计算机网络第七章作业
计算机网络(第二版)课后习题答案第七章

计算机网络参考答案第七章(高教第二版冯博琴)2. 既然中继器可以进行对信号进行放大、整形,使信号能够传输到更远的距离,为什么不能使用任意多个中继器使网络的范围无限地扩展?答:这是因为使用中继器扩展网络必须遵守MAC介质控制方法的定时特性,以太网的冲突检测机制限制了网络电缆总长度。
4. 广播域和冲突域有什么区别?网络中的广播信息太多时能使整个网络性能急剧恶化,这种现象称为________。
答:这种现象称为“广播风暴”。
6. 用网桥/交换机实现网络分段与用路由器实现网络分段,本质上的区别是什么?答:本质区别在于用网桥/交换机实现网络分段不能隔离广播域,无法抑制广播分组的泛滥;而用路由器实现网络分段可以隔离广播域,所以能够抑制广播分组的泛滥。
8. 用透明网桥连接网络A和网络B。
当网桥刚打开电源时,如果收到了网络A中某站点发往网络B中某站点的帧,网桥将用什么方法转发该帧?为什么?答:因为网桥刚打开电源时,其内部的地址数据库是空的,所以它找不到与接收帧的目的MAC地址相同的表项。
根据透明网桥的工作原理,它将使用泛洪法把该帧转发到除接收端口外的所有其他端口。
10. 交换机能在两个不同速率的端口之间使用直通方式来转发帧吗?为什么?答:不能。
在直通方式下,交换机只要收到一帧最前面的目的地址就立即开始执行转发操作,而不进行帧的缓冲,因此收发端口的速率应完全相同。
12. 试比较交换机的存储转发方式和直通转发方式的优缺点。
答:优缺点如下:存储转发方式:1)转发前要对帧进行错误校验,因此出错的帧不会被转发,使带宽不会被浪费。
2)具有帧缓冲能力,因此允许在不同速率的端口之间进行转发操作。
3)帧完整地接收后才开始执行转发操作,因此传输延迟较大,并且随转发帧的长短而有所不同。
4)交换机内的端口缓冲区的大小是有限的,当负载较重时,帧会被丢弃。
即负载较重时,其性能会下降。
直通转发方式:1)转发前不进行错误校验,因此出错的帧也被转发,造成了带宽的浪费。
计算机网络7、8章课后答案

计算机网络7、8章课后答案第七章一、填空题:1、Internet包含传输主干网、城域网和接入网三部分。
2、决定访问Internet上资源的“实际速度”的主要因素有三个,即传输主干网、城域网和接入网。
3、“三网合一”就是将计算机网、有线电视网和电信网有机融合起来。
4、Internet接入方式是指用户采用什么设备、通过何种接入网络接入Internet。
5、常用的接入方式有四种:拨号接入、ADSL接入、专线接入和以太网接入。
6、ADSL有两种基本的接入方式:专线方式和虚拟拨号方式。
7、常用的无线上网的方式有:无线局域网上网、“中国移动”GPRS方式、“中国联通”CDMA方式。
8、社区宽带接入网主要采用三种接入技术:一是普通电话线的非对称数字用户环路技术(ADSL);二是基于光纤接入网的以太网(FTTB+LAN)技术;三是有线电视的Cable Modem技术。
二、回答题:1、简述什么是“最后的一公里”问题。
“最后的一公里”问题指的是从市区Internet结点到单位、小区、直至到每个家庭用户的终端接入问题,这是接入网要解决的问题。
2、简述什么是“三网合一”。
“三网合一”就是将计算机网、有线电视网和电信网(数据通信网)有机融合起来。
实现途径是数字、语音和多媒体信号走同一网络;其目标是以一个统一的宽带多媒体平台,最大限度地承载现有和将来可能有的业务;其主要目的是充分利用现有资源,避免重复投资。
3、在选择连接方式时需要考虑哪些因素?作为一个用户,在于Internet连接时,究竟应采用何种方式,这是用户十分关心的问题。
总的来说,在选择连接方式时要考虑以下因素:(1)单机还是多机;(2)公用数据通信网或计算机网络的选择;(3)ISP的选择。
4、简述ISDN拨号上网与Modem拨号上网的优缺点。
你会如何选择拨号上网方式?请说出你选择的理由。
Modem拨号上网的最高速率为56Kbps,而ISDN拨号上网的最高速率为128Kbps。
大学计算机第七章练习题

单项选择题:1.下列对网络硬件描述不正确的是()。
A、按网络服务器的资源类型可分为设备服务器、管理服务器、应用程序服务器等B、网络用户端设备可以是简单的输入输出设备、也可以是PC或其他智能终端C、网络传输介质分为有线介质和无线介质两类,无线介质包括双绞线、同轴电缆和光缆D、网络互联设备,它通常指集线器(Hu、网桥、交换机、路由器和网关等设备参考答案:C2.OSI参考模型的物理层传送数据的单位是()A、包B、比特C、帧D、分组参考答案:B3.下列有关IP地址和域名的说法中正确的是()。
A、IP地址分为A、B、C三类B、IP地址必须和域名一一对应C、一个IP地址必须对应一个域名D、一个域名必须对应一个IP地址参考答案:D4.下列四项中,不合法的IP地址是()。
A、100.0.0.10B、128.99.128.99C、150.46.254.1D、201.11.31.256参考答案:D5.以下哪个主机地址代表了主机在地理位置上是属于中国的()。
A、www.Microsoft.auB、C、D、参考答案:D6.下列电子邮件格式正确的是()。
A、B、C、WPK008@D、WPK007#参考答案:C7.下列有关Internet中主机域名与主机IP地址的说法,不正确的是()。
A、用户可以用主机的域名或主机的IP地址与该主机联系B、主机的域名和主机IP地址的分配不是任意的C、主机的域名在命名时是遵循一定规则的D、用户可以根据自己的情况任意规定主机的域名或IP地址参考答案:D8.目前常见的10/100M自适应网卡的接口为()。
A、RJ-45B、RJ-11C、AUID、BNC9.在Outlook Express窗口中,新邮件的“抄送”文本框输入的多个电子信箱的地址之间,应用()作分隔。
A、逗号(,)B、空格C、冒号(:)D、减号(-)参考答案:A10.下列设备中,()能够为计算机提供固定的网络地址。
A、网桥B、网卡C、路由器D、集线器参考答案:B11.通常所说的ADSL指的是()。
第七章__Internet基础及应用测试题

Internet基础知识测试题选择题1.目前世界上最大的计算机网络是。
A)Intranet B)Internet C)Extranet D)Ethernet2.个人用户接入Internet要首先连接到。
A)ICP B)TCP C)ISP D)P2P3.Internet的前身是。
A)ARPANET B)NSFNET C)CERNET D)INTRANET4.以下对IP地址的说法不正确的是。
A)IP地址的主要功能是为了相互区分 B)Internet中计算机的IP地址不可以重复C)IP地址是可以自己任意指定 D)IP地址采用了二进制5.Internet上使用的客户机/服务器(Client/Server)模式中,是提出服务请求的主机,而是提供服务的主机。
A)PC机/小型机 B)用户机/客户机 C)客户机/服务器 D)小型机/服务器6.下列说法不正确的是。
A)IP协议只负责数据的传输,它尽可能传输更多的数据包B)TCP协议负责数据在主机之间正确可靠的传输C)TCP/IP协议所采用的通信方式是分组交换D)多台计算机设置同一个IP地址连接到Internet7.在IPv6协议中,IP地址由位二进制数组成。
A)32 B)210 C)64 D)1288.下面的IP地址中属于C类地址的是。
A)61.6.151.11 B)128.67.205.71 C)202.203.208.35 D)255.255.255.1929.Internet中的主机之间进行通信时,利用子网掩码和IP地址进行运算就可以得到主机的网络地址。
A)与 B)或 C)非 D)加10.Internet上计算机的域名由多个域构成,域间用分隔。
