顯示具有 網路 標籤的文章。 顯示所有文章
顯示具有 網路 標籤的文章。 顯示所有文章

清華大學 計算機網路 期末考

(+5)【 單選題 】
(5%) 1. Which of the following statements are correct for delivering packets (datagrams) over the Internet ?
(a) All packets destined to the same destination will be forwarded along the same routing path.
(b) The routing path of a packet is determined first before the packet is sending into the Internet.
(c) The Internet is reliable so that all packets will be received by the destination correctly.
(d) A packet may be partitioned into several fragments by routers.
(e) All fragments of a packet will be forwarded along the same path to the destination.
(+5)【 複選題 】
(5%)2. Which of the following statements are correct for “statistical multiplexing” ?
(a) Data are transmitted based on demand of each flow.
(b) Data are transmitted based on the arrival time of each flow.
(c) The bandwidth used by different flows may be different.
(d)The statistical multiplexing is fair due to the bandwidth used by different flows are the same.
(e)It provides better link utilization than TDM (Time-Division-Multiplexing) and FDM (Frequency-Division- Multiplexing).
(+5)【 複選題 】
(5%) 3. Which of the following are correct for CSMA/CD (Carrier Sense Multiple Access with Collision Detection) protocol ?
(a)Listen (carrier sense) before transmit.
(b)If channel is sensed idle, then transmit entire frame without considering if frame collision is detected.
(c)If channel is sensed idle, then transmit a frame and stop the transmission when a collision is detected.
(d)If channel is sensed busy, then defer transmission until the channel is idle.
(e)If channel is sensed busy, then defer transmission for a random time.
(+5)【 複選題 】
(5%) 4. The “collision window” of the CSMA/CD protocol is time required to detect a collision. Which of the following are correct for collision window ? Assume the one way propagation time of the network is “a”
(a)The collision window is equal to a
(b)The collision window is equal to 2a
(c)The worst case scenario happens when the two hosts are at opposite ends of the Ethernet
(d)The best case scenario happens when the two hosts are close to each other.
(e)The worst case scenario happens when the two hosts are close to each other.
(+5)【 複選題 】
(5%) 5. What are the purposes of RTS and CTS control frames used in IEEE 802.11 wireless LAN ?
(a)Reserve the wireless channel for a time period
(b)Informs all nearby nodes that a transmission is about to begin
(c)These two frames also contain data to transmit.
(d)The sender is asking the receiver to send back a frame after a time period
(e)The duration field in the RTS and CTS frames is used to specify the time period needs to transmit the frame
(+5)【 複選題 】
(5%) 6. Which of the following statements about the CSMA/CA are correct ?
(a)A station with a pending MPDU may transmit immediately when it detects the medium is free.
(b)A station with a pending MPDU may transmit when it detects a free medium for greater than or equal to a DIFS time.
(c)If the medium is busy when a station desires to transmit an MPDU, the station can transmit the MPDU when it detects a free medium for greater than or equal to a DIFS time.
(d)In CSMA/CA protocol, no packet collision will happen as the “collision avoidance” mechanism is used.
(e)If the medium is busy when a station desires to transmit an MPDU, the Random Backoff Time algorithm shall be followed after it detects a free medium for greater than or equal to a DIFS time.
(+5)【 複選題 】
(5%) 7. Consider the procedure to maintain the spanning tree of IEEE 802.1D spanning tree algorithm. For a bridge B with three ports x,y,z and root bridge ID = w, rpc = p. Assume port x is an R port, port y is a D port, port z is blocked and connected to a LAN M. Also assume port z has a transmission cost of c. What actions will be taken by the bridge B if the hello BPDUs suppose to be periodically received from port z are lost for a long time (a timeout event) ?
(a) Port z is selected as a new R port.
(b) Port z is selected as a D port.
(c) A BPDU (with root bridge ID = w, rpc =p) is forwarded to port z
(d) A BPDU (with root bridge ID = w, rpc = p+c) is forwarded to port z.
(e) A BPDU (with root bridge ID = w, rpc =p) is forwarded to port y.
(+5)【 複選題 】
(5%) 8. Consider the procedure to construct the spanning tree. When a bridge B (with root bridge ID = w, rpc = p) receives a BPDU (with root bridge ID = m, rpc =q) from port x (with a transmission cost of c). Assume w > m. Then what actions will be taken by bridge B ?
(a) port x will be selected as a new D port.
(b) port x will be selected as a new R port.
(c) A BPDU (with root bridge ID = m, rpc =q) will be forwarded to all the ports, except port x.
(d) A BPDU (with root bridge ID = w, rpc =q+c) will be forwarded to all the ports, except port x.
(e) A BPDU (with root bridge ID = m, rpc =q+c) will be forwarded to all the ports, except port x.
(+4)【 複選題 】
(4%) 9. Which of the following tagging rules for a “hybrid link” are correct ?
(a)For each VLAN, all frames traversing a particular hybrid link can be tagged in different ways.
(b)For each VLAN, all frames traversing a particular hybrid link must be tagged the same way: all implicitly tagged or all carrying the same explicit tag.
(c)There can be a mix of implicitly and explicit tagged frames but they must be for different VLANs.
(d)All the frames must be tagged explicitly.
(e)A frame traversing a particular hybrid will be tagged or untagged depends on which VLAN the frame came from.
(+6)【 填充題 】
(6%) 10. Consider the following VLAN configuration. For switch 1, what are the “member set” and “untagged set” of each VLAN ? please answer the port “number” for each of the following questions.
注意:在每一個VLAN中的答案請依數字大小排序,答案請由"," 隔開,並且答案欄裡不要輸入任何空白字元(答案後面也不要有空白)
EX:若A空格答案有4 2 1 3,請填入:1,2,3,4(注意逗號是英文輸入法的逗號,若不確定請直接複製 ",")
Member set:
VLAN1:__A__
VLAN2:__B__
VLAN3:__C__
 
