Microsoft Word final

Similar documents
穨control.PDF

TCP/IP TCP/IP OSI IP TCP IP IP TCP/IP TCP/IP

Introduction to FSM FSM was introduced to meet requirements of scientific research and engineering FSM, as a mathematical modeling methodology, can be

Chap6.ppt

Microsoft PowerPoint - STU_EC_Ch02.ppt

IP Access Lists IP Access Lists IP Access Lists

Simulator By SunLingxi 2003

UDP 8.2 TCP/IP OSI OSI 3 OSI TCP/IP IP TCP/IP TCP/IP Transport Control Protocol TCP User Datagram Protocol UDP TCP TCP/IP IP TCP TCP/IP TC

lan03_yen

Microsoft PowerPoint - STU_EC_Ch08.ppt

Microsoft PowerPoint - talk8.ppt

BC04 Module_antenna__ doc

TX-NR3030_BAS_Cs_ indd

Untitled-3

<4D F736F F F696E74202D20B5DAD2BBD5C228B4F2D3A1B0E6292E BBCE6C8DDC4A3CABD5D>

Chapter #

Windows XP

2009 Japanese First Language Written examination

Microsoft Word - Final Exam Review Packet.docx

2010 Japanese First Language Written examination

C3_ppt.PDF

2009 Korean First Language Written examination

Microsoft Word - template.doc

C6_ppt.PDF

1.ai

國立中山大學學位論文典藏.PDF

4. 每 组 学 生 将 写 有 习 语 和 含 义 的 两 组 卡 片 分 别 洗 牌, 将 顺 序 打 乱, 然 后 将 两 组 卡 片 反 面 朝 上 置 于 课 桌 上 5. 学 生 依 次 从 两 组 卡 片 中 各 抽 取 一 张, 展 示 给 小 组 成 员, 并 大 声 朗 读 卡

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl

IP505SM_manual_cn.doc

ebook140-8

K301Q-D VRT中英文说明书141009

Microsoft Word - CX VMCO 3 easy step v1.doc

ENGG1410-F Tutorial 6

Microsoft PowerPoint _代工實例-1

Microsoft PowerPoint - 数据通信-ch1.ppt

untitled

Microsoft Word - 第四組心得.doc

Microsoft PowerPoint - ryz_030708_pwo.ppt

2. 佔 中 對 香 港 帶 來 以 下 影 響 : 正 面 影 響 - 喚 起 市 民 對 人 權 及 ( 專 制 ) 管 治 的 關 注 和 討 論 o 香 港 市 民 總 不 能 一 味 認 命, 接 受 以 後 受 制 於 中 央, 沒 有 機 會 選 出 心 中 的 理 想 特 首 o 一

國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 表 11 國 立 政 治 大 學 教 育 學 系 博 士 班 資 格 考 試 抵 免 申 請 表 論 文 題 目 申 報 暨 指 導 教 授 表 12 國 立 政 治 大 學 碩 博 士 班 論

2/80 2

2015 Chinese FL Written examination

Logitech Wireless Combo MK45 English

SuperMap 系列产品介绍

ebook140-9

summerCampBookP1~16.pdf

89???????q?l?????T??

Microsoft Word - (web)_F.1_Notes_&_Application_Form(Chi)(non-SPCCPS)_16-17.doc

前 言 一 場 交 換 學 生 的 夢, 夢 想 不 只 是 敢 夢, 而 是 也 要 敢 去 實 踐 為 期 一 年 的 交 換 學 生 生 涯, 說 長 不 長, 說 短 不 短 再 長 的 路, 一 步 步 也 能 走 完 ; 再 短 的 路, 不 踏 出 起 步 就 無 法 到 達 這 次

ARP ICMP

untitled

國立中山大學學位論文典藏.PDF

Important Notice SUNPLUS TECHNOLOGY CO. reserves the right to change this documentation without prior notice. Information provided by SUNPLUS TECHNOLO

