欢迎来到冰点文库! | 帮助中心 分享价值,成长自我!
冰点文库
全部分类
  • 临时分类>
  • IT计算机>
  • 经管营销>
  • 医药卫生>
  • 自然科学>
  • 农林牧渔>
  • 人文社科>
  • 工程科技>
  • PPT模板>
  • 求职职场>
  • 解决方案>
  • 总结汇报>
  • ImageVerifierCode 换一换
    首页 冰点文库 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    计算机网络教程自顶向下方法选择题及问题详解 Chapt 4 Network LayerQUIZZ.docx

    • 资源ID:12906734       资源大小:18.64KB        全文页数:21页
    • 资源格式: DOCX        下载积分:5金币
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    二维码
    微信扫一扫登录
    下载资源需要5金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    计算机网络教程自顶向下方法选择题及问题详解 Chapt 4 Network LayerQUIZZ.docx

    1、计算机网络教程自顶向下方法选择题及问题详解 Chapt 4 Network LayerQUIZZChapter 4 Network Layer1. Packetizing at the network layer involvesA) Encapsulating the payload at the sourceB) Adds a header that contains the source and destination informationC) Decapsulating the payload at the destinationD) All of the choices are c

    2、orrect2. Routers in the path are not allowed to _.A) fragment the packet they receiveB) decapsulate the packetC) change source or destination addressD) All of the choices are correct3. The network layer in the Internet provides _.A) comprehensive error and flow control.B) limited error control, but

    3、no flow control.C) comprehensive error control but limited flow control.D) All of the choices are correct4. In a virtual-circuit approach, the forwarding decision is based on the value of the _ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are corre

    4、ct5. In a datagram approach, the forwarding decision is based on the value of the _ field in the packet header.A) source addressB) destination addressC) labelD) None of the choices are correct6. The performance of a network can be measured in terms of _.A) delayB) throughputC) packet lossD) all of t

    5、he choices are correct7. Transmission delay (time) is the ratio of _.A) transmission rate to packet lengthB) transmission rate to distanceC) packet length to transmission rateD) processing time to transmission rate8. Propagation delay (time) is the ratio of _.A) transmission rate to propagation spee

    6、dB) propagation speed to distanceC) packet length to propagation speedD) distance to propagation speed9. When the load in the network reaches the network capacity, the packet delay _ and the network throughput reaches _.A) increases sharply; its minimumB) increases sharply; its maximumC) decreases s

    7、harply; its minimumD) decreases sharply; its maximum10. In open-loop congestion control, policies are applied _.A) to prevent congestion before it happensB) to alleviate congestion after it happensC) to either prevent congestion before it happens or to alleviate congestion after it happensD) None of

    8、 the choices are correct11. The _ technique is one of the open-loop congestion policyA) backpressureB) choke packetC) implicit signalingD) None of the choices are correct12. The _ technique is one of the close-loop congestion policyA) acknowledgment policyB) choke packetC) discarding policyD) None o

    9、f the choices are correct13. IP is a _ protocol.A) connection-oriented unreliableB) connection-oriented reliableC) connectionless unreliableD) connectionless reliable14.An HLEN value of decimal 10 means _.A) there are 10 bytes of optionsB) there are 10 bytes in the headerC) there are 40 bytes of opt

    10、ionsD) there are 40 bytes in the header15. If the fragment offset has a value of 100, it means that _.A) the datagram has not been fragmentedB) the datagram is 100 bytes in sizeC) the first byte of the datagram is byte 800D) None of the choices are correct16. What is needed to determine the number o

    11、f the last byte of a fragment?A) offset numberB) total lengthC) both offset number and the total lengthD) None of the choices are correct17. The IP header size is _ bytes long.A) 20 to 60B) 20C) 60D) None of the choices are correct18. Packets in the IP layer are called _.A) segmentsB) datagramsC) fr

    12、amesD) None of the choices are correct19. The total length field defines the total length of the datagram _.A) including the headerB) excluding the headerC) excluding the option lengthD) None of the choices are correct20. When a datagram is encapsulated in a frame, the total size of the datagram mus

    13、t be less than the _.A) MUTB) MATC) MTUD) None of the choices are correct21. An IPv4 address is normally represented in base _ in dotted-decimal notation.A) 16B) 256C) 10D) None of the choices are correct22. In classful addressing, the IPv4 address space is divided into _ classes.A) 3B) 4C) 5D) None

