计算机网络系统方法英文版课后习题及解答.doc_第1页
计算机网络系统方法英文版课后习题及解答.doc_第2页
计算机网络系统方法英文版课后习题及解答.doc_第3页
计算机网络系统方法英文版课后习题及解答.doc_第4页
计算机网络系统方法英文版课后习题及解答.doc_第5页
已阅读5页,还剩10页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

第一章(1.2 1.3节)5.Calculate the total time required to transfer a 1,000-KB le in the following cases, assuming an RTT of 100 ms, a packet size of 1-KB data, and an initial 2 RTT of “handshaking” before data is sent. (a) The bandwidth is 1.5 Mbps, and data packets can be sent continuously. (b) The bandwidth is 1.5 Mbps, but after we nish sending each data packet we must wait one RTT before sending the next. (c) The bandwidth is “innite,”meaning that we take transmit time to be zero, and up to 20 packets can be sent per RTT. (d) The bandwidth is innite, and during the rst RTT we can send one packet (211), during the second RTT we can send two packets (221), during the third we can send four (231), and so on. (A justication for such an exponential increase will be given in Chapter 6.) 7. Consider a point-to-point link 2 km in length. At what bandwidth would propagation delay (at a speed of 2 108m/sec) equal transmit delay for 100-byte packets? What about 512-byte packets? 13.How “wide” is a bit on a 1-Gbps link? How long is a bit in copper wire, where the speed of propagation is 2.3 108 m/s? 15.Suppose a 100-Mbps point-to-point link is being set up between Earth and a new lunar colony. The distance from the moon to Earth is approximately 385,000 km, and data travels over the link at the speed of light3 108 m/s. (a) Calculate the minimum RTT for the link. (b) Using the RTT as the delay, calculate the delay bandwidth product for the link. (c) What is the signicance of he delay bandwidth product computed in (b)? (d) A camera on the lunar base takes pictures of Earth and saves them in digital format to disk. Suppose Mission Control on Earth wishes to download the most current image, which is 25 MB. What is the minimum amount of time that will elapse between when the request for the data goes out and the transfer is nished? 18. Calculate the latency (from rst bit sent to last bit received) for the following: (a) A 10-Mbps Ethernet with a single store-and-forward switch in the path, and a packet size of 5,000 bits. Assume that each link introduces a propaga- tion delay of 10 s, and that the switch begins retransmitting immediately after it has nished receiving the packet. (b) Same as (a) but with three switches. (c) Same as (a) but assume the switch implements “cut-through” switching: it is able to begin retransmitting the packet after the rst 200 bits have been received. 第二章(除2.7 2.9 节)1.Show the NRZ, Manchester, and NRZI encodings for the bit pattern shown in Figure 2.46. Assume that the NRZI signal starts out low. 23.Consider an ARQ algorithm running over a 20-km point-to-point ber link. (a) Compute the propagation delay for this link, assuming that the speed of light is 2 108 m/s in the ber. (b) Suggest a suitable timeout value for the ARQ algorithm to use. (c) Why might it still be possible for the ARQ algorithm to time out and retransmit a frame, given this timeout value? 26.The text suggests that the sliding window protocol can be used to implement ow control. We can imagine doing this by having the receiver delay ACKs, that is, not send the ACK until there is free buffer space to hold the next frame. In doing so, each ACK would simultaneously acknowledge the receipt of the last frame and tell the source that there is now free buffer space available to hold the next frame. Explain why implementing ow control in this way is not a good idea. 44.Let A and B be two stations attempting to transmit on an Ethernet. Each has steady queue of frames ready to send; As frames will be numbered A 1, A2 , and so on, and Bs similarly. Let T = 51.2 s be the exponential backoff base unit. Suppose A and B simultaneously attempt to send frame 1, collide, and happen to choose backoff times of 0 T and 1 T, respectively, meaning A wins the race and transmits A 1 while B waits. At the end of this transmission, B will attempt to retransmit B1 while A will attempt to transmit A2 . These rst attempts will collide, but now A backs off for either 0 T or 1 T, while B backs off for time equal to one of 0 T, . . . , 3 T. (a) Give the probability that A wins this second backoff race immediately after this rst collision , that is, As rst choice of backoff time k 51.2 is less than Bs. (b) Suppose A wins this second backoff race. A transmits A 3 , and when it is nished, A and B collide again as A tries to transmit A4 and B tries once more to transmit B1. Give the probability that A wins this third backoff race immediately after the rst collision. (c) Give a reasonable lower bound for the probability that A wins all the re- maining backoff races. (d) What then happens to the frame B1? This scenario is known as the Ethernet capture effect. 48. Repeat the previous exercise, now with the assumption that Ethernet is p -persistent with p = 0.33 (that is, a waiting station transmits immediately with probability p when the line goes idle, and otherwise defers one 51.2-s slot time and repeats the process). Your timeline should meet criterion (1) of the previous problem, but in lieu of criterion (2), you should show at least one collision and at least one run of four deferrals on an idle line. Again, note that many solutions are possible. 第三章(3.1 3.2节)1.Using the example network given in Figure 3.30, give the virtual circuit tables for all the switches after each of the following connections is established. Assume that the sequence of connections is cumulative, that is, the rst connection is still up when the second connection is established, and so on. Also assume that the VCI assignment always picks the lowest unused VCI on each link, starting with 0. (a) Host A connects to host B. (b) Host C connects to host G. (c) Host E connects to host I. (d) Host D connects to host B. (e) Host F connects to host J. (f) Host H connects to host A. 3.For the network given in Figure 3.31, give the datagram forwarding table for each node. The links are labeled with relative costs; your tables should forward each packet via the lowest-cost path to its destination. 5. Consider the virtual circuit switches in Figure 3.33. Table 3.6 lists, for each switch, what port, VCI (or VCI, interface) pairs are connected to other. Connections are bidirectional. List all endpoint-to-endpoint connections. 13. Given the extended LAN shown in Figure 3.34, indicate which ports are not selected by the spanning tree algorithm. 15. Consider the arrangement of learning bridges shown in Figure 3.35. Assuming all are initially empty, give the forwarding tables for each of the bridges B1B4 after the following transmissions: A sends to C. C sends to A. D sends to C. Identify ports with the unique neighbor reached directly from that port, that is, the ports for B1 are to be labeled “A” and “B2.” 17.Consider hosts X, Y, Z, W and learning bridges B1, B2, B3, with initially empty forwarding tables, as in Figure 3.36. (a) Suppose X sends to Z. Which bridges learn where X is? Does Ys network interface see this packet? (b) Suppose Z now sends to X. Which bridges learn where Z is? Does Ys network interface see this packet? (c) Suppose Y now sends to X. Which bridges learn where Y is? Does Zs net- work interface see this packet? (d) Finally, suppose Z sends to Y. Which bridges learn where Z is? Does Ws network interface see this packet? 第四章(4.1 4.2 4.3.1 4.3.5 4.5 节)4.Suppose a TCP message that contains 2,048 bytes of data and 20 bytes of TCP header is passed to IP for delivery across two networks of the Internet (i.e., from the source host to a router to the destination host). The rst network uses 14-byte headers and has an MTU of 1,024 bytes; the second uses 8-byte headers with an MTU of 512 bytes. Each networks MTU gives the size of the largest IP datagram that can be carried in a link layer frame. Give the sizes and offsets of the sequence of fragments delivered to the network layer at the destination host. Assume all IP headers are 20 bytes. 21.Suppose a router has built up the routing table shown in Table 4.14. The router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers R2, R3, or R4. Describe what the router does with a packet addressed to each of the

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论