




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、C H A P T E R6Computer Networks(Solutions to Review Questions and ProblemsReview QuestionsQ6-1.To make the communication bidirectional, each layer needs to be able to pro-vide two opposite tasks, one in each direction.Q6-2.The identical objects are the two messages: one sent and one received.Q6-3.a.
2、At the application layer, the unit of data is a message.b.At the network layer, the unit of data is a datagram.c.At the data-link layer, the unit of data is a frame.Q6-4. A frame is a link-layer data unit. It encapsulates a data unit coming from the network layer. In this case, the data unit is a da
3、tagram.Q6-5. A user datagram is a transport-layer data unit. It decapsulates a data unit going to the application layer. In this case, the data unit is a message.Q6-6.The data unit should belong to layer 4. In this case, it is a user datagram.Q6-7.a.At the application layer, we normally use a name t
4、o define the destina-tion-computer name and the name of the file we need to access. An exam-ple is something.b.At the network layer, we use two logical addresses (source and destina-tion to define the source and destination computers. These addresses areunique universally.c.At the data-link layer, w
5、e use two link-layer addresses (source and desti-nation to define the source and destination connections to the link.12Q6-8.Probably Alice turned off her desktop, which stopped the FTP server, whenshe left the office. A server process should be running all the time, waiting forclients to access it.Q
6、6-9. A personal computer, such as a desktop or a laptop, is normally used as a cli-ent. If a business needs to use a computer as a server, it should be more power-ful to allow several connections from clients at the same time.Q6-10.In this case, UDP is more appropriate because it does not have the o
7、verhead ofTCP in connection establishment and teardown.Q6-11.Routing cannot be done at the transport layer, because the communication atthe transport layer is one single logical path between the source port and thedestination port. Routing cannot be done at the data-link layer because thecommunicati
8、on at the data-link layer is between two nodes (one single path;there is no need for routing. On the other hand, there are several possible pathsfor a packet between the source host and destination host at the network layer.Routing is the job of selecting one of these paths for the packet.Q6-12.Comm
9、unication at the network layer is host-to-host; communication at thedata-link layer is node-to-node.Q6-13.Dial-up modems use part of the bandwidth of the local loop to transfer data.The latest dial-up modems use the V-series standards such as V.90 (56 kbpsfor downloading and 33.6 kbps for uploading,
10、 and V.92 (56 kbps for down-loading and 48 kbps for uploading.Q6-14. A Bluetooth network is normally a wireless small network that is more suitedto communication in a personal environment; a wireless local area can cover alarger geographical areas such as a building or an office.Q6-15.The period of
11、a signal is the inverse of its frequency: T = 1/f.Q6-16.The amplitude measures the value of the signal at any point.Q6-17.Normally,analog transmission refers to the transmission of analog signalsusing a band-pass channel. Baseband digital or analog signals are converted toa complex analog signal wit
12、h a range of frequencies suitable for the channel.Q6-18.The transmission media is located beneath the physical layer and controlledby the physical layer.Q6-19.The two major categories are guided and unguided media.Q6-20.The three major categories of guided media are twisted-pair, coaxial, andfiber-o
13、ptic cables.ProblemsP6-1.The services provided in part a and part b are the opposite of each other.3a.Layer 1 takes the ciphertext from layer 2, inserts (encapsulates it in anenvelope and sends it.b.Layer 1 receives the mail, removes (decapsulates the ciphertext from theenvelope and delivers it to l
14、ayer 2.P6-2.The services provided in part a and part b are the opposite of each other.a.Layer 2 takes the plaintext from layer 3, encrypts it, and delivers it tolayer 1.b.Layer 2 takes the ciphertext from layer 1, decrypts it, and delivers it tolayer 3.P6-3.In 10 years, the number of hosts becomes a
15、bout six times (1.2010 6.19 the number in 2010. This means the number of hosts connected to the Internet ismore than three billion.P6-4.The system transmits 150 bytes for a 100-byte message. The efficiency is 100/ 150 or 66.66%.P6-5.a.The network layer is responsible for route determination.b.The ph
16、ysical layer is the only layer that is connected to the transmissionmedia.c.The application layer provides services for the end users.P6-6.a.User datagrams are created at the transport layer.b.The data-link layer is responsible for handling frames between adjacentnodes.c.The physical layer is respon
17、sible for transforming bits to electromagneticsignals.P6-7.Figure P6-7 shows the layers. Note that we have not shown the security checking that you need to pass through because it does not have the counter-part when you arrive. It must be included in baggage/checking layer.Figure P6-7Protocol layeri
18、ng in air travelling 4P6-8.The only two layers that need to be changed are the data-link layer and thephysical layer. The new hardware and software need to be installed in all host,routers, and link-layer switches. As long as the new data-link layer can encap-sulate and decapsulate datagrams from th
19、e network layer, there is no need tochange any protocol in the upper three layers. This is one of the characteristicsof the protocol layering.P6-9.The domain of IP addresses is universal. A device directly connected to theInternet needs a unique IP address. The domain of port numbers is local; theycan be repeated. Two computers running the HTTP server process use thesame well-known port number (80; two comp
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025至2030年中國串聯(lián)恒功率電伴熱帶數(shù)據(jù)監(jiān)測研究報告
- 統(tǒng)編版二年級語文下冊期中達標測試卷(提升版)(含答案)
- 2025年《義務(wù)教育小學道德與法治課程標準測試卷2022版》測試題庫及答案
- 2022-2023學年廣東省廣州市天河區(qū)匯景實驗學校七年級(下)期中數(shù)學試卷(含答案)
- 遺產(chǎn)繼承遺囑效力確認合同(2篇)
- 采購與施工分包合同(2篇)
- 物流配送路徑優(yōu)化對比表
- 開幕致辭與企業(yè)愿景演講實錄
- 蘇武牧羊的紅色故事征文
- 抵押房產(chǎn)借款合同
- 大學體驗英語項目組《大學體驗英語綜合教程(1)》(第3版)學習指南【詞匯短語+課文精解+全文翻譯+練習答案】
- DB4412T 25-2023 電動自行車停放充電場所消防安全規(guī)范
- 蘇軾《答黃魯直書》與蘇轍《答黃庭堅書》比較閱讀(附答案解析與譯文)
- 成人機電一體化實習報告
- (完整版)數(shù)字信號處理教案(東南大學)
- 一本書讀懂不良資產(chǎn)
- 2022-2023學年河北省唐山市十縣聯(lián)盟高二下學期期中考試英語試題原卷版+解析版含聽力音頻無聽力原文
- 《飯店服務(wù)與管理》認識飯店的“神經(jīng)中樞”
- GB/T 15856.5-2023六角凸緣自鉆自攻螺釘
- 電子產(chǎn)品質(zhì)量工程技術(shù)與管理高職PPT全套完整教學課件
- 【橡膠工藝】-橡膠履帶規(guī)格
評論
0/150
提交評論