【Computer Network】End-of-term network review materials (should be complete)

Computer network training questions &     self-made mind map

No one is reviewing Internet cafes just now? ? ? ? ? ? ? ? ! ! ! ! !

Except for the first file, the answers are all written by myself, which may not be accurate

Table of contents

net plan

  Computer Network Review Questions---Special Training for Multiple Choice Questions

Questions and Answers Calculation Exercises


net plan

Part I Basic Knowledge

l  The transport layer protocol of TCP/IP cannot provide connectionless services. ( ×  )

The TCP/IP protocol model includes a series of network protocols that form the basis of the Internet and is the core protocol of the Internet, among which UDP can provide connectionless services.

l  ICMP packets are encapsulated in the data part of IP packets. (  )

The  purpose of the network layer is the reliable transmission of IP datagrams between any two hosts. ( ×  ) 

The purpose of the network layer is to realize the transparent transmission of data between two end systems

l  Clients can send and receive emails using the SMTP protocol. ( ×  )

No, the SMTP protocol is only used to send mail, and the POP3 protocol is used to receive mail.

l  TELNET establishes a TCP connection between the client computer and the remote login server. (  )

l  The firewall system cannot prevent damage to the system from the internal network. (  )

l  The transport layer uses the process number (PID) to mark the application process of the communication between the hosts. ( ×  )

PID is the code name of each process, and each process has a unique PID number. It is randomly assigned by the system when the process is running, and does not represent a special process.

l  The transport layer uses the port number to mark the application process of the communication between the hosts. (  )

l  In the TCP protocol, the loss of an acknowledgment packet for a TCP segment does not necessarily cause the sender to retransmit the segment. (  )

LAN switches can isolate both collision domains and broadcast domains. ( ×  )

l  The complexity of calculating the optimal path of the distance-vector routing algorithm is greater than that of the link-state routing algorithm. (  )

l  The UDP protocol performs demultiplexing operations based on the destination port number in the UDP packet. (  )

l  TCP only supports flow control, not congestion control. ( ×  )

TCP features: 1. Acknowledgment and receipt 2. Reasonable fragmentation and sorting of data 3 Flow control 4 Congestion control 5 Data verification

l  The ARP protocol is used to solve the problem of mapping from IP addresses to MAC addresses of hosts or routers on the same LAN. (  )

l  Obtain the MAC address of another host in the same LAN through the ARP protocol . (  )

l  If the confirmation number of the TCP segment received by the sender is seq=1501, it means that the receiver expects to receive the segment with the sequence number 1501. ( ×  )

The sequence number (seq) is used to identify the data byte stream sent from the TCP sender to the TCP receiver, and it represents the first data byte in this segment.

ack: Indicates what is the next seq of the expected counterpart (receiver)

l  According to the scope of coverage, computer networks can be divided into four types: local area network, metropolitan area network, wide area network and the Internet.  )

l  The main purpose of network interconnection is to connect multiple small networks to form a large network. ( ×  )

Network interconnection refers to connecting different networks to form a larger-scale network system and realize data communication, resource sharing and collaborative work between networks.

l  The IP layer is the key for TCP/IP to realize network interconnection, but the IP layer does not provide reliability guarantee, so there is no reliability mechanism in the TCP/IP network. ( ×  )

The IP layer does not provide reliability guarantees , but the TCP protocol provides reliable connections,

l  The main difference between IPv4 and IPv6 is the address encoding length. The length of each address in the former is 4 bytes, while the length of each address in the latter is 6 bytes. ( ×  )

An IPv6 address is 128 bits long, 8 bits per byte, 16 bytes

l  TCP/IP can be used for communication between different processes on the same host. (  )

l  The ICMP protocol is a part of the IP protocol. (  )

l  The data transmission rate that the channel can support is directly proportional to the bandwidth of the channel. ( ×  )

l  During the working process of the World Wide Web, there is no need to establish a TCP connection, but the HTTP protocol must be used. ( ×  )

The World Wide Web work process needs to establish a TCP connection

l  In a CDMA system, the orthogonality between vector S and vector T is:

l  In the CDMA system, it is known that the chip vector of station X is S, and station Y receives a chip vector T. If S·T=0   , then X did not send data to Y (T was sent by another station to Y); if S·T=+1 , then X sent bit 1 to Y; if S·T=-1   , then X sends bit 0 to Y.      

l  The data rate of 10BASE-T Ethernet is 10Mb/s, and the transmission distance is 100m. Using the CSMA/CD protocol, the contention period is 512 bit time (51.2 μ s ) , and the shortest frame length is 64 bytes (512 bits).

l The data rate of  100BASE -T Ethernet is 100Mb/s, and the transmission distance is 100m. CSMA/CD protocol is adopted in half-duplex, the contention period is 512 bit time (5.12 μ s ) , and the shortest frame length is 64 bytes (512 bits). The CSMA/CD protocol is not used in  full duplex   . [Note contention period changes]

l  100 0BASE-T Ethernet is also called Gigabit Ethernet or Gigabit Ethernet, with a data rate of 1000Mb/s and a transmission distance of 100m. The CSMA/CD protocol is adopted in half-duplex mode, the contention period is 512     bytes , and the shortest frame length is 64 bytes (512 bits). CSMA/CD protocol is not used in  full duplex   ,

l  10 Gigabit Ethernet is also called 10 Gigabit Ethernet, with a data rate of 10Gb/s. It only uses   optical fiber   to transmit media, and does not use CSMA/CD protocol. There are two physical layers:  Local Area Network Physical Layer (LAN PHY) and Wide Area Network Physical Layer (WAN PHY)

lIn  the TCP/IP protocol suite, TCP works at  the transport   layer, UDP works at  the transport   layer, and IP works at  the network   layer.

  [Note that some textbooks refer to the transport layer as the transport layer and the network layer as the Internet layer]

l  The URL indicates the location and  access method of resources on the Internet . has the URL as

http://news.qq.com/38765/index.html, the access method is   http   ,

The resource location is  news.qq.com/38765/index.html  

l  The general form of URL is   protocol://host:port/path   . If the URL is http://news.qq.com/38765/index.html, the protocol is http, the host is news.qq.com, the path is 38765/index.html, and the port is   80   .   

[Note: If the port is not given in the URL, the default port of the protocol is used, and the default port of http is 80]

l  The URL is http://news.qq.com/38765/index.html, the domain name is  news.qq.com   , the top-level domain name is  com , the second-level domain name is  qq   , the third-level domain name is  news , and the host name is  news .

l  DHCP uses the client-server mode. The host that needs an IP address broadcasts   a discovery message (DHCPDISCOVER)   to the DHCP server at startup . DHCP server reply   offer message (DHCPOFFER)  

l  The IP address assigned by the DHCP server to the DHCP client is temporary, and this temporary period is called   the lease period   .

l  Simple Mail Transfer Protocol (SMTP), which transmits the sender's mail from the sender's  user agent to the receiver's mail server , but cannot receive mail. The post office protocol POP3 can be used to receive mail. 

l  The POP3 protocol is used by the recipient  user agent to read  mail   from the mail server . POP3 uses the client server method, the mail server is the POP3 server, and the user agent is the  POP3 client   . 

l  The protocol is "horizontal", and the protocol is the rules governing the communication between   peer entities   .

l  The service is "vertical". The service is provided by  the lower layer to the upper layer   through the interlayer interface. The lower layer entity is   the service provider of the upper layer entity , and the upper layer entity is   the service user   of the lower layer entity  .

l  RED ( Random Early Detection) does not discard all packets at the end of the queue until the network congestion has already occurred, but randomly discards individual packets with probability p when   early symptoms   of network congestion are detected to avoid globalization congestion control.

l  The advantage of RED is that when the average queue length exceeds   the threshold TH min   , a small number of packets will be discarded. As a result, the average length of the queue is reduced, thereby avoiding the occurrence of network congestion.

