3-习题参考答案.doc

合集下载

第三章连接课后习题参考答案

第三章连接课后习题参考答案

第三章连接课后习题参考答案焊接连接参考答案一、概念题 3.1 从功能上分类,连接有哪几种根本类型? 3.2 焊缝有两种根本类型—对接坡口焊缝和贴角焊缝,二者在施工、受力、适用范围上各有哪些特点? 3.3 对接接头连接需使用对接焊缝,角接接头连接需采用角焊缝,这么说对吗? 3.4 hf和lw相同时,吊车梁上的焊缝采用正面角焊缝比采用侧面角焊缝承载力高? 3.5 为何对角焊缝焊脚尺寸有最大和最小取值的限制?对侧面角焊缝的长度有何要求?为什么?【答】(1)最小焊脚尺寸:角焊缝的焊脚尺寸不能过小,否那么焊接时产生的热量较小,致使施焊时冷却速度过快,导致母材开裂。

《标准》规定:hf≥1.5,式中: t2——较厚焊件厚度,单位为mm。

计算时,焊脚尺寸取整数。

自动焊熔深较大,所取最小焊脚尺寸可减小1mm; T形连接的单面角焊缝,应增加1mm;当焊件厚度小于或等于4mm时,那么取与焊件厚度相同。

(2)最大焊脚尺寸:为了防止焊缝区的主体金属“过热”,减小焊件的焊接剩余应力和剩余变形,角焊缝的焊脚尺寸应满足式中:t1——较薄焊件的厚度,单位为mm。

(3)侧面角焊缝的最大计算长度侧面角焊缝在弹性阶段沿长度方向受力不均匀,两端大而中间小,可能首先在焊缝的两端破坏,故规定侧面角焊缝的计算长度lw≤60hf。

假设内力沿侧面角焊缝全长分布,例如焊接梁翼缘与腹板的连接焊缝,可不受上述限制。

3.6 简述焊接剩余应力产生的实质,其最大分布特点是什么?3.7 画出焊接H形截面和焊接箱形截面的焊接剩余应力分布图。

3.8 贴角焊缝中,何为端焊缝?何为侧焊缝?二者破坏截面上的应力性质有何区别? 3.9 标准规定:侧焊缝的计算长度不得大于焊脚尺寸的某个倍数,原因何在?标准同时有焊缝最小尺寸的规定,原因何在? 3.10 标准禁止3条相互垂直的焊缝相交,为什么。

3.11 举3~5例说明焊接设计中减小应力集中的构造措施。

3.12 简述连接设计中等强度法和内力法的含义。

机械制造装备设计第3章习题答案

机械制造装备设计第3章习题答案

《机械制造装备设计》第4版第三章习题参考答案3-1 为什么对机床主轴要提出旋转精度、刚度、抗振性、温升及耐磨性要求?主轴组件的功用是缩小主运动的传动误差并将运动传递给工件或刀具进行切削,形成表面成形运动;承受切削力和传动力等载荷。

主轴组件直接参与切削,其性能影响加工精度和生产率。

末端传动组件(包括轴承)要有较高的制造精度、支承刚度,必要时采用校正机构,这样可缩小前面传动件的传动误差,且末端组件不产生或少产生传动误差。

旋转精度是主轴组件装配后,静止或低速空载状态下,刀具或工件安装基面上的全跳动值。

它取决于主轴、主轴的支承轴承、箱体孔等的制造精度,装配和调整精度。

动态刚度包括抗振性、热变形、噪声。

耐磨性是精度保持性的体现。

故机床主轴要提出旋转精度、刚度、抗振性、温升及耐磨性要求。

3-2 主轴部件采用的滚动轴承有那些类型,其特点和选用原则是什么?双列圆柱滚子轴承、双向推力角接触球轴承、角接触球轴承、双列圆锥滚子轴承。

双列圆柱滚子轴承,滚子直径小,数量多(50~60个),具有较高的刚度;两列滚子交错:1,轴向布置,减少了刚度的变化量;外圈无挡边,加工方便;主轴内孔为锥孔,锥度12移动内圈使之径向变形,调整径向间隙和预紧;黄铜实体保持架,利于轴承散热。

NN3000K 超轻系列轴承。

轴承型号为234400,接触角60ο,滚动体直径小,极限转速高;外圈和箱体孔为间隙配合,安装方便,且不承受径向载荷;与双列圆柱滚子轴承配套使用。

角接触球轴承常用的型号有7000C系列和7000AC系列,前者接触角为15ο,后者为25ο。

7000C系列多用于极限转速高,轴向负载小的机床,如内圆磨床主轴等;7000AC系列多用于极限转速高于双列滚子轴承,轴向载荷较大的机床,如车床主轴和加工中心主轴。

为提高支承刚度,可采用两个角接触球轴承组合安装。

圆锥滚子轴承,与圆锥齿轮相似,内圈滚道锥面、外圈滚道锥面及圆锥滚子轴线形成的锥面相交于一点,以保证圆锥滚子的纯滚动。

模块三合伙企业法案例分析及习题参考答案.doc

模块三合伙企业法案例分析及习题参考答案.doc

模块三:《合伙企业法》案例分析及习题参考答案4模块三《合伙企业法》案例分析及习题参考答案第一部分案例与分析【解析】答:(1)甲以合伙企业名义与B公司所签的代销合同有效。

