当前位置: 首页 > 文章教程  > 考试与认证 > 软考

网络工程师考试试题分类精解第16章计算机专业英语

8/24/2020 8:51:25 PM 人评论

网络工程师考试试题分类精解第16章计算机专业英语

第16章
计算机专业英语

英语题是网络工程师考试中必考的,同时它占的分值固定为5分。相对于其他外语考试,它更体现了计算机英语的专业性,即使通过了外语六级的考试,在复习中仍然不可掉以轻心。

根据考试大纲,本章要求考生掌握以下知识点:

·掌握计算机技术的基本词汇;

·能正确阅读和理解计算机领域的英文资料。

在希赛网软考学院中,有一个专门的计算机英语栏目(http://www.csairk.com/ite/),读者可在其中学习许多IT专业英语。下面我们通过具体的考试真题来学习和加强对本章知识点的掌握。


例题1(2007年5月试题71~75)

Serialization delay and (71) delay are the two components of network delay that are improved by increasing bandwidth. Serialization delay, i.e. the amount of time it takes to put the (72) on the wire, and queuing delay (depth of the queue) are improved by increasing the (73) from a 128Kb/s circuit to a T1. However, three other components of delay, routing/switching delay, distance delay, and protocol delay are components that can not be positively affected by an (74) in bandwidth. If the circuits are not over-utilized, then increasing the bandwidth to improve the (75) of the application will only result in an increased bandwidth with no positive effects on performance.

(71)A.buffering

B.queuing

C.receiving

D.timing

(72)A.electricity

B.digital

C.data

D.variable

(73)A.memory

B.cache

C.bandwidth

D.delay

(74)A.increase

B.decrease

C.maintenance

D.extension

(75)A.capability

B.cost

C.amount

D.performance

例题分析

串行延迟和等待延迟是网络延迟的两个组成部分,它随着渐增的带宽而有所改善。串行延迟也就是数据在线路上传输所花时间的总计,带宽从128Kb/s提高到T1信道速率改善了等待延迟(等待程度)。然而,另外3个延迟的成分——路由/交换延迟、距离延迟、协议延迟却肯定不会因此(渐增的带宽)而受到影响。如果这些线路不能被完全利用,那么扩展带宽以提高应用的性能将只会导致更高的带宽,但绝对不会对性能有任何积极的影响。

例题答案

(71)B

(72)C

(73)C

(74)A

(75)D


例题2(2007年5月试题71~75)

Traditional Internet access methods like dial-up were so slow that host computers were connected to the dial-up (71) at the customer premise over slow (72) ports. PPP was designed to run directly over these serial links. But with the advent of broadband Internet (73) technologies such as ADSL and cable modems there has been a considerable increase in the bandwidth delivered to the end users. This means that the host computers at the customer premise connect to the (74) or cable "modem" over a much faster medium such as Ethernet. It also means that multiple (75) can connect to the Internet through the same connection.

(71)A.buffer

B.modem

C.computer

D.server

(72)A.parallel

B.digital

C.serial

D.variable

(73)A.access

B.cache

C.cast

D.storage

(74)A.FDDI

B.HDSL

C.ADSL

D.CDMA

(75)A.cables

B.hosts

C.servers

D.modems

例题分析

传统的Internet访问模式(如国内拨号接入式数据通信的方法)是如此的慢,以至于主机通过拨号方式通过慢的串行端口连接到在客户MODEM上。PPP是被设计用来在直接运行在串行链路上的协议。但是伴随ADSL和CableModem(电缆“调制解调器”)等宽带Internet访问技术的出现,高速增长的带宽呈现在终端用户的面前。这意味着在用户终端可以以一种更加快速的媒体通过ADSL或电缆“调制解调器”连接到以太网,同时它它也意味着更多的终端主机可以通过建立相同的连接连接到Internet上。

例题答案

(71)B

(72)C

(73)A

(74)C

(75)B


例题3(2008年5月试题71~75)

WLANs are increasingly popular because they enable cost-effective connections among people and applications that were not possible in the past. For example, WLAN-based applications can enable fine-grained management of supply (71) to improve their efficiency and reduce (72) . WLANs can also enable entirely new business processes. To cite but one example, hospitals are using WLAN-enabled point-of-care (73) to reduce errors and improve overall patient care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventing (74) through rogue access points. They can improve overall network management by integrating with customers' existing systems. Fortunately, it isn't necessary to measure these benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time- (75) deployment and administrative chores.

