计算机网络(第4版)习题答案(英文版)
(完整版)计算机网络原理课后习题答案

(完整版)计算机⽹络原理课后习题答案《计算机⽹络》(第四版)谢希仁第1章概述作业题1-03、1-06、1-10、1-13、1-20、1-221-03.试从多个⽅⾯⽐较电路交换、报⽂交换和分组交换的主要优缺点。
答:(1)电路交换它的特点是实时性强,时延⼩,交换设备成本较低。
但同时也带来线路利⽤率低,电路接续时间长,通信效率低,不同类型终端⽤户之间不能通信等缺点。
电路交换⽐较适⽤于信息量⼤、长报⽂,经常使⽤的固定⽤户之间的通信。
(2)报⽂交换报⽂交换的优点是中继电路利⽤率⾼,可以多个⽤户同时在⼀条线路上传送,可实现不同速率、不同规程的终端间互通。
但它的缺点也是显⽽易见的。
以报⽂为单位进⾏存储转发,⽹络传输时延⼤,且占⽤⼤量的交换机内存和外存,不能满⾜对实时性要求⾼的⽤户。
报⽂交换适⽤于传输的报⽂较短、实时性要求较低的⽹络⽤户之间的通信,如公⽤电报⽹。
(3)分组交换分组交换⽐电路交换的电路利⽤率⾼,⽐报⽂交换的传输时延⼩,交互性好。
1-06.试将TCP/IP和OSI的体系结构进⾏⽐较。
讨论其异同点。
答:(1)OSI和TCP/IP的相同点是:都是基于独⽴的协议栈的概念;⼆者均采⽤层次结构,⽽且都是按功能分层,层功能⼤体相似。
(2)OSI和TCP/IP的不同点:①OSI分七层,⾃下⽽上分为物理层、数据链路层、⽹络层、运输层、应⽤层、表⽰层和会话层;⽽TCP/IP具体分五层:应⽤层、运输层、⽹络层、⽹络接⼝层和物理层。
严格讲,TCP/IP⽹间⽹协议只包括下三层,应⽤程序不算TCP/IP的⼀部分②OSI层次间存在严格的调⽤关系,两个(N)层实体的通信必须通过下⼀层(N-1)层实体,不能越级,⽽TCP/IP可以越过紧邻的下⼀层直接使⽤更低层次所提供的服务(这种层次关系常被称为“等级”关系),因⽽减少了⼀些不必要的开销,提⾼了协议的效率。
③OSI 只考虑⽤⼀种标准的公⽤数据⽹。
TCP/IP ⼀开始就考虑到多种异构⽹的互连问题,并将⽹际协议IP 作为TCP/IP 的重要组成部分。
计算机网络基础(第4版)(微课版)-习题答案 (4)[3页]
![计算机网络基础(第4版)(微课版)-习题答案 (4)[3页]](https://img.taocdn.com/s3/m/52e45b608762caaedc33d456.png)
1.关于IPv4地址的说法,错误的是( C )。
A.IP地址是由网络地址和主机地址两部分组成B.网络中的每台主机分配了唯一的IP地址C.IP地址只有三类:A,B,CD.随着网络主机的增多,IP地址资源将要耗尽2.某公司申请到一个C 类网络,由于有地理位置上的考虑必须切割成5 个子网,请问子网掩码要设为(A)A.255.255.255.224 B.255.255.255.192C.255.255.255.254 D.255.285.255.2403.IP地址127.0.0.1(D )。
A.是一个暂时未用的保留地址B.是一个属于B类的地址C.是一个表示本地全部节点的地址D.是一个表示本节点的地址4.从IP地址195.100.20.11中我们可以看出(C)。
A.这是一个A类网络的主机B.这是一个B类网络的主机C.这是一个C类网络的主机D.这是一个保留地址5.要将一个IP地址是220.33.12.0的网络划分成多个子网,每个子网包括25个主机并要求有尽可能多的子网,指定的子网掩码应是为( B )。
A.255.255.255.192 B.255.255.255.224C.255.255.255.240 D.255.255.255.248 6.一个A类网络已经拥有60个子网,若还要添加两个子网,并且要求每个子网有尽可能多的主机,应指定子网掩码为( B )。
A.255.240.0.0 B.255.248.0.0C.255.252.0.0 D.255.254.0.07下面哪个是合法的IPV6 地址(B)A.1080:0:0:0:8:800:200C:417K B.23F0::8:D00:316C:4A7FC.FF01::101::100F D.0.0:0:0:0:0:0:0:18、8.下列哪一个IPv6 地址是错误地址?(D)A.::FFFF B.::1C.::1:FFFF D.::1::FFFF9.下列关于IPv6 协议优点的描述中,准确的是。
计算机网络第4版(自顶向下方法)英文版ppt

connect adjacent nodes along communication path are links
wired links wireless links LANs
layer-2 packet is a frame,
encapsulates datagram
data-link layer has responsibility of transferring datagram from one node to adjacent node over a link
services:
error detection, correction sharing a broadcast channel: multiple access link layer addressing reliable data transfer, flow control: done!