根据《合伙企业法》的规定,合伙企业对合伙人执行合伙企业事务以及对外代表合伙企业权利的限制,不得对抗不知情的善意第三人。

在本题中,尽管合伙人甲超越了合伙企业的内部限制(即甲只可签订2万元及以下的合同),但B公司为善意第三人,因此甲以合伙企业名义与B公司签订的代销合同有效。

(2)丁和戊的主张都不成立。

对丁来说,因为根据《合伙企业法》的规定,退伙人对其退伙前已发生的合伙企业债务,与其他合伙人承担连带责任。

戊的主张不成立,根据《合伙企业法》的规定,入伙的新合伙人对入伙前合伙企业的债务承担连带责任,所以,丁和戊的主张都不成立。

如果丁向A企业偿还了全部债务,丁可以向合伙人甲、乙、丙、戊进行追偿,追偿的数额为10万元。

合伙人丁虽已退伙,但(对外)对其退伙前已发生的合伙企业债务承担连带责任,但在合伙企业(内部)对合伙企业债务不承担清偿责任。

第三部分模块实践内容(一)不定项选择题参考答案1、ACD2、A3、ACD4、A5、ABCD6、B7、BCD8、C(二)简答题:略(三)案例分析题答:(1)丁以劳务作价入伙符合法律规定。

根据规定,有限合伙人不得以劳务出资,丁对企业债务承担无限连带责任,属于有限合伙企业中的普通合伙人,允许以劳务作价入伙。

(2)合伙协议约定企业成立后第1年,丁不参加利润分配符合法律规定。

根据规定,有限合伙企业不得将全部利润分配给部分合伙人;但是,合伙协议另有约定的除外。

所以,丁不参加当年利润分配,符合约定要求。

(3)合伙协议约定由丁作为事务执行人,其他合伙人不参与合伙企业事务符合法律规定。

根据规定,有限合伙企业由普通合伙人执行合伙事务。

有限合伙人不执行合伙事务,不得对外代表有限合伙企业。

(4)甲的主张不符合法律规定。

根据规定,有限合伙人可以同本有限合伙企业进行交易;但是,合伙协议另有约定的除外。

3-SQL语句练习题参考答案

3-SQL语句练习题参考答案

标准SQL语言一、选择题1、下面关于SQL标准的叙述中,不正确的是(B )。

A.SQL语言是集数据定义、数据操纵、数据控制功能为一体的语言。

B.SQL语言是一种高度过程化的语言。

C.SQL标准规定数据库是按三级模式结构构建。

D.SQL语言是关系型数据库的标准语言。

E.SQL语言是面向集合的语言。

2、SQL语言中,修改基本表结构的语句是( B )。

A.UPDATE B.ALTER C.DROP D.CREATE3、SQL语言中,删除基本表结构的语句是( C )。

A.DELETE B.ALTER C.DROP D.CREATE4、下面关于“视图”的叙述中,不正确的是( C )。

A.视图是一种“虚表”,它的数据被存放在基本表中。

B.视图提供了逻辑数据独立性。

C.不能通过视图来更新数据库中的数据。

D.视图能提供对数据的安全保护。

5、下面关于SELECT语句的叙述中,不正确的是(C)。

A.SELECT产生的结果是一个集合。

B.HA VING子句必须与GROUP BY子句一起使用。

C.可以省略FROM子句。

D.可以省略WHERE子句。

二、填空题1、在使用INSERT语句向一个表中插入元组时,“值列表”中值的个数、(顺序)、类型必须与“列名表”保持一致。

2、在向一个表中插入元组时,对于未指定默认值且(不能取空值)的字段必须赋值。

3、向表中插入元组时,主键的值不能取(NULL )值。

4、在使用DELETE语句时,如果不指定(where 条件)就会将整个表的数据删除。

5、视图是从一个或几个基本表或(视图)导出的表,它与基本表不同,是一个虚表。

三、判断题1、SQL语言是面向集合操作的语言。

√2、可以通过视图来查询数据,但不能通过视图来更新数据库中的数据。

×3、在SQL Server数据库系统中,向表中插入元组时,系统自动为具有标识属性的列赋值。

√4、在SQL Server数据库系统中,向表中插入元组时,对取值类型为timestamp(时间戳)的列不能赋值,系统自动赋值。

三级物业管理师习题库含参考答案

三级物业管理师习题库含参考答案

三级物业管理师习题库含参考答案一、单选题(共60题,每题1分,共60分)1、服务指标要求月走访查房率( )以上。

A、50%B、30%C、80%D、60%正确答案:A2、在新开发物业验收之前,通常由开发商行使管理权和处置权,自设或委托一家物业管理公司介入前期物业管理工作,并签订( )。

A、前期物业委托管理合同B、前期物业管理服务协议书C、永久性合作协议D、临时物业委托管理合同正确答案:B3、抵押人、抵押权人姓名变更的,当事人可以持不动产权属证书、不动产登记证明等必要材料,申请( )A、抵押权变更登记B、抵押人变更登记C、抵押变更登记D、债权变更登记正确答案:A4、( )是可以单独订立的书面合同,也可以是主债权合同中的抵押条款A、抵押合同B、债权合同C、质押物价值评估条款D、质押合同正确答案:A5、前款规定的孳息应当先充抵收取( )A、余额的费用B、孳息的押金C、孳息的费用D、利息的费用正确答案:C6、下列四项工作中,属于物业绿化管理中日常养护管理工作的是( )。

A、节日花木装饰B、绿化翻新改造C、花木种植D、浇水正确答案:D7、物业服务企业应依照( )提供物业管理服务。

A、用户手册B、物业服务合同约定C、临时公约D、物业管理条例正确答案:B8、建设部对住宅小区物业管理服务质量的具体要求有( )。

A、房屋完好率达98%以上B、居民满意率达90%以上C、房屋零修及时率达100%D、新建小区公共绿地人均3平方米以上正确答案:A9、物业消防设备设施技术档案不包括( )。

A、消防设施设备分布B、日常运行C、维修和改造D、业主投诉正确答案:D10、有配置灭火器、现场安全风险有防范,每发现一处不符合扣( )分A、0.1B、0.2C、0.3D、0.5正确答案:B11、为防止雷击时产生跨步电压,避雷接地装置与道路及建筑物的主要入口距离不得小于( )A、3米B、半米D、1米正确答案:A12、新建小区首次业主大会会议的筹备经费,由( )承担。

