 128C) must belong to one of the A, B, or C classesD) None of the choices are correct25.In subnetting, the number of addresses in each subnet must _______.A) be a power of 2B) be a multiple of 128C) be divisible by 128D) None of the choices are correct26.What is the default prefix length for class A in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct27.What is the default prefix length for class B in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct28.What is the default prefix length for class C in CIDR notation?A) 24B) 8C) 16D) None of the choices are correct29.DHCP is a (an) ___________ layer protocol.A) applicationB) transportC) networkD) data-link30.In DHCP, the client uses ________ port and the server uses _________ port.A) an ephemeral; a well-knownB) a well-known; a well-knownC) a well-known; an ephemeralD) None of the choices are correct31.DHCP uses the services of _______.A) UDPB) TCPC) IPD) None of the choices are correct32._________ allows a site to use a set of private addresses for internal communication and a set ofglobal Internet addresses for communication with the rest of the world.A) DHCPB) NATC) IMCPD) None of the choices are correct33.The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________ addressing.A) classfulB) classlessC) classful or classlessD) None of the choices are correct34.The use of hierarchy in routing tables can ________ the size of the routing tables.A) reduceB) increaseC) neither reduce nor increaseD) None of the choices are correct35.ICMP is a (an) _________ layer protocol.A) application-layer protocol that helps TCP/IP at the network layerB) transport-layer protocol that helps TCP/IP at the network layerC) network-layer protocol.D) data-link layer protocol that helps TCP/IP at the network layer36.Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated for a fragmented datagram.C) An ICMP error message may be generated for a multicast datagram.D) None of the choices are correct37.Routing inside an autonomous system is referred to as ________ routing.A) interdomainB) intradomainC) out-of-domainD) None of the choices are correct38.Routing between autonomous systems is referred to as ______ routing.A) interdomain routingB) intradomain routingC) out-of-domainD) None of the choices are correct39.In _______ routing, the least cost route between any two nodes is the route with the minimum distance.A) path vectorB) distance vectorC) link stateD) None of the choices are correct40.In ________, each node maintains a vector (table) of minimum distances to every node.A) path vectorB) distance vectorC) link stateD) None of the choices are correct41.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.A) every other nodeB) its immediate neighborsC) one neighborD) None of the choices are correct42.The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct43.The metric used by _______ is the hop count.A) OSPFB) RIPC) BGPD) None of the choices are correct44.In RIP, the ________ timer controls the advertising of regular update messages.A) garbage collectionB) expirationC) periodicD) None of the choices are correct45.In RIP, the ________ timer is used to purge invalid routes from the table.A) garbage collectionB) expirationC) periodicD) None of the choices are correct46.In RIP, the ________ timer controls the validity of the route.A) garbage collectionB) expirationC) periodicD) None of the choices are correct47.RIP uses the services of _______.A) TCPB) UDPC) IPD) None of the choices are correct48.The _________ routing uses the Dijkstra algorithm to build a routing table.A) distance vectorB) link stateC) path vectorD) None of the choices are correct49.The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct50.The _______ protocol allows the administrator to assign a cost, called the metric, to each route.A) OSPFB) RIPC) BGPD) None of the choices are correct51.In OSPF, a ________ link connects two routers without any other host or router in between.A) point-to-pointB) transientC) stubD) None of the choices are correct52.In OSPF, a _______ link is a network with several routers attached to it.A) point-to-pointB) transientC) stubD) None of the choices are correct53.In OSPF, a ________ link is a network connected to only one router.A) point-to-pointB) transientC) stubD) None of the choices are correct54.In OSPF, a ________ defines the links of a network.A) network linkB) router linkC) summary link to networkD) None of the choices are correct55.___________ is an interdomain routing protocol using path vector routing.A) BGPB) RIPC) OSPFD) None of the choices are correct56.A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct57.A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct58.A one-to-one communication between one source and one destination is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct59.In ______, the router forwards the received packet through only one of its interfaces.A) unicastingB) multicastingC) broadcastingD) None of the choices are correct60.In multicast routing, each involved router needs to construct a ________ path tree for each group.A) averageB) longestC) shortestD) None of the choices are correct61.In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.A) group-sharedB) source-basedC) destination-basedD) None of the choices are correct62.The Multicast Open Shortest Path First (MOSPF) routing uses the _______ tree approach.