each link protocol
tourist = datagram
provides different services
transport segment =
e.g., may or may not provide rdt over link
communication link transportation mode = link layer protocol travel agent = routing algorithm
5-11
Parity Checking
Single Bit Parity:
Detect single bit errors
Two Dimensional Bit Parity:
《计算机英语(第4版)》课后练习参考答案.8-12selectA

Unit Eight: The InternetUnit Eight/Section AI.Fill in the blanks with the information given in the text:1.research2.ICANN或the Internet Corporation for Assigned Names and Numbers3.router; gateway4.temporary/dial-up; permanent/dedicated5.ISP或Internet service providerwork; host7.decimal8.mnemonicII.Translate the following terms or phrases from English into Chinese and vice versa:1.cell phone 蜂窝电话,移动电话,手机2.IP address 网际协议地址,IP地址3.autonomous system 自主系统4.dial-up connection 拨号连接work identifier 网络标识符6.binary notation 二进制记数法7.mnemonic name 助记名,缩写名8.Internet-wide directory system 因特网范围的目录系统 server 名称服务器10.Internet infrastructure 因特网基础结构11.助记地址mnemonic address12.网吧cyber cafe13.宽带因特网访问broadband Internet access14.顶级域名top-level domain (TLD)15.因特网编址Internet addressing16.点分十进制记数法dotted decimal notation17.因特网服务提供商Internet service provider (ISP)18.专用因特网连接dedicated Internet connection19.主机地址host address20.硬件与软件支持hardware and software supportIII.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:Early computer networks used leased telephone company lines for their connections.Telephone company systems of that time established a single connection between sender and receiver for each telephone call, and that connection carried all data along a single path. Whena company wanted to connect computers it owned at two different locations, the companyplaced a telephone call to establish the connection, and then connected one computer to each end of that single connection.The U.S. Defense Department was concerned about the inherent risk of this single-channel method for connecting computers, and its researchers developed a different method of sending information through multiple channels. In this method, files and messages are broken into packets that are labeled electronically with codes for their origins, sequences, and destinations. In 1969, Defense Department researchers in the Advanced Research Projects Agency (ARPA) used this network model to connect four computers into a network called the ARPANET. The ARPANET was the earliest of the networks that eventually combined to become what we now call the Internet. Throughout the 1970s and 1980s, many researchers in the academic community connected to the ARPANET and contributed to the technological developments that increased its speed and efficiency.IV.Translate the following passage from English into Chinese:因特网只是提供了将许许多多的计算机连接在一起的物理与逻辑基础结构。
计算机网络(第四版)英文原版1.9 Summary

A factor in the delay of a store-and-forward packet-switching system is how long it takes to store and forward a packet through a switch. If switching time is 10 μsec, is this likely to be a major factor in the response of a client-server system where the client is in New York and the server is in California? Assume the propagation speed in copper and fiber to be 2/3 the speed of light in vacuum.
Well-known networks include the Internet, ATM networks, Ethernet, and the IEEE 802.11 wireless LAN. The Internet evolved from the ARPANET, to which other networks were added to form an internetwork. The present Internet is actually a collection of many thousands of networks, rather than a single network. What characterizes it is the use of the TCP/IP protocol stack throughout. ATM is widely used inside the telephone system for long-haul data traffic. Ethernet is the most popular LAN and is present in most large companies and universities. Finally, wireless LANs at surprisingly high speeds (up to 54 Mbps) are beginning to be widely deployed.
