计算机网络自顶向下方法答案(英文第六版)
计算机网络教程自顶向下方法选择题及问题详解 Chapt 4 Network Layer-QUIZZ

Chapter 4 Network Layer1.Packetizing at the network layer involvesA) Encapsulating the payload at the sourceB) Adds a header that contains the source and destination informationC) Decapsulating the payload at the destinationD) All of the choices are correct2.Routers in the path are not allowed to ___________________________.A) fragment the packet they receiveB) decapsulate the packetC) change source or destination addressD) All of the choices are correct3.The network layer in the Internet provides _________________.A) comprehensive error and flow control.B) limited error control, but no flow control.C) comprehensive error control but limited flow control.D) All of the choices are correct4.In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct5.In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct6.The performance of a network can be measured in terms of ________.A) delayB) throughputC) packet lossD) all of the choices are correct7.Transmission delay (time) is the ratio of ______________________.A) transmission rate to packet lengthB) transmission rate to distanceC) packet length to transmission rateD) processing time to transmission rate8.Propagation delay (time) is the ratio of ______________________.A) transmission rate to propagation speedB) propagation speed to distanceC) packet length to propagation speedD) distance to propagation speed9.When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.A) increases sharply; its minimumB) increases sharply; its maximumC) decreases sharply; its minimumD) decreases sharply; its maximum10.In open-loop congestion control, policies are applied ____________________.A) to prevent congestion before it happensB) to alleviate congestion after it happensC) to either prevent congestion before it happens or to alleviate congestion after it happensD) None of the choices are correct11.The __________________ technique is one of the open-loop congestion policyA) backpressureB) choke packetC) implicit signalingD) None of the choices are correct12.The __________________ technique is one of the close-loop congestion policyA) acknowledgment policyB) choke packetC) discarding policyD) None of the choices are correct13.IP is a _________ protocol.A) connection-oriented unreliableB) connection-oriented reliableC) connectionless unreliableD) connectionless reliable14.An HLEN value of decimal 10 means _______.A) there are 10 bytes of optionsB) there are 10 bytes in the headerC) there are 40 bytes of optionsD) there are 40 bytes in the header15.If the fragment offset has a value of 100, it means that _______.A) the datagram has not been fragmentedB) the datagram is 100 bytes in sizeC) the first byte of the datagram is byte 800D) None of the choices are correct16.What is needed to determine the number of the last byte of a fragment?A) offset numberB) total lengthC) both offset number and the total lengthD) None of the choices are correct17.The IP header size is _______ bytes long.A) 20 to 60B) 20C) 60D) None of the choices are correct18.Packets in the IP layer are called _________.A) segmentsB) datagramsC) framesD) None of the choices are correct19.The total length field defines the total length of the datagram _________.A) including the headerB) excluding the headerC) excluding the option lengthD) None of the choices are correct20.When a datagram is encapsulated in a frame, the total size of the datagram must be lessthan the _______.A) MUTB) MATC) MTUD) None of the choices are correct21.An IPv4 address is normally represented in base ____ in dotted-decimal notation.A) 16B) 256C) 10D) None of the choices are correct22.In classful addressing, the IPv4 address space is divided into _______ classes.A) 3B) 4C) 5D) None of the choices are correct23.The number of addresses assigned to an organization in classless addressing _______.A) can be any numberB) must be a multiple of 256C) must be a power of 2D) None of the choices are correct24.The first address assigned to an organization in classless addressing _______.A) must be evenly divisible by the number of addresses in the organizationB) must be divisible by 128C) must belong to one of the A, B, or C classesD) None of the choices are correct25.In subnetting, the number of addresses in each subnet must _______.A) be a power of 2B) be a multiple of 128C) be divisible by 128D) None of the choices are correct26.What is the default prefix length for class A in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct27.What is the default prefix length for class B in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct28.What is the default prefix length for class C in CIDR notation?A) 24B) 