(完整版)计算机网络英文题库(附答案)chapter5
计算机网络英文版习题答案

P63 #5 Consider sending a packet of F bits over a path of Q links. Each link transmits at R bps. The network is lightly loaded so that there are no queuing delays. Propagation delay is negligible.a.Suppose the network is a packet-switched virtual-circuit network. Denote the VC setup time by t s seconds. Suppose the sending layers add a total of h bits of header to the packet. How long does it take to send the file from source to destination?t s+[(F+h)/R]Qb.Suppose the network is a packet-switched datagram network and a connectionless service is used. Now suppose each packet has 2h bits of header. How long does it take to send the packet?[(F+2h)/R]Qc.Finally, suppose that the network is a circuit-switched network. Further suppose that the transmission rate of the circuit between source and destination is R bps. Assuming ts setup time and h bits of header appended to the packet, how long does it take to send the packet?t s+(F+h)/RP64 #6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters and suppose that the propagation speed along the link is s meters/sec. Host A sends a packet of size L bits to host B.[a] Express the propagation delay, d prop, in terms of m and s.[b] Determine the transmission time of the packet, d trans, in terms of L and R.[c] Ignoring processing and queueing delays, obtain an expression for the end-to-end delay.[d] Suppose Host A begins to transmit the packets at time t=0. At time t=d trans, where is the last bit of the packet?[e] Suppose d prop is greater than d trans. At time t=d trans, where is the first bit of the packet?[f] Suppose d prop is less than d trans. At time t=d trans, where is the first bit of the packet?[g] Suppose s=2.5 x 108, L=100 bits and R=28kbps. Find the distance m so that d prop = d trans.[a] d prop = m/s[b] d trans = L/R[c] end-to-end delay = d prop + d trans=m/s+L/R[d] The beginning position of the link.[e] On the channel between A and B.[f] On the host B.[g] m/s = L/R = > m = sL/R = > m = 892.86 kmP65 #10 Consider the queueing delay in a router buffer. Suppose that all packets are L bits, the transmission rate is R bps, and that N packets simultaneously arrive at the buffer every LN/R seconds. Find the average queueing delay of a packet (in terms of L, R and N). (Hint: The queueing delay for the first packet is zero; for the second packet L/R; for the third packet 2L/R. The Nth packet has already been transmitted when the second batch of packets arrives.)As the Nth packet has already been transmitted when the next batch of packets arrive, we only need to consider the delay for a single batch of packets.Average delay = Total delay / Number of packetsDelay for 1st packet = 0Delay for 2nd packet = L/RDelay for 3rd packet = 2L/R......Delay for Nth packet = (N-1)L/RTotal delay for N packets = (0 + 1 + 2 ... +(N-1) ) * (L/R)Using the formulas for sum of integer series, this can be written as: Total delay for N packets = (N-1) * (N/2) * (L/R)Therefore, average delay for N packets = ((N-1) * L) / 2RP170 #12 What is the difference between persistent HTTP with pipelining and persistent HTTP without pipelinning? Which of the two is used by HTTP/1.1?For the persistent connection without pipelining, the client issues a new request only when the previous has been received. In this case, the client experiences one RTT in order to request and receive each of the referenced objects.For the persistent connection with pipelining, the client issues a request as soon as it encounters a reference. It is possible for only RTT to be expended for all the referenced objects.P170 #14 Telnet into a Web server and send a multiline request message. Include in the request message theIf-modified-since: header line to force a response message with the 304 Not Modified status code.GET/somedir/exp.html HTTP/1.1Host: Connection: closeUser-agent: Mozilla/4.0If-Modified-Since: Thu, 30 May 2007 12:00:00 GMTAccept-language: frP172 #6 Suppose within your web browser you click on a link to obtain a web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT (Round Trip Time) of RTT1, ... RTTn. Further suppose that the web page associated with the link contains exactly one object, consisting of a small amount of HTTP text. Let RTT0 denote the RTT between the local host and the remote server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object? (Hint: read pages 90 .. 93)Time to visit DNS servers and get IP address = RTT1 + RTT2 + ... + RTTnTime to establish TCP connection (SYN and SYNACK) = RTT0Time to send HTTP request and receive reply = RTT0Total time = 2 * RTT0 + (RTT1 + RTT2 + ... + RTTn)P171 #16 Suppose Alice with a Web-based e-mail account (such as Yahoo! Mail or Hotmail) sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the message gets from Alice’s host to Bob’s host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts.The series of application-layer protocols: HTTP、SMTP、POP3Suppose that you send an e-mail message whose only data is a Microsoft Excel attachment. What might the header lines (including MIME lines) look like?From:***********To:***********Subject: helloMIME-Version: 1.0Content-Transfer-Encoding: base64Content-Type: Application/MS-ExcelP286 #5 Suppose host A sends two TCP segments back to back to host B over a TCP connection. The first segment has sequence number 90: the second has sequence number 110.a.How much data is in the first segment?a.20 bytesb.Suppose that the first segment is lost but the second segment arrives at B. In the acknowledgement that host B sends to host A, what will be the acknowledgement number?b.ACK90P291 #27 Consider the following plot of TCP window size as a function of time. (reproduced below for you) Assuming TCP Reno is the protocol experiencing the behavior shown above, answer the following questions. In all cases, you should provide a short discussion justifying your answer.a. Identify the intervals of time when TCP slow start is operating.b. Identify the intervals of time when TCP congestion avoidance is operating.c. After the 16th transmission round, is segment loss detected by a tripleduplicate ACK or by a timeout?d. After the 22nd transmission round, is segment loss detected by a triple duplicate ACK or by a timeout?e. What is the initial value of Threshold at the first transmission round?f. What is the value of Threshold at the 18th transmission round?g. What is the value of Threshold at the 24th transmission round?h. During what transmission round is the 70th segment sent?i. Assuming a packet loss is detected after the 26th round by the receipt of a triple duplicate ACK, what will be the values of the congestion-window size and of Threshold?Solution:a.1-6, 23-26b.6-16, 17-22c.a triple duplicate ACKd.timeoute.32f.21g.13h.7i.4, 4P293 #34 Consider sending an object of size O = 100 Kbytes from server to client. Let S = 536 bytes and RTT = 100 msec. suppose the transport protocol uses static windows with window size W. (See Section 3.7.2)a.For a transmission rate of 28 kbps, determine the minimum possible latency. Determine the minimum window size that achieves this latency.b.Repeat (a) for 100 kbps.tency=28.8s W=2tency=8.2s W=4P405 #8 Consider a datagram network using 8-bit host addresses. Suppose a router uses longest prefix matching and has t he following forwarding table:-----------------------------------------------------Prefix Match Interface-----------------------------------------------------00 001 110 211 3-----------------------------------------------------For each of the four interfaces, give the associated range of destination host addresses and the number of addresses in the range.6P407 #15 Consider sending a 3000-byte datagram into a link that has a MTU of 500 bytes. Suppose the original datagram is stamped with the identification number 422. How many fragments are generated? What are their characteristics?there are「2980/480」=7 fragments be generatedP408 #22 Consider the network shown in Problem 21 (reproduced below). Using Dijkstra’s algorithm, and showing your work using a table similar to Table 4.3, do the following:a. Compute the shortest path from s to all network nodesSteps D(t),P(t) D(u),P(u)D(v),P(v)D(w),P(w)D(x),P(x)D(y),P(y)D(z),P(z)0 1,s 4,s ∞∞∞∞∞1 3.t 10,t ∞∞5,t 3,t2 4,u 6,u ∞5,t 3,t3 4,u 6,u ∞5,t4 5,v 7,v 5,v5 6,w 5,v6 6,wPlease fill in the following tables using DV algorithm:For the node Z in the graph shown in the 22nd topic (P408), please fill in the following routing table in the router z about the initial distance-vector Destination node Next hop Current shortest distancevalue-DzS —∞T T 2U —∞V —∞W —∞X —∞Y Y 14Z Z 0following rout-ing table in the node z to update this routing tableDestination node Currentdistance-DyDestination node Current distance-DtS 5 S 1 T 4 T 0 U 2 U 2P493 #7 How big is the MAC address space?The IPv4 address space?The IPv6 address space?MAC address: 6 bytes, MAC address space 2^48IPV4 address: 4 bytes, IPV4 address space 2^32IPV6 address: 16 bytes, IPV6 address space 2^128P494 #4 Consider the 4-bit generator, G, shown in Figure 5.8, and suppose the D has the value 10101010. What is the value of R?G=1001, D=10101010, R=101。
强烈推荐计算机网络英文试题库(附答案)chapter.doc

Chapter 2 Application Layer1. In the following four descriptions, which one is correct?A In C/S architecture, clients communicate with each other directly.B In C/S architecture, client has a fixed well-known address.C In P2P architecture, peers communicate with each other directly.D In P2P architecture, peer has a fixed well-known address.2. In the context of a communication session between a pair of process, the process that initiates the communication is labeled as the , the process that waits to be contacted to begin the session is labeled as the .A client process, server processB sending process, receiving processC input process, output processD communicating process, connecting process3. A socket is the interface between within a host.A the network layer and the link layerB the link layer and the physical layerC the application layer and the transport layerD the transport layer and the network layer4. In the following applications, which one is a loss-tolerant application?A E-mailB file transferC instant messagingD real-time audio5. In the following applications, which one is a bandwidth-sensitive application?A E-mailB web applicationC real-time audioD file transfer6. The service of TCP can’t guarantee .A delivery of all data without errorB delivery of all data in the proper orderC the rate of deliveryD congestion control7. In the following applications, which one uses UDP?A E-mailB web applicationC file transferD DNS8. In the following descriptions about HTTP, which one is not correct?A HTTP uses non-persistent connections in its default mode.B HTTP uses TCP as its underlying transport protocol.C HTTP is a stateless protocol.D HTTP is client-server architecture.9. Suppose a web page consists of a base HTML file, 5 JEPG images and a java applet, and also suppose HTTP uses persistent connection without pipelining, the total response time is .A 2RTTB 8RTTC 12 RTTD 14RTT10. In HTTP response message, if the requested HTTP protocol version is not supported, the status code is .A 200B 301C 400D 5051~5CACDC6~10CDABD11. The port number of web application is .A 25B 20C 80D 5312. A network entity that satisfies HTTP requests on the behalf of an origin web server is .A server farmB server stackC proxy serverD edge server13. In the following descriptions about persistent connection, which one is not correct?A The server leaves the TCP connection open after sending a response.B Each TCP connection is closed after the server sending one object.C There are two versions of persistent connection: without pipelining and with pipelining.D The default mode of HTTP uses persistent connection with pipelining.14. FTP uses two parallel TCP connections to transfer a file, there are .A control connection and data connectionB receiving connection and sending connectionC client connection and sever connectionD program connection and process connection15. In the following descriptions about FTP, which one is correct?A FTP is p2p architecture.B FTP sends its control information out-of-band.C FTP uses persistent connection.D FTP is a stateless protocol.16.In the commands of FTP,which one does not have parameter?A USERB PASSC LISTD STOR17. The Internet mail system has three components which they are .A user agent, SMTP, POP3B SMTP, POP3, IMAPC user agent, SMTP, IMAPD user agent, SMTP, mail server18. If the status code in HTTP response message is 404, it means .A Request succeeded.B The requested document doesn’t exit on this server.C This is a generic error code indicating that the request could not be understood bythe server.D Requested object has been permanently mover.19. Comparison HTTP with SMTP, the correct is .A HTTP is a push protocol, and SMTP is a pull protocol.B In the default mode, both of them use persistent connection.C HTTP places all of the message’s objects into one message, and SMTP sends every object one by one.D HTTP requires each message to be in 7-bit ASCII format, and SMTP doesn’t impose this restriction.20. The headers in the MIME message must include except .A FromB Content-typeC Content-transfer-encodingD MIME version11~15CCBAB16~20DDBBD21. In the following protocol, which one is stateless?A POP3B SMTPC FTPD IMAP22. DNS means .A Data Name SystemB Data National SystemC Domain Name SystemD Domain National System23. There are three classes of DNS server except .A Root DNS serverB Local DNS serverC TLD server D Authoritative DNS server24. DNS provides some services except .A Host aliasingB Mail server aliasingC Load distributionD A single point of failure25.There are