ZIP计算机网络自顶向下方法第八版答案 14.56MB

Shoulder99

资源文件列表:

SM8th.zip 大约有13个文件
  1. SM8th/SM - Computer Networking 8e Kurose.pdf 6.44MB
  2. SM8th/Wireshark_802.11_SOLUTION_v8.0.doc 171.5KB
  3. SM8th/Wireshark_DHCP_SOLUTION_v8.0.doc 298.5KB
  4. SM8th/Wireshark_DNS_SOLUTION_V8.0.docx 599.82KB
  5. SM8th/Wireshark_Ethernet_ARP_SOLUTION_v8.0.doc 389.5KB
  6. SM8th/Wireshark_HTTP_SOLUTION_v8.0.doc 4.36MB
  7. SM8th/Wireshark_ICMP_SOLUTION_v8.0.doc 462.5KB
  8. SM8th/Wireshark_Intro_SOLUTION_v8.0.doc 434KB
  9. SM8th/Wireshark_IP_SOLUTION_V8.0.docx 333.71KB
  10. SM8th/Wireshark_NAT_SOLUTION_v8.0.doc 161.5KB
  11. SM8th/Wireshark_SSL_SOLUTION_v8.0.doc 1.52MB
  12. SM8th/Wireshark_TCP_SOLUTION_v8.0.doc 1.43MB
  13. SM8th/Wireshark_UDP_SOLUTION_v8.0.doc 298.5KB

资源介绍:

自顶向下方法第八版答案,包括复习题以及课后习题和实验的内容。
<html xmlns="http://www.w3.org/1999/xhtml"><meta charset="utf-8"><meta name="generator" content="pdf2htmlEX"><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"><link rel="stylesheet" href="/image.php?url=https://csdnimg.cn/release/download_crawler_static/css/base.min.css"><link rel="stylesheet" href="/image.php?url=https://csdnimg.cn/release/download_crawler_static/css/fancy.min.css"><link rel="stylesheet" href="/image.php?url=https://csdnimg.cn/release/download_crawler_static/87768255/raw.css"><script src="/image.php?url=https://csdnimg.cn/release/download_crawler_static/js/compatibility.min.js"></script><script src="/image.php?url=https://csdnimg.cn/release/download_crawler_static/js/pdf2htmlEX.min.js"></script><script>try{pdf2htmlEX.defaultViewer = new pdf2htmlEX.Viewer({});}catch(e){}</script><div id="sidebar" style="display: none"><div id="outline"></div></div><div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="/image.php?url=https://csdnimg.cn/release/download_crawler_static/87768255/bg1.jpg"><div class="c x1 y1 w2 h2"><div class="t m0 x0 h3 y2 ff1 fs0 fc0 sc0 ls0 ws0"><span class="fc1 sc0">&#61559;</span><span class="fc1 sc0">&#61472;</span><span class="fc1 sc0">&#61678;</span><span class="fc1 sc0">&#61680;</span><span class="fc1 sc0">&#61678;</span><span class="fc1 sc0">&#61680;</span><span class="fc1 sc0">&#61472;</span><span class="fc1 sc0">&#61648;</span><span class="fc1 sc0">&#61627;</span><span class="fc1 sc0">&#61631;</span><span class="fc1 sc0">&#61614;</span><span class="fc1 sc0">&#61613;</span><span class="fc1 sc0">&#61617;</span><span class="fc1 sc0">&#61618;</span><span class="fc1 sc0">&#61472;</span><span class="_ _0"></span><span class="fc1 sc0">&#61659;</span><span class="fc1 sc0">&#61628;</span><span class="fc1 sc0">&#61611;</span><span class="fc1 sc0">&#61629;&#61631;</span><span class="fc1 sc0">&#61612;</span><span class="fc1 sc0">&#61623;</span><span class="fc1 sc0">&#61617;</span><span class="fc1 sc0">&#61618;</span><span class="fc1 sc0">&#61684;</span><span class="fc1 sc0">&#61472;</span><span class="fc1 sc0">&#61656;</span><span class="fc1 sc0">&#61617;</span><span class="fc1 sc0">&#61630;</span><span class="_ _0"></span><span class="fc1 sc0">&#61617;</span><span class="fc1 sc0">&#61621;</span><span class="fc1 sc0">&#61627;</span><span class="fc1 sc0">&#61618;</span><span class="fc1 sc0">&#61684;</span><span class="fc1 sc0">&#61472;</span><span class="fc1 sc0">&#61650;</span><span class="fc1 sc0">&#61654;</span><span class="fc1 sc0">&#61682;</span><span class="fc1 sc0">&#61472;</span><span class="fc1 sc0">&#61663;</span><span class="fc1 sc0">&#61620;</span><span class="fc1 sc0">&#61620;</span><span class="fc1 sc0">&#61472;</span><span class="fc1 sc0">&#61614;</span><span class="fc1 sc0">&#61623;</span><span class="fc1 sc0">&#61625;</span><span class="fc1 sc0">&#61624;</span><span class="fc1 sc0">&#61612;</span><span class="fc1 sc0">&#61613;</span><span class="fc1 sc0">&#61472;</span><span class="_ _0"></span><span class="fc1 sc0">&#61614;</span><span class="fc1 sc0">&#61627;</span><span class="fc1 sc0">&#61613;</span><span class="fc1 sc0">&#61627;</span><span class="fc1 sc0">&#61614;</span><span class="fc1 sc0">&#61610;</span><span class="fc1 sc0">&#61627;</span><span class="fc1 sc0">&#61628;</span><span class="fc1 sc0">&#61682;</span></div></div></div><div class="pi" data-data='{"ctm":[1.568627,0.000000,0.000000,1.568627,0.000000,0.000000]}'></div></div></html><div id="pf2" class="pf w0 h0" data-page-no="2"><div class="pc pc2 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="/image.php?url=https://csdnimg.cn/release/download_crawler_static/87768255/bg2.jpg"><div class="c x2 y3 w3 h4"><div class="t m0 x3 h5 y4 ff2 fs1 fc2 sc0 ls1 ws0">Ch<span class="_ _0"></span>apt<span class="_ _0"></span>er<span class="ls0">!<span class="_ _0"></span>1!<span class="ls2">Rev<span class="_ _1"></span>iew</span>!<span class="ls3">Quest<span class="_ _0"></span><span class="ls4">io<span class="_ _0"></span>ns<span class="ls0">!</span></span></span></span></div></div><div class="t m0 x4 h6 y5 ff3 fs2 fc0 sc0 ls0 ws0">1.<span class="_ _2"> </span>There <span class="_ _3"></span><span class="ls5">is</span> <span class="_ _3"></span>no <span class="_ _3"></span>difference. <span class="_ _3"></span>Throughout <span class="_ _3"></span>this <span class="_ _3"></span>text, <span class="_ _3"></span>the <span class="_ _3"></span>words <span class="_ _3"></span>&#8220;host&#8221; <span class="_ _3"></span>and <span class="_ _3"></span>&#8220;end <span class="_ _3"></span>system&#8221; <span class="_ _3"></span>are</div><div class="t m0 x5 h6 y6 ff3 fs2 fc0 sc0 ls0 ws0">used <span class="_"> </span>interchangeably. <span class="_ _4"> </span>End <span class="_"> </span>systems <span class="_ _4"> </span>include <span class="_"> </span>PCs, <span class="_ _4"> </span>workstations, <span class="_"> </span><span class="ls5">Web</span> <span class="_ _4"> </span>servers, <span class="_"> </span><span class="ls5">mail</span></div><div class="t m0 x5 h6 y7 ff3 fs2 fc0 sc0 ls0 ws0">servers, <span class="ls6">PDAs,</span> Internet-connected game consoles, <span class="ls5">etc.</span></div><div class="t m0 x4 h6 y8 ff3 fs2 fc0 sc0 ls0 ws0">2.<span class="_ _2"> </span>From <span class="_ _1"></span>Wikipedia: Diplomatic <span class="_ _1"></span>protocol <span class="ls5">is</span> <span class="_ _1"></span>commonly <span class="_ _1"></span>described <span class="ls5">as</span> <span class="_ _1"></span>a <span class="ls6">set</span> <span class="_ _1"></span>of <span class="_ _1"></span>international</div><div class="t m0 x5 h6 y9 ff3 fs2 fc0 sc0 ls0 ws0">courtesy <span class="_ _1"></span>rules. <span class="_ _1"></span>These <span class="_ _1"></span><span class="ls6">well</span>-established <span class="_ _1"></span>and <span class="_ _1"></span><span class="ls5">time</span>-honored <span class="_ _1"></span>rules <span class="_ _1"></span>have <span class="_ _1"></span>made <span class="_ _1"></span><span class="ls5">it</span> <span class="_ _1"></span><span class="ls5">easier</span> for</div><div class="t m0 x5 h6 ya ff3 fs2 fc0 sc0 ls0 ws0">nations <span class="_ _5"> </span>and <span class="_ _5"> </span>peop<span class="ls5">le</span> <span class="_ _5"> </span><span class="ls5">to</span> <span class="_ _5"> </span>live <span class="_ _5"> </span>and <span class="_ _5"> </span>work <span class="_ _5"> </span>together. <span class="_ _5"> </span>Part <span class="_ _5"> </span>of <span class="_ _5"> </span>protocol <span class="_ _5"> </span>has <span class="_ _5"> </span>always <span class="_ _5"> </span>been <span class="_ _5"> </span>the</div><div class="t m0 x5 h6 yb ff3 fs2 fc0 sc0 ls0 ws0">acknowledgment <span class="_ _0"></span>of <span class="_ _0"></span>the <span class="_ _0"></span>hierarchical <span class="_ _0"></span>standing <span class="_ _0"></span>of <span class="_ _0"></span><span class="ls5">all<span class="ls0"> <span class="_ _0"></span>present. <span class="_ _0"></span>Protocol <span class="_ _0"></span>rules <span class="_ _6"></span>are <span class="_ _6"></span>based on</span></span></div><div class="t m0 x5 h6 yc ff3 fs2 fc0 sc0 ls0 ws0">the principles of civility.