l When using the CSMA/CD protocol, because two stations send data at the same time,  a collision    will occur , so it is impossible for one station to send and receive at the same time.

l 以太网规定:以太网帧(即MAC帧)首部长为  14  字节,尾部(即FCS)长为 4 字节。以太网最短有效帧长  64  字节,凡是长度小于64字节的帧都是无效帧。以太网帧间最小间隙是  96  比特时间。以太网帧数据字段长度为  46~1500  字节。

l 在TCP/IP协议中,可以推导计算出:MAC帧首部加尾部长为  18字节  。MAC帧全长 64~1518 字节。

[注:为什么MAC帧数据字段最小长为46字节?  因为64-18=46。为什么MAC帧最大长度为1518字节?  因为1500+18=1518。]

l 如果上层IP数据报长度小于46字节,则MAC层会在IP数据报后面填充数据(通常填0xFF),使MAC帧数据字段长度达到 46 字节。此时MAC帧长度为 64 字节。

l MAC帧数据字段最大长度称为最大传送单元MTU。MTU的值为 1500 字节。

l TCP/IP标准规定:IP数据报首部固定部分长度  20  字节,可变部分长度0~40字节。IP数据报总长度最大 65535 字节。如果IP数据报分片,则IP数据报总长度指分片的总长度。所有主机和路由器必须有能力处理总长度为  576  字节的IP数据报。

[注: 教材上说576字节是IP数据报最小长度有误。576字节是对处理器缓冲能力提出的要求,早期的处理器能力低,所以定了这个指标]

l 若TCP连接初始化拥塞窗口cwnd=1个MSS,慢开始门限ssthresh=32个MSS,则4次成功发送后, cwnd值为  16  个MSS; 5次成功发送后, cwnd值为  32  个MSS; 6次成功发送后cwnd值为  33  个MSS。

l RIP路由协议是基于距离向量的路由选择协议。RIP的距离也叫 跳数 。每经过一个路由器,跳数就加一。距离等于 16 时相当于不可达。

l RIP协议的特点是:仅和 相邻 路由器交换信息,交换的信息是自己的 路由表 ,按固定时间间隔(通常为30s)交换信息,使用 距离向量 算法。RIP协议的缺点是: 坏消息 传播得慢。

l  With regard to WWW documents,   a static document   refers to a WWW document whose content does not change during browsing.  A dynamic document   means that the content of the document is dynamically created by the application program when the browser accesses the World Wide Web server.  The active document means that when the browser accesses the World Wide Web server, the server returns a copy of the active document program, and the program runs on the browser side to generate the corresponding document.

[Note: To understand the simple browsing process of static documents, dynamic documents and active documents:

The browser requests a static document (usually a static HTML file) from the server, the server sends the document to the browser, and the browser displays the document.

The browser requests a dynamic document from the server , the server runs the application, the application creates the document, the server sends the document to the browser, and the browser displays the document.

The browser requests the active document from the server , the server sends the active document program to the browser, the browser runs the program, the program creates the document, and the browser displays the document. ]

l  Wireless local area network (WLAN) is divided into two categories, one with fixed infrastructure and the other without fixed infrastructure. 802.11WLAN is a wireless local area network  with fixed infrastructure. A WLAN without a fixed infrastructure is called an ad hoc network, such as a wireless sensor network (WSN).

l  The wireless local area network using the 802.11 series protocol is also called Wi-Fi, and its  wireless fidelity technology is held by the Wi-Fi Alliance.

l  802.11 WLAN MAC layer adopts   CSMA/CA protocol to solve the collision problem. The length of the 802.11 MAC frame header is  30 bytes, the length of the tail (FCS) is   4 bytes, and the data part does not exceed   2312   bytes.

l  The minimum construction of 802.11 wireless LAN is  BSS   , a BSS consists of a  base station and several mobile stations. The base station is the access point (AP), and the mobile station can connect to the BSS through the AP. Each AP has an SSID and a channel. In Windows, the network name of the wireless LAN is  SSID . 

l  The standard of wireless personal area network (WPAN) is formulated by IEEE802.15 working group, currently widely used WPAN includes  bluetooth system   and ZigBee.

l  Each IPv6 IP address occupies  16 bytes, that is,  128 bits, and uses   colon hexadecimal   notation. This notation allows  zero compression . For example, the IP address FF08:0:0:0:0:0:0:A8 can be compressed into FF08::A8.

l  The IPv6 loopback address is   0:0:0:0:0:0:0:1   , which can be written as  ::1   .

l The computer network system of  our network laboratory belongs to  )

①  Personal Area Network (PAN)   ② Local Area Network (LAN) ③ Metropolitan Area Network (MAN) ④ Wide Area Network (WAN)

l  The OSI/RM architecture proposed by the International Organization for Standardization (ISO) divides the protocol into (  3  ) layers.

① 3    ② 5     ③ 7     ④ 9

l  If the sending rate is 10Mb/s, the time required to send 576 bits is (   ).

① 576μs     ② 57.6μs     ③ 5.76μs     ④ 0.576μs

l  The following (①) protocol belongs to the application layer protocol of the TCP/IP architecture.

① FTP     ② UDP     ③ TCP     ④ IP

l  The real-time performance of the following exchange methods is the best (   ).

① Virtual circuit mode ② Circuit switching mode ③  Message switching mode ④  Packet switching mode.

l  The line utilization rate is the highest among the following switching methods (   ).

① Virtual circuit mode ② Circuit switching mode ③ Packet switching mode ④ Packet switching mode

l  The medium access control method adopted by the MAC sublayer of the IEEE802.3 standard is  ).

① CSMA/CD CSMA/CA ALOHA HDLC

l  Divide the total bandwidth of the channel into several sub-frequency bands (or sub-channels), and each sub-channel transmits one signal. Such a channel multiplexing technique is (  ).

①  Frequency Division Multiplexing (FDM)    ②  Time Division Multiplexing (TDM)   ③  Wavelength Division Multiplexing (WDM)    ④  Code Division Multiplexing (CDM)

l  The description of the UDP datagram is incorrect  ).

① is connectionless ② is unreliable ③ does not provide confirmation ④ is connection-oriented and provides confirmation

l  The IP address of a certain computer is 132.121.100.001, and the type of this address is (   ) type address.

① A    ② B     ③ C     ④ D

l  The subnet mask of a certain network is 255.255.255.224, and the number of hosts that can be connected to this network is  ).

① 14     ② 16     ③ 30     ④ 32

l  Among the following addresses, (   ) matches 86.32/12.

① 86.33.224.123    ② 86.79.65.216    ③ 86.58.119.74   ④ 86.206.154

l  If the 138.10.0.0 network is to be divided into 6 subnets, the subnet mask should be set to (   ).

① 255.0.0.0    ② 255.255.0.0    ③ 255.255.128.0    ④ 255.255.224.0

l  It is known that an IP address is 140.120.84.24/20, then the subnet mask of the network where the IP address is located is (   ).

①255.255.0.0   ② 255.255.255.0  ③ 255.255.240.0  ④ 255.255.255.240

l  The forward resolution of domain name service DNS is (  ).

① Convert domain name to physical address ② Convert IP address to physical address

③ Convert IP address to domain name ④ Convert domain name to IP address

l  When configuring the Ruijie switch, the following command (  ) assigns the current access port to VLAN 8.

