77·¶ÎÄÍø - רҵÎÄÕ·¶ÀýÎĵµ×ÊÁÏ·ÖÏíÆ½Ì¨

¼ÆËã»úÍøÂç(µÚËİæ)¿ÎºóϰÌâ(Ó¢ÎÄ)+ϰÌâ´ð°¸(ÖÐÓ¢ÎÄ)(8)

À´Ô´£ºÍøÂçÊÕ¼¯ ʱ¼ä£º2018-12-10 ÏÂÔØÕâÆªÎĵµ ÊÖ»ú°æ
˵Ã÷£ºÎÄÕÂÄÚÈݽö¹©Ô¤ÀÀ£¬²¿·ÖÄÚÈÝ¿ÉÄܲ»È«£¬ÐèÒªÍêÕûÎĵµ»òÕßÐèÒª¸´ÖÆÄÚÈÝ£¬ÇëÏÂÔØwordºóʹÓá£ÏÂÔØwordÓÐÎÊÌâÇëÌí¼Ó΢ÐźÅ:»òQQ£º ´¦Àí£¨¾¡¿ÉÄܸøÄúÌṩÍêÕûÎĵµ£©£¬¸ÐлÄúµÄÖ§³ÖÓëÁ½⡣µã»÷ÕâÀï¸øÎÒ·¢ÏûÏ¢

Ï֡µÄÄ¿µÄµØµ½ c£»ÀýÈçÍøÇÅ D µÄÉ¢Áбí»áÓÖÓÐÒ»¸ö´Ó LAN 2 ת·¢µ½Ä¿µÄµØ ÍøÇÅ G, I and J ²»ÓÃÓÚת·¢ÈκÎÖ¡¡£Ö÷ÒªÔ­ÒòÔÚÓÚÓÐÑ­»·¿ÉÒÔΪһ¸öÀ©Õ¹µÄ LAN c µÄ

Ìá¸ß¿É¿¿ÐÔ¡£Èç¹ûµ±Ç°Éú³ÉÊ÷ÖеÄÍøÇÅÓлµµÄ£¬Ôò¶¯Ì¬Éú³ÉÊ÷Ëã·¨»áÖØÐÂÅäÖÃÒ»¿Ã

±íÏµÚÈýÖ¡½«»á±»ÍøÇÅ H£¬D£¬A£¬ÒÔ¼° B ÊÕµ½£¬ÕâÐ©ÍøÇŽ«»áÔÚËüÃǵÄÉ¢Áбí

еÄÉú³ÉÊ÷£¬Ëü¿ÉÄÜ»á°üº¬Ò»¸ö»ò¶à¸ö²»ÔÚÔ­ÏȵÄÉú³ÉÊ÷ÖеÄÍøÇÅ¡£

ÖÐ

39. Imagine that a switch has line cards for four input lines. It frequently happens Ôö¼ÓÒ»¸ö±íÏ֡µÄÄ¿µÄµØµ½ d£»µÚËÄÖ¡½«»á±»ÍøÇÅ E£¬C£¬B£¬D£¬ÒÔ¼° A

that a frame arriving on one of the lines has to exit on another line on the same card. ÊÕµ½£¬

ÍøÇÅ E ºÍ C »áÔÚËüÃǵÄÉ¢ÁбíÖÐÔö¼ÓÒ»¸ö±íÏ֡µÄÄ¿µÄµØµ½ d£¬µ±ÍøÇÅ D£¬What choices is the switch designer faced with as a result of this situation?£¨E£©

×î¼òµ¥×öÑ¡Ôñ¾ÍÊDz»×öÌØÊâ´¦Àí¡£Ã¿Ò»¸öµ½À´µÄÖ¡±»Êä³öµ½µ×°å²¢±»·¢Ë͵½Ä¿±ê B£¬

¿¨ÉÏ¡£Õâʱ£¬¿¨ÄÚÁ÷Á¿Í¨¹ýµ×°å£»ÁíÒ»ÖÖÑ¡Ôñ¾ÍÊÇʶ±ð³öÕâÖÖÇé¿ö²¢ÇÒ¶ÔÆäרÃÅ´¦ ÒÔ¼° A ¸üÐÂËüÃǵÄÉ¢ÁбíÏîʱ£¬µ½´ïÄ¿µÄµØ d