8C) 16D) None of the choices are correct29.DHCP is a (an) ___________ layer protocol.A) applicationB) transportC) networkD) data-link30.In DHCP, the client uses ________ port and the server uses _________ port.A) an ephemeral; a well-knownB) a well-known; a well-knownC) a well-known; an ephemeralD) None of the choices are correct31.DHCP uses the services of _______.A) UDPB) TCPC) IPD) None of the choices are correct32._________ allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with the rest of the world.A) DHCPB) NATC) IMCPD) None of the choices are correct33.The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________ addressing.A) classfulB) classlessC) classful or classlessD) None of the choices are correct34.The use of hierarchy in routing tables can ________ the size of the routing tables.A) reduceB) increaseC) neither reduce nor increaseD) None of the choices are correct35.ICMP is a (an) _________ layer protocol.A) application-layer protocol that helps TCP/IP at the network layerB) transport-layer protocol that helps TCP/IP at the network layerC) network-layer protocol.D) data-link layer protocol that helps TCP/IP at the network layer36.Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated for a fragmented datagram.C) An ICMP error message may be generated for a multicast datagram.D) None of the choices are correct37.Routing inside an autonomous system is referred to as ________ routing.A) interdomainB) intradomainC) out-of-domainD) None of the choices are correct38.Routing between autonomous systems is referred to as ______ routing.A) interdomain routingB) intradomain routingC) out-of-domainD) None of the choices are correct39.In _______ routing, the least cost route between any two nodes is the route with the minimum distance.A) path vectorB) distance vectorC) link stateD) None of the choices are correct40.In ________, each node maintains a vector (table) of minimum distances to every node.A) path vectorB) distance vectorC) link stateD) None of the choices are correct41.In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.A) every other nodeB) its immediate neighborsC) one neighborD) None of the choices are correct42.The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct43.The metric used by _______ is the hop count.A) OSPFB) RIPC) BGPD) None of the choices are correct44.In RIP, the ________ timer controls the advertising of regular update messages.A) garbage collectionB) expirationC) periodicD) None of the choices are correct45.In RIP, the ________ timer is used to purge invalid routes from the table.A) garbage collectionB) expirationC) periodicD) None of the choices are correct46.In RIP, the ________ timer controls the validity of the route.A) garbage collectionB) expirationC) periodicD) None of the choices are correct47.RIP uses the services of _______.A) TCPB) UDPC) IPD) None of the choices are correct48.The _________ routing uses the Dijkstra algorithm to build a routing table.A) distance vectorB) link stateC) path vectorD) None of the choices are correct49.The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct50.The _______ protocol allows the administrator to assign a cost, called the metric, to each route.A) OSPFB) RIPC) BGPD) None of the choices are correct51.In OSPF, a ________ link connects two routers without any other host or router in between.A) point-to-pointB) transientC) stubD) None of the choices are correct52.In OSPF, a _______ link is a network with several routers attached to it.A) point-to-pointB) transientC) stubD) None of the choices are correct53.In OSPF, a ________ link is a network connected to only one router.A) point-to-pointB) transientC) stubD) None of the choices are correct54.In OSPF, a ________ defines the links of a network.A) network linkB) router linkC) summary link to networkD) None of the choices are correct55.___________ is an interdomain routing protocol using path vector routing.A) BGPB) RIPC) OSPFD) None of the choices are correct56.A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct57.A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct58.A one-to-one communication between one source and one destination is classified as a _______ communication.A) unicastB) multicastC) broadcastD) None of the choices are correct59.In ______, the router forwards the received packet through only one of its interfaces.A) unicastingB) multicastingC) broadcastingD) None of the choices are correct60.In multicast routing, each involved router needs to construct a ________ path tree for each group.A) averageB) longestC) shortestD) None of the choices are correct61.In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.A) group-sharedB) source-basedC) destination-basedD) None of the choices are correct62.The Multicast Open Shortest Path First (MOSPF) routing uses the _______ tree approach.