计算机英语(第4版)课文翻译与课后答案

第一部分《计算机英语》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯?帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德?威廉?莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽?雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼?何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯?巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔?埃达?拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
计算机网络(第四版)课后习题(英文)+习题答案(中英文)

ANDREW S. TANENBAUM 秒,约533 msec.----- COMPUTER NETWORKS FOURTH EDITION PROBLEM SOLUTIONS 8. A collection of five routers is to be conn ected in a poi nt-to-poi nt sub net.Collected and Modified By Yan Zhe nXing, Mail To: Betwee n each pair of routers, the desig ners may put a high-speed line, aClassify: E aEasy, M ^Middle, H Hard , DaDeleteGree n: Importa nt Red: Master Blue: VI Others:Know Grey:—Unnecessary ----------------------------------------------------------------------------------------------ML V Chapter 1 In troductio nProblems2. An alter native to a LAN is simply a big timeshari ng system with termi nals forall users. Give two adva ntages of a clie nt-server system using a LAN.(M)使用局域网模型可以容易地增加节点。
如果局域网只是一条长的电缆,且不会因个别的失效而崩溃(例如采用镜像服务-------------------------------------------器)的情况下,使用局域网模型会更便宜。
计算机专业英语教程第四版翻译课后练习题含答案

计算机专业英语教程第四版翻译课后练习题含答案简介《计算机专业英语教程》是针对计算机专业学生编写的一本英语教材。
本书旨在帮助学生通过学习计算机领域的专业英语词汇和语法,提升他们的英语能力和技能。
本文将为读者提供该教材第四版的课后练习题及答案。
第一课练习题1.将下列单词从易到难排序:chip, computer, algorithm, software,desktop2.将下列单词从中文翻译为英文:程序设计,硬件,操作系统,输入,输出3.请解释下列缩略语的全称:RAM,CPU,OS答案1.desktop, chip, computer, software, algorithm2.programming, hardware, operating system, input, output3.RAM(Random Access Memory),CPU(Central Processing Unit),OS(Operating System)第二课练习题1.请翻译下列句子:计算机的功能越来越强大,它可以执行许多任务。
2.请解释下列单词的意思:interface,protocol,server,router答案puters are becoming more and more powerful and they canperform many tasks.2.interface(接口), protocol(协议),server(服务器),router(路由器)第三课练习题1.请将下列单词按字母顺序排列:database,file,program,server,storage2.请填写下列句子的空格:计算机会读取从硬盘 __ (into)内存。
3.请解释下列单词的意思:database,algorithm,client,browser答案1.algorithm,database,file,program,server,storage2.into3.database(数据库),algorithm(算法),client(客户端),browser(浏览器)第四课练习题1.请翻译下列句子:今天我学会了如何编写计算机程序。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
COMPUTER NETWORKSFOURTH EDITIONPROBLEM SOLUTIONSANDREW S. TANENBAUMVrije UniversiteitAmsterdam, The NetherlandsPRENTICE HALL PTRUPPER SADDLE RIVER, NJ 07458© 2003 Pearson Education, Inc.Publishing as Prentice Hall PTRUpper Saddle River, New Jersey 07458All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher.Printed in the United States of America10987654321ISBN0-13-046002-8Pearson Education LTD.Pearson Education Australia PTY, LimitedPearson Education Singapore, Pte. Ltd.Pearson Education North Asia Ltd.Pearson Education Canada, Ltd.Pearson Educación de Mexico, S.A. de C.V.Pearson Education — JapanPearson Education Malaysia, Pte. Ltd.PROBLEM SOLUTIONS1 SOLUTIONS TO CHAPTER1PROBLEMS1.The dog can carry21gigabytes,or168gigabits.A speed of18km/hourequals0.005km/sec.The time to travel distance x km is x/0.005=200x sec, yielding a data rate of168/200x Gbps or840/x Mbps.For x<5.6km,the dog has a higher rate than the communication line.2.The LAN model can be grown incrementally.If the LAN is just a long cable.it cannot be brought down by a single failure(if the servers are replicated)It is probably cheaper.It provides more computing power and better interactive interfaces.3.A transcontinentalfiber link might have many gigabits/sec of bandwidth,butthe latency will also be high due to the speed of light propagation over thousands of kilometers.In contrast,a56-kbps modem calling a computer in the same building has low bandwidth and low latency.4.A uniform delivery time is needed for voice,so the amount of jitter in the net-work is important.This could be expressed as the standard deviation of the delivery time.Having short delay but large variability is actually worse thana somewhat longer delay and low variability.5.No.The speed of propagation is200,000km/sec or200meters/µsec.In10µsec the signal travels2km.Thus,each switch adds the equivalent of2km of extra cable.If the client and server are separated by5000km,traversing even50switches adds only100km to the total path,which is only2%.Thus, switching delay is not a major factor under these circumstances.6.The request has to go up and down,and the response has to go up and down.The total path length traversed is thus160,000km.The speed of light in air and vacuum is300,000km/sec,so the propagation delay alone is 160,000/300,000sec or about533msec.7.There is obviously no single correct answer here,but the following pointsseem relevant.The present system has a great deal of inertia(checks and bal-ances)built into it.This inertia may serve to keep the legal,economic,and social systems from being turned upside down every time a different party comes to power.Also,many people hold strong opinions on controversial social issues,without really knowing the facts of the matter.Allowing poorly reasoned opinions be to written into law may be undesirable.The