计算机网络第七版课后答案完整版

合集下载

计算机网络第七版第一章课后练习

计算机网络第七版第一章课后练习

1-01计算机网络可以向用户提供哪些服务?1-02试简述分组交换的要点。

1-03试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

1-04为什么说互联网是自印刷术以来人类在存储和交换信息领域中的最大变革?分组交换的时延比电路交换的要小?(提示:画一下草图观察k段链路共有几个结点。

)1-11在上题的分组交换网中,设报文长度和分组长度分别为x和(p+h)(bit),其中p为分组的数据部分的长度,而h为每个分组所带的控制信息固定长度,与p的大小无关。

通信的两端共经过k段链路。

链路的数据率为b(bit/s),但传播时延和结点的排队时间均可忽略不计。

若打算使总的时延为最小,问分组的数据部分长度p应取为多大?(提示:参考图1-13的分组交换部分,观察总的时延由哪几部分组成。

)1-12互联网的两大组成部分(边缘部分与核心部分)的特点是什么?它们的工作方式各有什么特点?(1)10cm(网络接口卡)(2)100m(局域网)(3)100km(城域网)(4)5000km(广域网)试计算当数据率为1Mbit/s和10Gbit/s时在以上媒体中正在传播的比特数。

1-19长度为100字节的应用层数据交给传输层传送,需加上20字节的TCP 首部。

再交给网络层传送,需加上20字节的IP首部。

最后交给数据链路层的以太网传送,加上首部和尾部18字节。

试求数据的传输效率。

1-27试解释everything over IP和IP over everything的含义。

1-28假定要在网络上传送1.5MB的文件。

设分组长度为1KB,往返时间RTT=80ms。

传送数据之前还需要有建立TCP连接的时间,这时间是2×RTT=160ms。

试计算在以下几种情况下接收方收完该文件的最后一个比特所需的时间。

(1)数据发送速率为10Mbit/s,数据分组可以连续发送。

(2)数据发送速率为10Mbit/s,但每发送完一个分组后要等待一个RTT时间才能再发送下一个分组。

计算机网络自顶向下 第七版 第六章答案

计算机网络自顶向下 第七版 第六章答案

Computer Networking: A Top-Down Approach, 7th Edition计算机网络自顶向下第七版Solutions to Review Questions and ProblemsChapter 6 Review Questions1.The transportation mode, e.g., car, bus, train, car.2.Although each link guarantees that an IP datagram sent over the link will bereceived at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order. With IP,datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order. Also, IP can lose packets due to routing loops or equipment failures.3.Framing: there is also framing in IP and TCP; link access; reliable delivery: thereis also reliable delivery in TCP; flow control: there is also flow control in TCP;error detection: there is also error detection in IP and TCP; error correction; full duplex: TCP is also full duplex.4.There will be a collision in the sense that while a node is transmitting it will startto receive a packet from the other node.5.Slotted Aloha: 1, 2 and 4 (slotted ALOHA is only partially decentralized, since itrequires the clocks in all nodes to be synchronized). Token ring: 1, 2, 3, 4.6.After the 5th collision, the adapter chooses from {0, 1, 2,…, 31}. The probabilitythat it chooses 4 is 1/32. It waits 204.8 microseconds.7.In polling, a discussion leader allows only one participant to talk at a time, witheach participant getting a chance to talk in a round-robin fashion. For token ring, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.8.When a node transmits a frame, the node has to wait for the frame to propagatearound the entire ring before the node can release the token. Thus, if L/R is small as compared to t prop, then the protocol will be inefficient.9.248 MAC addresses; 232 IPv4 addresses; 2128 IPv6 addresses.10.C’s adapter will process the frames, but the adapter will not pass the datagrams upthe protocol stack. If the LAN broadcast address is used, then C’s adapter will both process the frames and pass the datagrams up the protocol stack.11.An ARP query is sent in a broadcast frame because the querying host does notwhich adapter address corresponds to the IP address in question. For the response, the sending node knows the adapter address to which the response should be sent, so there is no need to send a broadcast frame (which would have to be processed by all the other nodes on the LAN).12.No it is not possible. Each LAN has its own distinct set of adapters attached to it,with each adapter having a unique LAN address.13.The three Ethernet technologies have identical frame structures.14.2 (the internal subnet and the external internet)15.In 802.1Q there is a 12- bit VLAN identifier. Thus 212 = 4,096 VLANs can besupported.16.We can string the N switches together. The first and last switch would use oneport for trunking; the middle N-2 switches would use two ports. So the totalnumber of ports is 2+ 2(N-2) = 2N-2 ports.Chapter 6 ProblemsProblem 11 1 1 0 10 1 1 0 01 0 0 1 01 1 0 1 11 1 0 0 0Problem 2Suppose we begin with the initial two-dimensional parity matrix:0 0 0 01 1 1 10 1 0 11 0 1 0With a bit error in row 2, column 3, the parity of row 2 and column 3 is now wrong in the matrix below:0 0 0 01 1 0 10 1 0 11 0 1 0Now suppose there is a bit error in row 2, column 2 and column 3. The parity of row 2 is now correct! The parity of columns 2 and 3 is wrong, but we can't detect in which rows the error occurred!0 0 0 01 0 0 10 1 0 11 0 1 0The above example shows that a double bit error can be detected (if not corrected).Problem 301001100 01101001+ 01101110 01101011------------------------------10111010 11010100+ 00100000 01001100------------------------------11011011 00100000+ 01100001 01111001-----------------------------00111100 10011010 (overflow, then wrap around)+ 01100101 01110010------------------------------10100010 00001100The one's complement of the sum is 01011101 11110011Problem 4a)To compute the Internet checksum, we add up the values at 16-bit quantities:00000001 0000001000000011 0000010000000101 0000011000000111 0000100000001001 00001010-------------------------00011001 00011110The one's complement of the sum is 11100110 11100001.b)To compute the Internet checksum, we add up the values at 16-bit quantities: 01000010 0100001101000100 0100010101000110 0100011101001000 0100100101001010 01001011-------------------------10011111 10100100The one's complement of the sum is 01100000 01011011c)To compute the Internet checksum, we add up the values at 16-bit quantities: 01100010 0110001101100100 0110010101100110 0110011101101000 0110100101101010 01101011-------------------------00000000 00000101The one's complement of the sum is 11111111 11111010.Problem 5If we divide 10011 into 1010101010 0000, we get 1011011100, with a remainder of R=0100. Note that, G=10011 is CRC-4-ITU standard.Problem 6a) we get 1000110000, with a remainder of R=0000.b) we get 010*******, with a remainder of R=1111.c) we get 1011010111, with a remainder of R=1001.Problem 7a) Without loss of generality, suppose ith bit is flipped, where 0<= i <= d+r-1 and assume that the least significant bit is 0th bit.A single bit error means that the received data is K=D*2r XOR R + 2i. It is clear that if we divide K by G, then the reminder is not zero. In general, if G contains at least two 1’s, then a single bit error can always be detected.b) The key insight here is that G can be divided by 11 (binary number), but any number of odd-number of 1’s cannot be divided by 11. Thus, a sequence (not necessarily contiguous) of odd-number bit errors cannot be divided by 11, thus it cannot be divided by G.Problem 8a)1)1()(--=N p Np p E21)1)(1()1()('------=N N p N Np p N p E))1()1(()1(2----=-N p p p N NN p p E 1*0)('=⇒=b)N N N N N N p E N N N 11)11()11()11(1*)(11--=-=-=-- 1)11(lim =-∞→N N e N N N 1)11(lim =-∞→ Thuse p E N 1*)(lim =∞→Problem 9)1(2)1()(--=N p Np p E)3(2)2(2)1)(1(2)1()('------=N N p N Np p N p E))1(2)1(()1()3(2----=-N p p p N N121*0)('-=⇒=N p p E)1(2)1211(12*)(----=N N N N p E e e p E N 21121*)(lim =⋅=∞→Problem 10a) A’s average throughput is given by pA(1-pB).Total efficiency is pA(1-pB) + pB(1-pA).b) A’s throughput is pA(1-pB)=2pB(1-pB)= 2pB- 2(pB)2.B’s throughput is pB(1-pA)=pB(1-2pB)= pB- 2(pB)2.Clearly, A’s throughput is not twice as large as B’s.In order to make pA(1-pB)= 2 pB(1-pA), we need that pA= 2 – (pA / pB).c)A’s throughput is 2p(1-p)N-1, and any other node has throughput p(1-p)N-2(1-2p).Problem 11a)(1 – p(A))4 p(A)where, p(A) = probability that A succeeds in a slotp(A) = p(A transmits and B does not and C does not and D does not)= p(A transmits) p(B does not transmit) p(C does not transmit) p(D does not transmit)= p(1 – p) (1 – p)(1-p) = p(1 – p)3Hence, p(A succeeds for first time in slot 5)= (1 – p(A))4 p(A) = (1 – p(1 – p)3)4 p(1 – p)3b)p(A succeeds in slot 4) = p(1-p)3p(B succeeds in slot 4) = p(1-p)3p(C succeeds in slot 4) = p(1-p)3p(D succeeds in slot 4) = p(1-p)3p(either A or B or C or D succeeds in slot 4) = 4 p(1-p)3(because these events are mutually exclusive)c)p(some node succeeds in a slot) = 4 p(1-p)3p(no node succeeds in a slot) = 1 - 4 p(1-p)3Hence, p(first success occurs in slot 3) = p(no node succeeds in first 2 slots) p(some node succeeds in 3rd slot) = (1 - 4 p(1-p)3)2 4 p(1-p)3d)efficiency = p(success in a slot) =4 p(1-p)3Problem 12Problem 13The length of a polling round is)/(poll d R Q N +.The number of bits transmitted in a polling round is NQ . The maximum throughput therefore isQR d R d R Q N NQ poll poll +=+1)/( Problem 14a), b) See figure below.c)1. Forwarding table in E determines that the datagram should be routed to interface 192.168.3.002.2. The adapter in E creates and Ethernet packet with Ethernet destination address 88-88-88-88-88-88.3. Router 2 receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to 198.162.2.002.4.Router 2 then sends the Ethernet packet with the destination address of 33-33-33-33-33-33 and source address of 55-55-55-55-55-55 via its interface with IP address of 198.162.2.003.5.The process continues until the packet has reached Host B.a)ARP in E must now determine the MAC address of 198.162.3.002. Host E sendsout an ARP query packet within a broadcast Ethernet frame. Router 2 receives the query packet and sends to Host E an ARP response packet. This ARP response packet is carried by an Ethernet frame with Ethernet destination address 77-77-77-77-77-77.Problem 15a)No. E can check the subnet prefix of Host F’s IP address, and then learn that F ison the same LAN. Thus, E will not send the packet to the default router R1. Ethernet frame from E to F:Source IP = E’s IP addressDestination IP = F’s IP addressSource MAC = E’s MAC addressDestination MAC = F’s MAC addressb)No, because they are not on the same LAN. E can find this out by checking B’s IPaddress.Ethernet frame from E to R1:Source IP = E’s IP addressDestination IP = B’s IP addressSource MAC = E’s MAC addressDestination MAC = The MAC address of R1’s interface connecting to Subnet 3.c)Switch S1 will broadcast the Ethernet frame via both its interfaces as the receivedARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router R1 also receives this ARP request message, but R1 won’t forward the message to Subnet 3.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switch S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Lets call the switch between subnets 2 and 3 S2. That is, router R1 between subnets 2 and 3 is now replaced with switch S2.a) No. E can check the subnet prefix of Host F’s IP address, and then learn that F is on the same LAN segment. Thus, E will not send the packet to S2. Ethernet frame from E to F: Source IP = E’s IP address Destination IP = F’s IP address Source MAC = E’s MAC addressDestination MAC = F’s MAC addressb) Yes, because E would like to find B’s MAC address. In this case, E will send an ARP query packet with destination MAC address being the broadcast address. This query packet will be re-broadcast by switch 1, and eventually received by Host B. Ethernet frame from E to S2: Source IP = E’s IP address Destination IP = B’s IP address Source MAC = E’s MAC addressDestination MAC = broadcast MAC address: FF-FF-FF-FF-FF-FF.c) Switch S1 will broadcast the Ethernet frame via both its interfaces as the received ARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet 1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router S2 also receives this ARP request message, and S2 will broadcast this query packet to all its interfaces.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switc h S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Problem 17Wait for 51,200 bit times. For 10 Mbps, this wait is12.51010102.5163=⨯⨯bps bitsmsecFor 100 Mbps, the wait is 512 μsec.At 0=t A transmits. At 576=t , A would finish transmitting. In the worst case, B begins transmitting at time t=324, which is the time right before the first bit of A’s frame arrives at B. At time t=324+325=649 B 's first bit arrives at A . Because 649> 576, A finishes transmitting before it detects that B has transmitted. So A incorrectly thinks that its frame was successfully transmitted without a collision.Problem 19Because A 's retransmission reaches B before B 's scheduled retransmission time (805+96), B refrains from transmitting while A retransmits. Thus A and B do not collide. Thus the factor 512 appearing in the exponential backoff algorithm is sufficiently large.Problem 20a) Let Y be a random variable denoting the number of slots until a success:1)1()(--==m m Y P ββ,where β is the probability of a success.This is a geometric distribution, which has mean β/1. The number of consecutive wasted slots is 1-=Y X thatββ-=-==11][][Y E X E x1)1(--=N p Np β11)1()1(1-----=N N p Np p Np xefficiency11)1()1(1-----+=+=N N p Np p Np k kxk kb)Maximizing efficiency is equivalent to minimizing x , which is equivalent tomaximizing β. We know from the text that β is maximized at Np 1=.c)efficiency 11)11()11(1-----+=N N NN k k∞→N lim efficiency 1/1/11-+=-+=e k kee k kd) Clearly, 1-+e k kapproaches 1 as ∞→k .Problem 21i) from A to left router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 22-22-22-22-22-22Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from the left router to the right router: Source MAC address: 33-33-33-33-33-33Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from the right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003Problem 22i) from A to switch: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from switch to right