2011-2012第2学期计算机网络复习题
2011-2012第2学期计算机网络复习题

PART Ⅰ: Single Choice1. The primary function of the address resolution protocol (ARP) that resides in Internet hosts and routers is:A. To provide LAN router functionsB. To translate between LAN addresses and physical interface addressesC. To translate between IP addresses and LAN addressesD. To calculate the shortest path between two nodes on a LAN2. Queuing can NOT occur inA. the router output portsB. the router input portsC. physical mediumD. an interconnection network3.The host component of a CIDR address of the form a.b.c.d/22 can containaddresses for:A. 2(32-22) hosts minus “special” hostsB. 512 hosts minus “special” hostsC. d times 22 hostsD. 10 hosts minus “special” hosts4. The length of an Ethernet address isA. 4 bytesB. 6 bytesC. 14 bytesD. 20 bytes5. Host A sends a TCP segment (Seq = 43, ACK = 103) to host B, and then hostB replies with a TCP segment (Seq = 103, ACK = 57). The payload of the firstTCP segment isA. 14 bytes longB. 43 bytes longC. 57 bytes longD. 60 bytes long6. Longest prefix matching is usedA. in routers to know on which link can forward packetsB. in classless addressing to use the address space more efficiently than inclassful addressing.C. by NAT to increase the available address spaceD. to assign subnet masks.7. Using module 2 arithmetic to compute the CRC code for message101101110011 with the generator 10011, the result isA.01011 B.0011C.10011 D.11108.Which windows command usually can be used to show the intermediate routersalong the path to a remote destination?A. pingB. showrouteC. nbtstatD. tracert9. Which character is NOT distance-vector algorithm’s characters?A. iterativeB. globalC. asynchronousD. distributed10. Which of the following media does not suffer from electromagneticinterference?A. Copper wireB. Glass fiberC. RadioD. Microwave11. When a destination host transport layer receives data from the network layer,it unambiguously identifies the appropriate process to pass the data to by using a triplet consisting of:A. Source port #, destination IP address, and source IP addressB. Destination port #, source port #, process ID#C. Destination port #, source port #, destination IP addressD. Destination port #, source port #, source IP address12. The FTP protocol runs over ____ and uses port ____.A. TCP 21B. TCP 80C. UDP 20D. TCP 11013. ____ broadband technology uses multiple frequencies to achieve higherthroughput.A. TDMB. FDMC. STDMD. B and C14. Which of the following is the service that the transport layer does not providefor theapplication layer?A. In-order delivery of data segments between processesB. Best effort delivery of data segments between communicating hostsC. Multiplexing and demultiplexing of transport layer segmentsD.Congestion control15. Processes on two different end systems communicate with each other by exchanging ( ) across the computer network.A. packetsB. datagramC. framesD. messages16. Which kind of media is not a guided media? ()A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel17. The units of data exchanged by a link-layer protocol are called().A FramesB SegmentsC DatagramsD bit streams18. ( )makes sure that neither side of a connection overwhelms the other side bysending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure19. The Internet’s network layer is responsible for moving network-layer packetsknown as ( ) from one host to another.A frameB datagramC segmentD message20.In the following options, which service does not be provided to an application by TCP?( )A reliable transportB flow controlC video conferencingD congestion control21. In the following options, which does not use UDP?