three architectures for locating content in P2P file sharing,KaZaA uses.A Centralized Directory(Napster)B Query Flooding(Gnutella)C Exploiting Heterogeneity(p141)D Incentive Priorities26.There are three architectures for locating content in P2P file sharing,Napster uses.A Centralized Directory(p137)B Query FloodingC Exploiting HeterogeneityD Incentive Priorities27.The following architectures in P2P file sharing,which is an overlay network?A Centralized DirectoryB Query Flooding(p139)C Exploiting HeterogeneityD Incentive Priorities28. The time it takes for a small packet to travel from client to server and then back to the client is .A round-travel timeB next-hop timeC round-trip timeD prefix-matching time29. Suppose A ( with a Web-based e-mail account ) sends a message to B ( who accesses his mail server using POP3), which application-layer protocol is not used?A HTTPB SMTPC POP3D IMAP30. In the four following options, which protocol is included in Mail Access Protocol?A SMTPB DHCPC IMAPD FTP31. In FTP commands, is used to send user password to the server.A UserB PassC RetrD Stor32. The function of the additional header field in MIME Content-Type is .A to convert the message body to its origin non-ASCII formB to determine what actions it should take on message bodyC to send an E-mail to the receiving user agentD to indicate what type the message is33. In the four following options, which application is organized as hybrid of C/S and P2P architecture?A E-mailB OICQC File transferD Web application34.In the four following options,which is not a centralized DNS design’s problem?A a single point of failureB traffic volumeC distant centralized databaseD slow(maintenance)35.In the following options, from the application developer’s perspective, which is not correct?A the network architecture is fixedB the network architecture provides a specific set of services to applicationsC the application architecture is designed by the physical devicesD the application architecture dictates how the application is organized over the various end systems36. There are three predominant architectures used in modern network applications, which one is not included?A the client-server architectureB the P2P architectureC a hybrid of the client-server and P2P architectureD a hybrid of the client-server and browser-server architecture37. In the following options about C/S architecture, which is not correct?A In C/S architecture, there is an always-on host, called the server.B In C/S architecture, there is an always-on host, called the client.C The server has a fixed, well-known address, called IP address.D Clients do not directly communicate with each other.38.are often used to create a powerful virtual server in C/S architecture.A PeersB Server farmC server stackD local server39. A process sends messages into, and receives messages from, the network through its .A socketB programC clientD peer40. Which one is not defined by an application-layer protocol?A the types of messages exchangedB the syntax of various message typesC the semantics of the fieldsD rules for determining when and how to translate the socket41. HTTP can use two types of connections, which are .A persistent and non-persistent connectionB connection with pipelining and without pipeliningC TCP and UDPD parallel and serial connection42. takes for a small packet to travel from client to server and then back to the client.A RDTB thresholdC RTTD overhead43. The default mode of HTTP uses .A non-persistent connection with pipeliningB non-persistent connection without pipeliningC persistent connection with pipeliningD persistent connection without pipelining44. In HTTP request messages, the request line has three fields, there are .A the method field, the URL field and the HTTP version fieldB the method, the connection and URL fieldC the user-agent, the method and HTTP version fieldD the user-agent, the URL and the HTTP version field45. In the header lines of HTTP request message, if the field of Connection is close, it specifies .A the host on which object residesB what type of the user agentC that the browser wants the server to close the connection after sending the requested objectD which language can the browser receive46. In HTTP response message, if the status code is 404, it means .A request succeeded and the information is returned in the responseB requested object has been permanently movedC the requested HTTP protocol version is not supported by the serverD the requested document does not exist on this server47. is a network entity that satisfies HTTP requests on the behalf of an origin Web server.A proxy serverB local serverC DNS serverD Web server48. In the following four options about web cache, which one is not correct?A A web cache is both a server and a client at the same time.B A web cache is purchased and installed by an ISP.C A web cache can raise the response time for a client request.D A web cache can reduce traffic on an institution’s access link to the Internet.49. The request message in the conditional GET must include the header line.A Last-ModifiedB Last-ReferencedC If-Modified-SinceD If –Referenced-Since50. FTP uses two parallel connections to transfer a file, they are .A TCP and UDP connectionB connection with pipelining and without pipeliningC control an data connectionD client-server and browser-server connection51. In FTP commands, which one is used to ask the server to send back a list of all files in the current remote directory?A USERB PASSC LISTD RETR52. In the Internet mail system, allow users to read, reply to, forward, save and compose message.A User agentsB mail serversC SMTPD TCP53. The two key MIME headers for supporting multimedia are .A Content-Type and MIME-VersionB Content-Type and Content-Transfer-EncodingC Content-Transfer-Encoding and MIME-VersionD MIME-Version and MIME-Type54. For Internet mail, the mail access protocol is used to .A transfer mail from the recipient’s mail server to the recipient’s user agentB transfer mail from the sender’s mail server to the recipient’s mail serverC translate the mail from the sender’s mail serverD translate the mail into the recipient’s mail server55. POP3 progresses through three phases, which they are .A authorization, translation and transactionB authorization, translation and updateC authorization, transaction and updateD translation, transaction and update56. In the following four services, which one can not provide by DNS?A Host aliasingB Mail server aliasingC translate hostname to IP addressesD translate MAC addresses to IP addresses57. There are three classes of DNS servers, there are .A root DNS server, top-level domain DNS server and local DNS serverB root DNS server, top-level domain DNS server and authoritative DNS serverC root DNS server, local DNS server and authoritative DNS serverD root DNS server, local DNS server and top-level domain DNS server58. In the following four options about POP3, which one is not correct?A The user agent employed only three commands: List, Retr and QuitB The server does not carry state information across POP3 sessionsC The port number is 110D The POP3 protocol does not provide any means for a user to create remote folders and assign messages to folders.59.A resource record in DNS distributed database is a four-tuple,which field can be ign ored?(p132)A Name B Value C Type D TTL60.In the following four options about DNSresource record,which one is correct?A The meaning of Name and Value depend on Type.B The meaning of Value and Type depend on Name.C If Type=A,then Name is a domain and Value is the IP address for the hostname.D If Type=MX,then Name is domain and Value is the IP address for the hostname.61.In the following four options about DNS messages,which one is not correct?A There are only two kinds of DNS message.(p133)B Both query and reply message have the same format.C The header section in DNS message has12bytes.D The authority section contains the resource records for the same that was originally q ueried.62.In DNS message,contains information about the query that is being made.(p133)A authority sectionB question sectionC answer sectionD additional section63.There are three techniques are employed in most any P2P file-sharing systems,which one is not include?(p144)A Request queuingB incentive prioritiesC parallel downloadingD Response queui ng64. In the following four options about P2P file-sharing, which one is not correct?A P2P file-sharing is highly scalable.B P2P file-sharing relies on P2P architecture.C The means for locating content in different P2P file-sharing are different.D P2P file-sharing systems not only share MP3s,but also videos, software, documents and images.65.In MIME header lines,specifies the name of the SMTP server that sent the messag e(from),the name of the SMTP server that received the message(by),and the time an which the receiving server received the message.A ReceivedB FromC ToD MIME-Version66. If the header line Connection is close, it means that the client wants .A persistent connection with pipeliningB persistent connection without pipeliningC nonpersistent connectionD not connection67. In HTTP request message, the entity body is empty with the method, but is used with the method.A GET, POSTB POST,GETC GET, HEAD D POST, HEAD68. In HTTP response message, if the Date: header ;one indicates the time Fri. 08 Aug. 2008 12:00:00 GMT, the Last-Modified: header line can not be .A Fri. 08 Aug. 2008 11:00:00 GMTB Fri. 08 Aug. 2008 11:30:00 GMTC Fri. 08 Aug. 2008 12:00:00 GMTD Fri. 08 Aug. 2008 12:30:00 GMT69. In the following four options, which one is not the part of cookie technology?A Cookie header lines in the HTTP response message and request message.B One cookie header file kept on the user’s end system and managed by the user’s browser.C A network entity that satisfies HTTP requests on the behalf of an origin Web server.D A back-end database at the Web site70. On-top of stateless HTTP, can be used to create a user session layer.A proxy serverB Web cacheC cookieD socket71. Processes communicate with each other by reading from and writing to .A programsB threadsC socketsD channels72. In the following four options about network architecture, which one is not correct?A The network architecture is fixed.B The network architecture provides a specific set of services to application.C The network architecture is designed by application developer.D The network architecture dictates how the application is organized over special server.73. In Client-Server architecture, the clients visit the server’s through .A client’s socketB client’s IP addressC server’s socketD server’s IP address74. can be thought of as a program that is running within end system.A processB threadC socketD context75. API means .A Application Program InterfaceB Application Process InterfaceC Appellation Program InterfaceD Appellation Process Interface76. One host can be running many network applications, so the system assigns them differentto distinguish each other.A IP addressB port numberC hostnameD section77. In the following four applications, which one is both bandwith-sensitive and require tight timing constraints?A real-time audioB file transferC E-mailD Web documents78. The port number of the Web server is .A 25B 20C 80D 808079. The port number of the mail server is .A 25B 20C 80D 808080. Look the URL /rjxy/index.html, the object’s path name is .A B /rjxyC /rjxy/index.htmlD index.html81. Each URL has components, they are .A transport protocol and object’s path nameB host name and object’s path nameC transport protocol and host nameD client name and server name1. Consider an HTTP client will request a WEB page from a WEB server. Suppose the URL of the page is /somedepartment /somedir/exp.html. The client does not want to use persistent connections and want to receive French version of the object. The user agent is Windows NT 5.1. Give the request message according to the given format.Request line:Header lines:2. Telnet into a Web server and send a multiline request message. Include in the request message the If-modified-since: header line to force a response message with the 304 Not Modified status code.Solution:Request line:Header lines:3. Suppose within you Web browser you click on a link to obtain a Web page. The IPaddress for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT1,…,RTT n. Further suppose that the Web page associated with the link contains exactly one object, consisting of a small HTML text. Let RTT0 denote the RTT between the local host and the server containing the object. Assuming zero transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object?5. Suppose that you send an e-mail message whose only data is a microsoft excell attachment. What might the header lines (including MIME lines) look like?。
计算机网络习题答案(二)英文

