欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    2022年2022年计算机网络A 2.pdf

    • 资源ID:34259410       资源大小:200.19KB        全文页数:4页
    • 资源格式: PDF        下载积分:4.3金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要4.3金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    2022年2022年计算机网络A 2.pdf

    1 / 4311015040计算机网络( A 闭)2013-2014-2 1. Multiple Choice (30 points, 1.5 points for each question) (1).Which of the following protocols is an application protocol? _ A.CSMA/CD B. ICMP C. OSPF D. IMAP (2).The 5-PDU is called_ A. message B.segment C.datagram D.frame (3).In OSPF network, a _ belongs to both an area and the backbone. A. internal router B.area border router C.boundary router D.backbone router (4).Which of the following physical media belongs to unguided media? _ A.T wisted-Pair Copper Wire B.Coaxial Cable C.Fiber Optics D.Radio Channels (5).Which of the following protocol layers is not explicitly part of the Internet Protocol Stack? _ A.application layer B.session layer C.data link layer D.transport layer (6).Among the following applications,which one is not suitable for P2P architecture? _ A.?le sharing B.electronic banking C.video streaming D.instant message (7).A user requests a W eb page that consists of some text and 5 images.The browsers cache is empty.For this page, the clients browser:A.sends 1 http request message and receives 1 http response messages. B.sends 1 http request message and receives 6 http response messages. C.sends 5 http request message and receives 5 http response messages. D.sends 6 http request message and receives 6 http response messages. (8).The broadcast address of network 202.115.32.0/23 is_ A.202.115.32.255 B.202.115.33.255 C. 202.115.255.255 D.202.115.32.0 (9).The following networks all are instances of virtual network except _ ATM B. X.25 C. frame relay D. Internet (10).The source IP address in a DHCP discover message is _. A. the IP address of DHCP client B.the IP address of DHCP server C. 255.255.255.255 D.0.0.0.0 (11).If no free buffers in router ,the arriving packets will be:dropped B. queued C. returned D. marked (12).HOL blocking happens on _ A. input port B. output port C.switching frabrics D.all of above (13).Cookies enable _ A. aWeb server to infect a users machine with malware B. a Web server to track a user s activity at its own Web site C.a Web server to know all previous Web pages visited by the user D. aWeb server to learn a user s personal information.(14).Which of the following network is NOT an example of random-access MAP? _. A.Ethernet B.Wi-Fi C. ALOHA D.Bule-tooth DA23名师资料总结 - - -精品资料欢迎下载 - - - - - - - - - - - - - - - - - - 名师精心整理 - - - - - - - 第 1 页,共 4 页 - - - - - - - - - 2 / 4311015040计算机网络( A 闭)2013-2014-2 (15).Which of the following sub-network masks is illegal? _. A. 255.255.32.0 B.255.255.255.128 C.255.255.192.0 D.255.255.254.0 (16).Which of the following IP address belongs to 202.115.32.64/26? _. A. 202.115.32.65 B.202.115.32.1 C. 202.115.32.63 D.202.115.32.128 (17).When a user retrieve his email from mail server,which of following protocols can t be used? A. P OP3 B.HTTP C.SMTP D.IMAP (18).Which of the following services CAN NOT be provided by the data link layer? _ A. flow control B.congestion control C.error detection D. link access (19).Let s assume there is 16-bit piece data 1000 1011 1001 1001,The 8-bit Internet checksum for this data should be _ A. 00100101 B. 00100010 C.11011010 D.11011001 (20).For the data in (19), the CRC is applied to it with generator 1001.Thus the CRC bits should be _ A. 010 B.000 C.111 D.001 2. True or False ( 20 points, 2 point for each statement ) (1). Routers decrement the TTL field in the IP header (2). IP fragment always happens on router. (3). ADSL modem use TDM to tranfer nework signal over telephone network.(4). With nonpersistent HTTP connection, multiple objects can be sent over single TCP connection between client and server . (5). As a distance vector algorithm,OSPF plays an important role in LAN. (6). A gateway router can obtain subnet reachability information from another gateway router in neighboring As by iBGP . (7). Considering the bursty data transfering,a circuit switching network outperforms a packet switching network. (8). In IP datagram, a checksum field in IP header is used to perform error detection for the whole datagram. (9). There is no network congestion in ATM CBR. (10).In recursive query ,the root DNS server will response the local DNS server with the IP address of the TLD server . 