計算機(jī)網(wǎng)絡(luò)自頂向下方法英文版答案_第1頁
計算機(jī)網(wǎng)絡(luò)自頂向下方法英文版答案_第2頁
計算機(jī)網(wǎng)絡(luò)自頂向下方法英文版答案_第3頁
計算機(jī)網(wǎng)絡(luò)自頂向下方法英文版答案_第4頁
計算機(jī)網(wǎng)絡(luò)自頂向下方法英文版答案_第5頁
已閱讀5頁,還剩87頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、Computer Networking: A Top-Down ApproachFeaturing the Internet, 3rd EditionSolutions to Review Questions and ProblemsNote: These solutions are incomplete. Complete solutions will be available by 1 September 2005Version Date: July 1, 2004This document contains the solutions to review questions and pr

2、oblems for the 3rd edition of Computer Networking: A Top-Down Approach Featuring the Internet by Jim Kurose and Keith Ross. These solutions are being made available to instructors ONLY. Please do NOT copy or distribute this document to others (even other instructors). Please do not post any solution

3、s on a publicly-available Web site. We ll be happy to provide a copy (up-to-date) of this solution manual ourselves to anyone who asks.All material ? copyright 1996-2004 by J.F. Kurose and K.W. Ross. All rights reservedChapter 1 Review Questions1. There is no differenee. Throughout this text, the wo

4、rds“ host ” and “ end systemused interchangeably. End systems include PCs, workstations, Web servers, mailservers, Intern et-c onn ected PDAs, WebTVs, etc.2. Suppose Alice, an ambassador of country A wants to invite Bob, an ambassador ofcountry B, over for dinner. Alice doesn t simply just call Bob

5、on the phone and say,“come to our dinner table now ” .Instead, she calls Bob and suggests a date and time. Bob may respond by saying he s not available that particular date, but he is available ano ther date. Alice and Bob con ti nue to send “ messages” back and forth un til they agree on a date and

6、 time. Bob the n shows up at the embassy on the agreed date, hopefully not more than 15 minutes before or after the agreed time. Diplomatic protocols also allow for either Alice or Bob to politely can cel the en gageme nt if they have reas on able excuses.3. A networking program usually has two prog

7、rams, each running on a different host, com muni cat ing with each other. The program that in itiates the com muni cati on is the clie nt. Typically, the clie nt program requests and receives services from the server program.4. The Internet provides its applications a connection-oriented service (TC

8、P) and a conn ecti onl ess service (UDP). Each Internet applicati on makes use of one these two services. The two services will be discussed in detail in Chapter 3. Some of the prin ciple characteristics of the connection-orie nted service are:Two end-systems first“ handshake ” before either starts

9、to send application data tothe other.Provides reliable data transfer, i.e., all application data sent by one side of the connection arrives at the other side of the connection in order and without any gaps.*Provides flow control, i.e., it makes sure that neither end of a connection overwhelms the bu

10、ffers in the other end of the conn ecti on by sending to many packets to fast.*Provides con gestio n con trol, i.e., regulates the amount of data that an applicati on can send in to the n etwork, helpi ng to preve nt the Internet from en teri ng a state of grid lock.The prin ciple characteristics of

11、 connectionl ess service are: No han dshak ing No guara ntees of reliable data tran sfer No flow control or con gesti on con trol5. Flow control and congestion control are two distinet control mechanisms with distinct objectives. Flow con trol makes sure that n either end of a connection overwhelms

12、the buffers in the other end of the connection by sending to many packets to fast. Con gesti on con trol regulates the amount of data that an applicati on can send into the n etwork, helpi ng to preve nt con gesti on in the n etwork core (i.e., in the buffers in then etwork routers).6. The Internets

13、 6onnection-oriented service provides reliable data transfer by using ack no wledgeme nts and retra nsmissi ons. Whe n one side of the connection does n t receive an ack no wledgeme nt (from the other side of the connection) for a packet it tran smitted, it retra nsmits the packet.7. A circuit-switc

14、hed network can guarantee a certain amount of end-to-end bandwidth for the duration of a call. Most packet-switched networks today (including the Intern et) cannot make any en d-to-e nd guara ntees for ban dwidth.8. In a packet switched network, the packets from different sources flowing on a link d

15、o not follow any fixed, pre-defined pattern. In TDM circuit switching, each host gets the same slot in a revolving TDM frame.9. At time to the sending host begins to transmit. At time t1 = L/R1, the sending host completes tran smissi on and the en tire packet is received at the router (no propagati