Untagged set:
 
VLAN1:__D__
VLAN2:__E__
VLAN3:__F__
A=ANS:2,3,4,5
B=ANS:7,11,12
C=ANS:6,7,8,9
D=ANS:2,3,4,5
E=ANS:11,12
F=ANS:8,9
(+5)【 複選題 】
(5%)11. Let SeqNumToAck denote the largest sequence number not yet acknowledged, such that all frames with sequence number less than SeqNumToAck have been received. Which of the following statements are correct for the “cumulative acknowledgement” ?  
(a)The receiver acknowledges SeqNumToAck+k to sender if a frame with sequence number of SeqNumToAck + k, k > 0, is received.
(b)The receiver acknowledges SeqNumToAck to sender if a frame with sequence number of SeqNumToAck + k, k > 0, is received.
(c)The receiver then sets LFR = SeqNumToAck + 1 and LAF = LFR + RWS-1.
(d)The receiver then sets LFR = SeqNumToAck and LAF = LFR + RWS.
(e)The receiver then sets LFR = SeqNumToAck - 1 and LAF = LFR + RWS.
(+5)【 單選題 】
(5%)12. Let MaxSeqNum be the total number of available sequence numbers.  Assume RWS = SWS, then which of the following relationship is sufficient to distinguish between different frames of the same sequence number ? 
(a)SWS + 1 ≤ MaxSeqNum
(b)SWS ≤ (MaxSeqNum+1)/2
(c)SWS = (MaxSeqNum+1)/2
(d)SWS < MaxSeqNum x 2
(e)SWS < (MaxSeqNum+1)/2
(+6)【 填充題 】
(6%)13. With the CIDR, what is the “prefix” for all the networks 192.4.16 through 192.4.31 ? Assume the prefix is represented as         192.4.a/b, and therefore
      a = _______A_______
      b = _______B_______
 