3. please answer following questions briefly (33 points) (1)Consider the network with 4 routers below, with link cost labled. Assume that a distance vector algorithm with poisoned reverse is used. Assume that each node initially know only the costs to their neighbors.Assume that the DV algorithm works in a synchronous manner,where all nodes simultaneously receive distance vectors from their neighbors, compute their new distance vectors, and inform their neighbors if their distance vectors have changed. Fig 1 FFFDM:TFFTTDMTTFFOSPFRIPIterative query名师资料总结 - - -精品资料欢迎下载 - - - - - - - - - - - - - - - - - - 名师精心整理 - - - - - - - 第 2 页,共 4 页 - - - - - - - - - 3 / 4311015040计算机网络( A 闭)2013-2014-2 a)Please show the distance entries at the node E (6 points). b)After the DV algorithm converged,the link cost between node C and node D increases from 2 to 10.Once detecting this change, node C has to update its distance vector and inform its new distance vector to B.What s this new distance vector C sends to B?(2 points)c)As soon as B received C s update,B will recalculate its own dista nce vector . If B has computed a new distance vector ,B will inform C this new distance vector.Will B update its distance vector? If so,what s the new distance vector B will send to C?(3 points) d)Let s assume that the network in Figure.1 is an autonomous system in the Internet with AS number 0.Node A is the BGP gateway of this AS.Is A the only router in this network that runs BGP and DV algorithm simultaneously? (2 points) (2)Consider a campus network as shown in Figure 2,where there two routers R1 and R2, a HUB H1,and a switch S1 that connect 3 Ethernet LANs. The numbers (1,2,or 3) besides the routers indicate their interfaces, and the IP address block (e.g.,128.101.0.0/18) near an Ethernet represents the IP address block assigned to the corresponding Ethernet (thus hosts on the Ethernet).Figure 2 a)To make sure each host (from A to F) to access the Internet,what services has to be provided by R2? ( 2 points) b)Suppose host E wants to send an IP datagram packet to host F.Host E will send a packet like below.How does host E knows that it can directly forward the packet to host F instead of asking for its default router R2 to help deliver it.(2 points) The packet from E to F Source MAC Destination MAC Source IP Destination IP Es MAC addressFs MAC addressEs IP addressFs IP addressc)Now suppose host E want to send an IP datagram to A.Let s assume the ARP caches of all the nodes in this network is empty .List the source and destinations IP and MAC addresses of all the frames to transfer this IP datagram from E to A.( 12 points) 名师资料总结 - - -精品资料欢迎下载 - - - - - - - - - - - - - - - - - - 名师精心整理 - - - - - - - 第 3 页,共 4 页 - - - - - - - - - 4 / 4311015040计算机网络( A 闭)2013-2014-2 d)Now suppose host C want to send an IP datagram to A,what are the source and destinations IP and MAC addresses in the frame sent by C and what are the source and destinations IP and MAC addresses in the frame received by A? ( 4 points) 4. Analytic (17 points) Host A wants to send a 12KB file F over a TCP connection. Several assumptions: This TCP connection uses the slow-start congestion control scheme with an initial THRESHOLD value of 4 KB The MSS is 1KB. The receivers advertised window is initially 4 KB.Unless indicated otherwise, all segments were received properly and received in the same order as they were sent The receiver will send ACK immediately, once receiving one data segment. The receiver will buffer all the out-of-ordered segments. It takes the sender 10 ms to “push ” the segment onto the network. This means that if the first data segment is pushed onto the network starting at time 0, then the second segment can started to be pushed onto the network at 10 ms. Unless indicated otherwise, each successfully transmitted segment has a round trip time of exactly 60ms (30 ms each way). This time includes transmission time. The timer on host A of this TCP connection is always set as 100 ms. The seq number and ack number of the first data segment are 0 and 100, respectively. Under the set of assumptions above, Find the seq number, ack number and the time to send of each data segments if: The ACK of the second data segment is slow, taking 50 ms(instead of 30ms as mentioned above). The first transmission of the 4th data segment is not received by the receiver. In the ACKs for the 8thdata segment and subsequently, the receiver s advertised window is reset to 2 KB Sending time seq ack 0 0 100 名师资料总结 - - -精品资料欢迎下载 - - - - - - - - - - - - - - - - - - 名师精心整理 - - - - - - - 第 4 页,共 4 页 - - - - - - - - -

    注意事项

    本文(2022年2022年计算机网络A 2.pdf)为本站会员(Che****ry)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开