① vlan-menbership static     ② vlan database

③ vlan8                      ④ switchport access vlan 8

l 两台锐捷路由器R1和R2的连接与IP地址分配如图1-1所示,在R1中配置到达子网30.1.1.0的静态路由的命令是(  )。

图1-1

R1config# ip route 30.1.1.0 255.255.255.0 20.1.1.1

R1config# ip route 30.1.1.0 255.255.255.0 30.1.1.2

R1config# ip route 30.1.1.1 255.255.255.0 10.1.1.1

R1config# ip route 30.1.1.2 255.255.255.0 10.1.1.1

l 图1-1中,主机PC1运行的Windows操作系统,本地连接属性配置为(  )。

① IP地址:10.1.1.2  子网掩码: 255.255.255.0  网关: 10.1.1.1

② IP address: 10.1.1.2 Subnet mask: 255.255.255.0 Gateway: 20.1.1.2

③ IP address: 10.1.1.2 Subnet mask: 255.255.0.0 Gateway: 20.1.1.1

④ IP address: 10.1.1.2 Subnet mask: 255.255.0.0 Gateway: 10.1.1.1

Part II Ranking Terms

1. Point out the Chinese nouns corresponding to the following English nouns (see Appendix B of the textbook )

Internet  ------ Internet

internet ------ Internet  ( or Internet )

ISP  ----------- Internet Service Provider

NGI ----------- Next Generation Internet

P2P  ----------- peer-to-peer

LAN  ----------- Local Area Network

WAN  ----------- wide area network

PAN  ----------- Personal Area Network

WLAN -----------Wireless Local Area Network

WMAN ------------Wireless Metropolitan Area Network

WPAN ------------ Wireless Personal Area Network

TCP/IP  -------- Transmission Control Protocol/Internet Protocol

OSI/RM -------- Open Systems Interconnection Reference Model

SAP ----------- Service Access Point

SDU ----------- Service Data Unit

PDU ----------- Protocol Data Unit

FDM  ------- frequency division multiplexing

TDM  ------- time division multiplexing

STDM ------- statistical time division multiplexing

WDM  -------- Wavelength Division Multiplexing

CDM -------- code division multiplexing

CDMA  ------- code division multiple access

PCM -------- pulse code modulation (or pulse code modulation)

SONET ------ synchronous optical network

SDH -------- Synchronous Digital Hierarchy

DSL -------- Digital Subscriber Line

HFC -------- Fiber-optic coaxial hybrid network

MTU ---------- Maximum Transmission Unit

CRC  --------- Cyclic Redundancy Check

PPP  --------- Point-to-Point Protocol

PPPoE ------- Point-to-Point Protocol over Ethernet

MAC  --------- Media Access Control

CSMA/CD ----- Carrier Sense Multipoint Access/Collision Detection

VLAN -------- virtual local area network

ARP  ------------ Address Resolution Protocol

ICMP  ----------- Internet Control Message Protocol

IGMP ----------- Internet Group Management Protocol

VPN  ------------ Virtual Private Network

NAT  ------------ Network Address Translation

TTL  ------------ time to live

CIDR  ----------- Classless Inter-Domain Routing

AS ------------- Autonomous System

IP  ------------- Internet Protocol

ARQ -------- Automatic Repeat Request

MSS -------- maximum segment length

ACK  -------- Acknowledgment

RTT  -------- round trip time

RTO -------- timeout retransmission time

AIMD ------- addition increase multiplication decrease

RED -------- Random Early Detection

DNS  ---------- Domain Name System

TLD ---------- top-level domain name

FTP  ---------- File Transfer Protocol

TFTP --------- Trivial File Transfer Protocol

TELNET ------- Remote Terminal Protocol

DHCP ----------Dynamic Host Configuration Protocol

WWW  ---------- World Wide Web

URL  ---------- Uniform Resource Locator

HTTP  ---------Hypertext Transfer Protocol

HTML  ---------Hypertext Markup Language

SMTP  --------- Simple Mail Transfer Protocol

POP  ---------- Post Office Protocol

MIME  --------- Common Internet Mail Extensions

Wi-Fi ---------Wireless Fidelity

SSID ---------- Service Set Identifier

2.  Explain the following nouns

A network ---------- consists of a number of nodes and links connecting these nodes.

Client and server --- refer to two application processes of communication, the client is the requester of the service, and the server is the provider of the service.

Exchange ---------- Dynamically allocate transmission line resources in a certain way.

Bandwidth ---------- The highest data rate per unit time that can pass from one point of the network to another.

Latency  ---------- The time it takes for data to travel from one end of the network to the other.

Protocol  ---------- Rules, standards or conventions established for exchanging data in a network.

Baseband signal  --- the signal from the source (that is, the basic frequency band signal)

Band-pass signal --- the signal after carrier modulation

Signal-to-noise ratio  ----- The ratio of the average power of the signal to the average power of the noise.

Chip ------- In CDMA, each bit time is divided into m short intervals, and these m short intervals are called a chip.

Link  -------- A section of physical line from a node to an adjacent node.

Bit error rate ------ The ratio of the transmitted erroneous bits to the total number of transmitted bits.

Contention period  ------ Ethernet end-to-end round-trip time.

Fast Ethernet  -- 100Base-T Ethernet. Can transmit 100Mb/s baseband signal on twisted pair.

Bridge ------------ An intermediate device used by the data link layer to extend an Ethernet.

Router ---------- An intermediate device (with the ability to select a path) used by the network layer to connect two networks.

longest prefix match  --- select the route with the longest network prefix from the matching results

IP Multicast --------- Multicast on the Internet.

Local address  ------- IP address assigned by this institution and valid only in this institution. Local address is also called private address

Well-known ports  --- Ports with values ​​ranging from 0 to 1023. Assigned by IANA to some services .

Reliable delivery  --- The delivered data is error-free, not lost, not repeated, and arrives in order.

Socket  ----- The IP address is spliced ​​together with a colon and a port number.

Timeout retransmission --- After sending a packet, if the acknowledgment of the packet has not been received when the timeout timer expires, the packet will be resent.

Cumulative acknowledgment --- Sends an acknowledgment for the last packet that arrived in sequence.

Flow control  --- Let the sender's sending rate not be too fast, so that the receiver can receive in time.

Congestion control  --- Prevent excessive packets from being injected into the network, so that the routers or links of the network are not overloaded.

domain name ----------- the unique hierarchical name of a host or router on the Internet

Domain Name System --------- is a distributed network directory service system that provides mutual conversion services between domain names and IP addresses.

Authoritative domain name server  -- the domain name server whose jurisdiction is the zone

A script ------------ is a program that is interpreted and executed by another program.

World Wide Web persistent connection -- The World Wide Web server maintains a client's TCP connection for a period of time so that the client can continue

HTTP request messages and response messages are transmitted on this connection.

Part Three Reflection Questions and Answers

l 网络适配器(又叫网卡)的作用是什么?

答: 网络适配器的重要作用是进行串行传输和并行传输的转换,将数据从计算机发送到局域网或从局域网接收数据上交给计算机。

适配器负责执行操作系统驱动程序的I/O指令,负责实现以太网协议。网络适配器发送或接收数据帧时不使用计算机CPU。当适配器收到有差错的帧时就丢弃。当网络适配器收到正确的帧时,就向计算机发送中断请求,将帧上交给网络层处理。当计算机发送IP数据报时,向下交给适配器,适配器将该IP数据报封装成帧发送到局域网。

[背景知识:网络适配器上装有网络控制器(处理器)]、存储器ROM和RAM,ROM内写有物理地址(即MAC地址)。计算机通过主板上的I/O并行总线与适配器通信,适配器通过电缆(双绞线)以串行方式与局域网通信。参见教材图3-15。]

l PPP协议的主要特点是什么?为什么PPP不使用帧编号?PPP适用于什么网络状况?

答:PPP协议的主要特点是:接收方每收到一个帧,就进行CRC检验。若CRC检验正确就收下该帧,否则就丢弃该帧。其他特点有:封装成帧、透明传输、支持多种网络协议和链路类型。

PPP不使用帧编号的原因是因为PPP不需要实现可靠传输。而编号是为了出错时可以使用编号重传。

PPP使用于线路质量好的网络。如果通信线路质量太差,传输出错就频繁。但PPP没有帧编号和确认机制,可靠传输依赖上层协议保证,这样就使数据传输效率降低。

l 用户在计算机上输入命令ping 127.0.0.1是,这个IP数据报将发送给谁?