( )A Internet phoneB video conferencingC streaming multimediaD telnet22. The time required to propagate from the beginning of the link to the nextrouter is ( ).A queuing delayB processing delayC propagation delayD transmission delay23. Which command can be used to show the intermediate routers along thepath to a remote destination? ( )A. pingB. showrouteC. tracertD. ls24. The FTP protocol runs over ____ and uses port ____. ( )A.UDP 21B.UDP 20C.TCP21D. TCP 2525. When a destination host transport layer receives data from the network layer,it unambiguously identifies the appropriate process to pass the data to by using a triplet consisting of ( )A. Source port #, destination IP address, and source IP addressB. Destination port #, source port #, process ID#C. Destination port #, source port #, source IP addressD. Destination port #, source port #, destination IP address26. From the list below, select the items found in the TCP segment structure thatare not found in the UDP segment structure ( )A. Application Generated DataB. Sequence #C. Source Port #D. DestinationPort #27. Which of the following media does not suffer from electromagneticinterference? ( )A. Copper wireB. Glass fiberC. RadioD. Microwave28. A socket is the interface between ( ) within a host.A the network layer and the link layerB the link layer and the physical layerC the application layer and the transport layerD the transport layer and the network layer29. Suppose a web page consists of a base HTML file, 5 JEPG images and a javaapplet, and also suppose HTTP uses persistent connection without pipelining, the total response time is ( ).A 2RTTB 8RTTC 12 RTTD 14RTT30. The time it takes for a small packet to travel from client to server and thenback to the client is ( )A round-travel timeB next-hop timeC round-trip timeD prefix-matching time31. A network entity that satisfies HTTP requests on the behalf of an origin webserver is ( ).A server farmB server stackC proxy serverD edge server32. What is the length of a TCP header? ( )A. 4 bytesB. 6 bytesC. 14 bytesD. 20 bytes33. Which of the following services does not the transport layer provide for theapplication layer?( )A. In-order delivery of data segments between processesB. Best effort delivery of data segments between communicating hostsC. Multiplexing and demultiplexing of transport layer segmentsD. Congestion control34. If the status code in HTTP response message is 404, it means ( )A Request succeeded.B The requested document doesn’t exit on this server.C This is a generic error code indicating that the request could not beunderstood by the server.D Requested object has been permanently mover.35. In the following protocol, which one is stateless? ( )A HTTPB SMTPC FTPD IMAP36. In the four following options, which application is organized as hybrid of C/Sand P2P architecture? ( )A E-mailB QQC File transferD Web application37. A process sends messages into, and receives messages from, the networkthrough its ( ).A socketB programC clientD peer38. In the header lines of HTTP request message, if the field of Connection isclose, it specifies ( ).A the host on which object residesB what type of the user agentC that the browser wants the server to close the connection after sending therequested objectD which language can the browser receive39. In the following four options, which one is not the part of cookie technology?( )A Cookie header lines in the HTTP response message and request message.B One cookie header file kept on the user’s end system and managed by theuser’s browser.C A network entity that satisfies HTTP requests on the behalf of an origin Webserver.D A back-end database at the Web site40. Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet答案PART Ⅱ: True / FalseInstructions: Mark the symbol “T” if the statement is correct,and “F” if the statement is incorrect.1. The job of delivering the data in a transport-layer segment to the correctsocket is called multiplexing.2. Before sending a packet into a datagram network, the source must determineall of the links that packet will traverse between source and destination.3. A web cache is both a client and a server at the same time.yer four of the Internet protocol stackis implemented in the end systems butnot in the routers in the network core.5. The main task of the Internet’s Domain Name System (DNS) is toTranslatehost names to IP addresses.6. Protocols define format,order of messages sent and received among networkentities, and actions taken on message transmission,receipt.7. Consider a computer network consisting of several interconnected 10BaseThubs, but it does not include any bridge or router. Then this network has only one collision domain.8. Routing is the method of moving packets from router’s input ports toappropriate router’s output ports.9. Queuing can occur at both the input ports and the output ports of a router.Queuing occurs at the output port when the arriving rate of packets to the outgoing link exceeds the link capacity. Queue occurs at an input port when the arriving rate of packets exceeds the switch capacity.10. The length of IPV6 address is 32 bits.