高中英文科教師甄試心得

ebook140-11

声 明 本 人 郑 重 声 明 : 此 处 所 提 交 的 硕 士 学 位 论 文 基 于 等 级 工 鉴 定 的 远 程 考 试 系 统 客 户 端 开 发 与 实 现, 是 本 人 在 中 国 科 学 技 术 大 学 攻 读 硕 士 学 位 期 间, 在 导 师 指 导 下 进 行 的 研 究

IC-900W Wireless Pan & Tilt Wireless Pan & Tilt Remote Control / Night Vision FCC ID:RUJ-LR802UWG

Lorem ipsum dolor sit amet, consectetuer adipiscing elit

Fun Time (1) What happens in memory? 1 i n t i ; 2 s h o r t j ; 3 double k ; 4 char c = a ; 5 i = 3; j = 2; 6 k = i j ; H.-T. Lin (NTU CSIE) Referenc

工程师培训

2. 熟 读 题 目 3. 积 累 核 心 句 式 4. 列 出 每 道 题 的 提 纲 5. 构 造 各 部 分 的 论 证 模 板 6. 全 文 练 习 10 到 20 篇 文 章 如 何 分 析 Argument 题 目 1. Argument 题 目 的 文 字 结 构 1) 题 目 的 出

Microsoft Word

BYOD Http Redirect convergence Client (1) 2008R2 NLB( ) (2) NLB Unicast mode switch flooding (arp ) NLB DNS Redirect 1. Round-Robin DNS DNS IP/DNS Cli

热设计网

C/C++ - 字符输入输出和字符确认

Introduction to Hamilton-Jacobi Equations and Periodic Homogenization

AL-M200 Series

Panaboard Overlayer help

WTO

國立中山大學學位論文典藏.PDF

¶C¶L§§¬_™¨ A.PDF

<4D F736F F D20BEDBC9B3B3C9CBFEA1AAA1AAC9CCBDADBDCCD3FDCEC4BCAF20A3A8D6D0A3A92E646F63>

東莞工商總會劉百樂中學

Microsoft Word doc

SL2511 SR Plus 操作手冊_單面.doc

版权声明

...1 What?...2 Why?...3 How? ( ) IEEE / 23

Knowledge and its Place in Nature by Hilary Kornblith

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

untitled

Lorem ipsum dolor sit amet, consectetuer adipiscing elit

Microsoft PowerPoint - STU_EC_Ch04.ppt

Microsoft Word - Book9


地質調査研究報告/Bulletin of the Geological Survey of Japan

明新科技大學專題研究計畫成果報告編寫須知

蔡 氏 族 譜 序 2

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot

Microsoft Word - ChineseSATII .doc

乌 南 采 风 P 3 亲 子 乐 园 P 11 教 子 有 方 P 20 夜 里, 你 要 抬 头 仰 望 满 天 的 星 星, 我 那 颗 实 在 太 小 了, 我 都 没 发 指 给 你 看 它 在 哪 儿 这 样 倒 也 好, 我 的 星 星, 对 你 来 说 就 是 满 天 星 星 中 的

:(104 :(104 )24:00 )~ :104 )~ )15:00~17:00 )08:00 : : :

<4D F736F F D205F FB942A5CEA668B443C5E9BB73A740B5D8A4E5B8C9A552B1D0A7F75FA6BFB1A4ACFC2E646F63>

OncidiumGower Ramsey ) 2 1(CK1) 2(CK2) 1(T1) 2(T2) ( ) CK1 43 (A 44.2 ) CK2 66 (A 48.5 ) T1 40 (

2-7.FIT)

Microsoft Word - HC20138_2010.doc

计算机网络

4.阿的故事地圖-林曉萍.doc

財金資訊-80期.indd

<4D F736F F D C4EAC0EDB9A4C0E04142BCB6D4C4B6C1C5D0B6CFC0FDCCE2BEABD1A15F325F2E646F63>

1 * 1 *

Transcription:

只寫答案而沒有解釋說明, 扣一半分數. 針對 63.07.72. 這個 IP address,( 以十進位表示, 要寫完整過程 ) (7%) a. 這一個 IP 屬於那個 Class 的網路? 以二進位說明 (%) 其所屬的 IP 網路表示法為何?(2%) 可用 IP 範圍?(2%) 共有幾個 IP 可用?(%) mask 的值為何?(%) b. 將此 IP 網路分成 7 subnets,subnet mask 的值為何?(2%) 請列出第 7 個 subnet 的網路表示法 (2%) 可用 IP 範圍?(2%) 共有幾個 IP 可用?(%) c. 手動設定電腦的網路時, 至少要設定哪三個項目的資訊, 才可以上網?(3%) 2. (a) Draw a figure to show four components of a router (8%) (b) Draw three types of switching fabrics with their names. (% each) (c) What is Head-of-the-Line (HOL) blocking? (3%) (4% total) 3. (a) Consider the two 6-bit words (shown in binary) below. Recall that to compute the Internet checksum of a set of 6-bit words, we compute the one's complement sum of the two words. That is, we add the two numbers together, making sure that any carry into the 7th bit of this initial sum is added back into the 's place of the resulting sum); we then take the one's complement of the result. Compute the Internet checksum value for these two 6-bit words: (8%) 000000 00000 this binary number is 406 decimal (base 0) 00 00 this binary number is 3245 decimal (base 0) (b) With the s complement scheme, how does the receiver detect errors? Is it possible that -bit error will go undetected? (2%) How about a 2-bit error? (2%) (2% total) 4. Draw the flow of the TCP three way handshake to explain its operations. Suppose the initial sequence numbers of the client and the server are and 200, respectively. 必須在圖上分別清楚標示出 TCP 必要的 flag, sequence number, and ACK number. (0%) 5. List and compare two pipelined transport protocols with these two figures. ( 寫出 Window=? 與各標號處的動作 0%) 5 2 6 3 7 4 8

6. (a) Describe how TCP Reno does its congestion control. (8%) (2% total) (b) Answer and justify the following questions. After the 22 th transmission round, is segment loss detected by a triple duplicate ACK or by a timeout? (2%) During what transmission round is the 50 th segment sent? (2%) 7. Consider the TCP procedure for estimating RTT n ( EstimatedRTT = α SampleRTT + ( α) EstimatedRTT ). (a) Why TCP uses this function? (2%) (b) Let SampleRTT n be the most recent sample RTT, let SampleRTT n- be the next most recent sample RTT, and so on. Express EstimatedRTT n in terms of n SampleRTTs if EsitmatedRTT = 0. ( 要有兩次疊代過程 ( 各 2%) 後寫出通式與以 summation 總和符號表示 ( 各 2%) (0% total) 8. (a) Explain how TCP Fast Retransmit works. (6%) (5% total) (b) How TCP does its flow control? (6%) (c) Suppose the TCP sequence number space is of size k. What is the largest allowable sender window w? (3%)