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct63.The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct64.In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.A) shortestB) longestC) averageD) None of the choices are correct65.RPF eliminates the ________ in the flooding process.A) forwardingB) backwardingC) floodingD) None of the choices are correct66.RPB creates a shortest path _______ tree from the source to each destination.A) unicastB) multicastC) broadcastD) None of the choices are correct67.RPB guarantees that each destination receives _________ of the packet.A) only one copyB) no copiesC) multiple copiesD) None of the choices are correct68.In ________, the multicast packet must reach only those networks that have active members for that particular group.A) RPFB) RPBC) RPMD) None of the choices are correct69._______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.A) RPM; RPBB) RPB; RPMC) RPF; RPMD) None of the choices are correct70.__________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.A) MOSPFB) DVMRPC) CBTD) None of the choices are correct71.DVMRP is a ________ routing protocol, based on RIP.A) source-basedB) group-sharedC) destination-basedD) None of the choices are correct72.Pruning and grafting are strategies used in _______.A) RPFB) RPBC) RPMD) None of the choices are correct73.PIM-DM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct74.PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.A) largeB) smallC) moderateD) None of the choices are correct75.An IPv6 address is _________ bits long.A) 32B) 64C) 128D) 25676.An IPv6 address consists of ________ bytes (octets);A) 4B) 8C) 16D) None of the choices are correct77.In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.A) 8; 2B) 8; 3C) 8; 4D) None of the choices are correct78.An IPv6 address can have up to __________ hexadecimal digits.A) 16B) 32C) 8D) None of the choices are correct79.In IPv6, the _______ field in the base header restricts the lifetime of a datagram.A) versionB) priorityC) hop limitD) None of the choices are correct80.The _________ in IPv6 is designed to provide special handling for a particular flow of data.A) flow labelB) next headerC) hop limitD) None of the choices are correct81.When two computers using IPv6 want to communicate but the packet must pass through an IPv4 region, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct82.When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used?A) tunnelingB) header translationC) either tunneling or header translationD) None of the choices are correct83.The protocols __________________________ in version 4 are combined into one single protocol, ICMPv6.A) ARP and IGMPB) ICMP and IGMPC) ICMP, ARP, and IGMPD) None of the choices are correctDCBCB DCCBA DBCDC CABAC BCCAA BCAAB ABBAC DBABB BABCA BBBBA ABCAA CBAAC BABAD CACAB ACABC CCBCA ABC。
计算机网络教程自顶向下方法选择题及答案Chapt1Introduction-QUIZZ

计算机网络教程自顶向下方法选择题及答案Chapt1Introduction-QUIZZChapter 1 Introduction1.A local area network (LAN) is defined by _______________.A) the geometric size of the networkB) the maximum number of hosts in the networkC) the maximum number hosts in the network and/or the geometric size of the networkD) the topology of the network2.The largest geographic area a wide area network (WAN) can span isA) a townB) a stateC) a countryD) the world3.The TCP/IP protocol suite consists of _______ layers.A) twoB) threeC) fiveD) six4.A router is involved in ____________ layers of the TCP/IP protocol suite.A) twoB) threeC) fourD) five5.A link-layer switch is involved in ______________ layers of the TCP/IP protocol suite.A) twoB) threeC) fourD) five6.In the TCP/IP protocol suite, which of the following is an application layer protocol?A) The User Datagram Protocol (UDP)B) The Internet Protocol (IP)C) The File Transfer Protocol (FTP)D) the Transmission Control Protocol (TCP)7.In the TCP/IP protocol suite, which of the following is a transport layer protocol?A) The Internet Control Message protocol (ICMP)B) The Internet Protocol (IP)C) The Address Resolution Protocol (ARP)D) The Transmission Control Protocol (TCP)8.In the TCP/IP protocol suite, which of the following is a network layer protocol?A) The Stream Control Transmission Protocol (SCTP)B) The Secure Shell (SSH)C) The Internet Protocol (IP)D) User Datagram Protocol (UDP)9.The transport-layer packet in the TCP/IP protocol suite is calledA) a messageB) a datagramC) a segment or a user datagramD) a frame10.In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next.A) physicalB) data linkC) transportD) network11.In the TCP/IP protocol suite, the