计算机网络review(期末复习资料)课件.ppt

上传人(卖家):晟晟文业 文档编号:5172821 上传时间:2023-02-16 格式:PPT 页数:64 大小:2.17MB
下载 相关 举报
计算机网络review(期末复习资料)课件.ppt_第1页
第1页 / 共64页
计算机网络review(期末复习资料)课件.ppt_第2页
第2页 / 共64页
计算机网络review(期末复习资料)课件.ppt_第3页
第3页 / 共64页
计算机网络review(期末复习资料)课件.ppt_第4页
第4页 / 共64页
计算机网络review(期末复习资料)课件.ppt_第5页
第5页 / 共64页
点击查看更多>>
资源描述

1、Computer NetworkingFinal ReviewJinghui QinContentComputer Networks and the InternetApplication Layer Transport LayerThe Network LayerThe Link and Local Area NetworksWireless and Mobile NetworksComputer Networks and the InternetSome basic concepts protocol circuit switching packet switching etc.Delay

2、,Loss and Throughput in Packet-Switched Networks processing delay queuing delay transmission delayComputer Networks and the Internet propagation delay end-to-end delay computation throughput:instantaneous,averageProtocol Layers and Their Service Models Seven-layer ISO OSI reference model Five-layer

3、Internet protocol stack The function of each layerComputer Networks and the InternetProblem 1-P5Computer Networks and the InternetProblem 1-P5Computer Networks and the InternetSolution 1-P5Computer Networks and the InternetProblem 2-P17Computer Networks and the InternetSolution 2-P17Throughput=minRs

4、,Rc,R/MApplication Layer Some basic concepts client server socketTransport Services Provided by Internet TCP services:connection-oriented&reliable data transfer UDP services Application-Layer ProtocolApplication Layer HTTP Non-persistent and Persistent HTTP Message Format Request Message Response Me

5、ssage CookiesApplication Layer FTP two parallel connections out-of-band&in-bande-mail SMTP POP3 IMAPApplication Layer DNS Service provided by DNS DNS Working Mechanism DNS Records and MessageApplication Layer Problem-P2Application Layer Problem-P2Application Layer Problem-P2Application Layer Solutio

6、n-P2a)The document request was http:/gaia.cs.umass.edu/cs453/index.html.The Host:field indicates the servers name and/cs453/index.html indicates the file name.b)The browser is running HTTP version 1.1,as indicated just before hte first pair.c)The browser is requesting a persistent connection,as indi

7、cated by the Connection:keep-alive.Application Layer Solution-P2d)This is a trick question.This information is not contained in an HTTP message anywhere.So there is no way to tell this from looking at the exchange of HTTP messages alone.One would need information from the IP datagrams(that carried t

8、he TCP segment that carried the HTTP GET request)to answer this question.Transport LayerUDP UDP Segment Structure UDP Checksum The advantages of UDPPrinciples of Reliable Data Transfer SR GBNTransport LayerTCP TCP Segment Structure TCP flow control TCP congest control AIMD Slow start Reaction To Tim

9、eout EventsTransport LayerProblem 1-P23Consider transferring an enormous file of L bytes from Host A to Host B.Assume an MSS of 1,460 bytes.a.What is the maximum value of L such that TCP sequence numbers are not exhausted?Recall that the TCP sequence number field has 4 bytes.Transport LayerProblem 1

10、-P23b.For the L you obtain in(a),find how long it takes to transmit the file.Assume that a total of 66 bytes of transport,network,and data-link header are added to each segment before the resulting packet is sent out over a 100 Mbps link.Ignore flow control and congestion control so A can pump out t

11、he segments back to back and continuously.Transport LayerSolution 1-P23Transport LayerSolution 1-P23Transport LayerProblem 2-P34Transport LayerProblem 2-P34Transport LayerProblem 2-P34Transport LayerSolution 2-P34a)TCP slowstart is operating in the intervals 1,6 and 23,26b)TCP congestion advoidance

12、is operating in the intervals 6,16 and 17,22c)After the 16th transmission round,packet loss is recognized by a triple duplicate ACK.If there was a timeout,the congestion window size would have dropped to 1.Transport LayerSolution 2-P34d)After the 22nd transmission round,segment loss is detected due

13、to timeout,and hence the congestion window size is set to 1.e)The threshold is initially 32,since it is at this window size that slowtart stops and congestion avoidance begins.f)The threshold is set to half the value of the congestion window when packet loss is detected.When loss is detected during

14、transmission round 16,the congestion windows size is 42.Hence the threshold is 21 during the 18th transmission round.Transport LayerSolution 2-P34g)The threshold is set to half the value of the congestion window when packet loss is detected.When loss is detected during transmission round 22,the cong