</div><div class="t m0 x4 h6 yd ff3 fs2 fc0 sc0 ls0 ws0">3.<span class="_ _2"> </span>Standards <span class="_ _6"></span>are <span class="_ _6"></span>important for <span class="_ _6"></span>protocols <span class="_ _6"></span><span class="ls6">so<span class="ls0"> <span class="_ _6"></span>that <span class="_ _6"></span>people <span class="ls5">can</span> <span class="_ _6"></span>create <span class="_ _6"></span>networking <span class="_ _6"></span>systems <span class="_ _6"></span>and</span></span></div><div class="t m0 x5 h6 ye ff3 fs2 fc0 sc0 ls0 ws0">products that interoperate.</div><div class="t m0 x4 h6 yf ff3 fs2 fc0 sc0 ls0 ws0">4.<span class="_ _2"> </span>1. <span class="_ _5"></span><span class="ls6">Dial</span>-up <span class="_ _3"></span>modem <span class="_ _5"></span>over <span class="_ _3"></span>telephone <span class="_ _5"> </span>line: <span class="_ _5"></span>home; <span class="_ _3"></span>2. <span class="_ _5"> </span><span class="ls6">DSL</span> <span class="_ _5"></span>over <span class="_ _3"></span><span class="ls5">te</span>lephone <span class="_ _5"></span>line: <span class="_ _3"></span>home <span class="_ _5"> </span>or</div><div class="t m0 x5 h6 y10 ff3 fs2 fc0 sc0 ls6 ws0">small<span class="ls0"> office; 3. Cable <span class="ls5">to</span> HFC: home; 4. 100 Mbps switched Ethernet: enterprise.</span></div><div class="t m0 x4 h6 y11 ff3 fs2 fc0 sc0 ls0 ws0">5.<span class="_ _2"> </span><span class="ls6">HFC</span> <span class="_ _3"></span>bandwidth <span class="_ _5"></span><span class="ls5">is</span> <span class="_ _3"></span>shared <span class="_ _3"></span>among <span class="_ _5"></span>the <span class="_ _3"></span>users. <span class="_ _3"></span><span class="ls6">On</span> <span class="_ _5"></span>the <span class="_ _3"></span>downstream <span class="_ _3"></span>channel, <span class="_ _5"></span><span class="ls5">all</span> <span class="_ _3"></span>packets</div><div class="t m0 x5 h6 y12 ff3 fs2 fc0 sc0 ls0 ws0">emanate <span class="_ _3"></span>from <span class="_ _1"></span>a <span class="_ _3"></span>single <span class="_ _3"></span>source, <span class="_ _3"></span>namely, <span class="_ _1"></span>the <span class="_ _3"></span>head <span class="_ _3"></span>end. <span class="_ _3"></span>Thus, <span class="_ _1"></span>there <span class="_ _3"></span>are <span class="_ _3"></span>no <span class="_ _3"></span><span class="ls5">co</span>llisions <span class="_ _1"></span><span class="ls5">in</span></div><div class="t m0 x5 h6 y13 ff3 fs2 fc0 sc0 ls0 ws0">the downstream channel.</div><div class="t m0 x4 h6 y14 ff3 fs2 fc0 sc0 ls0 ws0">6.<span class="_ _2"> </span>In most American <span class="ls5">cities,</span> the <span class="_ _0"></span>current possibilities include: dial-up; <span class="ls6">DSL;</span> <span class="_ _0"></span>cable modem;</div><div class="t m0 x5 h6 y15 ff3 fs2 fc0 sc0 ls0 ws0">fiber-<span class="ls5">to</span>-the-home.</div><div class="t m0 x4 h6 y16 ff3 fs2 fc0 sc0 ls0 ws0">7.<span class="_ _7"> </span>Ethern<span class="ls5">et</span> <span class="ls5">LANs</span> have transmission rates of 10 Mbps, 100 Mbps, 1 Gbps and 10 Gbps.</div><div class="t m0 x4 h6 y17 ff3 fs2 fc0 sc0 ls0 ws0">8.<span class="_ _8"> </span>Today, <span class="_ _6"></span>Ethernet <span class="_ _6"></span>most <span class="_ _6"></span>commonly <span class="_ _6"></span>runs <span class="_ _6"></span>over <span class="_ _6"></span><span class="ls5">twisted<span class="ls0">-pair <span class="_ _6"></span>copper <span class="_ _6"></span>wire. <span class="_ _6"></span>It <span class="_ _6"></span><span class="ls5">also<span class="ls0"> <span class="_ _6"></span><span class="ls5">can<span class="ls0"> <span class="_ _6"></span>run <span class="_ _6"></span>over</span></span></span></span></span></span></div><div class="t m0 x5 h6 y18 ff3 fs2 fc0 sc0 ls0 ws0">fibers optic links.</div><div class="t m0 x4 h6 y19 ff3 fs2 fc0 sc0 ls0 ws0">9.<span class="_ _9"> </span><span class="ls6">ADSL:</span> <span class="_ _3"></span>up <span class="_ _3"></span><span class="ls5">to</span> <span class="_ _3"></span>24 <span class="_ _3"></span>Mbps <span class="_ _1"></span>downstream <span class="_ _3"></span>and <span class="_ _3"></span>2.5 <span class="_ _3"></span>Mbps <span class="_ _3"></span>upstream, <span class="_ _3"></span>bandwidth <span class="_ _3"></span><span class="ls5">is</span> <span class="_ _1"></span>dedicated;</div><div class="t m0 x5 h6 y1a ff3 fs2 fc0 sc0 ls0 ws0">HFC, <span class="_ _5"> </span>rates <span class="_ _a"> </span>up <span class="_ _5"> </span><span class="ls5">to</span> <span class="_ _a"> </span>42.8 <span class="_ _5"> </span>Mbps <span class="_ _a"> </span>and <span class="_ _5"> </span>upstream <span class="_ _a"> </span>rates <span class="_ _5"> </span>of <span class="_ _a"> </span>up <span class="_ _5"> </span><span class="ls5">to</span> <span class="_ _a"> </span>30.7 <span class="_ _5"> </span>Mbps, <span class="_ _a"> </span>bandwidth <span class="_ _5"> </span><span class="ls5">is</span></div><div class="t m0 x5 h6 y1b ff3 fs2 fc0 sc0 ls0 ws0">shared. F<span class="ls5">TTH:</span> 2-10Mbps upload; 10-20 Mbps download; bandwidth <span class="ls5">is</span> not shared.</div><div class="t m0 x4 h6 y1c ff3 fs2 fc0 sc0 ls0 ws0">10.<span class="_"> </span>There are <span class="ls5">two</span> popular wireless Internet <span class="ls5">access</span> technologies today:</div><div class="t m0 x6 h6 y1d ff3 fs2 fc0 sc0 ls5 ws0">a.<span class="_ _b"> </span><span class="ls0">Wifi <span class="_"> </span>(802.11) <span class="_ _c"> </span>In <span class="_"> </span>a <span class="_ _c"> </span>wireless <span class="_"> </span></span>LAN,<span class="ls0"> <span class="_ _c"> </span>wireless <span class="_"> </span>users <span class="_ _c"> </span>transmit/receive <span class="_"> </span>packets</span></div><div class="t m0 x7 h6 y1e ff3 fs2 fc0 sc0 ls0 ws0">to/from <span class="ls5">an<span class="ls7"> </span></span>base station<span class="ls7"> </span>(i.e., wireless a<span class="ls5">ccess</span> point) within <span class="_ _0"></span>a radius of few tens</div><div class="t m0 x7 h6 y1f ff3 fs2 fc0 sc0 ls0 ws0">of meters. <span class="_ _6"></span>The base station <span class="_ _6"></span><span class="ls5">is<span class="ls0"> typically <span class="_ _6"></span>connected <span class="ls5">to</span> the <span class="_ _6"></span>wired Internet and <span class="_ _6"></span>thus</span></span></div><div class="t m0 x7 h6 y20 ff3 fs2 fc0 sc0 ls0 ws0">serves <span class="ls5">to</span> connect <span class="ls6">wir<span class="ls5">eless</span></span> users <span class="ls5">to</span> the wired network.