Chapter 5: Data CodingFill In the Blank5-1.It is much easier for a machine to process a code if all the characters in the code have _____.5-2.The number of possible combinations or characters in a coding system are called _____.5-3.The minimum number of bits that would be required to encode only the 26 characters of the alphabet is _____.5-4.The three different groups of character assignments that are normally made in a coding system are _____, _____, and _____.5-5.The coding system that has enough bit combinations to encode all of the characters in all of the worlds languages is called _____.5-6.Three major types of data compression are called _____, _____, and _____. 5-7.Arguably, the most important data coding scheme because it is the mostly widely used is _____.5-8.In an even parity system, a 1 bit is added to a character’s code when necessary to make the total number of 1 bits representing the character an _____ number.5-9.Character compression is also known as _____.5-10. Character stripping removes the leading and trailing _____ characters from a message and adds them back at the receiving end.5-11.R un length encoding replaces _____ characters or repetitive groups of characters with a different, much shorter group of characters.5-12. A measure of how few bits are required to accurately convey the meaning of a character is called _____ _____.5-13. Bits that are used to determine the code points in a code are called _____ _____.5-14. The _____ code is an 8-bit code that has 256 code points.True or False5-1.The term binary digit is abbreviated bit.5-2.Machines cannot send Morse code because the coded characters have different numbers of code elements.5-3.It is more difficult for a machine to process a code if all of the bits are of the same duration.5-4.When even parity is used, a 0 bit is added, if necessary, to make the total number of 0 bits in the character an even number.5-5.The escape character in a coding system is a different character than the one that is generated when you press the ESC key on the keyboard of a PC.5-6.ASCII is a 7-bit code.5-7.Unicode provides enough code points so that all characters in all languages of the world have a unique 16-bit code point.5-8.Code efficiency is a measure of how many extra bits are used beyond those required to convey the meaning of a character.5-9.Data compression is the process of reducing the number of bits used to represent a character, or reducing the number of characters before they are transmitted.5-10.C haracter stripping is the process of removing control characters from a message before it is transmitted.5-11.T he binary digits are 1 and 2.5-12.A code is a predetermined set of symbols that have variable meanings.5-13.M orse code is not considered a binary code, because its two elements are of different length.5-14.A binary code works well for machines communicating by electrical means because the 1 bits and 2 bits can be represented by a current flow that is either on or off.5-15.F or transmission efficiency, it is ideal to have a coding system that uses a minimum number of bits to represent each character.5-16.M ost coding systems include a technique called an escape character.5-17.T he necessity to support escape characters complicates the design of equipment that is to code and decode the data.5-18.T he ASCII code is the most widely used code in computers and communications networks today.5-19.U nicode is a 16-bit character code.Multiple Choice5-1. Characters that control the positioning of information on a workstation screen or paper are called _____.a. page control charactersb. format effector charactersc. device control charactersd. screen control characterse. a and b5-2. It is much easier for a machine to process a code if the code has the following attributes: _____.a. it is a true binary codeb. all of the characters have the same number of bitsc. all of the bits are perfectly formedd. all of the bits are the same duratione. a and cf. All of the above.5-3. The unique sequence of bits assigned to represent the various characters of a code are called _____.a. code pointsb. character assignmentsc. control charactersd. character algorithmse. None of the above.5-4.The purpose of escape characters is to _____.a. allow a program to abort a message prematurelyb. implement a priority system by allowing one message to be prematurelyended so another can be sent on the circuitc. act as an alternate escape control character when more than 8 bits areneededd. indicate that the characters that follow are to be interpreted as having analternate meaninge. indicate that a PDU has been received correctly5-5. The ASCII code is also known as the _____.a. International Telegraph Alphabet 5b. extended ASCII codec. 8-bit coded. PC codee. EBCDIC code5-6. The EBCDIC code _____.a. was developed by IBMb. is an 8-bit codec. has 256 code pointsd. is used on older IBM mainframe computerse. All of the above.f. None of the above.5-7. Unicode _____.a. is a 16-bit codeb. was developed by a group of companiesc. supports the characters of all languagesd. All of the above.e. None of the above.5-8. Code efficiency is calculated _____.a. by minimizing the number of bits transmitted for a given messageb. by dividing the information bits by the total number of bits in a characterc. by dividing the total number of bits by the information bits in a characterd. by measuring the error rate at the receiving end of a transmission5-9. Three major types of data compression are _____.a. character removal, run length encoding, and bit compressionb. bit stripping, double clocking, and character strippingc. character compression, Huffman coding, and character strippingd. character stripping, run length encoding, and character compressione. over clocking, transmission digitizing, and double ACKing5-10. A 10-bit code could represent how many characters?a. 100b. 210 -1c. 29d. 512e. 2105-11.The number of possible combinations or characters in a coding system is called the _____.a. character assignmentb. code pointsc. control characterd. code limite. binary code5-12.Many coding systems include an extra bit, called a _____ , for checking purposes.a. parity bitb. padding bitc. control bitd. binary digite. checking bit5-13.When an ESC character is sent as a part of the data, it means that _____.a. the transmission is being abortedb. this is the end of the transmissionc. the characters that follow are to be interpreted as having an alternate meaningd. the characters that follow are encryptede. the transmission should be ignored5-14. Graphic characters _____.a. can be displayed on a workstation screenb. are special characters only used by graphic artistsc. are only present in specialized code systemsd. can also be used as format effector characters5-15Code conversion _____.a. changes one character to another for security purposesb. changes the characters in one coding system to those of another coding systemc. can be readily performed by a computerd. All of the above.e. b and cChapter 6: Data Communication FundamentalsFILL IN THE BLANK6-1. The three attribute s of a sine wave are its _____ , _____ , and _____.6-2. The FM radio band in the United States extends from 88 MHz to 108 MHz. Its bandwidth is _____.6-3. A signal drop of 10 dB represents a drop in power of _____times.6-4. A radio signal with a frequency of 101 MHz falls within the _____radio band.6-5. Speech with frequencies above _____is attenuate d and not transmitted through the public telephone network.6-6. Changing a communication signal by alter ing its amplitude, frequency, or phase is called _____.6-7. The unit of signaling rate on a communication circuit is called _____.6-8. The unit of measure of a circuit's data carrying rate is called _____6-9. Sending a tribit on a circuit requires _____(how many) unique signal changes to be transmitted?6-10. A circuit that allows transmission in one direction only is called a _____ circuit.6-11. A circuit that allows transmission in either direction but not at the same time is called a _____circuit.6-12. A circuit that allows transmission in both directions simultaneously is called a _____circuit.6-13. A circuit that allows all of the bits in a character to be transmitted simultaneously is called a _____circuit.6-14. A circuit in which the bits of a character are transmitted one after the other on a single communication path is called a _____circuit.6-15. The mechanism by which character synchronization occurs in asynchronous transmission is called _____and _____bits.6-16. The means by which the receiver knows which bits to group together to form a character is called _____.6-17. When each block of data to be transmitted is surrounded with synchronizing and other control characters the transmission is called _____.6-18. When each character to be transmitted is surrounded with start and stop bits, the transmission is called _____.6-19. The _____condition is the idle condition on a line. Conventionally it is the same as the signal for a 1 bit.6-20. The purpose of the _____in synchronous transmission is to maintain synchronization between the transmitting node and the receiving node.6-21. _____modulation is better suited for high-speed analog transmission because the receiver more easily detects changes in _____than changes in amplitude or frequency.6-22. _____equalizers assume that the circuit meets a n average set of loss, noise, and distortion parameter s, and shape the transmitted signal accordingly.6-23. _____equalizers examine the actual parameters of the circuit being used, and shape the signal to match its specific characteristics.6-24. Modems that use the V.34 standard use a sophisticated modulation technique called _____, and they assume that most of the actual transmission will occur on _____circuits.6-25. High-speed modems achieve a high throughput rate by using sophisticated modulation and __________techniques.6-26. A _____ensures that the signal entering a digital circuit has properly shaped, square pulses, and is precisely timed.6-27. The time it takes the modems on an HDX circuit to reverse their function –the time for the transmitting modem to switch to being the receiver, and the receiving modem to switch to being the transmitter—is called _____.6-28. The advantages of _____transmission over _____transmission include better data integrity; higher capacity circuits; easier integration of voice, data and other signals; better security and privacy; and lower cost.6-29. The type of digital modulation that takes 8,000 samples per second but uses only 4 bits per sample to code the difference between the values of two samples is called _____.6-30. An _____converts analog signals to a digital format.6-31. The difference between the actual value (height) of an analog signal and the nearest integer value, which is assigned when the signal is digitized, is called_____.6-32. When the number of data bits in a character is divided by the total number of bits required to transmit the character, the __________is being calculated. TRUE OR FALSE6-1. Signaling is the propagation of a signal on a medium.6-2. Playing the A key above middle C on a piano results in a digital signal that has 880 pulses per second.6-3. Sound waves, electrical waves, and electromagnetic waves have essentially different characteristics.6-4. A digital signal level is measured in decibels.6-5. The loss of signal strength between two points on a communication circuit is called attenuation.6-6. The amplitude and phase of a voice signal remain constant while its frequency changes.6-7. ADPCM is accomplished by shifting each channel to a different part of the frequency spectrum.6-8. The speed of a circuit is measured in baud.6-9. A 2,400 baud signal can carry data at a maximum rate of 7,200 bps.6-10. When 2 bits of information are coded into one signal change, they are called bi-bits.6-11. The most common digital signals are unipolar.6-12. When transmitting digital signals on an analog circuit, a modem is used.6-13. An analog signal that has been digitized can be closely restored to its original analog shape by a D/A converter.6-14. PCM is the ITU-T’s recommended method for digitizing voice at 32 Kbps. 6-15. In a modem, equalizer circuitry compensates for the variability of the actual transmission line used.6-16. Line turnaround time in a modem can be a significant part of the total transmission time.6-17. Modems can never handle full-duplex transmission.6-18. Phase modulation is the technique of chang ing a digital signal’s phase in order to modulate it.6-19. V.34-bis modems assume that most data transmission occurs on digital lines.6-20. The transmission speed between a pair of V.90 modems is symmetric.6-21. Cable modems for each CATV system are unique.6-22. Modem eliminator s are a low-cost alternative to modems on LAN circuits.6-23. There are very few practical uses for simplex transmission.6-24. Parallel mode transmission is widely used on WANs to achieve high throughput.6-25. Asynchronous transmission is widely used today.6-26. Start bits precede every data block in synchronous transmission.6-27. To jam a spread spectrum signal, one simply broadcasts a jamming signal on the spread spectrum signal’s carrier frequency.MULTIPLE CHOICE6-1. The reasons that digital transmission is superior to analog transmission are _____.a. better data integrityb. higher capacityc. easier integrationd. better security and privacye. lower costf. All of the above.g. only a, b, c, and d6-2. A modem is a form of a _____.a. A/D converterb. D/A converterc. codecd. DTEe. None of the above.f. a and b6-3. The three attributes of an analog signal discussed in the chapter are _____.a. frequency, decibels, and modulationb. phase, frequency, and amplitudec. amplitude, carrier, and sined. bit rate, speed, and error ratee. unipolarity, quantization, and equilibrium6-4. Parallel transmission occurs _____.a. during spread spectrum transmissionb. when a PC sends data to a printer using a serial cablec. on most WAN circuitsd. All of the above.e. None of the above.6-5. Differential Manchester coding _____.a. is often used on WANsb. is almost never usedc. is subservient to Manchester codingd. requires an analog circuit to work properlye. None of the above.6-6. The most widely used interface standard between PCs and modems is _____.a. point-to-pointb. USBc. RS-232-Dd. RS-232-Ce. X.256-7. The X.21 interface standard _____.a. is a replacement for RS-232-Cb. defines the interface to a digital circuitc. uses a PL-259 connectord. All of the above.e. None of the above.6-8. A network interface card _____.a. provides the interface