77范文网 - 专业文章范例文档资料分享平台

2004-2005春夏学期《计算机网络基础》期末试卷(6)

来源:网络收集 时间:2020-11-29 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

and can be embedded into HTML pages, interpreted by JVM-capable browsers. A. JavaScript B. JavaBean C. Applet D. JSP

49. Which of the following best describes the function of the OSI reference model’s transport layer?

A. It sends data by using flow control B. It provides the best path for delivery C. It determines network addresses D. It provides error-correcting

50. What is the most efficient subnet mask to use on point-to-point WAN links? A. 255.255.255.0 B. 255.255.255.224 C. 255.255.255.252 D. 255.255.255.248

二、 Please choose true(T) or false( F) for the following questions (15 points) 1. Error-correcting and error-detecting are two types of technique in error control.

2. Link state dynamic routing algorithms operate by having each router maintain a table giving the best known distance to each destination and which line to use to get there. These tables are updated by exchanging information with the neighbors.

3. With Manchester encoding, each bit period is divided into two equal intervals. A binary 1 bit is sent by having the voltage set high during the first interval and low in the second one. A binary 0 is just the reverse: first low and then high.

4. A connection is established in TCP by means of the two-way handshake.

5. The range of frequencies transmitted without being strongly attenuated is called bandwidth. 6. Shannon’s major result is that the maximum data rate of a noisy channel whose bandwidth is H Hz, and whose signal-to-noise ratio is S/N, is given by Maximum number of baud/sec = H log2 (1+S/N)

7. Two different switching techniques are widely used nowadays: circuit switching and packet switching.

8. The protocols used to determine who goes next on a multi-access channel belong to a sub-layer of the data link layer called the LLC sublayer.

9. The basic function of RTP is to multiplex several real-time data streams onto a single stream of UDP packets.

10. The Internet solution is to realize that two potential problems exist network capacity and receiver capacity and to deal with each of them separately. To do so, each sender maintains two windows: the window the receiver has granted and a second window, the congestion window.

11. Selective repeat, is for the receiver simply to discard all subsequent frames, sending no acknowledgments for the discarded frames.

12. The IPSec is a set of open standards that provides data confidentiality, data integrity, and authentication between participating peers at the IP layer. 13. B2C, the full name is Business to Company.

14. One type of person-to-person communication often goes by the name of end-to-end communication, to distinguish it from the client-server model.

15. An issue that occurs at every level is how to keep a fast sender from swamping a slow received with data. This subject is called flow control.

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说教育文库2004-2005春夏学期《计算机网络基础》期末试卷(6)在线全文阅读。

2004-2005春夏学期《计算机网络基础》期末试卷(6).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/jiaoyu/1154928.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: