ImageVerifierCode 换一换
格式:DOC , 页数:7 ,大小:143KB ,
资源ID:4466154      下载积分:5 金币
快捷注册下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/4466154.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请

   平台协调中心        【在线客服】        免费申请共赢上传

权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:0574-28810668;投诉电话:18658249818。

注意事项

本文(宁波大学计算机网络期末试卷(英文).doc)为本站上传会员【二***】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

宁波大学计算机网络期末试卷(英文).doc

1、word完整版)宁波大学计算机网络期末试卷(英文) I. Choose the single correct answer from following choose。 (1.5*20=30) [Correct checked:1。5; Other wise:0] 1.Which physical media has high—speed operation and low error rate:A [] A。Fiber optic cable [] B。Coaxial cable [] C。Twisted pair [] D.Radio 2。If no free buf

2、fers in router, the arriving packets will be: B [] A.dropped [] B。queued [] C。returned [] D.marked 3. Which can provides delay measurement from source to router along end-end Internet path towards destination: A [] A。Ping [] B。Traceroute [] C。Ipconfig [] D。Nslookup 4.In TC

3、P/IP, which layer can make routing of datagrams from source to destination: C [] A。Applicaion [] B.Transport [] C.Network [] D。Data Link 5.Web page consists of ( ) which includes several referenced objects:A [] A.referenced HTML—file [] B.host HTML-file [] C。path HTML-file [] D。base H

4、TML—file 6.What is the default persistent model in HTTP/1.1:C [] A。Nonpersistent HTTP [] B。Persistent without pipelining [] C。Persistent with pipelining [] D。Nonpersistent with pipelining 7.Web server maintains no information about past client requests, so HTTP is:B [] A.stateful [] B.s

5、tateless [] C.satisfied [] D。unsatisfied 8。FTP client browses remote directory by sending commands over: D [] A。connection-less [] B.free connection [] C.data connection [] D。control connection 9.Which can satisfy client request without involving origin server A [] A。Web caches [] B。Wr

6、ite caches [] C.TCP buffer [] D。Router buffer 10。UDP socket identified by:B [] A。two-tuple (source IP address, source port number) [] B.two-tuple (dest IP address, dest port number) [] C.two-tuple (source IP address, dest port number) [] D.two—tuple (dest IP address, source port number)

7、11.In GBN,when receiver receive a out—of-order packet,then discard and re—ACK the packet with: [] A. highest in—order sequence # A [] B. lowest in-order sequence # [] C。 highest in-order port # [] D。 lowest in—order port # 12。In RDT Approachs, which is designed for performance: B [] A. che

8、cksum [] B. pipeline [] C. sequence # [] D. ACK or NAK 13。Queued datagram at front of router's queue prevents others in queue from moving forward is:A [] A.Head-of-the—Line (HOL) blocking [] B。Hops—of-the—Line (HOL) blocking [] C。Head—of-the-List (HOL) blocking [] D.Hops—of-the—List (HOL)

9、blocking 14.What’s a network ? From IP address perspective they can physically reach each other without intervening router and the device interfaces with: C [] A。 same IP address [] B。 same TCP port # [] C。 same network part of IP address [] D. same host part of IP address 15。 Large IP d

10、atagram divided (“fragmented”) within network,it will be reassembled:B [] A. only at last router [] B。 only at final destination [] C. only at next router [] D. maybe at next router 16。Which is not a common Intra-AS routing protocols:D [] A。RIP: Routing Information Protocol [] B。OSPF: Open Sh

11、ortest Path First [] C.IGRP: Interior Gateway Routing Protocol [] D。ICMP: Interior Control Message Protocol 17.Which is not a MAC Random Access protocol in Ethernet: D [] A.SCMA [] B。SCMA/CA [] C.SCMA/CD [] D。Slotted SCMA 18.In DHCP client-server scenario, which message has DHCP-options fie