答:127.0.0.1是环回地址,用于测试。主机将IP数据报发送给本主机的ICMP进行环回测试。而不是发送到因特网。

[Note: In Windows, you can also use the following command loopback test: ping localhost ]

l  What are the similarities and differences between IP addresses 0.0.0.0/24 and 0.0.0.88/24?

Answer: The same point: both can be used as source address, but neither can be used as destination address. The masks are the same.

Differences: 0.0.0.0/24 means the local host of the network, and 0.0.0.88/24 means the 24th host of the network.

l  What are the similarities and differences between IP addresses 255.255.255.255/16 and 128.1.255.255/16?

Answer: The same point: both are broadcast addresses, neither can be used as source address, but both can be used as destination address. The masks are the same.

The difference: 255.255.255.255/16 means that it only broadcasts to the local area network where the host is located, and all routers do not forward it. 128.1.255.255/16 means to broadcast to all hosts on the network 128.1.0.0.

l  What is the function of the ARP protocol? When host A sends an IP datagram to host B in the local area network, how does ARP

Analytic address?

Answer: The role of ARP is to convert IP addresses into physical addresses, and RAPR converts physical addresses into IP addresses.

When host A sends an IP datagram to host B in the local area network, the ARP process of host A searches for the MAC address corresponding to the IP address of host B in the local ARP cache, and if found, fills it in the MAC frame and completes parse.                                                 

If the MAC address corresponding to the IP address of host B cannot be found in the local ARP cache, host A broadcasts and sends an ARP request packet in the local area network (this packet includes A's IP address and MAC address, B's IP address). After host B receives the ARP request packet, it sends an ARP response packet to host A (the packet contains A's IP address and MAC address, B's IP address and MAC address), and host A writes the obtained MAC address into its own ARP Cache, and fill in the MAC frame, complete the parsing process.  

l  A common feature of IP and UDP is that they are both connectionless. What is the main difference between them?

Answer: IP is a host-to-host communication protocol, while UDP is a process-to-process communication protocol.

l  What are the similarities and differences between TCP communication service and UDP communication service?

Answer: The service provided by UDP is connectionless and does not guarantee reliable delivery; the service provided by TCP is connected and reliable delivery is guaranteed.

Can a socket be connected to two remote sockets at the same time?

Answer: No. A socket can only be connected to one remote socket.

l Computer A initiates the establishment of a TCP connection with B. How does A and B establish a connection (that is, briefly explain the three-way handshake process for establishing a connection)?

Answer: (1) A sends a connection request TCP segment to B ( SYN=1 ; seq=x;). (2) B accepts the request and sends back a connection request response segment to A ( SYN=1;ACK=1 ;seq=y;ack=x+1;). (3) After receiving the response message segment, A sends a confirmation message segment for connection request confirmation to B ( ACK=1; seq=x+1; ack=y+1;). 

When two people meet in daily life, one greets and the other answers, and two handshakes are completed. Why is there a three-way handshake to establish a TCP connection?

Answer: It is to avoid errors caused by invalid connection requests (or in other words: to prevent the TCP server from mistaking delayed requests for new requests and causing errors).

An invalid connection request means that the first connection request sent by the TCP client has not arrived at the TCP server due to delay. The TCP client sends a second request, completes the transfer, and releases the connection. After that, the first connection request arrives at the TCP server (this is an invalid connection request), the TCP server mistakenly thinks it is a new connection, sends a confirmation message, agrees to establish a connection, and the TCP client ignores the TCP server because there is no request Confirmation, but the TCP server thinks that the connection is established, and has been waiting for the arrival of the data from the TCP client, wasting resources in vain.

Why is there a four-way handshake to release a TCP connection?

Answer: After the TCP client sends a release connection message segment to the TCP server and gets confirmation, only the connection from the TCP client to the TCP server is closed, and the connection from the TCP server to the TCP client still exists, so the TCP server still needs to send a release connection message segment closes the connection. So a four-way handshake is required.

l  If the acknowledgment of a certain TCP segment is lost, why not retransmit the segment?

Answer: Since the TCP protocol adopts a cumulative confirmation mechanism for byte streams; when the confirmation of a certain segment is lost, as long as the receiver still has data to send to the sender, the confirmation field will contain the information received earlier. The response information of the segment, so the sender does not need to resend the segment.

For example, suppose the message segment 3, 4, and 5 are in the sending port, and the sequence number 3 message segment is sent, but the confirmation of the sequence number 3 is not received, instead of resending the sequence number 3 message segment, but continuing to send the sequence number 4, 5 message segment . When the confirmation number is 6, it indicates that the message segments 3, 4, and 5 have been reliably received by the receiver.

l  What are the main functions of the domain name system? Suppose the IP address of www.ccsu.cn is 202.101.208.10, and the default DNS address is 202.101.208.3. Briefly describe the domain name resolution process of DNS in the process of using a browser to access www.ccsu.cn.

Answer: The main function of the domain name system is to resolve domain names into corresponding IP addresses. The domain name resolution process of visiting www.ccsu.cn:

(1) Enter the address www.ccsu.cn in the browser address bar ;

(2) First search for the domain name in the domain name resolution cache of the main host, and if found, obtain the corresponding IP address immediately;

(3) If it is not in the local host cache, send a DNS request message to the local DNS server 202.101.208.3, requesting to resolve the domain name.

(4) After DNS receives the request, it searches its own cache and its mapping table. If it finds it, it sends a response message to the host that sent the request. If it does not find it, it makes a request to the upper-level DNS server until the resolution is successful or an error message is returned.

Part IV Computational Applications

[Calculation about CDMA]

l  There are four CDMA communication stations A, B, C, and D communicating with each other. It is known that the chip vectors of A, B, C, and D are (-1-1-1+1+1-1+1+1 ),(-1-1+1-1+1+1+1-1),(-1+1-1+1+1+1-1-1), (-1+1-1-1- 1-1+1-1). Suppose C receives a chip sequence (-1+1-3+1-1-3+1+1). Question: Which station sent data, how much is the data?

Answer: T=(-1+1-3+1-1-3+1+1);

SA·T=(-1*(-1)+1*(-1)-3*(-1)+1*1-1*1-3*(-1)+1*1+1*1) /8=1;

∴ Station A sends bit 1 to C

SB·T=-1;

∴ Station B sends bit 0 to C

SD·T=1;

∴ Station D sends bit 1 to C

[Calculation related to Shannon's formula]

l  It is known that the bandwidth of a certain channel is 2400Hz, and the maximum information transmission rate is 24kb/s. Find the signal-to-noise ratio S/N (expressed in decibels) of the channel.

Answer: It is known that C=24000b/s, W=2400Hz,

From Shannon's formula C=Wlog2 (1+S/N) to get S/N=2C/W-1

So S/N=224000/2400-1=1023

Converted to decibels: 10log10(S/N)=10log10(1023)=30dB

[Calculation about CRC]

l  The FCS of a certain network adopts CRC, and its CRC generating polynomial is P(x)=x4+x+1. The data to be sent by a host on the network is 1101011011. Question: ① Find the FCS of this data. ②If the data frame received by the receiving end is 11010110101110, will the receiving end discard the frame?

answer:

  • ∵P(x)=x4+x+1 ∴P=10011, n=4

Shift 1101011011 to the left by 4 bits to get 11010110110000

Divide 11010110110000 modulo 2 by 10011, the remainder=1110

∴FCS=1110

② Divide 11010110101110 modulo 2 by 10011 to get a remainder of 011. If the remainder is not 0, discard it.