from a PC to a networkb. provides the interface from one network to anotherc. provides the interface from a modem to a networkd. converts signals from analog to digitale. None of the above.6-9. When two modems send signals to each other for the process of establishing transmission parameters, it is called _____.a. synchronizingb. call setupc. call establishmentd. MOST (acronym for modem startup)e. handshaking6-10. Hertz is the unit of measure for _____.a. baudb. bit ratec. trellis code modulationd. cycles per seconde. data ratef. None of the above.6-11. The difference between the exact height of an analog signal and the nearest integer value when a digitizing sample is taken is called _____.a. digitizing discrepancyb. digitizing errorc. quantizing noised. digitizing discernmente. a and cf. b and c6-12. QAM uses a combination of _____and _____to generate quadbits.a. phase changes and relative amplitudesb. phase changes and dibitsc. phase changes and frequency changesd. amplitude changes and frequency changese. amplitude changes and dibitsChapter 7: Data Link Control ProtocolsFILL IN THE BLANK7-1. A set of rules that define the exact format of messages exchanged between computers or between computers and people is called a _____.7-2. Data link protocols are necessary so that all of the devices on the network are operating by the same set of rules and are able to _____with each other.7-3. The part of a protocol consisting of the rules that specify the way the receiving terminal signals the sending terminal if it has received data correctly, how and under what circumstances the line will be turned around, and whether the receiving terminal can accept more data is called _____.7-4. The part of the protocol consisting of rules specifying what happens when an error is detected, what to do if communications suddenly and unexplainably cease, and the way communications are reestablished after they are broken is called _____.7-5. The part of a protocol consisting of rules for ending the communications under normal and abnormal circumstances is called _____.7-6. The ability of data terminal equipment (DTE) to be able to transmit and receive any bit pattern as data is called _____.7-7. Predetermined communication parameters are those that are set _____by switches or specified as parameters in software.7-8. When a central or control station asks each station on the circuit or network if it has traffic to send, it is using a line control technique called _____.7-9. When any station that has traffic looks to see if the circuit is free, and if it is, begins sending its traffic the line control technique is called _____.7-10. In a polling system, one way that priority can be given to a terminal is by listing its address in the polling list _____.7-11. The _____of a message contains and conveys information about the message, such as the destination node’s address, a sequence number, and perhaps a date and time.7-12. BISYNC is defined to only support the 6-bit transcode (SBT), EBCDIC, and _____.7-13. Character synchronization is accomplished in BISYNC by sending _____ characters at the beginning and periodically in the middle of each transmission.7-14. Compared to BISYNC, DDCMP and other byte-count protocols implement transparency in a much more _____manner.7-15. The HDLC ___ field is used to mark the beginning and ending of frames.7-16. The technique that ensures a flag’s uniqueness by not allowing any other sequence of six consecutive 1 bits in the data stream is called _____.7-17. A protocol that is primarily used by PC workstations to send IP overdial-up lines, typically when dial ing in to an ISP for connection to the Internet, is called _____.7-18. The _____protocol was developed by IBM and then generalize d to become HDLC.7-19. SDLC is a _____of HDLC.7-20. SDLC is a subset of _____.7-21. A _____changes one protocol to another, when, for example, a message is sent between two networks that use different protocols.7-22. A sophisticated check character at the end of each block of data is called a _____.7-23. A technique used to ensure that a fast transmitting node does not send data faster than a receiving node can receive and process it is called _____.7-24. The flow control technique that allows multiple frames to be in transit on the line at one time is called _____.TRUE OR FALSE7-1. Data link protocols are concerned with the transmission of data through an entire network.7-2. All protocols use the same bit patterns as control characters.7-3. Data transparency allows a protocol to be able to transmit and receive any bit patterns as data.7-4. A protocol is implemented by transmitting certain bit patterns or characters on the communication circuit.7-5. The code used for the data is independent of the protocol being used.7-6. Because of collision s, contention systems are rarely used for line access.7-7. Poll ing systems require several stations on the circuit to act as master stations.7-8. Hub polling is the most common implementation of a polling system.7-9. Polling systems are dependent on the data code being used.7-10. Token passing systems require one station on the circuit to take responsibility to ensure that there are always multiple tokens circulating on the circuit.7-11. Data messages normally consist of three parts: the header, text, and trailer. 7-12. The ACK character normally acknowledges the receipt of a block of data. 7-13. Stop-and-wait flow control is inherently efficient because of its simplicity. 7-14. Stop-and-wait flow control allows multiple blocks of data to be in transit on the line at one time.7-15. PPP has largely replaced the SLIP protocol because it has better error detection.7-16. KERMIT is error checked but is a very slow protocol.7-17. A bit-oriented protocol uses multiple control characters to mark the start and end of parts of a message.7-18. HDLC is a bit-oriented protocol.7-19. SLDC is a byte-count-oriented protocol.7-20. The best known bit-oriented protocol is BISYNC.7-21. SDLC was an outgrowth of the original work on HDLC.7-22. SDLC operates in one of three modes; however, one mode is rarely used. 7-23. The basic operational unit for HDLC is a PDU.7-24. HDLC uses a FRA character to mark the beginnings and ends of frames. 7-25. BISYNC supports only selected data codes.7-26. BISYNC supports transparency.7-27. DDCMP has largely been replaced by HDLC.7-28. Go-back-n is an implementation of sliding window flow control.7-29. The LAP protocols are variant s of HDLC.7-30. PPP is a widely used synchronous protocol for dialing into the Internet through an ISP.MULTIPLE CHOICE7-1. In HDLC, when a 0 bit is inserted after all strings of five consecutive 1 bits, the term applied is _____.a. zeroingb. bit stuffingc. synchronizingd. oneinge. string breaking7-2. When two stations on a circuit transmit at the same time, a(n)_____occurs.a. altercationb. divisionc. pollingd. bit stuffinge. collision7-3. In order to know what stations to poll and in what sequence, the master station uses a _____.a. message headerb. polling listc. start of header characterd. polling PDAe. cyclic redundancy check7-4. When a receiver must acknowledge every block of data before the next block is sent, the _____type of flow control is being used.a. stop-and-waitb. stop-and-checkc. stop-and-flopd. sliding framee. sliding window7-5. The name of the flow control protocol in which the sending station, on receipt of a NAK, resends the damaged or out of sequence frame and all frames after it is _____.a. selective rejectb. TCPc. selective repeatd. send all before ne. HDLC7-6. HDLC is an example of _____.a. sliding window flow controlb. a serial line interface protocolc. an asynchronous protocold. All of the above.e. None of the above.7-7. When an HDLC node receives a flag character, it knows that _____.a. an error has occurredb. it should signal the sender to stop sending trafficc. a frame is beginning or endingd. it should switch to transparent modee. None of the above.7-8. HDLC’s information frames _____.a. are used to send an NAK when a frame is received incorrectlyb. are used to establish the way the protocol will proceedc. are used to send information from one node to a router for flow controld. contain the data field that holds the information being transmittede. are not used in ABM mode7-9. The part of a message that contains the destination address is called the_____.a. headerb. address PDUc. textd. trailere. flag7-10. Software or hardware that changes one protocol to another is called a_____ .a. CODECb. protocol converterc. modemd. routere. encryptor7-11. Contention systems work best _____.a. on circuits that have only more than two DTEsb. when the speed of the circuit is relatively fastc. on circuits that have heavy message trafficd. All of the above.e. None of the above.7-12. Desirable attributes for a data link protocol to have are _____.a. transparencyb. efficiencyc. bit linearityd. a, b, and ce. a and b7-13. Techniques to ensure that a fast transmitting node does not send data faster than the receiving node can receive and process it are called _____ .a. token passingb. flow controlc. parity checkingd. cyclic redundancy checkinge. error control7-14. The LAPD protocol is used _____.a. between an X.25 DTE and a packet switching networkb. on an ISDN D channelc. on frame relay networksd. on value added networkse. as a substitute for TCP/IP7-15. Go-back-n and selective repeat are two common implementations of _____.a. bit oriented protocolsb. byte protocolsc. byte-count oriented protocolsd. sliding window flow controle. transmission control protocolsChapter 8: Transmission MediaFILL IN THE BLANK8-1. A type of media that provides some type of physical path, such as wire, cable, or optical fiber, along which the signal moves from end to end is called _______ or guided media.8-2. Air is an example of _______ media.8-3. Twisted pair wire is an example of _______ media.8-4. The best media to use in homes and offices where costs must be kept low and bandwidth requirements are moderate is ____.8-5. The most appropriate media to use when there is a need for very high bandwidth and high security is _____.8-6. The most appropriate media to use when there is a need for high bandwidth and to broadcast to a wide area is ____.8-7. Wire containing at least three twists per foot and that is about the same as normal telephone cable installed in most office buildings is called _____.8-8. _____ cable normally contains four pairs of wires and is the type that is most commonly being installed in new homes and businesses, particularly when it is known that a computer network will be used.8-9. The shielding in shielded twisted pair wire provides a degree of _____ _____ in electrically noisy environments.8-10. _____ is advantageous when tap s in the cable need to be made—it is easier to tap than optical fiber.8-11. The characteristic of _____ include: high bandwidth, difficult to tap and splice; not subject to electrical interference, cable is very small diameter and lightweight.8-12. A _____ is required to operate a microwave transmitter.8-13. _____ _____ is the delay that occurs because light and radio signals only travel at 186,000 miles per second.8-14. Satellites in _____ orbits circle the earth at 22,300 miles.8-15. Satellites in _____ orbits are approximately 6,000 miles high.8-16. _____ works by modulating a laser light beam instead of broadcasting a radio wave.8-17. _____ is a fiber that has a glass core approximately 9 microns in diameter. 8-18. Data are placed on an optical fiber with a light source, either an LED or a _____.8-19. When UTP is used in a data application it is normally terminate d with a _____ jack.8-20. A type of satellite commonly used to send television programming into homes is called a _____.TRUE OR FALSE8-1. Optical fiber is an example of an unguided medium.8-2. Guided media are also known as wireless media.8-3. Wireless media are the most common media used today.8-4. Optical fiber emits an electro-optical field when carrying communications signals.8-5. CAT 3 cable is most frequently used for telephone transmission in older buildings.8-6. CAT 5 cable is commonly being installed in new homes and businesses.8-7. An advantage of UTP wire is its relatively low cost.8-8. Coaxial cable can be tapped easily.8-9. Optical fiber can be tapped easily.。
(完整版)计算机网络课后作业以及答案(中英文对照)

Chapter11-11.What are two reasons for using layered protocols?(请说出使用分层协议的两个理由)答:通过协议分层可以把设计问题划分成较小的易于处理的片段。
分层意味着某一层的协议的改变不会影响高层或低层的协议。
1-13. What is the principal difference between connectionless communication and connection-oriented communication?(在无连接通信和面向连接的通信两者之间,最主要的区别是什么?)答:主要的区别有两条。
其一:面向连接通信分为三个阶段,第一是建立连接,在此阶段,发出一个建立连接的请求。
只有在连接成功建立之后,才能开始数据传输,这是第二阶段。
接着,当数据传输完毕,必须释放连接。
而无连接通信没有这么多阶段,它直接进行数据传输。
其二:面向连接的通信具有数据的保序性,而无连接的通信不能保证接收数据的顺序与发送数据的顺序一致。
1-20. A system has an n-layer protocol hierarchy. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers?(一个系统有n层协议的层次结构。
应用程序产生的消息的长度为M字节。
在每一层上需要加上一个h字节的头。
请问,这些头需要占用多少比例的网络带宽)答:hn/(hn+m)*100%1-28. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is uncompressed. How long does it take to transmit it over a 56-kbps modem channel? Over a 1-Mbps cable modem? Over a 10-Mbps Ethernet? Over 100-Mbps Ethernet?(一幅图像的分辨率为1024 x 768像素,每个像素用3字节来表示。
计算机网络 Chapter_5_V6.01

datagram transferred by different link protocols over different links: e.g., Ethernet on first link, frame relay on intermediate links, 802.11 on last link each link protocol provides different services e.g., may or may not provide rdt over link
datagram controller datagram controller
sending host
datagram
receiving host
frame
sending side: encapsulates datagram in frame adds error checking bits, rdt, flow control, etc.
