µ±Ç°Î»ÖãºÊ×Ò³ > ¼ÆËã»úÍøÂ磨µÚËİ棩¿ÎºóϰÌ⣨ӢÎÄ£©+ϰÌâ´ð°¸£¨ÖÐÓ¢ÎÄ£© - ͼÎÄ
ANDREW S. TANENBAUM Ã룬Լ 533 msec¡£ ------COMPUTER NETWORKS FOURTH EDITION PROBLEM SOLUTIONS 8. A collection of five routers is to be connected in a point-to-point subnet. Collected and Modified By YanZhenXing, Mail To:zxyan@ecnu.cn Between each pair of routers, the designers may put a high-speed line, a Classify: E¨¤Easy, M¨¤Middle, H¨¤Hard£¬D¨¤Delete Green: Important Red: Master Blue: VI Others:Know Grey: Unnecessary Chapter 1 IntroductionProblems 2. An alternative to a LAN is simply a big timesharing system with terminals for all users. Give two advantages of a client-server system using a LAN.(M) ʹÓþÖÓòÍøÄ£ÐÍ¿ÉÒÔÈÝÒ×µØÔö¼Ó½Úµã¡£ Èç¹û¾ÖÓòÍøÖ»ÊÇÒ»Ìõ³¤µÄµçÀ£¬ÇÒ²»»áÒò¸ö±ðµÄʧЧ¶ø±ÀÀ£( ·þÎñ Æ÷)µÄÇé¿öÏ£¬Ê¹ÓþÖÓòÍøÄ£ÐÍ»á¸ü±ãÒË¡£ ʹÓþÖÓòÍø¿ÉÌṩ¸ü¶àµÄ¼ÆËãÄÜÁ¦ºÍ¸üºÃ½»»¥Ê½½Ó¿Ú¡£ 3. The performance of a client-server system is influenced by two network factors: the bandwidth of the network (how many bits/sec it can transport) and the latency (how many seconds it takes for the first bit to get from the client to the server). Give an example of a network that exhibits high bandwidth and high latency. Then give an example of one with low bandwidth and low latency.(E) ºá¹á´ó½µÄ¹âÏËÁ¬½Ó¿ÉÒÔÓкܶàǧÕ×λ/Ãë´ø¿í£¬ µ«ÊÇÓÉÓÚ¹âËÙ¶È´«ËÍÒªÔ½¹ýÊý ǧ¹«ÀʱÑÓ½«Ò²¸ß¡£ Ïà·´£¬Ê¹Óà 56 kbps µ÷ÖÆ½âµ÷Æ÷ºô½ÐÔÚͬһ´óÂ¥ÄڵļÆËã»úÔòÓеʹø¿íºÍ½ÏµÍµÄ ʱÑÓ¡£ 4. Besides bandwidth and latency, what other parameter is needed to give a good characterization of the quality of service offered by a network used for digitized voice traffic?(M) ÉùÒôµÄ´«ÊäÐèÒªÏàÓ¦µÄ¹Ì¶¨Ê±¼ä£¬Òò´ËÍøÂçʱ϶ÊýÁ¿ÊǺÜÖØÒªµÄ¡£´«Êäʱ¼ä¿ÉÒÔ Óñê׼ƫ²î·½Ê½±íʾ¡£Êµ¼ÊÉÏ£¬¶ÌÑÓ³Ùµ«ÊÇ´ó±ä»¯ÐԱȸü³¤µÄÑӳٺ͵ͱ仯ÐÔ¸üÔã¡£ 6. A client-server system uses a satellite network, with the satellite at a height of 40,000 km. What is the best-case delay in response to a request?(E) ÓÉÓÚÇëÇóºÍÓ¦´ð¶¼±ØÐëͨ¹ýÎÀÐÇ£¬Òò´Ë´«Êä×Ü·¾¶³¤¶ÈΪ 160,000 ǧÃס£ÔÚ¿ÕÆø ºÍÕæ¿ÕÖеĹâËÙΪ 300£¬000 ¹«Àï/Ã룬 Òò´Ë×î¼ÑµÄ´«²¥ÑÓ³ÙΪ 160,000/300£¬000
