《计算机网络试题(5页).doc》由会员分享,可在线阅读,更多相关《计算机网络试题(5页).doc(5页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、-1.2.3. 计算机网络试题-第 5 页4. Explain Client-Server model for distributed computing by example.l Client-server model can make computing faster than just use the server to computing and the client just be a browser.For example ,the data stored in a powerful server machine ,and the cilent connected with the
2、 server by internet,it maniplation data at local cilent ,so the server can handle more request from other clients,and the client can make full use of it hardware resource.So the distributed computing can be very fast. 5. Explain Peer-to-Peer model for distributed computing by examplePeer-to-Peer mod
3、el means individuals who form a loose group can communicate with others in the group,everyone in this group can communicate with one or more other people ,and everone can be clients and servers.For example ,if we use BitTorrent to download a film,we download it from other people who also have this s
4、oftware and the resource, not just from one or two server.At the same time ,our resources also be shared and downloaded by other people , it makes the speed of the transmission more faster than before.6. Compare concepts of Broadcasting, Multicasting, Unicasting.Broadcasting: Broadcast systems usual
5、ly allow the possibility of addressing a packet to all destinations by using a special code in the address field. When a packet with this code is transmitted, it is received and processed by every machine on the network.Multicasting:If borad cast systems also support taransmission to a subset of the
6、 machine,it called multicasting. Unicasting:Point-to-point transmission with exactly one sender and exactly one receiver is sometimes called unicasting.7. What are the two generally acceptedangles by which computer networks can be classified? It can be classified from Network node distribution and N
7、etwork Topology.8. Describe some characteristics of the Ethernet. Ethernet often used in local area networks, is the most common type of wired LAN. it use copper wires, optical fibers.and it frame in IEEE802.39. How is a WAN organized? explain packet-switched principle.WAN spans a large geographical
8、 area,often a country or continent,and less lines,In WAN,the hosts and subnet are owned and operated by different people.And before the message be sended,it will be cut into packets,every packetss header be inserted some message about the target address ,and then post them ,be received at each inter
9、mediate router .10. What are two reasons for using layered protocols?It can reduce the design complexity,every layer just need to concern about its own fuction.if the protocols changes,the other layers protocols dont need to change.11. What is the principal difference between connectionless communic
10、ation and connection-oriented communication?Connection-oriented service need to establish a connection and until the connection establish success ,it starts the data transmission.if the transmission stop ,it close the connection,and the data transmission is ordered.Connectionless service :each messa
11、ge carries the full destination address and each one is routed through the intermediate nodes inside the system independent of all the subsequent messages.and the receiver get the messages unordered. 12. Explain the relationship between services and protocols.The service defines what operations the
12、layer is prepared perform on its users ,but doesnt say how these operations are implemented.and its on a low level.The protocol is a set of rules governing the format and meaning of the packets,ormessages that are exchanged by the peer entities within a layer(同一层上的对象)entities use protocols to implem
13、ent(实施) their serevice definitions.13. Which of the OSI layers handles each of the following:(a)Dividing the transmitted bit stream into frames. Data Link Layer(b)Determining which route through the subnet to use. Network Layer14. If the unit exchanged at the data link level is called a frame and th
14、e unit exchanged at the network level is called a packet, do frames encapsulate packets or do packets encapsulate frames? Explain your answer.Do frames encapsulate packets, because the data link level is lower than network level,the packet which from network level neet to be encapsulated in frames d
15、ata header,and the sent to physical layer.15. A system has an n-layer protocol hierarchy(分层协定). Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers? h*n /(M+h*n)16. Suppose the algorithm use
16、d to implement the operations at layer k is changed, how does this impact operations at layers k-1 and k+1?It doesnt influence the layer k+1 and k-1;17. Suppose there is a change in the service (set of operations) provided by layer k, how does this impact services at layers k-1 and k+1? It doesnt in
17、fluence the layer k+1 and k-1;18. List two ways in which the OSI reference model and the TCP/IP reference model are the same. Now list two ways in which they differ.Samethey all need layer for each different level of abstarctioneach layer performs a function.Difference :OSI reference model have seve
18、n level,and tcp/ip just has four level .OSI supports both in the network layer ,tcp/ip supports only connectionless mode in the network layer.19. Please draw a diagram showing the OSI reference model.sorry20. What is the main difference between TCP and UDP.Tcp is connection-oriented protocol.UDP is
19、connectionless protocol.Tcps transmitted message is ordered ,and UDPs not21. When a file is transferred between two computers, two acknowledgement strategies are possible. In the first one, the file is chopped up into packets, which are individually acknowledged by the receiver, but the file transfe
20、r as a whole is not acknowledged. In the second one, the packets are not acknowledged individually, but the entire file is acknowledged when it arrives. Discuss these two approaches.First one :if one packge has error,it dont need to send all the file again,but the size of all transferred message is
21、larger than the second one.Second one:if one packet has error,the whole file need to retransfer again.22. Assume you post a regular letter to a friend, do you think the postal service is a reliable service? if you want to make sure that the letter will arrive at your friends mail box, think of a pro
22、tocol based on the regular letter postal service.Postal service is not a reliable service ,I will send two letters ,one is the message which be encrypted,the other is the key,and each ones header has the message that tell the friend if he just get one letter,then reply me ,and I will send it again,t
23、hats all.if he get all,reply ok to me.else ,I will send two messages again.23. The Internet is made up of a large number of networks. Their arrangement determines the topology of the Internet. A considerable amount of information about the Internet topology is available online. Use a search engine t
24、o find out more about the Internet topology and summarize your finding.Internet topology is the network topology of the Internet.its a representation of the interconnection between directly connected peers in a network. In a physical network topology, peers are ports on devices connected by a physical transmission link. A physical topology corresponds to many logical topologies, each at a different level of abstraction.24. Please visit, make a brief introduction to IEEE 802 LAN/MAN Standards Committee.