77范文网 - 专业文章范例文档资料分享平台

习题课(3)

来源:网络收集 时间:2019-01-05 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

a. The segments sent from A to S.

b. The segments sent from B to S. c. The segments sent from S to A. d. The segments sent from S to B.

e. If A and B are different hosts, is it possible that the source port number in the segments from A to S is the same as that from B to S? f. How about if they are the same host?

11. Consider Figure 3.5. What are the source and destination port values in the segments flowing

from the server back to the clients' processes? What are the IP addresses in the

network-layer datagram carrying the transport-layer segments?

12. Consider the GBN protocol with a sender window size of 3 and a sequence number range of

1,024. Suppose that at time r, the next in-order packet that the receiver is expecting has a sequence number of t. Assume that the medium does not reorder messages. Answer the following questions:

a. What are the possible sets of sequence numbers inside the sender's window at time t? Justify your answer.

b. What are all possible values of the ACK field in all possible messages currently propagating back to the sender at time r? Justify your answer.

13. Answer true or false to the following questions and briefly justify your answer:

a. With the SR protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window

b. With GBN, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.

c. The alternating-bit protocol is the same as the SR protocol with a sender and receiver window size of 1.

d. The alternating-bit protocol is the same as the GBN protocol with a sender and receiver window size of 1.

14. Host A and B are communicating over a TCP connection, and Host B has already received

from A all bytes up through byte 358. Suppose Host A then sends two segments to Host B back-to-back. The first and second segments contain 50 and 80 bytes of data, respectively. In

the first segment, the sequence number is 359, the source port number is 1028, and the destination port number is 80. Host B sends an acknowledgement whenever it receives a segment from Host A.

a. In the second segment sent from Host A to B, what are the sequence number, source port number, and destination port number?

b. If the first segment arrives before the second segment, in the acknowledgement of the first arriving segment, what is the acknowledgment number, the source port number, and the destination port number?

c. If the second segment arrives before the first segment, in the acknowledgement of the first arriving segment, what is the acknowledgment number?

d. Suppose the two segments sent by A arrive in order at B. The first acknowledgement is lost and the second acknowledgement arrives after the first timeout interval. Draw a timing diagram, showing these segments and all other segments and acknowledgements sent. (Assume there is no additional packet loss.) For each segment in your figure, provide the

sequence number and the number of bytes of data; for each acknowledgement that you add, provide the acknowledgement number.

15. Host A and B are directly connected with a 200 Mbps link. There is one TCP connection

between the two hosts, and Host A is sending to Host B an enormous file over this connection. Host A can send application data into the link at 100 Mbps but Host B can read

out of its TCP receive buffer at a maximum rate of 50 Mbps. Describe the effect of TCP flow control.

16. In Section 3.5.4, we saw that TCP waits until it has received three duplicate ACKs before

performing a fast retransmit. Why do you think the TCP designers chose not to perform a fast

retransmit after the first duplicate ACK for a segment is received? 17. Consider the following plot of TCP window size as a function of time.

Assuming TCP Reno is the protocol experiencing the behavior shown above, answer the following questions. In all cases, you should provide a short discussion justifying your answer. a. Identify the intervals of time when TCP slow start is operating.

b. Identify the intervals of time when TCP congestion avoidance is operating.

c. After the 16th transmission round, is segment loss detected by a triple duplicate ACK or by a timeout?

d. After the 22nd transmission round, is segment loss detected by a triple duplicate ACK or by a timeout?

e. What is the initial value of Threshold at the first transmission round? f. What is the value of Threshold at the 18th transmission round? g. What is the value of Threshold at the 24th transmission round?

h. During what transmission round is the 70th segment sent?

i. Assuming a packet loss is detected after the 26th round by the receipt of a triple duplicate ACK, what will be the values of the congestion window size and of Threshold?

