¼ÆËã»úÍøÂçµÚËİæÏ°Ìâ´ð°¸£¨ÖÐÎİ棩 ÏÂÔØ±¾ÎÄ

µÚ 33 Ò³ ¹² 40 Ò³

IDLE¡ª Connection not established yet.

WAITING¡ª CONNECT has been executed and CALL REQUEST sent. QUEUED¡ª A CALL REQUEST has arrived; no LISTEN yet. ESTABLISHED¡ª The connection has been established.

SENDING¡ª The user is waiting for permission to send a packet. RECEIVING¡ª A RECEIVE has been done.

DISCONNECTING¡ª A DISCONNECT has been done locally.

´ð£º¸Ã´«ÊäʵÌåÓпÉÄÜËÀËø¡£µ±Ë«·½Í¬Ê±Ö´ÐÐRECEIVE ʱ¾Í»á½øÈëËÀËø×´Ì¬¡£

6-10 Out of curiosity, the implementer of the transport entity of Fig. 6-20 has decided to put counters inside the sleep procedure to collect statistics about the conn array. Among these are the number of connections in each of the seven possible states, ni (i = 1, ... ,7). After writing a massive FORTRAN program to analyze the data, our implementer discovers that the relation Sni = MAX_CONN appears to always be true. Are there any other invariants involving only these seven variables? ´ð£ºÓУ¬ n2+n3+n6+n7=1

ÒòΪ״̬listening£¨n2£©¡¢waiting£¨n 3£©¡¢sending£¨n6£©ºÍreceiving£¨n7£©¶¼Òâζ×ÅÓû§±»·âËø£¬Òò´Ëµ±´¦ÔÚÆäÖеÄÒ»¸ö״̬ʱ£¬¾Í²»¿ÉÄÜÊÇÔÚÁíÒ»¸ö״̬¡£

6-11 What happens when the user of the transport entity given in Fig. 6-20 sends a zero-length message? Discuss the significance of your answer. ´ð£º³¤¶ÈΪÁãµÄ±¨Îı»ÁíÒ»±ß½ÓÊÕ¡£ÕâÖÖ±¨Îĵķ¢ËÍ¿ÉÒÔ±»ÓÃÀ´±íʾÎļþ½áÊøµÄÐźš£

µÚ 34 Ò³ ¹² 40 Ò³

6-12 For each event that can potentially occur in the transport entity of Fig. 6-20, tell whether it is legal when the user is sleeping in sending state. ´ð£ºÒòΪÎļþ´¦ÓÚ·âËø×´Ì¬£¬ËùÓеĴ«Êä²ãÔ­Óï¶¼²»¿ÉÄÜÖ´ÐС£Òò´Ë£¬½ö·Ö×éµ½´ïʼþÊÇ¿ÉÄܵ쬶øÇÒ»¹²»ÊÇËùÓеĵ½´ïʼþ¡£ÊÂʵÉÏ£¬½ö½ö¸úºô½ÐÇëÇó¡¢Çå³ýÇëÇó¡¢Êý¾Ý·Ö×éºÍÐÅÓÃÁ¿·Ö×éÕ⼸¸ö·Ö×éµ½´ïÓйصÄʼþÊǺϷ¨µÄ¡£

6-13 Discuss the advantages and disadvantages of credits versus sliding window protocols. ´ð£º»¬¶¯´°¿ÚЭÒé±È½Ï¼òµ¥£¬½öÐèÒª¹ÜÀí´°¿Ú±ßÔµÒ»×é²ÎÊý£¬¶øÇÒ£¬¶ÔÓÚµ½´ï˳ÐòÓдíµÄTPDU ²»»áÒýÆð´°¿ÚÔö¼ÓºÍ¼õÉÙ·½ÃæµÄÎÊÌ⡣Ȼ¶ø£¬ÐÅÓÃÁ¿·½°¸±È½ÏÁé»î£¬ÔÊÐí¶ÀÁ¢ÓÚÈ·ÈÏ£¬¶¯Ì¬µÄ¹ÜÀí»º³åÇø¡£

6-14 Why does UDP exist? Would it not have been enough to just let user processes send raw IP packets? ´ð£º½ö½öʹÓÃIP ·Ö×黹²»¹»¡£IP ·Ö×é°üº¬IP µØÖ·£¬¸ÃµØÖ·Ö¸¶¨Ò»¸öÄ¿µÄµØ»úÆ÷¡£Ò»µ©ÕâÑùµÄ·Ö×éµ½´ïÁËÄ¿µÄµØ»úÆ÷£¬ÍøÂç¿ØÖÆ³ÌÐòÈçºÎÖªµÀ¸Ã°ÑËü½»¸øÄĸö½ø³ÌÄØ£¿UDP ·Ö×é°üº¬Ò»¸öÄ¿µÄµØ¶Ë¿Ú£¬ÕâÒ»ÐÅÏ¢ÊDZØÐëµÄ£¬ÒòΪÓÐÁËËü£¬·Ö×é²ÅÄܹ»±»Í¶µÝ¸øÕýÈ·µÄ½ø³Ì¡£

