收藏 分享(赏)

计算机网络试题.docx

上传人:HR专家 文档编号:11399175 上传时间:2020-04-16 格式:DOCX 页数:4 大小:18.73KB
下载 相关 举报
计算机网络试题.docx_第1页
第1页 / 共4页
计算机网络试题.docx_第2页
第2页 / 共4页
计算机网络试题.docx_第3页
第3页 / 共4页
计算机网络试题.docx_第4页
第4页 / 共4页
亲,该文档总共4页,全部预览完了,如果喜欢就下载吧!
资源描述

1、1. Explain Client-Server model for distributed computing by example.l Client-server model can make computing faster than just use the server to computing and the client just be a browser.For example ,the data stored in a powerful server machine ,and the cilent connected with the server by internet,i

2、t maniplation data at local cilent ,so the server can handle more request from other clients,and the client can make full use of it hardware resource.So the distributed computing can be very fast. 2. Explain Peer-to-Peer model for distributed computing by examplePeer-to-Peer model means individuals

3、who form a loose group can communicate with others in the group,everyone in this group can communicate with one or more other people ,and everone can be clients and servers.For example ,if we use BitTorrent to download a film,we download it from other people who also have this software and the resou

4、rce, not just from one or two server.At the same time ,our resources also be shared and downloaded by other people , it makes the speed of the transmission more faster than before.3. Compare concepts of Broadcasting, Multicasting, Unicasting.Broadcasting: Broadcast systems usually allow the possibil

5、ity of addressing a packet to all destinations by using a special code in the address field. When a packet with this code is transmitted, it is received and processed by every machine on the network.Multicasting:If borad cast systems also support taransmission to a subset of the machine,it called mu

6、lticasting. Unicasting:Point-to-point transmission with exactly one sender and exactly one receiver is sometimes called unicasting.4. What are the two generally acceptedangles by which computer networks can be classified? It can be classified from Network node distribution and Network Topology.5. De

7、scribe some characteristics of the Ethernet. Ethernet often used in local area networks, is the most common type of wired LAN. it use copper wires, optical fibers.and it frame in IEEE802.36. How is a WAN organized? explain packet-switched principle.WAN spans a large geographical area,often a country

8、 or continent,and less lines,In WAN,the hosts and subnet are owned and operated by different people.And before the message be sended,it will be cut into packets,every packetss header be inserted some message about the target address ,and then post them ,be received at each intermediate router .7. Wh

9、at are two reasons for using layered protocols?It can reduce the design complexity,every layer just need to concern about its own fuction.if the protocols changes,the other layers protocols dont need to change.8. What is the principal difference between connectionless communication and connection-or

10、iented communication?Connection-oriented service need to establish a connection and until the connection establish success ,it starts the data transmission.if the transmission stop ,it close the connection,and the data transmission is ordered.Connectionless service :each message carries the full des

11、tination address and each one is routed through the intermediate nodes inside the system independent of all the subsequent messages.and the receiver get the messages unordered. 9. Explain the relationship between services and protocols.The service defines what operations the layer is prepared perfor

12、m on its users ,but doesnt say how these operations are implemented.and its on a low level.The protocol is a set of rules governing the format and meaning of the packets,ormessages that are exchanged by the peer entities within a layer(同一层上的对象)entities use protocols to implement(实施) their serevice d

13、efinitions.10. Which of the OSI layers handles each of the following:(a)Dividing the transmitted bit stream into frames. Data Link Layer(b)Determining which route through the subnet to use. Network Layer11. If the unit exchanged at the data link level is called a frame and the unit exchanged at the

14、network level is called a packet, do frames encapsulate packets or do packets encapsulate frames? Explain your answer.Do frames encapsulate packets, because the data link level is lower than network level,the packet which from network level neet to be encapsulated in frames data header,and the sent

15、to physical layer.12. A system has an n-layer protocol hierarchy(分层协定). Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers? h*n /(M+h*n)13. Suppose the algorithm used to implement the opera

16、tions at layer k is changed, how does this impact operations at layers k-1 and k+1?It doesnt influence the layer k+1 and k-1;14. Suppose there is a change in the service (set of operations) provided by layer k, how does this impact services at layers k-1 and k+1? It doesnt influence the layer k+1 an

17、d k-1;15. List two ways in which the OSI reference model and the TCP/IP reference model are the same. Now list two ways in which they differ.Samethey all need layer for each different level of abstarctioneach layer performs a function.Difference :OSI reference model have seven level,and tcp/ip just

18、has four level .OSI supports both in the network layer ,tcp/ip supports only connectionless mode in the network layer.16. Please draw a diagram showing the OSI reference model.sorry17. What is the main difference between TCP and UDP.Tcp is connection-oriented protocol.UDP is connectionless protocol.

19、Tcps transmitted message is ordered ,and UDPs not18. When a file is transferred between two computers, two acknowledgement strategies are possible. In the first one, the file is chopped up into packets, which are individually acknowledged by the receiver, but the file transfer as a whole is not ackn

20、owledged. In the second one, the packets are not acknowledged individually, but the entire file is acknowledged when it arrives. Discuss these two approaches.First one :if one packge has error,it dont need to send all the file again,but the size of all transferred message is larger than the second o

21、ne.Second one:if one packet has error,the whole file need to retransfer again.19. Assume you post a regular letter to a friend, do you think the postal service is a reliable service? if you want to make sure that the letter will arrive at your friends mail box, think of a protocol based on the regul

22、ar letter postal service.Postal service is not a reliable service ,I will send two letters ,one is the message which be encrypted,the other is the key,and each ones header has the message that tell the friend if he just get one letter,then reply me ,and I will send it again,thats all.if he get all,r

23、eply ok to me.else ,I will send two messages again.20. The Internet is made up of a large number of networks. Their arrangement determines the topology of the Internet. A considerable amount of information about the Internet topology is available online. Use a search engine to find out more about th

24、e Internet topology and summarize your finding.Internet topology is the network topology of the Internet.its a representation of the interconnection between directly connected peers in a network. In a physical network topology, peers are ports on devices connected by a physical transmission link. A physical topology corresponds to many logical topologies, each at a different level of abstraction.21. Please visitIEEE 802, make a brief introduction to IEEE 802 LAN/MAN Standards Committee.

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 中等教育 > 高中教育

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:道客多多官方知乎号:道客多多

经营许可证编号: 粤ICP备2021046453号世界地图

道客多多©版权所有2020-2025营业执照举报