A)冒号 B)逗号 C)空格 D)句点11.下面关于域名的说法正确的是。
A)域名是计算机所在的行政区域名 B)使用域名的原因是访问时速度更快C)域名中最左边的部分是顶级域名 D)域名具有惟一性12.Internet域名地址中的net代表。
计算机网络谢希仁第七版课后答案完整版

计算机网络谢希仁第七版课后答案完整版1. 概述计算机网络是当今社会发展不可或缺的一部分,它负责连接世界各地的计算机和设备,提供信息交流和资源共享的便利。
而谢希仁的《计算机网络》第七版是一本经典的教材,旨在帮助读者深入了解计算机网络的原理、技术和应用。
本文将提供《计算机网络谢希仁第七版》全部课后答案的完整版本,以便帮助读者更好地掌握该教材的知识点。
2. 第一章:绪论本章主要介绍了计算机网络的基本概念和发展历程。
通过学习本章,读者将了解到计算机网络的定义、功能和分类,以及互联网的起源和发展。
3. 第二章:物理层物理层是计算机网络的基础,它负责传输原始比特流。
本章对物理层的相关内容进行了全面的介绍,包括数据通信基础、传输媒介、信道复用技术等。
4. 第三章:数据链路层数据链路层负责将原始比特流划分为以太网帧等数据包进行传输。
本章详细介绍了数据链路层的各种协议和技术,如以太网、局域网、无线局域网等。
5. 第四章:网络层网络层是计算机网络中最关键的一层,它负责将数据包从源主机传输到目标主机。
本章对网络层的相关内容进行了深入研究,包括互联网协议、路由算法、IP地址等。
6. 第五章:传输层传输层负责提供端到端的可靠数据传输服务。
本章对传输层的相关知识进行了细致的讲解,包括传输层协议的设计原则、TCP协议、UDP协议等。
7. 第六章:应用层应用层是计算机网络中最高层的一层,它负责向用户提供各种网络应用服务。
本章详细介绍了应用层的相关内容,包括HTTP协议、DNS协议、电子邮件等。
8. 第七章:网络安全与管理网络安全和管理是计算机网络中不可忽视的重要方面。
本章对网络安全和管理的相关内容进行了全面的阐述,包括网络安全威胁、防火墙、入侵检测系统等。
9. 第八章:多媒体网络多媒体网络是指能够传输音频、视频等多种媒体数据的计算机网络。
本章介绍了多媒体网络的相关技术和应用,包括流媒体、语音通信、视频会议等。
10. 第九章:计算机网络的高级话题本章涵盖了计算机网络中的一些高级话题,如网络性能评价、网络协议的形式化描述方法、无线和移动网络等。
计算机网络自顶向下方法第七章中文版答案全文优选

WRI 研究生0601最新精选全文完整版(可编辑修改)7复习题流式存储音频/视频: 暂停/恢复, 重新定位, 快进, 实时交互的音频视频: 人们进行实时的通信和响应。
第一阵营:TCP/IP协议中的基本原理没有变化, 按照需求增加带宽, 仍然使用有超高速缓存, 内容分布, 多点覆盖的网络。
1.第二阵营: 提供一个可以使应用在网络中节省带宽的网络服务。
2.第三阵营: 有区别的服务: 提出了在网络边缘的简单分类和维护方案。
并且根据他们在路由队列中的级别给出了不同的数据包和级别。
6.1: 简单, 不需要meta file 和流媒体服务器3. 6.2:允许媒体播放器通过web服务器直接进行交互, 不需要流媒体服务器。
4. 6.3:媒体播放器直接与流媒体服务器进行交互, 以满足一些特殊的流媒体应用。
5.端到端时延是分组从源经过网络到目的地所需要的时间。
分组时延抖动是这个分组与下个分组的端到端时延的波动。
6.在预定的播放时间之后收到的分组不能被播放, 所以, 从应用的观点来看, 这个分组可以认为是丢失了。
7.第一种方案: 在每n个数据块之后发送一个冗余的数据块, 这个冗余的被。
【the redundant chunk is obtained byexclusive OR-ing the n original chunks】8.第二种方案:随起始的数据流发送一个低分辨率, 低比特率的方案, 这种交错不会增加数据流的带宽需求。
不同会话中的RTP流: 不同的多播地址同一会话中不同流: SSRC fieldRTP和RTCP分组通过端口号区别。
9.传达报告分组: 包括分组丢失部分的信息, 最后序列号, 两次到达时间间隔的抖动。
发送报告分组: 大部分目前产生的RTP分组的时间戳和wall clock time , 发送分组的数量, 发送字节的数量, 源描述分组: 发送方的e-mail 地址, 发送方的姓名, 产生RTP流的应用。
《计算机网络》各章习题_判断题_吴功宜

石河子大学 200 至 200 学年第学期XXXX 课程试卷 A/B吴功宜《计算机网络》各章习题第一章:网概一、判断题(10分,每题1分)1.(×)Internet是将无数个微型机通过路由器互联的大型网络。
2.(√)计算机网络与分布式系统的主要区别不是表现在物理结构上,而是表现在高层软件上。
3.(×)宽带城域网主要技术是基于数据传输速率为100Mb/s的Fast Ethernet的。
4.(×)在点对点式网络中,每条物理线路连接一对计算机。
假如两台计算机之间没有直接连接的线路,那么它们之间的分组传输就需要通过广播方式传输。
5.(√)由于要进行大型科学计算、信息处理、多媒体数据服务与视频服务,它需要数据通信网能提供很高的带宽。
第二章:网络体系结构与网络协议1.(×)网络协议的三要素是语义、语法与层次结构。
2.(×)如果一台计算机可以和其他地理位置的另一台计算机进行通信,那么这台计算机就是一个遵循OSI标准的开放系统。
3.(×)传输控制协议TCP属于传输层协议,而用户数据报协议UDP属于网络层协议。
4.(×)ISO划分网络层次的基本原则是:不同的结点都有相同的层次;不同结点的相同层次可以有不同的功能。
5.(×)在TCP/IP协议中,TCP提供可靠的面向连接服务,UDP提供简单的无连接服务,而电子邮件、文件传送、域名系统等应用层服务是分别建立在TCP协议、UDP协议、TCP和UDP协议之上的。
第三章:物理层1.(×)在数据传输中,多模光纤的性能要优于单模光纤。
2.(×)在脉冲编码调制方法中,第一步要做的是对模拟信号进行量化。
3.(√)时分多路复用则是以信道传输时间作为分割对象,通过为多个信道分配互不重叠的时间片的方法来实现多路复用。
4.(×)在线路交换、数据报与虚电路方式中,都要经过线路建立、数据传输与线路释放这3个过程。
计算机网络自顶向下 第七版 第七章答案

Computer Networking: A Top-Down Approach,7th Edition计算机网络自顶向下第七版Solutions to Review Questions and ProblemsChapter 7 Review Questions1.In infrastructure mode of operation, each wireless host is connected to the largernetwork via a base station (access point). If not operating in infrastructure mode, a network operates in ad-hoc mode. In ad-hoc mode, wireless hosts have noinfrastructure with which to connect. In the absence of such infrastructure, the hosts themselves must provide for services such as routing, address assignment, DNS-like name translation, and more.2.a) Single hop, infrastructure-basedb) Single