• Error detection not 100% reliable! • protocol may miss some errors, but rarely • larger EDC field yields better detection and correction
otherwise
Link Layer 5-11
transportation analogy:
trip from Princeton to Lausanne limo: Princeton to JFK plane: JFK to Geneva train: Geneva to Lausanne
tourist = datagram transport segment = communication link transportation mode = link layer protocol travel agent = routing algorithm
计算机网络英文——提供给学生部分习题答案

Solution of Selected Exercises from the End of Chapter ExercisesChapter 1 - Introduction And Overview1.4 To what aspects of networking does data communications refer? Answer: Data communications refers to the study of low-level mechanisms and technologies used to send information across a physical communication medium, such as a wire, radio wave, or light beam.b5E2RGbCAP1.5 What is packet-switching, and why is packet switching relevant tothe Internet?Answer: Packet switching divides data into small blocks, called packets, and includes an identification of the intended recipient in each packet. Packet switching changed networking in a fundamental way, and provided the basis for the modern Internet. Packet switching allows multiple senders to transmit data over a shared network. p1EanqFDPw1.8 What is a communication protocol? Conceptually, what two aspects ofcommunication does a protocol specify?Answer: A communication protocol refer to a specification for network communication.Major aspects of a protocol are syntax (format> and semantics (meaning> of the protocol. DXDiTa9E3d1.9 What is a protocol suite, and what is the advantage of a suite? Answer:protocols are designed in complete, cooperative sets called suites or families, instead of creating each protocol in isolation.Each protocol in a suite handles oneaspect of communication。
计算机网络英文试题库(附答案)chapter

.Chapter 2 Application Layer1. In the following four descriptions, which one is correct?A In C/S architecture, clients communicate with each other directly.B In C/S architecture, client has a fixed well-known address.C In P2P architecture, peers communicate with each other directly.D In P2P architecture, peer has a fixed well-known address.2.In the context of a communication session between a pair of process, theprocess that initiates the communication is labeled as the,the process that waits to be contacted to begin the session is labeled as the.A client process, server processB sending process, receivingprocessC input process,output processD communicating process, connecting process3.A socket is the interface between within a host.A the network layer and the link layerB the link layer and the physical layerC the application layer and the transport layerD the transport layer and the network layer4. In the following applications, which one is a loss-tolerant application?A E-mailB file transferC instant messagingD real-time audio5. In the following applications, which one is a bandwidth-sensitive application?.A E-mailB web applicationC real-time audioD file transfer6. The service of TCP can’tguarantee.A delivery of all data without errorB delivery of all data in theproper orderC the rate of deliveryD congestion control7. In the following applications, which one uses UDP?A E-mailB web applicationC file transferD DNS8.In the following descriptions about HTTP, which one is not correct?A HTTP uses non-persistent connections in its default mode.B HTTP uses TCP as its underlying transport protocol.C HTTP is a stateless protocol.D HTTP is client-server architecture.9.Suppose a web page consists of a base HTML file, 5 JEPG images and a java applet, and also suppose HTTP uses persistent connection without pipelining,the total response time is.A 2RTTB 8RTTC 12 RTTD 14RTT10. In HTTP response message, if the requested HTTP protocol version is not supported, the status code is.A 200B 301C 400D 5051~5 CACDC6~10 CDABD11. The port number of web application is.A25B20C80D5312. A network entity that satisfies HTTP requests on the behalf of an originweb server is.A server farmB server stackC proxy serverD edge server13. In the following descriptions about persistent connection, which one is not correct?A The server leaves the TCP connection open after sending a response.B Each TCP connection is closed after the server sending one object.C There are two versions of persistent connection: without pipelining and with pipelining.D The default mode of HTTP uses persistent connection with pipelining.14. FTP uses two parallel TCPconnections to transfer a file, there are.A control connection and data connectionB receiving connection and sending connectionC client connection and sever connectionD program connection and process connection15. In the following descriptions about FTP, which one is correct?A FTP is p2p architecture.B FTP sends its control informationout-of-band.C FTP uses persistent connection.D FTP is a stateless protocol.16. In the commandsof FTP, which one does not have parameter?A USERB PASSC LISTD STOR17. The Internet mail system has three components which they are.A user agent, SMTP, POP3B SMTP, POP3, IMAPC user agent, SMTP, IMAPD user agent, SMTP, mail server18. If the status code in HTTP response message is 404, it means.A Request succeeded.B The requested document doesn’texit on this server.C This is a generic error code indicating that the request could not be understood by the server.D Requested object has been permanently mover.19. Comparison HTTP with SMTP, the correct is.A HTTP is a push protocol, and SMTP is a pull protocol.B In the default mode, both of them use persistent connection.C HTTP places all of the message ’s objects into one message, and SMTP sendsevery object one by one.D HTTP requires each messageto be in 7-bit ASCII format,and SMTPdoesn’t impose this restriction.20. The headers in the MIME message must include except.A FromB Content-typeC Content-transfer-encodingD MIME version11~15CCBAB16~20 DDBBD21. In the following protocol, which one is stateless?A POP3B SMTPC FTPD IMAP22. DNS means.A Data Name SystemB Data National SystemC Domain Name SystemD Domain National System23. There are three classes of DNS server except.A Root DNS serverB Local DNS serverC TLD server D Authoritative DNS server24. DNS provides some services except.A Host aliasingB Mail server aliasingC Load distributionD A single point of failure25. There are three architectures for locating content in P2Pfile sharing,KaZaA uses.A Centralized Directory(Napster)B Query Flooding(Gnutella)C Exploiting Heterogeneity (p141)D Incentive Priorities26. There are three architectures for locating content in P2Pfile sharing, Napst er uses.A Centralized Directory (p137)B Query FloodingC Exploiting HeterogeneityD Incentive Priorities27. The following architectures in P2Pfile sharing, which is an overlay network?A Centralized DirectoryB Query Flooding(p139)C Exploiting HeterogeneityD Incentive Priorities28. The time it takes for a small packet to travel from client to server andthen back to the client is.A round-travel timeB next-hop timeC round-trip timeD prefix-matching time29.Suppose A ( with a Web-based e-mail account ) sends a message to B ( who accesses his mail server using POP3), which application-layer protocol is not used?A HTTPB SMTPC POP3D IMAP30.In the four following options, which protocol is included in Mail Access Protocol?A SMTPB DHCPC IMAPD FTP31. In FTP commands,is used to send user password to the server.A UserB PassC RetrD Stor32. The function of the additional header field in MIMEContent-Type is.A to convert the message body to its origin non-ASCII formB to determine what actions it should take on message bodyC to send an E-mail to the receiving user agentD to indicate what type the message is33.In the four following options, which application is organized as hybrid ofC/S and P2P architecture?A E-mailB OICQC File transferD Web application34. In the four following options, which is not a centralized DNSdesign ’s problem ?A a single point of failureB traffic volumeC distant centralized databaseD slow(maintenance)35. In the following options, from the application developer’s perspective, which is not correct?A the network architecture is fixedB the network architecture provides a specific set of services to applicationsC the application architecture is designed by the physical devicesD the application architecture dictates how the application is organized over the various end systems36. There are three predominant architectures used in modern network applications, which one is not included?A the client-server architectureB the P2P architectureC a hybrid of the client-server and P2P architectureD a hybrid of the client-server and browser-server architecture37.In the following options about C/S architecture, which is not correct?A In C/S architecture, there is an always-on host, called the server.B In C/S architecture, there is an always-on host, called the client.C The server has a fixed, well-known address, called IP address.D Clients do not directly communicate with each other.38.are often used to create a powerful virtual server in C/S architecture.A PeersB Server farmC server stackD local server39. A process sends messages into, and receives messages from, the network through its.A socketB programC clientD peer40.Which one is not defined by an application-layer protocol?A the types of messages exchangedB the syntax of various message typesC the semantics of the fieldsD rules for determining when and how to translate the socket41. HTTP can use two types of connections, which are.A persistent and non-persistent connectionB connection with pipelining and without pipeliningC TCP and UDPD parallel and serial connection42.takes for a small packet to travel from client to server and thenback to the client.A RDTB thresholdC RTTD overhead43. The default mode of HTTP uses.A non-persistent connection with pipeliningB non-persistent connection without pipeliningC persistent connection with pipeliningD persistent connection without pipelining44. In HTTP request messages, the request line has three fields,there are.A the method field, the URL field and the HTTP version fieldB the method, the connection and URL fieldC the user-agent, the method and HTTP version fieldD the user-agent, the URL and the HTTP version field45. In the header lines of HTTP request message, if the field of Connection isclose, it specifies.A the host on which object residesB what type of the user agentC that the browser wants the server to close the connection after sendingthe requested objectD which language can the browser receive46. In HTTP response message, if the status code is 404, it means.A request succeeded and the information is returned in the responseB requested object has been permanently movedC the requested HTTP protocol version is not supported by the serverD the requested document does not exist on this server47.is a network entity that satisfies HTTP requests on the behalfof an origin Web server.A proxy serverB local serverC DNS serverD Web server48. In the following four options about web cache, which one is not correct?A A web cache is both a server and a client at the same time.B A web cache is purchased and installed by an ISP.C A web cache can raise the response time for a client request.D A web cache can reduce traffic on an institution’s access link to the Internet.49. The request message in the conditional GET must include the headerline.A Last-ModifiedB Last-ReferencedC If-Modified-SinceD If–Referenced-Since50. FTP uses two parallel connections to transfer a file, they are.A TCP and UDP connectionB connection with pipelining and without pipeliningC control an data connectionD client-server and browser-server connection51.In FTP commands, which one is used to ask the server to send back alist of all files in the current remote directory?A USERB PASSC LISTD RETR52. In the Internet mail system,allow users to read, reply to, forward, save and compose message.A User agentsB mail serversC SMTPD TCP53. The two key MIME headers for supporting multimedia are.A Content-Type and MIME-VersionB Content-Type and Content-Transfer-EncodingC Content-Transfer-Encoding and MIME-VersionD MIME-Version and MIME-Type54. For Internet mail, the mail access protocol is used to.A transfer mail from the recipient ’s mail server to the recipient’s user agentB transfer mail from the sender’s mail server to the recipient’s mail serverC translate the mail from the sender’s mail serverD translate the mail into the recipient’s mail server55. POP3 progresses through three phases, which they are.A authorization, translation and transactionB authorization, translation and updateC authorization, transaction and updateD translation, transaction and update56. In the following four services, which one can not provide by DNS?A Host aliasingB Mail server aliasingC translate hostname to IP addressesD translate MAC addresses to IP addresses57. There are three classes of DNS servers, there are.A root DNS server, top-level domain DNS server and local DNS serverB root DNS server, top-level domain DNS server and authoritative DNS serverC root DNS server, local DNS server and authoritative DNS serverD root DNS server, local DNS server and top-level domain DNS server58.In the following four options about POP3, which one is not correct?A The user agent employed only three commands: List, Retr and QuitB The server does not carry state information across POP3 sessionsC The port number is 110D The POP3 protocol does not provide any means for a user to createremote folders and assign messages to folders.59. A resource record in DNSdistributed database is a four-tuple,which field ca n be ignored?