3 习题参考答案

3 习题参考答案

高分子第三章习题参考答案思考题2、下列烯类单体适于何种机理聚合:自由基聚合,阳离子聚合或阴离子聚合?并说明理由。

CH2=CHCl,CH2=CCl2,CH2=CHCN,CH2=C(CN)2,CH2=CHCH3,CH2=C(CH3)2,CH2=CHC5H6,CF2=CF2,CH2=C(CN)COOCH3,CH2=C(CH3)-CH=CH2参考答案:CH2=CHCl:适于自由基聚合,Cl原子是吸电子基团,也有共轭效应,但较弱。

CH2=CCl2:适于自由基聚合,Cl原子是吸电子基团。

CH2=CHCN:适于自由基聚合和阴离子聚合,CN是强吸电子基团,并有共轭效应。

CH2=C(CN)2:适于自由基聚合和阴离子聚合,CN是强吸电子基团。

CH2=CHCH3:适于阳离子聚合,CH3是供电子基团,CH3是与双键有超共额轭效应。

CH2=C(CH3)2:适于阳离子聚合,CH3是供电子基团,CH3是与双键有超共轭效应。

CH2=CHC5H6和CH2=C(CH3)-CH=CH2:均可进行自由基聚合、阳离子聚合和阴离子聚合。

因为共轭体系π电子的容易极化和流动。

CF2=CF2:适于自由基聚合。

F原子体积小,结构对称。

CH2=C(CN)COOCH:适合阴离子和自由基聚合,两个吸电子基,并兼有共轭效应。

3、判别下列单体能否进行自由基聚合,并说明理由。

CH2=C(C5H6)2,ClCH=CHCl,CH2=C(CH3)C2H5,CH3CH=CHCH3,CH2=C(CH3)COOCH3,CH2=CHOCOCH3,CH3 CH=CHCOCH3参考答案:CH2=C(C5H6)2不能通过自由基聚合形成高分子量聚合物。