6-15 Consider a simple application-level protocol built on top of UDP that allows a client to retrieve a file from a remote server residing at a well-known address. The client first sends a request with file name, and the server responds with a sequence of data packets containing different parts of the requested file. To ensure reliability and sequenced delivery, client and server use a stop-and-wait protocol. Ignoring the obvious performance issue, do you see a problem with this protocol? Think carefully about the possibility of processes crashing. ¿Í»§ÓпÉÄܵõ½´íÎóµÄÎļþ¡£¼ÙÉè¿Í»§A·¢ËÍÁËÒ»¸ö¶ÔÓÚÎļþf1µÄÇëÇó£¬È»ºó¾Í±ÀÀ£ÁË¡£ÁíÒ»¸ö¿Í»§B½Ó×ÅʹÓÃÏàͬµÄЭÒéÇëÇóÁíÒ»¸öÎļþf2¡£¼ÙÉè¿Í»§BÔËÐÐÔÚÓëAÏàͬµÄ»úÆ÷ÉÏ£¨¾ßÓÐÏàͬµÄIPµØÖ·£© £¬°ÑËüµÄUDPÌ×½Ó×ÖÁ¬½Óµ½ÓëAÏÈǰÓùýµÄÏàͬµÄ¶Ë¿ÚÉÏ¡£´ËÍ⣬¼ÙÉèBµÄÇëÇó¶ªÊ§ÁË£¬µ±·þÎñÆ÷µÄÓ¦´ð£¨¶ÔAµÄÇëÇ󣩵½´ïʱ£¬¿Í»§B½«½ÓÊÕ²¢²ÂÏë×ÅÊǸøËü×Ô¼ºµÄÓ¦´ð¡£

6-18 Both UDP and TCP use port numbers to identify the destination entity when delivering a message. Give two reasons for why these protocols invented a new abstract ID (port numbers), instead of using process IDs, which already existed when these protocols were designed. ÓÐÈý¸öÔ­Òò¡£µÚÒ»£¬½ø³ÌIDÊÇOSÌØ¶¨µÄ£¬Ê¹Óýø³ÌID½«Ê¹µÃЭÒéOSÒÀÀµ£»µÚ¶þ£¬Ò»¸öµ¥Ò»µÄ½ø³Ì¿ÉÄܽ¨Á¢¶à¸öͨÐÅͨµÀ£¬µ¥Ò»µÄ½ø³ÌID£¨Ã¿¸ö½ø³Ì£©×÷ΪĿµÄ±êʶ·û²»Äܱ»ÓÃÀ´Çø±ðÕâЩͨµÀ£»µÚÈý£¬½ø³ÌºÜÈÝÒ×¼àÌýÖÚËùÖÜÖªµÄ¶Ë¿Ú£¬µ«ÖÚËùÖÜÖªµÄ½ø³ÌIDÊDz»¿ÉÄܵġ£

µÚ 35 Ò³ ¹² 40 Ò³

6-19 What is the total size of the minimum TCP MTU, including TCP and IP overhead but not including data link layer overhead? ĬÈϵķֶÎÊÇ536bytes¡£TCPÔö¼Ó20 bytes £¬IPÒ²ÊÇÈç´Ë£¬Ôì³ÉĬÈϺϼÆ576 bytes¡£

6-20 Datagram fragmentation and reassembly are handled by IP and are invisible to TCP. Does this mean that TCP does not have to worry about data arriving in the wrong order? ´ð£º¾¡¹Üµ½´ïµÄÿ¸öÊý¾Ý±¨¶¼ÊÇÍêÕûµÄ£¬µ«¿ÉÄܵ½´ïµÄÊý¾Ý±¨µÄ˳ÐòÊÇ´íÎóµÄ£¬Òò´Ë£¬TCP±ØÐë×¼±¸Êʵ±µÄÖØ×鱨Îĵĸ÷¸ö²¿·Ö¡£

6-23 A process on host 1 has been assigned port p, and a process on host 2 has been assigned port q. Is it possible for there to be two or more TCP connections between these two ports at the same time?

´ð£º²»¿ÉÒÔ¡£Ò»ÌõÁ¬½Ó½ö½öÓÃËüµÄÌ×½Ó¿Ú±êʶ¡£Òò´Ë£¬£¨1£¬p£©-£¨2£¬q£©ÊÇÔÚÕâÁ½¸ö¶Ë¿ÚÖ®¼äΨһ¿ÉÄܵÄÁ¬½Ó¡£

µÚ 36 Ò³ ¹² 40 Ò³