好文档 - 专业文书写作范文服务资料分享网站

VIP专享2006-2007第一学期计算机网络试卷1A - 图文

天下 分享 时间: 加入收藏 我要投稿 点赞

得分

得分统计表:

大题号总分

A

1

2

3

Q

试卷编号: 1-A

答题时限: 120

课程代码: 0600100

天津理工大学考试试卷4

5

分钟

6

PART Ⅰ: Choice (1 point per question – total: 20 points)

《计算机网络技术》 期末考试试卷

1. End system are connected together by ____.

A. communication links B. application layer

C. transport layer D. the network layer

2. Which application’s NOT using TCP?

A. SMTP B. HTTPC. DNS D. All of them

3. In the polling protocols, the master node polls each of the nodes in a/an ____ fashion. A. random

B. appointed C. round-robin D. uncirculated

7

Instructions: Select one of the letters beside the choice that is the best answer for each question.

考试形式:闭卷笔试

8

9

10

11

12

2006 ~ 2007 学年度第 1 学期

试卷编号: 1-A 命题日期: 2006 年 12 月 10 日

第 1 页 共 11 页

13

14

15

16

17

18

19

20

4. The DNS protocol runs over ____ and uses port ____. A. UDP 36 B. TCP 36 C. UDP 53

D. TCP 53

5. TCP provides a ____ service to its applications to eliminate the possibility of the sender over-flowing the receiver’s buffer.

A. flow-control

B. congestion controlC. reliability controlD. data connection

6. We can classify just about any multiple access protocol as belonging to one of three categories: channel partitioning protocols, random access protocols, and ____. A. address resolution protocols

B. Dynamic host configuration protocols C. link-control protocols

D. taking-turns protocols

7. The job of delivering the data in transport-layer segment to the correct socket is called____. A. multiplexing B. demultiplexing

C. congestion controlD. data-transport

8. The maximum transfer unit(MTU) in Ethernet frame structure is ____byte .

A. 1000 B. 1500 C. 800 D. 2000

9. The socket of UDP is identified by _____ and _______. A. source IP address and source port number

B. destination IP address and destination port number. C. source IP address and destination port number. D. destination IP address and source IP address.

10. Which is not plug and play in the following four items? A. DHCP

B. Hubs C. Routers D. Switches

11.Which of routers is not default routers ?

A. first-hop router B. source router C. destination router D. second-hop router

12.Which of characters is not distance-vector algorithm’s characters?

A. iterativeB. global

C. asynchronous

试卷编号: 1-A

第 2 页 共 11 页

试卷编号: 1-A

D. distributed

13. ICMP is_____.

A. the protocol of Application layer B. the protocol of network layer

C. the protocol of transport layer D. not a part of TCP/IP protocols

14. As general, we has following channel partitioning protocols except ____. A. TDM B. CSMA C. FDM D.CDMA

15. ____ is most used for error reporting. A. UDP B. SMTP C. FTP D. ICMP

16. The header of IPV6 is ____byte. A. 20 B. 40

C. 60D. 80

17. In the network layer these service are host-to-host service provided by ____.

A. the transport layer to the network layerB. the network layer to the transport layerC. the network layer to the network layerD. the transport layer to the transport layer

18. If there is not enough memory to buffer an in coming packet , a policy that drop the arriving packet called ____. )

A. drop-tailB. packet lossC. protocol

D. encapsulation

19. In either case, a ____ receives routing protocol messages, which are used to configure its forwarding table.

A. server B. host C. router D. Modem

20. Which of the following functions does not belong to PPP___.

A. framing

B. link-control protocols C. network-control protocols D. error correction

第 3 页 共 11 页

PART Ⅱ: True / False (1 points per question – total:20 points)

Instructions: Mark the symbol “√” (for True) if the statement is correct, or the symbol “X” (for False) if the statement is incorrect.得分

QA

1234567891011121314151617181920

1. The DNS server can update the records.

2. The TCP connection is a direct virtual pipe between the client’s socket and the server’s connection socket.

3. SMTP protocol connect the sender’s mail server and receiver’s mail server

4. Whereas a transport-layer protocol provides logical communication between processes running on different hosts, a network-layer protocol provides logical communication between hosts.

5. UDP and TCP also provide integrity checking by including right-detection fields in their headers. 6. If the application developer chooses UDP instead of TCP, then the application is not directly

talking with IP.

7. When we develop a new application, we must assign the application a port number.

8. Real-tine applications, like Internet phone and video conferencing, react very poorly to TCP’s congestion control.

9. The sender knows that a received ACK or NAK packet was generated in response to its most recently transmitted data packet.

10. To simplify terminology, when in an Internet context, we refer to the 4-PDU as a unit. 11. DV algorithm is essentially the only routing algorithm used in practice today in the Internet。12. Every router has many forwarding tables.

13.In either case, a server receives routing protocol messages,which are used to configure its forwarding table.

14. Among the ASs, they run the same inter_AS routing protocol.

试卷编号: 1-A

第 4 页 共 11 页

15. Routing protocols’ job is to determine the path take by a datagram between source and destination.

16. OSPF was one of the earliest intra_AS Internet routing protocols. 17. The IPV6 datagrams are more simpler, more streamlined.

18. Forwarding tables in datagram networks can be modified at any time.

19. In a VC network, the network’s routers must maintain connection state information for the ongoing connections.

20. The routers of datagram networks use forwarding table, the routers of virtual-circuit networks don’t use forwarding table.

PART Ⅲ: Fill in the following blank with a or some appropriate word/words. (1 points per blank – total: 20 points)

得分

1. In the “10BaseT”,T stands for ( 2. (

) and (

).

) are two of the most important protocols in the internet.

), which services

3. In a client-server architecture, there is an always-on host , called the ( requests from many other hosts, called ( ). 4. The broadcast destination IP address is ( 5. Two of the more important (

).

) protocols are polling protocols and token-passing protocol.

), but not in network router.

6. Transport-layer protocols are implemented in the ( 7. The port numbers ranging (

) are called well-known port numbers.

8.The ( ) algorithm is used in many routing protocols in practices, including the Internet’s RIP and BGP, Novell IPX, and the original ARPAnet. 9. Internet consists of hierarchy of interconnected ( 10. In MAC address, broadcast address is ( 11. AS is a collection of(

试卷编号: 1-A

).

).

) under the same administrative and technical control.

第 5 页 共 11 页

VIP专享2006-2007第一学期计算机网络试卷1A - 图文

得分得分统计表:大题号总分A123Q试卷编号:1-A答题时限:120课程代码:0600100天津理工大学考试试卷45一分
推荐度:
点击下载文档文档为doc格式
8dt7e8ama383hrt8bf1m52amw9lhy70083w
领取福利

微信扫码领取福利

微信扫码分享