</div><div class="t m0 x6 h6 y21 ff3 fs2 fc0 sc0 ls0 ws0">b.<span class="_ _2"> </span>3G and 4G wide-area wireless <span class="ls5">access</span> networks. <span class="_ _d"></span>In <span class="_ _5"> </span>these <span class="_ _5"> </span>systems, <span class="_ _5"></span>packets <span class="_ _5"></span>are</div><div class="t m0 x7 h6 y22 ff3 fs2 fc0 sc0 ls0 ws0">transmitted <span class="_ _3"></span>over <span class="_ _5"></span>the <span class="_ _3"></span><span class="ls6">same</span> <span class="_ _3"></span>wireless <span class="_ _5"></span>infrastructure <span class="_ _3"></span>used <span class="_ _3"></span>for <span class="_ _5"></span>cellular <span class="_ _3"></span>telephony,</div><div class="t m0 x7 h6 y23 ff3 fs2 fc0 sc0 ls6 ws0">with<span class="ls0"> <span class="_ _3"></span>the <span class="_ _5"></span>base <span class="_ _3"></span>station <span class="_ _3"></span>thus <span class="_ _5"></span>being <span class="_ _3"></span>managed <span class="_ _3"></span>by <span class="_ _3"></span>a <span class="_ _5"></span>telecommunications <span class="_ _3"></span>provider.</span></div><div class="t m0 x7 h6 y24 ff3 fs2 fc0 sc0 ls0 ws0">This <span class="_ _1"></span>provides <span class="_ _1"></span>wireless <span class="_ _3"></span><span class="ls5">access</span> <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _1"></span>users <span class="_ _1"></span>within <span class="_ _1"></span>a <span class="_ _1"></span>radius <span class="_ _3"></span>of <span class="_ _1"></span>tens <span class="_ _1"></span>of <span class="_ _1"></span>kilometers <span class="_ _1"></span>of</div><div class="t m0 x7 h6 y25 ff3 fs2 fc0 sc0 ls0 ws0">the base station.</div><div class="t m0 x4 h6 y26 ff3 fs2 fc0 sc0 ls0 ws0">11.<span class="_ _e"> </span><span class="ls6">At</span> <span class="_ _5"> </span><span class="ls5">time</span> <span class="_ _5"> </span>t</div><div class="t m0 x8 h7 y27 ff3 fs3 fc0 sc0 ls0 ws0">0</div><div class="t m0 x9 h6 y26 ff3 fs2 fc0 sc0 ls0 ws0"> <span class="_ _5"> </span>the <span class="_ _5"> </span>sending <span class="_ _a"> </span>host <span class="_ _5"> </span>begins <span class="_ _5"> </span><span class="ls5">to</span> <span class="_ _a"> </span>transmit. <span class="_ _5"> </span><span class="ls6">At</span> <span class="_ _5"> </span><span class="ls5">time</span> <span class="_ _5"> </span><span class="ff4">t</span></div><div class="t m0 xa h8 y27 ff4 fs3 fc0 sc0 ls0 ws0">1 </div><div class="t m0 xb h9 y26 ff4 fs2 fc0 sc0 ls0 ws0">= <span class="_ _5"> </span><span class="ls6">L/R</span></div><div class="t m0 xc h8 y27 ff4 fs3 fc0 sc0 ls0 ws0">1</div><div class="t m0 xd h6 y26 ff3 fs2 fc0 sc0 ls0 ws0">, <span class="_ _5"> </span>the <span class="_ _5"> </span>sending <span class="_ _a"> </span>host</div><div class="t m0 x5 h6 y28 ff3 fs2 fc0 sc0 ls0 ws0">completes <span class="_ _1"></span>transmission and <span class="_ _1"></span>the <span class="_ _1"></span>entire <span class="_ _1"></span>packet <span class="ls5">is</span> <span class="_ _1"></span>received <span class="_ _1"></span><span class="ls5">at</span> <span class="_ _1"></span>the router <span class="_ _1"></span>(no <span class="_ _1"></span>propagation</div><div class="t m0 x5 h6 y29 ff3 fs2 fc0 sc0 ls0 ws0">delay). <span class="_ _1"></span>Because <span class="_ _1"></span>the <span class="_ _1"></span>router <span class="_ _1"></span>has <span class="_ _1"></span>the <span class="_ _1"></span>entire packet <span class="_ _1"></span><span class="ls5">at</span> <span class="_ _1"></span><span class="ls5">time</span> <span class="_ _1"></span><span class="ff4">t</span></div><div class="t m0 xe h8 y2a ff4 fs3 fc0 sc0 ls0 ws0">1</div><div class="t m0 xf h6 y29 ff3 fs2 fc0 sc0 ls0 ws0">, <span class="_ _1"></span><span class="ls5">it</span> <span class="_ _1"></span><span class="ls5">can</span> <span class="_ _1"></span>begin <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _1"></span>transmit <span class="_ _1"></span>the</div><div class="c x1 y2b w4 ha"><div class="t m0 x0 hb y2c ff5 fs4 fc0 sc0 ls0 ws0">&#169; 2020 Pearson Education, Hoboken, NJ. All rights reserved.</div></div></div><div class="pi" data-data='{"ctm":[1.568627,0.000000,0.000000,1.568627,0.000000,0.000000]}'></div></div><div id="pf3" class="pf w0 h0" data-page-no="3"><div class="pc pc3 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="/image.php?url=https://csdnimg.cn/release/download_crawler_static/87768255/bg3.jpg"><div class="c x2 y3 w3 h4"><div class="t m0 x3 hc y2d ff6 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x3 hc y2e ff6 fs2 fc0 sc0 ls0 ws0"> </div></div><div class="t m0 x5 h6 y2f ff3 fs2 fc0 sc0 ls0 ws0">packet <span class="_ _5"></span><span class="ls5">to</span> <span class="_ _3"></span>the <span class="_ _5"> </span>receiving <span class="_ _5"></span>host <span class="_ _5"></span><span class="ls5">at</span> <span class="_ _3"></span><span class="ls5">time</span> <span class="_ _5"> </span><span class="ff4">t</span></div><div class="t m0 x10 h8 y30 ff4 fs3 fc0 sc0 ls0 ws0">1</div><div class="t m0 x11 h6 y2f ff3 fs2 fc0 sc0 ls0 ws0">. <span class="_ _5"></span><span class="ls6">At</span> <span class="_ _3"></span><span class="ls5">time</span> <span class="_ _5"> </span><span class="ff4">t</span></div><div class="t m0 x12 h8 y30 ff4 fs3 fc0 sc0 ls0 ws0">2</div><div class="t m0 x13 h9 y2f ff4 fs2 fc0 sc0 ls0 ws0"> <span class="_ _5"></span>= <span class="_ _3"></span>t</div><div class="t m0 x14 h8 y30 ff4 fs3 fc0 sc0 ls0 ws0">1</div><div class="t m0 x15 h9 y2f ff4 fs2 fc0 sc0 ls0 ws0"> <span class="_ _5"></span>+ <span class="_ _3"></span><span class="ls6">L/R</span></div><div class="t m0 x16 h8 y30 ff4 fs3 fc0 sc0 ls0 ws0">2</div><div class="t m0 x17 h6 y2f ff3 fs2 fc0 sc0 ls0 ws0">, <span class="_ _5"></span>the <span class="_ _3"></span>router <span class="_ _5"> </span>completes </div><div class="t m0 x5 h6 y31 ff3 fs2 fc0 sc0 ls0 ws0">transmission <span class="_ _f"> </span>and <span class="_ _f"> </span>the <span class="_ _f"> </span>entire <span class="_ _f"> </span>packet <span class="_ _f"> </span><span class="ls5">is</span> <span class="_ _f"> </span>received <span class="_ _f"> </span><span class="ls5">at</span> <span class="_ _f"> </span>the <span class="_ _f"> </span>receiving <span class="_ _f"> </span>host <span class="_ _f"> </span>(again, <span class="_ _f"> </span>no </div><div class="t m0 x5 h6 y32 ff3 fs2 fc0 sc0 ls0 ws0">propagation delay). Thus, the end-<span class="ls5">to</span>-end delay <span class="ls5">is</span> <span class="ff4 ls6">L/R</span></div><div class="t m0 x18 h8 y33 ff4 fs3 fc0 sc0 ls0 ws0">1</div><div class="t m0 x19 h9 y32 ff4 fs2 fc0 sc0 ls0 ws0"> + <span class="ls6">L/R</span></div><div class="t m0 xb h8 y33 ff4 fs3 fc0 sc0 ls0 ws0">2</div><div class="t m0 x1a h6 y32 ff3 fs2 fc0 sc0 ls0 ws0">. </div><div class="t m0 x4 h6 y34 ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 h6 y35 ff3 fs2 fc0 sc0 ls0 ws0">12. <span class="_ _3"></span>A <span class="_ _1"></span>circuit-switched <span class="_ _3"></span>network <span class="_ _3"></span><span class="ls5">can</span> <span class="_ _3"></span>guarantee <span class="_ _1"></span>a <span class="_ _3"></span>certain <span class="_ _3"></span>amount <span class="_ _1"></span>of <span class="_ _3"></span>end-<span class="ls5">to</span>-end <span class="_ _3"></span>bandwidth </div><div class="t m0 x5 h6 y36 ff3 fs2 fc0 sc0 ls0 ws0">for <span class="_ _6"></span>the <span class="_ _0"></span>duration <span class="_ _6"></span>of <span class="_ _0"></span>a <span class="_ _6"></span><span class="ls5">call.