potential effects of advertising campaigns by special interest groups of one kind or another also have to be considered.Another major issue is security.A lot of people might worry about some14-year kid hacking the system and falsifying the results.2PROBLEM SOLUTIONS FOR CHAPTER 18.Call the routers A ,B ,C ,D ,and E.There are ten potential lines:AB ,AC ,AD ,AE ,BC ,BD ,BE ,CD ,CE ,and DE .Each of these has four possibilities (three speeds or no line),so the total number of topologies is 410=1,048,576.At 100ms each,it takes 104,857.6sec,or slightly more than 29hours to inspect them all.9.The mean router-router path is twice the mean router-root path.Number the levels of the tree with the root as 1and the deepest level as n.The path from the root to level n requires n −1hops,and 0.50of the routers are at this level.The path from the root to level n −1has 0.25of the routers and a length of n −2hops.Hence,the mean path length,l ,is given byl =0.5×(n −1)+0.25×(n −2)+0.125×(n −3)+...orl =i =1Σ∞n (0.5)i −i =1Σ∞i (0.5)i This expression reduces to l =n −2.The mean router-router path is thus 2n −4.10.Distinguish n +2events.Events 1through n consist of the correspondinghost successfully attempting to use the channel,i.e.,without a collision.The probability of each of these events is p (1−p )n −1.Event n +1is an idle channel,with probability (1−p )n .Event n +2is a collision.Since these n +2events are exhaustive,their probabilities must sum to unity.The proba-bility of a collision,which is equal to the fraction of slots wasted,is then just 1−np (1−p )n −1−(1−p )n .11.Among other reasons for using layered protocols,using them leads to break-ing up the design problem into smaller,more manageable pieces,and layering means that protocols can be changed without affecting higher or lower ones,12.No.In the ISO protocol model,physical communication takes place only inthe lowest layer,not in every layer.13.Connection-oriented communication has three phases.In the establishmentphase a request is made to set up a connection.Only after this phase has been successfully completed can the data transfer phase be started and data trans-ported.Then comes the release phase.Connectionless communication does not have these phases.It just sends the data.14.Message and byte streams are different.In a message stream,the networkkeeps track of message boundaries.In a byte stream,it does not.For exam-ple,suppose a process writes 1024bytes to a connection and then a little later writes another 1024bytes.The receiver then does a read for 2048bytes.With a message stream,the receiver will get two messages,of 1024bytesPROBLEM SOLUTIONS FOR CHAPTER 13each.With a byte stream,the message boundaries do not count and the receiver will get the full 2048bytes as a single unit.The fact that there were originally two distinct messages is lost.15.Negotiation has to do with getting both sides to agree on some parameters orvalues to be used during the communication.Maximum packet size is one example,but there are many others.16.The service shown is the service offered by layer k to layer k +1.Anotherservice that must be present is below layer k ,namely,the service offered to layer k by the underlying layer k −1.17.The probability,P k ,of a frame requiring exactly k transmissions is the proba-bility of the first k −1attempts failing,p k −1,times the probability of the k -th transmission succeeding,(1−p ).The mean number of transmission is then justk =1Σ∞kP k =k =1Σ∞k (1−p )p k −1=1−p 1 18.(a)Data link layer.(b)Network layer.19.Frames encapsulate packets.When a packet arrives at the data link layer,theentire thing,header,data,and all,is used as the data field of a frame.The entire packet is put in an envelope (the frame),so to speak (assuming it fits).20.With n layers and h bytes added per layer,the total number of header bytesper message is hn ,so the space wasted on headers is hn .The total message size is M +nh ,so the fraction of bandwidth wasted on headers is hn /(M +hn ).21.Both models are based on layered protocols.Both have a network,transport,and application layer.In both models,the transport service can provide a reliable end-to-end byte stream.On the other hand,they differ in several ways.The number of layers is different,the TCP/IP does not have session or presentation layers,OSI does not support internetworking,and OSI has both connection-oriented and connectionless service in the network layer.22.TCP is connection oriented,whereas UDP is a connectionless service.23.The two nodes in the upper-right corner can be disconnected from the rest bythree bombs knocking out the three nodes to which they are connected.The system can withstand the loss of any two nodes.24.Doubling every 18months means a factor of four gain in 3years.In 9years,the gain is then 43or 64,leading to 6.4billion hosts.My intuition says that is much too conservative,since by then probably every television in the world and possibly billions of other appliances will be on home LANs connected to4PROBLEM SOLUTIONS FOR CHAPTER1the Internet.The average person in the developed world may have dozens