µ± d ÒÆµ½ LAN6 ÉÏÈ¥ºó£¬Èç¹ûËû·¢Êý¾Ý¸ø a µÄ»°£¬Â·ÓÉ j£¬Ò»¶¨¿ÉÒÔÖªµÀ d Àí£¬Ö±½Ó·¢ËÍÖ¡²¢ÇÒ²»Í¨¹ýµ×°å¡£ ÔÚ LAN6

Éϵ쬴ð°¸ÖÐûÓиø³ö j µÄÕâÒ»±íÏî¡£

40. A switch designed for use with fast Ethernet has a backplane that can move 10 Gbps. How many frames/sec can it handle in the worst case?£¨E£©

×µÄÇé¿ö¾ÍÊÇÎÞÇîµÄ 64-byte (512-bit)Ö¡Á÷¡£Èç¹ûµ×°åÄÜ´¦Àí 10bps£¬¿É´¦ÀíµÄ

9

38. One consequence of using a spanning tree to forward frames in an extended

9

LAN is that some bridges may not participate at all in forwarding frames. Identify Ö¡µÄÊýÁ¿Îª 10/512 = 1,953,125 frames/sec.

41. Consider the network of Fig. 4-49(a). If machine J were to suddenly become three such bridges in Fig. 4-44. Is there any reason for keeping these bridges, even

white, would any changes be needed to the labeling? If so, what?£¨E£© though they are not used for forwarding?£¨E£©

- 18 -

¶Ë¿Ú B1 µ½ LAN 3 ÐèÒª±»ÖØÐ±ê¼ÇΪ GW. ¿ÉÒÔ¹¤×÷¡£½øÈëºËÐÄÓòµÄÖ¡¶¼»áÊǺϷ¨Ö¡£¬Òò´ËÖ¡»áÔÚµÚÒ»¸öºËÐĽ»»»»úÀï±»¼Ó Éϱê¼Ç£¬¿ÉÒÔÓà MAC »ò IP µØÖ·¡£ ÀàËÆµÄ£¬ÔÚ³ö¿Ú´¦£¬½»»»»úÈ¥µôÕâЩ±ê¼ÇºóÔÙ Êä³öÖ¡¡£ 42. Briefly describe the difference between store-and-forward and cut-through Chapter 5 The Network Layer Problems switches.£¨E£© 1. Give two example computer applications for which connection-oriented service Ò»¸ö´æ´¢×ª·¢½»»»»úÔÚËüµÄ±íÏîÀï´æ´¢½øÀ´µÄÿһ֡£¬È»ºó¼ì²é²¢ÇÒת·¢Ëü£»Ö± is appropriate. Now give two examples for which connectionless service is best.(E)