physical layer is concerned with the movement of _______ over the physical medium.A) programsB) dialogsC) protocolsD) bits12.In the TCP/IP protocol suite, a port number is the identifier at the ____________.A) application layerB) transport layerC) network layerD) physical layer13.In the TCP/IP protocol suite, a logical address is the identifier at the _______________.A) network layerB) transport layerC) data-link layerD) application layer14.The _________ layer is responsible for the delivery of a message from one process to another.A) physicalB) transportC) networkD) application15.The Internet Protocol (IP) is ________ protocol.A) a reliableB) a connection-orientedC) a reliable and connection-orientedD) an unreliable16.The application layer in the TCP/IP protocol suite is usually considered to be the combination of ________ layers in the OSI modelA) application, presentation, and sessionB) application, transport, and networkC) application, data-link, and physicalD) network, data-link, and physical17.A proposed standard is elevated to ________ standard status after at least two successful tries.A) informationalB) historicC) draftD) None of the choices are correct18.An RFC is labeled ________ if it must be implemented by all Internet systems.A) requiredB) electiveC) recommendedD) None of the choices are correct19.In the original ARPANET, _______ were directly connected to each other.A) interface message processors (IMPs).B) host computersC) networksD) routers20._______ was formed to connect universities with no defense ties.A) ARPANETB) CSNETC) NSFNETD) ANSNET21.Currently _______ is responsible for the management of Internet domain names and addressesA) NICB) ICANNC) ISOCD) IEFE22.In TCP/IP, a message at the application layer is encapsulated in a packet at the ________ layer.A) networkB) transportC) data linkD) physical23.In TCP/IP, a message at the transport layer is encapsulated in a packet at the ________ layer.A) networkB) transportC) data linkD) physical24.In TCP/IP, a message belonging to the network layer is decapsulated from a packet at the ________ layer.A) networkB) transportC) data linkD) physical25.In TCP/IP, a message belonging to the transport layer is decapsulated from a packet at the ________ layer.A) networkB) transportC) data linkD) physical26.In TCP/IP, a logical connection between an entity at thenetwork layer can be made with another entity at the ________ layer.A) networkB) transportC) data linkD) physical27.In TCP/IP, a logical connection between an entity at the data-link layer can be made with another entity at the ________ layer.A) networkB) transportC) data linkD) physical28.In TCP/IP, a packet at the third layer carries data belonging to the ________ layer and the headerbelonging to the _________ layer.A) third; thirdB) third; fourthC) fourth; thirdD) fourth; fourthADCBA CDCCB DBABD ACAAB BBACB ACC。
(计算机网络:自顶向下方方法)TopDownV3-8

输数据包的核心协议。
传输层简介
定义传输层在计算机 网络中的作用
传输层负责确保数据在发送方和 接收方之间可靠地传输,并提供 端到端的通信服务。
描述传输层的主要功 能
传输层的主要功能包括建立连接、 数据传输、错误控制和流量控制 等。
解释传输层的协议
传输层协议包括TCP (Transmission Control Protocol)和UDP(User Datagram Protocol)。TCP是 一种可靠的、面向连接的协议, 而UDP则是一种不可靠的、无连 接的协议。
07 应用层
应用层简介
01
应用层是计算机网络体系结构中的最高层,直接面 向用户提供服务。
02
它负责处理特定的应用程序细节,例如文件传输、 电子邮件、网页浏览等。
03
应用层协议定义了应用程序之间的通信规则和数据 交换格式。
应用层协议
HTTP协议
用于网页浏览和信息检索,如浏览器和Web服务器之间的通信。
FTP客户端
用于在计算机之间传输文件,使用FTP协议。
DNS服务器
提供域名解析服务,将域名转换为IP地址。
08 网络安全与网络管理
网络安全简介
网络安全定义
网络安全是指保护网络系统免受未经授权的访问、使用、 泄露、破坏、修改或销毁,确保网络服务的可用性、完整 性和保密性。
网络安全威胁
网络安全面临的威胁包括恶意软件、黑客攻击、网络钓鱼、 身份盗窃等,这些威胁可能导致数据泄露、系统瘫痪或经 济损失。
网络层简介
01
定义网络层在计算机网络中的作用
网络层负责将数据包从一个网络节点传输到另一个网络节点,确保数据
包能够到达目的地。
计算机网络:自顶向下方法-课本课后习题答案(4-6)

课后习题答案(4-6单元):Chapter 4 Review Questionsreview questions:1,2,3,4,8,10,15,16,18,20,23,27,33,34,361.网络层的分组名称是数据报.路由器是根据包的IP地址转发包;而链路层是根据包的MAC地址来转发包.2.数据报网络中网络层两个最重要的功能是:转发,选路.虚电路网络层最重要的三个功能是:转发,选路,和呼叫建立.3.转发是当一个分组到达路由器的一条输入链路时,该路由器将该分组移动到适当的输出链路.选路是当分组从发送方流向接收方时,网络层必须决定这些分组所采用的路由或路径.4.是,都使用转发表,要描述转发表,请参考4.2节.在虚电路网络中,该网络的路由器必须为进行中的连接维持连接状态信息。
每当跨越一台路由器则创建一个新连接,一个新的连接项必须加到该路由器转发表中;每当释放一个连接,必须从该表中删除该项。
注意到即使没有VC号转换,仍有必要维持连接状态信息,该信息将VC号与输出接口号联系起来。
每当一个端系统要发送分组时,它就为该分组加上目的地端系统的地址,然后将该分组推进网络中。
完成这些无需建立任何虚电路。
在数据报网络中的路由器不维护任何有关虚电路的状态信息。
每个路由器有一个将目的地址影射到链路接口的转发表;当分组到达路由器时,该路由器使用该分组的目的地址在该转发表中查找适当的输出链路接口。
然后路由其将该分组项该输出链路接口转发。
虽然在数据报网络中不维持连接状态信息,它们无论如何在其转发表中维持了转发状态信息。
在数据报网络中的转发表是由选录算法修改的,通常每1到5分钟左右更新转发表。
在虚电路网络中,无论何时通过路由器拆除一条现有的连接,路由器中的转发表就更新。
8.(1)经内存交换:在输入和输出端口之间的交换是在CPU控制下完成的.输入与输出端口的作用就像在传统操作系统中的I/O设备一样.一个分组到达一个输入端口,该端口会先通过中断方式向选路处理器发出信号.于是,该分组就被拷贝到处理器内存中.选路处理器从分组首部中取出目的地址,在转发表中找出适当的输出端口,并将该分组拷贝到输出端口的缓存中.(2)经一根总线交换:输入端口经一根总线将分组直接传送到输出端口,不需要选路处理器的干预.由于总线是共享的,故一次只能有一个分组通过总线传送.(3)经一个互联网络交换:使用一个纵横的网络,是一个由2n条总线组成的互联网络,它将n个输出端口和n个输入端口连接,一个到达某个端口的分组沿着连到输出端口的水平总线穿行,直至该水平总线与连到所希望的输出端口的垂直总线之交点.10.因为输出线速率慢而导致输出端队列长度加大,最终将耗尽输出端口的存储空间,在这样的情况下,分组就被丢弃了。
