没有合适的资源?快使用搜索试试~ 我知道了~
计算机网路英文版课后习题 答案
资源推荐
资源详情
资源评论
1
Chap.1
1. Imagine that you have trained your St. Bernard, Bernie, to carry a box of
three 8mm tapes instead of a flask of brandy. (When your disk fills up, you
consider that an emergency.) These tapes each contain 7 gigabytes. The dog
can travel to your side, wherever you may be, at 18 km/hour. For what range
of distances does Bernie have a higher data rate than a transmission line
whose data rate (excluding overhead) is 150 Mbps?
2. An alternative to a LAN is simply a big timesharing system with terminals
for all users. Give two advantages of a client-server system using a LAN.
3. The performance of a client-server system is influenced by two network
factors: the bandwidth of the network (how many bits/sec it can transport)
and the latency (how many seconds it takes for the first bit to get from the
client to the server). Give an example of a network that exhibits high
bandwidth and high latency. Then give an example of one with low bandwidth
and low latency.
4. Besides bandwidth and latency, what other parameter is needed to give a good
characterization of the quality of service offered by a network used for
digitized voice traffic?
5. A factor in the delay of a store-and-forward packet-switching system is how
long it takes to store and forward a packet through a switch. If switching
time is 10 µsec, is this likely to be a major factor in the response of a
client-server system where the client is in New York and the server is in
California? Assume the propagation speed in copper and fiber to be 2/3 the
speed of light in vacuum.
6. A client-server system uses a satellite network, with the satellite at a
height of 40,000 km. What is the best-case delay in response to a request?
7. In the future, when everyone has a home terminal connected to a computer
network, instant public referendums on important pending legislation will
become possible. Ultimately, existing legislatures could be eliminated, to
let the will of the people be expressed directly. The positive aspects of
such a direct democracy are fairly obvious; discuss some of the negative
aspects.
8. A collection of five routers is to be connected in a point-to-point subnet.
Between each pair of routers, the designers may put a high-speed line, a
medium-speed line, a low-speed line, or no line. If it takes 100 ms of computer
time to generate and inspect each topology, how long will it take to inspect
all of them?
9. A group of 2
n
- 1 routers are interconnected in a centralized binary tree,
with a router at each tree node. Router i communicates with router j by sending
a message to the root of the tree. The root then sends the message back down
to j. Derive an approximate expression for the mean number of hops per message
for large n, assuming that all router pairs are equally likely.
2
10. A disadvantage of a broadcast subnet is the capacity wasted when multiple
hosts attempt to access the channel at the same time. As a simplistic example,
suppose that time is divided into discrete slots, with each of the n hosts
attempting to use the channel with probability p during each slot. What
fraction of the slots are wasted due to collisions?
11. What are two reasons for using layered protocols?
12. The president of the Specialty Paint Corp. gets the idea to work with a local
beer brewer to produce an invisible beer can (as an anti-litter measure).
The president tells her legal department to look into it, and they in turn
ask engineering for help. As a result, the chief engineer calls his
counterpart at the other company to discuss the technical aspects of the
project. The engineers then report back to their respective legal departments,
which then confer by telephone to arrange the legal aspects. Finally, the
two corporate presidents discuss the financial side of the deal. Is this an
example of a multilayer protocol in the sense of the OSI model?
13. What is the principal difference between connectionless communication and
connection-oriented communication?
14. Two networks each provide reliable connection-oriented service. One of them
offers a reliable byte stream and the other offers a reliable message stream.
Are these identical? If so, why is the distinction made? If not, give an
example of how they differ.
15. What does ''negotiation'' mean when discussing network protocols? Give an
example.
16. In Fig. 1-19, a service is shown. Are any other services implicit in this
figure? If so, where? If not, why not?
17. In some networks, the data link layer handles transmission errors by
requesting damaged frames to be retransmitted. If the probability of a
frame's being damaged is p, what is the mean number of transmissions required
to send a frame? Assume that acknowledgements are never lost.