ͨÐͽ»»»»úÖ¡Ò»½øÀ´¾ÍÍêȫת·¢µô¡£Ö»ÒªÄ¿µÄµØµØÖ·ÊÇ¿ÉÓõģ¬×ª·¢¾Í¿ÉÒÔ¿ªÊ¼¡£ 43. Store-and-forward switches have an advantage over cut-through switches with Îļþ´«ËÍ¡¢Ô¶³ÌµÇ¼ºÍÊÓÆµµã²¥ÐèÒªÃæÏòÁ¬½ÓµÄ·þÎñ¡£ÁíÒ»·½Ã棬ÐÅÓÿ¨ÑéÖ¤ºÍ respect to damaged frames. Explain what it is.£¨E£© ´æ´¢×ª·¢Ðͽ»»»»ú´æ´¢Õû¸öÖ¡È»ºóת·¢ËüÃÇ¡£Ò»¸öÖ¡µ½À´ºó£¬¿ÉÒÔÑé֤УÑéºÍ£¬ Èç¹ûÖ¡±»ÆÆ»µÁË£¬ÂíÉ϶ªµô»µÖ¡¡£ÓÃֱͨÐͽ»»»»ú£¬»µÖ¡²»Äܱ»½»»»»ú¶ªµô£¬ÒòΪ ÆäËûµÄÏúÊÛµãÖÕ¶Ë¡¢µç×Ó×ʽð×ªÒÆ£¬ÒÔ¼°Ðí¶àÐÎʽµÄÔ¶³ÌÊý¾Ý¿â·ÃÎÊÉúÀ´¾ßÓÐÎÞÁ¬ ½ÓµÄÐÔÖÊ£¬ÔÚÒ»¸ö·½ÏòÉÏ´«ËͲéѯ£¬ÔÚÁíÒ»¸ö·½ÏòÉÏ·µ»ØÓ¦´ð¡£ 2. Are there any circumstances when connection-oriented service will (or at least should) deliver packets out of order? Explain.(M) ÄÇʱ¼ì²â´íÎóµÄͬʱ֡¾ÍÒѾ­×ªµôÁË¡£ ÓС£ÖжÏÐźŲ»×ñ´Ó˳ÐòµÄͶµÝ£¬Ëü»áÌø¹ýÔÚËüÇ°ÃæµÄÊý¾Ý¡£ÀýÈçÊǵ±Ò»¸öÖÕ¶Ë 44. To make VLANs work, configuration tables are needed in the switches and Óû§¼üÈëÍ˳ö£¨»ò kill£©½¡Ê±£¬ÓÉÍ˳öÐźŲúÉúµÄ·Ö×é±»Á¢¼´·¢ËÍ£¬²¢ÇÒÌø¹ýÁ˵± bridges. What if the VLANs of Fig. 4-49(a) use hubs rather than multidrop cables? ǰ¶ÓÁÐÖеȴý³ÌÐò´¦ÀíµÄÅÅÔÚÇ°ÃæÈκÎÊý¾Ý£¨¼´ÒѾ­¼üÈ뵫û±»³ÌÐò¶ÁÈ¡µÄÊý¾Ý£©¡£ Do the hubs need configuration tables, too? Why or why not?£¨E£© 3. Datagram subnets route each packet as a separate unit, independent of all ²»×ö·ÓÉ£¬½øÈëµ½¼¯Ï߯÷µÄÿһ֡·Ö·¢µ½ËùÓÐÆäËüµÄÏß·ÉÏ¡£ others. Virtual-circuit subnets do not have to do this, since each data packet follows 45. In Fig. 4-50 the switch in the legacy end domain on the right is a VLAN-aware a predetermined route. Does this observation mean that virtual-circuit subnets do

not need the capability to route isolated packets from an arbitrary source to an switch. Would it be possible to use a legacy switch there? If so, how would that work? arbitrary destination? Explain your answer.£¨E£© If not, why not?£¨E£©

²»¶Ô¡£ÎªÁËʹ·Ö×éÄÜ´ÓÈÎÒâÔ´µ½´ïÈÎÒâÄ¿µÄµØ£¬Á¬½Ó½¨Á¢Ê±ÒªÑ¡Ôñ·ÓÉ£¬Ðéµç· ÍøÂçÒ²ÐèÒªÕâÒ»ÄÜÁ¦¡£ ²»ÐèÒª£¬¼¯Ï߯÷Ö»Êǽ«ËùÓеÄÊäÈëÏßÊÕ¼¯ÔÚÒ»Æð£¬²¢Ã»ÓнøÐÐÅäÖá£ÔÚ¼¯Ï߯÷ÖÐ 4. Give three examples of protocol parameters that might be negotiated when a connection is set up.£¨E£©