12、ld:D [] A. host broadcasts “DHCP discover” [] B。 DHCP server responds with “DHCP offer” [] C。 host requests IP address: “DHCP request” [] D。 DHCP server sends address: “DHCP ack” 19。How to determine MAC address of host B, If knowing host B’s IP address?A [] A.ARP [] B。RARP [] C.RAP []

13、D。RIP 20. Which device can break subnet into LAN segments: C [] A.IP mask [] B.NAT [] C.Router [] D.Switch II. Choose the multiple correct answer from following choose。 (2*10=20) [All correct checked:2; Part correct checked:1; No checked:0; Full checked:0] 1.Which is the part of network

14、structure: ABD [] A.network edge [] B。network core [] C.network user [] D。access networks 2.How to connect end systems to edge router? BCD [] A。Microsoft access networks [] B。Residential access networks [] C。Institutional access networks [] D。Mobile access networks 3.What kind of tra

15、nsport service does an application need? ABC [] A.Data loss [] B。Timing [] C.Bandwidth [] D。Security 4.Electronic Mail three phases of transfer is: ABD [] A.handshaking (greeting) [] B.transfer of messages [] C。opens the 2nd TCP connection [] D.close 5.In TCP Connection Management, in

16、itialize TCP variables include: AB [] A.sequence # [] B.buffers [] C.Sender MTU [] D.RcvWindow 6.How does sender perceive congestion? AB [] A。timeout [] B。3 duplicate ACKs [] C.3 duplicate data [] D.slow start 7.TCP Congestion Control use three mechanisms: ABC [] A。additive incre

17、ase and multiplicative decrease [] B。slow start [] C.Conservative after timeout events [] D。additive decrease and multiplicative increase 8.What are the Key Network—Layer Functions: ABC [] A.forwarding [] B.routing [] C.connection setup [] D.flow control 9。Link Layer Services include:

18、 ABD [] A.Reliable delivery between adjacent nodes [] B。Flow Control between adjacent nodes [] C.Connection Manage [] D.Error Detection and Correction 10.MAC Protocol’s taxonomy, three broad classes is: ABC [] A。Channel Partitioning [] B.Random Access [] C.Taking turns [] D。Peer—to—pe

19、er III. Fill the blank from options. (1。5*16=24) 1)。The network protocols define format , order of message sent and received among network entities, and action taken on message transmission, receipt。 (options: delay / format / policy / order / request / replay / actions t

20、aken / price / interface ) 2).InTCP Congestion Control, after 3 duplicate ACKs CongWin is cut in half and window then grows____linearly___. But after timeout event, CongWin instead set to 1 MSS , window then grows___exponentially____, when it up to a __threshold____ again, then grows line

21、arly. (options: half / double / 1 MSS / 0 MSS / linearly / exponentially / threshold / top / bottom ) 3).Please fill the general format of Http request message: HTTP request message general format 9。[Method ] sp 10.[URL ] sp 11.[version ] 12。[CR LP ] … … 13.[header field name ] :

22、 14。[field value ] 15. [Cr Lf ] 16。 [ Cr Lf ] Entity Body (options: header field name / URL / field value / version / method / Cr Lf/ 200 OK ) IV. Question (26) 1.As follow, LAN1 connect to LAN2 via a router: In session 1, Host A send a HTTP connection to WEB server D,if Host A initial

23、 TCP port 1025,Host D use TCP port 80; In session 2, Host A send a HTTP connection to WEB server B,if Host A initial TCP port 1026,Host B use TCP port 80; Fill it: (9) Session Step Source MAC Destination MAC Source IP Destination IP Source Port# Destination Port# Host A :1025 –〉

24、Host D:80 Host A –〉 ROUTER ROUTER –> Host D Host A :1026 –> Host B:80 Host A –> Host B 2。Read and answer:(17) Two of the most important fields in the TCP segment header are the sequence number field and the acknowledgment number field。 These fields