答案PART Ⅲ: Answer the questionsbriefly.1.Explain the difference betweenTCP service and UDP service.(5 pts)2. Ethernet follows a CSMA/CD protocol scheme. Explain how this scheme works.(5 pts)3. LAN is created by a switch and several PCs as shown in the figure below. Theswitch table is also shown as below. Now A will send LAN segment to B and then B will reply to A. Explain how switch and PCs work. (5 pts)4. Explain the difference between go-back-N and selective repeat.(5 pts)5. Briefly explain①the main functions of Hub, switch and router, and②each ofthem stays in which layer of the TCP/IP model.③If all of them have 4 interfaces, please list the number of collision domains and broadcast domains.(8 pts)6.Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing delay, propagation delay, and processing delay.)7. Draw the “3-way handshaking” figure, including SYN, ACK flags and seq#,ack#. (6 pts)8. In the figure below, please brieflydescribe how H1 sends packets to H2. (Note:you should describe that ①How H1 knows that H2 is not in the same network, and ②How router R1 check its routing table.) (8 pts)9. Select the best corresponding definition or concepts for the term list below.(8 pts)Term list:1)SYN,ACK ( )2)Repeater ( )3)IETF ( )4)VLSM,CIDR ( )5)Connectionless ( )6)Full-duplex ( )7)UDP ( )8)Optical fiber cabling ( )Definition or concepts list for selected:A. A OSI reference model layer 4 protocolB.One of their primary jobs involves RFCsC.Techniques to efficiently use IP addressesD.This model lacks a setup and tear down phaseE.Something you might find in the 3-way handshakeF.An example of a wire link technologyG.The ability to talk and listen at the same timeH.This device moves bits from one data link network to another withoutinspecting the frame’s contents10.(3points)What is the difference between a host and end system? List the types of end systems. Is a Web Server an end system?11.(3points)Please briefly describe the function of the five layers in TCP/IP architecture (NOTE: include the protocol data unit)12.(3points) Where can queuing occur in a router? Briefly explain the conditions that lead to such queuing.13.(2points) What is the difference between routing and forwarding?答案1.Explain the difference betweenTCP service and UDP service.(5 pts)答:TCP:handshaking: setup (prepare for) data transfer ahead of timeHello, hello back human protocolset up “state” in two communicating hostsTCP - Transmission Control ProtocolInternet’s connection-oriented servicereliable, in-order byte-stream data transferloss: acknowledgements and retransmissionsflow control:sender won’t overwhelm receivercongestion control:senders “slow down sending rate” when network congestedUDP:unreliable data transferno flow controlno congestion control2. Ethernet follows a CSMA/CD protocol scheme. Explain how this scheme works.(5pts)答:CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. This means that when a node wants to transmit data, it (1) senses the carrier until no transmissions are detected, (2) starts transmission, and (3) continues to check for a collision. If a collision happens, the node stops and waits a random period before starting with step (1) again.3. LAN is created by a switch and several PCs as shown in the figure below. Theswitch table is also shown as below. Now A will send LAN segment to B and then B will reply to A. Explain how switch and PCs work.(5 pts)答:(1) Host A sends frame to switch. The switch checks the frame and know the destination MAC address is B.(2) The switch checks the switch table, but can not know the interface of B, so flood.(3) Host B receives the frame and replies to host A.(4) The switch receives the frame from B and records MAC address of B and the interface 2 in the switch table.(5) The switch learns the destination of the frame is A and the interface of MAC address of A through the switch table and then sends the frame to interface 1.4. Explain the difference between go-back-N and selective repeat.(5 pts)答:With go-back-N, whenever a receiver detects a missing or damaged frame k, all frames succeeding k are ignored and the sender is forced to start retransmission at frame k. With selective repeat, it is possible to retransmit only frame k; the receiver buffers successive frames.5.答:HUB功能:对信号放大、整形、扩大网络的覆盖范围;工作在物理层。