ÀýÈç²ÉÓþµÏñmedium-speed line, a low-speed line, or no line. If it takes 100 ms of computer time 13. What is the principal difference between connectionless communication and to generate and inspect each topology, how long will it take to inspect all of
connection-oriented communication?(E)
them?(E)
½«Â·ÓÉÆ÷³ÆÎª A£¬B£¬C£¬D ºÍ E. ÔòÓÐ 10 Ìõ¿ÉÄܵÄÏß·£»AB, AC, AD, AE, BC, BD, BE, CD, CE,ºÍ DE ÿÌõÏß·ÓÐ 4 410 = 1,048,576¡£
¼ì²éÿ¸öÍØÆËÐèÒª 100 ms£¬È«²¿¼ì²é×ܹ²ÐèÒª 104,857. 6 Ã룬»òÕßÉÔ΢³¬¹ý 29 ¸öСʱ¡£
9. A group of 2n - 1 routers are interconnected in a centralized binary tree, with a router at each tree node. Router i communicates with router j by sending a message to the root of the tree. The root then sends the message back down to j. Derive an approximate expression for the mean number of hops per message for large n, assuming that all router pairs are equally likely.(H)
ÕâÒâζ×Å£¬´Ó·ÓÉÆ÷µ½Â·ÓÉÆ÷µÄ·¾¶³¤¶ÈÏ൱ÓÚ·ÓÉÆ÷µ½¸ùµÄÁ½±¶¡£ ÈôÔÚÊ÷ÖУ¬
¸ùÉî¶ÈΪ 1£¬Éî¶ÈΪ n£¬´Ó¸ùµ½µÚ n ²ãÐèÒª n-1 Ìø£¬ÔڸòãµÄ·ÓÉÆ÷Ϊ 0.50¡£ ´Ó¸ùµ½ n-1 ²ãµÄ·¾¶ÓÐ router µÄ 0.25 ºÍ n--2 Ìø²½¡£ Ϊ£º
l = 0.5*(n-1)+0.25*(n-2)+0.125*(n-3)¡¡ ½á¹û»¯¼òΪ l£½n£2£¬Æ½¾ù·ÓÉ·¾¶Îª 2n-4¡£
10. A disadvantage of a broadcast subnet is the capacity wasted when multiple hosts attempt to access the channel at the same time. As a simplistic example,
suppose that time is divided into discrete slots, with each of the n hosts attempting to use the channel with probability p during each slot. What fraction of the slots are wasted due to collisions?(H) Çø·Ö n-2 ʼþ¡£ ʼþ 1 µ½ n ÓÉÖ÷»ú³É¹¦µØ¡¢Ã»ÓгåÍ»µØÊ¹ÓÃÕâÌõÐŵÀµÄʼþ×é ³É¡£ ÕâЩ¿ÉÄÜÐÔµÄʼþµÄ¸ÅÂÊΪ p(1£p)n-1¡£Ê¼þ n+1 ÊÇÒ»¸ö¿ÕÏеÄÐŵÀ£¬Æä¸ÅÂÊ Îª(1- p)n¡£Ê¼þ n+2 ÊÇÒ»¸ö³åÍ»¡£ÓÉÓÚʼþ n+2 »¥³â£¬ËüÃÇ¿ÉÄÜ·¢ÉúµÄʼþ±ØÐëͳ