[Calculation about MAC frames]

l  The IEEE 802.3 protocol LAN transmits 11-byte data, and the data is packed into a MAC frame format. May I ask: ① What is the length of the frame? ② How many bytes is the data field length of the frame? ③ How many bytes need to be filled?

answer:

① ∵ 11 bytes is less than the minimum effective frame length of the MAC frame (64 bytes),

∴ The frame length is 64 bytes

② The data field length of the frame is 11 bytes

∵ The frame header length occupies 18 bytes

  ∴ Padding byte length = 64-18-11=35.

[Calculation concerning IP address]

l  The subnet mask of a class C network is 255.255.255.240, how many hosts can be connected to each subnet?

answer:

① The binary number corresponding to 240 is: 11110000;

② There are 4 consecutive 0s behind the subnet mask, so use 4 bits as the host code (0~15);

③ 0 and 15 cannot be assigned to the host; (because the host number is all 0 to represent the network, and 15 is the all 1 address, that is, the broadcast address)

④ Each subnet can connect up to 14 hosts.

l  A Class C network 192.168.118.0, try to divide it evenly into 4 subnets, and calculate the effective host IP address range and corresponding network mask of each subnet.

Answer: Because the subnet mask of a Class C network is 255.255.255.0, it can be divided into 8 digits. 4 subnets occupy 2 digits. The mask is 11111111.11111111.11111111.11000000, which is 255.255.255.192

So the last 8 bits can be allocated like this:

xxx 00 000000 is assigned to subnet 1, the host number range is 00  00 0001-00 11 1110

xxx 01 000000 is assigned to subnet 2, the host number range is 01  00 0001-01 11 1110

xxx 10 000000 is assigned to subnet 3, the host number range is 10  00 0001-10 11 1110

xxx 11 000000 is assigned to subnet 4, the host number range is 11  00 0001-11 11 1110

The effective IP address range of subnet 1 is: 192.168.118.1~192.168.118.63

The effective IP address range of subnet 2 is: 192.168.118.65 ~ 192.168.118.126

The effective IP address range of subnet 3 is: 192.168.118.129 ~ 192.168.118.190

The effective IP address range of subnet 4 is: 192.168.118.193 ~ 192.168.118.254

The netmask for the 4 subnets is: 255.255.255.192

l  What is the aggregate address block of the following 4 /24 address blocks?

212.56.132.0/24

212.56.133.0/24

212.56.134.0/24

212.56.135.0/24

Answer: [Aggregation method: find out the common prefix bits of these addresses]

Write the above address in binary:

11010100.00111000.10000100.00000000

11010100.00111000.10000101.00000000

11010100.00111000.10000110.00000000

11010100.00111000.10000111.00000000

Find the common prefix, there are 22 bits (the blue font part below)

11010100.00111000.10000100.00000000

11010100.00111000.10000101.00000000

11010100.00111000.10000110.00000000

11010100.00111000.10000111.00000000

These 22 bits are the aggregate address block 11010100.00111000.100001 00.00000000/22

Written in dotted decimal is 212.56.132.0/22

l  Table 4-1 lists the routing table entries of router R. At time T, R receives an IP datagram D with a destination address of 176.192.71.132. According to the principle of longest prefix matching, which next-hop interface should datagram D be forwarded to?

Table 4-1 R routing table

The router receives the network prefix

Next hop

176.17.164.0/30

Interface E0

176.192.71.128/26

Interface E1

176.192.71.128/28

Interface E2

176.192.0.0/16

Interface E3

A: Check that the address of datagram D matches the network prefix of the routing table entry

176.17.164.0/30 has a mask of 255.255.255.252 _ _

176.192.71.132 and 255.255.255.252 get 176.192.71.132 , which cannot match 176.17.164.0/30

176.192.71.128/26 has a mask of 255.255.255.192 _ _

176.192.71.132 and 255.255.255.192 get 176.192.71.128 , which can match 176.192.71.128/26

176.192.71.128/28 has a mask of 176.192.71.128 _ _

176.192.71.132 and 255.255.255.240 get 176.192.71.128 , which can match 176.192.71.128/28

176.192.0.0/16 has a mask of 255.255.0.0 _ _ _

176.192.71.132 and 255.255.0.0 get 176.192.0.0 , which can match 176.192.0.0/16

Among the above three matching network prefixes, the network prefix of 176.192.71.128/28 is the longest. Therefore, the corresponding next-hop interface should be selected for forwarding, and the forwarding interface is E2.

l  The routing table of router A in the network is shown in Table 4.2, and the routing information received by Router B from router B is shown in Table 4.3. Please fill in the updated routing table of A in Table 4.4 according to the RIP protocol.

Table 4.2 Routing Table of Router A

destination network

next hop router

distance

192.168.1.0

B

2

192.168.2.0.

C

2

192.168.3.0

F

4

192.168.4.0

G

5

Table 4.3 Routing Table of Router B

destination network

next hop router

distance

192.168.1.0

----

2

192.168.3.0

----

1

192.168.4.0

----

5

192.168.5.0

----

3

Table 4.4 Routing Table of Router B

destination network

next hop router

distance

Answer: In the first step, A modifies the received routing table (mantra: all next hops are changed to the sender, and all distances are increased by 1)

As shown in Table 4.5

Table 4.5 Router A's updated routing table

destination network

next hop router

distance

192.168.1.0

B

3

192.168.3.0

B

2

192.168.4.0

B

6

192.168.5.0

B

4

In the second step, A updates its own routing table (mantra: new network, add; same next hop, update; different next hop distance is shorter, update). As shown in Table 4.6

Table 4.6 Router A's updated routing table

destination network

next hop router

distance

192.168.1.0

B

3

Same next hop, updated

192.168.2.0.

C

2

-----

192.168.3.0

B

2

Different next hop, shorter distance, updated

192.168.4.0

G

5

Different next hops, larger distances, unchanged

192.168.5.0

B

4

new network, add

Part V Experiment

To master the configuration of the router, read the experiment guide by yourself, and draw up the topic yourself:

Experiment 1 Static Routing

Experiment 4 RIP Routing

Experiment 5 OSPF Routing

==================================================== ==================================================== = SECOND FILE ======================================

  Computer Network Review Questions---Special Training for Multiple Choice Questions

1. The English abbreviation "WWW" means (  B ) 

A) the Internet

b. World Wide Web

c. Wide area network

D. Metropolitan area network

2. Which of the following protocols belongs to the application layer protocol of the TCP/IP architecture (  A ) 

A.  FTP

B.  UDP

C.  ARP

D.  IP

3. Which of the following protocols is a LAN protocol? ( A )   

A.  CSMA / CD           

B.  PPP           

C.  ATM               

D. Frame relay

4. Which of the following does not belong to the classification of computer networks according to the scope of function (  A ) 

A.   Public Network (PAN)

B.Local Area Network (LAN)

C. Metropolitan Area Network (MAN)

D. Wide Area Network (WAN)

5. How many digits are there in the network prefix corresponding to 255.255.255.0 ( C  ) 

A.  8

B.  16

C.  24

D.  32

6. Releasing the TCP connection requires 4 handshakes. How many handshakes must be done to establish a TCP connection? (C)

A. 1 time

B. 2 times

C. 3 times

D. 4 times

7. The ARP protocol is used for ( A  )

A. Interpret an IP address as a MAC address                 

B. Interpret MAC address as IP address  

C. Interpret the domain name as a MAC address                         

D. Interpret IP addresses as host domain names

8. The data units transmitted by the network layer, data link layer and physical layer are respectively ( D )  

A. Messages, frames, packets                          

B. 比特、报文、帧

C. 报文、比特、帧                          

D. 分组、帧、比特

9.统一资源定位符 URL 的作用是 ( C ???? )

A. 用于万维网浏览器程序和服务器程序的信息交互.    

B. 惟一地确定万维网上文档的地址      

C. 便于多媒体文件的上传与下载                     

D. 上述三种都不准确

10. 拥塞控制的四种算法是 (     A   )