18. Host A is sending an enormous file to Host B over a TCP connection. Over this connection

there is never any packet loss and the timers never expire. Denote the transmission rate of

the link connecting Host A to the Internet by R bps. Suppose that the process in Host A is capable of sending data into its TCP socket at a rate S bps, where S = 10*R. Further suppose that the TCP receive buffer is large enough to hold the entire file, and the send buffer can hold only one percent of the file. What would prevent the process in Host A from continuously passing data to its TCP socket at rate S bps? TCP flow control? TCP congestion control? Or something else? Elaborate.

Chapter 4

1. What is the difference between routing and forwarding?

2. What are the two most important network-layer functions in a datagram network? What are

the three most important network-layer functions in a virtual-circuit network? 3. Do the routers in both datagram networks and virtual-circuit networks use forwarding tables?

If so, describe the forwarding tables for both classes of networks. 4. Describe how packet loss can occur at input ports. Describe how packet loss at input ports

can be eliminated (without using infinite buffers). 5. Describe how packet loss can occur at output ports.

6. What is HOL blocking? Does it occur in input ports or output ports? 7. What is the 32-bit binary equivalent of the IP address 223.1.3.27?

8. Do routers have IP addresses? If so, how many?

9. Is it necessary that every autonomous system use the same intra-AS routing algorithm? Why or why not?

10. Consider Figure 4.35. Starting with the original table in D, suppose that D receives from A

the following advertisement:

Will the table in D change? If so how?

11. Why are different inter-AS and intra-AS protocols used in the Internet?

12. Consider a datagram network using 32-bit host addresses. Suppose a router has five links,

numbered 0 through 4, and packets are to be forwarded to the link interfaces as follows:

Destination Address Range Link Interface

11100000 00000000 00000000 00000000

Through 0 11100000 00000000 11111111 11111111

11100000 00000001 00000000 00000000

Through 1 11100000 00000001 11111111 11111111

11100000 00000010 00000000 00000000

Through 2

11100000 11111111 11111111 11111111

11100001 00000000 00000000 00000000

Through 3

11100001 11111111 11111111 11111111

Otherwise 4

a. Provide a forwarding table that has four entries, uses longest prefix matching, and forwards packets to the correct link interfaces.

b. Describe how your forwarding table determines the appropriate link interface for datagrams with destination addresses:

11001000 10010001 01010001 01010101 11100000 10101101 11000011 00111100

11100001 10000000 00010001 01110111

13. Consider a datagram network using 4 bit host addresses. Suppose a router uses longest prefix

matching and has the following forwarding table: Prefix Match 00 01 10 11 Interface 0 1 2 3 For each of the four interfaces, give the associated range of destination host addresses and the number of addresses in the range. (14、15、16可选讲)

14. Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3.

Suppose all of the interfaces in each of these three subnets are required to have the prefix

220.2.240/120. Also suppose that Subnet 1 is required to support up to 2000 interfaces, and Subnets 2 and 3 are each required to support up to 1000 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints.

15. Consider a subnet with prefix 101.101.101.64/26. Give an example of one IP address (of form

xxx.xxx.xxx.xxx) that can be assigned to this network. Suppose an ISP owns the block of

addresses of the form 101.101.128/17. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. What are the prefixes (of form a.b.c.d/x) for the four subnets?

16. Consider the topology shown in Figure 4.17. Denote the three subnets with hosts (starting

clockwise at l2:fi)) as Networks A, B, and C. Denote the subnets without hosts as Networks D, E, and F.

a. Assign network addresses to each of these six subnets, with the following constraints: All addresses must be allocated from214.97.254/23; Subnet A should have enough addresses to support 250 interfaces; Subnet B should have enough addresses to support 120 interfaces; and Subnet C should have enough addresses to support 120 interfaces. Of course, subnets D, E and F should each be able to support two interfaces. For each subnet, the assignment should take the form a.b.c.d/x or a.b.c.d/x - e.f.g.h/y.

b. Using your answer to part (a), provide the forwarding tables (using longest prefix matching) for each of the three routers.

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库习题课(3)在线全文阅读。

习题课(3).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/405122.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: