£¨2£©Ê¹Óû㼯Ê÷Ëã·¨£¬ÐèÒª4 ¸öÌø¶Î£¬×ܹ²²úÉú14 ¸ö·Ö×é¡£
15. Node F currently has two descendants, A and D. It now acquires a third one, G, not circled because the packet that follows IFG is not on the sink tree. Node G acquires a second descendant, in addition to D, labeled F. This, too, is not circled as it does not come in on the sink tree.
16. Multiple spanning trees are possible. One of them is:
17. When H gets the packet, it broadcasts it. However, I knows how to get to I, so it does not broadcast.
18. Node H is three hops from B, so it takes three rounds to find the route.
19. It can do it approximately, but not exactly. Suppose that there are 1024 node identifiers. If node 300 is looking for node 800, it is probably better to go clockwise, but it could happen that there are 20 actual nodes between 300 and 800 going clockwise and only 16 actual nodes between them going counterclockwise.
The purpose of the cryptographic hashing function SHA-1 is to produce a very smooth
distribution so that the node density is about the same all along the circle. But there will always be statistical fluctuations, so the straightforward choice may be wrong.
20. The node in entry 3 switches from 12 to 10.
21. ´ð£º¶Ôʱ¼äÒÔT ÃëΪµ¥Î»·Öʱ϶¡£ÔÚʱ϶ÖУ¬Ô´Â·ÓÉÆ÷·¢Ë͵ÚÒ»¸ö·Ö×é¡£ÔÚʱ϶2 µÄ¿ªÊ¼£¬µÚ2 ¸ö·ÓÉÆ÷ÊÕµ½ÁË·Ö×飬µ«²»ÄÜÓ¦´ð¡£ÔÚʱ϶3 µÄ¿ªÊ¼£¬µÚ3 ¸ö·ÓÉÆ÷ÊÕµ½ÁË·Ö×飬µ«Ò²²»ÄÜÓ¦´ð¡£ÕâÑù£¬´ËºóËùÓеÄ·ÓÉÆ÷¶¼²»»áÓ¦´ð¡£½öµ±Ä¿µÄµØÖ÷»ú´ÓÄ¿µÄµØÂ·ÓÉÆ÷È¡µÃ·Ö×éʱ²Å»á·¢Ë͵Ú1 ¸öÓ¦´ð¡£ÏÖÔÚÈ·ÈÏÓ¦´ð¿ªÊ¼Íù»Ø´«²¥¡£ÔÚԴ·ÓÉÆ÷¿ÉÒÔ·¢Ë͵Ú2 ¸ö·Ö×é֮ǰ£¬ÐèÒªÁ½´Î´©ÐиÃ×ÓÍø£¬ÐèÒª»¨·ÑµÄʱ¼äµÈÓÚ2(n-1)T Ãë/·Ö×飬ÏÔÈ»£¬ÕâÖÖÐÒéµÄЧÂÊÊǺܵ͵ġ£
22. ´ð£º£¨1£©ÓÉÔ´Ö÷»ú·¢Ë͵Äÿ¸ö·Ö×é¿ÉÄÜÐÐ×ß1 ¸öÌø¶Î¡¢2 ¸öÌø¶Î»ò3 ¸öÌø¶Î¡£×ß1 ¸öÌø¶ÎµÄ¸ÅÂÊΪp £¬×ß2 ¸öÌø¶ÎµÄ¸ÅÂÊΪ£¨1- p£©p £¬×ß3 ¸öÌø¶ÎµÄ¸ÅÂÊΪ£¨1- p£©2 p¡£ÄÇô£¬Ò»¸ö·Ö×鯽¾ùͨ·³¤¶ÈµÄÆÚÍûֵΪ£º
¼´Ã¿´Î·¢ËÍÒ»¸ö·Ö×éµÄƽ¾ùÌø¶ÎÊýÊÇ p2-3 p++3¡£
£¨2£©Ò»´Î·¢Ëͳɹ¦£¨×ßÍêÕû¸öͨ·£©µÄ¸ÅÂÊΪ( 1- p )2£¬Áîa = ( 1- p)2£¬Á½´Î·¢Éä³É¹¦µÄ¸ÅÂʵÈÓÚ ( 1- a) a£¬Èý´Î·¢Éä³É¹¦µÄ¸ÅÂʵÈÓÚ ( 1- a)2 a £¬¡£¬Òò´ËÒ»¸ö·Ö×鯽¾ù·¢ËÍ´ÎÊýΪ£º
¼´Ò»¸ö·Ö×鯽¾ùÒª·¢ËÍ1/(1- p )2´Î¡£
£¨3£©×îºó£¬Ã¿Ò»¸ö½ÓÊÕµ½µÄ·Ö×éÐÐ×ߵį½¾ùÌø¶ÎÊýµÈÓÚ
23. First, the warning bit method explicitly sends a congestion notification to the source by setting a bit, whereas RED implicitly notifies the source by simply dropping one of its packets. Second, the warning bit method drops a packet only when there is no buffer space left, whereas RED drops packets before all the buffer are exhausted.
24. ´ð£ºÍ¨³£¼ÆËã»úÄܹ»ÒԺܸߵÄËÙÂʲúÉúÊý¾Ý£¬ÍøÂçÒ²¿ÉÒÔÓÃͬÑùµÄËÙÂÊÔËÐС£È»¶ø£¬Â·ÓÉÆ÷È´Ö»ÄÜÔÚ¶Ìʱ¼äÄÚÒÔͬÑù¸ßµÄËÙÂÊ´¦ÀíÊý¾Ý¡£¶ÔÓÚÅÅÔÚ¶ÓÁÐÖеÄÒ»¸ö·Ö×飬²»¹ÜËüÓжà´ó£¬Â·ÓÉÆ÷±ØÐë×ö´óÔ¼Ïàͬ·ÖÁ¿µÄ¹¤×÷¡£ÏÔÈ»£¬´¦Àí10 ¸ö100 ×Ö½Ú³¤µÄ·Ö×éËù×÷µÄ¹¤×÷±È´¦Àí1 ¸ö1000 ×Ö½Ú³¤µÄ·Ö×éÒª×öµÄ¹¤×÷¶àµÃ¶à¡£
25. ´ð£º²»¿ÉÒÔ·¢ËÍÈκδóÓÚ1024 ×ֽڵķÖ×é¡£
26. ´ð£ºÃ¿5²úÉúÒ»¸öÁîÅÆ£¬1 ÃëÖпÉÒÔ·¢ËÍ200 000 ¸öÐÅÔª¡£Ã¿¸öÐÅÔªº¬ÓÐ48 ¸öÊý¾Ý×Ö½Ú£¬¼´8¡Á48= 384bit¡£
384¡Á2¡Á105 = ¡Á 106b/s
ËùÒÔ£¬×î´óµÄ¿É³ÖÐøµÄ¾»Êý¾ÝËÙÂÊΪs¡£
27. ´ð£º±¾ÌâÕ§¿´ÆðÀ´£¬ËƺõÒÔ6Mb/s ËÙÂÊ·¢ËÍÓÃ4/3 ÃëµÄʱ¼ä¿ÉÒÔ·¢ËÍÍêͰÄÚ8Mb µÄÊý¾Ý£¬Ê¹Â©Í°±ä¿Õ¡£È»¶ø£¬ÕâÑù»Ø´ðÊÇ´íÎóµÄ£¬ÒòΪÔÚÕâÆÚ¼ä£¬ÒÑÓиü¶àµÄÁîÅÆµ½´ï¡£ÕýÈ·µÄ´ð°¸Ó¦¸ÃʹÓù«Ê½S£½ C /(M-P )£¬ÕâÀïµÄS±íʾÒÔÃë¼ÆÁ¿µÄÍ»·¢Ê±¼ä³¤¶È£¬M ±íʾÒÔÿ
Ãë×Ö½Ú¼ÆÁ¿µÄ×î´óÊä³öËÙÂÊ£¬C ±íʾÒÔ×ֽڼƵÄͰµÄÈÝÁ¿£¬P ±íʾÒÔÿÃë×Ö½Ú¼ÆÁ¿µÄÁîÅÆµ½´ïËÙÂÊ¡£Ôò£º
Òò´Ë£¬¼ÆËã»ú¿ÉÒÔÓÃÍêÈ«ËÙÂÊ6Mb/s ·¢ËÍ s µÄʱ¼ä¡£
28. ´ð£ºÁî×î´óÍ»·¢Ê±¼ä³¤¶ÈΪ t Ã룬ÔÚ¼«¶ËÇé¿öÏ£¬Â©Í°ÔÚÍ»·¢ÆÚ¼äµÄ¿ªÊ¼ÊdzäÂúµÄ£¨1MB£©£¬ÔÚÍ»·¢ÆÚ¼äÁíÓÐ10 t MB ½øÈëͰÄÚ¡£ÔÚ´«ÊäÍ»·¢ÆÚ¼äµÄÊä³ö°üº¬50 t MB¡£ÓɵÈʽ1+10 t=50 t£¬µÃµ½ t=1/40s£¬¼´25ms¡£Òò´Ë£¬ÒÔ×î´óËÙÂÊÍ»·¢´«ËÍ¿Éά³Ö25ms µÄʱ¼ä¡£
29. The bandwidths in MB/sec are as follows: A: 2, B: 0, C: 1, E: 3, H: 3, J: 3, K:2, and L: 1.
30. Here is 2 million and is million, so is , and from queueing theory, each packet experiences a delay four times what it would in an idle system. The time in an idle system is 500 nsec, here it is 2sec. With 10 routers along a path, the queueing plus service time is 20 sec.