<span class="ls0"> <span class="_ _0"></span>Most <span class="_ _6"></span>packet-switched <span class="_ _0"></span>networks <span class="_ _6"></span>today <span class="_ _0"></span>(including <span class="_ _6"></span>the <span class="_ _0"></span>Internet) </span></span></div><div class="t m0 x5 h6 y37 ff3 fs2 fc0 sc0 ls0 ws0">cannot <span class="_ _5"> </span>make <span class="_ _5"> </span>any <span class="_ _5"> </span>end-<span class="ls5">to</span>-end <span class="_ _5"> </span>guarantees <span class="_ _5"> </span>for <span class="_ _5"> </span>bandwidth. <span class="_ _a"> </span><span class="ls6">FDM</span> <span class="_ _5"></span>requires <span class="_ _5"></span>sophisticated </div><div class="t m0 x5 h6 y38 ff3 fs2 fc0 sc0 ls0 ws0">analog hardware <span class="ls5">to</span> shift signal into appropriate frequency bands<span class="fc3">.</span> </div><div class="t m0 x4 h6 y39 ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 hd y3a ff3 fs2 fc0 sc0 ls0 ws0">13. <span class="ls5">a)</span> 2 users <span class="ls5">can</span> be supported because <span class="ls5">each</span> user requires half of the link bandwidth.<span class="ff7 fs5"> </span></div><div class="t m0 x4 h6 y3b ff3 fs2 fc0 sc0 ls0 ws0"> b)<span class="ls8"> </span>Since <span class="_ _1"></span><span class="ls5">each</span> <span class="_ _1"></span>user <span class="_ _3"></span>requires <span class="_ _1"></span>1Mbps <span class="_ _1"></span>when <span class="_ _1"></span>transmitting, <span class="_ _1"></span><span class="ls5">if</span> <span class="_ _3"></span><span class="ls5">two</span> <span class="_ _1"></span>or <span class="_ _1"></span>fewer <span class="_ _1"></span>users <span class="_ _1"></span>transmit </div><div class="t m0 x4 h6 y3c ff3 fs2 fc0 sc0 ls0 ws0"> <span class="_ _10"> </span>simultaneously, <span class="_ _c"> </span>a <span class="_ _f"> </span>maximum <span class="_ _c"> </span>of <span class="_ _f"> </span>2Mbps <span class="_ _c"> </span><span class="ls6">will</span> <span class="_ _f"> </span>be <span class="_ _c"> </span>required. <span class="_ _f"> </span>Since <span class="_ _c"> </span>the <span class="_ _f"> </span>available </div><div class="t m0 x4 h6 y3d ff3 fs2 fc0 sc0 ls0 ws0"> <span class="_ _10"> </span>bandwidth <span class="_ _1"></span>of <span class="_ _3"></span>the <span class="_ _1"></span>shared <span class="_ _1"></span>link <span class="_ _1"></span><span class="ls5">is</span> <span class="_ _3"></span>2Mbps, <span class="_ _1"></span>there <span class="_ _1"></span><span class="ls6">will</span> <span class="_ _3"></span>be <span class="_ _1"></span>no <span class="_ _1"></span>queuing <span class="_ _3"></span>delay <span class="_ _1"></span>before <span class="_ _1"></span>the </div><div class="t m0 x4 h6 y3e ff3 fs2 fc0 sc0 ls0 ws0"> <span class="_ _10"> </span>link. <span class="_"> </span>Whereas, <span class="_"> </span><span class="ls5">if</span> <span class="_ _4"> </span>three <span class="_"> </span>users <span class="_"> </span>transmit <span class="_"> </span>simultaneously, <span class="_ _4"> </span>the <span class="_"> </span>bandwidth <span class="_"> </span>required </div><div class="t m0 x4 h6 y3f ff3 fs2 fc0 sc0 ls0 ws0"> <span class="_ _10"> </span><span class="ls6">will</span> <span class="_ _3"></span>be <span class="_ _3"></span>3Mbps <span class="_ _1"></span>which <span class="_ _3"></span><span class="ls5">is</span> <span class="_ _3"></span>more <span class="_ _3"></span>than <span class="_ _1"></span>the <span class="_ _3"></span>available <span class="_ _3"></span>bandwidth <span class="_ _3"></span>of <span class="_ _3"></span>the <span class="_ _1"></span>shared <span class="_ _3"></span>link. <span class="_ _3"></span>In </div><div class="t m0 x4 hd y40 ff3 fs2 fc0 sc0 ls0 ws0"> <span class="_ _10"> </span>this <span class="ls5">case,</span> there <span class="ls6">will</span> be queuing delay before the link.<span class="ff7 fs5"> </span></div><div class="t m0 x4 h6 y41 ff3 fs2 fc0 sc0 ls0 ws0"> <span class="ls5">c)</span> Probability that a given user <span class="ls5">is</span> transmitting = 0.2 </div><div class="t m0 x4 h6 y42 ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 h6 y43 ff3 fs2 fc0 sc0 ls0 ws0"> d) Probability that <span class="ls5">all</span> three users are transmitting simultaneously = <span class="_ _11"> </span> </div><div class="t m0 x4 h6 y44 ff4 fs2 fc0 sc0 ls0 ws0"> <span class="_ _10"> </span><span class="ff3">=</span> <span class="_ _5"></span><span class="ff3">(0.2)</span></div><div class="t m0 x1b h7 y45 ff3 fs3 fc0 sc0 ls0 ws0">3 </div><div class="t m0 x1c h6 y44 ff3 fs2 fc0 sc0 ls0 ws0">= <span class="_ _5"></span>0.008<span class="ff4">. <span class="_ _3"></span></span>Since <span class="_ _5"> </span>the <span class="_ _5"></span>queue <span class="_ _3"></span>grows <span class="_ _5"> </span>when <span class="_ _5"></span><span class="ls5">all</span> <span class="_ _3"></span>the <span class="_ _5"> </span>users <span class="_ _5"></span>are <span class="_ _3"></span>transmitting, <span class="_ _5"> </span>the </div><div class="t m0 x4 h6 y46 ff3 fs2 fc0 sc0 ls0 ws0"> <span class="_ _10"> </span>fraction <span class="_ _3"></span>of <span class="_ _3"></span><span class="ls5">time</span> <span class="_ _1"></span>during <span class="_ _3"></span>which <span class="_ _3"></span>the <span class="_ _3"></span>queue <span class="_ _3"></span>grows <span class="_ _1"></span>(which <span class="_ _3"></span><span class="ls5">is</span> <span class="_ _3"></span>equal <span class="_ _3"></span><span class="ls5">to</span> <span class="_ _3"></span>the <span class="_ _1"></span>probability </div><div class="t m0 x4 h6 y47 ff3 fs2 fc0 sc0 ls0 ws0">that <span class="ls5">all</span> three users are transmitting simultaneously) <span class="ls5">is</span> 0.008. </div><div class="t m0 x4 h6 y48 ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 h6 y49 ff3 fs2 fc0 sc0 ls0 ws0">14. <span class="_ _1"></span>If <span class="_ _1"></span>the <span class="ls5">two</span> <span class="_ _1"></span>ISPs <span class="_ _1"></span>do <span class="_ _1"></span>not <span class="_ _1"></span>peer <span class="_ _1"></span><span class="ls6">with</span> <span class="ls5">each</span> <span class="_ _1"></span>other, <span class="_ _1"></span>then <span class="_ _1"></span>when <span class="_ _1"></span>they send <span class="_ _1"></span>traffic <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _1"></span><span class="ls5">each</span> <span class="_ _1"></span>other </div><div class="t m0 x5 