hop, infrastructure-lessc) Multi-hop, infrastructure-basedd) Multi-hop, infrastructure-less3.Path loss is due to the attenuation of the electromagnetic signal when it travelsthrough matter. Multipath propagation results in blurring of the received signal at the receiver and occurs when portions of the electromagnetic wave reflect off objects and ground, taking paths of different lengths between a sender and receiver. Interference from other sources occurs when the other source is also transmitting in the samefrequency range as the wireless network.4.a) Increasing the transmission powerb) Reducing the transmission rate5.APs transmit beacon frames. An AP’s beacon frames will be transmitted over one ofthe 11 channels. The beacon frames permit nearby wireless stations to discover and identify the AP.6.False7.APs transmit beacon frames. An AP’s beacon frames will be transmitted over one ofthe 11 channels. The beacon frames permit nearby wireless stations to discover and identify the AP.8.False9.Each wireless station can set an RTS threshold such that the RTS/CTS sequence isused only when the data frame to be transmitted is longer than the threshold. This ensures that RTS/CTS mechanism is used only for large frames.10.No, there wouldn’t be any advantage. Suppose there are two stations that want totransmit at the same time, and they both use RTS/CTS. If the RTS frame is as long asa DATA frames, the channel would be wasted for as long as it would have beenwasted for two colliding DATA frames. Thus, the RTS/CTS exchange is only useful when the RTS/CTS frames are significantly smaller than the DATA frames.11.Initially the switch has an entry in its forwarding table which associates the wirelessstation with the earlier AP. When the wireless station associates with the new AP, the new AP creates a frame with the wireless station’s MAC address and broadcasts the frame. The frame is received by the switch. This forces the switch to update itsforwarding table, so that frames destined to the wireless station are sent via the new AP.12.Any ordinary Bluetooth node can be a master node whereas access points in 802.11networks are special devices (normal wireless devices like laptops cannot be used as access points).13.False14.“Opportunistic Scheduling” refers to matching the physical layer protocol to channelconditions between the sender and the receiver, and choosing the receivers to which packets will be sent based on channel condition. This allows the base station to make best use of the wireless medium.15.UMTS to GSM and CDMA-2000 to IS-95.16.The data plane role of eNodeB is to forward datagram between UE (over the LTEradio access network) and the P-GW. Its control plane role is to handle registration and mobility signaling traffic on behalf of the UE.The mobility management entity (MME) performs connection and mobility management on behalf of the UEs resident in the cell it controls. It receives UE subscription information from the HHS.The Packet Data Network Gateway (P-GW) allocates IP addresses to the UEs and performs QoS enforcement. As a tunnel endpoint it also performs datagram encapsulation/decapsulation when forwarding a datagram to/from a UE.The Serving Gateway (S-GW) is the data-plane mobility anchor point as all UE traffic will pass through the S-GW. The S-GW also performs charging/billing functions and lawful traffic interception.17.In 3G architecture, there are separate network components and paths for voice anddata, i.e., voice goes through public telephone network, whereas data goes through public Internet. 