2022年2022年计算机网络A 2.pdf





《2022年2022年计算机网络A 2.pdf》由会员分享,可在线阅读,更多相关《2022年2022年计算机网络A 2.pdf(4页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、1 / 4311015040计算机网络( A 闭)2013-2014-2 1. Multiple Choice (30 points, 1.5 points for each question) (1).Which of the following protocols is an application protocol? _ A.CSMA/CD B. ICMP C. OSPF D. IMAP (2).The 5-PDU is called_ A. message B.segment C.datagram D.frame (3).In OSPF network, a _ belongs to
2、both an area and the backbone. A. internal router B.area border router C.boundary router D.backbone router (4).Which of the following physical media belongs to unguided media? _ A.T wisted-Pair Copper Wire B.Coaxial Cable C.Fiber Optics D.Radio Channels (5).Which of the following protocol layers is
3、not explicitly part of the Internet Protocol Stack? _ A.application layer B.session layer C.data link layer D.transport layer (6).Among the following applications,which one is not suitable for P2P architecture? _ A.?le sharing B.electronic banking C.video streaming D.instant message (7).A user reque
4、sts a W eb page that consists of some text and 5 images.The browsers cache is empty.For this page, the clients browser:A.sends 1 http request message and receives 1 http response messages. B.sends 1 http request message and receives 6 http response messages. C.sends 5 http request message and receiv
5、es 5 http response messages. D.sends 6 http request message and receives 6 http response messages. (8).The broadcast address of network 202.115.32.0/23 is_ A.202.115.32.255 B.202.115.33.255 C. 202.115.255.255 D.202.115.32.0 (9).The following networks all are instances of virtual network except _ ATM
6、 B. X.25 C. frame relay D. Internet (10).The source IP address in a DHCP discover message is _. A. the IP address of DHCP client B.the IP address of DHCP server C. 255.255.255.255 D.0.0.0.0 (11).If no free buffers in router ,the arriving packets will be:dropped B. queued C. returned D. marked (12).H
7、OL blocking happens on _ A. input port B. output port C.switching frabrics D.all of above (13).Cookies enable _ A. aWeb server to infect a users machine with malware B. a Web server to track a user s activity at its own Web site C.a Web server to know all previous Web pages visited by the user D. aW
8、eb server to learn a user s personal information.(14).Which of the following network is NOT an example of random-access MAP? _. A.Ethernet B.Wi-Fi C. ALOHA D.Bule-tooth DA23名师资料总结 - - -精品资料欢迎下载 - - - - - - - - - - - - - - - - - - 名师精心整理 - - - - - - - 第 1 页,共 4 页 - - - - - - - - - 2 / 4311015040计算机网络
9、( A 闭)2013-2014-2 (15).Which of the following sub-network masks is illegal? _. A. 255.255.32.0 B.255.255.255.128 C.255.255.192.0 D.255.255.254.0 (16).Which of the following IP address belongs to 202.115.32.64/26? _. A. 202.115.32.65 B.202.115.32.1 C. 202.115.32.63 D.202.115.32.128 (17).When a user r
10、etrieve his email from mail server,which of following protocols can t be used? A. P OP3 B.HTTP C.SMTP D.IMAP (18).Which of the following services CAN NOT be provided by the data link layer? _ A. flow control B.congestion control C.error detection D. link access (19).Let s assume there is 16-bit piec
11、e data 1000 1011 1001 1001,The 8-bit Internet checksum for this data should be _ A. 00100101 B. 00100010 C.11011010 D.11011001 (20).For the data in (19), the CRC is applied to it with generator 1001.Thus the CRC bits should be _ A. 010 B.000 C.111 D.001 2. True or False ( 20 points, 2 point for each
12、 statement ) (1). Routers decrement the TTL field in the IP header (2). IP fragment always happens on router. (3). ADSL modem use TDM to tranfer nework signal over telephone network.(4). With nonpersistent HTTP connection, multiple objects can be sent over single TCP connection between client and se
13、rver . (5). As a distance vector algorithm,OSPF plays an important role in LAN. (6). A gateway router can obtain subnet reachability information from another gateway router in neighboring As by iBGP . (7). Considering the bursty data transfering,a circuit switching network outperforms a packet switc
14、hing network. (8). In IP datagram, a checksum field in IP header is used to perform error detection for the whole datagram. (9). There is no network congestion in ATM CBR. (10).In recursive query ,the root DNS server will response the local DNS server with the IP address of the TLD server . 3. pleas
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2022年2022年计算机网络A 2022 计算机网络

限制150内