只寫答案而沒有解釋說明, 扣一半分數. 針對 63.07.72. 這個 IP address,( 以十進位表示, 要寫完整過程 ) (7%) a. 這一個 IP 屬於那個 Class 的網路? 以二進位說明 (%) 其所屬的 IP 網路表示法為何?(2%) 可用 IP 範圍?(2%) 共有幾個 IP 可用?(%) mask 的值為何?(%) b. 將此 IP 網路分成 7 subnets,subnet mask 的值為何?(2%) 請列出第 7 個 subnet 的網路表示法 (2%) 可用 IP 範圍?(2%) 共有幾個 IP 可用?(%) c. 手動設定電腦的網路時, 至少要設定哪三個項目的資訊, 才可以上網?(3%) a. 63.07.72. 的二進位表示法為 00. XXXXXXXX.XXXXXXXX.XXXXXXXX, 由前 個 bits 0 可判斷為 Class A 的 IP (%) 此 IP 所屬於的 Class A 的網路表示法為 63.0.0.0 (2%) 所有 host ID 部分的 24 個 bit 的 X 不可以全為 0 或, 因此第一個可用 Host ID 為 00. 00000000.00000000. 0000000 = 63.0.0. (%) 最後一個可用 Host ID 為 00...0 = 63.255.255.254 (%) -> 共有 2 24-2 個可用 Host ID (%) Mask: 255.0.0.0 (%) b. 將此 Class A 網路分成 7 個 subnet, 加上全為 0 與全為 的兩個不能用的 subnet ID, 最少需要 7+2=9 <= 2 4, subnet mask 的值 => 需要 Host ID 的前 4 個 bits 當作 subnet ID 所以新的 subnet mask 是由原本 Class A 的 default subnet mask 255.0.0.0 來改, 改成 255.0000.00000000.00000000=> 255. 240.0.0 (2%) subnet 的 ID 要從此 Class A Network ID 00.XXXXXXXX.XXXXXXXX.XXXXXXXX 來改, 需要 Host ID 的前 4 個 bits 當作 subnet ID, 不可全為 0 或 因此第 7 個 subnet ID 為 00. 00000.00000000.00000000 => 63.2.0.0(2%) 因此第一個可用 Host ID 為 00.00000.00000000. 0000000 = 63.2.0. (%) 最後一個可用 Host ID 為 00.0.. 0 = 63.27.255.254 (%) -> 共有 2 20-2 個可用 Host ID (%) c. IP address, subnet mask, default gateway (3%) 2. (a) Draw a figure to show four components of a router (8%) (b) Draw three types of switching fabrics with their names. (% each) (c) What is Head-of-the-Line (HOL) blocking? (3%) (4% total) (a) (2% each, 8% total) (b) (3%) switching via memory; (%) switching via a bus; (%) switching via an interconnection network (%)

(c) queued datagram at front of queue prevents others in queue from moving forward (3%) 3. (a) Consider the two 6-bit words (shown in binary) below. Recall that to compute the Internet checksum of a set of 6-bit words, we compute the one's complement sum of the two words. That is, we add the two numbers together, making sure that any carry into the 7th bit of this initial sum is added back into the 's place of the resulting sum); we then take the one's complement of the result. Compute the Internet checksum value for these two 6-bit words: (8%) 000000 00000 this binary number is 406 decimal (base 0) 00 00 this binary number is 3245 decimal (base 0) (c) With the s complement scheme, how does the receiver detect errors? Is it possible that -bit error will go undetected? (2%) How about a 2-bit error? (2%) (2% total) (a) When we add these first two numbers together, we get: 000000 00000 00 00 -------- -------- 000 00000 note the carry into the 7th bit (4%) Since there is a carry, we need to add a in the ones place (rightmost bit) of the rightmost 6-bit quantity above, giving: 000 00000 (2%) and then we need to take the ones complement of this value, to get the Internet checksum: 00000 000 (2%)

(b) All one-bit errors will be detected (2%), but two-bit errors can be undetected (2%) (e.g., if the last digit of the first word is converted to a 0 and the last digit of the second word is converted to a ). 4. Draw the flow of the TCP three way handshake to explain its operations. Suppose the initial sequence numbers of the client and the server are and 200, respectively. 必須在圖上分別清楚標示出 TCP 必要的 flag, sequence number, and ACK number. (0%) Three way handshake: Step : client host sends TCP SYN segment to server ( 搭配圖要正確 2%) Step 2: server host receives SYN, replies with SYNACK segment (4%) Step 3: client receives SYNACK, replies with ACK segment, which may contain data (4%) client server Connection request SYN bit=, seq= SYN bit=ack bit=, seq=200, ack=2 Connection granted ACK SYN bit=0, ACK bit= seq=2 Ack=20 上圖每個符號含內容 分, 標示不全者, 視狀況扣分, 共 0 分 5. List and compare two pipelined transport protocols with these two figures. ( 寫出 Window=? 與各標號處的動作 0%) Go-back-N (5%) window of up to N, consecutive unack ed pkts allowed (window = 4) (%) () ACK-only: always send ACK for correctly-received pkt with highest in-order seq # (%) (2) out-of-order pkt: discard (don t buffer) -> no receiver buffering! (%) Re-ACK pkt with highest in-order seq # (%) (3) timeout(n): retransmit pkt n and all higher seq # pkts in window (%) (4) deliver in-order segments to upper layer. (%)