4G architecture is a unified, all-IP network architecture, i.e., both voice and data are carried in IP datagrams to/from the wireless device to severalgateways and then to the rest of the Internet.The 4G network architecture clearly separates data and control plane, which is different from the 3G architecture.The 4G architecture has an enhanced radio access network (E-UTRAN) that is different from 3G’s radio access network UTRAN.18.No. A node can remain connected to the same access point throughout its connectionto the Internet (hence, not be mobile). A mobile node is the one that changes its point of attachment into the network over time. Since the user is always accessing theInternet through the same access point, she is not mobile.19.A permanent address for a mobile node is its IP address when it is at its homenetwork. A care-of-address is the one its gets when it is visiting a foreign network.The COA is assigned by the foreign agent (which can be the edge router in theforeign network or the mobile node itself).20.False21.The home network in GSM maintains a database called the home location register(HLR), which contains the permanent cell phone number and subscriber profileinformation about each of its subscribers. The HLR also contains information about the current locations of these subscribers. The visited network maintains a database known as the visitor location register (VLR) that contains an entry for each mobile user that is currently in the portion of the network served by the VLR. VLR entries thus come and go as mobile users enter and leave the network.The edge router in home network in mobile IP is similar to the HLR in GSM and the edge router in foreign network is similar to the VLR in GSM.22.Anchor MSC is the MSC visited by the mobile when a call first begins; anchor MSCthus remains unchanged during the call. Throughout the call’s duration and regardless of the number of inter-MSC transfers performed by the mobile, the call is routed from the home MSC to the anchor MSC, and then from the anchor MSC to the visitedMSC where the mobile is currently located.23.a) Local recoveryb) TCP sender awareness of wireless linksc) Split-connection approachesChapter 7 ProblemsProblem 1Output corresponding to bit d 1 = [-1,1,-1,1,-1,1,-1,1]Output corresponding to bit d 0 = [1,-1,1,-1,1,-1,1,-1]Problem 2Sender 2 output = [1,-1,1,1,1,-1,1,1]; [ 1,-1,1,1,1,-1,1,1]Problem 3181111)1()1(111111)1()1(1112=⨯+⨯+-⨯-+⨯+⨯+⨯+-⨯-+⨯=d 181111)1()1(111111)1()1(1122=⨯+⨯+-⨯-+⨯+⨯+⨯+-⨯-+⨯=dProblem 4Sender 1: (1, 1, 1, -1, 1, -1, -1, -1)Sender 2: (1, -1, 1, 1, 1, 1, 1, 1)Problem 5a) The two APs will typically have different SSIDs and MAC addresses. A wirelessstation arriving to the café will associate with one of the SSIDs (that is, one of the APs). After association, there is a virtual link between the new station and the AP. Label the APs AP1 and AP2. Suppose the new station associates with AP1. When the new station sends a frame, it will be addressed to AP1. Although AP2 will alsoreceive the frame, it will not process the frame because the frame is not addressed to