计算机网络(第五版)答案 英文版 Andrew S.Tanenbaum.docx

上传人:暗伤 文档编号:92997388 上传时间:2023-06-20 格式:DOCX 页数:48 大小:79.02KB
返回 下载 相关 举报
计算机网络(第五版)答案 英文版 Andrew S.Tanenbaum.docx_第1页
第1页 / 共48页
计算机网络(第五版)答案 英文版 Andrew S.Tanenbaum.docx_第2页
第2页 / 共48页
点击查看更多>>
资源描述

《计算机网络(第五版)答案 英文版 Andrew S.Tanenbaum.docx》由会员分享,可在线阅读,更多相关《计算机网络(第五版)答案 英文版 Andrew S.Tanenbaum.docx(48页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、COMPUTER NETWORKSFIFTH EDITIONPROBLEM SOLUTIONSANDREW S. TANENBAUMVrije Universiteit Amsterdam, The NetherlandsandDAVID WETHERALLUniversity of Washington Seattle, WAPRENTICE HALLUpper Saddle River, NJPROBLEM SOLUTIONS1SOLUTIONS TO CHAPTER 1 PROBLEMS1. The dog can carry 21 gigabytes, or 168 gigabits.

2、 A speed of 18 km/hour equals 0.005 km/sec. The time to travel distance x km is x /0.005 = 200x sec, yielding a data rate of 168/200x Gbps or 840/x Mbps. For x 5.6 km, the dog has a higher rate than the communication line.(i) If dogs speed is doubled, maximum value of x is also doubled.(ii) If tape

3、capacity is doubled, value of x is also doubled.(iii) If data rate of the transmission line is doubled, value of x is halved.2. The LAN model can be grown incrementally. If the LAN is just a long cable. it cannot be brought down by a single failure (if the servers are replicated) It is probably chea

4、per. It provides more computing power and better interactive interfaces.3. A transcontinental fiber link might have many gigabits/sec of bandwidth, but the latency will also be high due to the speed of light propagation over thousands of kilometers. In contrast, a 56-kbps modem calling a computer in

5、 the same building has low bandwidth and low latency.4. A uniform delivery time is needed for voice as well as video, so the amount of jitter in the network is important. This could be expressed as the standard deviation of the delivery time. Having short delay but large variability is ac- tually wo

6、rse than a somewhat longer delay and low variability. For financial transaction traffic, reliability and security are very important.5. No. The speed of propagation is 200,000 km/sec or 200 meters/msec. In 10msec the signal travels 2 km. Thus, each switch adds the equivalent of 2 km of extra cable.

7、If the client and server are separated by 5000 km, traversing even 50 switches adds only 100 km to the total path, which is only 2%. Thus, switching delay is not a major factor under these circumstances.6. The request has to go up and down, and the response has to go up and down. The total path leng

8、th traversed is thus 160,000 km. The speed of light in air and vacuum is 300,000 km/sec, so the propagation delay alone is 160,000/300,000 sec or about 533 msec.7. There is obviously no single correct answer here, but the following points seem relevant. The present system has a great deal of inertia

9、 (checks and bal- ances) built into it. This inertia may serve to keep the legal, economic, and social systems from being turned upside down every time a different party comes to power. Also, many people hold strong opinions on controversial social issues, without really knowing the facts of the mat

10、ter. Allowing poorly reasoned opinions be to written into law may be undesirable. The potential45PROBLEM SOLUTIONS FOR CHAPTER 2effects of advertising campaigns by special interest groups of one kind or an- other also have to be considered. Another major issue is security. A lot of people might worr

11、y about some 14-year kid hacking the system and falsifying the results.8. Call the routers A, B, C, D, and E. There are ten potential lines: AB, AC, AD, AE, BC, BD, BE, CD, CE, and DE. Each of these has four possibilities (three speeds or no line), so the total number of topologies is 410 = 1, 048,5

12、76. At 100 ms each, it takes 104,857.6 sec, or slightly more than 29 hours to inspect them all.9. Distinguish n + 2 events. Events 1 through n consist of the corresponding host successfully attempting to use the channel, i.e., without a collision. The probability of each of these events is p(1 - p)n

13、 - 1. Event n + 1 is an idle channel, with probability (1 - p)n. Event n + 2 is a collision. Since these n + 2 events are exhaustive, their probabilities must sum to unity. The probability of a collision, which is equal to the fraction of slots wasted, is then just 1 - np(1 - p)n - 1 - (1 - p)n.10.