A=ANS:16
B=ANS:20
(+4)【 複選題 】
(4%)14. Which of the following statements are correct for “Link State” routing protocol ? Assume that each node knows the cost of the link to each of its directly connected neighbors. 
(a)Each node constructs a one dimensional array (a vector) containing the “distances” (costs) to all other nodes and distributes that vector to its immediate neighbors.
(b)Each node constructs a one dimensional array (a vector) containing the “distances” (costs) to all other nodes and distributes that vector to all other nodes.
(c)Each node constructs a one dimensional array (a vector) containing the “distances” (costs) to its immediate neighbors and distributes that vector to its immediate neighbors.
(d)Each node constructs a one dimensional array (a vector) containing the “distances” (costs) to its immediate neighbors and distributes that vector to all other nodes.
(e)The link state packets (LSP) are sent to all other nodes by using reliable flooding algorithm.
(+5)【 複選題 】
(5%)15. Which of the following statements are correct for “flow control and congestion control” ?
(a)Flow control involves preventing senders from overrunning the capacity of the receivers
(b)Flow control involves preventing senders from overrunning the capacity of the networks.
(c)Congestion control involves preventing senders from overrunning the capacity of the networks.
(d)Congestion control involves preventing senders from overrunning the capacity of the receivers.
(e)Congestion control involves preventing senders from overrunning the capacity of the receivers and networks.
(+5)【 單選題 】
(5%) 16. For the Additive Increase Multiplicative Decrease (AIMD) mechanism used in TCP congestion control, TCP does not wait for an entire window’s worth of ACKs to add 1 packet’s worth to the congestion window, but instead increments CongestionWindow by a little (denoted as increment) for each ACK. Which of the following is correct for this increment ?
(a) Increment =1/CongestionWindow
(b) Increment = 1/MSS
(c) Increment = MSS/CongestionWindow
(d) Increment = MSS (MSS/CongestionWindow)
(e) Increment = MSS/(CongestionWindow+MSS);
(+5)【 複選題 】
(5%) 17. Which of the following statements are correct for “slow start” in TCP congestion control ?
(a) Slow start effectively increases the congestion window linearly
(b) Slow start is used to increase the congestion window rapidly from a cold start
(c) When the ACK for a packet arrives TCP source, the TCP source adds 1 packet size of MSS to CongestionWindow
(d) When the ACK for a packet arrives TCP source, the TCP source doubles the size of CongestionWindow
(e) Slow start effectively doubles the number of packets the TCP source has in transit every RTT
(+5)【 複選題 】
(5%) 18. Which of the following statements are correct for a TCP source to handle the “packet lost” in congestion control ?
(a) After receives 3 duplicate ACKs, the CongestionWindow is cut in half and then grows linearly.
(b) After receives 3 duplicate ACKs, the CongestionWindow is set to 1 MSS and then grows linearly.
(c) After timeout event happes, the CongestionWindow is set to 1 MSS; the window then grows exponentially to a threshold, and then grows linearly.
(d) After timeout event happes, the CongestionWindow is set to 1 MSS; the window then grows linearly.
(e) After timeout event happes, the CongestionWindow is cut in half; the window then grows exponentially to a threshold, and then grows linearly.
(+10)【 填充題 】
(10%) 19. Consider the following figure to demonstrate the growth of CongestionWindow size for different “packet lost” events in TCP congestion control. We can use the following events to “describe” the curve in this figure. Initially, the connection is in slow start period with CongestionWindow size = 1 (1MSS).
        Event 1: 3-duplicate ACKs happens at 5th RTT
        Event 2: Timeout happens at 10th RTT
        Event 3: 3-duplicate ACKs happens again at 18th RTT.
        And we have a = 16 (window size), b = 8 (window size), c = 12 (window size), d = 6 (Threshold), e = 10 (window size), f = 5       (Threshold) as shown in the figure.
 