    14、 of the choices are correct23. The number of addresses assigned to an organization in classless addressing _.A) can be any numberB) must be a multiple of 256C) must be a power of 2D) None of the choices are correct24. The first address assigned to an organization in classless addressing _.A) must be

    15、 evenly divisible by the number of addresses in the organizationB) must be divisible by 128C) must belong to one of the A, B, or C classesD) None of the choices are correct25. In subnetting, the number of addresses in each subnet must _.A) be a power of 2B) be a multiple of 128C) be divisible by 128

    16、D) None of the choices are correct26. What is the default prefix length for class A in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct27. What is the default prefix length for class B in CIDR notation?A) 9B) 8C) 16D) None of the choices are correct28. What is the default prefix length

    17、for class C in CIDR notation?A) 24B) 8C) 16D) None of the choices are correct29. DHCP is a (an) _ layer protocol.A) applicationB) transportC) networkD) data-link30. In DHCP, the client uses _ port and the server uses _ port.A) an ephemeral; a well-knownB) a well-known; a well-knownC) a well-known; a

    18、n ephemeralD) None of the choices are correct31. DHCP uses the services of _.A) UDPB) TCPC) IPD) None of the choices are correct32. _ allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with the rest of the world.A) DHCP

    19、B) NATC) IMCPD) None of the choices are correct33. The idea of address aggregation was designed to alleviate the increase in routing table entries when using _ addressing.A) classfulB) classlessC) classful or classlessD) None of the choices are correct34. The use of hierarchy in routing tables can _

    20、 the size of the routing tables.A) reduceB) increaseC) neither reduce nor increaseD) None of the choices are correct35. ICMP is a (an) _ layer protocol.A) application-layer protocol that helps TCP/IP at the network layerB) transport-layer protocol that helps TCP/IP at the network layerC) network-lay

    21、er protocol.D) data-link layer protocol that helps TCP/IP at the network layer36. Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated for a fragmented datagram.C) An ICMP error message may be

    22、 generated for a multicast datagram.D) None of the choices are correct37. Routing inside an autonomous system is referred to as _ routing.A) interdomainB) intradomainC) out-of-domainD) None of the choices are correct38.Routing between autonomous systems is referred to as _ routing.A) interdomain rou

    23、tingB) intradomain routingC) out-of-domainD) None of the choices are correct39. In _ routing, the least cost route between any two nodes is the route with the minimum distance.A) path vectorB) distance vectorC) link stateD) None of the choices are correct40. In _, each node maintains a vector (table

    24、) of minimum distances to every node.A) path vectorB) distance vectorC) link stateD) None of the choices are correct41. In distance vector routing, each node periodically shares its routing table with _ and whenever there is a change.A) every other nodeB) its immediate neighborsC) one neighborD) Non

    25、e of the choices are correct42. The Routing Information Protocol (RIP) is an intradomain routing based on _ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct43. The metric used by _ is the hop count.A) OSPFB) RIPC) BGPD) None of the choices are correct44. In RIP

    26、, the _ timer controls the advertising of regular update messages.A) garbage collectionB) expirationC) periodicD) None of the choices are correct45. In RIP, the _ timer is used to purge invalid routes from the table.A) garbage collectionB) expirationC) periodicD) None of the choices are correct46. I

    27、n RIP, the _ timer controls the validity of the route.A) garbage collectionB) expirationC) periodicD) None of the choices are correct47. RIP uses the services of _.A) TCPB) UDPC) IPD) None of the choices are correct48. The _ routing uses the Dijkstra algorithm to build a routing table.A) distance ve

    28、ctorB) link stateC) path vectorD) None of the choices are correct49. The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _ routing.A) distance vectorB) link stateC) path vectorD) None of the choices are correct50. The _ protocol allows the administrator to assign

    29、 a cost, called the metric, to each route.A) OSPFB) RIPC) BGPD) None of the choices are correct51. In OSPF, a _ link connects two routers without any other host or router in between.A) point-to-pointB) transientC) stubD) None of the choices are correct52. In OSPF, a _ link is a network with several routers attached to it.A) point-to-pointB) transientC) stubD) None of the choices are correct53. In OSPF, a _ link is a network connected to only one router.A) point-to-pointB) transientC) stubD) None of the choices are c


    注意事项

    本文(计算机网络教程自顶向下方法选择题及问题详解 Chapt 4 Network LayerQUIZZ.docx)为本站会员主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 冰点文库 网站版权所有

    经营许可证编号:鄂ICP备19020893号-2


    收起
    展开