2011复习题计算机网络

2011复习题计算机网络2011年,计算机网络这门学科在各个领域中扮演着越来越重要的角色。
无论是在商业、教育还是娱乐领域,计算机网络都发挥着关键的作用。
在这篇文章中,我们将回顾2011年的一些复习题,以便更好地理解和掌握计算机网络的基本概念和原理。
一、网络拓扑结构在计算机网络中,网络拓扑结构是指网络中各个节点之间的连接方式。
2011年的复习题中,涉及到了多种拓扑结构,例如星型、总线型和环形等。
每种拓扑结构都有其特定的优缺点,理解这些优缺点对于设计和管理网络至关重要。
二、网络协议网络协议是计算机网络中的通信规则,它定义了数据传输的格式和顺序。
在2011年的复习题中,我们回顾了一些常见的网络协议,如TCP/IP、UDP和HTTP等。
这些协议在不同的应用场景中起着不同的作用,了解它们的工作原理可以帮助我们更好地优化网络性能。
三、网络安全随着网络的普及和发展,网络安全问题也日益突出。
在2011年的复习题中,我们关注了一些网络安全的基本概念和技术,例如防火墙、加密和身份认证等。
了解这些安全措施可以帮助我们更好地保护网络免受恶意攻击和数据泄露的威胁。
四、网络性能网络性能是指网络在传输数据时的速度和稳定性。
在2011年的复习题中,我们研究了一些提高网络性能的方法和技术,如负载均衡、带宽控制和流量优化等。
通过优化网络性能,我们可以提高数据传输的效率,从而更好地满足用户的需求。
五、云计算云计算是近年来兴起的一种计算模式,它通过网络提供计算资源和服务。
在2011年的复习题中,我们了解了云计算的基本原理和应用场景。
云计算的出现极大地改变了传统的计算方式,为用户提供了更加灵活和高效的计算环境。
六、移动计算随着移动设备的普及,移动计算成为了计算机网络的一个重要分支。
在2011年的复习题中,我们学习了移动计算的基本概念和技术,如移动通信协议、无线网络和移动应用开发等。
移动计算的发展为人们的生活和工作带来了很大的便利。
七、网络管理网络管理是指对计算机网络进行监控、配置和维护的过程。
计算机网络技术期末考试A试卷

佛山职业技术学院《计算机网络技术》期末考试试卷A2011 ~ 2012 学年 第 二 学期(本卷共 6 页,考试时间:100 分钟,考试对象:11电子商务1、2、3、4班)一、单选题(每小题2分,共40分)1.计算机网络是主要的功能在于( D )。
A .扩充存储容量B .提高运算速度C .传输文件D .共享资源 2.区分局域网(LAN )和广域网(WAN )的依据是( D )。
A .网络用户B .传输协议C .联网设备D .联网范围 3.学校的校园网络属于( A )。
A .局域网B .广域网C .城域网D .电话网4.衡量网络上数据传输速率的单位是bps (波特率),其含义是( C )。
A .信号每秒传输多少公里 B .信号每秒传输多少千公里C .每秒传送多少个二进制位D .每秒传送多少个数据5.目前,局域网的传输介质(媒体)主要是同轴电缆,双绞线和( D )。
A .通信卫星B .公共数据网C .电话线D .光纤6.在局域网中以集中方式提供共享资源并对这些资源进行管理的计算机称为( A )。
A .服务器B .主机C .工作站D .终端 7.下列那一种软件不是局域网操作系统软件( D )。
A .Windows NT ServerB .NetwareC .UNIXD .SQL Server 8.用于电子邮件的协议是( D )。
A .IPB .TCPC .SNMPD .SMTP 9.Web 使用( A )进行信息传送。
A .HTTPB .HTMLC .FTPD .TELNET10.地址栏中输入的 中, 是一个( C )。
A .邮箱B .文件C .域名D .国家11.地址“ftp://218.0.0.123”中的“ftp”是指( A )。
A.协议 B.网址C.新闻组 D.邮件信箱12.Internet中URL的含义是( D )。
A.传输控制协议B.Internet 协议C.简单邮件传输协议D.统一资源定位器13.IP地址由一组( C )的二进制数字组成。
计算机网络期末复习题及答案

计算机网络期末复习题及答案计算机网络是现代信息社会中非常重要的一门学科,而期末考试是对学生所学知识的综合考验。
为了帮助大家更好地复习计算机网络课程,下面将为大家提供一些常见的计算机网络期末考试题目及答案,希望能对大家的复习有所帮助。
一、选择题1. OSI参考模型中,负责数据链路层的协议是:A. TCPB. IPC. UDPD. Ethernet答案:D解析:数据链路层负责通过物理介质传输数据帧,Ethernet协议是一种常见的数据链路层协议。
2. 在计算机网络中,IP地址用于唯一标识网络中的主机,其中IPv4地址的长度是:A. 32位B. 64位C. 128位答案:A解析:IPv4地址由32位二进制数表示,共有2^32个不同的IP地址。
3. 以下哪个协议是应用层协议?A. ICMPB. TCPC. UDPD. HTTP答案:D解析:HTTP是一种应用层协议,用于在Web浏览器和Web服务器之间传输超文本。
二、填空题1. 在计算机网络中,以太网使用_________作为物理传输介质。
答案:双绞线解析:以太网常用双绞线作为物理传输介质,如常见的RJ45接口。
2. 在TCP/IP协议中,IP层的主要功能是_________。
答案:路由和寻址解析:IP层负责将数据包从源主机路由到目标主机,并进行寻址。
1. 请简要解释TCP三次握手的过程。
答案:TCP三次握手是建立一个可靠的连接所必需的。
握手的过程如下:(1) 客户端发送一个带有SYN标志的数据包给服务器端,并进入SYN_SENT状态。
(2) 服务器端收到客户端的数据包后,发送一个带有ACK和SYN 标志的数据包给客户端,并进入SYN_RCVD状态。
(3) 客户端收到服务器端的数据包后,发送一个带有ACK标志的数据包给服务器端,建立起连接,并进入ESTABLISHED状态。
至此,TCP三次握手完成,建立了可靠的连接。
2. 简述网络地址转换(NAT)的原理及作用。
2012《计算机网络》复习资料

《计算机网络基础》复习资料一、选择题(共20小题,每小题1分,共20分)1、一般覆盖某个企业或校园的计算机网络属于(A )。
A、LANB、MANC、WAND、FDDI2、一座大楼内的一个计算机网络系统,属于(B)A、VPNB、LANC、MAND、WAN3、(C)不属于计算机网络的功能(目标)。
A、资源共享B、提高可靠性C、提高CPU运算速度D、提高工作效率4、计算机网络是按一定方式进行通信并实现( B) 的系统。
A、信息传输B、资源共享C、软件共用D、硬件共用5、若网络形状是由站点和连接站点的链路组成的一个闭合环,则称这种拓扑结构为(C )A、星形拓扑B、总线拓扑C、环形拓扑D、树形拓扑6、在计算机网络中,所有的计算机均连接到一条通信传输线路上,在线路两端连有防止信号反射的装置。
这种连接结构被称为( A )。
A、总线结构B、环型结构C、星型结构D、网状结构7、世界上很多国家都相继组建了自己国家的公用数据网,现有的公用数据网大多采用( A )A、分组交换方式B、报文交换方式C、电路交换方式D、空分交换方式8、现代电话采用( D ) 通信方式。
A、单向通信B、半双工C、单工D、全双工9、构成星型环拓扑的主要设备是(C )。
A、传输介质B、通信适配器C、集线器D、各个站点10、一台计算机与一个局域网连接,需要用到( D )。
A、网间互连设备B、广域网技术C、通信介质D、网卡11、下列陈述中,不正确的是(D)。
A、数字通信系统比模拟通信系统的抗干扰性更好B、数字通信系统比模拟通信系统更便于集成化C、数字通信系统比模拟通信系统更便于微形化D、数字通信系统比模拟通信系统的信道利用率更高12、用数字信道传输数字信号需要进行( B ) 处理。
A、调制B、编码C、解调D、变换13、网络协议主要要素为(C)A、数据格式、编码、信号电平B、数据格式、控制信息、速度匹配C、语法、语义、同步D、编码、控制信息、同步14、下面( A )不是网络协议的要素。
计算机网络期末考试-试卷(A卷)

计算机⽹络期末考试-试卷(A卷)第1页共3页上海海事⼤学试卷 2011 — 2012 学年第⼆学期期末考试《计算机⽹络》(A 卷)⼀、选择题(每题2分,共15题,共30分)请将答案写在题⽬后⾯的括号内。
1. 全双⼯以太⽹传输技术的特点是()。
A. 能同时发送和接收帧,不受CSMA/CD 限制B. 能同时发送和接收帧,受CSMA/CD 限制,各点间会产⽣发送冲突C. 不能同时发送和接收帧,不受CSMA/CD 限制D. 不能同时发送和接收帧,受CSMA/CD 限制,各点间会产⽣发送冲突2. 数据被封装成帧是在OSI 协议中的()。
A. 物理层B. 数据链路层C. ⽹络层D. 传输层3. 下列不属于路由选择协议的是()A. RIPB. ICMPC. BGPD. OSPF4. 下列关于TCP/IP 与OSI 模型关系的论述,正确的是()A. TCP/IP 应⽤层汇集了OSI 模型中的会话层,表⽰层和应⽤层B. TCP/IP ⽹络接⼝层对应OSI 模型中的⽹络层C. TCP/IP ⽹络接⼝层对应OSI 模型中的物理层D. TCP/IP 的传输层包含OSI 模型中的传输层和数据链路层5. 下列关于UDP 的陈述中,正确的是()A. UDP 使⽤TCP 传输协议B. 给出数据的按序投递C. 不允许多路复⽤D. 是⾯向⾮连接的6. TCP 的协议数据单元被称为()A. ⽐特B. 帧C. 报⽂段D. 字符7. 下列说法错误的是()A. IP 层可以屏蔽各个物理⽹络的差异B. IP 层可以代替各个物理⽹络的数据链路层⼯作C. IP 层可以隐藏各个物理⽹络的实现细节D. IP 层可以为⽤户提供通⽤的服务8. 在OSI 层次体系结构中,实际的通信是在()实体间进⾏的。