it. Thus, the two ISPs can work in parallel over the same channel. However, the two ISPs will be sharing the same wireless bandwidth. If wireless stations in different ISPs transmit at the same time, there will be a collision. For 802.11b, the maximum aggregate transmission rate for the two ISPs is 11 Mbps.b) Now if two wireless stations in different ISPs (and hence different channels) transmitat the same time, there will not be a collision. Thus, the maximum aggregatetransmission rate for the two ISPs is 22 Mbps for 802.11b.Problem 6Suppose that wireless station H1 has 1000 long frames to transmit. (H1 may be an AP that is forwarding an MP3 to some other wireless station.) Suppose initially H1 is the onlystation that wants to transmit, but that while half-way through transmitting its first frame, H2 wants to transmit a frame. For simplicity, also suppose every station can hear every other station’s signal (that is, no hidden terminals). Before transmitting, H2 will sense that the channel is busy, and therefore choose a random backoff value.Now suppose that after sending its first frame, H1 returns to step 1; that is, it waits a short period of times (DIFS) and then starts to transmit the second frame. H1’s second frame will then be transmitted while H2 is stuck in backoff, waiting for an idle channel. Thus, H1 should get to transmit all of its 1000 frames before H2 has a chance to access the channel. On the other hand, if H1 goes to step 2 after transmitting a frame, then it too chooses a random backoff value, thereby giving a fair chance to H2. Thus, fairness was the rationale behind this design choice.Problem 7A frame without data is 32 bytes long. Assuming a transmission rate of 11 Mbps, the time to transmit a control frame (such as an RTS frame, a CTS frame, or an ACK frame) is (256 bits)/(11 Mbps) = 23 usec. The time required to transmit the data frame is (8256 bits)/(11 Mbps) = 751DIFS + RTS + SIFS + CTS + SIFS + FRAME + SIFS + ACK= DIFS + 3SIFS + (3*23 + 751) usec = DIFS + 3SIFS + 820 usecProblem 8a) 1 message/ 2 slotsb) 2 messages/slotc) 1 message/slota)i) 1 message/slotii) 2 messages/slotiii) 2 messages/slotb)i) 1 message/4 slotsii) slot 1: Message A→ B, message D→ Cslot 2: Ack B→ Aslot 3: Ack C→ D= 2 messages/ 3 slotsiii)slot 1: Message C→ Dslot 2: Ack D→C, message A→ BRepeatslot 3: Ack B→ A= 2 messages/3 slotsProblem 10a)10 Mbps if it only transmits to node A. This solution is not fair since only A is gettingserved. By “fair” it m eans that each of the four nodes should be allotted equal number of slots.b)For the fairness requirement such that each node receives an equal amount of dataduring each downstream sub-frame, let n1, n2, n3, and n4 respectively represent the number of slots that A, B, C and D get.Now,data transmitted to A in 1 slot = 10t Mbits(assuming the duration of each slot to be t)Hence,Total amount of data transmitted to A (in n1 slots) = 10t n1Similarly total amounts of data transmitted to B, C, and D equal to 5t n2, 2.5t n3, and t n4 respectively.Now, to fulfill the given fairness requirement, we have the following condition:10t n1 = 5t n2 = 2.5t n3 = t n4Hence,n2 = 2 n1n3 = 4 n1n4 = 10 n1Now, the total number of slots is N. Hence,n1+ n2+ n3+ n4 = Ni.e. n1+ 2 n1 + 4 n1 + 10 n1 = Ni.e. n1 = N/17Hence,n2 = 2N/17n3 = 4N/17n4 = 10N/17The average