  Now, consider we have the following events:
        Event 1: 3-duplicate ACKs happens at 4th RTT
        Event 2: Timeout happens at 17th RTT
        Event 3: 3-duplicate ACKs happens again at 25th RTT.
        Then we have 
a = _____   (window size), 
b = _____   (window size), 
c = _____   (window size), 
d = _____   (Threshold), 
e = _____   (window size), 
f = ______  (Threshold).
 
And what is the CongestionWindow size at the following points?
At 2nd RTT :__________g______
At 18th RTT :__________h_____
At 23th RTT :__________i______
At 29th RTT :__________j______

a=ANS:8
b=ANS:4
c=ANS:16
d=ANS:8
e=ANS:12
f=ANS:6
g=ANS:2
h=ANS:1
i=ANS:10
j=ANS:9

清華大學 計算機網路 第5週課程 IEEE 802.1Q VLAN

VLAN-1 https://www.youtube.com/watch?v=nD27wJNVICI

5.1. Which of the following statements are correct for a layer 2 network that consists of stations connected by switches/bridges ?
(a) A layer 2 network is a broadcast domain which means that when a station sends a broadcast frame, the frame will be forwarded to all stations.
(b) A multicast frame will also be forwarded to all stations.
(c) A multicast frame will only be forwarded to all the members of the multicast group.
(d) A unicast frame will only be forwarded to its destination station.

5.2. What are the correct ways for a switch/bridge to handle received frames ?
(a) A switch/bridge only receives frames detinated to the switch/bridge.
(b) A switch/bridge receives and handles all frames coming into its ports.
(c) A switch/bridge handles a received frame by store-and-forward mechanism.
(d) A switch/bridge forwards a received frame by looking up the destination MAC address of the frame.

(e) A switch/bridge forwards a received frame by looking up the source MAC address of the frame.


VLAN-2 https://www.youtube.com/watch?v=0z9ORPXS7LE

5.3. Which of the following statements are correct for the VLAN ?
(a) A VLAN is a logical group of stations within a bridged LAN (BLAN).
(b) The members of a VLAN can be added, removed, or changed dynamically.
(c) The VLAN function is supported over shared and point-to-point media.
(d) Each VLAN has a unique identification (VID).
(e) All the bridges/switches must be VLAN aware devices.


5.4. We said that traffic between VLANs is firewalled. This means that
(a) The stations belong to different VLANs can not transmit packets to each other directly.
(b) The traffic between VLANs must be forwarded by a router.
(c) A physical firewall is built between VLANs.
(d) Only the broadcast traffic between VLANs are limited. Unicast traffic can still be exchanged directly between VLANs.
(e) Only the broadcast and multicast traffic between VLANs are limited.


5.5. Without VLAN configuration setting, what happens when a station sends a broadcast or multicast frame in a bridged LAN (BLAN) ?
(a) The frame will be forwarded by the routers connected to the bridged LAN.
(b) The frame will be filtered by the routers connected to the bridged LAN.
(c) A broadcast frame will be forwarded to all the stations in the bridged LAN.
(d) A multicast frame will only be forwarded to all the members of the multicast group.
(e) A multicast frame will be forwarded to all the stations in the bridged LAN.


5.6. What happens when a member of a VLAN x sends a broadcast frame ?
(a) The frame will be forwarded to all the stations in the bridged LAN.
(b) The frame will be forwarded to all the stations in the VLAN x.
(c) The frame will be forwarded by the routers connected to the bridged LAN.
(d) The frame will be filtered by the routers connected to the bridged LAN.
(e) The frame will be forwarded to all the stations in the VLAN x and VLAN y, where VLAN y and VLAN x are in the same switch.