因为取带基空间阻碍大,形成高分子键时张力也大,故只能形成二聚体。

ClCH=CHCl不能通过自由基聚合形成高分子量聚合物。

因为单体结构对称,1,2-而取代基造成较大空间阻碍。

CH2=C(CH3)C2H5不能通过自由基聚合形成高分子量聚合物。

3. 第三章课后习题及答案

3. 第三章课后习题及答案

第三章1. (Q1) Suppose the network layer provides the following service. The network layer in the source host accepts a segment of maximum size 1,200 bytes and a destination host address from the transport layer. The network layer then guarantees to deliver the segment to the transport layer at the destination host. Suppose many network application processes can be running at the destination host.a. Design the simplest possible transport-layer protocol that will get application data to thedesired process at the destination host. Assume the operating system in the destination host has assigned a 4-byte port number to each running application process.b. Modify this protocol so that it provides a “return address” to the destination process.c. In your protocols, does the transport layer “have to do anything” in the core of the computernetwork.Answer:a. Call this protocol Simple Transport Protocol (STP). At the sender side, STP accepts from thesending process a chunk of data not exceeding 1196 bytes, a destination host address, and a destination port number. STP adds a four-byte header to each chunk and puts the port number of the destination process in this header. STP then gives the destination host address and the resulting segment to the network layer. The network layer delivers the segment to STP at the destination host. STP then examines the port number in the segment, extracts the data from the segment, and passes the data to the process identified by the port number.b. The segment now has two header fields: a source port field and destination port field. At thesender side, STP accepts a chunk of data not exceeding 1192 bytes, a destination host address,a source port number, and a destination port number. STP creates a segment which contains theapplication data, source port number, and destination port number. It then gives the segment and the destination host address to the network layer. After receiving the segment, STP at the receiving host gives the application process the application data and the source port number.c. No, the transport layer does not have to do anything in the core; the transport layer “lives” inthe end systems.2. (Q2) Consider a planet where everyone belongs to a family of six, every family lives in its own house, each house has a unique address, and each person in a given house has a unique name. Suppose this planet has a mail service that delivers letters form source house to destination house. The mail service requires that (i) the letter be in an envelope and that (ii) the address of the destination house (and nothing more ) be clearly written on the envelope. Suppose each family has a delegate family member who collects and distributes letters for the other family members. The letters do not necessarily provide any indication of the recipients of the letters.a. Using the solution to Problem Q1 above as inspiration, describe a protocol that thedelegates can use to deliver letters from a sending family member to a receiving family member.b. In your protocol, does the mail service ever have to open the envelope and examine theletter in order to provide its service.Answer:a.For sending a letter, the family member is required to give the delegate the letter itself, theaddress of the destination house, and the name of the recipient. The delegate clearly writes the recipient’s name on the top of the letter. The delegate then puts the letter in an e nvelope and writes the address of the destination house on the envelope. The delegate then gives the letter to the planet’s mail service. At the receiving side, the delegate receives the letter from the mail service, takes the letter out of the envelope, and takes note of the recipient name written at the top of the letter. The delegate than gives the letter to the family member with this name.b.No, the mail service does not have to open the envelope; it only examines the address on theenvelope.3. (Q3) Describe why an application developer might choose to run an application over UDP rather than TCP.Answer:An application developer may not want its application to use TCP’s congestion control, which can throttle the application’s sending rate at times of congestion. Often, designers of IP telephony and IP videoconference applications choose to run their applications over UDP because they want to avoid TCP’s congestion control. Also, some applications do not need the reliable data transfer provided by TCP.4. (P1) Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers fora. The segment sent from A to B.b. The segment sent from B to S.c. The segment sent from S to A.d. The segment sent from S to B.e. If A and B are different hosts, is it possible that the source port number in the segment fromA to S is the same as that fromB to S?f. How about if they are the same host?Yes.f No.5. (P2) Consider Figure 3.5 What are the source and destination port values in the segmentsflowing form the server back to the clients’ processes? What are the IP addresses in the network-layer datagrams carrying the transport-layer segments?Answer:Suppose the IP addresses of the hosts A, B, and C are a, b, c, respectively. (Note that a,b,c aredistinct.)To host A: Source port =80, source IP address = b, dest port = 26145, dest IP address = a To host C, left process: Source port =80, source IP address = b, dest port = 7532, dest IP address = cTo host C, right process: Source port =80, source IP address = b, dest port = 26145, dest IP address = c6. (P3) UDP and TCP use 1s complement for their checksums. Suppose you have the followingthree 8-bit bytes: 01101010, 01001111, 01110011. What is the 1s complement of the sum of these 8-bit bytes? (Note that although UDP and TCP use 16-bit words in computing the checksum, for this problem you are being asked to consider 8-bit sums.) Show all work. Why is it that UDP takes the 1s complement of the sum; that is , why not just sue the sum? With the 1s complement scheme, how does the receiver detect errors? Is it possible that a 1-bit error will go undetected? How about a 2-bit error?Answer:One's complement = 1 1 1 0 1 1 1 0.To detect errors, the receiver adds the four words (the three original words and the checksum). If the sum contains a zero, the receiver knows there has been an error. All one-bit errors will be detected, but two-bit errors can be undetected (e.g., if the last digit of the first word is converted to a 0 and the last digit of the second word is converted to a 1).7. (P4) Suppose that the UDP receiver computes the Internet checksum for the received UDPsegment and finds that it matches the value carried in the checksum field. Can the receiver be absolutely certain that no bit errors have occurred? Explain.Answer:No, the receiver cannot be absolutely certain that no bit errors have occurred. This is because of the manner in which the checksum for the packet is calculated. If the corresponding bits (that would be added together) of two 16-bit words in the packet were 0 and 1 then even if these get flipped to 1 and 0 respectively, the sum still remains the same. Hence, the 1s complement the receiver calculates will also be the same. This means the checksum will verify even if there was transmission error.8. (P5) a. Suppose you have the following 2 bytes: 01001010 and 01111001. What is the 1scomplement of sum of these 2 bytes?b. Suppose you have the following 2 bytes: 11110101 and 01101110. What is the 1s complement of sum of these 2 bytes?c. For the bytes in part (a), give an example where one bit is flipped in each of the 2 bytesand yet the 1s complement doesn’t change.0 1 0 1 0 1 0 1 + 0 1 1 1 0 0 0 0 1 1 0 0 0 1 0 1 1 1 0 0 0 1 0 1 + 0 1 0 0 1 1 0 0 0 0 0 1 0 0 0 1Answer:a. Adding the two bytes gives 10011101. Taking the one’s complement gives 01100010b. Adding the two bytes gives 00011110; the one’s complement gives 11100001.c. first byte = 00110101 ; second byte = 01101000.9. (P6) Consider our motivation for correcting protocol rdt2.1. Show that the receiver, shown inthe figure on the following page, when operating with the sender show in Figure 3.11, can lead the sender and receiver to enter into a deadlock state, where each is waiting for an event that will never occur.Answer:Suppose the sender is in state “Wait for call 1 from above” and the receiver (the receiver shown in the homework problem) is in state “Wait for 1 from below.” The sender sends a packet with sequence number 1, and transitions to “Wait for ACK or NAK 1,” waiting for an ACK or NAK. Suppose now the receiver receives the packet with sequence number 1 correctly, sends an ACK, and transitions to state “Wait for 0 from below,” waiting for a data packet with sequence number 0. However, the ACK is corrupted. When the rdt2.1 sender gets the corrupted ACK, it resends the packet with sequence number 1. However, the receiver is waiting for