(p132) A Name B Value C Type D TTL60. In the following four options about DNSresource record, which one is correct?A The meaning of Nameand Value depend on Type.B The meaning of Value and Type depend on Name.C If Type=A, then Nameis a domain and Value is the IP address for the hostname.D If Type=MX,then Nameis domain and Value is the IP address for the hostname.61.In the following four options about DNSmessages, which one is not correct?A There are only two kinds of DNSmessage.(p133)B Both query and reply messagehave the sameformat.C The header section in DNSmessagehas 12 bytes.D The authority section contains the resource records for the samethat wasorigi nally queried.62.In DNSmessage,contains information about the query that is being made.(p 133)A authority sectionB question sectionC answer sectionD additional sec tion63.There are three techniques are employed in most any P2Pfile-sharing systems, which one is not include?(p144)A Request queuingB incentive prioritiesC parallel downloadingD Responseq ueuing64. In the following four options about P2P file-sharing, which one isnot correct?A P2P file-sharing is highly scalable.B P2P file-sharing relies on P2P architecture.C The means for locating content in different P2P file-sharing are different.D P2P file-sharing systems not only share MP3s,but also videos, software,documents and images.65.In MIMEheader lines,specifies the nameof the SMTPserver that sent the m essage (from),the nameof the SMTPserver that received the message(by), and the time an which t he receiving server received the message.A ReceivedB FromC ToD MIME-Version66.If the header line Connection is close, it means that the client wants.A persistent connection with pipeliningB persistent connection without pipeliningC nonpersistent connectionD not connection67. In HTTP request message, the entity body is empty with the method,but is used with the method.A GET, POSTB POST,GETC GET, HEAD D POST, HEAD68. In HTTP response message, if the Date: header ;one indicates the time Fri.08 Aug. 2008 12:00:00 GMT, the Last-Modified: header line can not be.A Fri. 08 Aug. 2008 11:00:00 GMTB Fri. 08 Aug. 2008 11:30:00GMTC Fri. 08 Aug. 2008 12:00:00 GMTD Fri. 08 Aug. 2008 12:30:00 GMT69. In the following four options,which one is not the part of cookie technology?A Cookie header lines in the HTTP response message and request message.B One cookie header file kept on the user ’s end system and managedby the user ’s browser.C A network entity that satisfies HTTPrequests on the behalf of an origin Web server.D A back-end database at the Web site70. On-top of stateless HTTP,can be used to create a user session layer.A proxy serverB Web cacheC cookieD socket71. Processes communicate with each other by reading from and writing to.A programsB threadsC socketsD channels72.In the following four options about network architecture, which one isnot correct?A The network architecture is fixed.B The network architecture provides a specific set of services to application.C The network architecture is designed by application developer.D The network architecture dictates how the application is organized overspecial server.73. In Client-Server architecture,the clients visit the server ’s through.A client’s socketB client’s IP addressC server’s socketD server’s IP address74.can be thought of as a program that is running within end system.A processB threadC socketD context75. API means.A Application Program InterfaceB Application Process InterfaceC Appellation Program InterfaceD Appellation Process Interface76.One host can be running many network applications, so the system assignsthem differentto distinguish each other.A IP addressB port numberC hostnameD section77.In the following four applications, which one is both bandwith-sensitive and require tight timing constraints?A real-time audioB file transferC E-mailD Webdocuments78.The port number of the Web server is.A 25B 20C 80D 808079.The port number of the mail server is.A 25B 20C 80D 808080.Look the URL/rjxy/index.html,the object ’s path nameis.A B /rjxyC /rjxy/index.htmlD index.html81. Each URL has components, they are.A transport protocol and object’s path nameB host name and object’s path nameC transport protocol and host nameD client name and server name1. Consider an HTTP client will request a WEB page from a WEB server. Supposethe URLof the page is /somedepartment /somedir/exp.html. The client does not want to use persistent connections and want to receive Frenchversion of the object. The user agent is WindowsNT 5.1. Give the request message according to the given format.Request line:Header lines:.2.Telnet into a Web server and send a multiline request message. Includein the request message the If-modified-since: header line to force aresponse message with the 304 Not Modified status code.Solution:Request line:Header lines:3.Suppose within you Web browser you click on a link to obtain a Web page. The.look-up is necessary to obtain the IP address. Suppose that n DNS servers arevisited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT, ⋯, RTT. Further suppose that the Webpage associated with1nthe link contains exactly one object,consisting of a small HTML text.Let RTT0 denote the RTT between the local host and the server containing the object.Assuming zero transmission time of the object, how much time elapses from whenthe client clicks on the link until the client receives the object?5. Suppose that you send an e-mail message whose only data is a microsoft excell attachment. What might the header lines (including MIME lines) look like?。
计算机网络英文题库(附答案)chapter5

Chapter 5 The Link Layer and Local Area Network1.A ( ) protocol is used to move a datagram over an individual link.A application-layerB transport-layerC network-layerD link-layer2.The units of data exchanged by a link-layer protocol are called ( ).A datagramsB framesC segmentsD messages3.Which of the following protocols is not a link-layer protocol? ( )A EthernetB PPPC HDLCD IP4.In the following four descriptions, which one is not correct? ( )A link-layer protocol has the node-to-node job of moving network-layer datagrams over a single link in the path.B The services provided by the link-layer protocols may be different.C A datagram must be handled by the same link-layer protocols on the different links in the path.D The actions taken by a link-layer protocol when sending and receiving frames include error detection, flow control and random access.5.Which of the following services can not offered by a link-layer protocol? ( )A congestion controlB Link AccessC Error controlD Framing6.( ) protocol serves to coordinate the frame transmissions of the many nodes when multiple nodes share a single broadcast link.A ARPB MACC ICMPD DNS7.In the following four descriptions about the adapter, which one is not correct? ( )A The adapter is also called as NIC.B The adapter is a semi-autonomous unit.C The main components of an adapter are bus interface and the link interface.D The adapter can provide all the link-layer services.8.Consider CRC error checking approach, the four bit generator G is 1011, and suppose that the data D is 10101010, then the value of R is( ).A 010B 100C 011D 1109.In the following four descriptions about random access protocol, which one is not correct? ( )A I n slotted ALOHA, nodes can transmit at random time.B I n pure ALOHA, if a frame experiences a collision, the node will immediately retransmit it with probability p.C T he maximum efficiency of a slotted ALOHA is higher than a pure ALOHA.D I n CSMA/CD, one node listens to the channel before transmitting.10.In the following descriptions about MAC address, which one is not correct? ( )A T he MAC address is the address of one node’s adapter.B N o two adapters have the same MAC address.C T he MAC address doesn’t change no matter where the adapter goes.D M AC address has a hierarchical structure.11.The ARP protocol can translate ( ) into ( ). ( )A h ost name, IP addressB h ost name, MAC addressC I P address, MAC addressD broadcast address, IP address12.The value of Preamble field in Ethernet frame structure is ( )A 10101010 10101010……10101010 11111111B 10101011 10101011……10101011 10101011C 10101010 10101010……10101010 10101011D 10101010 10101010……10101010 1010101013.There are four steps in DHCP, the DHCP server can complete ( ).A DHCP server discoveryB DHCP server offersC DHCP requestD DHCP response14.In CSMA/CD, the adapter waits some time and then returns to sensing the channel. In the following four times, which one is impossible? ( )A 0 bit timesB 512 bit timesC 1024 bit timesD 1028 bit times15.The most common Ethernet technologies are 10BaseT and 100BaseT. “10” and “100” indicate( ).A the maximum length between two adaptersB the minimum length between two adaptersC the transmission rate of the channelD the transmission rate of the node16.The principal components of PPP include but not( ).A framingB physical-control protocolC link-layer protocolD network-layer protocol17.In the following four options, which service can not be provided by switch? ( )A filteringB self-learningC forwardingD optimal routing18.In the following four services, which one was be required in PPP? ( )A packet framingB error detectionC error correctionD multiple types of link19.The ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces is( ).A filteringB forwardingC self-learningD optimal routing20.In ( ) transmission(s), the nodes at both ends of a link may transmit packets at the same time.A full-duplexB half-duplexC single-duplexD both full-duplex and half-duplex21.Consider the data D is 01110010001, if use even parity checking approach, the parity bit is( ① ), if use odd parity checking approach, the parity bit is( ② ). ( )A ①0 ②1B ①0 ②0C ①1 ②1D ①1 ②022.In the following four descriptions about parity checks, which one is correct? ( )A Single-bit parity can detect all errors.B Single-bit parity can correct one errors.C Two-dimensional parity not only can detect a single bit error, but also can correct that error.D Two-dimensional parity not only can detect any combination of two errors, but also can correct them.23.MAC address is ( ) bits long.A 32B 48C 128D 6424.Wireless LAN using protocol ( ).A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.1125.The following protocols are belonging to multiple access protocols except for ( ).A channel partitioning protocolsB routing protocolsC random access protocolsD taking-turns protocols26.Which of the following is not belonging to channel partitioning protocols? ( )A CSMAB FDMC CDMAD TDM27.In the following four descriptions about CSMA/CD, which one is not correct? ( )A A node listens to the channel before transmitting.B If someone else begins talking at the same time, stop talking.C A transmitting node listens to the channel while it is transmitting.D With CSMA/CD, the collisions can be avoided completely.28.