31. There is no guarantee. If too many packets are expedited, their channel may have even worse performance than the regular channel.
32. ´ð£ºÔÚÕâÁ½ÖÖÇé¿ö϶¼ÐèÒª·Ö¸î¹¦ÄÜ¡£¼´Ê¹ÔÚÒ»¸ö´®½ÓµÄÐéµçÂ·ÍøÂçÖУ¬ÑØÍ¨Â·µÄÄ³Ð©ÍøÂç¿ÉÄܽÓÊÜ1024 ×Ö½Ú·Ö×飬¶øÁíÒ»Ð©ÍøÂç¿ÉÄܽö½ÓÊÜ48×Ö½Ú·Ö×飬·Ö¸î¹¦ÄÜÈÔÈ»ÊÇÐèÒªµÄ¡£
33. ´ð£º¿ÉÒÔ¡£Ö»Ðè°Ñ·Ö×é·â×°ÔÚÊôÓÚËù¾¹ýµÄ×ÓÍøµÄÊý¾Ý±¨µÄÔØºÉ¶ÎÖУ¬²¢½øÐз¢ËÍ¡£
34. The initial IP datagram will be fragmented into two IP datagrams at I1. No other fragmentation will occur.
Link A-R1:
Length = 940; ID = x; DF = 0; MF = 0; Offset = 0 Link R1-R2:
(1) Length = 500; ID = x; DF = 0; MF = 1; Offset = 0 (2) Length = 460; ID = x; DF = 0; MF = 0; Offset = 60 Link R2-B:
(1) Length = 500; ID = x; DF = 0; MF = 1; Offset = 0
(2) Length = 460; ID = x; DF = 0; MF = 0; Offset = 60
35. If the bit rate of the line is b, the number of packets/sec that the router can emit is b/8192, so the number of seconds it takes to emit a packet is 8192/b.
To put out 65,536 packets takes 229 /b sec. Equating this to the maximum packet lifetime, we get 229 /b = 10. Then, b is about 53,687,091 bps.
36. ´ð£ºÒòΪΪÿһ¸ö·Ö¸îµÄƬ¶ÎÑ¡Ôñ·Óɶ¼ÐèÒª¸ÃÑ¡ÏîÐÅÏ¢£¬Òò´Ë¸ÃÑ¡Ïî±ØÐë³öÏÖÔÚÿһ¸öƬ¶ÎÖС£
37. ´ð£º³ýÈ¥2 λ×÷Ϊǰ׺£¬½«Ê£ÏÂ18 λ±íÊ¾ÍøÂç¡£¸ÅÄîÉÏ£¬ÍøÂçÊýÄ¿¿ÉÒÔÓÐ18 2 »ò262144 ¸ö¡£È»¶ø£¬È«0 ºÍÈ«1 ÊÇÌØ±ðµØÖ·£¬ËùÒÔÖ»ÓÐ262142 ¸ö¿É¹©·ÖÅä¡£
38. ´ð£ºThe address is ´ð£º¶ÔÓÚÒ»¸öB ÀàÍøÂ磬¸ß¶Ë16 λÐγÉÍøÂçºÅ£¬µÍ¶Ë16 λÊÇ×ÓÍø»òÖ÷»úÓò¡£ÔÚ×ÓÍøÑÚÂëµÄµÍ¶Ë16 λÖУ¬×î¸ßÓÐЧ4 λΪ1111£¬Òò´ËÊ£ÏÂ12 λÓÃÓÚÖ÷»úºÅ¡£Òò´Ë£¬´æÔÚ4096 ¸öÖ÷»úµØÖ·¡£µ«ÓÉÓÚÈ«0 ºÍÈ«1 ÊÇÌØ±ðµØÖ·£¬Òò´Ë×î´óµÄÖ÷»úÊýĿΪ4094¡£
40. To start with, all the requests are rounded up to a power of two. The starting address, ending address, and mask are as follows: A: ¨C written as ¨C written as ¨C written as ¨C written as They can be aggregated to It is sufficient to add one new table entry: for the new block. If an incoming packet matches both and the longest one wins. This rule makes it possible to assign a large block to one outgoing line but make an exception for one or more small blocks within its range.
43. The packets are routed as follows: (a) Interface 1 (b) Interface 0 (c) Router 2 (d) Router 1 (e) Router 2
44. After NAT is installed, it is crucial that all the packets pertaining to a single connection pass in and out of the company via the same router, since that is where the mapping is kept. If each router has its own IP address and all traffic belonging to a given connection can be sent to the same router, the mapping can be done correctly and multihoming with NAT can be made to work.
Ïà¹ØÍÆ¼ö£º