计算机网络自顶向下答案

The task can be done using only one control connection, but two data-transfer connections are needed, one for retrieving and one for storing. Although the data-transfer connection is a two-way connection, one is used for data transfer, the other for acknowledging. The answer is no. Only the client can get the list of files from the server. In the client-server paradigm, the request is from the client; the server only can respond. FTP has a specific format for exchanging commands and responses during the control connection. We can say that these formats can be defined as shown below:
CHAPTER
2
CTICE SET
Questions
Q2-1. Q2-3.
No changes are needed. The new protocol needs to use the services provided by one of the transport-layer protocols. A server should always be on because a client may need to access it at any time. A client is normally the initializer of the connection; it can be run when it is needed. Probably Alice turned off her desktop, which stopped the FTP server, when she left the office. A server process should be running all the time, waiting for clients to access it. In this case, UDP is more appropriate because it does not have the overhead of TCP in connection establishment and teardown. The IP address identifies the source computer; the port number identifies the source process. The program is an example of a dynamic document because it needs to be run at the server site and only the result is to be downloaded to the client site. If Bob posts his clip on his website, Alice can get it by running an HTTP client (a browser) using a GET message. Since Alice is not running an HTTP server, she needs to use the PUT command and post her clip on Bob’s site. If the message has no body section, the lack of any character after the blank line is an indication that the message is over. If the message has a body, either the body needs to have an end-of-file marker or the message should have the Content-Length header to define the size of the body. The answer is yes. Two separate connections are needed for setup and teardown to use FTP. In FTP, the control connection is actively opened by the client. The server is running all the time waiting for a client to make a control connection. The data-transfer connection, on the other hand, is actively opened by the server. The client issues a passive open and sends the ephemeral port (to be used for the data-transfer connection) to the server, which is done using a control-con1
计算机网络自顶向下第六版解析

Network Management 9-6
Chapter 9 outline
❖ What is network management? ❖ Internet-standard management framework
▪ Structure of Management Information: SMI ▪ Management Information Base: MIB ▪ SNMP Protocol Operations and Transport
::= { ip 9}
MODULE-IDENTITY: ipMIB
ipMIB MODULE-IDENTITY
LAST-UPDATED “941101000Z”
ORGANZATION “IETF SNPv2
Working Group”
CONTACT-INFO
“ Keith McCloghrie
……”
DESCRIPTION
Network Management 9-9
SNMP MIB
MIB module specified via SMI MODULE-IDENTITY
(100 standardized MIBs, more vendor-specific)
MODULE OBJECT TYPE:
OBJECT TYPEO: BJECT TYPE:
Mappings ▪ Security and Administration ❖ ASN.1
Network Management 9-7
SNMP overview: 4 key parts
❖ Management information base (MIB):
(完整版)计算机网络教程自顶向下方法选择题及答案Chapt2ApplicationLayer-QUIZZ

Chapter 2 Application Layer1.In a client-server paradigm, a _______ program provides services to a (another) _______ program.A) client; clientB) client; serverC) server; clientD) server; server2.In a client-server paradigmA) both the server and the client must be running all the time.B) both the server and the client need to be running only when they are needed.C) the server must be running all the time but the client needs to be running only when it is needed.D) the client must be running all the time but the server needs to be running only when it is needed3.The first section of a URL identifier is the __________.A) protocolB) pathC) hostD) port4.A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.A) staticB) dynamicC) activeD) None of the choices are correct5._____________ is a language for creating a static document.A) Extensible Style Language (XSL)B) Hypertext Markup Language (HTML)C) Extensible Markup Language (XML)D) All choices are correct6.A _______ document is created by a Web server whenever a browser requests the document.A) staticB) dynamicC) activeD) None of the choices are correct7.For many applications, we need a program or a script to be run at the client site. These are called_______________ documents.A) staticB) dynamicC) activeD) None of the choices are correct8.HTTP uses the services of _________.A) UDPB) IPC) TCPD) DNS9.In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.A) request; responseB) status; responseC) status; statusD) None