( ) provides a mechanism for nodes to translate IP addresses to link-layer address.A IPB ARPC RARPD DNS29.A MAC address is a ( )address.A physical-layerB application-layerC link-layerD network-layer30.Which of the following is correct? ( )A No two adapters have the same MAC address.B MAC broadcast address is FF-FF-FF-FF-FF-FF.C A portable computer with an Ethernet card always has the same MAC address, no matter where the computer goes.D All of the above31.In the following four descriptions, which one is not correct? ( )A ARP resolves an IP address to a MAC address.B DNS resolves hostnames to IP addresses.C DNS resolves hostnames for hosts anywhere in the Internet.D ARP resolves IP addresses for nodes anywhere in the Internet.32.In the LAN, ( )protocol dynamically assign IP addresses to hosts.A DNSB ARPC DHCPD IP33.DHCP protocol is a four-step process: ①DHCP request. ②DHCP ACK. ③DHCP server discovery. ④DHCP server offer(s). The correct sequence is ( )A ①②③④B ③②①④C ③④①②D ①④③②34.In the Ethernet frame structure, the CRC field is ( )bytes.A 2B 4C 8D 3235.In the Ethernet frame structure, the Data field carries the ( ).A IP datagramB segmentC frameD message36.In the following four descriptions, which one is not correct? ( )A Ethernet uses baseband transmission.B All of the Ethernet technologies provide connection-oriented reliable service to the network layer.C The Ethernet 10Base2 technology uses a thin coaxial cable for the bus.D The Ethernet 10BaseT technology uses a star topology.37.Ethernet’s multiple access protocol is ( ).A CDMAB CSMA/CDC slotted ALOHAD token-passing protocol38.In the following four descriptions about CSMA/CD, which one is not correct? ( )A An adapter may begin to transmit at any time.B An adapter never transmits a frame when it senses that some other adapter is transmitting.C A transmitting adapter aborts its transmission as soon as it detects that another adapter is also transmitting.D An adapter retransmits when it detects a collision.39.Which of the following descriptions about CSMA/CD is correct? ( )A No slots are used.B It uses carrier sensing.C It uses collision detection.D All of the above.40.The Ethernet 10BaseT technology uses( )as its physical media.A fiber opticsB twisted-pair copper wireC coaxial cableD satellite radio channel41.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( )meters.A 100B 200C 500D 1042.A ( )is a physical-layer device that acts on individual bits rather than on frames.A switchB hubC routerD gateway43.A hub is a ( )device that acts on individual bits rather than on frames.A physical-layerB link-layerC network-layerD ransport-layer44.A switch is a( )device that acts on frame.A physical-layerB link-layerC network-layerD transport-layer45.In the following four descriptions, which one is not correct? ( )A Switches can interconnect different LAN technologies.B Hubs can interconnect different LAN technologies.C There is no limit to how large a LAN can be when switches are used to interconnect LAN segments.D There is restriction on the maximum allowable number of nodes in a collision domain when hubs are used to interconnect LAN segments.46.The ability to determine whether a frame should be forwarded to some interface or should just be dropped is ( ).A f ilteringB f orwardingC s elf-learningD o ptimal routing47.Which of the following devices is not a plug and play device? ( )A hubB routerC switchD repeater48.Which of the following devices is not cut-through device? ( )A hubB routerC switchD repeater49.In the following four descriptions, which one is not correct? ( )A Switches do not offer any protection against broadcast storms.B Routers provide firewall protection against layer-2 broadcast storms.C Both switches and routers are plug and play devices.D A router is a layer-3 packet switch, a switch is a layer-2 packet switch. 50.Which device has the same collision domain? ( )A HubB SwitchC RouterD Bridge51.IEEE802.2 protocol belong to ( )layerA networkB MACC LLCD physical52.IEEE802.11 protocol defines ( )rules.A Ethernet BusB wireless WANC wireless LAND Token Bus53.In data link-layer, which protocol is used to share bandwidth? ( )A SMTPB ICMPC ARPD CSMA/CD54.When two or more nodes on the LAN segments transmit at the same time, there will be a collision and all of the transmitting nodes well enter exponential back-off, that is all of the LAN segments belong to the same( ).A collision domainB switchC bridgeD hub55.( )allows different nodes to transmit simultaneously and yet have their respective receivers correctly receive a sender’s encoded data bits.A CDMAB CSMAC CSMA/CDD CSMA/CA56.Because there are both network-layer addresses (for example, Internet IP addresses) and link-layer addresses (that is, LAN addresses), there is a need totranslate between them. For the Internet, this is the job of ( ).A RIPB OSPFC ARPD IP57.PPP defines a special control escape byte, ( ). If the flag sequence, 01111110 appears anywhere in the frame, except in the flag field, PPP precedes that instance of the flag pattern with the control escape byte.A 01111110B 01111101C 10011001D 1011111058.The device ( ) can isolate collision domains for each of the LAN segment.A modemB switchC hubD NIC59.In the following four descriptions about PPP, which one is not correct? ( )A PPP is required to detect and correct errors.B PPP is not required to deliver frames to the link receiver in the same order in which they were sent by the link sender.C PPP need only operate over links that have a single sender and a single receiver.D PPP is not required to provide flow control.60.In the PPP data frame, the( ) field tells the PPP receivers the upper-layer protocol to which the received encapsulated data belongs.A flagB controlC protocolD checksum61.PPP’s link-control protocols (LCP) accomplish ( ).A initializing the PPP linkB maintaining the PPP linkC taking down the PPP linkD all of the above62.The PPP link always begins in the ( ) state and ends in the ( ) state. ( )A open, terminatingB open, deadC dead, deadD dead, terminating63.For( ) links that have a single sender at one end of the link and a single receiver at the other end of the link.A point-to-pointB broadcastC multicastD all of the above64.With ( )transmission, the nodes at both ends of a link may transmit packets at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous65.With ( ) transmission, a node can not both transmit and receive at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous66.Which of the following functions can’t be implemented in the NIC? ( )A encapsulation and decapsulationB error detectionC multiple access protocolD routing67.Which of the following four descriptions is wrong? ( )A The bus interface of an adapter is responsible for communication with the adapter’s parent node.B The link interface of an adapter is responsible for implementing the link-layer protocol.C The bus interface may provide error detection, random access functions.D The main components of an adapter are the bus interface and the link interface. 68.For odd parity schemes, which of the following is correct? ( )A 011010001B 111000110C 110101110D 00011011069.( )divides time into time frames and further divides each time frame into N time slots.A FDMB TMDC CDMAD CSMA70.With CDMA, each node is assigned a different ( )A codeB time slotC frequencyD link71.Which of the following four descriptions about random access protocol is not correct? ( )A A transmission node transmits at the full rate of the channelB When a collision happens, each node involved in the collision retransmits at once.C Both slotted ALOHA and CSMA/CD are random access protocols.D With random access protocol, there may be empty slots.72.PPP defines a special control escape byte 01111101. If the data is b1b201111110b3b4b5, the value is( )after byte stuffing.A b1b20111110101111110b3b4b5B b1b20111111001111101b3b4b5C b5b4b30111111001111101b2b1D b5b4b30111110101111110b2b173.MAC address is in ( ) of the computer.A RAMB NICC hard diskD cache74.Which of the following is wrong? ( )A ARP table is configured by a system administratorB ARP table is built automaticallyC ARP table is dynamicD ARP table maps IP addresses to MAC addresses75.NIC works in ( )layer.A physicalB linkC networkD transport76.In LAN, if UTP is used, the common connector is( ).A AUIB BNCC RJ-45D NNI77.The modem’s function(s) is(are) ( ).A translates digital signal into analog signalB translates analog signal into digital signalC both translates analog signal into digital signal and translates digital signal into analog signalD translates one kind of digital signal into another digital signal78.( )defines Token-Ring protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.279.( )defines Token-Bus protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.280.( ) defines CSMA/CD protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.281.The computer network that concentrated in a geographical area, such as in a building or on a university campus, is ( )A a LANB a MANC a WAND the Internet82.The MAC address is ( ) bits long.A 32B 48C 128D 25683.Which of the following four descriptions about MAC addresses is wrong? ( )A a MAC address is burned into the adapter’s ROMB No two adapters have the same addressC An adapter’s MAC address is dynamicD A MAC address is a link-layer address84.Which of the following four descriptions about DHCP is correct? ( )A DHCP is C/S architectureB DHCP uses TCP as its underlying transport protocolC The IP address offered by a DHCP server is valid foreverD The DHCP server will offer the same IP address to a host when the host requests an IP address85.The ( )field permits Ethernet to multiplex network-layer protocols.A preambleB typeC CRCD destination MAC address86.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( ) meters.A 50B 100C 200D 50087.An entry in the switch table contains the following information excepts for ( )A the MAC address of a nodeB the switch interface that leads towards the nodeC the time at which the entry for the node was placed in the tableD the IP address of a node88.Consider the 4-bit generator , G is 1001, and suppose that D has the value 101110000. What is the value of R?89.Consider the following graph of the network. Suppose Host A will send a datagram to Host B, Host A run OICQ on port 4000, Host B run OICQ on port 8000. All of ARP tables are up to date. Enumerate all the steps when message “Hello” is sent from host A to host B.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Chapter 5 The Link Layer and Local Area Network1.A ( ) protocol is used to move a datagram over an individual link.A application-layerB transport-layerC network-layerD link-layer2.The units of data exchanged by a link-layer protocol are called ( ).A datagramsB framesC segmentsD messages3.Which of the following protocols is not a link-layer protocol? ( )A EthernetB PPPC HDLCD IP4.In the following four descriptions, which one is not correct? ( )A link-layer protocol has the node-to-node job of moving network-layer datagrams over a single link in the path.B The services provided by the link-layer protocols may be different.C A datagram must be handled by the same link-layer protocols on the different links in the path.D The actions taken by a link-layer protocol when sending and receiving frames include error detection, flow control and random access.5.Which of the following services can not offered by a link-layer protocol? ( )A congestion controlB Link AccessC Error controlD Framing6.( ) protocol serves to coordinate the frame transmissions of the many nodes when multiple nodes share a single broadcast link.A ARPB MACC ICMPD DNS7.In the following four descriptions about the adapter, which one is not correct? ( )A The adapter is also called as NIC.B The adapter is a semi-autonomous unit.C The main components of an adapter are bus interface and the link interface.D The adapter can provide all the link-layer services.8.Consider CRC error checking approach, the four bit generator G is 1011, and suppose that the data D is 10101010, then the value of R is( ).A 010B 100C 011D 1109.In the following four descriptions about random access protocol, which one is not correct? ( )A I n slotted ALOHA, nodes can transmit at random time.B I n pure ALOHA, if a frame experiences a collision, the node will immediately retransmit it with probability p.C T he maximum efficiency of a slotted ALOHA is higher than a pure ALOHA.D I n CSMA/CD, one node listens to the channel before transmitting.10.In the following descriptions about MAC address, which one is not correct? ( )A T he MAC address is the address of one node’s adapter.B N o two adapters have the same MAC address.C T he MAC address doesn’t change no matter where the adapter goes.D M AC address has a hierarchical structure.11.The ARP protocol can translate ( ) into ( ). ( )A h ost name, IP addressB h ost name, MAC addressC I P address, MAC addressD broadcast address, IP address12.The value of Preamble field in Ethernet frame structure is ( )A 10101010 10101010……10101010 11111111B 10101011 10101011……10101011 10101011C 10101010 10101010……10101010 10101011D 10101010 10101010……10101010 1010101013.There are four steps in DHCP, the DHCP server can complete ( ).A DHCP server discoveryB DHCP server offersC DHCP requestD DHCP response14.In CSMA/CD, the adapter waits some time and then returns to sensing the channel. In the following four times, which one is impossible? ( )A 0 bit timesB 512 bit timesC 1024 bit timesD 1028 bit times15.The most common Ethernet technologies are 10BaseT and 100BaseT. “10” and “100” indicate( ).A the maximum length