18. Which of the OSI layers handles each of the following:
a. (a) Dividing the transmitted bit stream into frames.
b. (b) Determining which route through the subnet to use.
19. If the unit exchanged at the data link level is called a frame and the unit
exchanged at the network level is called a packet, do frames encapsulate
packets or do packets encapsulate frames? Explain your answer.
20. A system has an n-layer protocol hierarchy. Applications generate messages
of length M bytes. At each of the layers, an h-byte header is added. What
fraction of the network bandwidth is filled with headers?
21. List two ways in which the OSI reference model and the TCP/IP reference model
are the same. Now list two ways in which they differ.
22. What is the main difference between TCP and UDP?
23. The subnet of Fig. 1-25(b) was designed to withstand a nuclear war. How many
bombs would it take to partition the nodes into two disconnected sets? Assume
that any bomb wipes out a node and all of the links connected to it.
3
24. The Internet is roughly doubling in size every 18 months. Although no one
really knows for sure, one estimate put the number of hosts on it at 100
million in 2001. Use these data to compute the expected number of Internet
hosts in the year 2010. Do you believe this? Explain why or why not.
25. When a file is transferred between two computers, two acknowledgement
strategies are possible. In the first one, the file is chopped up into packets,
which are individually acknowledged by the receiver, but the file transfer
as a whole is not acknowledged. In the second one, the packets are not
acknowledged individually, but the entire file is acknowledged when it
arrives. Discuss these two approaches.
26. Why does ATM use small, fixed-length cells?
27. How long was a bit on the original 802.3 standard in meters? Use a transmission
speed of 10 Mbps and assume the propagation speed in coax is 2/3 the speed
of light in vacuum.
28. An image is 1024 x 768 pixels with 3 bytes/pixel. Assume the image is
uncompressed. How long does it take to transmit it over a 56-kbps modem
channel? Over a 1-Mbps cable modem? Over a 10-Mbps Ethernet? Over 100-Mbps
Ethernet?
29. Ethernet and wireless networks have some similarities and some differences.
One property of Ethernet is that only one frame at a time can be transmitted
on an Ethernet. Does 802.11 share this property with Ethernet? Discuss your
answer.
30. Wireless networks are easy to install, which makes them inexpensive since
installation costs usually far overshadow equipment costs. Nevertheless,
they also have some disadvantages. Name two of them.
31. List two advantages and two disadvantages of having international standards
for network protocols.
32. When a system has a permanent part and a removable part (such as a CD-ROM
drive and the CD-ROM), it is important that the system be standardized, so
that different companies can make both the permanent and removable parts and
everything still works together. Give three examples outside the computer
industry where such international standards exist. Now give three areas
outside the computer industry where they do not exist.
33. Make a list of activities that you do every day in which computer networks
are used. How would your life be altered if these networks were suddenly
switched off?
34. Find out what networks are used at your school or place of work. Describe
the network types, topologies, and switching methods used there.
35. The ping program allows you to send a test packet to a given location and
see how long it takes to get there and back. Try using ping to see how long
it takes to get from your location to several known locations. From thes data,
plot the one-way transit time over the Internet as a function of distance.
It is best to use universities since the location of their servers is known
very accurately. For example, berkeley.edu is in Berkeley, California,
4
mit.edu is in Cambridge, Massachusetts, vu.nl is in Amsterdam, The
Netherlands, www.usyd.edu.au is in Sydney, Australia, and www.uct.ac.za is
in Cape Town, South Africa.
36. Go to IETF's Web site, www.ietf.org, to see what they are doing. Pick a project
you like and write a half-page report on the problem and the proposed
solution.
37. Standardization is very important in the network world. ITU and ISO are the
main official standardization organizations. Go to their Web sites,
www.itu.org and www.iso.org, respectively, and learn about their
standardization work. Write a short report about the kinds of things they
have standardized.