h6 y4a ff3 fs2 fc0 sc0 ls0 ws0">they have <span class="ls5">to</span> <span class="_ _6"></span>send the traffic through a <span class="_ _6"></span>provider ISP (intermediary), <span class="ls5">to</span> which <span class="_ _6"></span>they have </div><div class="t m0 x5 h6 y4b ff3 fs2 fc0 sc0 ls5 ws0">to<span class="ls0"> <span class="_ _3"></span>pay <span class="_ _3"></span>for <span class="_ _1"></span>carrying <span class="_ _3"></span>the <span class="_ _3"></span>traffic. <span class="_ _3"></span>By <span class="_ _1"></span>peering <span class="_ _3"></span><span class="ls6">with</span> <span class="_ _3"></span></span>each<span class="ls0"> <span class="_ _3"></span>other <span class="_ _1"></span>directly, <span class="_ _3"></span>the <span class="_ _3"></span></span>two<span class="ls0"> <span class="_ _3"></span>ISPs <span class="_ _1"></span></span>can<span class="ls0"> </span></div><div class="t m0 x5 h6 y4c ff3 fs2 fc0 sc0 ls0 ws0">reduce <span class="_ _4"> </span>their <span class="_ _4"> </span>payments <span class="_ _4"> </span><span class="ls5">to</span> <span class="_ _12"> </span>their <span class="_ _12"> </span>provider <span class="_ _4"> </span>ISPs. <span class="_ _4"> </span><span class="ls6">An</span> <span class="_ _4"> </span>Internet <span class="_ _12"> </span>Exchange <span class="_ _4"> </span>Points <span class="_ _4"> </span>(IXP) </div><div class="t m0 x5 h6 y4d ff3 fs2 fc0 sc0 ls0 ws0">(typically <span class="_ _3"></span><span class="ls5">in</span> <span class="_ _5"></span>a <span class="_ _3"></span>standalone <span class="_ _3"></span>building <span class="_ _3"></span><span class="ls6">with</span> <span class="_ _5"></span><span class="ls5">its</span> <span class="_ _3"></span>own <span class="_ _3"></span>switches) <span class="_ _5"></span><span class="ls5">is</span> <span class="_ _3"></span>a<span class="ls9"> </span>meeting <span class="_ _3"></span>point <span class="_ _5"></span>where </div><div class="t m0 x5 h6 y4e ff3 fs2 fc0 sc0 ls5 ws0">mu<span class="ls0">ltiple <span class="_ _3"></span>ISPs <span class="_ _1"></span></span>can<span class="ls0"> <span class="_ _3"></span>connect <span class="_ _3"></span>and/or <span class="_ _1"></span>peer <span class="_ _3"></span>together. <span class="_ _3"></span><span class="ls6">An</span> <span class="_ _1"></span>ISP <span class="_ _3"></span>earns <span class="_ _1"></span></span>its<span class="ls0"> <span class="_ _3"></span>money <span class="_ _3"></span>by <span class="_ _1"></span>charging </span></div><div class="t m0 x5 h6 y4f ff3 fs2 fc0 sc0 ls5 ws0">each<span class="ls0"> <span class="_ _1"></span>of the <span class="_ _1"></span>the <span class="_ _1"></span>ISPs that <span class="_ _1"></span>connect <span class="_ _1"></span></span>to<span class="ls0"> <span class="_ _1"></span>the IXP <span class="_ _1"></span>a <span class="_ _1"></span>relatively <span class="ls6">small</span> <span class="_ _1"></span>fee, <span class="_ _1"></span>which </span>may<span class="ls0"> <span class="_ _1"></span>depend </span></div><div class="t m0 x5 h6 y50 ff3 fs2 fc0 sc0 ls0 ws0">on <span class="_ _13"> </span>the <span class="_ _13"> </span>amount <span class="_ _13"> </span>of <span class="_ _13"> </span>traffic <span class="_ _13"> </span>sent <span class="_ _13"> </span><span class="ls5">to</span> <span class="_ _13"> </span>or <span class="_ _13"> </span>received <span class="_ _13"> </span>from <span class="_ _13"> </span>the <span class="_ _13"> </span>IXP. </div><div class="t m0 x5 h6 y51 ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 h6 y52 ff3 fs2 fc0 sc0 ls0 ws0">15. <span class="_ _1"></span>Google's <span class="_ _1"></span>private <span class="_ _1"></span>network <span class="_ _1"></span>connects <span class="_ _3"></span>together <span class="_ _1"></span><span class="ls5">all</span> <span class="_ _1"></span><span class="ls5">its</span> <span class="_ _1"></span>data <span class="_ _1"></span>centers, <span class="_ _1"></span>big <span class="_ _1"></span>and <span class="_ _1"></span><span class="ls6">small.</span> <span class="_ _1"></span>Traffic </div><div class="t m0 x5 h6 y53 ff3 fs2 fc0 sc0 ls0 ws0">between <span class="_ _3"></span>the <span class="_ _1"></span>Google <span class="_ _3"></span>data <span class="_ _3"></span>centers <span class="_ _3"></span>passes <span class="_ _1"></span>over <span class="_ _3"></span><span class="ls5">its</span> <span class="_ _3"></span>private <span class="_ _1"></span>network <span class="_ _3"></span>rather <span class="_ _3"></span>than <span class="_ _3"></span>over <span class="_ _1"></span>the </div><div class="t m0 x5 h6 y54 ff3 fs2 fc0 sc0 ls0 ws0">public <span class="_ _1"></span>Internet. Many <span class="_ _1"></span>of <span class="_ _1"></span>these <span class="_ _1"></span>data centers <span class="_ _1"></span>are <span class="_ _1"></span>located <span class="_ _1"></span>in, or <span class="_ _1"></span>close <span class="_ _1"></span>to, <span class="_ _1"></span>lower <span class="ls5">tier</span> <span class="_ _1"></span>ISPs. </div><div class="t m0 x5 h6 y55 ff3 fs2 fc0 sc0 ls0 ws0">Therefore, when <span class="_ _6"></span><span class="ls6">Go<span class="ls0">ogle delivers <span class="_ _6"></span>content <span class="ls5">to</span> a <span class="_ _6"></span>user, <span class="ls5">it</span> often <span class="_ _6"></span><span class="ls5">can<span class="ls0"> bypass <span class="_ _6"></span>higher <span class="ls5">tier</span> ISPs. </span></span></span></span></div><div class="t m0 x5 h6 y56 ff3 fs2 fc0 sc0 ls0 ws0">What motivates content providers <span class="ls5">to</span> create these networks? <span class="ls6">Fi</span>rst, the content provider </div><div class="t m0 x5 h6 y57 ff3 fs2 fc0 sc0 ls0 ws0">has <span class="_ _1"></span>more <span class="_ _3"></span>control <span class="_ _1"></span>over <span class="_ _3"></span>the <span class="_ _1"></span>user <span class="_ _3"></span>experience, <span class="_ _1"></span>since <span class="_ _3"></span><span class="ls5">it</span> <span class="_ _1"></span>has <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _3"></span>use <span class="_ _1"></span>few <span class="_ _3"></span>intermediary <span class="_ _1"></span>ISPs. </div><div class="t m0 x5 h6 y58 ff3 fs2 fc0 sc0 ls0 ws0">Second, <span class="_ _6"></span><span class="ls5">it<span class="ls0"> <span class="_ _0"></span>c<span class="ls5">an</span> <span class="_ _6"></span>save money <span class="_ _6"></span>by <span class="_ _6"></span>sending <span class="_ _6"></span><span class="ls5">less<span class="ls0"> traffic <span class="_ _6"></span>into <span class="_ _6"></span>provider <span class="_ _6"></span>networks. Third, <span class="_ _6"></span><span class="ls5">if<span class="ls0"> <span class="_ _6"></span>ISPs </span></span></span></span></span></span></div><div class="t m0 x5 h6 y59 ff3 fs2 fc0 sc0 ls0 ws0">decide <span class="_ _d"></span><span class="ls5">to<span class="ls0"> <span class="_ _6"></span>charge <span class="_ _6"></span>more <span class="_ _d"></span>money <span class="_ _6"></span><span class="ls5">to<span class="ls0"> <span class="_ _6"></span>highly <span class="_ _d"></span>profitable <span class="_ _6"></span>content <span class="_ _d"></span>providers<span class="lsa"> </span>(in <span class="_ _6"></span>countries <span class="_ _6"></span>where </span></span></span></span></div><div class="t m0 x5 h6 y5a ff3 fs2 fc0 sc0 ls0 ws0">net neutrality doesn't apply), the content providers <span class="ls5">can</span> avoid these extra payments. </div><div class="t m0 x4 h6 y5b ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 h6 y5c ff3 fs2 fc0 sc0 ls0 ws0">16. The delay components are <span class="_ _6"></span>processing delays, transmission delays, propagation delays, </div><div class="t m0 x5 h6 y5d ff3 fs2 fc0 sc0 ls0 ws0">and queuing <span class="_ _6"></span>delays. <span class="ls6">All</span> of these <span class="_ _6"></span>delays are fixed, <span class="_ _6"></span>except for the <span class="_ _0"></span>queuing delays, <span class="_ _6"></span>which </div><div class="t m0 x5 h6 y5e ff3 fs2 fc0 sc0 ls0 ws0">are variable. </div><div class="t m0 x4 h6 y5f ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="c x1 y2b w4 ha"><div class="t m0 x0 hb y2c ff5 fs4 fc0 sc0 ls0 ws0">&#169; 2020 Pearson Education, Hoboken, NJ. All rights reserved.</div></div></div><div class="pi" data-data='{"ctm":[1.568627,0.000000,0.000000,1.568627,0.000000,0.000000]}'></div></div><div id="pf4" class="pf w0 h0" data-page-no="4"><div class="pc pc4 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="/image.php?url=https://csdnimg.cn/release/download_crawler_static/87768255/bg4.jpg"><div class="t m0 x4 h6 y2f ff3 fs2 fc0 sc0 ls0 ws0">17.<span class="_"> </span><span class="ls5">a)</span> 1000 km, 1 Mbps, 100 bytes</div><div class="t m0 x5 h6 y31 ff3 fs2 fc0 sc0 ls0 ws0">b)<span class="_"> </span>100 km, 1 Mbps, 100 bytes</div><div class="t m0 x4 h6 y34 ff3 fs2 fc0 sc0 ls0 ws0">18.<span class="_"> </span>10msec; d/s; no; no</div><div class="t m0 x4 h6 y36 ff3 fs2 fc0 sc0 ls0 ws0">19.<span class="_"> </span><span class="ls5">a)</span> 500 kbps</div><div class="t m0 x5 h6 y37 ff3 fs2 fc0 sc0 ls0 ws0">b)<span class="_"> </span>64 seconds</div><div class="t m0 x5 h6 y38 ff3 fs2 fc0 sc0 ls5 ws0">c)<span class="_"> </span><span class="ls0">100kbps; 320 seconds</span></div><div class="t m0 x4 h6 y3a ff3 fs2 fc0 sc0 ls0 ws0">20.<span class="_ _c"> </span>End <span class="_ _1"></span>system A <span class="_ _1"></span>breaks <span class="_ _1"></span>the <span class="_ _1"></span>large file <span class="_ _1"></span>into <span class="_ _1"></span>chunks. It <span class="_ _1"></span>adds <span class="_ _1"></span>header <span class="ls5">to</span> <span class="_ _1"></span><span class="ls5">each</span> <span class="_ _1"></span>chunk, <span class="_ _1"></span>thereby</div><div class="t m0 x5 h6 y3b ff3 fs2 fc0 sc0 ls0 ws0">generating <span class="_ _3"></span>multiple <span class="_ _3"></span>packets <span class="_ _3"></span>from <span class="_ _3"></span>the <span class="_ _3"></span>file. <span class="_ _3"></span>The <span class="_ _3"></span>header <span class="_ _5"></span><span class="ls5">in</span> <span class="_ _3"></span><span class="ls5">each</span> <span class="_ _3"></span>packet <span class="_ _3"></span>includes <span class="_ _3"></span>the <span class="_ _3"></span>IP</div><div class="t m0 x5 h6 y3c ff3 fs2 fc0 sc0 ls0 ws0">address <span class="_ _3"></span>of <span class="_ _3"></span>the <span class="_ _3"></span>destination <span class="_ _3"></span>(end <span class="_ _3"></span>system <span class="_ _3"></span>B). <span class="_ _3"></span>The <span class="_ _3"></span>packet <span class="_ _3"></span><span class="ls6">switch</span> <span class="_ _3"></span>uses <span class="_ _1"></span>the <span class="_ _3"></span>destination <span class="_ _3"></span>IP</div><div class="t m0 x5 h6 y3d ff3 fs2 fc0 sc0 ls0 ws0">address <span class="_ _5"> </span><span class="ls5">in</span> <span class="_ _5"> </span>the <span class="_ _a"> </span>packet <span class="_ _5"> </span><span class="ls5">to</span> <span class="_ _5"> </span>determine <span class="_ _5"> </span>the <span class="_ _a"> </span>outgoing <span class="_ _5"></span>link. <span class="_ _5"> </span>Asking <span class="_ _5"> </span>which <span class="_ _5"> </span>road <span class="_ _a"> </span><span class="ls5">to</span> <span class="_ _5"> </span>take <span class="_ _5"> </span><span class="ls5">is</span></div><div class="t m0 x5 h6 y3e ff3 fs2 fc0 sc0 ls0 ws0">analogous <span class="ls5">to</span> a packet asking which outgoing link <span class="ls5">it</span> should be forwarded <span class="_ _0"></span>on, given the</div><div class="t m0 x5 h6 y3f ff3 fs2 fc0 sc0 ls0 ws0">packet&#8217;s destination address.</div><div class="t m0 x4 h6 y41 ff3 fs2 fc0 sc0 ls0 ws0">21.<span class="_"> </span>The maximum emission rate <span class="ls5">is</span> 500 packets/sec and the maximum transmission rate <span class="ls5">is</span></div><div class="t m0 x1d hd y42 ff3 fs2 fc0 sc0 ls0 ws0">350 <span class="_ _3"></span>packets/sec. <span class="_ _1"></span>The <span class="_ _3"></span>corresponding <span class="_ _1"></span>traffic <span class="_ _3"></span>intensity <span class="_ _1"></span><span class="ls5">is</span> <span class="_ _3"></span>500/350 <span class="_ _1"></span>=1.43 <span class="_ _3"></span>&gt; <span class="_ _1"></span>1.<span class="ff7 fs5"> <span class="_ _3"></span></span>Loss <span class="_ _3"></span><span class="ls6">will</span></div><div class="t m0 x1d hd y60 ff3 fs2 fc0 sc0 ls0 ws0">eventually <span class="_ _a"> </span>occur <span class="_ _a"> </span>for <span class="_ _a"> </span><span class="ls5">each</span> <span class="_ _a"> </span><span class="ls5">ex</span>periment;<span class="ff7 fs5"> <span class="_ _12"> </span></span>but <span class="_ _a"> </span>the <span class="_ _a"> </span><span class="ls5">time</span> <span class="_ _a"> </span>when <span class="_ _a"> </span>loss <span class="_ _a"> </span>first <span class="_ _a"> </span>occurs <span class="_ _a"> </span><span class="ls6">will</span> <span class="_ _a"> </span>be</div><div class="t m0 x1d h6 y61 ff3 fs2 fc0 sc0 ls0 ws0">different <span class="_ _a"> </span>from <span class="_ _a"> </span>one <span class="_ _12"> </span>experiment <span class="_ _a"> </span><span class="ls5">to</span> <span class="_ _a"> </span>the <span class="_ _12"> </span>next <span class="_ _a"> </span>due <span class="_ _a"> </span><span class="ls5">to</span> <span class="_ _12"> </span>the <span class="_ _a"> </span>randomness <span class="_ _a"> </span><span class="ls5">in</span> <span class="_ _a"> </span>the <span class="_ _12"> </span>emission</div><div class="t m0 x1d h6 y62 ff3 fs2 fc0 sc0 ls0 ws0">process.</div><div class="t m0 x4 h6 y63 ff3 fs2 fc0 sc0 ls0 ws0">22.