of the choices are correct10.In a ___________ connection, one TCP connection is made for each request/response.A) persistentB) nonpersistentC) persistent or a nonpersistentD) None of the choices are correct11.In a ___________ connection, the server leaves the connection open for more requests after sending a response.A) persistentB) nonpersistentC) persistent or nonpersistentD) None of the choices are correct12.In HTTP, _______ server is a computer that keeps copies of responses to recent requests.A) a regularB) a proxyC) an auxiliaryD) a remote13.An HTTP request message always contains _______.A) a header line and a bodyB) a request line and a header lineC) a request line, a header line, and a bodyD) a request line, a header line, a blank line, and a bodyWhich of the following is present in both an HTTP request line and a status line?A) version numberB) URLC) status codeD) method15.FTP uses the services of ________.A) UDPB) IPC) TCPD) none of the choices are correct16.In FTP, _________ well-known port(s) is (are) used.A) oneB) twoC) threeD) four17.During an FTP session the control connection is opened _______.A) onceB) twiceC) many timesD) none of the choices are correct18.During an FTP session the data connection may be opened _______.A) only onceB) only two timesC) as many times as neededD) none of the choices are correct19.In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.A) file typesB) data structuresC) transmission modesD) none of the choices are correct20.In FTP, there are three types of _______: stream, block, and compressed.A) file typesB) data typesC) transmission modesD) none of the choices are correctIn FTP, ASCII, EBCDIC, and image define an attribute called _______.A) file typeB) data structureC) transmission modeD) none of the choices are correct22.In FTP, when we _______, it is copied from the client to the server.A) retrieve a fileB) store a fileC) open a fileD) none of the choices are correct23.In the common scenario, the electronic mail system needs _________________________.A) two UAs, two MTAs and one MAAB) two UAs, two MTAs and two MAAsC) two UAs, two pairs of MTAs and a pair of MAAsD) two UAs, two pairs of MTAs and a two pairs of MAAs24.________ provides service to the user to make the process of sending or receiving a message easier.A) An MTAB) An MAAC) A UAD) None of the choices are correct25.An e-mail message contains the ________ and the __________.A) header; envelopB) header; bodyC) envelop; bodyD) None of the choices are correct26.In the Internet, an e-mail address consists of two parts: a _______ and a _______.A) local part; domain nameB) global part; domain nameC) label; domain nameD) local part; label27._________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.A) SMPTB) MPEGC) MIMED) POP28.The formal protocol that defines the MTA client and server in the Internet is called ___________.A) SMTPB) SNMPC) TELNETD) SSH29.SMTP is a __________ protocol.A) pullB) pushC) push and pullD) None of the choices are correct30.The message access protocol is a ________ protocol.A) pullB) pushC) push and pullD) None of the choices are correct31.In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as32 bits.A) 8bitB) binaryC) base64D) quoted-printable32.In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.A) 8bitB) base64C) quoted-printableD) binary33.TELNET is an abbreviation for ____________.A) terminal networkB) telephone networkC) telecommunication networkD) None of the choices are correct34.When a user logs into a local time-sharing system, it is called ________ login.A) localB) remoteC) local or remoteD) None of the choices are correct35.When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.A) localB) remoteC) local or remoteD) None of the choices are correct36.Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.A) sending; receivingB) request; replyC) data; controlD) None of the choices are correct37.For data, NVT uses US ASCII characters with the highest order bit set to ______.A) 1B) 0C) 1 or 0D) None of the choices are correct38.For control, NVT uses US ASCII characters with the highest order bit set to ______.A) 1B) 0C) 1 or 0D) None of the choices are correct39.The _______ translates local characters into NVT characters.A) terminal driverB) TELNET clientC) TELNET serverD) pseudoterminal driver40.The _______ translates NVT characters into a form acceptable by the remote operating system.A) terminal driverB) TELNET clientC) TELNET serverD) pseudoterminal driver41.The _________ component in the SSH provides confidentiality, integrity, authentication and compression.A) SSH ApplicationB) SSH-AUTHC) SSH-CONND) SSH-TRANPort