A. 物理层B. 数据链路层C. ⽹络层D. 传输层9. 在10Mbps 的以太⽹中,⼀个以太⽹帧的最⼩和最⼤尺⼨是()A. 46和64字节B. 64 和1518字节C. 46和1500字节D. 46 和128字节10. 以下为源和⽬标主机的不同IP 地址组合,其中组合可以不经过路由直接寻址()--------------------------------------------------------------------------------------装订线------------------------------------------------------------------------------------A. 125. 2. 5. 3/24和136. 2. 2. 3/24B. 125. 2. 5. 3/16和125. 2. 2. 3/16C. 126. 2. 5. 3/16和136. 2. 2. 3/21D. 125. 2. 5. 3/24和136. 2. 2. 3/2411. 流量控制是为了处理()A. 位错B. 发送⽅缓冲区溢出C. 接收⽅缓冲区溢出D. 接收⽅与发送⽅之间冲突12.滑动窗⼝流量控制(窗⼝⼤⼩为8),ACK3意味着接收⽅期待的下⼀帧的编号是()A. 2B. 3C. 4D. 813. 域名服务DNS的主要功能为()A. 通过查询获得域名和IP的对应信息B. 查询主机的MAC地址C. 查询主机的计算机名D. 合理分配IP地址的使⽤。
杭州电子科技大学2011-2012年度计算机网络期末考试试卷1

杭州电子科技大学2011-2012年度计算机网络期末考试试卷1杭州电子科技大学2011-2012学年下学期计算机网络科目期末考试一、单选题(25小题,每题2分)1.以下选项中,是TCP/IP体系中运输层最重要的协议之一的是( ). UDP B. FTP C. DNS D. PPP答案:A出处:P180第一段2.以下选项中,不是数据链路层协议的基本问题的是( ).A. 封装成帧B. 透明传输C. 差错检测D. 不透明传输答案:D出处:P653.应用层向( )提供服务.A. 传输层B. 网络层C. 数据链路层D. 用户答案:D4.在无连接系统中,下列哪项陈述是正确的?( )A. 发送数据包之前联系目的设备B. 发送数据包之前不联系目的设备C. 目的设备向源设备发送确认,表示已经收到数据包D. 目的设备向源设备发送确认,请求发送下一个数据包答案:B5.从运输层的角度看,通信的真正端点是( ).A. 主机B. 进程C. 程序D. 路由器答案:B出处:P181第一段黑体字部分6.网络中用集线器或交换机连接各个计算机的这种结构属于( )A. 总线结构B. 环形结构C. 星型结构D. 网状结构答案:C出处:P767.以下对域名描述不正确的是( ).A.“.com”指商业机构B.“.net”指网络服务机构C.“.mil”指政府部门D.“.edu”指教育及研究机构答案:C8.请参见图示,如果使用图示中的网络,下列哪一项将成为192.133.219.0 网络中主机A 的默认网关地址( ).A. 192.135.250.1B. 192.31.7.1C. 192.133.219.0D. 192.133.219.1答案:D9.以下选项中,( )是运输层的重要功能之一.A. 传输数据B. 提供信道C. 复用和分用D. 交付管理答案:C出处:课本第181页第一段黑体字部分10.将传输的数据划分为帧在ISO/RM的哪一层处理( ).A. 物理层B. 传输层C. 数据链路层D. 应用层答案:C出处:P6411.FTP客户和服务器间传递FTP命令时,使用的连接是( ).A. 建立在TCP之上的控制连接B. 建立在TCP之上的数据连接C. 建立在UDP之上的控制连接D. 建立在UDP之上的数据连接答案:A12.以下哪一项是路由表条目的组成部分( )A. 路由器接口的MAC 地址B. 第4层目的端口号C. 目的主机地址D. 下一跳地址答案:D13.在运输层中,在协议栈层间的抽象的协议端口是( ).A. 主机端口B. 路由器端口C. 服务器端口D.软件端口答案:D出处:课本第183页第6段黑体字部分14.在OSI/RM传输层的基本协议有( ).A. ISO 8072和IEEE 802.3B. IEEE 802.3和IEEE 802.4C. ISO 8072和ISO 8073D. ISO 8073和CCITTX.25 答案:A出处:P10115.对于电子邮件,现在广泛采用的协议标准有三种,下列( )不在这三种协议之列.A. SMTPB. POP3C. IMAPD. IPv6答案:D16.下列哪项陈述描述了默认路由的作用( ).A.主机使用默认路由将数据传输到位于同一个网段中的其它主机B. 主机使用默认路由将数据转发到本地交换机,它充当前往所有目的设备的下一跳C. 主机使用默认路由确定本地网络中终端设备的第2 层地址D. 不存在通往目的主机的其它路由时,主机使用默认路由将数据传输到本地网络外的主机答案:D17.UDP协议支持( )的交互通信.A. 一对一B. 一对多C. 多对多D.以上都对答案:D出处:课本第185页第2段18.以太网最小帧长为( ).A. 16KBB. 32KBC. 64KBD. 128KB答案:C出处:P8319.IP 数据包的哪个字段用于防止无限循环( ).A. 服务类型B. 标识C. 标志D. 生存时间答案:D20.路由器使用网络层地址的哪个部分转发数据包( ).A. 主机部分B. 广播地址C. 网络部分D. 网关地址答案:C21.网络利用率是全网络的信道利用率的( ).A 平方B 二分之一C 加权平均值D 三次方答案:C22.下列语句中哪个是正确的( ).A. 电话是一种半双工通信B. 码元的传输速率是有上限的,但传输速率超过此上限时对信道传输影响不大C. 信息的极限传输速率与信道中的信噪比成正比D. 基本的带通调制方法有:调频、调幅、调相答案:D23.对于带宽为3KKz的无噪声信道,假设信道中每个码元信号的可能状态数为16,则该信道所能支持的最大数据传输率可达( ).A. 24kbpsB. 48kbpsC.12kbps A. 72kbps答案:A24.当你感觉到你的Win7运行速度明显减慢,当你打开任务管理器后发现CPU的使用率达到了100%,你最有可能受到了以下哪一种攻击( ).A. 特洛伊木马B. 拒接服务C. 更改报文流D. 流量分析答案: B25.假设使用一种加密算法,他的加密方法很简单:将每一个字母加5,即a加密成f。
计算机网络与技术

********学校2011--2012第二学期<计算机网络与技术>期末考试卷班级:考号:姓名:分数:命题人:*** 审题人:***考试说明:1、本试卷共4页,三大题。
2、一律用蓝或黑色钢笔或圆珠笔答题。
3、本试卷满分100分,时间100分钟。
一、选择题(40分)1、计算机网络是计算机技术与相结合的产物。
A、电话B、线路C、各种协议D、通信技术2、以下哪个参数代表了硬件防火墙接口最高的安全级别。
A、security 0B、security 100C、security AD、security Z3、以下不是计算机网络的主要功能。
A、文件加密B、资源共享, 数据通信C、提高系统的可靠性D、分布式网络处理和负载均衡数据通4、1000Base-T采用的传输介质是.A、双绞线B、光纤C、无线电波D、同轴电缆5、在传输介质中,抗干扰能力最强的是.A、微波B、光纤C、双绞线D、同轴电缆6、不是性能管理的方面。
A、网络连接链路的带宽使用情况B、网络设备端口通信情况C、网络连接设备和服务器的CPU利用率D、网络设备和服务器的配置情况7、以下网络地址中属于私网地址的是.A、192.168.32.0B、128、168、32、0C、172、15、32、0D、192、178、32、08、在Windows操作环境中,采用命令来查看本机IP地址及网卡MAC地址.A、pingB、tracertC、ipconfigD、mslookup9、下列MAC地址表示中,正确的是.A、00-60-08-A6B、202、6、2、10C、001D、00-60-08-A6-38-F510、MAC地址通常存储在计算机的.A、内存中B、网卡上C、硬盘上D高速缓区11、以下不是网络布线的基本工具。
A、测线器B、打线刀C、交换机D、剪线钳12、以下命令用于测试网络连通。
A、telnetB、nslookupC、pingD、ftp13、计算机接入网络的接口设备是.A、网卡B、交换机C、网关D、路由器14、可以更有效的利用杀毒软件杀毒。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