<span class="_ _7"> </span>Five <span class="_ _4"> </span>generic <span class="_"> </span>tasks <span class="_"> </span>are <span class="_ _4"> </span>error <span class="_"> </span>control, <span class="_ _4"> </span>flow <span class="_"> </span>control, <span class="_"> </span>segmentation <span class="_ _4"> </span>and <span class="_"> </span>reassembly,</div><div class="t m0 x5 h6 y64 ff3 fs2 fc0 sc0 ls0 ws0">multiplexing, <span class="_ _a"> </span>and <span class="_ _a"> </span>connection <span class="_ _5"> </span>setup. <span class="_ _a"> </span><span class="ls6">Yes,</span> <span class="_ _a"> </span>these <span class="_ _a"> </span>tasks <span class="_ _a"> </span><span class="ls5">can</span> <span class="_ _a"> </span>be <span class="_ _a"> </span>duplicated <span class="_ _5"> </span><span class="ls5">at</span> <span class="_ _a"> </span>different</div><div class="t m0 x5 h6 y65 ff3 fs2 fc0 sc0 ls0 ws0">layers. For example, error control <span class="ls5">is</span> often provided <span class="ls5">at</span> more than one layer.</div><div class="t m0 x4 h6 y66 ff3 fs2 fc0 sc0 ls0 ws0">23.<span class="_"> </span>The <span class="_ _6"></span>five layers <span class="ls5">in</span> the <span class="_ _6"></span>Internet protocol <span class="ls6">stack</span> <span class="_ _6"></span>are &#8211; from top <span class="_ _6"></span><span class="ls5">to<span class="ls0"> bottom &#8211; <span class="_ _0"></span>the application</span></span></div><div class="t m0 x5 h6 y67 ff3 fs2 fc0 sc0 ls0 ws0">layer, the <span class="_ _1"></span>transport layer, the network <span class="_ _1"></span>layer, the link layer, <span class="_ _1"></span>and the physical <span class="_ _1"></span>layer. The</div><div class="t m0 x5 h6 y68 ff3 fs2 fc0 sc0 ls0 ws0">principal responsibilities are outlined <span class="ls5">in</span> Section 1.5.1.</div><div class="t m0 x4 h6 y69 ff3 fs2 fc0 sc0 ls0 ws0">24.<span class="_ _f"> </span>Application-<span class="ls5">layer</span> <span class="_ _1"></span>message: <span class="_ _3"></span>data <span class="_ _1"></span>which <span class="_ _3"></span><span class="ls5">an</span> <span class="_ _1"></span>application <span class="_ _3"></span>wants <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _3"></span>send <span class="_ _1"></span>and <span class="_ _3"></span>passed <span class="_ _1"></span>onto</div><div class="t m0 x5 h6 y6a ff3 fs2 fc0 sc0 ls0 ws0">the <span class="_"> </span>transport <span class="_ _4"> </span>layer; <span class="_"> </span>transport-layer <span class="_ _4"> </span>segment: <span class="_"> </span>generated <span class="_ _4"> </span>by <span class="_"> </span>the <span class="_"> </span>transport <span class="_ _4"> </span>layer <span class="_"> </span>and</div><div class="t m0 x5 h6 y6b ff3 fs2 fc0 sc0 ls0 ws0">encapsulates <span class="_"> </span>application-layer <span class="_ _4"> </span>message <span class="_"> </span><span class="ls6">with</span> <span class="_ _4"> </span>transport <span class="_"> </span>layer <span class="_"> </span>header; <span class="_ _4"> </span>network-layer</div><div class="t m0 x5 h6 y6c ff3 fs2 fc0 sc0 ls0 ws0">datagram: <span class="_ _6"></span>encapsulates <span class="_ _d"></span>transport-layer <span class="_ _6"></span>segment <span class="_ _6"></span><span class="ls6">with<span class="ls0"> <span class="_ _d"></span>a <span class="_ _6"></span>network-layer <span class="_ _6"></span>header; <span class="_ _d"></span>link-layer</span></span></div><div class="t m0 x5 h6 y6d ff3 fs2 fc0 sc0 ls0 ws0">frame: encapsulates network-layer datagram <span class="ls6">with</span> a link-layer header.</div><div class="t m0 x4 h6 y6e ff3 fs2 fc0 sc0 ls0 ws0">25.<span class="_"> </span>Routers <span class="_ _1"></span>process network, link and <span class="_ _1"></span>physical layers (layers <span class="_ _1"></span>1 through 3). <span class="_ _1"></span>(This <span class="ls5">is</span> a <span class="ls5">little</span></div><div class="t m0 x5 h6 y6f ff3 fs2 fc0 sc0 ls0 ws0">bit of <span class="_ _6"></span>a white <span class="_ _6"></span><span class="ls5">lie,<span class="ls0"> </span>as<span class="ls0"> <span class="_ _0"></span>modern routers <span class="_ _6"></span>sometimes <span class="ls5">act</span> <span class="_ _6"></span><span class="ls5">as<span class="ls0"> firewalls <span class="_ _6"></span>or caching components,</span></span></span></span></div><div class="t m0 x5 h6 y70 ff3 fs2 fc0 sc0 ls0 ws0">and <span class="_ _5"></span>process <span class="_ _5"></span>Transport <span class="_ _14"></span>layer <span class="_ _14"></span><span class="ls5">as</span> <span class="_ _5"> </span>well.) <span class="_ _5"> </span>Link <span class="_ _14"></span>layer <span class="_ _5"> </span><span class="ls6">swit</span>ches <span class="_ _14"> </span>process <span class="_ _5"> </span>link <span class="_ _5"> </span>and <span class="_ _14"> </span>physical</div><div class="t m0 x5 h6 y71 ff3 fs2 fc0 sc0 ls0 ws0">layers (layers 1 through2). Hosts process <span class="ls5">all</span> five layers.</div><div class="t m0 x1e h6 y72 ff3 fs2 fc0 sc0 ls0 ws0">26.<span class="_"> </span>A <span class="ls6">self</span>-replicating malware <span class="ls5">is</span> a piece of code that <span class="ls5">cab</span> enter and infect our devices,</div><div class="t m0 x1f h6 y73 ff3 fs2 fc0 sc0 ls0 ws0">and once <span class="ls5">it</span> infects the host, from that host <span class="ls5">it</span> seeks entry into other hosts over the Internet. </div><div class="t m0 x4 h6 y74 ff3 fs2 fc0 sc0 ls0 ws0">27.<span class="_ _15"> </span>Creation <span class="_ _1"></span>of <span class="_ _3"></span>a <span class="_ _1"></span>botnet <span class="_ _1"></span>requires <span class="_ _3"></span><span class="ls5">an</span> <span class="_ _1"></span>attacker <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _3"></span>find <span class="_ _1"></span>vulnerability <span class="_ _1"></span><span class="ls5">in</span> <span class="_ _3"></span>some <span class="_ _1"></span>application <span class="_ _1"></span>or</div><div class="t m0 x20 h6 y75 ff3 fs2 fc0 sc0 ls0 ws0">system <span class="_"> </span>(e.g. <span class="_ _c"> </span>exploiting <span class="_ _c"> </span>the <span class="_"> </span>buffer <span class="_ _c"> </span>overflow <span class="_ _c"> </span>vulnerability <span class="_"> </span>that <span class="_ _c"> </span>might <span class="_"> </span>exist <span class="_ _c"> </span><span class="ls5">in</span> <span class="_ _c"> </span><span class="ls5">an</span></div><div class="t m0 x20 h6 y76 ff3 fs2 fc0 sc0 ls0 ws0">application). <span class="_ _1"></span>After <span class="_ _1"></span>finding <span class="_ _3"></span>the <span class="_ _1"></span>vulnerability, <span class="_ _1"></span>the <span class="_ _1"></span>attacker <span class="_ _3"></span>needs <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _1"></span><span class="ls6">scan</span> <span class="_ _1"></span>for <span class="_ _3"></span>hosts <span class="_ _1"></span>that</div><div class="t m0 x20 h6 y77 ff3 fs2 fc0 sc0 ls0 ws0">are <span class="_ _6"></span>vulnerable. The <span class="_ _6"></span>target <span class="_ _0"></span><span class="ls5">is<span class="ls0"> <span class="_ _6"></span>basically <span class="ls5">to</span> <span class="_ _6"></span>compromise <span class="_ _0"></span>a <span class="_ _6"></span>series of <span class="_ _6"></span>systems <span class="_ _0"></span>by <span class="_ _6"></span>exploiting</span></span></div><div class="c x1 y2b w4 ha"><div class="t m0 x0 hb y2c ff5 fs4 fc0 sc0 ls0 ws0">&#169; 2020 Pearson Education, Hoboken, NJ. All rights reserved.