router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003111.111.111.00311-11-11-11-11-11122.222.222.00466-66-66-66-66Problem 23If all the 11=9+2 nodes send out data at the maximum possible rate of 100 Mbps, a total aggregate throughput of 11*100 = 1100 Mbps is possible.Problem 24Each departmental hub is a single collision domain that can have a maximum throughput of 100 Mbps. The links connecting the web server and the mail server has a maximum throughput of 100 Mbps. Hence, if the three collision domains and the web server and mail server send out data at their maximum possible rates of 100 Mbps each, a maximum total aggregate throughput of 500 Mbps can be achieved among the 11 end systems.Problem 25All of the 11 end systems will lie in the same collision domain. In this case, the maximum total aggregate throughput of 100 Mbps is possible among the 11 end sytems. Problem 26Problem 27a) The time required to fill 8⋅L bits is.sec 16sec 1012883m LL =⨯⋅b) For ,500,1=L the packetization delay is.sec 75.93sec 161500m m =For ,50=L the packetization delay is.sec 125.3sec 1650m m =c) Store-and-forward delay RL 408+⋅=For 500,1=L , the delay issec 4.19sec 1062240815006μ≈⨯+⋅For ,50=L store-and-forward delay sec 1μ<.d) Store-and-forward delay is small for both cases for typical link speeds. However, packetization delay for 1500=L is too large for real-time voice applications.Problem 28The IP addresses for those three computers (from left to right) in EE department are: 111.111.1.1, 111.111.1.2, 111.111.1.3. The subnet mask is 111.111.1/24.The IP addresses for those three computers (from left to right) in CS department are: 111.111.2.1, 111.111.2.2, 111.111.2.3. The subnet mask is 111.111.2/24.The router’s interface card that connects to port 1 can be configured to contain two sub-interface IP addresses: 111.111.1.0 and 111.111.2.0. The first one is for the subnet of EE department, and the second one is for the subnet of CS department. Each IP address is associated with a VLAN ID. Suppose 111.111.1.0 is associated with VLAN 11, and 111.111.2.0 is associated with VLAN 12. This means that each frame that comes from subnet 111.111.1/24 will be added an 802.1q tag with VLAN ID 11, and each frame that comes from 111.111.2/24 will be added an 802.1q tag with VLAN ID 12. Suppose that host A in EE department with IP address 111.111.1.1 would like to send an IP datagram to host B (111.111.2.1) in CS department. Host A first encapsulates the IP datagram (destined to 111.111.2.1) into a frame with a destination MAC address equal to the MAC address of the router’s interface card that connects to port 1 of the switch. Once the router receives the frame, then it passes it up to IP layer, which decides that the IP datagram should be forwarded to subnet 111.111.2/24 via sub-interface 111.111.2.0. Then the router encapsulates the IP datagram into a frame and sends it to port 1. Note that this frame has an 802.1q tag VLAN ID 12. Once the switch receives the frame port 1, it knows that this frame is destined to VLAN with ID 12, so the switch will send the frame to Host B which is in CS department. Once Host B receives this frame, it will remove the 802.1q tag.Problem 30(The following description is short, but contains all major key steps and key protocols involved.)Your computer first uses DHCP to obtain an IP address. You computer first creates a special IP datagram destined to 255.255.255.255 in the DHCP server discovery step, and puts it in a Ethernet frame and broadcast it in the Ethernet. Then following the steps in the DHCP protocol, you computer is able to get an IP address with a given lease time.A DHCP server on the Ethernet also gives your computer a list of IP addresses of first-hop routers, the subnet mask of the subnet where your computer resides, and the addresses of local DNS servers (if they exist).Since your computer’s ARP cache is initially empty, your computer will use ARP protocol to get the MAC addresses of the first-hop router and the local DNS server.Your computer first will get the IP address of the Web page you would like to download. If the local DNS server does not have the IP address, then your computer will use DNS protocol to find the IP address of the Web page.Once your computer has the IP address of the Web page, then it will send out the HTTP request via the first-hop router if the Web page does not reside in a local Web server. The HTTP request message will be segmented and encapsulated into TCP packets, and then further encapsulated into IP packets, and finally encapsulated into Ethernet frames. Your computer sends the Ethernet frames destined to the first-hop router. Once the router receives the frames, it passes them up into IP layer, checks its routing table, and then sends the packets to the right interface out of all of its interfaces.Then your IP packets will be routed through the Internet until they reach the Web server. The server hosting the Web page will send back the Web page to your computer via HTTP response messages. Those messages will be encapsulated into TCP packets and then further into IP packets. Those IP packets follow IP routes and finally reach yourfirst-hop router, and then the router will forward those IP packets to your computer by encapsulating them into Ethernet frames.Problem 32a) Each flow evenly shares a link’s capacity with other flows traversing that link, then the 80 flows crossing the B to access-router 10 Gbps links (as well as the access router to border router links) will each only receive 10 Gbps / 80 = 125 Mbpsb) In Topology of Figure 5.31, there are four distinct paths between the first and third tier-2 switches, together providing 40 Gbps for the traffic from racks 1-4 to racks 9-12. Similarly, there are four links between second and fourth tier-2 switches, together providing 40 Gbps for the traffic from racks 5-8 to 13-16. Thus the total aggregate bandwidth is 80 Gbps, and the value per flow rate is 1 Gbps.c) Now 20 flows will need to share each 1 Gbps bandwidth between pairs of TOR switches. So the host-to-host bit rate will be 0.5 Gbps.Problem 33a)Both email and video application uses the fourth rack for 0.1 percent of the time.b)Probability that both applications need fourth rack is 0.001*0.001 = 10-6.c)Suppose the first three racks are for video, the next rack is a shared rack for bothvideo and email, and the next three racks are for email. Let's assume that thefourth rack has all the data and software needed for both the email and video applications. With the topology of Figure 5.31, both applications will have enough intra-bandwidth as long as both are not simultaneously using the fourth rack.From part b, both are using the fourth rack for no more than .00001 % of time, which is within the .0001% requirement.。