between two adaptersB the minimum length between two adaptersC the transmission rate of the channelD the transmission rate of the node16.The principal components of PPP include but not( ).A framingB physical-control protocolC link-layer protocolD network-layer protocol17.In the following four options, which service can not be provided by switch? ( )A filteringB self-learningC forwardingD optimal routing18.In the following four services, which one was be required in PPP? ( )A packet framingB error detectionC error correctionD multiple types of link19.The ability to determine the interfaces to which a frame should be directed, and then directing the frame to those interfaces is( ).A filteringB forwardingC self-learningD optimal routing20.In ( ) transmission(s), the nodes at both ends of a link may transmit packets at the same time.A full-duplexB half-duplexC single-duplexD both full-duplex and half-duplex21.Consider the data D is 01110010001, if use even parity checking approach, the parity bit is( ① ), if use odd parity checking approach, the parity bit is( ② ). ( )A ①0 ②1B ①0 ②0C ①1 ②1D ①1 ②022.In the following four descriptions about parity checks, which one is correct? ( )A Single-bit parity can detect all errors.B Single-bit parity can correct one errors.C Two-dimensional parity not only can detect a single bit error, but also can correct that error.D Two-dimensional parity not only can detect any combination of two errors, but also can correct them.23.MAC address is ( ) bits long.A 32B 48C 128D 6424.Wireless LAN using protocol ( ).A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.1125.The following protocols are belonging to multiple access protocols except for ( ).A channel partitioning protocolsB routing protocolsC random access protocolsD taking-turns protocols26.Which of the following is not belonging to channel partitioning protocols? ( )A CSMAB FDMC CDMAD TDM27.In the following four descriptions about CSMA/CD, which one is not correct? ( )A A node listens to the channel before transmitting.B If someone else begins talking at the same time, stop talking.C A transmitting node listens to the channel while it is transmitting.D With CSMA/CD, the collisions can be avoided completely.28.( ) provides a mechanism for nodes to translate IP addresses to link-layer address.A IPB ARPC RARPD DNS29.A MAC address is a ( )address.A physical-layerB application-layerC link-layerD network-layer30.Which of the following is correct? ( )A No two adapters have the same MAC address.B MAC broadcast address is FF-FF-FF-FF-FF-FF.C A portable computer with an Ethernet card always has the same MAC address, no matter where the computer goes.D All of the above31.In the following four descriptions, which one is not correct? ( )A ARP resolves an IP address to a MAC address.B DNS resolves hostnames to IP addresses.C DNS resolves hostnames for hosts anywhere in the Internet.D ARP resolves IP addresses for nodes anywhere in the Internet.32.In the LAN, ( )protocol dynamically assign IP addresses to hosts.A DNSB ARPC DHCPD IP33.DHCP protocol is a four-step process: ①DHCP request. ②DHCP ACK. ③DHCP server discovery. ④DHCP server offer(s). The correct sequence is ( )A ①②③④B ③②①④C ③④①②D ①④③②34.In the Ethernet frame structure, the CRC field is ( )bytes.A 2B 4C 8D 3235.In the Ethernet frame structure, the Data field carries the ( ).A IP datagramB segmentC frameD message36.In the following four descriptions, which one is not correct? ( )A Ethernet uses baseband transmission.B All of the Ethernet technologies provide connection-oriented reliable service to the network layer.C The Ethernet 10Base2 technology uses a thin coaxial cable for the bus.D The Ethernet 10BaseT technology uses a star topology.37.Ethernet’s multiple access protocol is ( ).A CDMAB CSMA/CDC slotted ALOHAD token-passing protocol38.In the following four descriptions about CSMA/CD, which one is not correct? ( )A An adapter may begin to transmit at any time.B An adapter never transmits a frame when it senses that some other adapter is transmitting.C A transmitting adapter aborts its transmission as soon as it detects that another adapter is also transmitting.D An adapter retransmits when it detects a collision.39.Which of the following descriptions about CSMA/CD is correct? ( )A No slots are used.B It uses carrier sensing.C It uses collision detection.D All of the above.40.The Ethernet 10BaseT technology uses( )as its physical media.A fiber opticsB twisted-pair copper wireC coaxial cableD satellite radio channel41.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( )meters.A 100B 200C 500D 1042.A ( )is a physical-layer device that acts on individual bits rather than on frames.A switchB hubC routerD gateway43.A hub is a ( )device that acts on individual bits rather than on frames.A physical-layerB link-layerC network-layerD ransport-layer44.A switch is a( )device that acts on frame.A physical-layerB link-layerC network-layerD transport-layer45.In the following four descriptions, which one is not correct? ( )A Switches can interconnect different LAN technologies.B Hubs can interconnect different LAN technologies.C There is no limit to how large a LAN can be when switches are used to interconnect LAN segments.D There is restriction on the maximum allowable number of nodes in a collision domain when hubs are used to interconnect LAN segments.46.The ability to determine whether a frame should be forwarded to some interface or should just be dropped is ( ).A f ilteringB f orwardingC s elf-learningD o ptimal routing47.Which of the following devices is not a plug and play device? ( )A hubB routerC switchD repeater48.Which of the following devices is not cut-through device? ( )A hubB routerC switchD repeater49.In the following four descriptions, which one is not correct? ( )A Switches do not offer any protection against broadcast storms.B Routers provide firewall protection against layer-2 broadcast storms.C Both switches and routers are plug and play devices.D A router is a layer-3 packet switch, a switch is a layer-2 packet switch. 50.Which device has the same collision domain? ( )A HubB SwitchC RouterD Bridge51.IEEE802.2 protocol belong to ( )layerA networkB MACC LLCD physical52.IEEE802.11 protocol defines ( )rules.A Ethernet BusB wireless WANC wireless LAND Token Bus53.In data link-layer, which protocol is used to share bandwidth? ( )A SMTPB ICMPC ARPD CSMA/CD54.When two or more nodes on the LAN segments transmit at the same time, there will be a collision and all of the transmitting nodes well enter exponential back-off, that is all of the LAN segments belong to the same( ).A collision domainB switchC bridgeD hub55.( )allows different nodes to transmit simultaneously and yet have their respective receivers correctly receive a sender’s encoded data bits.A CDMAB CSMAC CSMA/CDD CSMA/CA56.Because there are both network-layer addresses (for example, Internet IP addresses) and link-layer addresses (that is, LAN addresses), there is a need totranslate between them. For the Internet, this is the job of ( ).A RIPB OSPFC ARPD IP57.PPP defines a special control escape byte, ( ). If the flag sequence, 01111110 appears anywhere in the frame, except in the flag field, PPP precedes that instance of the flag pattern with the control escape byte.A 01111110B 01111101C 10011001D 1011111058.The device ( ) can isolate collision domains for each of the LAN segment.A modemB switchC hubD NIC59.In the following four descriptions about PPP, which one is not correct? ( )A PPP is required to detect and correct errors.B PPP is not required to deliver frames to the link receiver in the same order in which they were sent by the link sender.C PPP need only operate over links that have a single sender and a single receiver.D PPP is not required to provide flow control.60.In the PPP data frame, the( ) field tells the PPP receivers the upper-layer protocol to which the received encapsulated data belongs.A flagB controlC protocolD checksum61.PPP’s link-control protocols (LCP) accomplish ( ).A initializing the PPP linkB maintaining the PPP linkC taking down the PPP linkD all of the above62.The PPP link always begins in the ( ) state and ends in the ( ) state. ( )A open, terminatingB open, deadC dead, deadD dead, terminating63.For( ) links that have a single sender at one end of the link and a single receiver at the other end of the link.A point-to-pointB broadcastC multicastD all of the above64.With ( )transmission, the nodes at both ends of a link may transmit packets at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous65.With ( ) transmission, a node can not both transmit and receive at the same time.A half-duplexB full-duplexC simplex(单工)D synchronous66.Which of the following functions can’t be implemented in the NIC? ( )A encapsulation and decapsulationB error detectionC multiple access protocolD routing67.Which of the following four descriptions is wrong? ( )A The bus interface of an adapter is responsible for communication with the adapter’s parent node.B The link interface of an adapter is responsible for implementing the link-layer protocol.C The bus interface may provide error detection, random access functions.D The main components of an adapter are the bus interface and the link interface. 68.For odd parity schemes, which of the following is correct? ( )A 011010001B 111000110C 110101110D 00011011069.( )divides time into time frames and further divides each time frame into N time slots.A FDMB TMDC CDMAD CSMA70.With CDMA, each node is assigned a different ( )A codeB time slotC frequencyD link71.Which of the following four descriptions about random access protocol is not correct? ( )A A transmission node transmits at the full rate of the channelB When a collision happens, each node involved in the collision retransmits at once.C Both slotted ALOHA and CSMA/CD are random access protocols.D With random access protocol, there may be empty slots.72.PPP defines a special control escape byte 01111101. If the data is b1b201111110b3b4b5, the value is( )after byte stuffing.A b1b20111110101111110b3b4b5B b1b20111111001111101b3b4b5C b5b4b30111111001111101b2b1D b5b4b30111110101111110b2b173.MAC address is in ( ) of the computer.A RAMB NICC hard diskD cache74.Which of the following is wrong? ( )A ARP table is configured by a system administratorB ARP table is built automaticallyC ARP table is dynamicD ARP table maps IP addresses to MAC addresses75.NIC works in ( )layer.A physicalB linkC networkD transport76.In LAN, if UTP is used, the common connector is( ).A AUIB BNCC RJ-45D NNI77.The modem’s function(s) is(are) ( ).A translates digital signal into analog signalB translates analog signal into digital signalC both translates analog signal into digital signal and translates digital signal into analog signalD translates one kind of digital signal into another digital signal78.( )defines Token-Ring protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.279.( )defines Token-Bus protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.280.( ) defines CSMA/CD protocol.A IEEE 802.3B IEEE 802.4C IEEE 802.5D IEEE 802.281.The computer network that concentrated in a geographical area, such as in a building or on a university campus, is ( )A a LANB a MANC a WAND the Internet82.The MAC address is ( ) bits long.A 32B 48C 128D 25683.Which of the following four descriptions about MAC addresses is wrong? ( )A a MAC address is burned into the adapter’s ROMB No two adapters have the same addressC An adapter’s MAC address is dynamicD A MAC address is a link-layer address84.Which of the following four descriptions about DHCP is correct? ( )A DHCP is C/S architectureB DHCP uses TCP as its underlying transport protocolC The IP address offered by a DHCP server is valid foreverD The DHCP server will offer the same IP address to a host when the host requests an IP address85.The ( )field permits Ethernet to multiplex network-layer protocols.A preambleB typeC CRCD destination MAC address86.For 10BaseT, the maximum length of the connection between an adapter and the hub is ( ) meters.A 50B 100C 200D 50087.An entry in the switch table contains the following information excepts for ( )A the MAC address of a nodeB the switch interface that leads towards the nodeC the time at which the entry for the node was placed in the tableD the IP address of a node88.Consider the 4-bit generator , G is 1001, and suppose that D has the value 101110000. What is the value of R?89.Consider the following graph of the network. Suppose Host A will send a datagram to Host B, Host A run OICQ on port 4000, Host B run OICQ on port 8000. All of ARP tables are up to date. Enumerate all the steps when message “Hello” is sent from host A to host B.。