25、are a critical part of TCP’s reliable data transfer service。 But before discussing how these fields are used to provide reliable data transfer, let us first explain what exactly TCP puts in these fields. TCP views data as an unstructured, but ordered, stream of bytes. TCP’s use of sequence numbe

26、rs reflects this view in that sequence numbers are over the stream of transmitted bytes and not over the series of transmitted segments。 The sequence number for a segment is the byte-stream number of the first byte in the segment. Let’s look at an example。 Suppose that a process in host A wants t

27、o send a stream of data to a process in host B over a TCP connection。 The TCP in host A will implicitly number each byte in the data stream.  Suppose that the data stream consists of a file consisting of 500,000  bytes, that the MSS is 1,000 bytes, and that the first byte of the data stream is numbe

28、red zero。 As shown in Figure 3.5-3, TCP constructs 500 segments out of the data stream. The first segment gets assigned sequence number 0, the second segment gets assigned sequence number 1000, the third segment gets assigned sequence number 2000, and so on。。 Each sequence number is inserted in the

29、sequence number field in the header of the appropriate TCP segment. Figure 3.5-3: Dividing  file data into TCP segments。 Now let us consider acknowledgment numbers。 These are a little trickier than sequence numbers。 Recall that TCP is full duplex, so that host A may be receiving data from hos

30、t B while it sends data to host B (as part of the same TCP connection). Each of the segments that arrive from host B have a sequence number for the data flowing from B to A. The acknowledgment number that host A puts in its segment is sequence number of the next byte host A is expecting from host B.

31、 It is good to look at a few examples to understand what is going on here. Suppose that host A has received all bytes numbered 0 through 535 from B and suppose that it is about to send a segment to host B. In other words, host A is waiting for byte 536 and all the subsequent bytes in host B’s data s

32、tream。 So host A puts 536 in the acknowledgment number field of the segment it sends to B。 As another example, suppose that host A has received one segment from host B containing bytes 0 through 535 and another segment containing bytes 900 through 1,000。  For some reason host A has not yet recei

33、ved bytes 536 through 899。 In this example, host A is still waiting for byte 536 (and beyond) in order to recreate B’s data stream. Thus, A’s next segment to B will contain 536 in the acknowledgment number field。 Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP is

34、said to provide cumulative acknowledgements. This last example also brings up an important but subtle issue. Host A received the third segment (bytes 900 through 1,000) before receiving the second segment (bytes 536 through 899). Thus, the third segment arrived out of order. The subtle issue is:

35、 What does a host do when it receives out of order segments in a TCP connection? Interestingly, the TCP RFCs do not impose any rules here, and leave the decision up to the people programming a TCP implementation. There are basically two choices: either (i) the receiver immediately discards out—of-or

36、der bytes; or (ii) the receiver keeps the out-of—order bytes and waits for the missing bytes to fill in the gaps. Clearly, the latter choice is more efficient in terms of network bandwidth, whereas the former choice significantly simplifies the TCP code. Throughout the remainder of this introductory

37、 discussion of TCP, we focus on the former implementation, that is, we assume that the TCP receiver discards out-of-order segments。 In Figure 3.5。3 we assumed that the initial sequence number was zero。 In truth, both sides of a TCP connection randomly choose an initial sequence number. This is d

38、one to minimize the possibility a segment that is still present in the network from an earlier, already-terminated connection  between two hosts is mistaken for a valid segment  in a later connection between these same two hosts (who also happen to be using the same port numbers as the old connectio

39、n) 。 Question 1: Does TCP's use of sequence numbers over the series of transmitted segments? (3) Question 2: What does the sequence number for a segment means? For example. (4) Question 3: What does the acknowledgment number means, that host A puts in its segment to host B?(3) Question 4: How does TCPs to choose an initial sequence number? (3) Question 5: What does a host do when it receives out of order segments in a TCP connection? (4) (所有答案请填在答题卡上,答在试卷上的答案一律无效)

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服