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct63.The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct64.In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.A) shortestB) longestC) averageD) None of the choices are correct65.RPF eliminates the ________ in the flooding process.A) forwardingB) backwardingC) floodingD) None of the choices are correct66.RPB creates a shortest path _______ tree from the source to each destination.A) unicastB) multicastC) broadcastD) None of the choices are correct67.RPB guarantees that each destination receives _________ of the packet.A) only one copyB) no copiesC) multiple copiesD) None of the choices are correct68.In ________, the multicast packet must reach only those networks that have active members for that particular group.A) RPFB) RPBC) RPMD) None of the choices are correct69._______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.A) RPM; RPBB) RPB; RPMC) RPF; RPMD) None of the choices are correct70.__________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.A) MOSPFB) DVMRPC) CBTD) None of the choices are correct71.DVMRP is a ________ routing protocol, based on RIP.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct72.Pruning and grafting are strategies used in _______.A) RPFB) RPBC) RPMD) None of the choices are correct73.PIM-DM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct74.PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct75.An IPv6 address is _________ bits long.A) 32B) 64C) 128D) 25676.An IPv6 address consists of ________ bytes (octets);A) 4B) 8C) 16D) None of the choices are correct77.In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.A) 8; 2B) 8; 3C) 8; 4D) None of the choices are correct78.An IPv6 address can have up to __________ hexadecimal digits.A) 16B) 32C) 8D) None of the choices are correct79.In IPv6, the _______ field in the base header restricts the lifetime of a datagram.A) versionB) priorityC) hop limitD) None of the choices are correct80.The _________ in IPv6 is designed to provide special handling for a particular flow of data.A) flow labelB) next headerC) hop limitD) None of the choices are correct81.When two computers using IPv6 want to communicate but the packet must pass through an IPv4 region, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct82.When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct83.The protocols __________________________ in version 4 are combined into one single protocol, ICMPv6.A) ARP and IGMPB) ICMP and IGMPC) ICMP, ARP, and IGMPD) None of the choices are correctDCBCB DCCBA DBCDC CABAC BCCAA BCAAB ABBAC DBABB BABCA BBBBA ABCAA CBAAC BABAD CACAB ACABC CCBCA ABC。
计算机网络自顶向下方法,第7版——习题解答

计算机⽹络⾃顶向下⽅法,第7版——习题解答⽬录前⾔本⽂包含了Computer Networking A Top-Down Approach, 7th Edition中部分回顾性习题的问题与解答,主要参考了英⽂第7版和中⽂第7版的正⽂内容,欢迎各位的交流与指正!CHAPTER 1SECTION 1.1R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server anend system?在计算机⽹络中,⼆者的含义是相同的。
端系统列举:⼿机、平板电脑、环境传感器等⽹络服务器是端系统R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?There are two meanings of the word "protocol". In the legal sense, it is defined as an international agreement that supplements or amends a treaty. In the diplomatic sense, the term refers to the set of rules, procedures, conventions and ceremonies that relate to relations between states. In general, protocol represents the recognized and generally accepted system of international courtesy.“协议”⼀词有两种含义。
计算机网络:自顶向下方法-课本课后习题答案(4-6)

课后习题答案(4-6单元):Chapter 4 Review Questionsreview questions:1,2,3,4,8,10,15,16,18,20,23,27,33,34,361.网络层的分组名称是数据报.路由器是根据包的IP地址转发包;而链路层是根据包的MAC地址来转发包.2.数据报网络中网络层两个最重要的功能是:转发,选路.虚电路网络层最重要的三个功能是:转发,选路,和呼叫建立.3.转发是当一个分组到达路由器的一条输入链路时,该路由器将该分组移动到适当的输出链路.选路是当分组从发送方流向接收方时,网络层必须决定这些分组所采用的路由或路径.4.是,都使用转发表,要描述转发表,请参考4.2节.在虚电路网络中,该网络的路由器必须为进行中的连接维持连接状态信息。
每当跨越一台路由器则创建一个新连接,一个新的连接项必须加到该路由器转发表中;每当释放一个连接,必须从该表中删除该项。
注意到即使没有VC号转换,仍有必要维持连接状态信息,该信息将VC号与输出接口号联系起来。
每当一个端系统要发送分组时,它就为该分组加上目的地端系统的地址,然后将该分组推进网络中。
完成这些无需建立任何虚电路。
在数据报网络中的路由器不维护任何有关虚电路的状态信息。
每个路由器有一个将目的地址影射到链路接口的转发表;当分组到达路由器时,该路由器使用该分组的目的地址在该转发表中查找适当的输出链路接口。
然后路由其将该分组项该输出链路接口转发。
虽然在数据报网络中不维持连接状态信息,它们无论如何在其转发表中维持了转发状态信息。
在数据报网络中的转发表是由选录算法修改的,通常每1到5分钟左右更新转发表。
在虚电路网络中,无论何时通过路由器拆除一条现有的连接,路由器中的转发表就更新。
8.(1)经内存交换:在输入和输出端口之间的交换是在CPU控制下完成的.输入与输出端口的作用就像在传统操作系统中的I/O设备一样.一个分组到达一个输入端口,该端口会先通过中断方式向选路处理器发出信号.于是,该分组就被拷贝到处理器内存中.选路处理器从分组首部中取出目的地址,在转发表中找出适当的输出端口,并将该分组拷贝到输出端口的缓存中.(2)经一根总线交换:输入端口经一根总线将分组直接传送到输出端口,不需要选路处理器的干预.由于总线是共享的,故一次只能有一个分组通过总线传送.(3)经一个互联网络交换:使用一个纵横的网络,是一个由2n条总线组成的互联网络,它将n个输出端口和n个输入端口连接,一个到达某个端口的分组沿着连到输出端口的水平总线穿行,直至该水平总线与连到所希望的输出端口的垂直总线之交点.10.因为输出线速率慢而导致输出端队列长度加大,最终将耗尽输出端口的存储空间,在这样的情况下,分组就被丢弃了。
计算机网络自顶向下课后答案及解析

7第一章R11 L/R1 + L/R2R13a. 两个用户b. 每个用户需要1Mbps进行传输,若两个或更少用户同时进行传输,则带宽需求量最大为2Mbps,由于链路总带宽为2Mbps,所以无排队时延;若三个或更多用户同时进行传输,带宽需求超过3Mbps,多于链路总带宽,因此会出现排队时延。
c. 0.27d. 0.008;0.008R19a. 500kbpsb. 64sc. 100kbps;320sR23应用层:网络应用程序及应用层协议存留的地方;传输层:在应用程序端点之间传送应用层报文;网络层:将网络层分组(数据报)从一台主机移动到另一台主机;链路层:将分组从一个结点移动到路径上的下一个结点;物理层:将帧(链路层分组)中的一个一个比特从一个结点移动到下一个结点。
R25路由器:网络层,链路层,物理层链路层交换机:链路层,物理层主机:所有五层P3a. 电路交换网。
因为应用包含可预测的稳定带宽需求的长运行时间,由于传输率已知且非猝发,可在无明显浪费的情况下为每个应用周期预留带宽。
且建立与中断连接的总开销可被均摊在应用长时间的运行时间中。
b. 在最坏的情况下,所有应用同时经一条或多条链路传输。
然而由于每条链路都有足够带宽提供给所有应用,不会出现拥塞情况,因此不需要拥塞控制。
第二章R5目的主机的IP地址与目的进程套接字的端口号R12当用户首次访问网站时,服务器创建一唯一标识码,在其后端服务器中创建一入口,将该唯一标识码作为Cookie 码返回,该cookie 码储存在用户主机中,由浏览器管理。
在后来每次的访问与购买中,浏览器将cookie 码发送给网站,因此当该用户(准确地说,该浏览器)访问该网站时,网站会立即获知。
R15FTP 使用两平行TCP 连接,一条连接发送控制信息(例如文件传输请求),另一条连接用作实际传输文件。