16、on delay). Because the router has the entire packet at time t1, it can begin to transmit the packet to the receiving host at time t1. At time t 2 = t1 + L/R 2, the router completes transmission and the entire packet is received at the receiving host (again, no propagati on delay). Thus, the en d-to-

17、e nd delay is L/R+ L/R2.10. In a VC network, each packet switch in the network core maintains connection state information for each VC passing through it. Some of this connection state information is maintained to a VC-number translation table. (See page 25)11. The cons of VCs include (i) the need t

18、o have a signaling protocol to set-up and tear- dow n the VCs; (ii) the n eed to mai ntai n conn ecti on state in the packet switches. For the pros, some researchers and engineers argue that it is easier to provide QoS services - such as services that guara nteea mi nimum tran smissi on rate or serv

19、ices that guara ntee maximum en d-to-e nd packet delawhe n VCs are used.12.1. Dial-up modem over teleph one line: reside ntial; 2. DSL over teleph one line: residential or small office; 3. Cable to HFC: residential; 4. 100 Mbps switched Etherent: company; 5. Wireless LAN: mobile; 6. Cellular mobile

20、access (for example, WAP): mobile13. A tier-1 ISP connects to all other tier-1 ISPs; a tier-2 ISP connects to only a few of the tier-1 ISPs. Also, a tier-2 ISP is a customer of one or more tier-114. A POP is a group of one or more routers in an ISPs network at which routers in other ISPs can connect

21、. NAPs are localized networks at which many ISPs (tier-1, tier-2 and lower-tier ISPs) can interconnect.15. HFC bandwidth is shared among the users. On the downstream channel, all packets emanate from a single source, namely, the head end. Thus, there are no collisions in the downstream channel.16. E

22、thernet LANs have transmission rates of 10 Mbps, 100 Mbps, 1 Gbps and 10 Gbps. For an X Mbps Ethernet (where X = 10, 100, 1,000 or 10,000), a user can continuously transmit at the rate X Mbps if that user is the only person sending data. If there are more than one active user, then each user cannot

23、continuously transmit at X Mbps.17. Ethernet most commonly runs over twisted-pair copper wire and “ thin ” coaxial cable. It also can run over fibers optic links and thick coaxial cable.18. Dial up modems: up to 56 Kbps, bandwidth is dedicated; ISDN: up to 128 kbps, bandwidth is dedicated; ADSL: dow

24、nstream channel is .5-8 Mbps, upstream channel is up to 1 Mbps, bandwidth is dedicated; HFC, downstream channel is 10-30 Mbps and upstream channel is usually less than a few Mbps, bandwidth is shared.19. The delay components are processing delays, transmission delays, propagation delays, and queuing

25、 delays. All of these delays are fixed, except for the queuing delays, which are variable.20. Five generic tasks are error control, flow control, segmentation and reassembly, multiplexing, and connection setup. Yes, these tasks can be duplicated at different layers. For example, error control is oft

26、en provided at more than one layer.21. The five layers in the Internet protocol stack are from top to bottom the application layer, the transport layer, the network layer, the link layer, and the physical layer. The principal responsibilities are outlined in Section 2. application-layer messa

27、ge: data which an application wants to send and passed onto the transport layer; transport-layer segment: generated by the transport layer and encapsulatesapplication-layer message with transport layer header; network-layer datagram: encapsulatestransport-layer segment with a network-layer header; l

28、inklayer frame: encapsulates network-layer datagram with a link-layer header.23. Routers process layers 1 through 3. (This is a little bit of a white lie, as modern routers sometimes act as firewalls or caching components, and process layer four as well.) Link layer switches process layers 1 through

29、 2. Hosts process all five layers.Chapter 1 ProblemsProblem 1.There is no single right answer to this question. Many protocols would do the trick. Heres a simple answer below:Messages from ATM machine to ServerMsg namepurposeHELO Let server know that there is a card in the ATM machineATM card transm

30、its user ID to ServerPASSWD BALANCEWITHDRAWL BYEUser enters PIN, which is sent to serverUser requests balanceUser asks to withdraw money user all doneMessages from Server to ATM machine (display)Msg namepurposePASSWDOKAsk user for PIN (password)last requested operation (PASSWD, WITHDRAWL) OKERRlast

