推 andy74139 :已收錄至精華區!! 07/12 19:44
課程名稱︰計算機網路
課程性質︰系必修
課程教師︰逄愛君
開課學院:電資學院
開課系所︰資工系
考試日期(年月日)︰2010.6.23
考試時限(分鐘):180
是否需發放獎勵金:是
(如未明確表示,則不予發放)
試題 :
Question 1:"Quickies"(30%) Answer each of the following questions briefly,
e.g., in at most a few sentences.
a)(5%)Where can queueing occur in a router? Briefly explain the conditions that
lead to such queueing.
Queueing can occur at both the input ports and the output ports of a
router. Queueing occurs at the ourpur port when the arriving rate of
packets to the outgoing link exceeds the link capacity. Queue occurs on
and input port when the arriving rate of packets exceeds the switch
capacity; head-of-the-line blocking can also cause queueing at the
input ports.
b)(5%)What is HOL (Head-of-Line) blocking? Does it occur in input ports or
ouput oirts?
The switch fabric can only switch the packets at the head of the buffer
per clock, HOL arises in input ports when packets arriving at different
input ports are destined for the same output port. If the HOL packet
of a certain buffer at the input cannot be switched to an output port
because of contention, the rest of the packets in that buffer are
blocked by that Kead-of-Line packet, even if there is no contention
at the destination output ports for those packets.
c)(5%)What is meant by the term "tunneling"?
In tunneling, an IP datagram (e.g., an Ipv6 datagram) is carried as the
patkiad if another IP datagram.
d)(5%)Briefly describe TCP's slowstart algorithm. What causes the TCP slowstart
algorithm to end, and TCP congestion avoidance begin?
When connection begins, TCP's congestion window is 1 MSS. For each
ACK received, the congestion window size is double. This causes the
number of segments sent per RTT to increase exponentially. Slowstart
ends when a threshold window size is reached.
e)(5%)Two hosts simultaneously send dat through a link of capacity 1Mbps. Host
A generates data with a rate of 1Mbps and uses TCP. Host B uses UDP and
transmits a 100bytes packet every 1ms Which host will ontain higher
throughput?
f)(5%)What are different inter-AS and intra-AS protocols used in the Internet
g)(5%)What is the difference between a group-shared tree and a source-based
tree in the context of multicast routing?
Problem 2: Congestion Control and TCP (40%)
a)(5%)What is the difference between congestion control and flow control?
Flow control is about matching the speed of a sender to the
capabilities of the receiver.
Congestion occurs when senders overutilize the resources within the
network.
b)(5%)It is said that a TCP connection "probes" the network path it uses for
available bandwidth. What is meant by that?
TCP keeps increasing its send rate (by inceasing its window size)
until loss occurs (at which point congestion has set in).
TCP then sets its rate lower but again begins increasing its send
rate to again determine the point at which congestion sets in.
In this sense, TCP is contantly
probing the network to see how much bandwidth it can use.
c)Suppose that in TCP, the sender window is of size N, the base of the window
is at sequence number x, and that the sender has just sent a complete
window's worth of segments. Let RTT be the sender-to-receiver-to-sender
round trip time, and let MSS be the segment size.
i.(10%)Is it possible that there are ACK segments in the receiver-to-
sender channel for segments with sequence numbers lower than x?
Justigy your answr.
ii.(5%)Assuming no loss, what is the throughput(in packets/sec) of
the sender-to-receiver connection?
iii.(5%)Suppose TCP is in its congestion avoidance phase. Assuming no
loss, what will the window size be after the N segments are ACKed?
N+1
d)(10%)Consider the use of TCP over a wireless channel, which is much more
prone to bit-level errors than a wire or optical fiber. Comment on how well
suited TCP's(i)error detection mechanism, and (ii)its window-based congestion
control algorithm are for such a bit-error-prone environment.
Question 3: Routing Algorithms(20%)
a)(10%)Consider the network shown below. Show the operation of Dijkstra's
(Link State) algorithm for computing the least cost path from D to all
destinations.
b)(10%)Consider a node Z, which has only two beighbors -X and Y. The link cost
from Z to X is 2 and the link cost from Z to Y is 3. Suppose X and Y have
the distance tables shown below, which they send to Z.
Complete the following table in node Z after it receives the destance tables
from its neighbors X and Y:
Question 4:NAT:Network Address Translation(15%)
a)(5%)Suppose host A is behind a NAT, and host B has a public IP. The TCP
connection between host A and B has been established. While host A sends
datagram to host B and host B replies datagram to host A, what does the NAT
router do?
b)(10%)NATs on P2P applications: Suppose a peer A discovers through quety that
peer B has a file it wants to download. Also, suppose that A and B are both
behind a basic NAT which does not support any other fuctions. Is there a
way to allow A to establish a TCP connection with B directly without
application-specific NAT configuration? Discuss why and how to do it
(if it is possible).
Question 5:Subnets(10%)
Considr the topology shown below. Denote the three subnets with hosts
(starting clockwise at 12:00) as Networks A, B, and C. Denote the subnets
without hosts as Networks D, E, and F.
(a)Assign network addresses to each of these six subnets, with the following
constraints: All addresses must be allocted from 214.97.254/17; Subnet A
should have enough addresses to support 250 interfaces; Subnet B should have
enough addresses to support 120 interfaces; and Subnet C should have enough
addresses to support 120 interfaces. Of courese, subnets D, E and F should
each be able to support two interfaces. For each subnet, the assignment
should each be able to support two interfaces. For each subnet, the
assignment should take the form a.b.c.d/x or a.b.c.d/x - e.f.g.h/y.
(b)Using your answer of part (a), provide the forwarding tables (using
longest prefix matching) for each of the three routers.
※ 編輯: oscarchichun 來自: 218.167.72.190 (07/12 16:25)