a packet with sequence number 0 and (as shown in the home work problem) always sends a NAK when it doesn't get a packet with sequence number 0. Hence the sender will always be sending a packet with sequence number 1, and the receiver will always be NAKing that packet. Neither will progress forward from that state.10. (P7) Draw the FSM for the receiver side of protocol rdt3.0Answer:The sender side of protocol rdt3.0 differs from the sender side of protocol 2.2 in that timeouts have been added. We have seen that the introduction of timeouts adds the possibility of duplicate packets into the sender-to-receiver data stream. However, the receiver in protocol rdt.2.2 can already handle duplicate packets. (Receiver-side duplicates in rdt 2.2 would arise if the receiver sent an ACK that was lost, and the sender then retransmitted the old data). Hence the receiver in protocol rdt2.2 will also work as the receiver in protocol rdt 3.0.11. (P8) In protocol rdt3.0, the ACK packets flowing from the receiver to the sender do not havesequence numbers (although they do have an ACK field that contains the sequence number of the packet they are acknowledging). Why is it that our ACK packets do not require sequence numbers?Answer:To best Answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate of an already received data packet. In the case of ACKs, the sender does not need this info (i.e., a sequence number on an ACK) to tell detect a duplicate ACK. A duplicate ACK is obvious to the rdt3.0 receiver, since when it has received the original ACK it transitioned to the next state. The duplicate ACK is not the ACK that the sender needs and hence is ignored by the rdt3.0 sender.12. (P9) Give a trace of the operation of protocol rdt3.0 when data packets and acknowledgmentpackets are garbled. Your trace should be similar to that used in Figure 3.16Answer:Suppose the protocol has been in operation for some time. The sender is in state “Wait for call fro m above” (top left hand corner) and the receiver is in state “Wait for 0 from below”. The scenarios for corrupted data and corrupted ACK are shown in Figure 1.13. (P10) Consider a channel that can lose packets but has a maximum delay that is known.Modify protocol rdt2.1 to include sender timeout and retransmit. Informally argue whyyour protocol can communicate correctly over this channel.Answer:Here, we add a timer, whose value is greater than the known round-trip propagation delay. We add a timeout event to the “Wait for ACK or NAK0” and “Wait for ACK or NAK1” states. If the timeout event occurs, the most recently transmitted packet is retransmitted. Let us see why this protocol will still work with the rdt2.1 receiver.• Suppose the timeout is caused by a lost data packet, i.e., a packet on the senderto- receiver channel. In this case, the receiver never received the previous transmission and, from the receiver's viewpoint, if the timeout retransmission is received, it look exactly the same as if the original transmission is being received.• Suppose now that an ACK is lost. The receiver will eventually retransmit the packet on atimeout. But a retransmission is exactly the same action that is take if an ACK is garbled. Thus the sender's reaction is the same with a loss, as with a garbled ACK. The rdt 2.1 receiver can already handle the case of a garbled ACK.14. (P11) Consider the rdt3.0 protocol. Draw a diagram showing that if the network connectionbetween the sender and receiver can reorder messages (that is, that two messagespropagating in the medium between the sender and receiver can be reordered), thenthe alternating-bit protocol will not work correctly (make sure you clearly identify thesense in which it will not work correctly). Your diagram should have the sender on theleft and the receiver on the right, with the time axis running down the page, showingdata (D) and acknowledgement (A) message exchange. Make sure you indicate thesequence number associated with any data or acknowledgement segment.Answer:15. (P12) The sender side of rdt3.0 simply ignores (that is, takes no action on) all received packetsthat are either in error or have the wrong value in the ack-num field of anacknowledgement packet. Suppose that in such circumstances, rdt3.0 were simply toretransmit the current data packet . Would the protocol still work? (hint: Consider whatwould happen if there were only bit errors; there are no packet losses but prematuretimeout can occur. Consider how many times the nth packet is sent, in the limit as napproaches infinity.)Answer:The protocol would still work, since a retransmission would be what would happen if the packet received with errors has actually been lost (and from the receiver standpoint, it never knows which of these events, if either, will occur). To get at the more subtle issue behind this question, one has to allow for premature timeouts to occur. In this case, if each extra copy of the packet is ACKed and each received extra ACK causes another extra copy of the current packet to be sent, the number of times packet n is sent will increase without bound as n approaches infinity.16. (P13) Consider a reliable data transfer protocol that uses only negative acknowledgements.Suppose the sender sends data only infrequently. Would a NAK-only protocol bepreferable to a protocol that uses ACKs? Why? Now suppose the sender has a lot ofdata to send and the end to end connection experiences few losses. In this second case ,would a NAK-only protocol be preferable to a protocol that uses ACKs? Why?Answer:In a NAK only protocol, the loss of packet x is only detected by the receiver when packetx+1 is received. That is, the receivers receives x-1 and then x+1, only when x+1 is received does the receiver realize that x was missed. If there is a long delay between the transmission of x and the transmission of x+1, then it will be a long time until x can be recovered, under a NAK only protocol.On the other hand, if data is being sent often, then recovery under a NAK-only scheme could happen quickly. Moreover, if errors are infrequent, then NAKs are only occasionally sent (when needed), and ACK are never sent – a significant reduction in feedback in the NAK-only case over the ACK-only case.17. (P14) Consider the cross-country example shown in Figure 3.17. How big would the windowsize have to be for the channel utilization to be greater than 80 percent?Answer:It takes 8 microseconds (or 0.008 milliseconds) to send a packet. in order for the sender to be busy 90 percent of the time, we must have util = 0.9 = (0.008n) / 30.016 or n approximately 3377 packets.18. (P15) Consider a scenario in which Host A wants to simultaneously send packets to Host Band C. A is connected to B and C via a broadcast channel—a packet sent by A is carriedby the channel to both B and C. Suppose that the broadcast channel connecting A, B,and C can independently lose and corrupt packets (and so, for example, a packet sentfrom A might be correctly received by B, but not by C). Design a stop-and-wait-likeerror-control protocol for reliable transferring packets from A to B and C, such that Awill not get new data from the upper layer until it knows that B and C have correctlyreceived the current packet. Give FSM descriptions of A and C. (Hint: The FSM for Bshould be essentially be same as for C.) Also, give a description of the packet format(s)used.Answer:In our solution, the sender will wait until it receives an ACK for a pair of messages (seqnum and seqnum+1) before moving on to the next pair of messages. Data packets have a data field and carry a two-bit sequence number. That is, the valid sequence numbers are 0, 1, 2, and 3. (Note: you should think about why a 1-bit sequence number space of 0, 1 only would not work in the solution below.) ACK messages carry the sequence number of the data packet they are acknowledging.The FSM for the sender and receiver are shown in Figure 2. Note that the sender state records whether (i) no ACKs have been received for the current pair, (ii) an ACK for seqnum (only) has been received, or an ACK for seqnum+1 (only) has been received. In this figure, we assume that theseqnum is initially 0, and that the sender has sent the first two data messages (to get things going).A timeline trace for the sender and receiver recovering from a lost packet is shown below:Sender Receivermake pair (0,1)send packet 0Packet 0 dropssend packet 1receive packet 1buffer packet 1send ACK 1receive ACK 1(timeout)resend packet 0receive packet 0deliver pair (0,1)send ACK 0receive ACK 019. (P16) Consider a scenario in which Host A and Host B want to send messages to Host C. HostsA and C are connected by a channel that can lose and corrupt (but not reorder)message.Hosts B and C are connected by another channel (independent of the channelconnecting A and C) with the same properties. The transport layer at Host C shouldalternate in delivering messages from A and B to the layer above (that is, it should firstdeliver the data from a packet