VLAN-3 https://www.youtube.com/watch?v=JrkBuGvPzW0

VLAN可分為
Port Based
Mac Based
IP-Subnet Based
Layer-3 Protocol Based


VLAN-4 https://www.youtube.com/watch?v=xdnRMmZCCzM

5.7. Which of the following statements are correct for a port-based VLAN configuration ? Assume the port VID (PVID) of port x is 10 and a frame is received from port x.
(a) If the frame is untagged, then the VID of the frame will be 10.
(b) If the frame is already tagged with a VID = 20, then the VID of the frame will be 20.
(c) If the frame is already tagged with a VID = 20, then the VID of the frame will be changed to 10.
(d) Any station directly connects to port x will belong to VLAN 10.
(e) If a “hub” is connected to port x, then all the stations connected to this hub will belong to VLAN 10.

5.8. Consider the following port-based VLAN configuration with 3 bridges/switches. Which of the following statements are correct ?



(a) Both the links connecting (bridge 1, bridge 2) and (bridge 1, bridge 3) are trunk link.
(b) When a station of VLAN 3 sends a broadcast frame, the frame will be processed by all the three bridges.
(c) When a station of VLAN 3 sends a broadcast frame, the frame will be processed by bridge 1 and bridge 3.
(d) When a station of VLAN 1 sends a broadcast frame, the frame will also be processed by all the three bridges.
(e) When a station of VLAN 2 sends a broadcast frame, the frame will also be processed by bridge 1 and bridge 3.

5.9. Which of the following statements are correct for a MAC-based VLAN configuration ? Assume the port VID (PVID) of port x is 10 and a frame with source MAC address (SRC) and destination MAC address (DST) is received from port x.
(a) The VID of the frame will be 10.
(b) The VID of the frame is the VLAN where the SRC belongs to.
(c) The VID of the frame is the VLAN where the DST belongs to.
(d) In a MAC-based VLAN environment, all frames are actually untagged with a VLAN ID.
(e) A station always belongs to the same VLAN even the connected port of the station is changed dynamically.



VLAN-5 https://www.youtube.com/watch?v=7D3Q3XrWK5Q

5.10. Which of the following tagging rules for an “access link” are correct ?
(a) All frames traversing an access link must be tagged.
(b) All frames traversing an access link must be untagged.
(c) There can be a mix of implicitly and explicit tagged frames in access link but they must be for different VLANs.
(d) For each VLAN, all frames traversing an access link must be tagged the same way: all implicitly tagged or all carrying the same explicit tag.
(e) If a hub is connected to an access link, then the frames sent from all the stations connected to the hub must be untagged

5.11. Which of the following tagging rules for a “trunk link” are correct ?
(a) All frames traversing a trunk link must be tagged.
(b) All frames traversing a trunk link must be untagged.
(c) There can be a mix of implicitly and explicit tagged frames in a trunk link but they must be for different VLANs.
(d) For each VLAN, all frames traversing a trunk link must be tagged the same way: all implicitly tagged or all carrying the same explicit tag.
(e) A frame traversing a trunk link will be tagged or untagged depends on which VLAN the frame came from.

5.12. Which of the following tagging rules for a “hybrid link” are correct ?
(a) For each VLAN, all frames traversing a particular hybrid link can be tagged in different ways.
(b) For each VLAN, all frames traversing a particular hybrid link must be tagged the same way: all implicitly tagged or all carrying the same explicit tag.
(c) There can be a mix of implicitly and explicit tagged frames but they must be for different VLANs.
(d) All the frames must be tagged explicitly.
(e) A frame traversing a particular hybrid will be tagged or untagged depends on which VLAN the frame came from.


VLAN-6 https://www.youtube.com/watch?v=9cOOd5OtpMA

5.13 Consider the following VLAN configuration. Assume that all stations are VLAN unaware. Which of the following statements are correct ?

(a) All frames of VLAN A and VLAN B will be tagged when traversing the hybrid link.
(b) All frames of VLAN A, VLAN B and VLAN C will be tagged when traversing the hybrid link.
(c) All frames of VLAN C will be untagged when traversing the hybrid link.
(d) All frames of VLAN B and VLAN C will be untagged when traversing the hybrid link.
(e) All frames of VLAN C will be tagged when traversing the hybrid link.