计算机网络自顶向下 第七版 第六章答案

计算机网络自顶向下 第七版 第六章答案

Computer Networking: A Top-Down Approach, 7th Edition计算机网络自顶向下第七版Solutions to Review Questions and ProblemsChapter 6 Review Questions1.The transportation mode, e.g., car, bus, train, car.2.Although each link guarantees that an IP datagram sent over the link will bereceived at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order. With IP,datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order. Also, IP can lose packets due to routing loops or equipment failures.3.Framing: there is also framing in IP and TCP; link access; reliable delivery: thereis also reliable delivery in TCP; flow control: there is also flow control in TCP;error detection: there is also error detection in IP and TCP; error correction; full duplex: TCP is also full duplex.4.There will be a collision in the sense that while a node is transmitting it will startto receive a packet from the other node.5.Slotted Aloha: 1, 2 and 4 (slotted ALOHA is only partially decentralized, since itrequires the clocks in all nodes to be synchronized). Token ring: 1, 2, 3, 4.6.After the 5th collision, the adapter chooses from {0, 1, 2,…, 31}. The probabilitythat it chooses 4 is 1/32. It waits 204.8 microseconds.7.In polling, a discussion leader allows only one participant to talk at a time, witheach participant getting a chance to talk in a round-robin fashion. For token ring, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.8.When a node transmits a frame, the node has to wait for the frame to propagatearound the entire ring before the node can release the token. Thus, if L/R is small as compared to t prop, then the protocol will be inefficient.9.248 MAC addresses; 232 IPv4 addresses; 2128 IPv6 addresses.10.C’s adapter will process the frames, but the adapter will not pass the datagrams upthe protocol stack. If the LAN broadcast address is used, then C’s adapter will both process the frames and pass the datagrams up the protocol stack.11.An ARP query is sent in a broadcast frame because the querying host does notwhich adapter address corresponds to the IP address in question. For the response, the sending node knows the adapter address to which the response should be sent, so there is no need to send a broadcast frame (which would have to be processed by all the other nodes on the LAN).12.No it is not possible. Each LAN has its own distinct set of adapters attached to it,with each adapter having a unique LAN address.13.The three Ethernet technologies have identical frame structures.14.2 (the internal subnet and the external internet)15.In 802.1Q there is a 12- bit VLAN identifier. Thus 212 = 4,096 VLANs can besupported.16.We can string the N switches together. The first and last switch would use oneport for trunking; the middle N-2 switches would use two ports. So the totalnumber of ports is 2+ 2(N-2) = 2N-2 ports.Chapter 6 ProblemsProblem 11 1 1 0 10 1 1 0 01 0 0 1 01 1 0 1 11 1 0 0 0Problem 2Suppose we begin with the initial two-dimensional parity matrix:0 0 0 01 1 1 10 1 0 11 0 1 0With a bit error in row 2, column 3, the parity of row 2 and column 3 is now wrong in the matrix below:0 0 0 01 1 0 10 1 0 11 0 1 0Now suppose there is a bit error in row 2, column 2 and column 3. The parity of row 2 is now correct! The parity of columns 2 and 3 is wrong, but we can't detect in which rows the error occurred!0 0 0 01 0 0 10 1 0 11 0 1 0The above example shows that a double bit error can be detected (if not corrected).Problem 301001100 01101001+ 01101110 01101011------------------------------10111010 11010100+ 00100000 01001100------------------------------11011011 00100000+ 01100001 01111001-----------------------------00111100 10011010 (overflow, then wrap around)+ 01100101 01110010------------------------------10100010 00001100The one's complement of the sum is 01011101 11110011Problem 4a)To compute the Internet checksum, we add up the values at 16-bit quantities:00000001 0000001000000011 0000010000000101 0000011000000111 0000100000001001 00001010-------------------------00011001 00011110The one's complement of the sum is 11100110 11100001.b)To compute the Internet checksum, we add up the values at 16-bit quantities: 01000010 0100001101000100 0100010101000110 0100011101001000 0100100101001010 01001011-------------------------10011111 10100100The one's complement of the sum is 01100000 01011011c)To compute the Internet checksum, we add up the values at 16-bit quantities: 01100010 0110001101100100 0110010101100110 0110011101101000 0110100101101010 01101011-------------------------00000000 00000101The one's complement of the sum is 11111111 11111010.Problem 5If we divide 10011 into 1010101010 0000, we get 1011011100, with a remainder of R=0100. Note that, G=10011 is CRC-4-ITU standard.Problem 6a) we get 1000110000, with a remainder of R=0000.b) we get 010*******, with a remainder of R=1111.c) we get 1011010111, with a remainder of R=1001.Problem 7a) Without loss of generality, suppose ith bit is flipped, where 0<= i <= d+r-1 and assume that the least significant bit is 0th bit.A single bit error means that the received data is K=D*2r XOR R + 2i. It is clear that if we divide K by G, then the reminder is not zero. In general, if G contains at least two 1’s, then a single bit error can always be detected.b) The key insight here is that G can be divided by 11 (binary number), but any number of odd-number of 1’s cannot be divided by 11. Thus, a sequence (not necessarily contiguous) of odd-number bit errors cannot be divided by 11, thus it cannot be divided by G.Problem 8a)1)1()(--=N p Np p E21)1)(1()1()('------=N N p N Np p N p E))1()1(()1(2----=-N p p p N NN p p E 1*0)('=⇒=b)N N N N N N p E N N N 11)11()11()11(1*)(11--=-=-=-- 1)11(lim =-∞→N N e N N N 1)11(lim =-∞→ Thuse p E N 1*)(lim =∞→Problem 9)1(2)1()(--=N p Np p E)3(2)2(2)1)(1(2)1()('------=N N p N Np p N p E))1(2)1(()1()3(2----=-N p p p N N121*0)('-=⇒=N p p E)1(2)1211(12*)(----=N N N N p E e e p E N 21121*)(lim =⋅=∞→Problem 10a) A’s average throughput is given by pA(1-pB).Total efficiency is pA(1-pB) + pB(1-pA).b) A’s throughput is pA(1-pB)=2pB(1-pB)= 2pB- 2(pB)2.B’s throughput is pB(1-pA)=pB(1-2pB)= pB- 2(pB)2.Clearly, A’s throughput is not twice as large as B’s.In order to make pA(1-pB)= 2 pB(1-pA), we need that pA= 2 – (pA / pB).c)A’s throughput is 2p(1-p)N-1, and any other node has throughput p(1-p)N-2(1-2p).Problem 11a)(1 – p(A))4 p(A)where, p(A) = probability that A succeeds in a slotp(A) = p(A transmits and B does not and C does not and D does not)= p(A transmits) p(B does not transmit) p(C does not transmit) p(D does not transmit)= p(1 – p) (1 – p)(1-p) = p(1 – p)3Hence, p(A succeeds for first time in slot 5)= (1 – p(A))4 p(A) = (1 – p(1 – p)3)4 p(1 – p)3b)p(A succeeds in slot 4) = p(1-p)3p(B succeeds in slot 4) = p(1-p)3p(C succeeds in slot 4) = p(1-p)3p(D succeeds in slot 4) = p(1-p)3p(either A or B or C or D succeeds in slot 4) = 4 p(1-p)3(because these events are mutually exclusive)c)p(some node succeeds in a slot) = 4 p(1-p)3p(no node succeeds in a slot) = 1 - 4 p(1-p)3Hence, p(first success occurs in slot 3) = p(no node succeeds in first 2 slots) p(some node succeeds in 3rd slot) = (1 - 4 p(1-p)3)2 4 p(1-p)3d)efficiency = p(success in a slot) =4 p(1-p)3Problem 12Problem 13The length of a polling round is)/(poll d R Q N +.The number of bits transmitted in a polling round is NQ . The maximum throughput therefore isQR d R d R Q N NQ poll poll +=+1)/( Problem 14a), b) See figure below.c)1. Forwarding table in E determines that the datagram should be routed to interface 192.168.3.002.2. The adapter in E creates and Ethernet packet with Ethernet destination address 88-88-88-88-88-88.3. Router 2 receives the packet and extracts the datagram. The forwarding table in this router indicates that the datagram is to be routed to 198.162.2.002.4.Router 2 then sends the Ethernet packet with the destination address of 33-33-33-33-33-33 and source address of 55-55-55-55-55-55 via its interface with IP address of 198.162.2.003.5.The process continues until the packet has reached Host B.a)ARP in E must now determine the MAC address of 198.162.3.002. Host E sendsout an ARP query packet within a broadcast Ethernet frame. Router 2 receives the query packet and sends to Host E an ARP response packet. This ARP response packet is carried by an Ethernet frame with Ethernet destination address 77-77-77-77-77-77.Problem 15a)No. E can check the subnet prefix of Host F’s IP address, and then learn that F ison the same LAN. Thus, E will not send the packet to the default router R1. Ethernet frame from E to F:Source IP = E’s IP addressDestination IP = F’s IP addressSource MAC = E’s MAC addressDestination MAC = F’s MAC addressb)No, because they are not on the same LAN. E can find this out by checking B’s IPaddress.Ethernet frame from E to R1:Source IP = E’s IP addressDestination IP = B’s IP addressSource MAC = E’s MAC addressDestination MAC = The MAC address of R1’s interface connecting to Subnet 3.c)Switch S1 will broadcast the Ethernet frame via both its interfaces as the receivedARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router R1 also receives this ARP request message, but R1 won’t forward the message to Subnet 3.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switch S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Lets call the switch between subnets 2 and 3 S2. That is, router R1 between subnets 2 and 3 is now replaced with switch S2.a) No. E can check the subnet prefix of Host F’s IP address, and then learn that F is on the same LAN segment. Thus, E will not send the packet to S2. Ethernet frame from E to F: Source IP = E’s IP address Destination IP = F’s IP address Source MAC = E’s MAC addressDestination MAC = F’s MAC addressb) Yes, because E would like to find B’s MAC address. In this case, E will send an ARP query packet with destination MAC address being the broadcast address. This query packet will be re-broadcast by switch 1, and eventually received by Host B. Ethernet frame from E to S2: Source IP = E’s IP address Destination IP = B’s IP address Source MAC = E’s MAC addressDestination MAC = broadcast MAC address: FF-FF-FF-FF-FF-FF.c) Switch S1 will broadcast the Ethernet frame via both its interfaces as the received ARP frame’s destination address is a broadcast address. And it learns that Aresides on Subnet 1 which is connected to S1 at the interface connecting to Subnet 1. And, S1 will update its forwarding table to include an entry for Host A.Yes, router S2 also receives this ARP request message, and S2 will broadcast this query packet to all its interfaces.B won’t send ARP query message asking for A’s MAC address, as this address can be obtained from A’s query message.Once switc h S1 receives B’s response message, it will add an entry for host B in its forwarding table, and then drop the received frame as destination host A is on the same interface as host B (i.e., A and B are on the same LAN segment).Problem 17Wait for 51,200 bit times. For 10 Mbps, this wait is12.51010102.5163=⨯⨯bps bitsmsecFor 100 Mbps, the wait is 512 μsec.At 0=t A transmits. At 576=t , A would finish transmitting. In the worst case, B begins transmitting at time t=324, which is the time right before the first bit of A’s frame arrives at B. At time t=324+325=649 B 's first bit arrives at A . Because 649> 576, A finishes transmitting before it detects that B has transmitted. So A incorrectly thinks that its frame was successfully transmitted without a collision.Problem 19Because A 's retransmission reaches B before B 's scheduled retransmission time (805+96), B refrains from transmitting while A retransmits. Thus A and B do not collide. Thus the factor 512 appearing in the exponential backoff algorithm is sufficiently large.Problem 20a) Let Y be a random variable denoting the number of slots until a success:1)1()(--==m m Y P ββ,where β is the probability of a success.This is a geometric distribution, which has mean β/1. The number of consecutive wasted slots is 1-=Y X thatββ-=-==11][][Y E X E x1)1(--=N p Np β11)1()1(1-----=N N p Np p Np xefficiency11)1()1(1-----+=+=N N p Np p Np k kxk kb)Maximizing efficiency is equivalent to minimizing x , which is equivalent tomaximizing β. We know from the text that β is maximized at Np 1=.c)efficiency 11)11()11(1-----+=N N NN k k∞→N lim efficiency 1/1/11-+=-+=e k kee k kd) Clearly, 1-+e k kapproaches 1 as ∞→k .Problem 21i) from A to left router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 22-22-22-22-22-22Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from the left router to the right router: Source MAC address: 33-33-33-33-33-33Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from the right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003Problem 22i) from A to switch: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003ii) from switch to right router: Source MAC address: 00-00-00-00-00-00Destination MAC address: 55-55-55-55-55-55Source IP: 111.111.111.001Destination IP: 133.333.333.003iii) from right router to F: Source MAC address: 88-88-88-88-88-88Destination MAC address: 99-99-99-99-99-99Source IP: 111.111.111.001Destination IP: 133.333.333.003111.111.111.00311-11-11-11-11-11122.222.222.00466-66-66-66-66Problem 23If all the 11=9+2 