华南理工软件学院期末考试-计算机网络B卷

上传人:回**** 文档编号:123688489 上传时间:2022-07-23 格式:DOC 页数:10 大小:261KB
返回 下载 相关 举报
华南理工软件学院期末考试-计算机网络B卷_第1页
第1页 / 共10页
华南理工软件学院期末考试-计算机网络B卷_第2页
第2页 / 共10页
华南理工软件学院期末考试-计算机网络B卷_第3页
第3页 / 共10页
点击查看更多>>
资源描述
姓名 学号 学院 专业 座位号 ( 密 封 线 内 不 答 题 )密封线线_ _ 诚信应考,考试作弊将带来严重后果! 华南理工大学期末考试Computer Networks试卷 (B)注意事项:1. 考前请将密封线内填写清晰; 2. 所有答案请答在答题纸上(注:选择题答案请填入题目前面的表格中); 3考试形式:闭卷; 4. 本试卷共 5 大题,满分100分,考试时间120分钟。题 号12345总分得 分评卷人1. Select the correct choice. (30 scores, every one is 2 scores)NO.123456789101112131415solution(1) Suppose Host A wants to send a file to Host B . The path from Host A to Host B has three links , their rates , , and . Assuming no other traffic in the network , what is the throughput for the file transfer ? ( ) A. B.C. D. (2) The transfer of a web document from one host to another is : ( )A. loss-intolerant and time insensitiveB. loss-tolerant and time sensitiveC. loss-intolerant and time sensitive D. none of the above(3) Ethernet interface addresses ( )A. are assigned at manufacturing time. B. are assigned manually or by DNSC. are generated randomly and checked for uniqueness by broadcasting a messageD. share the same high order bits , which determine the network or subnet in an internetwork.(4) Based on TCP/IP architecture ,which of the following protocol belongs to data-link layer ? ( ) A. HTTP B. IP C. UDP D.PPP(5) Two important reasons that the Internet is organized as a hierarchy of networks for the purposes of routing are ( )A. Least cost and maximum free circuit availabilityB. Message complexity and speed of convergenceC. Scale and administrative autonomy D. Link cost changes and link failure(6) With an exterior routing protocol , which of the following issues generally dominate the routing decisions ? ( )A. Geographical distance between ASsB. PolicyC. Number of ASs traversedD. Current congestion levels in the ASs(7) Which range of port number are reserved for services that are commonly used by applications that run on serves ? ( ) A. 0 to 255. B. 0 to 1023.C. 1024 to 49151. D. 49152 to 65535.(8) Which information is contained in the header of Network Layer to help data delivery? ( )A. port number B. Device physical addressC. Destination hosts IP address D. Virtual connection identifier(9) In internet communication ,IP datagram will go through the source host and routers to reach the destination host , usually ( )A. both source host and routers all know the complete path to the destination host that will be reached by IP datagram. B. source host knows the complete path to destination host that will be reached by IP datagram , but none the intermediate routers. C. the intermediate routers know the complete path to destination host that will be reached by IP datagram , but none the source host. D. neither source host nor the intermediate routers know the complete path to destination host that will be reached by IP datagram.(10) Which combination of network id and subnet mask correctly identifies all IP address form 172.16.128.0 through 172.16.159.255 ? ( )A. 172.16.128.0 255.255.255.224B. 172.16.128.0 255.255.0.0C. 172.16.128.0 255.255.224.0D. 172.16.128.0 255.255.255.192(11) What happens when a node on an Ethernet network is creating a frame and it does not have the destination MAC address ? ( )A. The node drops the frame. B. The node sends out a layer 3 broadcast messages.C. The node sends a message directly to the router for the address.D. The node sends out an ARP request with the destination IP address.(12) Suppose an application generates chunks of 120 bytes of data every second, and each chunk gets encapsulated in a TCP segment and then an IP datagram(no options fields).What percentage of each datagram will contain application data? ( ) A. 80% B. 75% C. 60% D.25%(13) Which statement is true about the CSMA/CD access method that is used in Ethernet ? ( )A. when a device hears a carrier signal and transmits , a collision cannot occur. B. A jamming signal causes only devices that caused the collision to execute a back off algorithm.C. All network devices must listen before transmitting. D. Devices involved in a collision get priority to transmit after the back off period.(14) In the Ethernet two-layer switches, how is the forwarding table established? ( )A. Manual configuration B. Self-learningC. Routing algorithmD. Destination address learning(15) Consider sending a 999 byte datagram into a link that has an MTU of 500 bytes , ( )A. 2 fragments are created with offset field value 0,500, respectivelyB. 3 fragments are created with offset field value 0, 480, 960, respectivelyC. 3 fragments are created with offset field value 0, 60, 120, respectivelyD. None of these above2. Fill the blank. (10 scores, every blank is 1 score )(1) The most important kinds of delay at each node along the path is nodal processing delay , queuing delay , _ , _ .