forwarding is ____________________________.A) a protocol used to forward messages from one port to another portB) a procedure for changing an ephemeral port to a well-known portC) a service, provided by SSH, that creates a secure channel for applications that do not have security services.D) None of the choices are correct43.In a _______ name space, a name is a sequence of characters without structure.A) linearB) flatC) hierarchicalD) organized44.In a _________ name space, each name is made of several parts.A) linearB) flatC) hierarchicalD) organized45.In the DNS, the names are defined in ___________ structure.A) a linear listB) an inverted-treeC) a three-dimensionalD) None of the choices are correct46.The root of the DNS tree is _______.A) a string of 127 charactersB) a string of 63 charactersC) a string of 15 charactersD) an empty string47.In the domain name space, a full domain name is a sequence of labels separated by ________.A) colonsB) semicolonsC) dotsD) commas48.In the domain name space, if a label is terminated by a null string, it is called a __________.A) PQDNB) CQDNC) SQDND) None of the choices are correctIn the domain name space, if a label is not terminated by a null string, it is called a __________.A) FQDNB) PQDNC) SQDND) None of the choices are correct50.In the domain name space, a _________ is a subtree of the domain name space.A) labelB) nameC) domainD) None of the choices are correct51.In the domain name space, what a server is responsible for or has authority over is called a _________.A) domainB) labelC) zoneD) None of the choices are correct52.A _______ server is a computer whose zone system consists of the whole tree.A) domainB) zoneC) rootD) primary53.A ________ server is a computer that stores a file about the zone for which it has an authority.A) primaryB) secondaryC) zoneD) root54.A ________ server is a computer that transfers the complete information about a zone from another server.A) primaryB) secondaryC) zoneD) root55.In the Internet, the country domain section uses ___________ country abbreviations.A) two-characterB) three-characterC) four-characterD) None of the choices are correct56.In __________ resolution, the resolver expects the server to supply the final answer.A) iterativeB) recursiveC) straightD) None of the choices are correct57.In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.A) iterativeB) recursiveC) straightD) None of the choices are correct58.DNS can use the services of ________.A) UDPB) TCPC) either UDP or TCPD) None of the choices are correct59.A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data baseA) NICB) ICANNC) ISOCD) IEFE60.In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using __________ paradigm.A) client-server; client-serverB) peer-to-peer; client-serverC) client-server; peer-to-peerD) peer-to-peer; peer-to-peer61.Napster is an example of a ____________ peer-to-peer networkA) centralizedB) structured-decentralizedC) unstructured-decentralizedD) None of the choices are correct62.Gnutella is an example of a ____________ peer-to-peer networkA) centralizedB) structured-decentralizedC) unstructured-decentralizedD) None of the choices are correct63.BitTorrent is an example of a ____________ peer-to-peer networkA) centralizedB) structured-decentralizedC) unstructured-decentralizedD) None of the choices are correct64.In a structured-decentralized P2P network, ________________.A) the directory system is kept in a centerB) a query to find a file must be flooded through the networkC) a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolvedD) None of the choices are correct65.In a DHT-based network, each peerA) has a partial knowledge about the whole network.B) has a complete knowledge about the whole network.C) only has a knowledge about its successor.D) None of the choices are correct66.The finger table is the routing table used in ______________.A) GnutellaB) PastryC) KademliaD) None of the choices are correct67.Which of the following is not a Chord interface.A) LookupB) Fix nodeC) StabilizeD) Join68.In __________ a key is stored in a node whose identifier is numerically closest to the key.A) ChordB) PastryC) KademliaD) None of the choices are correct69.To resolve a query, _________ uses two entities: a routing table and a leaf set.A) ChordB) PastryC) KademliaD) None of the choices are correct70.In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.A) ANDB) NORC) ORD) None of the choices are correct71.In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary treeA) ChordB) PastryC) KademliaD) None of the choices are correct72.In Kademlia, each node in the network divides the binary tree into m subtrees that.A) include the node itselfB) do not include the node itselfC) include the node itself and the successor nodeD) None of the choices are correct73.Trackerless BitTorrent uses __________ DHT to do the job of tracking.A) ChordB) PastryC) KademliaD) None of the choices are correctCCAAD BCCDB ABBAC BACBC ABCCB ACABA CCAAB CBABC DCBCB CCDBC CCABA BACBC ACBCA DBBBD CBC。