A.  慢开始、拥塞避免、快重传、快恢复

B.  快开始、拥塞避免、慢重传、快恢复

C.  快开始、拥塞避免、快重传、慢恢复

D.  慢开始、拥塞避免、慢重传、慢恢复

11.CSMA/CD协议中“碰撞检测”的含义是 ( B )

A. 发送前先检测        

B.边发送边监听       

C. 发送完再监听           

D. 不发送也监听

12.滑动窗口协议主要用于进行( C  )

A 差错控制  

B 安全控制

C 流量控制   

D 拥塞控制

13.以下哪个是MAC地址( B )

A OD-01-02-AA  

B 00-01-22-OA-AD-01  

C AO.O1.00  

D 139.216.000.012.002

14.IP地址126.1.2.129/13的子网掩码可写为  C

A 255.224.0.0

B 255.240.0.0  

C 255.248.0.0

D 255.255.0.0

15. The domain name resolution process usually uses two query algorithms ( D  ) 

A. Spanning tree and shortest path

B. Carrier Sense and Collision Detection

C. Message Digest and Entity Authentication

D. Iteration and recursion

16. Which of the following agreements is not an e-mail agreement  (A)

A、CMIP    

B、IMAP    

C、POP3    

D、SMTP

17. Each end of the communication channel can be the sending end or the receiving end. Information can be transmitted from this end to the other end, or from that end to this end, but at the same time, there can only be one transmission of information. The way is ( B   )

A simplex communication

B half duplex

C full duplex

D simulation

18. The following IPs belong to class D addresses ( C   )

A 10.10.5.168   B 168.10.0.1

C 224.0.0.2     D 202.117.130.80

19. An IPv6 address is composed of a set of binary numbers, and its size is ( A  ) 

A.  128

B.  64

C.  32

D.  256

20. When configuring a Ruijie switch, which of the following commands assigns the current access port to VLAN 8?  (D)

A.  vlan-menbership static

B.  vlan database

C.  vlan8

D.  switchport access vlan 8

21. The network has had a positive impact on many aspects of social economy and life, "three networks"  refers to  (D)

A. Bus network, ring network, star network

B. IP network, NOVELL network, ETHERNET network

C. Telecommunications network, education network, Netcom network

D. Telecommunication networks, cable TV networks and computer networks

22. Which of the following is not part of time delay (A)

A. Delay-bandwidth product

B. Sending delay

C. Propagation delay

D. Processing Latency

23. The address length of the next generation Internet protocol IPv6 is ( C  ) 

A.32 bit             

B.64 bit            

C.128 bit               

D. 256 bit

24. The subnet mask of the IP address block 192.168.15.136/29 can be written as  ( D )

A、255.255.255.192     

B、255.255.255.224       

C、255.255.255.240     

D、255.255.255.248

25. In terms of network coverage, computer networks can be divided into local area networks, wide area networks and   (B)

A physical network     

B metropolitan area network  

C packet switched network     

D high speed network

26. In the following process of interaction between the DHCP server and the DHCP client, the error is   (A)

A. The source IP address used by the DHCP client to broadcast the "DHCP Discovery" message is 127.0.0.1

B. After the DHCP server receives the "DHCP discovery" message, it broadcasts the "DHCP supply" message to the network

C. After the DHCP client receives the "DHCP supply" message, it requests the DHCP server to provide an IP address.

D. The DHCP server broadcasts the "DHCP Acknowledgment" message and assigns the IP address to the DHCP client

27. The area covered by the wide area network ranges from tens of kilometers to thousands of kilometers, and its communication subnet mainly uses ( B  ).

A message switching technology

B packet switching technology

C file exchange technology

D circuit switching technology

28. If the IP address of a certain network is 192.12.69.248, then the network category of this address is ( C    ) 

A. Class A address

B. Class B address

C. Class C address

D. Private address

29. Which of the following statements about domain names is wrong (    C  )

A. The acronym for Domain Name System is DNS

B. The query from the host to the local domain name server is generally a recursive query

C. Use CHINA in the country's top-level domain name to represent China

D. The domain name is only a logical concept and cannot represent the physical location of the computer

30. The technical architecture of the Internet of Things (Internet of Things) can generally be divided into three layers: ( B   )

A. Physical layer, link layer, network layer                         

B. Perception layer, network layer, application layer

C. Perception layer, application layer, management layer                         

D. Link layer, transport layer, network layer

31. The data transmission unit of the data link layer is (   D   )

A. bit

B. Message

C. Segments

D. frame

32.  The role of the DNS server is ( A ) 

A. Convert domain name to IP address                          

B. Convert IP address to domain name

C. Providing web page access services to users                        

D. Provision of virtual space services to users

33. Which of the following is not a national top-level domain name ( C   )

A.  US

B.  UK

C.  CHINA

D. CN


3 4. The IP used for the local software loopback test is (   B  ) 

A. An IP address with all 0s

B. IP address with network number 127

C. IP address with all 1s

D. The IP address whose network number is 128.0.0.0

35. The basic means of packet switching network is to use ( A ) technology. 

A. store and forward        

B. No connection        

C. Connection-oriented          

D. Circuit switching

36. When the 100M Ethernet network card is in full-duplex mode, the actual total communication bandwidth is (   C ???  )

A.  400M bps          

B.  10/100M bps           

C.  200M bps             

D.  50M bps

37. Divide the total bandwidth of the channel into several, each of which transmits 1 signal. The technology is ( A   )

A.   Frequency Division Multiplexing (FDM)

B.   Time Division Multiplexing (TDM)

C.   Wavelength Division Multiplexing (WDM)

D.   Code Division Multiplexing (CDM)

38. The twisted-pair RJ-45 connector specifies the numbering of 8 pins ( A )

A 1, 2 send, 3, 6 receive                      

B. 1, 2, 3, 6 send, 4, 5, 7, 8 receive   

C. 1, 2, 3, 4 send, 5, 6, 7, 8 receive                

D. 1, 2 receive, 3, 4 receive

39. The most widely used local area network is  (A) .

A Ethernet B Token Ring   

C token bus network D peer-to-peer network

40. In wireless network technology literature, WiFi and WiMAX are respectively synonymous with ( B )

A. Wireless MAN and Wireless WAN               

B. Wireless Local Area Network and Wireless Metropolitan Area Network   

C. Wireless Ethernet and Wireless WAN               

D. Wireless Ethernet and Wireless WAN

41. The following IPs that are not private addresses are ( D )     

A.  10.1.1.1

B.  172.16.25.25

C.  192.168.69.248

D.  192.12.69.248

42. The following description of the UDP datagram is wrong (   D   ) 

A. is connectionless

B. is unreliable

C. No Confirmation Provided

D. Ensure data transmission through sequence number and confirmation mechanism

43. In the network architecture, the data units transmitted by the network layer, data link layer and physical layer are ( D  )

A. Messages, frames, packets                          

B. Bits, Messages, Frames

C. Messages, bits, frames                          

D. Packets, frames, bits

44. The MAC address is usually fixed on ( A  ) of the network communication terminal.

A. Network card               

B.Memory             

C. hard disk                 

D. High speed buffer

45. Which of the following communication methods has the best real-time performance? ( B  )

A. Message exchange        

B. Circuit switching      

C. Datagram Packet Switching       

D. Virtual Circuit Switching

46. ​​It is known that the polynomial used in cyclic redundancy detection is , then the divisor P should be ( A  )    

A.  1101

B.  11010

C.  0101

D.  1011

47. In the CSMA/CD agreement, the contention period is ( C   ) 

A. 512 microseconds

B.  512 IFS

C. 512 bit times

D.512 SIFS

48. Intermediary devices are used to connect networks, among which (D)

A. Transponder

B. Bridge

c. Router

D. Gateway

49. Which of the following statements about the firewall is correct (   D ??  ) 

A. A firewall is a specially programmed switch

B. The network inside the firewall is generally called "untrusted network"

C. The network outside the firewall is generally called "trusted network"

D. Firewalls can be divided into network-level firewalls and application-level firewalls according to different technologies used