5 2 6 3 7 4 8 Selective Repeat (4%) (5) receiver individually acknowledges all correctly received pkts (%) (6) buffers out-of order pkts (%) (7) sender only resends pkts for which ACK not received when timeout (%) (8) deliver total in-order pkts to upper layer (%) 6. (a) Describe how TCP Reno does its congestion control. (8%) (2% total) (b) Answer and justify the following questions. After the 22 th transmission round, is segment loss detected by a triple duplicate ACK or by a timeout? (2%) During what transmission round is the 50 th segment sent? (2%) (8%) When CongWin is below Threshold (%), sender in slow-start phase, window grows exponentially (%). When CongWin is above Threshold (%), sender is in congestion-avoidance phase, window grows linearly (%). When a triple duplicate ACK occurs (%), Threshold set to CongWin/2 and CongWin set to Threshold (%). When timeout occurs (%), Threshold set to CongWin/2 and CongWin is set to MSS (%). (b) (8%) a. After the 22 th transmission round, packet loss is recognized by a timeout. (2%)

b. During the st transmission round, packet is sent; packet 2-3 are sent in the 2 nd transmission round; packets 4-7 are sent in the 3 rd transmission round; packets 8-5 are sent in the 4 th transmission round; packets 6-3 are sent in the 5 th transmission round; packets 32-63 are sent in the 6 th transmission round; packets 64 96 are sent in the 7 th transmission round. Thus packet 50 is sent in the 6 th transmission round. ( 說明 %, 答案 %, 共 2%) 7. Consider the TCP procedure for estimating RTT n ( EstimatedRTT = α SampleRTT + ( α) EstimatedRTT ). (a) Why TCP uses this function? (2%) (b) Let SampleRTT n be the most recent sample RTT, let SampleRTT n- be the next most recent sample RTT, and so on. Express EstimatedRTT n in terms of n SampleRTTs if EsitmatedRTT = 0. ( 要有兩次疊代過程 ( 各 2%) 後寫出通式與以 summation 總和符號表示 ( 各 2%) (0% total) (a) Exponential weighted moving average => influence of past sample decreases exponentially fast. 據測量出來的 SampleRTT, 估計下一次的 EstimatedRTT, 用來設定下一次的 Timeout 時間 (2%) (b) n EstimatedRTT = α SampleRTT + ( α) EstimatedRTT n 2 n 2 = α SampleRTT + ( α) [ α SampleRTT + ( α) EsitmatedRTT ] n 2 2 n 2 = α SampleRTT + α( α) SampleRTT + ( α) EsitmatedRTT n 2 2 = α SampleRTT + α( α) SampleRTT + ( α) n 3 n 3 [ α SampleRTT + ( α) EsitmatedRTT ] n 2 2 = α SampleRTT + α( α) SampleRTT + α( α) n 3 4 n 3 SampleRTT + ( α) EsitmatedRTT =... n 2 = α SampleRTT + α( α) SampleRTT + 2 n 3 n 2 n ( ) α( α) SampleRTT +... + α( α) SampleRTT n ( ) + ( α) EsitmatedRTT == α ( α) SampleRTT + ( α) EsitmatedRTT j n j j= ( j n j α) SampleRTT ( EsitmatedRTT 0) j= = α = 8. (a) Explain how TCP Fast Retransmit works. (6%) (5% total) (b) How TCP does its flow control? (6%) (c) Suppose the TCP sequence number space is of size k. What is the largest allowable sender window w? (3%) (a) Explain how TCP Fast Retransmit works. (6%) If sender receives 3 ACKs for the same data, (2%) it supposes that segment after ACKed data was lost (2%): resend segment before timer expires (2%) (6% total) (b) How TCP does its flow control? (6%) Rcvr advertises spare room by including value of RcvWindow in segments (2%) Sender limits unacked data to RcvWindow (2%) for guaranteeing receive buffer doesn t overflow (2%) (c) The sequence number space must be at least twice as large as the window size, k 2w. (3%)