of Internet hosts by then.25.If the network tends to lose packets,it is better to acknowledge each oneseparately,so the lost packets can be retransmitted.On the other hand,if the network is highly reliable,sending one acknowledgement at the end of the entire transfer saves bandwidth in the normal case(but requires the entirefile to be retransmitted if even a single packet is lost).26.Small,fixed-length cells can be routed through switches quickly,and com-pletely in hardware.Small,fixed-size cells also make it easier to build hardware that handles many cells in parallel.Also,they do not block transmission lines for very long,making it easier to provide quality-of-service guarantees.27.The speed of light in coax is about200,000km/sec,which is200meters/µsec.At10Mbps,it takes0.1µsec to transmit a bit.Thus,the bit lasts0.1µsec in time,during which it propagates20meters.Thus,a bit is20meters long here.28.The image is1024×768×3bytes or2,359,296bytes.This is18,874,368bits.At56,000bits/sec,it takes about337.042sec.At1,000,000bits/sec,it takes about18.874sec.At10,000,000bits/sec,it takes about1.887sec.At 100,000,000bits/sec,it takes about0.189sec.29.Think about the hidden terminal problem.Imagine a wireless network offivestations,A through E,such that each one is in range of only its immediate neighbors.Then A can talk to B at the same time D is talking to E.Wireless networks have potential parallelism,and in this way differ from Ethernet. 30.One disadvantage is security.Every random delivery man who happens to bein the building can listen in on the network.Another disadvantage is reliabil-ity.Wireless networks make lots of errors.A third potential problem is bat-tery life,since most wireless devices tend to be mobile.31.One advantage is that if everyone uses the standard,everyone can talk toeveryone.Another advantage is that widespread use of any standard will give it economies of scale,as with VLSI chips.A disadvantage is that the political compromises necessary to achieve standardization frequently lead to poor standards.Another disadvantage is that once a standard has been widely adopted,it is difficult to change,,even if new and better techniques or methods are discovered.Also,by the time it has been accepted,it may be obsolete.32.There are many examples,of course.Some systems for which there is inter-national standardization include compact disc players and their discs,Walk-man tape players and audio cassettes,cameras and35mmfilm,and automatedPROBLEM SOLUTIONS FOR CHAPTER 15teller machines and bank cards.Areas where such international standardiza-tion is lacking include VCRs and videotapes (NTSC VHS in the U.S.,PAL VHS in parts of Europe,SECAM VHS in other countries),portable tele-phones,lamps and lightbulbs (different voltages in different countries),electr-ical sockets and appliance plugs (every country does it differently),photo-copiers and paper (8.5x 11inches in the U.S.,A4everywhere else),nuts and bolts (English versus metric pitch),etc.SOLUTIONS TO CHAPTER 2PROBLEMS1.a n =πn−1 ,b n =0,c =1.2.A noiseless channel can carry an arbitrarily large amount of information,no matter how often it is sampled.Just send a lot of data per sample.For the 4kHz channel,make 8000samples/sec.If each sample is 16bits,the channel can send 128kbps.If each sample is 1024bits,the channel can send 8.2Mbps.The key word here is ‘‘noiseless.’’With a normal 4kHz channel,the Shannon limit would not allow this.ing the Nyquist theorem,we can sample 12million times/sec.Four-level signals provide 2bits per sample,for a total data rate of 24Mbps.4.A signal-to-noise ratio of 20dB means S/N =100.Since log 2101is about6.658,the Shannon limit is about 19.975kbps.The Nyquist limit is 6kbps.The bottleneck is therefore the Nyquist limit,giving a maximum channel capacity of 6kbps.5.To send a T1signal we need H log 2(1+S /N )=1.544×106with H =50,000.This yields S /N =230−1,which is about 93dB.6.A passive star has no electronics.The light from one fiber illuminates a number of others.An active repeater converts the optical signal to an electri-cal one for further processing.e ∆f =c ∆λ/λ2with ∆λ=10−7meters and λ=10−6meters.This gives a bandwidth (∆f )of 30,000GHz.8.The data rate is 480×640×24×60bps,which is 442Mbps.For simplicity,let us assume 1bps per Hz.From Eq.(2-3)we get ∆λ=λ2∆f /c .We have ∆f =4.42×108,so ∆λ=2.5×10−6microns.The range of wavelengths used is very short.9.The Nyquist theorem is a property of mathematics and has nothing to do with technology.It says that if you have a function whose Fourier spectrum does not contain any sines or cosines above f ,then by sampling the function at a6PROBLEM SOLUTIONS FOR CHAPTER2frequency of2f you capture all the information there is.Thus,the Nyquist theorem is true for all media.10.In the text it was stated that the bandwidths(i.e.,the frequency ranges)of thethree bands were approximately equal.From the formula∆f=c∆λ/λ2,it is clear that to get a constant∆f,the higher the frequency,the larger∆λhas to be.The x-axis in thefigure isλ,so the higher the frequency,the more∆λyou need.In fact,∆λis quadratic inλ.The