nodes send out data at the maximum possible rate of 100 Mbps, a total aggregate throughput of 11*100 = 1100 Mbps is possible.Problem 24Each departmental hub is a single collision domain that can have a maximum throughput of 100 Mbps. The links connecting the web server and the mail server has a maximum throughput of 100 Mbps. Hence, if the three collision domains and the web server and mail server send out data at their maximum possible rates of 100 Mbps each, a maximum total aggregate throughput of 500 Mbps can be achieved among the 11 end systems.Problem 25All of the 11 end systems will lie in the same collision domain. In this case, the maximum total aggregate throughput of 100 Mbps is possible among the 11 end sytems. Problem 26Problem 27a) The time required to fill 8⋅L bits is.sec 16sec 1012883m LL =⨯⋅b) For ,500,1=L the packetization delay is.sec 75.93sec 161500m m =For ,50=L the packetization delay is.sec 125.3sec 1650m m =c) Store-and-forward delay RL 408+⋅=For 500,1=L , the delay issec 4.19sec 1062240815006μ≈⨯+⋅For ,50=L store-and-forward delay sec 1μ<.d) Store-and-forward delay is small for both cases for typical link speeds. However, packetization delay for 1500=L is too large for real-time voice applications.Problem 28The IP addresses for those three computers (from left to right) in EE department are: 111.111.1.1, 111.111.1.2, 111.111.1.3. The subnet mask is 111.111.1/24.The IP addresses for those three computers (from left to right) in CS department are: 111.111.2.1, 111.111.2.2, 111.111.2.3. The subnet mask is 111.111.2/24.The router’s interface card that connects to port 1 can be configured to contain two sub-interface IP addresses: 111.111.1.0 and 111.111.2.0. The first one is for the subnet of EE department, and the second one is for the subnet of CS department. Each IP address is associated with a VLAN ID. Suppose 111.111.1.0 is associated with VLAN 11, and 111.111.2.0 is associated with VLAN 12. This means that each frame that comes from subnet 111.111.1/24 will be added an 802.1q tag with VLAN ID 11, and each frame that comes from 111.111.2/24 will be added an 802.1q tag with VLAN ID 12. Suppose that host A in EE department with IP address 111.111.1.1 would like to send an IP datagram to host B (111.111.2.1) in CS department. Host A first encapsulates the IP datagram (destined to 111.111.2.1) into a frame with a destination MAC address equal to the MAC address of the router’s interface card that connects to port 1 of the switch. Once the router receives the frame, then it passes it up to IP layer, which decides that the IP datagram should be forwarded to subnet 111.111.2/24 via sub-interface 111.111.2.0. Then the router encapsulates the IP datagram into a frame and sends it to port 1. Note that this frame has an 802.1q tag VLAN ID 12. Once the switch receives the frame port 1, it knows that this frame is destined to VLAN with ID 12, so the switch will send the frame to Host B which is in CS department. Once Host B receives this frame, it will remove the 802.1q tag.Problem 30(The following description is short, but contains all major key steps and key protocols involved.)Your computer first uses DHCP to obtain an IP address. You computer first creates a special IP datagram destined to 255.255.255.255 in the DHCP server discovery step, and puts it in a Ethernet frame and broadcast it in the Ethernet. Then following the steps in the DHCP protocol, you computer is able to get an IP address with a given lease time.A DHCP server on the Ethernet also gives your computer a list of IP addresses of first-hop routers, the subnet mask of the subnet where your computer resides, and the addresses of local DNS servers (if they exist).Since your computer’s ARP cache is initially empty, your computer will use ARP protocol to get the MAC addresses of the first-hop router and the local DNS server.Your computer first will get the IP address of the Web page you would like to download. If the local DNS server does not have the IP address, then your computer will use DNS protocol to find the IP address of the Web page.Once your computer has the IP address of the Web page, then it will send out the HTTP request via the first-hop router if the Web page does not reside in a local Web server. The HTTP request message will be segmented and encapsulated into TCP packets, and then further encapsulated into IP packets, and finally encapsulated into Ethernet frames. Your computer sends the Ethernet frames destined to the first-hop router. Once the router receives the frames, it passes them up into IP layer, checks its routing table, and then sends the packets to the right interface out of all of its interfaces.Then your IP packets will be routed through the Internet until they reach the Web server. The server hosting the Web page will send back the Web page to your computer via HTTP response messages. Those messages will be encapsulated into TCP packets and then further into IP packets. Those IP packets follow IP routes and finally reach yourfirst-hop router, and then the router will forward those IP packets to your computer by encapsulating them into Ethernet frames.Problem 32a) Each flow evenly shares a link’s capacity with other flows traversing that link, then the 80 flows crossing the B to access-router 10 Gbps links (as well as the access router to border router links) will each only receive 10 Gbps / 80 = 125 Mbpsb) In Topology of Figure 5.31, there are four distinct paths between the first and third tier-2 switches, together providing 40 Gbps for the traffic from racks 1-4 to racks 9-12. Similarly, there are four links between second and fourth tier-2 switches, together providing 40 Gbps for the traffic from racks 5-8 to 13-16. Thus the total aggregate bandwidth is 80 Gbps, and the value per flow rate is 1 Gbps.c) Now 20 flows will need to share each 1 Gbps bandwidth between pairs of TOR switches. So the host-to-host bit rate will be 0.5 Gbps.Problem 33a)Both email and video application uses the fourth rack for 0.1 percent of the time.b)Probability that both applications need fourth rack is 0.001*0.001 = 10-6.c)Suppose the first three racks are for video, the next rack is a shared rack for bothvideo and email, and the next three racks are for email. Let's assume that thefourth rack has all the data and software needed for both the email and video applications. With the topology of Figure 5.31, both applications will have enough intra-bandwidth as long as both are not simultaneously using the fourth rack.From part b, both are using the fourth rack for no more than .00001 % of time, which is within the .0001% requirement.。