38. The Internet is made up of a large number of networks. Their arrangement
determines the topology of the Internet. A considerable amount of information
about the Internet topology is available on line. Use a search engine to find
out more about the Internet topology and write a short report summarizing
your findings.
5
Chap.2
1. Compute the Fourier coefficients for the function f(t) = t (0 ≦ t ≦ 1).
2. A noiseless 4-kHz channel is sampled every 1 msec. What is the maximum data
rate?
3. Television channels are 6 MHz wide. How many bits/sec can be sent if
four-level digital signals are used? Assume a noiseless channel.
4. If a binary signal is sent over a 3-kHz channel whose signal-to-noise ratio
is 20 dB, what is the maximum achievable data rate?
5. What signal-to-noise ratio is needed to put a T1 carrier on a 50-kHz line?
6. What is the difference between a passive star and an active repeater in a
fiber network?
7. How much bandwidth is there in 0.1 micron of spectrum at a wavelength of 1
micron?
8. It is desired to send a sequence of computer screen images over an optical
fiber. The screen is 480 x 640 pixels, each pixel being 24 bits. There are
60 screen images per second. How much bandwidth is needed, and how many
microns of wavelength are needed for this band at 1.30 microns?
9. Is the Nyquist theorem true for optical fiber or only for copper wire?
10. In Fig. 2-6 the lefthand band is narrower than the others. Why?
11. Radio antennas often work best when the diameter of the antenna is equal to
the wavelength of the radio wave. Reasonable antennas range from 1 cm to 5
meters in diameter. What frequency range does this cover?
12. Multipath fading is maximized when the two beams arrive 180 degrees out of
phase. How much of a path difference is required to maximize the fading for
a 50-km-long 1-GHz microwave link?
13. A laser beam 1 mm wide is aimed at a detector 1 mm wide 100 m away on the
roof of a building. How much of an angular diversion (in degrees) does the
laser have to have before it misses the detector?
14. The 66 low-orbit satellites in the Iridium project are divided into six
necklaces around the earth. At the altitude they are using, the period is
90 minutes. What is the average interval for handoffs for a stationary
transmitter?
15. Consider a satellite at the altitude of geostationary satellites but whose
orbital plane is inclined to the equatorial plane by an angleφ. To a
stationary user on the earth's surface at north latitudeφ, does this
satellite appear motionless in the sky? If not, describe its motion.
16. How many end office codes were there pre-1984, when each end office was named
by its three-digit area code and the first three digits of the local number?
Area codes started with a digit in the range 2–9, had a 0 or 1 as the second
digit, and ended with any digit. The first two digits of a local number were
always in the range 2–9. The third digit could be any digit.
17. Using only the data given in the text, what is the maximum number of telephones
that the existing U.S. system can support without changing the numbering plan
剩余37页未读,继续阅读
资源评论
cryzzchen
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 爱依克签批屏KY系列BS架构二次开发包,采用Websocket通信协议,内含驱动服务与开发文档,支持H5页面签名,PDF文件签名、指纹采集捺印以及摄像头拍摄和二代证身份身份信息读取
- Aspera高效文件传输产品技术解析与应用
- STM32DS3231硬件I2C读写,基于HAL库
- double数据做乘法保留两位小数的处理办法.txt
- 详细解读:毕业设计项目及写作技巧全程指南
- 学生成绩管理系统软件界面
- js判断时间多久之前.txt
- Temporal注解的作用.txt
- 五行与商业:古代智慧的探索与传承.docx
- 04747《Java语言程序设计(一)》真题试题 2019 -2021
- 处理苹果手机倒计时功能异常.txt
- HarmonyOS-ArkTS语言-购物商城的实现
- 导出表格报错net.sf.excelutils.ExcelException.txt
- 判断对象不为空的方法参考.txt
- Python爬虫技术入门与实战指南
- C++程序设计 课件PPT
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功