fact that the bands are approxi-mately equal is an accidental property of the kind of silicon used.11.Start withλf=c.We know that c is3×108m/s.Forλ=1cm,we get30GHz.Forλ=5m,we get60MHz.Thus,the band covered is60MHz to30 GHz.12.At1GHz,the waves are30cm long.If one wave travels15cm more thanthe other,they will arrive out of phase.The fact that the link is50km long is irrelevant.13.If the beam is off by1mm at the end,it misses the detector.This amounts toa triangle with base100m and height0.001m.The angle is one whosetangent is thus0.00001.This angle is about0.00057degrees.14.With66/6or11satellites per necklace,every90minutes11satellites passoverhead.This means there is a transit every491seconds.Thus,there will be a handoff about every8minutes and11seconds.15.The satellite moves from being directly overhead toward the southern hor-izon,with a maximum excursion from the vertical of2φ.It takes24hours to go from directly overhead to maximum excursion and then back.16.The number of area codes was8×2×10,which is160.The number ofprefixes was8×8×10,or640.Thus,the number of end offices was limited to102,400.This limit is not a problem.17.With a10-digit telephone number,there could be1010numbers,althoughmany of the area codes are illegal,such as000.However,a much tighter limit is given by the number of end offices.There are22,000end offices, each with a maximum of10,000lines.This gives a maximum of220million telephones.There is simply no place to connect more of them.This could never be achieved in practice because some end offices are not full.An end office in a small town in Wyoming may not have10,000customers near it,so those lines are wasted.18.Each telephone makes0.5calls/hour at6minutes each.Thus,a telephoneoccupies a circuit for3minutes/hour.Twenty telephones can share a circuit, although having the load be close to100%(ρ=1in queueing terms)implies very long wait times).Since10%of the calls are long distance,it takes200 telephones to occupy a long-distance circuit full time.The interoffice trunkPROBLEM SOLUTIONS FOR CHAPTER27 has1,000,000/4000=250circuits multiplexed onto it.With200telephones per circuit,an end office can support200×250=50,000telephones.19.The cross-section of each strand of a twisted pair isπ/4square mm.A10-kmlength of this material,with two strands per pair has a volume of 2π/4×10−2m3.This volume is about15,708cm3.With a specific gravity of9.0,each local loop has a mass of141kg.The phone company thus owns1.4×109kg of copper.At3dollars each,the copper is worth about4.2bil-lion dollars.20.Like a single railroad track,it is half duplex.Oil canflow in either direction,but not both ways at once.21.Traditionally,bits have been sent over the line without any error correctingscheme in the physical layer.The presence of a CPU in each modem makes it possible to include an error correcting code in layer1to greatly reduce the effective error rate seen by layer2.The error handling by the modems can be done totally transparently to layer2.Many modems now have built in error correction.22.There are four legal values per baud,so the bit rate is twice the baud rate.At1200baud,the data rate is2400bps.23.The phase shift is always0,but two amplitudes are used,so this is straightamplitude modulation.24.If all the points are equidistant from the origin,they all have the same ampli-tude,so amplitude modulation is not being used.Frequency modulation is never used in constellation diagrams,so the encoding is pure phase shift key-ing.25.Two,one for upstream and one for downstream.The modulation schemeitself just uses amplitude and phase.The frequency is not modulated.26.There are256channels in all,minus6for POTS and2for control,leaving248for data.If3/4of these are for downstream,that gives186channels for downstream.ADSL modulation is at4000baud,so with QAM-64(6 bits/baud)we have24,000bps in each of the186channels.The total bandwidth is then4.464Mbps downstream.27.A5-KB Web page has40,000bits.The download time over a36Mbps chan-nel is1.1msec.If the queueing delay is also1.1msec,the total time is2.2 msec.Over ADSL there is no queueing delay,so the download time at1 Mbps is40msec.At56kbps it is714msec.28.There are ten4000Hz signals.We need nine guard bands to avoid anyinterference.The minimum bandwidth required is4000×10+400×9= 43,600Hz.8PROBLEM SOLUTIONS FOR CHAPTER229.A sampling time of125µsec corresponds to8000samples per second.According to the Nyquist theorem,this is the sampling frequency needed to capture all the information in a4kHz channel,such as a telephone channel.(Actually the nominal bandwidth is somewhat less,but the cutoff is not sharp.)30.The end users get7×24=168of the193bits in a frame.The overhead istherefore25/193=13%.31.In both cases8000samples/sec are possible.With dibit encoding,two bitsare sent per sample.With T1,7bits are sent per period.The respective data rates are16kbps and56kbps.32.Ten frames.The probability of some random pattern being010*******(on adigital channel)is1/1024.33.A coder accepts an arbitrary analog signal and generates a digital signal fromit.A demodulator accepts a modulated sine wave only and generates a digital signal.34.