Ò»ºÏ¼Æ¡£ ³åÍ»µÄ¿ÉÄÜÐÔµÈÓÚÄÇЩС²¿·ÖµÄ²ÛµÄÀË·Ñ£¬Ö»ÊÇ 1£ np(1£p)n-1£ (1£p)n
11. What are two reasons for using layered protocols?(M) ͨ¹ýÐÒé·Ö²ã¿ÉÒÔ°ÑÉè¼ÆÎÊÌâ»®·Ö³É½ÏСµÄÒ×ÓÚ´¦ÀíµÄƬ¶Î ·Ö²ãÒâζ×Åijһ²ãµÄÐÒéµÄ¸Ä±ä²»»áÓ°Ïì¸ß²ã»òµÍ²ãµÄÐÒé
Òò´Ë£¬Â·¾¶³¤¶È l
ÖÖ¿ÉÄÜÐÔ(3
ËÙ¶È»òÕß²»ÊÇÏß·)£¬ÍØÆËµÄ×ÜÊýΪ
Á¬½ÓµÄÇëÇó¡£µÚ¶þ½×¶Î£¬Ö»ÓÐÔÚÁ¬½Ó³É¹¦½¨Á¢Ö®ºó£¬±£³ÖÁ¬½Ó״̬£¬²ÅÄÜ¿ªÊ¼Êý¾Ý
Ö÷ÒªµÄÇø±ðÓÐÁ½Ìõ¡£ 17. In some networks, the data link layer handles transmission errors by
ÆäÒ»£ºÃæÏòÁ¬½ÓͨÐÅ·ÖΪÈý¸ö½×¶Î£¬µÚÒ»Êǽ¨Á¢Á¬½Ó£¬Ôڴ˽׶Σ¬·¢³öÒ»¸ö½¨Á¢ requesting damaged frames to be retransmitted. If the probability of a frame's being
´«Êä¡£µÚÈý½×¶Î£¬µ±Êý¾Ý´«ÊäÍê±Ï£¬±ØÐëÊÍ·ÅÁ¬½Ó¡£¶øÎÞÁ¬½ÓͨÐÅûÓÐÕâô¶à½×¶Î£¬
ËüÖ±½Ó½øÐÐÊý¾Ý´«Êä¡£ Æä¶þ£ºÃæÏòÁ¬½ÓµÄͨОßÓÐÊý¾ÝµÄ±£ÐòÐÔ£¬ ¶øÎÞÁ¬½ÓµÄͨÐŲ»Äܱ£Ö¤½ÓÊÕÊý¾ÝµÄ
˳ÐòÓë·¢ËÍÊý¾ÝµÄ˳ÐòÒ»Ö¡£ 14. Two networks each provide reliable connection-oriented service. One of them offers a reliable byte stream and the other offers a reliable message stream. Are these identical? If so, why is the distinction made? If not, give an example of how they differ.(E)
²»Ïàͬ¡£ÔÚ±¨ÎÄÁ÷ÖУ¬ÍøÂç±£³Ö¶Ô±¨Îı߽çµÄ¸ú×Ù£»¶øÔÚ×Ö½ÚÁ÷ÖУ¬ÍøÂç²»×öÕâ ÑùµÄ¸ú×Ù¡£ÀýÈ磬һ¸ö½ø³ÌÏòÒ»ÌõÁ¬½ÓдÁË 1024 ×Ö½Ú£¬ÉÔºóÓÖдÁËÁíÍâ 1024 ×Ö½Ú¡£ ÄÇô½ÓÊÕ·½¹²¶ÁÁË 2048 ×Ö½Ú¡£¶ÔÓÚ±¨ÎÄÁ÷£¬½ÓÊÜ·½½«µÃµ½Á½¸ö±¨ÎÄ¡£Ã¿¸ö±¨ÎÄ 1024
×Ö½Ú¡£ ¶ø¶ÔÓÚ×Ö½ÚÁ÷£¬±¨Îı߽粻±»Ê¶±ð¡£½ÓÊÕ·½°ÑÈ«²¿µÄ 2048 ¸ö×Ö½Úµ±×÷Ò»¸ö
ÕûÌ壬ÔÚ´ËÒѾÌåÏÖ²»³öÔÏÈÓÐÁ½¸ö±¨ÎĵÄÊÂʵ¡£ 15. What does ''negotiation'' mean when discussing network protocols? Give an example.(E)
ÐÉ̾ÍÊÇÒªÈÃË«·½¾ÍÔÚͨÐÅÆÚ¼ä½«Ê¹ÓõÄijЩ²ÎÊý»òÊýÖµ´ï³ÉÒ»Ö¡£×î´ó·Ö×鳤 ¶È¾ÍÊÇÒ»¸öÀý×Ó¡£
16. In Fig. 1-19, a service is shown. Are any other services implicit in this figure? If so, where? If not, why not?(E)
·þÎñÊÇÓÉ k ²ãÏò k£«1 ²ãÌṩµÄ¡£
·þÎñ±ØÐëÓÉϲã k Ìṩ£¬¼´£¬¶Ô²ã k µÄ·þÎñÊÇÓÉ k- 1 ²ãÌṩµÄ¡£