from A, then the data from a packet from B, and so on).Design a stop-and-wait-like error-control protocol for reliable transferring packets fromA toB and C, with alternating delivery atC as described above. Give FSM descriptionsof A and C. (Hint: The FSM for B should be essentially be same as for A.) Also, give adescription of the packet format(s) used.Answer:This problem is a variation on the simple stop and wait protocol (rdt3.0). Because the channel may lose messages and because the sender may resend a message that one of the receivers has already received (either because of a premature timeout or because the other receiver has yet to receive the data correctly), sequence numbers are needed. As in rdt3.0, a 0-bit sequence number will suffice here.The sender and receiver FSM are shown in Figure 3. In this problem, the sender state indicates whether the sender has received an ACK from B (only), from C (only) or from neither C nor B. The receiver state indicates which sequence number the receiver is waiting for.20. (P17) In the generic SR protocol that we studied in Section 3.4.4, the sender transmits amessage as soon as it is available (if it is in the window) without waiting for anacknowledgment. Suppose now that we want an SR protocol that sends messages twoat a time. That is , the sender will send a pair of messages and will send the next pairof messages only when it knows that both messages in the first pair have been receivercorrectly.Suppose that the channel may lose messages but will not corrupt or reorder messages.Design an error-control protocol for the unidirectional reliable transfer of messages.Give an FSM description of the sender and receiver. Describe the format of the packetssent between sender and receiver, and vice versa. If you use any procedure calls otherthan those in Section 3.4(for example, udt_send(), start_timer(), rdt_rcv(), and soon) ,clearly state their actions. Give an example (a timeline trace of sender and receiver)showing how your protocol recovers from a lost packet.Answer:21. (P18) Consider the GBN protocol with a sender window size of 3 and a sequence numberrange of 1024. Suppose that at time t, the next in-order packet that the receiver isexpecting has a sequence number of k. Assume that the medium does not reordermessages. Answer the following questions:a. What are the possible sets of sequence number inside the sender’s window at timet? Justify your Answer.b .What are all possible values of the ACK field in all possible messages currentlypropagating back to the sender at time t? Justify your Answer.Answer:a.Here we have a window size of N=3. Suppose the receiver has received packet k-1, and hasACKed that and all other preceeding packets. If all of these ACK's have been received by sender, then sender's window is [k, k+N-1]. Suppose next that none of the ACKs have been received at the sender. In this second case, the sender's window contains k-1 and the N packets up to and including k-1. The sender's window is thus [k- N,k-1]. By these arguments, the senders window is of size 3 and begins somewhere in the range [k-N,k].b.If the receiver is waiting for packet k, then it has received (and ACKed) packet k-1 and the N-1packets before that. If none of those N ACKs have been yet received by the sender, then ACKmessages with values of [k-N,k-1] may still be propagating back. Because the sender has sent packets [k-N, k-1], it must be the case that the sender has already received an ACK for k-N-1.Once the receiver has sent an ACK for k-N-1 it will never send an ACK that is less that k-N-1.Thus the range of in-flight ACK values can range from k-N-1 to k-1.22. (P19) Answer true or false to the following questions and briefly justify your Answer.a. With the SR protocol, it is possible for the sender to receive an ACK for a packet thatfalls outside of its current window.b. With CBN, it is possible for the sender to receiver an ACK for a packet that fallsoutside of its current window.c. The alternating-bit protocol is the same as the SR protocol with a sender and receiverwindow size of 1.d. The alternating-bit protocol is the same as the GBN protocol with a sender andreceiver window size of 1.Answer:a.True. Suppose the sender has a window size of 3 and sends packets 1, 2, 3 at t0 . At t1 (t1 > t0)the receiver ACKS 1, 2, 3. At t2 (t2 > t1) the sender times out and resends 1, 2, 3. At t3 the receiver receives the duplicates and re-acknowledges 1, 2, 3. At t4 the sender receives the ACKs that the receiver sent at t1 and advances its window to 4, 5, 6. At t5 the sender receives the ACKs 1, 2, 3 the receiver sent at t2 . These ACKs are outside its window.b.True. By essentially the same scenario as in (a).c.True.d.True. Note that with a window size of 1, SR, GBN, and the alternating bit protocol arefunctionally equivalent. The window size of 1 precludes the possibility of out-of-order packets (within the window). A cumulative ACK is just an ordinary ACK in this situation, since it can only refer to the single packet within the window.23. (Q4) Why is it that voice and video traffic is often sent over TCP rather than UDP in today’sInternet. (Hint: The Answer we are looking for has nothing to do with TCP’s congestion-control mechanism. )Answer:Since most firewalls are configured to block UDP traffic, using TCP for video and voice traffic lets the traffic though the firewalls24. (Q5) Is it possible for an application to enjoy reliable data transfer even when the applicationruns over UDP? If so, how?Answer:Yes. The application developer can put reliable data transfer into the application layer protocol. This would require a significant amount of work and debugging, however.25. (Q6) Consider a TCP connection between Host A and Host B. Suppose that the TCP segmentstraveling form Host A to Host B have source port number x and destination portnumber y. What are the source and destination port number for the segments travelingform Host B to Host A?Answer:Source port number y and destination port number x.26. (P20) Suppose we have two network entities, A and B. B has a supply of data messages thatwill be sent to A according to the following conventions. When A gets a request fromthe layer above to get the next data (D) message from B, A must send a request (R)message to B on the A-to-B channel. Only when B receives an R message can it send adata (D) message back to A on the B-to-A channel. A should deliver exactly one copy ofeach D message to the layer above. R message can be lost (but not corrupted) in the A-to-B channel; D messages, once sent, are always delivered correctly. The delay alongboth channels is unknown and variable.Design(give an FSM description of) a protocol that incorporates the appropriatemechanisms to compensate for the loss-prone A-to-B channel and implementsmessage passing to the layer above at entity A, as discussed above. Use only thosemechanisms that are absolutely necessary.Answer:Because the A-to-B channel can lose request messages, A will need to timeout and retransmit its request messages (to be able to recover from loss). Because the channel delays are variable and unknown, it is possible that A will send duplicate requests (i.e., resend a request message that has already been received by B). To be able to detect duplicate request messages, the protocol will use sequence numbers. A 1-bit sequence number will suffice for a stop-and-wait type of request/response protocol.A (the requestor) has 4 states:• “Wait for Request 0 from above.” Here the requestor is waiting for a call from above to request a unit of data. When it receives a request from above, it sends a request message, R0, to B, starts a timer and make s a transition to the “Wait for D0” state. When in the “Wait for Request 0 from above” state, A ign ores anything it receives from B.• “Wait for D0”. Here the requestor is waiting for a D0 data message from B. A timer is always running in this state. If the timer expires, A sends another R0 message, restarts the timer and remains in this state. If a D0 message is received from B, A stops the time and transits to the “Wait for Request 1 from above” state. If A receives a D1 data message while in this state, it is ignored.• “Wait for Request 1 from above.” Here the requestor is again waiting for a call from above to request a unit of data. When it receives a request from above, it sends a request message, R1, to B, starts a timer and makes a transition to the “Wait for D1” state. When in the “Wait for Request 1 from above” state, A ignores anything it receives from B.• “Wait for D1”. Here the requestor is waiting for a D1 data message from B. A timer is always running in this state. If the timer expires, A sends another R1 message, restarts the timer and remains in this state. If a D1 message is received from B, A stops the timer and transits to the “Wait for Request 0 from above” state. If A receives a D0 data message while in this state, it is ignored.The data supplier (B) has only two states:。