15、estion windows size is 26.Hence the threshold is 13 during the 24th transmission round.i)The congestion window and threshold will be set to half the current value of the congestion window(8)when the loss occurred.Thus the new values of the threshold and window will be 4.Transport LayerSolution 2-P34

16、H)During the 1st transmission round,packet 1 is sent;packet 2-3 are sent in the 2nd transmission round;packets 4-7 are sent in the 3rd transmission round;packets 8-15 are sent in the 4th transmission round;packets15-31 are sent in the 5th transmission round;packets 32-63 are sent in the 6th transmis

17、sion round;packets 64 96 are sent in the 7th transmission round.Thus packet 70 is sent in the 7th transmission round.The Network LayerVirtual-Circuit NetworksDatagram Networks longest prefix matchRouter FabricIP MTU、Fragment CIDR DHCP NATThe Network LayerRouting Algorithms Link-State(LS)、Dijkstra Di

18、stance-Vector(DV),Bellman-FordIntra-AS Routing in the Internet RIP OSPFInter-AS Routing BGPBroadcast and Multicast RoutingThe Network LayerProblem 1-P8Consider a datagram network using 32-bit host addresses.Suppose a router have five links,numbered 0 through 4,and packets are to be forwarded to the

19、link interfaces as follows:The Network LayerProblem 1-P8The Network LayerProblem 1-P8a.Provide a forwarding table that has five entries,uses longest prefix matching,and forwards packets to the correct link interfaces.b.Describe how your forwarding table determines the appropriate link interface for

20、datagrams with destination addresses:11001000 10010001 01010001 0101010111100000 10101101 11000011 0011110011100001 10000000 00010001 01110111The Network LayerSolution 1-P8a.Prefix MatchLink Interface 11100000 00000000011100000 00000001 111100000 2111000013otherwise4The Network LayerSolution 1-P8b.P

21、refix match for first address is 5th entry:link interface 4 Prefix match for second address is 3rd entry:link interface 2 Prefix match for third address is 4th entry:link interface 3 The Network LayerProblem 2-P22Consider the following network.With the indicated link costs,use Dijkstras shorest-path

22、 algorithm to compute the shortest path from x to all network nodes.Show how the algorithm works by computing a table similar to Table 4.3The Network LayerProblem 2-P22The Network LayerSolution 2-P22The Link and Local Area NetworksError-Detection and-Correction Parity Checks Checksumming Methods Cyc

23、lic Redundancy Check(CRC)MAC AddressesAddress Resolution Protocol(ARP)CSMA/CDThe Link and Local Area NetworksProblem 1-P5Consider the 4-bit generator,G,shown in Figure 5.8,and suppose that D has the value 11111010.What is the value of R?The Link and Local Area NetworksSolution 1-P5r=3,G=1001,代入公式:代入

24、公式:R=(D*2r)/G 的余数的余数11111010000除以除以1001,商,商11100110,余,余R=110The Link and Local Area NetworksProblem 2-P12Consider three LANs interconnected by two routers,as shown in Figure 5.38.The Link and Local Area NetworksProblem 2-P12a.Redraw the diagram to include adapters.b.Assign IP addresses to all of the

25、 interfaces.For Subnet 1 use addresses of the form 111.111.111.xxx;for Subnet 2 uses addresses of the form 122.122.122.xxx;and for Subnet 3 use addresses of the form 133.133.133.xxx.c.Assign MAC addresses to all of the adaptersThe Link and Local Area NetworksProblem 2-P12d.Consider sending an IP dat

26、agram from Host A to Host F.Suppose all of the ARP tables are up to date.Enumerate all the steps,as done for the single-router example in Section 5.4.2.e.Repeat(d),now assuming that the ARP table in the sending host is empty(and the other tables are up to date).The Link and Local Area NetworksSoluti

27、on 2-P12RouterRouterLANLANLANABCDFE111.111.111.00100-00-00-00-00-00111.111.111.00311-11-11-11-11-11111.111.111.00222-22-22-22-22-22122.222.222.00233-33-33-33-33-33122.222.222.00144-44-44-44-44-44122.222.222.00466-66-66-66-66-66122.222.222.00355-55-55-55-55-55133.333.333.00288-88-88-88-88-88133.333.3

28、33.00177-77-77-77-77-77133.333.333.00399-99-99-99-99-99The Link and Local Area NetworksSolution 2-P12d)1.A的路由表决定数据报将路由到的路由表决定数据报将路由到111.111.111.0022.A的网络适配器使用目的的网络适配器使用目的MAC地址地址22-22-22-22-22-22封装以太网数据报封装以太网数据报3.第一个路由器接收到报文后,根据路由表,把包转发到第一个路由器接收到报文后,根据路由表,把包转发到122.222.222.003,并重新封装报文的链路层协议,并重新封装报文的链路