transmission rate is given by:(10t n1+5t n2+ 2.5t n3+t n4)/tN= (10N/17 + 5 * 2N/17 + 2.5 * 4N/17 + 1 * 10N/17)/N= 40/17 = 2.35 Mbpsc)Let node A receives twice as much data as nodes B, C, and D during the sub-frame.Hence,10tn1 = 2 * 5tn2 = 2 * 2.5tn3 = 2 * tn4i.e. n2 = n1n3 = 2n1n4 = 5n1Again,n1 + n2 + n3 + n4 = Ni.e. n 1+ n1 + 2n1 + 5n1 = Ni.e. n1 = N/9Now, average transmission rate is given by:(10t n1+5t n2+ 2.5t n3+t n4)/tN= 25/9 = 2.78 MbpsSimilarly, considering nodes B, C, or D receive twice as much data as any other nodes, different values for the average transmission rate can be calculated.Problem 11a)No. All the routers might not be able to route the datagram immediately. This isbecause the Distance Vector algorithm (as well as the inter-AS routing protocols like BGP) is decentralized and takes some time to terminate. So, during the time when the algorithm is still running as a result of advertisements from the new foreign network, some of the routers may not be able to route datagrams destined to the mobile node.b)Yes. This might happen when one of the nodes has just left a foreign network andjoined a new foreign network. In this situation, the routing entries from the oldforeign network might not have been completely withdrawn when the entries from the new network are being propagated.c)The time it takes for a router to learn a path to the mobile node depends on thenumber of hops between the router and the edge router of the foreign network for the node.Problem 12If the correspondent is mobile, then any datagrams destined to the correspondent would have to pass through the correspondent’s home agent. The foreign agent in the network being visited would also need to be involved, since it is this foreign agent thatnotifies the correspondent’s home agent of the location of the correspondent. Datagrams received by the correspondent’s home agent would need to be encapsulated/tunneled between the correspondent’s home agent and for eign agent, (as in the case of the encapsulated diagram at the top of Figure 6.23.Problem 13Because datagrams must be first forward to the home agent, and from there to the mobile, the delays will generally be longer than via direct routing. Note that it is possible, however, that the direct delay from the correspondent to the mobile (i.e., if the datagram is not routed through the home agent) could actually be smaller than the sum of the delay from thecorrespondent to the home agent and from there to the mobile. It would depend on the delays on these various path segments. Note that indirect routing also adds a home agent processing (e.g., encapsulation) delay.Problem 14First, we note that chaining was discussed at the end of section 6.5. In the case of chaining using indirect routing through a home agent, the following events would happen: •The mobile node arrives at A, A notifies the home agent that the mobile is now visiting A and that datagrams to the mobile should now be forwarded to thespecified care-of-address (COA) in A.•The mobile node moves to B. The foreign agent at B must notify the foreign agent at A that the mobile is no longer resident in A but in fact is resident in Band has the specified COA in B. From then on, the foreign agent in A willforward datagrams it receives that are addressed to the mobile’s COA in A to t he mobile’s COA in B.