统编版三年级语文上册全册课文课后习题参考答案

统编版三年级语文上册全册课文课后习题参考答案

统编版三年级语文上册全册课文课后习题参考答案第一课《大青树下的小学》一、朗读课文,在文中画出有新鲜感的词句与同学交流。

(有新鲜感的词句”是指运用比拟、比照、比喻等等修辞手法的有关词句,使用修饰限定方法写具体形象的有关词句,以及进行细致描述细节的有关词句。

而这样的词句,学生读后感到写得生动有趣、具体形象,有耳目一新的感觉。

)1、早晨,从山坡上,从坪坝里,从一条条开着绒球花和太阳花的小路上,走来了许多小学生,有傣族的,有景颇族的,有阿昌族和德昂族的,还有汉族的。

这句话告诉我们这些来自不同民族的小朋友,早早地起床,迎着朝阳,踩着露珠,高高兴兴地朝着一个共同一个地方──学校走去。

这句话描绘出众多的学生由远及近汇集而来的壮观景象了。

句子中用了三个“从……”相似的结构的词语,和“有……有……有……还有……”让我们一读就在脑海里能形成清楚具体的画面,读起来朗朗上口,形成一定的语势,给我们有身临其境、耳目一新的感觉。

这样的词句,我们叫它为“有新鲜感的词句”。

2、大家穿戴不同、语言不同,来到学校,都成了好朋友。

那鲜艳的民族服装,把学校打扮得更加绚丽多彩。

这句话告诉我们这是一所民族团结的学校。

大家虽然来自不同的家庭,来自不同的民族,穿戴不同,语言不同,但都成了好朋友。

在祖国的大家庭里,在鲜艳的五星红旗下共同过着幸福的学习生活。

“穿戴不同”“鲜艳的服装”“绚丽多彩”形成“绚丽多彩的学校”画面。

3、同学们向在校园里欢唱的小鸟打招呼,向敬爱的老师问好,向高高飘扬的国旗敬礼。

这一句课文作了提示“我好象看到了这样的情景”这是想象的句子。

这句话中连续用了三个“向……”,形成“进行各种活动”的画面。

写出了学校的生活的美好,孩子们来到学校时的欢快心情。

4、最有趣的是,跑来了几只猴子。

这些山林里的朋友,是那样好奇地听着同学们读课文。

下课了,大家在大青树下跳孔雀舞、摔跤、做游戏,招引来许多小鸟,连松鼠、山狸也赶来看热闹。

这句话写出了操场上到底怎样热闹,课间活动丰富多彩,引得小动物心生羡慕,也前来看热闹。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

3-习题参考答案
高分子第三章习题参考答案
思考题
2、下列烯类单体适于何种机理聚合:自由基聚合,阳离子聚合或阴离子聚合?并说明理由。

CH2=CHCl,CH2=CCl2,CH2=CHCN,CH2=C(CN)2,CH2=CHCH3,CH2=C(CH3)2,CH2=CHC5H6,CF2=CF2,CH2=C(CN)COOCH3,
CH2=C(CH3)-CH=CH2
参考答案:
CH2=CHCl:适于自由基聚合,Cl原子是吸电子基团,也有共轭效应,但较弱。

CH2=CCl2:适于自由基聚合,Cl原子是吸电子基团。

CH2=CHCN:适于自由基聚合和阴离子聚合,CN是强吸电子基团,并有共轭效应。

CH2=C(CN)2:适于自由基聚合和阴离子聚合,CN是强吸电子基团。

CH2=CHCH3:适于阳离子聚合,CH3是供电子基团,CH3是与双键有超共额轭效应。

CH2=C(CH3)2:适于阳离子聚合,CH3是供电子基团,CH3是与双键有超共轭效应。

CH2=CHC5H6和CH2=C(CH3)-CH=CH2:均可进行自由基聚合、阳离子聚合和阴离子聚合。

因为共轭体系π电子的容易极化和流动。

CF2=CF2:适于自由基聚合。

F原子体积小,结构对称。

CH2=C(CN)COOCH:适合阴离子和自由基聚合,两个吸电子基,并兼有共轭效应。

3、判别下列单体能否进行自由基聚合,并说明理由。

CH2=C(C5H6)2,ClCH=CHCl,CH2=C(CH3)C2H5,
CH3CH=CHCH3,CH2=C(CH3)COOCH3,CH2=CHOCOCH3,
CH3 CH=CHCOCH3
参考答案:
CH2=C(C5H6)2
(4)链终止反应;
偶合终止:
歧化终止:
8、过氧化二苯甲酰和偶氮二异丁腈是常用的引发剂,有几种方法可以促使其分解成自由基?写出分解反应式。

