f ff ff ff
7th Edition
ff ff
Solutions to Review Questions and Problems
ff ff ff ff ff
,Version Date: December 2016 ff f ff
This document contains the solutions to review questions and problems for the 7th
ff ff ff ff ff ff ff ff ff ff ff ff
edition of Computer Networking: A Top-Down Approach by Jim Kurose and Keith Ross.
f f ff ff ff ff ff ff ff ff ff ff ff ff
These solutions are being made available to instructors ONLY. Please do NOT copy or
ff ff ff ff ff ff ff ff ff f f ff ff ff ff
distribute this document to others (even other instructors). Please do not post any
ff ff ff ff ff ff ff ff f f ff ff ff ff
solutions on a publicly-available Web site. We‟ll be happy to provide a copy (up-to-date)
ff ff ff ff ff ff ff ff ff ff ff ff ff ff
of this solution manual ourselves to anyone who asks.
ff ff ff ff ff ff ff ff ff
Acknowledgments: Over the years, several students and colleagues have helped us ff ff ff ff ff ff ff ff ff ff
prepare this solutions manual. Special thanks goes to Honggang Zhang, Rakesh Kumar,
f f ff ff ff ff ff ff ff ff ff ff ff
Prithula Dhungel, and Vijay Annapureddy. Also thanks to all the readers who have made
ff ff ff ff ff ff ff ff ff ff ff ff ff ff
suggestions and corrected errors.
ff ff ff ff
All material © copyright 1996-2016 by J.F. Kurose and K.W. Ross. All rights reserved
ff ff ff ff ff ff ff ff ff ff ff ff ff
, Chapter 1 Review Questions ff ff ff
1. There is no difference. Throughout this text, the words “host” and “end system” are
ff ff ff ff ff ff ff ff ff ff ff ff ff
used interchangeably. End systems include PCs, workstations, Web servers, mail
ff ff ff ff ff ff ff ff ff ff
servers, PDAs, Internet-connected game consoles, etc.
ff ff ff ff ff ff
2. From Wikipedia: Diplomatic protocol is commonly described as a set of international
ff ff ff ff ff ff ff ff ff ff ff
courtesy rules. These well-established and time-honored rules have made it easier for
ff ff ff ff ff ff ff ff ff ff ff ff
nations and people to live and work together. Part of protocol has always been the
ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
acknowledgment of the hierarchical standing of all present. Protocol rules are based
ff ff ff ff ff ff ff ff ff ff ff ff
on the principles of civility.
ff ff ff ff ff
3. Standards are important for protocols so that people can create networking systemsff ff ff ff ff ff ff ff ff ff ff
and products that interoperate.
ff ff ff ff
4. 1. Dial-up modem over telephone line: home; 2. DSL over telephone line: home or
ff ff ff ff ff ff ff ff ff ff ff ff ff
small office; 3. Cable to HFC: home; 4. 100 Mbps switched Ethernet: enterprise; 5.
ff ff ff ff ff ff ff ff ff ff ff ff ff ff
Wifi (802.11): home and enterprise: 6. 3G and 4G: wide-area wireless.
ff ff f f ff ff ff ff ff ff ff ff
5. HFC bandwidth is shared among the users. On the downstream channel, all packets
ff ff ff ff ff ff ff ff ff ff ff ff
emanate from a single source, namely, the head end. Thus, there are no collisions in
ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
the downstream channel.
ff ff ff
6. In most American cities, the current possibilities include: dial-up; DSL; cable
ff ff ff ff ff ff ff ff ff ff
modem; fiber-to-the-home.
f f ff
7. Ethernet LANs have transmission rates of 10 Mbps, 100 Mbps, 1 Gbps and 10 Gbps.
ff ff ff ff ff ff ff ff ff ff ff ff ff ff
8. Today, Ethernet most commonly runs over twisted-pair copper wire. It also can run
ff ff ff ff ff ff ff ff ff ff ff ff
over fibers optic links.
ff ff ff ff
9. Dial up modems: up to 56 Kbps, bandwidth is dedicated; ADSL: up to 24 Mbps
ff ff ff ff ff ff ff ff ff ff ff ff ff ff
downstream and 2.5 Mbps upstream, bandwidth is dedicated; HFC, rates up to 42.8
ff ff ff ff ff ff ff ff ff ff ff ff ff
Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps
ff ff ff ff ff ff ff ff ff ff ff ff ff ff
upload; 10-20 Mbps download; bandwidth is not shared.
ff ff ff ff ff ff ff ff
10. There are two popular wireless Internet access technologies today:
ff ff ff ff ff ff ff ff
a) Wifi (802.11) In a wireless LAN, wireless users transmit/receive packets to/from an
ff ff ff ff ff ff ff ff ff ff ff
base station (i.e., wireless access point) within a radius of few tens of meters. The
ff ff f f ff ff ff ff ff ff ff ff ff ff ff ff
base station is typically connected to the wired Internet and thus serves to connect
ff ff ff ff ff ff ff ff ff ff ff ff ff ff
wireless users to the wired network.
ff ff ff ff ff ff
b) 3G and 4G wide-area wireless access networks. In these systems, packets are
ff ff ff ff ff ff ff f f f f f f f f
transmitted over the same wireless infrastructure used for cellular telephony, with the
ff ff ff ff ff ff ff ff ff ff ff ff