29、层协议,把目的把目的MAC改为改为55-55-55-55-55-55,源,源MAC改为改为33-33-33-33-33-33.4.这个过程将会持续到它到达这个过程将会持续到它到达FThe Link and Local Area NetworksSolution 2-P12e)A必须知道必须知道111.111.111.002的的MAC地址,地址,因此它以以太网广播帧广播发送因此它以以太网广播帧广播发送ARP请求报文。请求报文。第一个路由器接收到第一个路由器接收到ARP请求后,把请求后,把ARP响应数响应数据包返回给据包返回给A,而这个,而这个ARP响应数据包目的响应数据包目的MAC地址为地址为0

30、0-00-00-00-00-00。The Link and Local Area NetworksProblem 3-P15The Link and Local Area NetworksSolution 3-P15Wireless and Mobile NetworksBase station&infrastructure modeWireless Network Characteristics path loss interference from other sources multipath propagationCDMACSMA/CARTS&CTSMobility in the Sa

31、me IP SubnetWireless and Mobile NetworksProblem-P8Consider the scenario shown in Figure 6.32,in which there are four wireless nodes,A,B,C,and D.The radio coverage of the four nodes is shown via the shaded ovals;all nodes share the same frequency.When A transmits,it can only be heard/received by B;wh

32、en B transmits,both A and C can hear/receive form B;when C transmits,both B and D can hear/receive form C;when C transmits,only C can hear/receive form D;Wireless and Mobile NetworksProblem-P8Wireless and Mobile NetworksProblem-P8Suppose now that each node has an infinite supply of messages that it

33、wants to send to each of the other nodes.If a messages destination is not an immediate neighbor,then the message must be relayed.For example,if A wants to send to D,a message from A must first be sent to B,which then sends message to C,which then sends the message to D.Wireless and Mobile NetworksPr

34、oblem-P8Time is slotted,with a message transmission time taking exactly one time slot,e.g.,as in slotted Aloha.During a slot,a node can do one of the following:(i)send a message(if it has a message to forward towards D);(ii)receive a message(if exactly one message is being sent to it);(iii)remain si

35、lent.Wireless and Mobile NetworksProblem-P8As always,if a node hears two or more simultaneous transmissions,a collision occurs and none of the transmitted messages are received successfully.You can assume here that there are no bit-level errors,and thus if exactly one message is sent,it will be reei

36、ved correctly by those within the transmission radius of the sender.Wireless and Mobile NetworksProblem-P8Wireless and Mobile NetworksSolution-P8a)报文从报文从C传到传到B,再从,再从B传到传到A,需要两个时隙,需要两个时隙,因此最大速率为因此最大速率为1 message/2 slotsb)A向向B发送报文与发送报文与D向向C发送报文互不影响,因此发送报文互不影响,因此一时隙内可同时传送报文,最大速率为:一时隙内可同时传送报文,最大速率为:2 mes

37、sages/slotc)由于由于C向向D传输报文时,传输报文时,B能接收到,能接收到,A如果这时如果这时向向B传输就会发生冲突。因此,至少输入两个时传输就会发生冲突。因此,至少输入两个时隙传输这两个报文,速率为:隙传输这两个报文,速率为:1 messages/slotWireless and Mobile NetworksSolution-P8d)1)1 messages/slot2)2 messages/slot3)2 messages/slote)1)Message:A-B-C,ACK:C-B-A,共需,共需4个时隙,速率:个时隙,速率:1 messages/4slotsWireless

38、and Mobile NetworksSolution-P82)slot 1:Message AB,message DC slot 2:Ack BA slot 3:Ack CD=2 messages/3 slots3)slot 1:Message CD slot 2:Ack DC,message AB slot 3:Ack BA=2 messages/3 slotsRelated ProblemsCH1:P5-P9,P17-P20CH2:R14-R19;P1-P3,P7,P8CH3:R3-R6;P4,P5,P19,P23,P25,P34,P38CH4:R24-R27;P8-P11,P22,P24,P29CH5:R4,R12,P1-P6,P11-P15CH6:R1,R3,R8-R11,R21;P4,P6,P8,P13Thank You!Good Luck!

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 办公、行业 > 各类PPT课件(模板)
版权提示 | 免责声明

1,本文(计算机网络review(期末复习资料)课件.ppt)为本站会员(晟晟文业)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!


侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|