精華區beta NTU-Exam 關於我們 聯絡資訊
課程名稱︰計算機網路 課程性質︰系必修 課程教師︰逄愛君 開課學院:電資學院 開課系所︰資工系 考試日期(年月日)︰2010.4.21 考試時限(分鐘):180 是否需發放獎勵金:是 (如未明確表示,則不予發放) 試題 : 1.(6%)Why is it said that pachet switching emplots statistical multiplexing? Constrast statistical multiplexing with the multiplexing that takes places in TDM. Ans: (a)In a packet switched network, the packets from different sources flowing on a link do not follow any fixed, pre-defined pattern. (b)In TDM circuit seitching, each host gets the same slot in a revolving TDM frame. Statistical multiplexing ensures that slots will not be wasted (whereas TDM can waste slots). 2.(8%)Consider a 1Gbps link. Users are generationg data at a rate of 100kbps when busy, but are busy generation data only with probability p=0.1. a.What is N, the maximum number of users that can be supported simultaneously under circuit switching? b.Now consider packet switching and a user population of M users. Give a formula (in terms of p, M, N) for the probability that more than N users are sending data. 3.(8%)Consider the car-caravan analogy shown in Figure 1. Assume a propagation speed of 50 km/hour, and a toll booth takes 12 seconds to service a car. a.Suppose the caravan travels 200km, beginning in front of one tollbooth, passing through a second tollbooth, and finishing just before a third tollbooth. What is the end-to end delay? b.Repeat (a), now assuming that there are five cars in the caravan instead of ten 4.(12%)In modern packet-switched networks, the source host segments long, application-layer messages (for example, an image or a music file) into smaller packets and sends the packets into the network. The receiver then reassembles the packets back into the original message. We refer to this process as message segmentation. Figure 2 illustrates the end-to-end transport of a message with and without message segmentation. Consider a message that is 8*10^6 bits long that is to be sent form source to destination. Suppose each link in the figure is 2Mbps. Ignore propagation, queuing, and processing delays. a.Consider sending the message from source to destination without message segmentation. How long does it take to move the message from the source host to destination host? b.Now suppose that the message is segmented into 4,000 packets, with each packet being 2,000 bits long. Compare this result with your answer in part (a). c.Discuss the drawbacks of message segmentation. i.Pachets have to be put in sequence at the destination. ii.Message segmentation results in many smaller packets. Since header size is usually the same for all packets regardless of their size, with message segmentation the total amount of header bytes is more. 5.(6%)Layering of Internet a.Why do we need the layering concept for Internet? b.Please claborate on the pros and cons of the Layering. 6.(6%)Why do HTTP, FTP, SMTP, and POP3 run on top of TCP rather than on UDP? Ans: The applications associated with those protocols require that all application data be received in the correct order and without gaps. TCP provides this service whereas UDP does not. 7.(10%)Suppose Alice, with a Web-based e-mail account (such as Hotmail or gmail), sends a message to Bob, who accesses his mail from his mail server using POP3. Discuss how the nessage gets from Alice's host to Bob's host. Be sure to list the series of application-layer protocols that are used to move the message between the two hosts. 8.(16%)HTTP and DNS a.What is web caching? b.Why HTTP/1.1 uses persistent TCP connection for web accessing? c.What are Top-level domain(TLD) servers and Authoritative DNS servers? d.Bob access the Internet at home via a dynamic IP maintained by HiNet. If Bob would like to install a web server at home with the demain name "babhome.idv.tw". Please elaborate on how Bob register and activates the domain name. Note that the provider of "idv.tw" is "TWNIC", and the authoritative DNS server is "ns1.twnic.net.tw" 9.(8%)Consider a new peer Alice who joins BitTorrent without possessing any chunks. Without any chunks, she cannot become a top-four uploader for any of the other peers, since she has nothing to upload. How then will Alice get her first chunk? 10.(20%)Realiable Data Transfer a.Protocol rdt 2.1 provides reliable data transfer by using ACK/NAK and putting a sequence number into the transmitted data. Instead of using rdt 2.1, some of the students in the class proposed a new protocol to let the sequence numver "1" represent "New Packet" and the wequence number "0" represent "Retransmitted Packet". Please re-draw the state diagrams of senders and receivers. b.Is there any problem for the new protocol? Please elaborate on ti with a message flow. If so, does the situation also occur for rdy 2.1? Why of Why not? -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 61.216.82.233
andy74139 :已收錄至精華區!! 07/02 22:58