ÔÚÁ¬½Ó½¨Á¢µÄʱºò¿ÉÄÜҪЭÉÌ´°¿ÚµÄ´óС¡¢×î´ó·Ö×é³ß´çºÍ³¬Ê±Öµ¡£

- 19 -

5. Consider the following design problem concerning implementation of

virtual-circuit service. If virtual circuits are used internal to the subnet, each data packet must have a 3-byte header and each router must tie up 8 bytes of storage for circuit identification. If datagrams are used internally, 15-byte headers are needed but no router table space is required. Transmission capacity costs 1 cent per 106 bytes, per hop. Very fast router memory can be purchased for 1 cent per byte and is depreciated over two years, assuming a 40-hour business week. The statistically average session runs for 1000 sec, in which time 200 packets are transmitted. The mean packet requires four hops. Which implementation is cheaper, and by how much?£¨H£© 4 ÌøÒâζ×ÅÒýÈëÁË 5 ¸ö·ÓÉÆ÷¡£ÊµÏÖÐéµç·ÐèÒªÔÚ 1000 ÃëÄڹ̶¨·ÖÅä 5*8=40 ×Ö ½ÚµÄ´æ´¢Æ÷¡£ÊµÏÖÊý¾Ý±¨ÐèÒª±ÈʵÏÖÐéµç·¶à´«Ë͵ÄÍ·ÐÅÏ¢µÄÈÝÁ¿µÈÓÚ(15-3 ) ¡Á4¡Á200£½9600 ×Ö½Ú-Ìø¶Î¡£ ÏÖÔÚµÄÎÊÌâ¾Í±ä³ÉÁË 40000

×Ö½Ú-Ìø¶ÎµÄµç·ÈÝÁ¿µÄ 7

ËùÓеÄ·ÓÉÑ¡ÔñÈçÏ£º ABCD, ABCF, ABEF, ABEG, AGHD, AGHF, AGEB, and AGEF£¬ËùÒÔ×ÜÌøÊýΪ 24 8. Give a simple heuristic for finding two paths through a network from a given source to a given destination that can survive the loss of any communication line (assuming two such paths exist). The routers are considered reliable enough, so it is not necessary to worry about the possibility of router crashes.£¨E£©

ʹÓÃ×î¶Ìͨ·ËÑË÷Ë㷨ѡÔñÒ»Ìõ·¾¶£¬È»ºó£¬É¾³ý¸ÕÕÒµ½µÄ·¾¶ÖеÄʹÓõÄËùÓÐ µÄ»¡£¨¶ÔÓ¦¸÷ÌõÁ´Â·£©¡£½Ó×Å£¬ÔÙÔËÐÐÒ»´Î×î¶Ìͨ·ËÑË÷Ëã·¨¡£Õâ¸öµÚ 2 Ìõ·¾¶ÔÚ µÚ 1 Ìõ·¾¶ÖÐÓÐÏß·ʧЧµÄÇé¿öÏ£¬¿ÉÒÔ×÷ÎªÌæ´ú·¾¶ÆôÓã»·´Ö®ÒàÈ»¡£

×Ö½Ú-ÃëµÄ´æ´¢Æ÷¶Ô±È 9600¿ªÏú¡£Èç¹û´æ´¢Æ÷µÄʹÓÃÆÚΪÁ½Ä꣬¼´ 3600¡Á8¡Á5¡Á52¡Á2=1.5¡Á10Ã룬һ¸ö×Ö½Ú-ÃëµÄ ´ú¼ÛΪ 1/( 1.5¡Á107)= 6.7¡Á10-8·Ö£¬ÄÇô 40000 ×Ö½Ú-ÃëµÄ´ú¼ÛΪ 2.7 ºÁ·Ö¡£ÁíÒ»·½Ã棬 -61 ¸ö×Ö½Ú-Ìø¶Î´ú¼ÛÊÇ 10·Ö£¬9600 ¸ö×Ö½Ú-Ìø¶ÎµÄ´ú¼ÛΪ 10-6¡Á\‘@2X9600=9.6¡Á10-3·Ö£¬¼´

9.6 ºÁ·Ö£¬¼´ÔÚÕâ 1000 ÃëÄÚµÄʱ¼äÄÚ±ãÒË´óÔ¼ 6.9 ºÁ·Ö¡£ 9. Consider the subnet of Fig. 5-13(a). Distance vector routing is used, and the following vectors have just come in to router C: from B: (5, 0, 8, 12, 6, 2); from D:

6. Assuming that all routers and hosts are working properly and that all software (16, 12, 6, 0, 9, 10); and from E: (7, 6, 3, 9, 0, 4). The measured delays to B, D, and E, in both is free of all errors, is there any chance, however small, that a packet will be are 6, 3, and 5, respectively. What is C's new routing table? Give both the outgoing

line to use and the expected delay.£¨M£© delivered to the wrong destination?£¨E£© ÓпÉÄÜ¡£´óµÄÍ»·¢ÔëÉù¿ÉÄÜÆÆ»µ·Ö×顣ʹÓà k λµÄ¼ìÑéºÍ£¬²î´íÈÔÈ»ÓÐ 2-k µÄ¸Å