14、Among other reasons for using layered protocols, using them leads to break- ing up the design problem into smaller, more manageable pieces, and layering means that protocols can be changed without affecting higher or lower ones. One possible disadvantage is the performance of a layered system is lik

15、ely to be worse than the performance of a monolithic system, although it is extremely difficult to implement and manage a monolithic system.11. In the ISO protocol model, physical communication takes place only in the lowest layer, not in every layer.12. Message and byte streams are different. In a

16、message stream, the network keeps track of message boundaries. In a byte stream, it does not. For ex- ample, suppose a process writes 1024 bytes to a connection and then a little later writes another 1024 bytes. The receiver then does a read for 2048 bytes. With a message stream, the receiver will g

17、et two messages, of 1024 bytes each. With a byte stream, the message boundaries do not count and the re- ceiver will get the full 2048 bytes as a single unit. The fact that there were originally two distinct messages is lost.13. Negotiation has to do with getting both sides to agree on some paramete

18、rs or values to be used during the communication. Maximum packet size is one example, but there are many others.14. The service shown is the service offered by layer k to layer k + 1. Another service that must be present is below layer k, namely, the service offered to layer k by the underlying laye

19、r k - 1.15. The probability, Pk, of a frame requiring exactly k transmissions is the probability of the first k - 1 attempts failing, pk - 1, times the probability of the k-th transmission succeeding, (1 - p). The mean number of transmission is then justkP = k (1 - p )p k - 1 = 1 Skk =1Sk =11 - p16.

20、 With n layers and h bytes added per layer, the total number of header bytes per message is hn, so the space wasted on headers is hn. The total message size is M + nh, so the fraction of bandwidth wasted on headers is hn / (M + hn).17. TCP is connection oriented, whereas UDP is a connectionless serv

21、ice.18. The two nodes in the upper-right corner can be disconnected from the rest by three bombs knocking out the three nodes to which they are connected. The system can withstand the loss of any two nodes.19. Doubling every 18 months means a factor of four gain in 3 years. In 9 years, the gain is t

22、hen 43 or 64, leading to 38.4 billion hosts. That sounds like a lot, but if every television, cellphone, camera, car, and appliance in the world is online, maybe it is plausible. The average person may have dozens of hosts by then.20. If the network tends to lose packets, it is better to acknowledge

23、 each one sep- arately, so the lost packets can be retransmitted. On the other hand, if the net- work is highly reliable, sending one acknowledgement at the end of the entire transfer saves bandwidth in the normal case (but requires the entire file to be retransmitted if even a single packet is lost

24、).21. Having mobile phone operators know the location of users lets the operators learn much personal information about users, such as where they sleep, work, travel and shop. This information might be sold to others or stolen; it could let the government monitor citizens. On the other hand, knowing

25、 the location of the user lets the operator send help to the right place in an emergency. It might also be used to deter fraud, since a person who claims to be you will usually be near your mobile phone.22. The speed of light in coax is about 200,000 km/sec, which is 200 meters/msec. At 10 Mbps, it

26、takes 0.1 msec to transmit a bit. Thus, the bit lasts 0.1 msec in time, during which it propagates 20 meters. Thus, a bit is 20 meters long here.23. The image is 1600 1200 3 bytes or 5,760,000 bytes. This is 46,080,000 bits. At 56,000 bits/sec, it takes about 822.857 sec. At 1,000,000 bits/sec, it t

27、akes 46.080 sec. At 10,000,000 bits/sec, it takes 4.608 sec. At 100,000,000bits/sec, it takes about 0.461 sec. At 1,000,000,000 bits/sec it takes about 46 msec.24. Think about the hidden terminal problem. Imagine a wireless network of five stations, A through E, such that each one is in range of onl

28、y its immediate neighbors. Then A can talk to B at the same time D is talking to E. Wireless networks have potential parallelism, and in this way differ from Ethernet.25. One advantage is that if everyone uses the standard, everyone can talk to everyone. Another advantage is that widespread use of a

29、ny standard will give it economies of scale, as with VLSI chips. A disadvantage is that the political compromises necessary to achieve standardization frequently lead to poor standards. Another disadvantage is that once a standard has been widely adopted, it is difficult to change, even if new and b

30、etter techniques or meth- ods are discovered. Also, by the time it has been accepted, it may be obsolete.26. There are many examples, of course. Some systems for which there is inter- national standardization include compact disc players and their discs, digital cameras and their storage cards, and

31、automated teller machines and bank cards. Areas where such international standardization is lacking include VCRs and videotapes (NTSC VHS in the U.S., PAL VHS in parts of Europe, SECAM VHS in other countries), portable telephones, lamps and lightbulbs (different voltages in different countries), ele

32、ctrical sockets and appliance plugs (every country does it differently), photocopiers and paper (8.5 x 11 inches in the U.S., A4 everywhere else), nuts and bolts (English versus metric pitch), etc.27. This has no impact on the operations at layers k-1 or k+1.28. There is no impact at layer k-1, but

33、operations in k+1 have to be reimple- mented.29. One reason is request or response messages may get corrupted or lost during transmission. Another reason is the processing unit in the satellite may get overloaded processing several requests from different clients.30. Small-sized cells result in larg