(2) The task of the data link layer is providing data transmission services between _ ; The task of the network layer is providing data transmission services between _ ; and the task of transport layer is providing data transmission services between _.(3) In the TCP , connection establishment of transport layer use method of _ .(4) The head of IP datagram has a _ field , when the value of the field is 0 , the datagram transmitted will be discarded .(5) The routing protocol OSPF is recommended for a intra AS , which is based on _ routing algorithm , and the routing protocol BGP is recommended for inter AS. The routing protocol RIP is based on _ routing algorithm. RIP use _ count as a cost metric ; that is , each link has a cost of 1 . 3. Judge the following questions as true or false. (10 scores, every one is 1 scores)NO.12345678910Solution(T or F)(1) The Traceroute program in the source host will sent a series of ICMP message to determine the route between source host and destination host.(2) At the heart of rdt 3.0s performance problem is the fact that it is a stop-and-wait protocol.(3) When a user request a Web page that consists of some text and two images. For this page, the client will send one request message and receive three response message.(4) UDP is the preferred over TCP for transferring a real-time voice over IP networks.(5) With a window size of 1, SR, GBN are functionally equivalent.(6) When using distance vector route algorithm, the complete network topology information must be known by a router.(7) Emails are delivered to receivers server using POP3 protocol.(8) Collisions will not occur under CSMA/CD MAC protocol.(9) When a TCP segment arrives to a host, the socket to which the segment is directed depends on the destination port number and the destination IP address of the datagram encapsulated the segment.(10) If an Autonomous system learns of 5 different routes to a destination prefix it will announce all 5 routes to its neighbors .4. Answer the following questions briefly. (24 scores)(1) What are the 5 layers in the Internet protocol stack? What are the principal responsibilities of each of these layers? (5 scores)(2) The message is transmitted using the CRC method described in class using the generator polynomial .Please answer the following questions.(5 scores)(3) Suppose Host A sends 4 TCP segments back to Host B over a TCP connection . The first segment has sequence number 56 ; the second has sequence number 216 ; the third has sequence 296 ; the fourth has sequence number 346 with 40 byte of data in it .(5 scores)a) How much byte of data are in the third TCP segment?b) Suppose that the first and the fourth segment arrive at B in turn , but the second and the third segments are lost . What will be the acknowledgment number respectively that Host B sends to Host A for each arriving segment ?c) When Host B receives the second segment and the third segment re-sending by Host A in turn , what will be the acknowledgment number that Host B sends to Host A for each arriving segment.(4) Consider a router that interconnects three subnets : Subnet 1 , Subnet 2 , and Subnet 3 .Suppose all of the interfaces in each of these three subnets are required to belong to 192.168.12.0/24 . Also suppose that Subnet 1 is required to support at least 20 interfaces , Subnet 2 is to support at least 60 interfaces , and Subnet 3 is to support at least 90 interfaces . Provide three network addresses (of form a.b.c.d/x) that satisfy these constraints. (9 scores) 5. Comprehensive Questions (26 scores)(1) Consider an IP datagram being sent from A to B. Give the service and destination Ethernet address as well as the source and destination address of the IP datagram encapsulated within the Ethernet at points (1),(2),(3) . (2) Assume the following graph shows the behavior of a TCP congestion control answer each question with a short discussion justifying your answer .a) Identity the intervals of time when TCP show start is operating .b) Identity the intervals of time when TCP congestion avoidance is operating .c) After 14th transmission round is segment loss detected by triple duplicate ACK or by a timeout? And which version of TCP protocol ( Reno or Tahoe ) is used base on this information ?d) During what transmission round is the 50th segment sent ?e) Assuming a packet loss is detected after the 23rd round by receipt of a triple duplicate ACKs , what will be the value of the congestion window size and threshold ?(3) Consider the following network with the indicated link cost , use Dijkstras shortest-path algorithm to compute the shortest path from node to all network nodes . Show how the algorithm works by drawing a table .
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 管理文书 > 各类标准


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!