《计算机网络(第7版)谢希仁著》第一章概述要点及习题总结

《计算机网络(第7版)谢希仁著》第一章概述要点及习题总结

《计算机⽹络(第7版)谢希仁著》第⼀章概述要点及习题总结1. ⽹络分类:电信⽹络、有线电视⽹络、计算机⽹络、移动互联⽹2. 互联⽹的两个重要基本特点:连通性和共享性3. ⽹络由若⼲节点和连接这些节点的链路组成4. ⽹络之间可以通过路由器互连起来,这就构成了⼀个覆盖范围更⼤的计算机⽹络。

这样的⽹络称为互连⽹,习惯上,与⽹络相连的计算机称为主机5. 互联⽹的基础结构发展过程(三个阶段): 第⼀阶段:1969年美国国防部创建第⼀个分组交换⽹ARPARNET。

1983年TCP/IP协议栈成为ARPANET上的标准协议,使得异构⽹络互联,因此⼈们把1983年作为互联⽹的诞⽣时间 第⼆阶段:1985年美国国家科学基⾦会NSF围绕六个⼤型计算机中⼼建设计算机⽹络,分成了三级⽹络:主⼲⽹,区域⽹,校园⽹(企业⽹) 第三阶段:1993年,Albert Gore(时任美国副总统)提出NII(“国家信息基础设施”)计划,旨在以因特⽹为雏形,建⽴“信息⾼速公路”,⾄此,由美国政府资助的NSFNET逐渐被若⼲个商⽤的互联⽹主⼲⽹替代,政府机构不再负责互联⽹的运营和管理,逐渐由互联⽹服务提供商(ISP)接⼿,ISP是进⾏商业活动的公司,ISP向互联⽹管理机构申请很多IP地址,同时拥有通信线路,任何机构和个⼈只要向某个ISP交纳规定的费⽤,就可以通过ISP接⼊互联⽹ 6.互联⽹和互连⽹ 互连⽹:通⽤名词,泛指由多个计算机⽹络互连⽽成的计算机⽹络 互联⽹:专⽤名词,它指当前全球最⼤的、最开放的、由众多⽹络相互连接⽽成的特定互连⽹,它采⽤TCP/IP协议栈作为通信的规则,且其前⾝是美国的ARPANET 7.万维⽹ 互联⽹的迅猛发展始于20世纪90年代,由欧洲原⼦核研究组织CER开发的万维⽹WWW(World Wide Web)被⼴泛应⽤在互联⽹上 8.互联⽹的标准化 1992 年由于互联⽹不再归美国政府管辖,因此成⽴了⼀个国际性组织叫做互联⽹协会 (Internet Society,简称为 ISOC) [W-ISOC],以便对互联⽹进⾏全⾯管理以及在世界范围内促进其发展和使⽤。

《计算机网络·自顶向下方法》第七版第一章课后习题与问题答案

《计算机网络·自顶向下方法》第七版第一章课后习题与问题答案

《计算机⽹络·⾃顶向下⽅法》第七版第⼀章课后习题与问题答案⾮官⽅答案,本⼈已尽最⼤努⼒,使结果正确,如有错误,请⼤佬指出正⽂:1.1节R1在计算机⽹络中,主机就是端系统举例:PC,⼿机,服务器,⽹络电视WEB服务器是⼀种端系统R2A protocol is a rule which describes how an activity should be performed, especially in the field of diplomacy. In diplomatic services and governmental fields of endeavor protocols are often unwritten guidelines. Protocols specify the proper and generally accepted behavior in matters of state and diplomacy, such as showing appropriate respect to a head of state, ranking diplomats in chronological order of their accreditation at court, and so on. One definition is:Protocol is commonly described as a set of international courtesy rules. These well-established and time-honored rules have made it easier for nations and people to live and work together. Part of protocol has always been the acknowledgment of the hierarchical standing of all present. Protocol rules are based on the principles of civility.⼤体意思就是说,外交协议是指在外交事务中,⼀种⾮书⾯形式的,被各国认为是适当的并普遍接受的⼀种国际礼节规则,有助于各国⼈民和谐共处R3如果两个端系统发送和接受信号的标准不同,双⽅可能并不能正常通信。

计算机网络第七版课后练习

计算机网络第七版课后练习

1-01计算机网络可以向用户提供哪些服务?试简述分组交换的要点。

1-02试从多个方面比较电路交换、报文交换和分组交换的主要优缺点。

1-03为什么说互联网是自印刷术以来人类在存储和交换信息领域中的最大变革?1-04互联网基础结构的发展大致分为哪几个阶段?请指出这几个阶段最主要的特点。

1-05简述互联网标准指定的几个阶段。

1-06小写和大写开头的英文名字internet1-07和Internet在意思上有何重要的区别?计算机网络都有哪些类别?各种类别的网络都有哪些特点?1-08计算机网络中的主干网和本地接入网的主要区别是什么? 1-09试在下列条件下比较电路交换和分组交换。

要传送的报文共x(bit)1-10。

从源点到终点共经过k段链路,每段链路的传播时延为d(s),数据率为b(bit/s)。

在电路交换时电路的建立时间为s(s)。

在分组交换时分组长度为p(bit),且各结点的排队等待时间可忽略不计。

问在怎样的条件下,分组交换的时延比电路交换的要小?(提示:画一下草图观察k段链路共有几个结点。

)在上题的分组交换网中,设报文长度和分组长度分别为1-11x和(p+h)(bit),其中p为分组的数据部分的长度,而h为每个分组所带的控制信息固定长度,与p的大小无关。

通信的两端共经过k段链路。

链路的数据率为b(bit/s),但传播时延和结点的排队时间均可忽略不计。

若打算使总的时延为最小,问分组的数据部分长度p应取为多大?(提示:参考图1-13的分组交换部分,观察总的时延由哪几部分组成。

)互联网的两大组成部分(边缘部分与核心部分)的特点是什么?它们的工作方式1-12各有什么特点?客户-服务器方式与P2P1-13对等通信方式的主要区别是什么?有没有相同的地方?计算机网络有哪些常用的性能指标?1-14假定网络的利用率达到了1-1590%。

试估算一下现在的网络时延是它的最小值的多少倍?计算机通信网有哪些非性能特征?非性能特征与性能指标有什么区别?1-168m/s。

计算机网络谢希仁(第七版)复习题(带答案)

计算机网络谢希仁(第七版)复习题(带答案)

第一章1、(09-33)在OSI参考模型中,自下而上第一个提供端到端服务的层次是()A.数据链路层 B.传输层 C.会话层 D.应用层2、(10-33)下列选项中,不属于网络体系结构中所描述的内容是()A.网络的层次B.每一层使用的协议C.协议的内部实现细节D.每一层必须完成的功能3、(10-34)在下图所示的采用“存储-转发”方式分组的交换网络中,所有链路的数据传输速度为100Mbps,分组大小为1000B,其中分组头大小20B,若主机H1向主机H2发送一个大小为980000B的文件,则在不考虑分组拆装时间和传播延迟的情况下,从H1发送到H2接收完为止,需要的时间至少是()A:80ms B:80.08ms C:80.16ms D:80.24ms4、(11-33)TCP/IP参考模型的网络层提供的是()A.无连接不可靠的数据报服务 B.无连接可靠的数据报服务C.有连接不可靠的虚电路服务 D.有连接可靠的虚电路服务5、(12-33)在TCP/IP体系结构中,直接为ICMP提供服务协议的是:()A. PPPB. IPC. UDPD. TCP6、(13-33)在OSI参考模型中,下列功能需由应用层的相邻层实现的是()A.对话管理B.数据格式转换C.路由选择D.可靠数据传输7.(13-35)主机甲通过1个路由器(存储转发方式)与主机乙互联,两段链路的数据传输速率均为10Mbps,主机甲分别采用报文交换和分组大小为10kb的分组交换向主机乙发送1个大小为8Mb(1M=106)的报文。