(a)64kbps.(b)32kbps.(c)8kbps.35.The signal must go from0to A in one quarter of a wave—that is,in a timeT/4.In order to track the signal,8steps mustfit into the quarter wave,or32 samples per full wave.The time per sample is1/x so the full period must be long enough to contain32samples—that is,T>32/x or f max=x/32.36.A drift rate of10−9means1second in109seconds or1nsec per second.AtOC-1speed,say,50Mbps,for simplicity,a bit lasts for20nsec.This means it takes only20seconds for the clock to drift off by one bit.Consequently, the clocks must be continuously synchronized to keep them from getting too far apart.Certainly every10sec,preferably much more often.37.Of the90columns,86are available for user data in OC-1.Thus,the usercapacity is86×9=774bytes/frame.With8bits/byte,8000frames/sec,and 3OC-1carriers multiplexed together,the total user capacity is 3×774×8×8000,or148.608Mbps.38.VT1.5can accommodate8000frames/sec×3columns×9rows×8bits=1.728Mbps.It can be used to accommodate DS-1.VT2can accommodate8000frames/sec×4columns×9rows×8bits=2.304Mbps.It can be used to accommodate European CEPT-1service.VT6can accommodate8000 frames/sec×12columns×9rows×8bits=6.912Mbps.It can be used to accommodate DS-2service.39.Message switching sends data units that can be arbitrarily long.Packetswitching has a maximum packet size.Any message longer than that is split up into multiple packets.40.The OC-12c frames are12×90=1080columns of9rows.Of these,12×3=36columns are taken up by line and section overhead.This leaves an SPE of1044columns.One SPE column is taken up by path overhead, leaving1043columns for user data.Since each column holds9bytes of8 bits,an OC-12c frame holds75,096user data bits.With8000frames/sec,the user data rate is600.768Mbps.41.The three networks have the following properties:star:best case=2,average case=2,worst case=2ring:best case=1,average case=n/4,worst case=n/2full interconnect:best case=1,average case=1,worst case=142.With circuit switching,at t=s the circuit is set up;at t=s+x/b the last bitis sent;at t=s+x/b+kd the message arrives.With packet switching,the last bit is sent at t=x/b.To get to thefinal destination,the last packet must be retransmitted k−1times by intermediate routers,each retransmission tak-ing p/b sec,so the total delay is x/b+(k−1)p/b+kd.Packet switching is faster if s>(k−1)p/b.43.The total number of packets needed is x/p,so the total data+header traffic is(p+h)x/p bits.The source requires(p+h)x/pb sec to transmit these bits.The retransmissions of the last packet by the intermediate routers take up a total of(k−1)(p+h)/b sec.Adding up the time for the source to send all the bits,plus the time for the routers to carry the last packet to the destination, thus clearing the pipeline,we get a total time of(p+h)x/pb+ (p+h)(k−1)/b sec.Minimizing this quantity with respect to p,wefind hx/(k−1).p=√44.Each cell has six neighbors.If the central cell uses frequency group A,its sixneighbors can use B,C,B,C,B,and C respectively.In other words,only3 unique cells are needed.Consequently,each cell can have280frequencies.45.First,initial deployment simply placed cells in regions where there was highdensity of human or vehicle population.Once they were there,the operator often did not want to go to the trouble of moving them.Second,antennas are typically placed on tall buildings or mountains.Depending on the exact loca-tion of such structures,the area covered by a cell may be irregular due to obs-tacles near the transmitter.Third,some communities or property owners do not allow building a tower at a location where the center of a cell falls.In such cases,directional antennas are placed at a location not at the cell center.46.If we assume that each microcell is a circle100m in diameter,then each cellhas an area of2500π.If we take the area of San Francisco,1.2×108m2and divide it by the area of1microcell,we get15,279microcells.Of course,it is impossible to tile the plane with circles(and San Francisco is decidedly three-dimensional),but with20,000microcells we could probably do the job.47.Frequencies cannot be reused in adjacent cells,so when a user moves fromone cell to another,a new frequency must be allocated for the call.If a user moves into a cell,all of whose frequencies are currently in use,the user ’s call must be terminated.48.It is not caused directly by the need for backward compatibility.The 30kHzchannel was indeed a requirement,but the designers of D-AMPS did not have to stuff three users into it.They could have put two users in each channel,increasing the payload before error correction from 260×50=13kbps to 260×75=19.5kbps.Thus,the quality loss was an intentional trade-off to put more users per cell and thus get away with bigger cells.49.D-AMPS uses 832channels (in each direction)with three users sharing a sin-gle channel.This allows D-AMPS to support up to 2496users simultane-ously per cell.GSM uses 124channels with eight users sharing a single channel.This allows GSM to support up to 992users simultaneously.Both systems use about the same amount of spectrum (25MHz