由于控制信息不会通过与文件传输相同的连接发送,因此FTP 在“带外”发送控制信息。
R19是的,一个机构的邮件服务器和Web 服务器可以有完全相同的主机名别名。
计算机网络教程自顶向下方法选择题及答案

Chapter 4 Network Layer1.Packetizing at the network layer involvesA) Encapsulating the payload at the sourceB) Adds a header that contains the source and destination informationC) Decapsulating the payload at the destinationD) All of the choices are correct2.Routers in the path are not allowed to ___________________________.A) fragment the packet they receiveB) decapsulate the packetC) change source or destination addressD) All of the choices are correct3.The network layer in the Internet provides _________________.A) comprehensive error and flow control.B) limited error control, but no flow control.C) comprehensive error control but limited flow control.D) All of the choices are correct4.In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct5.In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct6.The performance of a network can be measured in terms of ________.A) delayB) throughputC) packet lossD) all of the choices are correct7.Transmission delay (time) is the ratio of ______________________.A) transmission rate to packet lengthB) transmission rate to distanceC) packet length to transmission rateD) processing time to transmission rate8.Propagation delay (time) is the ratio of ______________________.A) transmission rate to propagation speedB) propagation speed to distanceC) packet length to propagation speedD) distance to propagation speed9.When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.A) increases sharply; its minimumB) increases sharply; its maximumC) decreases sharply; its minimumD) decreases sharply; its maximum10.In open-loop congestion control, policies are applied ____________________.A) to prevent congestion before it happensB) to alleviate congestion after it happensC) to either prevent congestion before it happens or to alleviate congestion after it happensD) None of the choices are correct11.The __________________ technique is one of the open-loop congestion policyA) backpressureB) choke packetC) implicit signalingD) None of the choices are correct12.The __________________ technique is one of the close-loop congestion policyA) acknowledgment policyB) choke packetC) discarding policyD) None of the choices are correct13.IP is a _________ protocol.A) connection-oriented unreliableB) connection-oriented reliableC) connectionless unreliableD) connectionless reliable14.An HLEN value of decimal 10 means _______.A) there are 10 bytes of optionsB) there are 10 bytes in the headerC) there are 40 bytes of optionsD) there are 40 bytes in the header15.If the fragment offset has a value of 100, it means that _______.A) the datagram has not been fragmentedB) the datagram is 100 bytes in sizeC) the first byte of the datagram is byte 800D) None of the choices are correct16.What is needed to determine the number of the last byte of a fragment?A) offset numberB) total lengthC) both offset number and the total lengthD) None of the choices are correct17.The IP header size is _______ bytes long.A) 20 to 60B) 20C) 60D) None of the choices are correct18.Packets in the IP layer are called _________.A) segmentsB) datagramsC) framesD) None of the choices are correct19.The total length field defines the total length of the datagram _________.A) including the headerB) excluding the headerC) excluding the option lengthD) None of the choices are correct20.When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.A) MUTB) MATC) MTUD) None of the choices are correct21.An IPv4 address is normally represented in base ____ in dotted-decimal notation.A) 16B) 256C) 10D) None of the choices are correct22.In classful addressing, the IPv4 address space is divided into _______ classes.A) 3B) 4C) 5D) None of the choices are correct23.The number of addresses assigned to an organization in classless addressing _______.A) can be any numberB) must be a multiple of 256C) must be a power of 2D) None of the choices are correct24.The first address assigned to an organization in classless addressing _______.A) must be evenly divisible by the number of addresses in the organizationB) must be divisible by 128C) must belong to one of the A, B, or C classesD) None of the choices are correct25.In subnetting, the number of addresses in each subnet must _______.A) be a power of 2B) be a multiple of 128C) be divisible by 128D) None of the choices are correct26.What is the default prefix length for class A in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct27.What is the default prefix length for class B in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct28.What is the default prefix length for class C in CIDR notation?A) 24B) 8C) 16D) None of the choices are correct29.DHCP is a (an) ___________ layer protocol.A) applicationB) transportC) networkD) data-link30.In DHCP, the client uses ________ port and the server uses _________ port.A) an ephemeral; a well-knownB) a well-known; a well-knownC) a well-known; an ephemeralD) None of the choices are correct31.DHCP uses the services of _______.A) UDPB) TCPC) IPD) None of the choices are correct32._________ allows a site to use a set of private addresses for internal communication and a set ofglobal Internet addresses for communication with the rest of the world.A) DHCPB) NATC) IMCPD) None of the choices are correct33.The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________ addressing.A) classfulB) classlessC) classful or classlessD) None of the choices are correct34.The use of hierarchy in routing tables can ________ the size of the routing tables.A) reduceB) increaseC) neither reduce nor increaseD) None of the choices are correct35.ICMP is a (an) _________ layer protocol.A) application-layer protocol that helps TCP/IP at the network layerB) transport-layer protocol that helps TCP/IP at the network layerC) network-layer protocol.D) data-link layer protocol that helps TCP/IP at the network layer36.Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated for a fragmented datagram.C) An ICMP error message may be generated for a multicast datagram.D) None of the choices are correct37.Routing inside an autonomous system is referred to as ________ routing.A) interdomainB) intradomainC) out-of-domainD) None of the choices are correct38.Routing between autonomous systems is referred to as ______ routing.A) interdomain routingB) intradomain routingC) out-of-domainD) None of the choices are correct39.In _______ routing, the least cost route between any two nodes is the route with the minimum distance.A) path vectorB) distance vectorC) link stateD) None of the choices are correct40.In ________, each node maintains a vector (table) of minimum distances to every node.A) path vectorB) distance vectorC) link stateD) None of the choices are correct41.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.A) every other nodeB) its immediate neighborsC) one neighborD) None of the choices are correct42.The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct43.The metric used by _______ is the hop count.A) OSPFB) RIPC) BGPD) None of the choices are correct44.In RIP, the ________ timer controls the advertising of regular update messages.A) garbage collectionB) expirationC) periodicD) None of the choices are correct45.In RIP, the ________ timer is used to purge invalid routes from the table.A) garbage collectionB) expirationC) periodicD) None of the choices are correct46.In RIP, the ________ timer controls the validity of the route.A) garbage collectionB) expirationC) periodicD) None of the choices are correct47.RIP uses the services of _______.A) TCPB) UDPC) IPD) None of the choices are correct48.The _________ routing uses the Dijkstra algorithm to build a routing table.A) distance vectorB) link stateC) path vectorD) None of the choices are correct49.The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct50.The _______ protocol allows the administrator to assign a cost, called the metric, to each route.A) OSPFB) RIPC) BGPD) None of the choices are correct51.In OSPF, a ________ link connects two routers without any other host or router in between.A) point-to-pointB) transientC) stubD) None of the choices are correct52.In OSPF, a _______ link is a network with several routers attached to it.A) point-to-pointB) transientC) stubD) None of the choices are correct53.In OSPF, a ________ link is a network connected to only one router.A) point-to-pointB) transientC) stubD) None of the choices are correct54.In OSPF, a ________ defines the links of a network.A) network linkB) router linkC) summary link to networkD) None of the choices are correct55.___________ is an interdomain routing protocol using path vector routing.A) BGPB) RIPC) OSPFD) None of the choices are correct56.A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct57.A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct58.A one-to-one communication between one source and one destination is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct59.In ______, the router forwards the received packet through only one of its interfaces.A) unicastingB) multicastingC) broadcastingD) None of the choices are correct60.In multicast routing, each involved router needs to construct a ________ path tree for each group.A) averageB) longestC) shortestD) None of the choices are correct61.In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.A) group-sharedB) source-basedC) destination-basedD) None of the choices are correct62.The Multicast Open Shortest Path First (MOSPF) routing uses the _______ tree approach.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct63.The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct64.In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.A) shortestB) longestC) averageD) None of the choices are correct65.RPF eliminates the ________ in the flooding process.A) forwardingB) backwardingC) floodingD) None of the choices are correct66.RPB creates a shortest path _______ tree from the source to each destination.A) unicastB) multicastC) broadcastD) None of the choices are correct67.RPB guarantees that each destination receives _________ of the packet.A) only one copyB) no copiesC) multiple copiesD) None of the choices are correct68.In ________, the multicast packet must reach only those networks that have active members for that particular group.A) RPFB) RPBC) RPMD) None of the choices are correct69._______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.A) RPM; RPBB) RPB; RPMC) RPF; RPMD) None of the choices are correct70.__________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.A) MOSPFB) DVMRPC) CBTD) None of the choices are correct71.DVMRP is a ________ routing protocol, based on RIP.