5.14 Which of the following statements about the relationship between VLAN and spanning tree are correct ?
(a) The set of paths to connect the members of a VLAN is a subset of the spanning tree of the bridged LAN.
(b) The set of paths to connect the members a VLAN always is identical to the spanning tree of the bridged LAN.
(c) The set of paths to connect the members of a VLAN is fixed.
(d) The set of paths to connect the members of a VLAN is dynamic.
(e) The set of paths to connect the members of different VLANs may be different.

VLAN-7 https://www.youtube.com/watch?v=EyJw9a5AlDk

5.15 Which of the following statements about the bridge operation of VLAN are correct ?
(a) A bridge filters frames to ensure that traffic destined for a given VLAN is forwarded only on ports that form a path to members of that VLAN.
(b) A bridge will forward frames to all the ports to ensure that traffic destined for a given VLAN will be forwarded successfully.
(c) A frame will be forwarded along the spanning tree to all bridges to ensure that traffic destined for a given VLAN will be forwarded successfully.


5.16 Consider the following VLAN configuration. For switch 1, what are the “member set” and “untagged set” of each VLAN ? please answer the port “number” for each of the following questions



SVL: Share VLAN Learning
IVL: Independent VLAN Learning


5.17 What is the meaning of Shared VLAN Learning (SVL) ?
(a) Some of the VLANs construct a common filtering database and the learned MAC addresses are shared.
(b) Each VLAN constructs an individual filtering database and the learned MAC addresses are not shared
(c) All the VLANs construct a common filtering database and the learned MAC addresses are shared.
(d) Only one VLAN constructs a filtering database and the learned MAC addresses are shared to all other VLANs.
(e) All the VLANs construct a common filtering database but the learned MAC addresses are only shared to some VLANs.

5.18 What is the meaning of Independent VLAN Learning (IVL) ?
(a) Some of the VLANs construct a common filtering database and the learned MAC addresses are shared.
(b) Each VLAN constructs an individual filtering database and the learned MAC addresses are not shared
(c) Each VLAN constructs an individual filtering database but the learned MAC addresses are only shared to some VLANs
(d) All the VLANs construct a common filtering database and the learned MAC addresses are shared.
(e) Only one VLAN constructs a filtering database and the learned MAC addresses are shared to all other VLANs.


VLAN-9 https://www.youtube.com/watch?v=kJOXTDlR67A

VLAN Database的種類:Static and Dynamic

VLAN-10 https://www.youtube.com/watch?v=Ns6QBppslDI
VLAN Tag Structure
SNAP-encoded TPID(8 bytes) and TCI (2 bytes)
Ethernet-encoded TPID(2 bytes) and TCI (2 bytes)

5.19 Which of the following fields are included in a VLAN tag structure ?
(a) Tag Protocol Identifier (TPID)
(b) Tag Control Information (TCI)
(c) Tag Flag
(d) Tag Checksum
(e) Tag Encryption
5.20 Which of the following value is correct for Ethernet-encoded Tag Protocol Identifier (TPID) ?
(a) 80-00
(b) 81-00
(c) 82-00
(d) 83-00
(e) 84-00
5.21 How long is the SNAP-encoded Tag Protocol Identifier (TPID) ?
(a) 2 bytes
(b) 4 bytes
(c) 6 bytes
(d) 8 bytes
(e) 10 bytes
5.22 Which of the following fields are included in the Tag Control Information (TCI) of a VLAN tag ?
(a) User-Priority (3 bits)
(b) User-priority (4 bits)
(c) Canonical Format Indicator (1 bit)
(d) VLAN ID (12 bits)
(e) VLAN ID (10 bits)
5.23 What is the maximum number of VLANs allowed in a bridged LAN ?
(a) 512
(b) 1024
(c) 2048
(d) 4096
(e) 8192