PART Ⅰ: Single Choice1. The primary function of the address resolution protocol (ARP) that resides in Internet hosts and routers is:A. To provide LAN router functionsB. To translate between LAN addresses and physical interface addressesC. To translate between IP addresses and LAN addressesD. To calculate the shortest path between two nodes on a LAN2. Queuing can NOT occur inA. the router output portsB. the router input portsC. physical mediumD. an interconnection network3.The host component of a CIDR address of the form a.b.c.d/22 can containaddresses for:A. 2(32-22) hosts minus “special” hostsB. 512 hosts minus “special” hostsC. d times 22 hostsD. 10 hosts minus “special” hosts4. The length of an Ethernet address isA. 4 bytesB. 6 bytesC. 14 bytesD. 20 bytes5. Host A sends a TCP segment (Seq = 43, ACK = 103) to host B, and then hostB replies with a TCP segment (Seq = 103, ACK = 57). The payload of the firstTCP segment isA. 14 bytes longB. 43 bytes longC. 57 bytes longD. 60 bytes long6. Longest prefix matching is usedA. in routers to know on which link can forward packetsB. in classless addressing to use the address space more efficiently than inclassful addressing.C. by NAT to increase the available address spaceD. to assign subnet masks.7. Using module 2 arithmetic to compute the CRC code for message101101110011 with the generator 10011, the result isA.01011 B.0011C.10011 D.11108.Which windows command usually can be used to show the intermediate routersalong the path to a remote destination?A. pingB. showrouteC. nbtstatD. tracert9. Which character is NOT distance-vector algorithm’s characters?A. iterativeB. globalC. asynchronousD. distributed10. Which of the following media does not suffer from electromagneticinterference?A. Copper wireB. Glass fiberC. RadioD. Microwave11. When a destination host transport layer receives data from the network layer,it unambiguously identifies the appropriate process to pass the data to by using a triplet consisting of:A. Source port #, destination IP address, and source IP addressB. Destination port #, source port #, process ID#C. Destination port #, source port #, destination IP addressD. Destination port #, source port #, source IP address12. The FTP protocol runs over ____ and uses port ____.A. TCP 21B. TCP 80C. UDP 20D. TCP 11013. ____ broadband technology uses multiple frequencies to achieve higherthroughput.A. TDMB. FDMC. STDMD. B and C14. Which of the following is the service that the transport layer does not providefor theapplication layer?A. In-order delivery of data segments between processesB. Best effort delivery of data segments between communicating hostsC. Multiplexing and demultiplexing of transport layer segmentsD.Congestion control15. Processes on two different end systems communicate with each other by exchanging ( ) across the computer network.A. packetsB. datagramC. framesD. messages16. Which kind of media is not a guided media? ()A twisted-pair copper wireB a coaxial cableC fiber opticsD digital satellite channel17. The units of data exchanged by a link-layer protocol are called().A FramesB SegmentsC DatagramsD bit streams18. ( )makes sure that neither side of a connection overwhelms the other side bysending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure19. The Internet’s network layer is responsible for moving network-layer packetsknown as ( ) from one host to another.A frameB datagramC segmentD message20.In the following options, which service does not be provided to an application by TCP?( )A reliable transportB flow controlC video conferencingD congestion control21. In the following options, which does not use UDP?( )A Internet phoneB video conferencingC streaming multimediaD telnet22. The time required to propagate from the beginning of the link to the nextrouter is ( ).A queuing delayB processing delayC propagation delayD transmission delay23. Which command can be used to show the intermediate routers along thepath to a remote destination? ( )A. pingB. showrouteC. tracertD. ls24. The FTP protocol runs over ____ and uses port ____. ( )A.UDP 21B.UDP 20C.TCP21D. TCP 2525. When a destination host transport layer receives data from the network layer,it unambiguously identifies the appropriate process to pass the data to by using a triplet consisting of ( )A. Source port #, destination IP address, and source IP addressB. Destination port #, source port #, process ID#C. Destination port #, source port #, source IP addressD. Destination port #, source port #, destination IP address26. From the list below, select the items found in the TCP segment structure thatare not found in the UDP segment structure ( )A. Application Generated DataB. Sequence #C. Source Port #D. DestinationPort #27. Which of the following