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct72.Pruning and grafting are strategies used in _______.A) RPFB) RPBC) RPMD) None of the choices are correct73.PIM-DM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct74.PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct75.An IPv6 address is _________ bits long.A) 32B) 64C) 128D) 25676.An IPv6 address consists of ________ bytes (octets);A) 4B) 8C) 16D) None of the choices are correct77.In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.A) 8; 2B) 8; 3C) 8; 4D) None of the choices are correct78.An IPv6 address can have up to __________ hexadecimal digits.A) 16B) 32C) 8D) None of the choices are correct79.In IPv6, the _______ field in the base header restricts the lifetime of a datagram.A) versionB) priorityC) hop limitD) None of the choices are correct80.The _________ in IPv6 is designed to provide special handling for a particular flow of data.A) flow labelB) next headerC) hop limitD) None of the choices are correct81.When two computers using IPv6 want to communicate but the packet must pass through an IPv4 region, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct82.When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct83.The protocols __________________________ in version 4 are combined into one single protocol, ICMPv6.A) ARP and IGMPB) ICMP and IGMPC) ICMP, ARP, and IGMPD) None of the choices are correctDCBCB DCCBA DBCDC CABAC BCCAA BCAAB ABBAC DBABB BABCA BBBBA ABCAA CBAAC BABAD CACAB ACABC CCBCA ABC。
《计算机网络》第七版答案解析

计算机网络第七版答案第一章概述1-01 计算机网络向用户可以提供那些服务?答:连通性和共享1-02 简述分组交换的要点。
答:(1)报文分组,加首部(2)经路由器储存转发(3)在目的地合并1-03 试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。
答:(1)电路交换:端对端通信质量因约定了通信资源获得可靠保障,对连续传送大量数据效率高。
(2)报文交换:无须预约传输带宽,动态逐段利用传输带宽对突发式数据通信效率高,通信迅速。
(3)分组交换:具有报文交换之高效、迅速的要点,且各分组小,路由灵活,网络生存性能好。
1-04 为什么说因特网是自印刷术以来人类通信方面最大的变革?答:融合其他通信网络,在信息化过程中起核心作用,提供最好的连通性和信息共享,第一次提供了各种媒体形式的实时交互能力。
1-05 因特网的发展大致分为哪几个阶段?请指出这几个阶段的主要特点。
答:从单个网络APPANET向互联网发展;TCP/IP协议的初步成型建成三级结构的Internet;分为主干网、地区网和校园网;形成多层次ISP结构的Internet;ISP首次出现。
1-06 简述因特网标准制定的几个阶段?答:(1)因特网草案(Internet Draft) ——在这个阶段还不是 RFC 文档。
(2)建议标准(Proposed Standard) ——从这个阶段开始就成为 RFC 文档。
(3)草案标准(Draft Standard)(4)因特网标准(Internet Standard)1-07小写和大写开头的英文名internet 和Internet在意思上有何重要区别?答:(1) internet(互联网或互连网):通用名词,它泛指由多个计算机网络互连而成的网络。
;协议无特指(2)Internet (因特网):专用名词,特指采用 TCP/IP 协议的互联网络。
区别:后者实际上是前者的双向应用1-08 计算机网络都有哪些类别?各种类别的网络都有哪些特点?答:按范围:(1)广域网WAN:远程、高速、是Internet的核心网。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Computer Networking: A Top-Down Approach, 7th Edition计算机网络自顶向下第七版Solutions to Review Questions and ProblemsChapter 6 Review Questions1.The transportation mode, e.g., car, bus, train, car.2.Although each link guarantees that an IP datagram sent over the link will bereceived at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order. With IP,datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order. Also, IP can lose packets due to routing loops or equipment failures.3.Framing: there is also framing in IP and TCP; link access; reliable delivery: thereis also reliable delivery in TCP; flow control: there is also flow control in TCP;error detection: there is also error detection in IP and TCP; error correction; full duplex: TCP is also full duplex.4.There will be a collision in the sense that while a node is transmitting it will startto receive a packet from the other node.5.Slotted Aloha: 1, 2 and 4 (slotted ALOHA is only partially decentralized, since itrequires the clocks in all nodes to be synchronized). Token ring: 1, 2, 3, 4.6.After the 5th collision, the adapter chooses from {0, 1, 2,…, 31}. The probabilitythat it chooses 4 is 1/32. It waits 204.8 microseconds.7.In polling, a discussion leader allows only one participant to talk at a time, witheach participant getting a chance to talk in a round-robin fashion. For token ring, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.8.When a node transmits a frame, the node has to wait for the frame to propagatearound the entire ring before the node can release the token. Thus, if L/R is small as compared to t prop, then the protocol will be inefficient.9.248 MAC addresses; 232 IPv4 addresses; 2128 IPv6 addresses.10.C’s adapter will process the frames, but the adapter will not pass the datagrams upthe protocol stack. If the LAN broadcast address is used, then C’s adapter will both process the frames and pass the datagrams up the protocol stack.11.An ARP query is sent in a broadcast frame because the querying host does notwhich adapter address corresponds to the IP address in question. For the response, the sending node knows the adapter address to which the response should be sent, so there is no need to send a broadcast frame (which would have to be processed by all the other nodes on the LAN).12.No it is not possible. Each LAN has its own distinct set of adapters attached to it,with each adapter having a unique LAN address.13.The three Ethernet technologies have identical frame structures.14.2 (the internal subnet and the external internet)15.In 802.1Q there is a 12- bit VLAN identifier. Thus 212 = 4,096 VLANs can besupported.16.We can string the N switches together. The first and last switch would use oneport for trunking; the middle N-2 switches would use two ports. So the totalnumber of ports is 2+ 2(N-2) = 2N-2 ports.Chapter 6 ProblemsProblem 11 1 1 0 10 1 1 0 01 0 0 1 01 1 0 1 11 1 0 0 0Problem 2Suppose we begin with the initial two-dimensional parity matrix:0 0 0 01 1 1 10 1 0 11 0 1 0With a bit error in