若忽略链路传播延迟、分组头开销和分组拆装时间,则两种交换方式完成该报文传输所需的总时间分别为()A.800ms、1600msB.801ms、1600msC.1600ms、800ms、 D、1600ms、801ms8.(14-33)在OSI参考模型中,直接为会话层提供服务的是()A.应用层 B表示层 C传输层 D网络层参考答案:第二章1.(09-34)在无噪声情况下,若某通信链路的带宽为3kHz,采用4个相位,每个相位具有4种振幅的QAM调制技术,则该通信链路的最大数据传输速率是() A.12kbps B.24kbps C.48kbps D.96kbps注:1924年奈奎斯特(Nyquist)就推导出在理想低通信道的最高大码元传输速率N (其中W是想低通信道的公式:理想低通信道的最高大码元传输速率C=2W.log2的带宽,N是电平强度)。

计算机网络谢希仁第七版课后答案完整版

计算机网络谢希仁第七版课后答案完整版

计算机网络谢希仁第七版课后答案完整版计算机网络是现代社会中必不可少的一部分,它给人们的生活和工作带来极大的便利。

而在学习计算机网络这门课程时,很多学生可能会遇到一些困难和问题。

此时,一本好的答案参考书就显得非常重要,它可以帮助同学们更好地理解和学习这门课程。

而《计算机网络》谢希仁第七版课后答案完整版就是一本非常好的参考书。

作者:谢希仁谢希仁,清华大学教授,著名计算机科学家,计算机技术领域的权威。

他是一名出色的计算机网络研究者,曾获得国家自然科学奖和国家科技进步奖等众多奖项。

他的著作《计算机网络》被誉为计算机网络领域的圣经,是全世界最受欢迎的计算机网络教材之一。

特点:全面,简明,实用《计算机网络》谢希仁第七版课后答案完整版在内容上涵盖了本书全部章节的所有习题和练习,解答了学生在学习和做习题时可能遇到的各种问题。

同时,它还在解答中尽可能的简明扼要,让同学们能在一个较短的时间内得到答案,提高了学习效率。

另外,书中的答案都是比较实用的,不仅仅只是解答,还包括了相关的知识点和背景介绍,对于帮助学生更好地理解和把握计算机网络知识体系有着很好的作用。

不仅如此,书中还贴心地附有各种习题解答的扫描二维码,方便同学们随时随地进行查阅和使用,省去了不少时间和精力。

使用价值可以说,《计算机网络》谢希仁第七版课后答案完整版是学习计算机网络这门课程的必备之物。

这本参考书不仅能够帮助同学们更好地查漏补缺,巩固知识,而且还能够完善知识点之间的联系,让同学们在理解计算机网络方面更加系统化和全面化。

另外,这本书还能够帮助同学们更好地应对考试。

考试中涉及的很多问题往往与习题相似,而参考书中已经解答了这些问题,因此,同学们往往具备了一定的应对能力,能够在考试中更好地发挥。

结语从本质上讲,《计算机网络》谢希仁第七版课后答案完整版并不是一本“好事者”,而是学习这门课程的学生的“助手”。

通过它,同学们能够更好地学习和掌握计算机网络这门课程,更深入地理解课程知识,提高学习效率和能力。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

计算机网络第七版课后答案完整版第一章:概述
计算机网络是指将地理位置不同的多台计算机和计算机设备连接起来,通过通信线路实现数据传输和资源共享的系统。

本章将介绍计算
机网络的基本概念和发展历程。

1.1 计算机网络的定义及分类
计算机网络是指多台计算机和计算机设备通过通信线路连接起来,
实现数据传输和资源共享。

根据网络规模的大小,可以将计算机网络
分为局域网、城域网和广域网等不同类型。

1.2 计算机网络的发展历程
计算机网络起源于上世纪60年代的ARPANET,随着互联网和移动互联网的普及,计算机网络得以迅速发展。

目前,计算机网络已经成
为人们日常生活和工作中必不可少的一部分。

第二章:物理层
物理层是计算机网络的基础层,主要负责传输实际的数据比特流。

本章将介绍物理层的基本概念和常见的传输介质。

2.1 物理层的功能和特点
物理层主要负责传输比特流,其功能包括编码、调制、解调和传输
介质的选择等。

物理层的特点包括传输速率、传输距离和传输方式等。

2.2 传输介质
传输介质是物理层传输数据的媒介,常见的传输介质包括双绞线、
同轴电缆和光纤等。

不同的传输介质有不同的特点和适用范围。

第三章:数据链路层
数据链路层是计算机网络的第二层,主要负责将物理层的比特流转
化为数据包,并控制数据的传输。

本章将介绍数据链路层的基本概念
和常见的链路控制协议。

3.1 数据链路层的功能和特点
数据链路层主要负责将物理层传输的比特流转化为数据包,并控制
数据的传输。

数据链路层的特点包括可靠性、传输效率和流量控制等。

3.2 链路控制协议
链路控制协议是数据链路层中常用的协议,常见的链路控制协议包
括停止等待协议和滑动窗口协议等。

不同的链路控制协议有不同的传
输方式和效果。

第四章:网络层
网络层是计算机网络的第三层,主要负责实现不同网络之间的数据
传输。

本章将介绍网络层的基本概念和常见的网络互联技术。

4.1 网络层的功能和特点
网络层主要负责实现不同网络之间的数据传输,其功能包括寻址、
路由选择和拥塞控制等。

网络层的特点包括网络互联、分组交换和虚
电路等。

4.2 网络互联技术
网络互联技术是网络层中常用的技术,常见的网络互联技术包括路
由器、交换机和防火墙等。

不同的互联技术有不同的功能和特点。

第五章:传输层
传输层是计算机网络的第四层,主要负责实现进程之间的数据传输。

本章将介绍传输层的基本概念和常见的传输协议。

5.1 传输层的功能和特点
传输层主要负责实现进程之间的数据传输,其功能包括分段、流量
控制和拥塞控制等。

传输层的特点包括面向连接和无连接等。

5.2 传输协议
传输协议是传输层中常用的协议,常见的传输协议包括TCP和
UDP等。

不同的传输协议有不同的传输方式和适用范围。

第六章:应用层
应用层是计算机网络的最高层,主要负责提供应用程序之间的数据
交互。

本章将介绍应用层的基本概念和常见的应用协议。

6.1 应用层的功能和特点
应用层主要负责提供应用程序之间的数据交互,其功能包括数据格式转换、安全认证和错误检测等。

应用层的特点包括面向用户和多样性等。

6.2 应用协议
应用协议是应用层中常用的协议,常见的应用协议包括HTTP、FTP和SMTP等。

不同的应用协议有不同的功能和适用范围。

结语
计算机网络是现代信息社会的基础设施,它的发展对于促进社会经济的发展具有重要意义。

通过学习计算机网络的基本知识和技术,可以更好地理解和应用计算机网络,为实际工作和生活中的问题提供解决方案。

希望本文对读者有所帮助,谢谢阅读。

相关文档
最新文档