(71)A.custom

B.server

C.chains

D.chances

(72)A.overhead

B.connection

C.supply

D.effect

(73)A.transportations

B.applications

C.connections

D.translations

(74)A.integration

B.interest

C.instruction

D.intrusion

(75)A.capable

B.consuming

C.effective

D.connected

例题分析

WLAN无线技术日益流行,因为它能够在用户与应用之间建立有效的连接,而这一切在过去是无法实现的。例如:基于WLAN的应用能够对供应和分配链进行细粒度的管理,以改进效率和减少开销。WLAN也可以建立全新的商业过程。可以举出无数的例子中的一个,如许多医院正在使用基于WLAN的监护点应用来减少差错,全面改进对病人的护理。WLAN管理解决方案提供的其他各种好处都是很实在的,然而却很难度量。例如:它可以保护公司的数据免于遭受通过流氓访问点入侵危害;它可以让IT人员管理更大的网络,从而减少管理员,控制薪金开支;而且它可以通过集成现有的用户系统改进网络的全面管理。幸运的是,用户不必为调整WLAN管理方案而计算各种收益,因为减少了部署时间和管理杂务就明显补偿了引进WLAN的开销。

例题答案

(71)C

(72)A

(73)B

(74)D

(75)B


例题4(2008年11月试题71~75)

The usual way to ensure reliable delivery is to provide the (71) with some feedback about what is happening at the other end of the line. Typically, the protocol calls for the receiver to send back special (72) frame bearing positive or negative (73) about the incoming frames. If the sender receives a positive acknowledgement about a frame, it knows the frame has arrived safely.On the other hand, a negative acknowledgement means that something has gone wrong, and the frame must be transmitted again. An additional complication comes from the possibility that hardware troubles may cause a frame to (74) completely. In this case, the receiver will not react at all, since it has no any reason to react. It should be clear that a protocol in which the sender transmits a frame and then waits for an acknowledgement, positive or negative, will hang forever if a frame is ever lost due to, for example, (75) hardware.

(71)A.receiver

B.controller

C.sender

D.customer

(72)A.data

B.control

C.request

D.session

(73)A.application

B.connection

C.stream

D.acknowledgement

(74)A.vanish

B.vary

C.appear

D.incline

(75)A.acting

B.working

C.malfunctioning

D.functioning

例题分析

通常可信传输的方法就是接收方向发送方反馈一些相关信息。特别是,这类协议要求接收方在收到到达的帧后,反馈特殊的、带确定或者否定的控制帧来进行确认。如果发送方接收了确认的帧,他就知道所发送的消息已经安全到达。否则,如果收到了否认的帧,就意味着帧在传输的过程中发生了错误,这些帧就必须重新传输。另外的一个问题是,可能出现的硬件问题可能会导致一个帧完全消失。这种情况下接收方就不能回应什么,而导致无法判断。可以确定的是,如果这类协议规定发送方传输一个帧后等待一个肯定或者否定的确认帧的时候,莫名其妙地丢失了帧,例如硬件故障,那么发送方就会无限地等待。

例题答案

(71)C

(72)B

(73)D

(74)A

(75)C


例题5(2005年5月试题66~70)

DOM is a platform-and language- (66) API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented (67) . DOM is a (68) -based API to documents, which requires the whole document to be represented in (69) while processing it. A simpler alternative to DOM is the event –based SAX, which can be used to process very large (70) documents that do not fit info the memory available for processing.

(66)A.specific

B.neutral

C.contained

D.related

(67)A.text

B.image

C.page

D.graphic

(68)A.table

B.tree

C.control

D.event

(69)A.document

B.processor

C.disc

D.memory

(70)A.XML

B.HTML

C.script

D.web

例题分析

译文大意如下:

DOM是一种独立于平台和语言的API,它允许程序和脚本语言动态地访问和更新WWW文档的内容、结构及形式(目前对HTML和XML文档的定义也是这些规范的一部分)。这些文档可以进一步地被处理,然后处理的结果被传送到当前页面。DOM是一种树形的API文档,在处理这种文档的时候,要求将整个文档在内存中进行表示。DOM的一种简单解决方案就是基于事件的SAX,它可以用来处理大量的XML文档,在处理文档的同时不需要将其调入内存。

例题答案

(66)B

(67)C

(68)B

(69)D

(70)A


例题6(2005年5月试题71~75)

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (71) from a friend who asks you to open it.This is what happens with Melissa and several other similar E-mail (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages (73) .

As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to. bat and.cmd plus a whole list of other extensions and will still run and successfully infect target users.

Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (75) access to your network.