row 2, column 3, the parity of row 2 and column 3 is now wrong in the matrix below:0 0 0 01 1 0 10 1 0 11 0 1 0Now suppose there is a bit error in row 2, column 2 and column 3. The parity of row 2 is now correct! The parity of columns 2 and 3 is wrong, but we can't detect in which rows the error occurred!0 0 0 01 0 0 10 1 0 11 0 1 0The above example shows that a double bit error can be detected (if not corrected).Problem 301001100 01101001+ 01101110 01101011------------------------------10111010 11010100+ 00100000 01001100------------------------------11011011 00100000+ 01100001 01111001-----------------------------00111100 10011010 (overflow, then wrap around)+ 01100101 01110010------------------------------10100010 00001100The one's complement of the sum is 01011101 11110011Problem 4a)To compute the Internet checksum, we add up the values at 16-bit quantities:00000001 0000001000000011 0000010000000101 0000011000000111 0000100000001001 00001010-------------------------00011001 00011110The one's complement of the sum is 11100110 11100001.b)To compute the Internet checksum, we add up the values at 16-bit quantities: 01000010 0100001101000100 0100010101000110 0100011101001000 0100100101001010 01001011-------------------------10011111 10100100The one's complement of the sum is 01100000 01011011c)To compute the Internet checksum, we add up the values at 16-bit quantities: 01100010 0110001101100100 0110010101100110 0110011101101000 0110100101101010 01101011-------------------------00000000 00000101The one's complement of the sum is 11111111 11111010.Problem 5If we divide 10011 into 1010101010 0000, we get 1011011100, with a remainder of R=0100. Note that, G=10011 is CRC-4-ITU standard.Problem 6a) we get 1000110000, with a remainder of R=0000.b) we get 010*******, with a remainder of R=1111.c) we get 1011010111, with a remainder of R=1001.Problem 7a) Without loss of generality, suppose ith bit is flipped, where 0<= i <= d+r-1 and assume that the least significant bit is 0th bit.A single bit error means that the received data is K=D*2r XOR R + 2i. It is clear that if we divide K by G, then the reminder is not zero. In general, if G contains at least two 1’s, then a single bit error can always be detected.b) The key insight here is that G can be divided by 11 (binary number), but any number of odd-number of 1’s cannot be divided by 11. Thus, a sequence (not necessarily contiguous) of odd-number bit errors cannot be divided by 11, thus it cannot be divided by G.Problem 8a)1)1()(--=N p Np p E21)1)(1()1()('------=N N p N Np p N p E))1()1(()1(2----=-N p p p N NN p p E 1*0)('=⇒=b)N N N N N N p E N N N 11)11()11()11(1*)(11--=-=-=-- 1)11(lim =-∞→N N e N N N 1)11(lim =-∞→ Thuse p E N 1*)(lim =∞→Problem 9)1(2)1()(--=N p Np p E)3(2)2(2)1)(1(2)1()('------=N N p N Np p N p E))1(2)1(()1()3(2----=-N p p p N N121*0)('-=⇒=N p p E)1(2)1211(12*)(----=N N N N p E e e p E N 21121*)(lim =⋅=∞→Problem 10a) A’s average throughput is given by pA(1-pB).Total efficiency is pA(1-pB) + pB(1-pA).b) A’s throughput is pA(1-pB)=2pB(1-pB)= 2pB- 2(pB)2.B’s throughput is pB(1-pA)=pB(1-2pB)= pB- 2(pB)2.Clearly, A’s throughput is not twice as large as B’s.In order to make pA(1-pB)= 2 pB(1-pA), we need that pA= 2 – (pA / pB).c)A’s throughput is 2p(1-p)N-1, and any other node has throughput p(1-p)N-2(1-2p).Problem 11a)(1 – p(A))4 p(A)where, p(A) = probability that A succeeds in a slotp(A) = p(A transmits and B does not and C does not and D does not)= p(A transmits) p(B does not transmit) p(C does not transmit) p(D does not transmit)= p(1 – p) (1 – p)(1-p) = p(1 – p)3Hence, p(A succeeds for first time in slot 5)= (1 – p(A))4 p(A) = (1 – p(1 – p)3)4 p(1 – p)3b)p(A succeeds in slot 4) = p(1-p)3p(B succeeds in slot 4) = p(1-p)3p(C succeeds in slot 4) = p(1-p)3p(D succeeds in slot 4) = p(1-p)3p(either A or B or C or D succeeds in slot 4) = 4 p(1-p)3(because these events are mutually exclusive)c)p(some node succeeds in a slot) = 4 p(1-p)3p(no node succeeds in a slot) = 1 - 4 p(1-p)3Hence, p(first success occurs in slot 3) = p(no node succeeds in first 2 slots) p(some node succeeds in 3rd slot) = (1 - 4 p(1-p)3)2 4 p(1-p)3d)efficiency = p(success in a slot) =4 p(1-p)3Problem 12Problem 13The length of a polling round is)/(poll d R Q N +.The number of bits transmitted in a polling round is NQ . The maximum throughput therefore isQR d R d R Q N NQ poll poll +=+1)/( Problem 14a), b) See figure below.c)1. Forwarding table in E determines that the datagram should be routed to interface 192.168.3.002.2. The adapter in E creates and Ethernet packet with Ethernet destination address 88-88-88-88-88-88.3. Router 2 receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to 198.162.2.002.4.Router 2 then sends the Ethernet packet with the destination address of 33-33-33-33-33-33 and source address of 55-55-55-55-55-55 via its interface with IP address of 198.162.2.003.5.The process continues until the packet has reached Host B.a)ARP in E must now determine the MAC address of 198.162.3.002. Host E sendsout an ARP query packet within a broadcast Ethernet frame. Router 2 receives the query packet and sends to Host E an ARP response packet. This ARP response packet is carried by an Ethernet frame with Ethernet destination address 77-77-77-77-77-77.Problem 15a)No. E can check the subnet prefix of Host F’s IP address, and then learn that F ison the same LAN. Thus, E will not send the packet to the default router R1. Ethernet frame from E to F:Source IP = E’s IP addressDestination IP = F’s IP addressSource MAC = E’s MAC addressDestination MAC = F’s MAC addressb)No, because they are not on the same LAN. E can find this out by checking B’s IPaddress.Ethernet frame from E to R1:Source IP = E’s IP addressDestination IP = B’s IP addressSource MAC = E’s MAC addressDestination MAC = The MAC address of R1’s interface connecting to Subnet 3.c)Switch S1 will broadcast the Ethernet frame via both its interfaces as the receivedARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router R1 also receives this ARP request message, but R1 won’t forward the message to Subnet 3.