b b b b b b b b
Kurose
© 2020 Pearson Education, Hoboken, NJ.
,Computer Networking: A Top-Down b b b
Approach, 8th Edition
b b
Solutionsto Review Questions and Problems b b b b b
Version Date: August 2020 b b b
This document contains the solutions to review questions and problems for the 8th edition
b b b b b b b b b b b b b
of Computer Networking: A Top-Down Approach by Jim Kurose and
b b b b b b b b b b b b b b b b b
Keith Ross. These solutions are being made available to instructors
b b b b b b b b b b
ONLY. b Please do NOT copy or distribute this document to others
b b b b b b b b b b b
(even other instructors). Please do not post any solutions on a publicly-
b b b b b b b b b b b b
available Web site. We‟ll be happy to provide b a copy (up-to-date) of
b b b b b b b b b b b b b b b b b b b b b
this solution manual ourselves to anyone who asks.
b b b b b b b b
Acknowledgments: Over the years, several students and colleagues have helped us prepare b b b b b b b b b b b
this solutions manual. Special thanks goes to Honggang Zhang, Rakesh
b b b b b b b b b b
Kumar, Prithula Dhungel, Vijay Annapureddy, Yifan Zhou. Also thanks to
b b b b b b b b b b
all the
b readers who have made suggestions and corrected errors.
b b b b b b b b b b b b b b b b b
All material © copyright 1996-2020 by J.F. Kurose and K.W. Ross. All rights reserved
b b b b b b b b b b b b
© 2020 Pearson Education, Hoboken, NJ.
,Chapter 1 Review Questions b b b
1. There is no difference. Throughout this text, the words “host” and
b b b b b b b b b b b b b b b b b b b b
“end system” are used interchangeably. End systems include PCs,
b b b b b b b b b
workstations, Web servers, mail servers, PDAs, Internet-connected game
b b b b b b b b
consoles, etc.
b b
2. From Wikipedia: Diplomatic protocol is commonly described as a
b b b b b b b b b b b b b b b b
set of international courtesy rules. These well-established and time-honored
b b b b b b b b b b
rules have made
b it easier bfor nations and people to live b b b b b b b b b b b b b b b b b b
and
b work together. Part of protocol has always been the acknowledgment
b b b b b b b b b b b
of the hierarchical standing of all present. Protocol rules are based
b b b b b b b b b b b
onthe principles of civility.
b b b b
3. Standards are important for protocols so that people can create networking b b b b b b b b b b
systems andproducts that interoperate.
b b b b
4. 1. Dial-up modem over telephone line: home; 2. DSL over telephone
b b b b b b b b b b b b b b b b b b b b
line: home or small office; 3. Cable to HFC: home; 4. 100 Mbps
b b b b b b b b b b b b b
switched Ethernet: enterprise.
b b b
5. HFC bandwidth is shared
b among the users. bOn the b b b b b b b b b b b b b b b
downstream channel, all packets emanate from a single source, namely,
b b b b b b b b b b
the head end. Thus, there are no collisions in the downstream channel.
b b b b b b b b b b b b b
6. In most American cities, the current possibilities include: dial-up; DSL; cable
b b b b b b b b b b
modem;fiber-to-the-home.
b
7. Ethernet b b LANs have b b b b transmission b b rates of b b b b 10 b b Mbps, b b 100 b b Mbps, b b 1 b b Gbps and
b b b b 1
Gbps.
b
8. Today, Ethernet most commonly runs over twisted-pair copper wire. It also can
b b b b b b b b b b b
run overfibers optic links.
b b b b
9. ADSL: up to 24 Mbps downstream and 2.5 Mbps upstream,
b b b b b b b b b b b b b b b b b b b
bandwidth is dedicated; HFC, rates up to 42.8 Mbps and upstream rates of up
b b b b b b b b b b b b b b
to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; 10-20
b b b b b b b b b b
Mbps download;
b bandwidth is not shared. b b b b b b
10. There are two popular wireless Internet access technologies today:
b b b b b b b b b b b b b b b b
a. Wifi (802.11) In a wireless LAN, wireless users transmit/receive packets to/from b b b b b b b b b b b
an base station (i.e., wireless access point) within a radius of
b b b b b b b b b b b b b b b b b b b
few tens of meters. The base station is typically connected
b to b b b b b b b b b b b
the wired Internet and thusserves b to connect wireless users
b b b b b b b b b b b b b b
to the wired network. b b b b
b. 3G and 4G wide-area wireless access networks. In these systems, b b b b b b b b b
packets are transmitted over the same wireless infrastructure used for cellular
b b b b b b b b b b b
telephony, with the base station thus being managed by a telecommunications
b b b b b b b b b b b b
provider. This provides wireless access to users b within a b b b b b b b b b b b b b b b b
radius of tens of kilometers of the
b base station. b b b b b b b b b b b b b b b
© 2020 Pearson Education, Hoboken, NJ.
, 11. At time t0
b b the sending host begins to transmit. At time t1
b b b b b b= b b b b b b b b b b b b b b b b b
b L/R1, the sending host completes transmission and the entire packet is
b b b b b b b b b b
b received at the router (no propagation delay). Because the router has
b b b b b b b b b b b b b b b b
bthe entire packet at time t1, it can begin to transmit the
b b b b b b b b b b b b b b b b b b b b
© 2020 Pearson Education, Hoboken, NJ.