31、requested operation (PASSWD, WITHDRAWL) in ERRORAMOUNT BYEsent in response to BALANCE request user done, display welcome screen at ATMCorrect operation:clientserverHELO (userid) -PASSWD -WITHDRAWL -(check if valid userid)PASSWD(check password)OK (password is OK)AMOUNT check if enough $ to cover with

32、drawlOKBYEIn situation when theres not enough money:(check if valid userid) PASSWD (check password) OK (password is OK)AMOUNT check if enough $ to coverERR (not enough funds)BYEHELO (userid) -PASSWD -WITHDRAWL -withdrawl-Problem 2.a) A circuit-switched network would be well suited to the application

33、 described, because the application involves long sessions with predictable smooth bandwidth requirements. Since the transmission rate is known and not bursty, bandwidth can be reserved for each application session circuit with no significant waste. In addition, we need not worry greatly about the o

34、verhead costs of setting up and tearing down a circuit connection, which are amortized over the lengthy duration of a typical application session.b) Given such generous link capacities, the network needs no congestion control mechanism. In the worst (most potentially congested) case, all the applica

35、tions simultaneously transmit over one or more particular network links. However, since each link offers sufficient bandwidth to handle the sum of all of the applications data rates, no congestion (very little queueing) will occur.Problem 3.a) We can n connections between each of the four pairs of a

36、djacent switches. This gives a maximum of 4n connections.b) We can n connections passing through the switch in the upper-right-hand corner and another n connections passing through the switch in the lower-left-hand corner, giving a total of 2n connections.Problem 4.Tollbooths are 100 km apart, and t

37、he cars propagate at 100km/hr. A tollbooth services a car at a rate of one car every 12 seconds.(a) There are ten cars. It takes 120 seconds, or two minutes, for the first tollbooth to service the 10 cars. Each of these cars have a propagation delay of 60 minutes before arriving at the second tollbo

38、oth. Thus, all the cars are lined up before the second tollbooth after 62 minutes. The whole process repeats itself for traveling between the second and third tollbooths. Thus the total delay is 124 minutes. (b) Delay between tollbooths is 7*12 seconds plus 60 minutes, i.e., 61 minutes and 24 second

39、s. The total delay is twice this amount, i.e., 122 minutes and 48 seconds.Problem 5.a) The time to transmit one packet onto a link is (L h)/ R. The time to deliver the packet over Q links isQ(L h)/R. Thus the total late ncy is ts Q(L h) / R.b)Q(L 2h)/ Rc) Because there is no store-a nd-forward delay

40、s at the links, the total delay ists +(h + L)/R.Problem 6.a) dprop =m/s seco nds.b) dtrans 二 L/R sec on ds.c) dend-to-end =(m/s L / R) sec on ds.d) The bit is just leav ing Host A.e) The first bit is in the link and has not reached Host B.f) The first bit has reached Host B.g) Wantm 二丄 S100T 2.5 108

41、 = 893 km.R 28 10Problem 7.Consider the first bit in a packet. Before this bit can be transmitted, all of the bits in the packet must be gen erated. This requires48 8小3 sec=6msec.64 10The time required to tran smit the packet isPropagati on delay = 2 msec.The delay un til decod ing is6msec +384 sec

42、+ 2msec = 8.384msecA similar an alysis shows that all bits experie nee a delay of 8.384 msec.48 81 106sec=384丄 sec.Problem 8.a) 10 users can be supported because each user requires one tenth of the ban dwidth.c)opn(i-p40 40P E Xj10 =P40j -4j -1j Sb) B Sd) S B467513232323234675131. Source port number

43、 y and destination port number x.2. An application developer may not want its application to use TCP scongestiondesigners of IP telephony and IP videoconference applications choose to run theirapplicati ons over UDP because they want to avoid TCPsome applications do not need the reliable data transf

44、er provided by TCP.3. Yes. The application developer can put reliable data transfer into the application layer protocol. This would require a sig ni fica nt amount of work and debugg ing, however.4. a) false b) false c) true d) false e) true f) false g) false5. a) 20 bytes b) ack number = 906. 3 seg

45、me nts. First segme nt: seq = 43, ack =80; Second segme nt: seq = 80, ack = 44 ; Third segme nt; seq = 44, ack = 817. R/28. False, it is set to half of the current value of the congestion window.Chapter 3 ProblemsProblem 1.destination port nu mberse) Yes.f) No.Problem 2.Suppose the IP addresses of t