34、e header-to-payload overhead. Fixed-size cells result in wastage of unused bytes in the payload.SOLUTIONS TO CHAPTER 2 PROBLEMS1. an = - 1 , bn = 0, c = 1.pn2. A noiseless channel can carry an arbitrarily large amount of information, no matter how often it is sampled. Just send a lot of data per sam

35、ple. For the 4- kHz channel, make 8000 samples/sec. If each sample is 16 bits, the channel can send 128 kbps. If each sample is 1024 bits, the channel can send 8.2 Mbps. The key word here is noiseless. With a normal 4 kHz channel, the Shannon limit would not allow this. A signal-to-noise ratio of 30

36、 dB means S/N = 1000. So, the Shannon limit is about 39.86 kbps.3. Using the Nyquist theorem, we can sample 12 million times/sec. Four-level signals provide 2 bits per sample, for a total data rate of 24 Mbps.4. A signal-to-noise ratio of 20 dB means S/ N = 100. Since log2101 is about 6.658, the Sha

37、nnon limit is about 19.975 kbps. The Nyquist limit is 6 kbps. The bottleneck is therefore the Nyquist limit, giving a maximum channel ca- pacity of 6 kbps.5. To send a T1 signal we need Hlog2(1 + S/ N ) = 1.544 106 with H = 50,000. This yields S/ N = 230 - 1, which is about 93 dB.6. Fiber has many a

38、dvantages over copper. It can handle much higher bandwidth than copper. It is not affected by power surges, electromagnetic interference, power failures, or corrosive chemicals in the air. It does not leak light and is quite difficult to tap. Finally, it is thin and lightweight, resulting in much lo

39、wer installation costs. There are some downsides of using fiber over copper. First, it can be damaged easily by being bent too much. Second, opti- cal communication is unidirectional, thus requiring either two fibers or two frequency bands on one fiber for two-way communication. Finally, fiber in- t

40、erfaces cost more than electrical interfaces.7. Use f = c l / l2 with l = 10-7 meters and l = 10-6 meters. This gives a bandwidth (f) of 30,000 GHz.8. The data rate is 2560 1600 24 60 bps, which is 5898 Mbps. For simpli- city, let us assume 1 bps per Hz. From Eq. (2-3) we get l = l2f/c. We have f =

41、5.898 109, so l = 3.3 10-5 microns. The range of wave- lengths used is very short.9. The Nyquist theorem is a property of mathematics and has nothing to do with technology. It says that if you have a function whose Fourier spectrum does not contain any sines or cosines above f, by sampling the funct

42、ion at a fre- quency of 2f you capture all the information there is. Thus, the Nyquist theorem is true for all media.10. Start with l f = c. We know that c is 3 108 m/s. For l = 1 cm, we get 30 GHz. For l = 5 m, we get 60 MHz. Thus, the band covered is 60 MHz to 30 GHz.11. If the beam is off by 1 mm

43、 at the end, it misses the detector. This amounts to a triangle with base 100 m and height 0.001 m. The angle is one whose tangent is thus 0.00001. This angle is about 0.00057 degrees.12. With 66/6 or 11 satellites per necklace, every 90 minutes 11 satellites pass overhead. This means there is a tra

44、nsit every 491 seconds. Thus, there will be a handoff about every 8 minutes and 11 seconds.13. Transit time = 2 (Altitude/Speed of light). The speed of light in air or vacuum is 300,000 km/sec. This evaluates to 239 msec for GEO, 120 msec for MEO, and 5 msec for LEO satellites.14. The call travels f

45、rom the North Pole to the satellite directly overhead, and then transits through four other satellites to reach the satellite directly above the South Pole. Down it goes down to earth to the South Pole. The total dis- tance traveled is 2 750 + 0.5 circumference at altitude 750 km. Cir- cumference at

46、 altitude 750 km is 2 p (6371 + 750) = 44, 720 km. So, the total distance traveled is 23,860 km. Time to travel this distance= 23860 /300000 = 79.5 msec. In addition, switching occurs at six satellites. So, the total switching time is 60 usec. So, the total latency is about 79.56 msec.15. In NRZ, th

47、e signal completes a cycle at most every 2 bits (alternating 1s and 0s). So, the minimum bandwidth need to achieve B bits/sec data rate is B/2 Hz. In MLT-3, the signal completes a cycle at most every 4 bits (a sequence of 1s), thus requiring at least B/4 Hz to achieve B bits/sec data rate. Finally,

48、in Manchester encoding, the signal completes a cycle in every bit, thus requir- ing at least B Hz to achieve B bits/sec data rate.16. Since 4B/5B encoding uses NRZI, there is a signal transition every time a 1 is sent. Furthermore, the 4B/5B mapping (see Figure 2-21) ensures that a se- quence of consecutive 0s cannot be longer than 3. Thus, in the worst case, the transmitted bits will have a sequence 10001, resulting in a signal transition in 4 bits.17. The number of area codes was 8 2 10, which is 160. The number of prefixes was

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 技术资料 > 技术方案

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