</div></div></div><div class="pi" data-data='{"ctm":[1.568627,0.000000,0.000000,1.568627,0.000000,0.000000]}'></div></div><div id="pf5" class="pf w0 h0" data-page-no="5"><div class="pc pc5 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="/image.php?url=https://csdnimg.cn/release/download_crawler_static/87768255/bg5.jpg"><div class="c x2 y3 w3 h4"><div class="t m0 x3 hc y2d ff6 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x3 hc y2e ff6 fs2 fc0 sc0 ls0 ws0"> </div></div><div class="t m0 x20 h6 y2f ff3 fs2 fc0 sc0 ls0 ws0">that <span class="_ _1"></span>particular <span class="_ _1"></span>vulnerability.<span class="lsb"> </span>Any <span class="_ _1"></span>system <span class="_ _3"></span>that <span class="_ _1"></span><span class="ls5">is</span> <span class="_ _1"></span>part <span class="_ _1"></span>of <span class="_ _1"></span>the <span class="_ _1"></span>botnet <span class="_ _3"></span><span class="ls5">can</span> <span class="_ _1"></span>automatically </div><div class="t m0 x20 h6 y31 ff3 fs2 fc0 sc0 ls6 ws0">scan<span class="ls0"> <span class="_ _a"> </span><span class="ls5">its</span> <span class="_ _12"> </span>environment <span class="_ _a"> </span>and <span class="_ _12"> </span>propagate <span class="_ _a"> </span>by <span class="_ _a"> </span>exploiting <span class="_ _12"> </span>the <span class="_ _a"> </span>vulnerability. <span class="_ _12"> </span></span>An<span class="ls0"> <span class="_ _a"> </span>important </span></div><div class="t m0 x20 h6 y32 ff3 fs2 fc0 sc0 ls0 ws0">property <span class="_ _1"></span>of <span class="_ _1"></span>such <span class="_ _1"></span>botnets <span class="_ _1"></span><span class="ls5">is</span> <span class="_ _1"></span>that <span class="_ _1"></span>the <span class="_ _3"></span>originator <span class="_ _1"></span>of <span class="_ _1"></span>the <span class="_ _1"></span>botnet <span class="_ _1"></span><span class="ls5">can</span> <span class="_ _1"></span>remotely <span class="_ _1"></span>control <span class="_ _1"></span>and </div><div class="t m0 x20 h6 y34 ff3 fs2 fc0 sc0 ls0 ws0">issue <span class="_ _5"> </span>commands <span class="_ _14"> </span><span class="ls5">to</span> <span class="_ _5"> </span><span class="ls5">all</span> <span class="_ _5"> </span>the <span class="_ _5"> </span>nodes <span class="_ _5"> </span><span class="ls5">in</span> <span class="_ _5"> </span>the <span class="_ _5"> </span>botnet. <span class="_ _5"> </span>Hence, <span class="_ _5"> </span><span class="ls5">it</span> <span class="_ _5"> </span>becomes <span class="_ _5"> </span>possible <span class="_ _5"> </span>for <span class="_ _5"> </span>the </div><div class="t m0 x20 h6 y35 ff3 fs2 fc0 sc0 ls0 ws0">attacker <span class="_ _1"></span><span class="ls5">to</span> <span class="_ _3"></span>issue <span class="_ _1"></span>a <span class="_ _1"></span>command <span class="_ _3"></span><span class="ls5">to</span> <span class="_ _1"></span><span class="ls5">all</span> <span class="_ _1"></span>the <span class="_ _3"></span>nodes, <span class="_ _1"></span>that <span class="_ _1"></span>target <span class="_ _3"></span>a <span class="_ _1"></span>single <span class="_ _1"></span>node <span class="_ _3"></span>(for <span class="_ _1"></span>example, </div><div class="t m0 x20 h6 y36 ff3 fs2 fc0 sc0 ls5 ws0">all<span class="ls0"> <span class="_ _5"> </span>nodes <span class="_ _a"> </span></span>in<span class="ls0"> <span class="_ _a"> </span>the <span class="_ _5"> </span>botnet <span class="_ _a"> </span>might <span class="_ _5"> </span>be <span class="_ _a"> </span>commanded <span class="_ _5"> </span>by <span class="_ _a"> </span>the <span class="_ _5"> </span>attacker <span class="_ _a"> </span></span>to<span class="ls0"> <span class="_ _5"> </span>send <span class="_ _a"> </span>a <span class="_ _5"> </span>TCP <span class="_ _a"> </span><span class="ls6">SYN</span> </span></div><div class="t m0 x20 h6 y37 ff3 fs2 fc0 sc0 ls0 ws0">message <span class="ls5">to</span> the target, which might result <span class="ls5">in</span> a TCP <span class="ls6">SYN</span> flood <span class="ls5">attack</span> <span class="ls5">at</span> the target). </div><div class="t m0 x4 h6 y38 ff3 fs2 fc0 sc0 ls0 ws0"> </div><div class="t m0 x4 h6 y39 ff3 fs2 fc0 sc0 ls0 ws0">28. <span class="_ _5"> </span>Trudy <span class="_ _5"> </span><span class="ls5">can</span> <span class="_ _a"> </span>pretend <span class="_ _14"> </span><span class="ls5">to</span> <span class="_ _a"> </span>be <span class="_ _5"> </span>Bob <span class="_ _5"> </span><span class="ls5">to</span> <span class="_ _a"> </span><span class="ls6">Alice</span> <span class="_ _14"></span>(and <span class="_ _a"> </span>vice-versa) <span class="_ _14"></span>and <span class="_ _a"> </span>part<span class="ls5">ially</span> <span class="_ _14"> </span>or <span class="_ _a"> </span>completely </div><div class="t m0 x5 h6 y3a ff3 fs2 fc0 sc0 ls0 ws0">modify <span class="_ _a"> </span>the <span class="_ _a"> </span>message(s) <span class="_ _a"> </span>being <span class="_ _5"> </span>sent <span class="_ _a"> </span>from <span class="_ _a"> </span>Bob <span class="_ _a"> </span><span class="ls5">to</span> <span class="_ _a"> </span><span class="ls6">Alice.</span> <span class="_ _a"> </span>For <span class="_ _a"> </span>example, <span class="_ _5"> </span>she <span class="_ _a"> </span><span class="ls5">can</span> <span class="_ _a"> </span><span class="ls5">easily</span> </div><div class="t m0 x5 h6 y3b ff3 fs2 fc0 sc0 ls0 ws0">change <span class="_ _f"> </span>the <span class="_ _f"> </span>phrase <span class="_ _16"> </span><span class="ls5">&#8220;Alice,</span> <span class="_ _f"> </span>I <span class="_ _f"> </span>owe <span class="_ _16"> </span>you <span class="_ _f"> </span>$1000&#8221; <span class="_ _f"> </span><span class="ls5">to</span> <span class="_ _16"> </span><span class="ls5">&#8220;Alice,</span> <span class="_ _f"> </span>I <span class="_ _16"> </span>owe <span class="_ _f"> </span>you <span class="_ _f"> </span>$10,000&#8221;. </div><div class="t m0 x5 h6 y3c ff3 fs2 fc0 sc0 ls0 ws0">Furthermore, Trudy <span class="_ _6"></span><span class="ls5">can<span class="ls0"> even drop <span class="_ _6"></span>the packets that <span class="_ _0"></span>are being <span class="_ _6"></span>sent by Bob <span class="_ _6"></span><span class="ls5">to<span class="ls0"> <span class="ls6">Alice</span> (and </span></span></span></span></div><div class="t m0 x5 h6 y3d ff3 fs2 fc0 sc0 ls0 ws0">vise-versa), even <span class="ls5">if</span> the packets from Bob <span class="ls5">to</span> <span class="ls6">Alice</span> are encrypted. </div><div class="c x1 y2b w4 ha"><div class="t m0 x0 hb y2c ff5 fs4 fc0 sc0 ls0 ws0">&#169; 2020 Pearson Education, Hoboken, NJ. All rights reserved.</div></div></div><div class="pi" data-data='{"ctm":[1.568627,0.000000,0.000000,1.568627,0.000000,0.000000]}'></div></div>
100+评论
captcha
    类型标题大小时间
    ZIPDSM群晖系统小白上手指南.zip15.05MB2年前
    ZIPvue-devtools-5.1.1.zip913.9KB5年前
    ZIP微信小程序实现婚礼代码,免费!5.69MB1年前
    ZIPROS安装文件rosdistro-master.zip620.23KB4年前
    ZIP基于51单片机的智能电子秤系统设计(含代码仿真及论文)18.73MB1年前
    ZIPGigaDevice_MCU_ISP_Programmer_V3.0.2.5782.zip1.25MB3年前
    ZIPwordpress主题 仿Hao123 网址导航主题58.09KB12年前
    ZIPQt 图片交互-鼠标滚轮放缩、拖拽、选点7.55KB3年前