50. IPv6 address 0000:00AA:0000:0000:0000:0000:0000:0000 can be written with zero compression ( C    ) 

A. 0:AA:0

B.  0::AA: 0

C.  0:AA::0

D.  0::AA:: 0

51. Wavelength division multiplexing refers to frequency division multiplexing of light, and its English abbreviation is ( C   ) 

A.  FDM

B.  TDM

C.  WDM

D.  CDM

52. In order to solve the problem of transparent transmission, the sender adds an escape character ( C  ) to the data  

A.  EOT

B.  SOH

C.   ESC

D.  CRC

53. When making a network cable, if the method of direct connection is used, the color order is ( C    )   

A. White orange, brown, white green, blue, white blue, green, white brown, brown

B. White orange, blue, white green, orange, white blue, green, white brown, brown

C. White orange, orange, white green, blue, white blue, green, white brown, brown

D. White green, green, white orange, blue, white blue, orange, white brown, brown

54. Using full-duplex work, the data transmission direction is: (A) 

  1. two-way    
  2. unidirectional    
  3. Two-way, but not simultaneous transmission   
  4. Neither is right

55. In the data link of the network, if the window size is 16, (B) bits are required to represent it. 

A.3        

B.4         

C.5            

D.6

56. In the OSI model, the relationship between the Nth layer and the N+l layer above it is: (A). 

A. Layer N provides services for Layer N+1  

B. N + 1 layer adds a header to the information received from N layer  

C. Layer N utilizes the services provided by layer N+1  

D. N layer has no effect on N+1 layer 

57. In the OSI reference model, it is (B) that is responsible for implementing the routing function. 

A.physical layer                        

B.Network layer        

C.session layer                        

D.presentation layer

58. A campus network belongs to (A).  

A.LAN         

B.WAN         

C.MAN        

D.PAN

59. (B) in the IP address of the host or router on the same LAN must be the same. 

A.host number                        

B.network number        

C.last byte                  

D.none of the above is right

60. The following (B) address is an email address. 

A.www.163.com              

B.[email protected] 

C.192.168.0.100        

D.http://www.sohu.com 

61. Which of the following communication methods has the best real-time performance? ( B  )

A. Message exchange          

B. Circuit switching      

C. Datagram Packet Switching       

D. Virtual Circuit Switching

62. When a host on network A sends a message to a host on network B, the router in between needs to check the ( C  ) address.

A. Physics             

b. port              

C. IP                    

D. MAC  

63. NAT technology is often used between the enterprise intranet and extranet, mainly for   ( D  )

A anti-virus          

B error control          

C flow control         

D IP address translation

64. The RARP protocol is used for ( B ) 

A. Interpret an IP address as a MAC address                      

B. Interpret MAC address as IP address  

C. Interpret the domain name as a MAC address                         

D. Interpret IP addresses as host domain names

65. In order to avoid the waste of IP addresses, it is necessary to divide the part of the host number in the IP address again, and divide it into two parts, namely (A). 

A.Subnet number and host number                 

B.Subnet number and network number  

C.host number and network number                 

D.Subnet number and extension number

66. Among the following Ethernet standards, the standard for wireless LAN is (D)

  1. IEEE802.3
  2. IEEE802.3i
  3. IEEE802.8
  4. IEEE802.11


6 7. Among the following protocols, the protocol that does not belong to the TCP/IP network layer is (C)

  1. ICMP
  2. ARP
  3. PPP
  4. RARP

68. The main function of a router is (A)

A path selection

B filter

C to increase speed

D flow control

69. Once the central node fails, the network topology of the entire network will be paralyzed (B)

A bus type

B star

C ring

D any type

70. Switches work in the OSI model (B)

A physical layer

B data link layer

C network layer

D application layer

71. The following IP addresses are legal IP host addresses (A)

A 1.255.255.2

B 127.2.3.5

C 255.23.200.9

D 192.157.78.254

72. The default port of the Web site is (A)

A 80

B 8000

C 8080

D 8008

73. The following (C) is not dependent on TCP

A SMTP

B POP3

C DHCP

D FTP

74. The following (B) protocol is the application layer protocol in the TCP/IP protocol stack

A ICMP

B HTTP

C TCP

D IP

75. Set a default route in the routing table, the destination address should be (D)

A 127.0.0.0

B 127.0.0.1

C 1.0.0.0

D 0.0.0.0

76.TCP is a connection-oriented protocol that provides (C) services

A simplex

B half duplex

C full duplex

D one-way

77. The unit to measure the data transmission rate on the network is bit/s, and its meaning is (C)

How many kilometers does a signal travel per second

How many thousand kilometers is the B signal transmitted per second

How many binary bits are transmitted per second in C

D How much data is transmitted per second

78.UDP is the (B) protocol of the TCP/IP protocol suite

A application layer

B transport layer

C network layer

D network interface layer

79. In PPP synchronous transmission, the data bit string 0111101111110111110 is framed and sent as ( D )

A 0111101111110111110

B 00111101111110111110

C 01111011111010111110

D 011110111110101111100

  1. What is a frame relay network?  A

A. Wide area network B. Local area network C. ATM network D. Ethernet

==================================================== ========================== The third file ========================== ===================================================

Questions and Answers Calculation Exercises

  1. Describe the names and functions of each layer of the TCP/IP architecture and OSI architecture. P31

TCP/IP OSI

application layer physical layer

transport layer data link layer

internet layer network layer

network interface layer                                transport layer

                                          session layer

                                          presentation layer

                                          application layer    

TCP/IP Architecture

Application layer: Realize communication and interaction between application processes

Transport layer: Responsible for communication between processes in two hosts and providing general data transmission services. There are two protocols, TCP and UDP.

Network layer: Responsible for providing communication services for different hosts on the packet switching network.

Data link layer: 1. Combine data into data blocks and encapsulate them into frames; 2. Error control; 3. Flow control

OSI architecture

Physical layer: realize the transparent transmission of bit stream. Basic unit: bit.

Data link layer: physical address addressing, data framing, flow control, data error detection, retransmission, etc. At this layer, the unit of data is called a frame.

Network layer: path selection, data forwarding. Transparent transmission of packets from source host to destination host

Transport layer: port (port) to port (port) message 

Session layer: establish, maintain and release user-oriented connections between two nodes, and manage and control sessions to ensure reliable transmission of session data.

Presentation layer: responsible for data format conversion, compression and decompression, encryption and decryption.

Application layer: The application layer provides an interface for the operating system or network applications to access network services.

  1. What are the classification methods of computer networks, and what are the categories according to different division methods? P20

According to the scope of the network: wide area network, metropolitan area network, local area network, personal area network

By network user: public network, private network

  1. Describe the main points of the network architecture of the five-layer protocol, including the main functions of each layer. P31

Physical layer: Consider how much voltage to use to represent 0 or 1, and identify the bits sent by the sender, and also determine how many pins the plug of the connecting cable has, and how to connect each pin.

Digital link layer: When transmitting data, the link layer encapsulates the IP datagrams passed down from the network layer into frames; when receiving data, after receiving a frame, it can extract the data part from it and hand it over to the network layer.

Network layer: responsible for providing communication services for different hosts on the packet switching network; selecting appropriate routes so that the packets transmitted by the host transport layer can find specific hosts through the routes in the network.

Transport layer: Responsible for providing general data transmission services for communication between processes in two hosts

Application layer: complete specific network applications through the interaction between application processes

4. The PPP protocol uses synchronous transmission technology to transmit the bit string 011011111111100. What kind of bit string does it become after zero bit padding? If the data part of the PPP frame received by the receiving end is 0001110111110111110110, what kind of bit string will become after deleting the zero bits added by the sending end?