in each direction).D-AMPS uses 30KHz ×892=26.76MHz.GSM uses 200KHz ×124=24.80MHz.The difference can be mainly attributed to the better speech quality provided by GSM (13Kbps per user)over D-AMPS (8Kbps per user).50.The result is obtained by negating each of A ,B ,and C and then adding thethree chip sequences.Alternatively the three can be added and then negated.The result is (+3+1+1−1−3−1−1+1).51.By de finitionS d T ≡m 1 i =1ΣmS i T i If T sends a 0bit instead of 1bit,its chip sequence is negated,with the i -th element becoming −T i .Thus,S d T ≡m 1 i =1Σm S i (−T i )=−m 1 i =1ΣmS i T i =052.When two elements match,their product is +1.When they do not match,their product is −1.To make the sum 0,there must be as many matches as mismatches.Thus,two chip sequences are orthogonal if exactly half of the corresponding elements match and exactly half do not match.53.Just compute the four normalized inner products:(−1+1−3+1−1−3+1+1)d (−1−1−1+1+1−1+1+1)/8=1(−1+1−3+1−1−3+1+1)d (−1−1+1−1+1+1+1−1)/8=−1(−1+1−3+1−1−3+1+1)d (−1+1−1+1+1+1−1−1)/8=0(−1+1−3+1−1−3+1+1)d (−1+1−1−1−1−1+1−1)/8=1The result is that A and D sent 1bits,B sent a 0bit,and C was silent.54.Ignoring speech compression,a digital PCM telephone needs 64kbps.If wedivide 10Gbps by 64kbps we get 156,250houses per cable.Current systems have hundreds of houses per cable.55.It is both.Each of the 100channels is assigned its own frequency band(FDM),and on each channel the two logical streams are intermixed by TDM.This example is the same as the AM radio example given in the text,but nei-ther is a fantastic example of TDM because the alternation is irregular.56.A 2-Mbps downstream bandwidth guarantee to each house implies at most 50houses per coaxial cable.Thus,the cable company will need to split up the existing cable into 100coaxial cables and connect each of them directly to a fiber node.57.The upstream bandwidth is ing QPSK with 2bits/Hz,we get 74Mbps upstream.Downstream we have ing QAM-64,this is ing QAM-256,this is 1600Mbps.58.Even if the downstream channel works at 27Mbps,the user interface isnearly always 10-Mbps Ethernet.There is no way to get bits to the computer any faster than 10-Mbps under these circumstances.If the connection between the PC and cable modem is fast Ethernet,then the full 27Mbps may be ually,cable operators specify 10Mbps Ethernet because they do not want one user sucking up the entire bandwidth.SOLUTIONS TO CHAPTER 3PROBLEMS1.Since each frame has a chance of 0.8of getting through,the chance of the whole message getting through is 0.810,which is about 0.107.Call this value p .The expected number of transmissions for an entire message is thenE =i =1Σ∞ip (1−p )i −1=p i =1Σ∞i (1−p )i −1To reduce this,use the well-known formula for the sum of an in finite geometric series,S =1=1Σ∞αi =1−α1 Differentiate both sides with respect to αto get S ′=i =1Σ∞i αi −1=(1−α)21Now useα=1−p to get E=1/p.Thus,it takes an average of1/0.107,or about9.3transmissions.2.The solution is(a)0000010001000111111000111110000001111110(b)0111111001000111111000111110000011100000111000000111111001111110(c)0111111001000111110100011111000000011111010011111103.After stuffing,we get A B ESC ESC C ESC ESC ESC FLAG ESC FLAG D.4.If you could always count on an endless stream of frames,oneflag byte mightbe enough.But what if a frame ends(with aflag byte)and there are no new frames for15minutes.How will the receiver know that the next byte is actu-ally the start of a new frame and not just noise on the line?The protocol is much simpler with starting and endingflag bytes.5.The output is011110111110011111010.6.It is possible.Suppose that the original text contains the bit sequence01111110as data.After bit stuffing,this sequence will be rendered as 011111010.If the second0is lost due to a transmission error,what is received is01111110,which the receiver sees as end of frame.It then looks just before the end of the frame for the checksum and verifies it.If the check-sum is16bits,there is1chance in216that it will accidentally be correct, leading to an incorrect frame being accepted.The longer the checksum,the lower the probability of an error getting through undetected,but the probabil-ity is never zero.7.If the propagation delay is very long,as in the case of a space probe on ornear Mars or Venus,forward error correction is indicated.It is also appropri-ate,in a military situation in which the receiver does not want to disclose his location by transmitting.If the error rate is low enough that an error-correcting code is good enough,it may also be simpler.Finally,real-time systems cannot tolerate waiting for retransmissions.8.Making one change to any valid character cannot generate another valid char-acter due to the nature of parity bits.Making two changes to even bits or two changes to odd bits will give another valid character,so the distance is2.9.Parity bits are needed at positions1,2,4,8,and16,so messages that do notextend beyond bit31(including the parity bits)fit.Thus,five parity bits are sufficient.The bit pattern transmitted is01101011001100111010110.The encoded value is101001001111.。