media does not suffer from electromagneticinterference? ( )A. Copper wireB. Glass fiberC. RadioD. Microwave28. A socket is the interface between ( ) within a host.A the network layer and the link layerB the link layer and the physical layerC the application layer and the transport layerD the transport layer and the network layer29. Suppose a web page consists of a base HTML file, 5 JEPG images and a javaapplet, and also suppose HTTP uses persistent connection without pipelining, the total response time is ( ).A 2RTTB 8RTTC 12 RTTD 14RTT30. The time it takes for a small packet to travel from client to server and thenback to the client is ( )A round-travel timeB next-hop timeC round-trip timeD prefix-matching time31. A network entity that satisfies HTTP requests on the behalf of an origin webserver is ( ).A server farmB server stackC proxy serverD edge server32. What is the length of a TCP header? ( )A. 4 bytesB. 6 bytesC. 14 bytesD. 20 bytes33. Which of the following services does not the transport layer provide for theapplication layer?( )A. In-order delivery of data segments between processesB. Best effort delivery of data segments between communicating hostsC. Multiplexing and demultiplexing of transport layer segmentsD. Congestion control34. If the status code in HTTP response message is 404, it means ( )A Request succeeded.B The requested document doesn’t exit on this server.C This is a generic error code indicating that the request could not beunderstood by the server.D Requested object has been permanently mover.35. In the following protocol, which one is stateless? ( )A HTTPB SMTPC FTPD IMAP36. In the four following options, which application is organized as hybrid of C/Sand P2P architecture? ( )A E-mailB QQC File transferD Web application37. A process sends messages into, and receives messages from, the networkthrough its ( ).A socketB programC clientD peer38. In the header lines of HTTP request message, if the field of Connection isclose, it specifies ( ).A the host on which object residesB what type of the user agentC that the browser wants the server to close the connection after sending therequested objectD which language can the browser receive39. In the following four options, which one is not the part of cookie technology?( )A Cookie header lines in the HTTP response message and request message.B One cookie header file kept on the user’s end system and managed by theuser’s browser.C A network entity that satisfies HTTP requests on the behalf of an origin Webserver.D A back-end database at the Web site40. Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet答案PART Ⅱ: True / FalseInstructions: Mark the symbol “T” if the statement is correct,and “F” if the statement is incorrect.1. The job of delivering the data in a transport-layer segment to the correctsocket is called multiplexing.2. Before sending a packet into a datagram network, the source must determineall of the links that packet will traverse between source and destination.3. A web cache is both a client and a server at the same time.yer four of the Internet protocol stackis implemented in the end systems butnot in the routers in the network core.5. The main task of the Internet’s Domain Name System (DNS) is toTranslatehost names to IP addresses.6. Protocols define format,order of messages sent and received among networkentities, and actions taken on message transmission,receipt.7. Consider a computer network consisting of several interconnected 10BaseThubs, but it does not include any bridge or router. Then this network has only one collision domain.8. Routing is the method of moving packets from router’s input ports toappropriate router’s output ports.9. Queuing can occur at both the input ports and the output ports of a router.Queuing occurs at the output port when the arriving rate of packets to the outgoing link exceeds the link capacity. Queue occurs at an input port when the arriving rate of packets exceeds the switch capacity.10. The length of IPV6 address is 32 bits.答案PART Ⅲ: Answer the questionsbriefly.1.Explain the difference betweenTCP service and UDP service.(5 pts)2. Ethernet follows a CSMA/CD protocol scheme. Explain how this scheme works.