damaged is p, what is the mean number of transmissions required to send a frame? 21. List two ways in which the OSI reference model and the TCP/IP reference Assume that acknowledgements are never lost.(M) model are the same. Now list two ways in which they differ.£¨M£©
k-1
¼ÙÉèij֡´«µ½µÚ k ´Î²Å´«Êä³É¹¦£¬Æð³õ k-1 ´Î´«Êä½Ô³¢ÊÔʧ°Ü£¬¸ÅÂÊΪ p ,ÏàËÆµã£º¶¼ÊǶÀÁ¢µÄÐÒéÕ»µÄ¸ÅÄ²ãµÄ¹¦ÄÜÒ²´óÌåÏàËÆ¡£ µÚ k
²»Í¬µã£ºOSI ¸üºÃµÄÇø·ÖÁË·þÎñ¡¢½Ó¿ÚºÍÐÒéµÄ¸ÅÄÒò´Ë±È TCP/IP ¾ßÓиüºÃ
´Î´«Êä³É¹¦£¬¸ÅÂÊΪ(1-p) £¬Ôò·¢ËÍÒ»Ö¡³É¹¦µÄƽ¾ù´«Êä´ÎÊýΪ£º
µÄ
Òþ²ØÐÔ£¬Äܹ»±È½ÏÈÝÒ׵ĽøÐÐÌæ»»£»OSI ÊÇÏÈÓеÄÄ£Ð͵ĸÅÄȻºóÔÙ½øÐÐÐÒéµÄ
ʵÏÖ£¬¶ø TCP/IP ÊÇÏÈÓÐÐÒ飬Ȼºó½¨Á¢ÃèÊö¸ÃÐÒéµÄÄ£ÐÍ£»²ã´ÎÊýÁ¿Óвî±ð£»
1. Which of the OSI layers handles each of the following: TCP/IP a. (a) Dividing the transmitted bit stream into frames. ûÓлỰ²ãºÍ±íʾ²ã£¬OSI ²»Ö§³ÖÍøÂ绥Á¬¡£OSI ÔÚÍøÂç²ãÖ§³ÖÎÞÁ¬½ÓºÍÃæÏòÁ¬½Ó
µÄͨÐÅ£¬¶øÔÚ´«Êä²ã½öÓÐÃæÏòÁ¬½ÓµÄͨÐÅ£¬¶ø TCP/IP ÔÚÍøÂç²ã½öÓÐÒ»ÖÖͨÐÅģʽb. (b) Determining which route through the subnet to use.£¨E£©
£¨ÎÞ °Ñ´«ÊäµÄ±ÈÌØÁ÷»®·ÖΪ֡¡ª¡ªÊý¾ÝÁ´Â·²ã
Á¬½Ó£©£¬µ«ÔÚ´«Êä²ãÖ§³ÖÁ½ÖÖģʽ¡£
¾ö¶¨Ê¹ÓÃÄÄÌõ·¾¶Í¨¹ý×ÓÍø¡ª¡ªÍøÂç²ã.
22. What is the main difference between TCP and UDP?£¨E£©
19. If the unit exchanged at the data link level is called a frame and the unit
TCP ÊÇÃæÏòÁ¬½ÓµÄ£¬¶ø UDP ÊÇÒ»ÖÖÊý¾Ý±¨·þÎñ¡£ exchanged at the network level is called a packet, do frames encapsulate packets or
25. When a file is transferred between two computers, two acknowledgement do packets encapsulate frames? Explain your answer.£¨E£©
Ö¡·â×°°ü¡£ µ±Ò»¸ö°üµ½´ïÊý¾ÝÁ´Â·²ãʱ£¬Õû¸öÊý¾Ý°ü£¬°üÀ¨°üÍ·¡¢Êý¾Ý¼°È«²¿strategies are possible. In the first one, the file is chopped up into packets, which are
individually acknowledged by the receiver, but the file transfer as a whole is not ÄÚ
acknowledged. In the second one, the packets are not acknowledged individually,
ÈÝ£¬¶¼ÓÃ×÷Ö¡µÄÊý¾ÝÇø¡£»òÕß˵£¬½«Õû¸ö°ü·Å½øÒ»¸öÐÅ·â(Ö¡)ÀïÃæ£¬( Èç¹ûÄÜ
but the entire file is acknowledged when it arrives. Discuss these two approaches.
×°ÈëµÄ
£¨E£©
»°)¡£
- 2 -
¹²·ÖÏí92ƪÏà¹ØÎĵµ