•The mobile node moves to C. The foreign agent at C must notify the foreign agent at B that the mobile is no longer resident in B but in fact is resident in C and has the specified COA in C. From then on, the foreign agent in B will forwarddatagrams it receives (from the foreign agent in A) that are addressed to themobile’s COA in B to the mobile’s COA in C.Note that when the mobile goes offline (i.e., has no address) or returns to its home network, the datagram-forwarding state maintained by the foreign agents in A, B and C must be removed. This teardown must also be done through signaling messages. Note that the home agent is not aware of the mobile’s mobility beyond A, and that the correspondent is not at all aware of the mobil e’s mobility.In the case that chaining is not used, the following events would happen: •The mobile node arrives at A, A notifies the home agent that the mobile is now visiting A and that datagrams to the mobile should now be forwarded to thespecified care-of-address (COA) in A.•The mobile node moves to B. The foreign agent at B must notify the foreign agent at A and the home agent that the mobile is no longer resident in A but infact is resident in B and has the specified COA in B. The foreign agent in A can remove its state about the mobile, since it is no longer in A. From then on, thehome agent will forward datagrams it receives that are addressed to the mobile’sCOA in B.•The mobile node moves to C. The foreign agent at C must notify the foreign agent at B and the home agent that the mobile is no longer resident in B but in fact is resident in C and has the specified COA in C. The foreign agent in B canremove its state about the mobile, since it is no longer in B. From then on, thehome agent will forward datagrams it receives that are addressed to the mobile’sCOA in C.When the mobile goes offline or returns to its home network, the datagram-forwarding state maintained by the foreign agent in C must be removed. This teardown must also bedone through signaling messages. Note that the home agent is always aware of the mobile’s cu rrent foreign network. However, the correspondent is still blissfully unaware of the mobile’s mobility.Problem 15Two mobiles could certainly have the same care-of-address in the same visited network. Indeed, if the care-of-address is the address of the foreign agent, then this address would be the same. Once the foreign agent decapsulates the tunneled datagram and determines the address of the mobile, then separate addresses would need to be used to send the datagrams separately to their different destinations (mobiles) within the visited network.Problem 16If the MSRN is provided to the HLR, then the value of the MSRN must be updated in the HLR whenever the MSRN changes (e.g., when there is a handoff that requires the MSRN to change). The advantage of having the MSRN in the HLR is that the value can be provided quickly, without querying the VLR. By providing the address of the VLR Rather than the MSRN), there is no need to be refreshing the MSRN in the HLR.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1、简述“端口”的含义及在端到端寻址中的作用。
答:传输层寻址实际上是寻址服务端口,
2、简述TCP连接建立和释放的过程。
答:TCP连接建立三次握手(Three-way Handshake)协议。
其工作过程如下:
1)用户A传送一个TPDU,设置标志位SYN=1和ACK=0,序列号是x,表明这是一个连接请求。
2)用户B回送一个确认该请求及其序列号的TPDU。
它的序列号为y,应答域为x+1.