(5 pts)3. LAN is created by a switch and several PCs as shown in the figure below. Theswitch table is also shown as below. Now A will send LAN segment to B and then B will reply to A. Explain how switch and PCs work. (5 pts)4. Explain the difference between go-back-N and selective repeat.(5 pts)5. Briefly explain①the main functions of Hub, switch and router, and②each ofthem stays in which layer of the TCP/IP model.③If all of them have 4 interfaces, please list the number of collision domains and broadcast domains.(8 pts)6.Suppose there is exactly one packet switch between a sending host and a receiving host. The transmission rates between the sending host and the switch and between the switch and the receiving host are R1 and R2, respectively. Assuming that the switch uses store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing delay, propagation delay, and processing delay.)7. Draw the “3-way handshaking” figure, including SYN, ACK flags and seq#,ack#. (6 pts)8. In the figure below, please brieflydescribe how H1 sends packets to H2. (Note:you should describe that ①How H1 knows that H2 is not in the same network,and ②How router R1 check its routing table.) (8 pts)9. Select the best corresponding definition or concepts for the term list below.(8 pts)Term list:1)SYN,ACK ( )2)Repeater ( )3)IETF ( )4)VLSM,CIDR ( )5)Connectionless ( )6)Full-duplex ( )7)UDP ( )8)Optical fiber cabling ( )Definition or concepts list for selected:A. A OSI reference model layer 4 protocolB.One of their primary jobs involves RFCsC.Techniques to efficiently use IP addressesD.This model lacks a setup and tear down phaseE.Something you might find in the 3-way handshakeF.An example of a wire link technologyG.The ability to talk and listen at the same timeH.This device moves bits from one data link network to another withoutinspecting the frame’s contents10.(3points)What is the difference between a host and end system? List the types of end systems. Is a Web Server an end system?11.(3points)Please briefly describe the function of the five layers in TCP/IP architecture (NOTE: include the protocol data unit)12.(3points) Where can queuing occur in a router? Briefly explain the conditions that lead to such queuing.13.(2points) What is the difference between routing and forwarding?答案1.Explain the difference betweenTCP service and UDP service.(5 pts)答:TCP:handshaking: setup (prepare for) data transfer ahead of timeHello, hello back human protocolset up “state” in two communicating hostsTCP - Transmission Control ProtocolInternet’s connection-oriented servicereliable, in-order byte-stream data transferloss: acknowledgements and retransmissionsflow control:sender won’t overwhelm receivercongestion control:senders “slow down sending rate” when network congestedUDP:unreliable data transferno flow controlno congestion control2. Ethernet follows a CSMA/CD protocol scheme. Explain how this scheme works.(5pts)答:CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. This means that when a node wants to transmit data, it (1) senses the carrier until no transmissions are detected, (2) starts transmission, and (3) continues to check for a collision. If a collision happens, the node stops and waits a random period before starting with step (1) again.3. LAN is created by a switch and several PCs as shown in the figure below. Theswitch table is also shown as below. Now A will send LAN segment to B and then B will reply to A. Explain how switch and PCs work.(5 pts)答:(1) Host A sends frame to switch. The switch checks the frame and know the destination MAC address is B.(2) The switch checks the switch table, but can not know the interface of B, so flood.(3) Host B receives the frame and replies to host A.(4) The switch receives the frame from B and records MAC address of B and the interface 2 in the switch table.(5) The switch learns the destination of the frame is A and the interface of MAC address of A through the switch table and then sends the frame to interface 1.4. Explain the difference between go-back-N and selective repeat.(5 pts)答:With go-back-N, whenever a receiver detects a missing or damaged frame k, all frames succeeding k are ignored and the sender is forced to start retransmission at frame k. With selective repeat, it is possible to retransmit only frame k; the receiver buffers successive frames.5.答:HUB功能:对信号放大、整形、扩大网络的覆盖范围;工作在物理层。