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switch S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Lets call the switch between subnets 2 and 3 S2. That is, router R1 between subnets 2 and 3 is now replaced with switch S2.a) No. E can check the subnet prefix of Host F’s IP address, and then learn that F is on the same LAN segment. Thus, E will not send the packet to S2. Ethernet frame from E to F: Source IP = E’s IP address Destination IP = F’s IP address Source MAC = E’s MAC addressDestination MAC = F’s MAC addressb) Yes, because E would like to find B’s MAC address. In this case, E will send an ARP query packet with destination MAC address being the broadcast address. This query packet will be re-broadcast by switch 1, and eventually received by Host B. Ethernet frame from E to S2: Source IP = E’s IP address Destination IP = B’s IP address Source MAC = E’s MAC addressDestination MAC = broadcast MAC address: FF-FF-FF-FF-FF-FF.c) Switch S1 will broadcast the Ethernet frame via both its interfaces as the received ARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet 1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router S2 also receives this ARP request message, and S2 will broadcast this query packet to all its interfaces.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switc h S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Problem 17Wait for 51,200 bit times. For 10 Mbps, this wait is12.51010102.5163=⨯⨯bps bitsmsecFor 100 Mbps, the wait is 512 μsec.At 0=t A transmits. At 576=t , A would finish transmitting. In the worst case, B begins transmitting at time t=324, which is the time right before the first bit of A’s frame arrives at B. At time t=324+325=649 B 's first bit arrives at A . Because 649> 576, A finishes transmitting before it detects that B has transmitted. So A incorrectly thinks that its frame was successfully transmitted without a collision.Problem 19Because A 's retransmission reaches B before B 's scheduled retransmission time (805+96), B refrains from transmitting while A retransmits. Thus A and B do not collide. Thus the factor 512 appearing in the exponential backoff algorithm is sufficiently large.Problem 20a) Let Y be a random variable denoting the number of slots until a success:1)1()(--==m m Y P ββ,where β is the probability of a success.This is a geometric distribution, which has mean β/1. The number of consecutive wasted slots is 1-=Y X thatββ-=-==11][][Y E X E x1)1(--=N p Np β11)1()1(1-----=N N p Np p Np xefficiency11)1()1(1-----+=+=N N p Np p Np k kxk kb)Maximizing efficiency is equivalent to minimizing x , which is equivalent tomaximizing β. We know from the text that β is maximized at Np 1=.c)efficiency 11)11()11(1-----+=N N NN k k∞→N lim efficiency 1/1/11-+=-+=e k kee k kd) Clearly, 1-+e k kapproaches 1 as ∞→k .Problem 21i) from A to left router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 22-22-22-22-22-22Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from the left router to the right router: Source MAC address: 33-33-33-33-33-33Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from the right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003Problem 22i) from A to switch: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from switch to right router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003111.111.111.00311-11-11-11-11-11122.222.222.00466-66-66-66-66Problem 23If all the 11=9+2 nodes send out data at the maximum possible rate of 100 Mbps, a total aggregate throughput of 11*100 = 1100 Mbps is possible.Problem 24Each departmental hub is a single collision domain that can have a maximum throughput of 100 Mbps. The links connecting the web server and the mail server has a maximum throughput of 100 Mbps. Hence, if the three collision domains and the web server and mail server send out data at their maximum possible rates of 100 Mbps each, a maximum total aggregate throughput of 500 Mbps can be achieved among the 11 end systems.Problem 25All of the 11 end systems will lie in the same collision domain. In this case, the maximum total aggregate throughput of 100 Mbps is possible among the 11 end sytems. Problem 26Problem 27a) The time required to fill 8⋅L bits is.sec 16sec 1012883m LL =⨯⋅b) For ,500,1=L the packetization delay is.sec 75.93sec 161500m m =For ,50=L the packetization delay is.sec 125.3sec 1650m m =c) Store-and-forward delay RL 408+⋅=For 500,1=L , the delay issec 4.19sec 1062240815006μ≈⨯+⋅For ,50=L store-and-forward delay sec 1μ<.d) Store-and-forward delay is small for both cases for typical link speeds. However, packetization delay for 1500=L is too large for real-time voice applications.Problem 