《计算机网络自顶向下》课后习题答案(第二章中文版)

《计算机网络自顶向下》课后习题答案(第二章中文版)2复习题1.The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; email: SMTP.2.P51 网络体系结构是指以分层的方式来描述通信过程的组织体系。
(例如五层网络结构)另一方面,应用体系结构是由应用程序的研发者设计,并规定应用程序的主要结构(例如客户机/服务器或P2P)从应用程序研发者的角度看,网络体系结构是固定的,并为应用程序提供了特定的服务集合。
3.P52 在即时讯息中,发起人连接到中心服务器,查找接收方的IP地址是典型的客户机/服务器模式。
在这之后,即时信息可以在相互通信的双方进行直接的端到端通信。
不需要总是打开的中间服务器。
4.P53 发起通信的进程为客户机,等待联系的进程是服务器。
5.No. As stated in the text, all communication sessions havea client side and a server side. In a P2P file-sharingapplication, the peer that is receiving a file is typically the client and the peer that is sending the file is typically the server.6.P54 目的主机的IP地址和目的套接字的端口号。
7.在日常生活中你或许会使用Web浏览器和邮件阅读器。
你或许还会用到FTP用户代理,Telnet用户代理,音频/视频播放器用户代理(比如Real Networks player),即时信息代理,P2P文件共享代理。
8.There are no good examples of an application that requires no data loss and timing. If you know of one, send an e-mail to the authors.9.当两个通信实体在相互发送数据前第一次交换控制分组信息时使用握手协议。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
All material © copyright 1996-2012 by J.F. Kurose and K.W. Ross. All rights reserved
Chapter 1 Review ons
1. There is no difference. Throughout this text, the words “host” and “end system” are used interchangeably. End systems include PCs, workstations, Web servers, mail servers, PDAs, Internet-connected game consoles, etc. 2. From Wikipedia: Diplomatic protocol is commonly described as a set of international courtesy rules. These well-established and time-honored rules have made it easier for nations and people to live and work together. Part of protocol has always been the acknowledgment of the hierarchical standing of all present. Protocol rules are based on the principles of civility. 3. Standards are important for protocols so that people can create networking systems and products that interoperate. 4. 1. Dial-up modem over telephone line: home; 2. DSL over telephone line: home or small office; 3. Cable to HFC: home; 4. 100 Mbps switched Ethernet: enterprise; 5. Wifi (802.11): home and enterprise: 6. 3G and 4G: wide-area wireless. 5. HFC bandwidth is shared among the users. On the downstream channel, all packets emanate from a single source, namely, the head end. Thus, there are no collisions in the downstream channel. 6. In most American cities, the current possibilities include: dial-up; DSL; cable modem; fiber-to-the-home. 7. Ethernet LANs have transmission rates of 10 Mbps, 100 Mbps, 1 Gbps and 10 Gbps. 8. Today, Ethernet most commonly runs over twisted-pair copper wire. It also can run over fibers optic links. 9. Dial up modems: up to 56 Kbps, bandwidth is dedicated; ADSL: up to 24 Mbps downstream and 2.5 Mbps upstream, bandwidth is dedicated; HFC, rates up to 42.8 Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; 10-20 Mbps download; bandwidth is not shared. 10. There are two popular wireless Internet access technologies today: a) Wifi (802.11) In a wireless LAN, wireless users transmit/receive packets to/from an base station (i.e., wireless access point) within a radius of few tens of meters. The base station is typically connected to the wired Internet and thus serves to connect wireless users to the wired network. b) 3G and 4G wide-area wireless access networks. In these systems, packets are transmitted over the same wireless infrastructure used for cellular telephony, with the base station thus being managed by a telecommunications provider. This provides wireless access to users within a radius of tens of kilometers of the base station.
Computer Networking: A Top-Down Approach, 6th Edition Solutions to Review Questions and Problems
Version Date: May 2012
This document contains the solutions to review questions and problems for the 5th edition of Computer Networking: A Top-Down Approach by Jim Kurose and Keith Ross. These solutions are being made available to instructors ONLY. Please do NOT copy or distribute this document to others (even other instructors). Please do not post any solutions on a publicly-available Web site. We’ll be happy to provide a copy (up-to-date) of this solution manual ourselves to anyone who asks. Acknowledgments: Over the years, several students and colleagues have helped us prepare this solutions manual. Special thanks goes to HongGang Zhang, Rakesh Kumar, Prithula Dhungel, and Vijay Annapureddy. Also thanks to all the readers who have made suggestions and corrected errors.