《计算机网络(简答整理)(共4页).doc》由会员分享,可在线阅读,更多相关《计算机网络(简答整理)(共4页).doc(4页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、精选优质文档-倾情为你奉上5. A factor in the delay of a store-and-forward packet-switching system is how long it takes to store and forward a packet through a switch. If switching time is 10 sec, is this likely to be a major factor in the response of a client-server system where the client is in New York and the
2、 server is in California? Assume the propagation speed in copper and fiber to be 2/3 the speed of light in vacuum.Solution:5. No. The speed of propagation is 200,000 km/sec or 200 meters/sec. In 10sec the signal travels 2 km. Thus, each switch adds the equivalent of 2 km of extra cable. If the clien
3、t and server are separated by 5000 km, traversing even 50 switches adds only 100 km to the total path, which is only 2%. Thus, switching delay is not a major factor under these circumstances.13. What is the principal difference between connectionless communication and connection-oriented communicati
4、on?Solution:13. Connection-oriented communication has three phases. In the establishment phase a request is made to set up a connection. Only after this phase has been successfully completed can the data transfer phase be started and data transported. Then comes the release phase. Connectionless com
5、munication does not have these phases. It just sends the data.18. Which of the OSI layers handles each of the following:a. Dividing the transmitted bit stream into frames.b. Determining which route through the subnet to use.Solution:18. (a) Data link layer. (b) Network layer.21. List two ways in whi
6、ch the OSI reference model and the TCP/IP reference model are the same. Now list two ways in which they differ.Solution:21. Both models are based on layered protocols. Both have a network, transport, and application layer. In both models, the transport service can provide a reliable end-to-end byte
7、stream. On the other hand, they differ in several ways. The number of layers is different, the TCP/IP does not have session or presentation layers, OSI does not support internetworking, and OSI has both connection-oriented and connectionless service in the network layer.22. What is the main differen
8、ce between TCP and UDP?Solution:22. TCP is connection oriented, whereas UDP is a connectionless service.26. Why does ATM use small, fixed-length cells?Solution:26. Small, fixed-length cells can be routed through switches quickly, and completely in hardware. Small, fixed-size cells also make it easie
9、r to build hardware that handles many cells in parallel. Also, they do not block transmission lines for very long, making it easier to provide quality-of-service guarantees.6. What is the difference between a passive star and an active repeater in a fiber network?Solution:6. A passive star has no el
10、ectronics. The light from one fiber illuminates anumber of others. An active repeater converts the optical signal to an electricalone for further processing.9. Is the Nyquist theorem true for optical fiber or only for copper wire?Solution:9. The Nyquist theorem is a property of mathematics and has n
11、othing to do with technology. It says that if you have a function whose Fourier spectrum does not contain any sines or cosines above f, then by sampling the function at a frequency of 2f you capture all the information there is. Thus, the Nyquist theorem is true for all media.29. Why has the PCM sam
12、pling time been set at 125 sec?Solution:29. A sampling time of 125 sec corresponds to 8000 samples per second. According to the Nyquist theorem, this is the sampling frequency needed to capture all the information in a 4 kHz channel, such as a telephone channel.(Actually the nominal bandwidth is som
13、ewhat less, but the cutoff is not sharp.)22. An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed in the Ethernet frame, and if so, how many bytes?Solution:22. The minimum Ethernet frame is 64 bytes, including both addresses
14、in the Ethernet frame header, the type/length field, and the checksum. Since the header fields occupy 18 bytes and the packet is 60 bytes, the total frame size is 78 bytes, which exceeds the 64-byte minimum. Therefore, no padding is used.24. Some books quote the maximum size of an Ethernet frame as
15、1518 bytes instead of 1500 bytes. Are they wrong? Explain your answer.Solution:The payload is 1500 bytes, but when the destination address, source address, type/length, and checksum fields are counted too, the total is indeed 1518.42Briefly describe the difference between store-and-forward and cut-t
16、hrough switches.Solution:A store-and-forward switch stores each incoming frame in its entirety, then examines it and forwards it. A cut-through switch starts to forward incoming frames before they have arrived completely. As soon as the destination address is in, the forwarding can begin.43Store-and
17、-forward switches have an advantage over cut-through switches with respect to damaged frames. Explain what it is.Solution:43. Store-and-forward switches store entire frames before forwarding them. After a frame comes in, the checksum can be verified. If the frame is damaged, it is discarded immediat
18、ely. With cut=through, damaged frames cannot be discarded by the switch because by the time the error is detected, the frame is already gone. Trying to deal with the problem is like locking the barn door after the horse has escaped.45In the switch in the legacy end domain on the right is a VLAN-awar
19、e switch. Would it be possible to use a legacy switch there? If so, how would that work? If not, why not?Solution:45. It would work. Frames entering the core domain would all be legacy frames, so it would be up to the first core switch to tag them. It could do this by using MAC addresses or IP addre
20、sses. Similarly, on the way out, that switch would have to untag outgoing frames.42. The set of IP addresses from 29.18.0.0 to 19.18.128.255 has been aggregated to 29.18.0.0/17. However, there is a gap of 1024 unassigned addresses from 29.18.60.0 to 29.18.63.255 that are now suddenly assigned to a h
21、ost using a different outgoing line. Is it now necessary to split up the aggregate address into its constituent blocks, add the new block to the table, and then see if any reaggregation is possible? If not, what can be done instead?Solution:It is sufficient to add one new table entry: 29.18.0.0/22 f
22、or the new block. If an incoming packet matches both 29.18.0.0/17 and 29.18.0.0./22, the longest one wins. This rule makes it possible to assign a large block to one outgoing line but make an exception for one or more small blocks within its range.27. Give one reason why a firewall might be configur
23、ed to inspect incoming traffic. Give one reason why it might be configured to inspect outgoing traffic. Do you think the inspections are likely to be successful?SolutionIncoming traffic might be inspected for the presence of viruses. Outgoing traffic might be inspected to see if company confidential
24、 information is leaking out. Checking for viruses might work if a good antivirus program is used. Checking outgoing traffic, which might be encrypted, is nearly hopeless against a serious attempt to leak information.29. Suppose an organization uses VPN to securely connect its sites over the Internet
25、. Is there a need for a user, Jim, in this organization to use encryption or any other security mechanism to communicate with another user Mary in the organization.SolutionIf Jim does not want to reveal who he is communicating with to anyone (including his own system administrator, then Jim needs to
26、 use additional security mechanisms. Remember that VPN provides security for communication only over the Internet (outside the organization). It does not provide any security for communication inside the organization. If Jim only wants to keep his communication secure from people outside the company, a VPN is sufficient.专心-专注-专业