46、he hosts A, B, and C are a, b, c, respectively. (Note that a,b,c are disti net.)To host A: Source port =80, source IP address = b, dest port = 26145, dest IP address = a.loonu o 1To host C, left process: Source port =80, source IP address = b, dest port = 7532, dest IP address = cTo host C, right pr

47、ocess: Source port =80, source IP address = b, dest port = 26145, dest IP address = cProblem 3.0 10 10 10 10 1 1 1 0 0 0 01 1 0 0 0 1 0 1On es compleme nt = 1 1 1 0 1 1 1 0.To detect errors, the receiver adds the four words (the three original words and the checksum). If the sum contains a zero, the

48、 receiver knows there has been an error. All on e-bit errors will be detected, but two-bit errors can be un detected (e.g., if the last digit of the first word is con verted to a 0 and the last digit of the sec ond word is conv erted to a 1).Problem 4.Suppose the sender is in state“ Wait for call 1

49、from above” and the receiver (the receivshow n in the homework problem) is in state“ Wait for 1 from below. ” The sen der senda packet with sequenee number 1, and transitions to“ Wait for ACK or NAK 1,” waitingfor an ACK or NAK. Suppose now the receiver receives the packet with sequenee number 1 cor

50、rectly, sends an ACK, and transitions to state “ Waitfor 0 from below, ” waiting for a data packet with sequencenumber 0. However, the ACK is corrupted.When the rdt2.1 sender gets the corrupted ACK, it resends the packet with sequence number 1. However, the receiver is waiting for a packet with sequ

51、ence number 0 and (as show n in the home work problem) always sends a NAK whe n it does nt get a packet with sequencenumber 0. Hence the sender will always be sending a packet with sequence number 1, and the receiver will always be NAKing that packet. Neither will progress forward from that state.Pr

52、oblem 5.To best an swer this questi on, con sider why we n eeded seque ncenu mbers in the first place. We saw that the sen der n eeds seque nce nu mbers so that the receiver can tell if aaWait fordata packet is a duplicate of an already received data packet. In the case of ACKs, the sender does not

53、need this info (i.e., a sequence number on an ACK) to tell detect a duplicate ACK. A duplicate ACK is obvious to the rdt3.0 receiver, since when it has received the original ACK it transitioned to the next state. The duplicate ACK is not the ACK that the sender needs and hence is ignored by the rdt3

54、.0 sender.Problem 6.The sender side of protocol rdt3.0 differs from the sender side of protocol 2.2 in that timeouts have been added. We have seen that the introduction of timeouts adds the possibility of duplicate packets into the sender-to-receiver data stream. However, the receiver in protocol rd

55、t.2.2 can already handle duplicate packets. (Receiver-side duplicates in rdt 2.2 would arise if the receiver sent an ACK that was lost, and the sender then retransmitted the old data). Hence the receiver in protocol rdt2.2 will also work as the receiver in protocol rdt 3.0.Problem 7.Suppose the prot

56、ocol has been in operation for some time. The sender is in state ait for call from above ” (top left hand corner) and the receiver is in state below ” . The scenarios for corrupted data and corrupted ACK are shown in Figure 1.CorrupteddataCorruptedACKProblem 8.Here, we add a timer, whose value is gr

57、eater than the known round-trip propagation delay. We add a timeout eve nt to the“ Wait for ACK or NAK0 ” and “ Wait for ACK or NAK1states. If the timeout eve nt occurs, the most rece ntly tran smitted packet is retra nsmitted.Let us see why this protocol will still work with the rdt2.1 receiver.Sup

58、pose the timeout is caused by a lost data packet, i.e., a packet on the sender- to-receiver channel. In this case, the receiver never received the previous transmission and, from the receivers viewpoint, if the timeout retransmission is received, it look exactly the same as if the orig in al tran sm

59、issi on is being received.*Suppose now that an ACK is lost. The receiver will eventually retransmit the packet on a timeout. But a retransmission is exactly the same action that is take if an ACK is garbled. Thus the sen ders react ion is the same with a loss, as with a garbled ACK. The rdt 2.1 rece

60、iver can already han dle the case of a garbled ACK.Packet garbled, receiver resends last ACK (A1)Figure 1: rdt 3.0 scenarios: corrupted data, corrupteACKold versio n of MO accepted!Problem 9.The protocol would still work, since a retransmission would be what would happen if the packet received with

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論