28The IP addresses for those three computers (from left to right) in EE department are: 111.111.1.1, 111.111.1.2, 111.111.1.3. The subnet mask is 111.111.1/24.The IP addresses for those three computers (from left to right) in CS department are: 111.111.2.1, 111.111.2.2, 111.111.2.3. The subnet mask is 111.111.2/24.The router’s interface card that connects to port 1 can be configured to contain two sub-interface IP addresses: 111.111.1.0 and 111.111.2.0. The first one is for the subnet of EE department, and the second one is for the subnet of CS department. Each IP address is associated with a VLAN ID. Suppose 111.111.1.0 is associated with VLAN 11, and 111.111.2.0 is associated with VLAN 12. This means that each frame that comes from subnet 111.111.1/24 will be added an 802.1q tag with VLAN ID 11, and each frame that comes from 111.111.2/24 will be added an 802.1q tag with VLAN ID 12. Suppose that host A in EE department with IP address 111.111.1.1 would like to send an IP datagram to host B (111.111.2.1) in CS department. Host A first encapsulates the IP datagram (destined to 111.111.2.1) into a frame with a destination MAC address equal to the MAC address of the router’s interface card that connects to port 1 of the switch. Once the router receives the frame, then it passes it up to IP layer, which decides that the IP datagram should be forwarded to subnet 111.111.2/24 via sub-interface 111.111.2.0. Then the router encapsulates the IP datagram into a frame and sends it to port 1. Note that this frame has an 802.1q tag VLAN ID 12. Once the switch receives the frame port 1, it knows that this frame is destined to VLAN with ID 12, so the switch will send the frame to Host B which is in CS department. Once Host B receives this frame, it will remove the 802.1q tag.Problem 30(The following description is short, but contains all major key steps and key protocols involved.)Your computer first uses DHCP to obtain an IP address. You computer first creates a special IP datagram destined to 255.255.255.255 in the DHCP server discovery step, and puts it in a Ethernet frame and broadcast it in the Ethernet. Then following the steps in the DHCP protocol, you computer is able to get an IP address with a given lease time.A DHCP server on the Ethernet also gives your computer a list of IP addresses of first-hop routers, the subnet mask of the subnet where your computer resides, and the addresses of local DNS servers (if they exist).Since your computer’s ARP cache is initially empty, your computer will use ARP protocol to get the MAC addresses of the first-hop router and the local DNS server.Your computer first will get the IP address of the Web page you would like to download. If the local DNS server does not have the IP address, then your computer will use DNS protocol to find the IP address of the Web page.Once your computer has the IP address of the Web page, then it will send out the HTTP request via the first-hop router if the Web page does not reside in a local Web server. The HTTP request message will be segmented and encapsulated into TCP packets, and then further encapsulated into IP packets, and finally encapsulated into Ethernet frames. Your computer sends the Ethernet frames destined to the first-hop router. Once the router receives the frames, it passes them up into IP layer, checks its routing table, and then sends the packets to the right interface out of all of its interfaces.Then your IP packets will be routed through the Internet until they reach the Web server. The server hosting the Web page will send back the Web page to your computer via HTTP response messages. Those messages will be encapsulated into TCP packets and then further into IP packets. Those IP packets follow IP routes and finally reach yourfirst-hop router, and then the router will forward those IP packets to your computer by encapsulating them into Ethernet frames.Problem 32a) Each flow evenly shares a link’s capacity with other flows traversing that link, then the 80 flows crossing the B to access-router 10 Gbps links (as well as the access router to border router links) will each only receive 10 Gbps / 80 = 125 Mbpsb) In Topology of Figure 5.31, there are four distinct paths between the first and third tier-2 switches, together providing 40 Gbps for the traffic from racks 1-4 to racks 9-12. Similarly, there are four links between second and fourth tier-2 switches, together providing 40 Gbps for the traffic from racks 5-8 to 13-16. Thus the total aggregate bandwidth is 80 Gbps, and the value per flow rate is 1 Gbps.c) Now 20 flows will need to share each 1 Gbps bandwidth between pairs of TOR switches. So the host-to-host bit rate will be 0.5 Gbps.Problem 33a)Both email and video application uses the fourth rack for 0.1 percent of the time.b)Probability that both applications need fourth rack is 0.001*0.001 = 10-6.c)Suppose the first three racks are for video, the next rack is a shared rack for bothvideo and email, and the next three racks are for email. Let's assume that thefourth rack has all the data and software needed for both the email and video applications. With the topology of Figure 5.31, both applications will have enough intra-bandwidth as long as both are not simultaneously using the fourth rack.From part b, both are using the fourth rack for no more than .00001 % of time, which is within the .0001% requirement.。