011011111011111000

00011101111111111110

5. What are the characteristics of a routing protocol in an ideal state ? P151

Algorithms must be correct and complete

Algorithms should be computationally simple

Algorithms adapt to changes in traffic and network topology

Algorithms should be stable

algorithm is fair

algorithm is optimal

6. What are the network topologies of commonly used LANs? Which one is the most commonly used at the moment? P82

Star network, ring network, bus network

star network

  1. How many types of IP addresses are there? What are the two fields for each type of address? What are the lengths of the fields? P119

A Network number 1 Host number 3   

B Network number 2 Host number 2

C Network No. 3 Host No. 1

8. What is the function of ping command, what is the function of ping 127.0.0.1? P149

Used to test connectivity between two hosts

The purpose is to detect whether the circuit of the machine is normal, to test the connectivity between the machine and the machine,

  

  1. Please explain the working process of a browser using the HTTP protocol to access a web page. P267

Each World Wide Web (WWW) site has a server process that constantly listens to port 80 of TCP (Transmission Control Protocol) in order to find out whether a browser initiates a connection establishment request to it. Once the connection establishment request is monitored and the TCP connection is established , the browser sends a request to the World Wide Web server to browse a certain page, and the World Wide Web server returns the requested page as a response, and finally the TCP connection is released.

9. Please explain in detail the three-way handshake process of TCP connection establishment. P238

The TCP protocol provides reliable connection services and uses three-way handshake to establish connections. 

The first handshake: When the connection is established, the client sends a SYN packet (SYN=1) to the server, randomly generates a data packet of seq=X to the server, and waits for the server to confirm;

The second handshake: After the server receives the request to confirm the online information, it must confirm the client's SYN ( ack=X+1 ), and at the same time, it also sends a SYN package, that is, SYN+ACK package, that is, SYN=1, ACK=1 , and randomly generate packets with seq=Y; 

The third handshake: the client receives the SYN + ACK packet from the server and sends an acknowledgment packet ACK (ack=Y+1) to the server. After the packet is sent, the client and server enter the ESTABLISHED state and complete the three-way handshake. The server starts sending data.

  1. Please explain the domain name resolution process, and what are the two ways to query the domain name? Try to explain their difference. P258

The two domain name query methods are recursive query and iterative query:

Recursive query, the query from the host to the local domain name server generally uses recursive query, if the local domain name server does not know the IP address of the host query domain name, the local domain name server will continue to send queries to other root domain name servers as a DNS (computer domain name) client Request message, instead of letting the host to perform the next query by itself.

Iterative query, the query from the local domain name server to the root domain name server generally uses iterative query. When the root domain name server receives the iterative query request message sent by the local domain name server, it either gives the query IP address, or tells the local domain name server the next step Which domain name server do you want to query, and then let the local domain name server perform the next query by itself.

  1. What is the difference between TCP and UDP protocols? P205

13. Please briefly describe the working process of the ARP protocol. P124

1. The ARP process broadcasts an ARP request packet on the local area network

2. All ARP processes running on all hosts on the local area network receive this ARP request packet

3. The IP address of host B is the same as the IP address to be queried in the ARP request packet, so it accepts the ARP request packet, sends an ARP response packet to host A, and writes its own hardware address in the ARP response packet

4. After host A receives the ARP response packet from host B, it writes the mapping from the IP address of host B to the hardware address in its ARP cache

  1. Please briefly describe the CSMA/CD protocol data transmission process. P85

For a station to send data, it must first listen to the channel. If the channel is idle, send data immediately and perform collision detection; if the channel is busy, continue to listen to the channel until the channel becomes idle, then continue to send data and perform collision detection. If a station detects a collision while sending data, it will immediately stop sending data and wait for a random long time, repeating the above process.

Mantra: listen first and then send, listen and send at the same time, stop the conflict, delay and resend

Calculation problems:

  1. The data to send is 1101011011 . The generator polynomial using CRC is . Find the remainder that should be added after the data .  

According to the title: M = 1101011011 P = 10011 then n = 4, then 2 n M = 11010110110000 According to binary division, R = 1110

2试辨认以下IP地址的网络类别。

(1) 128.36.199.3    B

(2) 21.12.240.17    A

(3) 183.194.76.253  B

(4) 192.12.69.248  C

  1. 一个主机的IP地址是136.160.160.134子网掩码是255.255.255.224,试求该主机所在的网络地址。

136.160.160.10000110

255.255.255.11100000

136.160.160.10000000

136.160.160.128

4。某单位分配到一个地址块136.23.12.64/26。现在需要进一步划分两个一样大的子网。试问:1、 每个子网的前缀有多长?2、 每一个子网中有多少个地址?3、 每一个子网的地址块是什么?4、 每一个子网可分配给主机使用的最小地址和最大地址是什么?

27

2^{5} - 2

136.23.12.64/27   136.23.12.010 00001-136.23.12.01011110

136.23.12.96/27   136.23.12.011 00001-136.23.12.01111110

  1. 已知地址块中的一个地址是140.120.84.24/20。试求这个地址块中的最小地址和最大地址。地址掩码是什么?地址块中共有多少个地址?相当于多少个C类地址?

140.120.80.0-140.120.95.255

255.255.255.240

2^{12} -2

16

6. Assume that the routing table of router A in the network has the following items (these three columns represent "destination network", "distance" and "next hop router")

N1 4 B

N2 2 C

N3 1 F

N4 5 G

Now A receives the routing information from C (these two columns represent "destination network" and "distance" respectively):

N1 2

N2 1

N3 3

N4 7

Find the updated routing table of router A.

N1  3  C

N2  2  C

N 3   1 F

N4  5  G

7. If the PPP data frame 1011110 is encoded using the Manchester encoding method during synchronous transmission, please draw its waveform and explain the reason.

Rationale: An upward transition in the center of a bit period represents a 0, and a downward bar in the center of a bit period represents a 1.

  1. A certain department is assigned an IP address of 190.85.145.64 with a subnet mask of 255.255.255.192. There are currently 5 computers in each of the three offices in the department. What is the minimum address that each office can assign to the host computer? (Known: 190=10111110, 85=1010101, 145=10010001, 64=1000000, 192=11000000, 224=11100000, 248=11111000, 252=11111100, 240=11110000)

190.85 .145.01000000

255.255.255.11000000

190.85 .145.01000000(64)/26

190.85 .145.01000 001/28

190.85 .145.01010 001/28

190.85 .145.01100 001/28

9. The Internet construction standard published in 1999 stipulates four algorithms of congestion control, slow start, congestion avoidance, fast retransmission, and fast recovery. The known relationship between the congestion window of the first 12 rounds and the transmission round is shown in the figure. If the sender receives three repeated acknowledgments in the 12th round and starts to execute the fast retransmission algorithm , please draw the following 13 to 22 rounds in the figure and explain the reason.

The congestion window changes to 12 13 14 15 16 17 18 19 20 21 22. According to the fast retransmission algorithm, if three repeated confirmations are received in a row, the threshold value and the congestion window should be adjusted to half, and then the congestion window will be increased by one every round 

10. The relationship between the size of  the TCP congestion window cwnd and the transmission round n is as follows:

n cwnd

1  1

2  2

3  4

4  8

5  16

6  32

7  33

8  34

9  35

10 36

11 37

12 38

13 39

n cwnd

14 40

15 41

16 42

17 21

18 22

19 23

20 24

21 25

22 26

23  1

24  2

25  4

26 8

( 1 ) Try to draw the relationship curve between the congestion window and the transmission round.

( 2 ) Indicates the time interval during which TCP works in the slow start phase. Round 6

( 3 ) Indicate the time interval during which TCP works in the congestion avoidance phase. Round 16

( 4 ) When sending in the 1st round, the 6th round and the 22nd round, what is the threshold ssthresh set to respectively?

         32        32          21

Guess you like

Origin blog.csdn.net/csxylrf/article/details/129190424