You are on page 1of 4

1. what is a portal site?

A portal site refers to an application system that leads to a certain type of comprehensive Internet
information resources and provides relevant information services.

2. please briefly describe the main features of UDP?

(1) UDP is connectionless, that is, there is no need to establish a connection before sending data,
and no confirmation is required after the data arrives.

(2) UDP uses best-effort delivery, that is, reliable delivery is not guaranteed.

(3) UDP is message-oriented and has no congestion control.

(4) UDP supports one-to-one, one-to-many, many-to-one and many-to-many interactive


communication.

(5) UDP header overhead is small, only 8 bytes.

3. what are the topologies of the commonly used local area networks?

Commonly used LAN network topologies include star network, ring network and bus network.

4. Please explain what is a protocol?

The rules, standards or conventions established by both communicating parties for data exchange in
the network are called network protocols. A network protocol may also be referred to simply as a
protocol. Furthermore, the network protocol is mainly composed of the following three elements:

(1) Syntax, that is, the structure or format of data and control information;

(2) Semantics, that is, what kind of control information needs to be sent, what actions are
performed, and what actions are performed.

(3) Synchronization, that is, a detailed description of the order of event implementation.

5. What does network management mean?

Network management includes the use, synthesis, and coordination of hardware, software, and
human resources to monitor, test, configure, analyze, evaluate, and control network resources so
that network requirements, such as real-time operational performance, can be met at reasonable
prices , quality of service, etc. Network management is often referred to as network management.
The management station is usually a high-performance workstation with a good graphical interface,
the key component is the management program, and the management program becomes the
management process when it is running. There are many managed devices (including software in the
device) in the managed network, and each managed device may have many managed objects, and
the objects are stored in the management information base, and the managed devices can
sometimes be called network elements Or simply called a network element. A program runs in each
managed device in order to communicate with the management program in the management
station, the network management agent program, or simply an agent. The agent program takes local
actions on the managed device under the command and control of the management program. The
communication protocol is the network management protocol, referred to as the network
management protocol for short.

6. Please complete the places marked A, B, C, and D in the figure below.

A: Version

B: Identification

C: Protocol

D: Destination IP address

7. Please explain what is network architecture?

The collection of layers and protocols of a computer network is the architecture of the network. In
other words, the architecture of a computer network is a precise definition of the functions that the
computer network and its components should perform. It should be emphasized that: what kind of
hardware or software is used to complete these functions is a question of implementation that
follows this architecture. The architecture is abstract, while the implementation is concrete, the
actual running computer hardware and software.

8. Please explain what is CSMA/CD?

CSMA/CD means carrier sense multi-point access/collision detection. "Multi-point access" means
that this is a bus-type network. Many computers are connected to a bus in a multi-point access
manner. The essence of the protocol is " Carrier Sense" and "Collision Detection". "Carrier sense" is
to detect the channel, no matter before or during transmission, each station must constantly detect
the channel. Detecting the channel before sending is to obtain the right to send, and detecting the
channel during sending is to find out in time whether there is a collision between the sending of
other stations and the sending of this station. This is called collision detection. "Collision detection"
is also called "monitoring while sending", that is, the adapter detects the change of the signal
voltage on the channel while sending data, so as to determine whether other stations are also
sending data when it is sending data. . A "collision" is a conflict. Therefore "collision detection" is
also called "collision detection". Any station that is sending data, once it finds that there is a collision
on the bus, its adapter should stop sending immediately, so as not to continue to send ineffectively,
wasting network resources, and then wait for a random period of time to send again.
9. Please briefly describe the 5 layers of the 5-layer reference model, and what are the tasks of each
layer?

(1) Application layer, task: provide the interface between the system and the user.

(2) transport layer, task: responsible for the communication between two processes in the host.

(3) Network layer, task: encapsulate or group the message segment passed from the transport layer;
select an appropriate route so that the packet passed from the transport layer can be delivered to
the host.

(4) Data link layer, task: Assemble the IP datagram passed from the network layer into a frame.

(5) Physical layer, task: transparently transmit the bit stream.

10. What are the three elements of a network protocol?

The three elements of a network protocol are syntax, semantics, and synchronization.

11. What is the difference between an agreement and a service? What's the matter?

Agreements are horizontal, services are vertical.

Protocols are "horizontal", i.e. protocols are the rules that govern communication between peer
entities. The service is "vertical", that is, the service is provided by the lower layer to the upper layer
through the interlayer interface.

The relationship between the protocol and the service: under the control of the protocol, the upper
layer calls the lower layer, the lower layer provides services to the upper layer, and the upper and
lower layers exchange information with exchange primitives. Sometimes there is a connection
between two entities at the same level.

12. After sending multiple DNS request packets to the DNS server for the same domain name, do I
get the same IP address every time?

May not be the same. The result is that this domain name corresponds to multiple IP addresses. This
is not necessary for general domain names, but some websites have a very large number of visits.
Doing so can balance the load of the website servers.

13. What is a public key cryptosystem?

The public key cryptosystem (also known as the public key cryptosystem) uses different encryption
keys and decryption keys, each user has a pair of keys, one is the encryption key PK (public key, that
is, the public key), which is sent to the user. The public is open, and the other is the decryption key
SK (secret key, that is, the private key or secret key), which needs to be kept secret. Encryption
algorithm E and decryption algorithm D are also public. When conducting confidential
communication, the sender encrypts with the receiver's public key, and the receiver decrypts with
his own private key. When digitally signing, the sender signs with its own private key, and the
receiver verifies the signature with the sender's public key.

14. What is the maximum number of bytes in the data part of a TCP segment? why?

The entire TCP segment must fit into the 65535-byte payload segment of the IP packet. Because the
TCP header is a minimum of 20 bytes, only 65515 bytes are left for TCP data. The purpose of this is
mainly to avoid IP fragmentation after the TCP segment is transmitted to the IP layer.

15. Try to identify the network class of the following IP addresses:

(1)128.36.199.3

(2) 21.12.240.17

(3) 183.194.76.253

(4) 192.12.69.24

(5) 89.3.0.1

(6) 200.3.6.2

(7) 60.11.191.202

(2) and (5), (7) are class A, (1) and (3) are class B, and (4) and (6) are class C.

You might also like