这两种引发剂的诱导分解和笼蔽效应有什么特点,对应法效率的影响如何?
参考答案:
过氧化二苯甲酰和偶氮二异丁腈可以热引发,也可以光引发。

过氧化二苯甲酰分解反应式:
偶氮二异丁腈的分解反应式:
过氧化二苯甲酰诱导分解较大,偶氮二异丁腈诱导分解较少;(见75页)9、大致说明下列引发剂的使用温度范围,并写出分解反应式:
异丙苯过氧化氢、过氧化十二酰、过氧化二碳酸二环己酯、过硫酸钾-亚铁盐、过氧化二苯甲酰-二甲基苯胺。

参考答案:
体系名称分解温度(℃)
异丙苯过氧化氢125~139
过氧化十二酰50~70
过氧化二碳酸二环己酯50~60
过硫酸钾-亚铁盐室温~80
过氧化二苯甲酰-二甲基苯胺室温~60
异丙苯过氧化氢分解反应式:
过氧化十二酰分解反应式:
过氧化二碳酸二乙基己酯分解反应式:
过硫酸钾-亚铁盐分解反应式:
S2O82-+Fe2+→ SO42-+SO·4-+Fe3+
过氧化二苯甲酰-二甲基苯胺分解反应式:
13、推导自由基聚合动力学方程时,作了哪些基本假设?聚合速率与引发剂浓度平方根成正比,是哪一机理造成的。

这一结论的局限性怎样?
参考答案:
三个假设:(1)等活性理论假设,即链自由基的活性与链长基本无关;
(2)稳态状态假设,即引发速率和终止速率相等;
(3)用于引发的单体远少于增长消耗的单体,即R i<<R p。

聚合速率与引发剂浓度平方根成正比,是由双基终止机理造成的。

这一结论对于凝胶效应,尤其是沉淀聚合,链自由基活性末端手到包埋,难以双基终止;或有单基和双基终止并存,对引发剂浓度级数介于0.5~1.0之间。

17、动力学链长的定义是什么?与平均聚合度的关系?链转移反应对对动力学链长和聚合度有何影响?试举2~3例说明利用链转移反应控制聚合度的工业应用,试用链转移常数数值来帮助说明。

参考答案:
将每个活性种从引发阶段到终止阶段所消耗的单体数定义为动力学链长。

对于无链转移的聚合反应,双基终止时,平均聚合度是动力学链长的两倍;歧化终止时,平均聚合度就是动力学链长。

有链转移反应存在时:向单体、向溶剂、向引发剂向链转移发生链转移都使聚合物的动力学链长和平均聚合度下降。

例如:聚氯乙烯分子量主要决定于向单体转移,由聚合温度来控制,温度升高链转移常数增加,分子量下降;丁苯橡胶的分子量有十二硫醇的用量来调节。

补充题:
1、什么叫链转移反应?有几种形式?对聚合速率和分子量有何影响?什么叫链转移常数?与链转移速率常数的关系?
参考答案:
在自由基聚合过程中,链自由基有可能从单体、溶剂、引发剂等低分子或大分子上夺取一个原子而终止,并使这些失去原子的分子成为自由基,继续新的链的增长,使聚合反应继续进行下去。

这一反应称为链转移反应。

链转移反应有向单体转移、向引发剂转移、向溶剂或链转移剂转移、向大
分子转移等几种。

向单体转移、向引发剂转移、向溶剂或链转移剂转移都使分子量降低,向大分子转移使分子量增加。

对速率的影响见P44表2-16。

链转移速率常数与链增长速率常数之比叫链转移常数。

在链增长速率常数一定时,链转移速率常数越大,链转移常数就越大。

2、聚氯乙烯的分子量为什么与引发剂浓度基本上无关而决定与温度?
参考答案:
氯乙烯在进行自由基聚合时,链自由基向单体转移的速率常数较大,而且受温度影响很大,所以聚氯乙烯的聚合度与引发剂的用量基本无关,仅处决于聚合温度。

3、自由基聚合时,转化率和分子量随时间的变化有何特征?与机理有何关系?参考答案:
自由基聚合时,转化率随聚合时间延长而提高,分子量随聚合时间延长基本不变。

由自由基聚合机理可知,自由基聚合是慢引发、快增长、速终止,一个单体分子从引发,经增长和终止,转变成大分子,时间极短,不能停留在中间聚合度阶段,反应混合物仅由单体和聚合物组成。

计算题
6、苯乙烯单体溶液浓度0.20mol·L-1,过氧类引发剂浓度为4.0×10-3 mol·L-1,在60℃下加热聚合。

如引发剂半衰期44小时,引发剂效率f=0.80,k p=145L·mol·s-1,k t=7.0×107 L·mol·s-1,欲达到50%转化率,需要多长时间?
参考答案:
已知:t1/2=44小时,
由P27页式(2-3)求分解速率常数k d=0.693÷t1/2=0.693÷(44×3600)=4.4×10-6s-1由P38页式(2-27)求达到50%转化率,需要的时间;
解方程得:t=3.4×105s。

11、对于双基终止的自由基聚合,每个大分子含有1.30个引发剂残基。

假定没有链转移反应,试计算歧化和偶合终止的相对量。

参考答案:
偶合终止时一个大分子带有2个引发剂残基,歧化终止时一个大分子带有1个引发剂残基。

设偶合终止为X,则歧化终止为1-X,依题意得:
2X+(1-X)=1.30
解得:X=0.3
即偶合终止占30%,歧化终止70%。

相关文档
最新文档