3)用户A对用户B的确认帧发回一个确认, TPDU中包含序列号x+1和应答域序列y+1。
TCP释放的过程:
1)用户A请求终止连接。
2)用户B确认请求。
3)用户A对用户B的确认帧发回一个确认,并终止连接。
4)用户B收到确认后,也终止连接。
3、为何自动重传请求ARQ(Automatic Repeat reQuest)协议超时重传时间的设定比较复杂?
答:B所发送的对M2的确认丢失了。
A在设定的超时重传时间内没有收到确认,但无法知道是自己发送的分组出错、丢失,或者是B发送的确认丢失了;还有可能由于网络延迟的原因,B对分组M1的确认迟到了,A会收到重复的确认,那么A收下后就丢弃;B也有可能由于网络延迟的原因,收到重复的M1,同样丢弃重复的M1,并重传确认分组。
4、简述ARQ流水线传输的方式。
答:发送方尽量不发送数据含量小的数据段,而是缓存应用层的数据,等到形成一个比较大的数据段再发送;接收方不请求对方发送短数据段,在没有可能进行“捎带”的情况下,接收方延迟发送确认段,并采取累计确认,即一次可以确认多个数据段。
5、结合图7-12,简述如何利用滑动窗口进行流量控制。
答:
前三个段填入缓冲区的速度大于接收端应用程序使用数据的速度,因而,通告的窗口达到零,发送方不能再传送数据。
在接收方应用程序用掉了2000字节的数据之后,接收方TCP发送一个额外的确认,其中的窗口通告为2000字节。
在计算窗口时,要去掉被确认的数据,因而接收方通告它除了已收到的2500字节之外还能接收2000字节,发送方的反应就是再发送两段。
同样接收到每一段时,接收方发送一个确认,其中的窗口被减少1000字节(即,到达的数据量)。
窗口又一次减到零,发送方也就停止传送数据。
最终,接收方应用程序又用掉了一些数据,因而,接收方TCP又传送一个窗口为正的确认。
如果发送方仍有数据等待传送,则可以继续传送了。
6、结合图7-13,简述TCP拥塞控制Reno算法的过程。
答:
图7-13是关于Reno版的TCP的拥塞控制和拥塞窗口的演变,开始阈值设置为16,拥塞窗口在慢启动阶段以指数速率快速爬升,在第5轮传输时达到阈值,然后拥塞窗口以线性速率爬升,直到丢包事件发生。
此时拥塞窗口值为24,于是阈值被重新设置为拥塞窗口值的一半,即12,然后再开始线性增长。
7、为什么许多网络应用利用不可靠的UDP更加合适?UDP伪首部有何作用?
答:许多网络应用利用不可靠的UDP更加合适:应用层能更好地控制要发送的数据和发送时间;无需连接建立;分组首部开销小。
UDP伪首部作用:为了计算检验和而设置的,并不发送。
8、什么样的网络应用适合TCP?举例说明其原因。
答:常用的网络应用e-mail,远程登录,Web和文件传输都使用TCP,这些应用选择TCP主要是因TCP可靠的数据传送服务,保证所有的数据最终被传送到其目的地。
9、简述TCP首部6个标志位的含义。
答:六个标志是:紧急标志、有意义的应答标志、推进标志、重置连接标志、同步序列号标志、完成
发送数据标志。
A.URG紧急指针,当其=1时,表明有效,它告诉系统此报文段中有紧急数据,应尽快传送,而不要按原来的排队顺序来传送。
B.ACK确认序号,当其=1时,表明有效。
C.PSH推送操作,当两个应用程序进行交互式的通信时,有时在一端的应用进程希望在键入一个命令后就立即收到对方的响
应,这时,TCP就可以使用推送操作。
D.RST重建连接,当其=1时,表明TCP连接中出现了严重错误,必须释放连接,然后再重新建立传输连接。
E.SYN同步序号,用来发起一个连接。
F.FIN终止序号,用来释放一个连接。
10.简述TCP提供服务的7个主要特征。
答:TCP提供的服务有七个主要特征:面向连接(Connection Orientation);点对点通信(Point-To-Point Communication);完全可靠性(Complete Reliability);全双工通信(Full Duplex Communication);流接口(Stream Interface);
可靠的连接建立(Reliable Connection Startup);友好的连接终止(Graceful Connection Shutdown)。