Âʱ»Â©¼ì¡£Èç¹û·Ö×éµÄÄ¿µÄµØ¶Î»òÐéµç·ºÅÂë±»¸Ä±ä£¬·Ö×齫»á±»Í¶µÝµ½´íÎóµÄÄ¿ µÄµØ£¬²¢¿ÉÄܱ»½ÓÊÕΪÕýÈ·µÄ·Ö×é¡£»»¾ä»°Ëµ£¬Å¼È»µÄÍ»·¢ÔëÉù¿ÉÄܰÑËÍÍùÒ»¸öÄ¿ µÄµØµÄÍêÈ«ºÏ·¨µÄ·Ö×é¸Ä±ä³ÉËÍÍùÁíÒ»¸öÄ¿µÄµØµÄÒ²ÊÇÍêÈ«ºÏ·¨µÄ·Ö×é¡£ 7. Consider the network of Fig. 5-7, but ignore the weights on the lines. Suppose that it uses flooding as the routing algorithm. If a packet sent by A to D has a maximum hop count of 3, list all the routes it will take. Also tell how many hops worth of bandwidth it consumes.£¨E£©

A£¬ B£¬C£¬D£¬ E£¬F

ͨ¹ý B ¸ø³ö£¨11£¬6£¬14£¬18£¬12£¬8£©

- 20 -

ͨ¹ý D ¸ø³ö£¨19£¬15£¬9£¬3£¬12£¬13£© ͨ¹ý E ¸ø³ö£¨12£¬11£¬8£¬14£¬5£¬9£© È¡µ½´ïÿһĿµÄµØµÄ×îСֵ£¨C

³ýÍ⣩µÃµ½£º£¨11£¬6£¬0£¬3£¬5£¬8£©

Êä³öÏß·ÊÇ£º£¨B£¬B£¬-£¬D£¬E£¬B£© 10. If delays are recorded as 8-bit numbers in a 50-router network, and delay vectors are exchanged twice a second, how much bandwidth per (full-duplex) line is chewed up by the distributed routing algorithm? Assume that each router has three lines to other routers.£¨E£© ·ÓɱíµÄ³¤¶ÈµÈÓÚ 8*50=400bit¡£¸Ã±íÿÃëÖÓÔÚÿÌõÏß·ÉÏ·¢ËÍ 2 ´Ë 400*2=800b/s£¬¼´ÔÚÿÌõÏß·µÄÿ¸ö·½ÏòÉÏÏûºÄµÄ´ø¿í¶¼ÊÇ 800 bps¡£ 11. In Fig. 5-14 the Boolean OR of the two sets of ACF bits are 111 in every row. Is this just an accident here, or does it hold for all subnets under all circumstances? £¨M£© ËüÇøµÄ·ÓÉ£¬14 ¸ö±íÏîÓÃÓÚÔ¶³ÌµÄȺ£¬Õâʱ·Óɱí³ß´ç×îСΪ 20+15+14¡£

´Î£¬ÒòÕâ¸ö½áÂÛ×ÜÊdzÉÁ¢µÄ¡£Èç¹ûÒ»¸ö·Ö×é´ÓijÌõÏß·Éϵ½´ï£¬±ØÐëÈ·ÈϰüµÄµ½´ï¡£ Èç ¹ûÏß·ÉÏûÓзÖ×éµ½´ï£¬Ëü¾ÍÊÇÔÚ·¢ËÍÈ·ÈÏ¡£Çé¿ö 00 ( ûÓзÖ×éµ½´ï²¢ÇÒ²»·¢ËÍÈ· ÈÏ)ºÍ 11 (µ½´ïºÍ·µ»Ø)Âß¼­ÉÏ´íÎó£¬Òò´Ë²»´æÔÚ¡£ 12. For hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three-layer hierarchy? A good starting place is the hypothesis that a solution with k clusters of k regions of k routers is close to optimal, which means that k is about the cube root of 4800 (around 16). Use trial and error to check out combinations where all three parameters are in the general vicinity of 16.

ÒÀÌâ¿ÉÑ¡Ôñ 15 ¸öȺ¡¢16 ¸öÇø£¬Ã¿¸öÇø 20 ¸ö·ÓÉÆ÷ʱ£¬¼´Ê¹µÃ

4800=15*16*20£¬

Õâʱÿ¸ö·ÓÉÆ÷ÐèÒª 20 ¸ö±íÏî¼Ç¼±¾µØÂ·ÓÉÆ÷£¬15 ¸ö±íÏî¼Ç¼ÓÃÓÚµ½Í¬Ò»ÈºÄÚÆä

°Ù¶ÈËÑË÷¡°77cn¡±»ò¡°Ãâ·Ñ·¶ÎÄÍø¡±¼´¿ÉÕÒµ½±¾Õ¾Ãâ·ÑÔĶÁÈ«²¿·¶ÎÄ¡£Êղر¾Õ¾·½±ãÏ´ÎÔĶÁ£¬Ãâ·Ñ·¶ÎÄÍø£¬Ìṩ¾­µäС˵×ÛºÏÎÄ¿â¼ÆËã»úÍøÂç(µÚËİæ)¿ÎºóϰÌâ(Ó¢ÎÄ)+ϰÌâ´ð°¸(ÖÐÓ¢ÎÄ)(8)ÔÚÏßÈ«ÎÄÔĶÁ¡£

¼ÆËã»úÍøÂç(µÚËİæ)¿ÎºóϰÌâ(Ó¢ÎÄ)+ϰÌâ´ð°¸(ÖÐÓ¢ÎÄ)(8).doc ½«±¾ÎĵÄWordÎĵµÏÂÔØµ½µçÄÔ£¬·½±ã¸´ÖÆ¡¢±à¼­¡¢ÊղغʹòÓ¡ ÏÂÔØÊ§°Ü»òÕßÎĵµ²»ÍêÕû£¬ÇëÁªÏµ¿Í·þÈËÔ±½â¾ö£¡
±¾ÎÄÁ´½Ó£ºhttps://www.77cn.com.cn/wenku/zonghe/355989.html£¨×ªÔØÇë×¢Ã÷ÎÄÕÂÀ´Ô´£©

Ïà¹ØÍÆ¼ö£º

Copyright © 2008-2022 Ãâ·Ñ·¶ÎÄÍø °æÈ¨ËùÓÐ
ÉùÃ÷ :±¾ÍøÕ¾×ðÖØ²¢±£»¤ÖªÊ¶²úȨ£¬¸ù¾Ý¡¶ÐÅÏ¢ÍøÂç´«²¥È¨±£»¤ÌõÀý¡·£¬Èç¹ûÎÒÃÇ×ªÔØµÄ×÷Æ·ÇÖ·¸ÁËÄúµÄȨÀû,ÇëÔÚÒ»¸öÔÂÄÚ֪ͨÎÒÃÇ£¬ÎÒÃǻἰʱɾ³ý¡£
¿Í·þQQ£º ÓÊÏ䣺tiandhx2@hotmail.com
ËÕICP±¸16052595ºÅ-18
¡Á ×¢²á»áÔ±Ãâ·ÑÏÂÔØ£¨ÏÂÔØºó¿ÉÒÔ×ÔÓɸ´ÖƺÍÅŰ棩
×¢²á»áÔ±ÏÂÔØ
ȫվÄÚÈÝÃâ·Ñ×ÔÓɸ´ÖÆ
×¢²á»áÔ±ÏÂÔØ
ȫվÄÚÈÝÃâ·Ñ×ÔÓɸ´ÖÆ
×¢£ºÏÂÔØÎĵµÓпÉÄÜ¡°Ö»ÓÐĿ¼»òÕßÄÚÈݲ»È«¡±µÈÇé¿ö£¬ÇëÏÂÔØÖ®Ç°×¢Òâ±æ±ð£¬Èç¹ûÄúÒѸ¶·ÑÇÒÎÞ·¨ÏÂÔØ»òÄÚÈÝÓÐÎÊÌ⣬ÇëÁªÏµÎÒÃÇЭÖúÄã´¦Àí¡£
΢ÐÅ£º QQ£º