(71)A.attachment

B.packet

C.datagram

D.message

(72)A.virtual

B.virus

C.worms

D.bacteria

(73)A.memory

B.caches

C.ports

D.registers

(74)A.names

B.cookies

C.software

D.extensions

(75)A.cracker

B.user

C.customer

D.client

例题分析

译文大意如下:

Melissa病毒和LoveLetter病毒充分利用了朋友和同事之间的信任。想像一下这种情况:你的朋友发一个附件给你,并让你打开它。Melissa和其他类似的蠕虫病毒都采用的是这种手段。一旦你运行了这些病毒程序,蠕虫就会继续把自己发送到你的E-mail地址簿及先前接收E-mail的那些地址中去。

当管理员试图用扩展名来阻止危险的E-mail附件时,病毒的编写者就会使用其他的扩展名来进行保护。可执行文件(*.exe)被重命名成为.bat、.cmd等其他的扩展名。这些病毒文件同样会被运行,然后成功地入侵目标用户。

通常,黑客会使用一个类似于Flash的附件来通过网络,这些Flash通常会在播放一些可爱的动画的同时在后台窃取你的密码并把破解文件植入。

例题答案

(71)A

(72)C

(73)B

(74)D

(75)A


例题7(2005年11月试题66~70)

MIDI enables people to use (66) computers and electronic musical instruments. There are actually three components to MIDI, the communications" (67) ", the Hardware Interface and a distribution (68) called "Standard MIDI Files". In the context of the WWW, the most interesting component is the (69) Format. In principle, MIDI files contain sequences of MIDI Protocol messages. However, when MIDI Protocol (70) are stored in MIDI files, the events are also time-stamped for playback in the proper sequence. Music delivered by MIDI files is the most common use of MIDI today.

(66)A.personal

B.electronic

C.multimedia

D.network

(67)A.device

B.protocol

C.network

D.controller

(68)A.format

B.text

C.wave

D.center

(69)A.Video

B.Faxmail

C.Graphic

D.Audio

(70)A.messages

B.packets

C.frame

D.information

试题分析

这是一篇介绍MIDI(Musical Instrument Digital Interface,乐器数字接口)的文章,这种接口技术的作用就是使电子乐器与电子乐器、电子乐器与电脑之间使用一种通用的通信协议进行通信,其译文如下:

MIDI使得人们可以将多媒体电脑和电子音乐乐器连接起来使用。MIDI有3个组成部分:通信协议、硬件接口和一种称为“标准MIDI文件”的分发式文件。环球网中最吸引人的是那些音频格式的服务。通常,MIDI文件包含遵循MIDI协议的信号序列(注:言外之意,存储的不是声波本身,而是数字信号)。然而,当这种遵循MIDI协议的信号序列被存储在MIDI文件中时,各乐器的演奏方式和时间也就被依次记录下来,从而能回放。目前,从MIDI文件发展而来的音乐是MIDI最广泛的应用。

试题答案

(66)C

(67)B

(68)A

(69)D

(70)A


例题8(2005年11月试题71~75)

Certificates are (71) documents attesting to the (72) of a public key to an individual or other entity. They allow verification of the claim that a given public key does in fact belong to a given individual. Certificates help prevent someone from using a phony key to (73) someone else. In their simplest form, Certificates contain a public key and a name. As commonly used, a certificate also contains an (74) date, the name of the CA that issued the certificate, a serial number, and perhaps other information. Most importantly, it contains the digital (75) of the certificate issuer. The most widely accepted format for certificates is X.509, thus, Certificates can be read or written by any application complying with X.509.

(71)A.text

B.data

C.digital

D.structured

(72)A.connecting

B.binding

C.composing

D.conducting

(73)A.impersonate

B.personate

C.damage

D.control

(74)A.communication

B.computation

C.expectation

D.expiration

(75)A.signature

B.mark

C.stamp

D.hypertext

试题分析

这是一篇介绍数字认证的短文,其译文如下:

数字认证是证明个人或其他机构拥有某一公开密钥的数字文件。数字认证用于确定某一给定的公钥是否确实属于某个人或某个机构。数字认证有助于防止有人使用假的钥匙冒充某人。形式最简单的数字认证包含一个公钥和一个用户名。通常,数字认证还包括有效期、发证机关名称、序列号,也许还包含其他信息。最重要的是,它包含了发证机关的数字签名。最普遍公认的数字认证标准是X.509国际标准,任何遵循X.509的应用程序都能读写遵循X.509标准的数字认证。

试题答案

(71)C

(72)B

(73)A

(74)D

(75)A


例题9(2006年5月试题66~70)

Originally introduced by Netscape Communications, (66) are a general mechanism which HTTP Server side applications,such as CGI (67) , can use to both store and retrieve information on the HTTP (68) side of the connection.Basically,Cookies can be used to compensate for the (69) nature of HTTP.The addition of a simple,persistent,client-side state significantly extends the capabilities of WWW-based (70) .

(66)A.Browsers

B.Cookies

C.Connections

D.Scripts

(67)A.graphics

B.processes

C.scripts

D.texts

(68)A.Client

B.Editor

C.Creator

D.Server

(69)A.fixed

B.flexible

C.stable

D.stateless

(70)A.programs

B.applications

C.frameworks

D.constrains

例题分析

Cookies最初是由Netscape通信公司引入的,是一种通用机制,HTTP服务器端应用程序(如CGI)用它来存储和恢复网络连接的HTTP客户端信息。Cookies基本上是用来弥补HTTP无状态的缺陷。Cookies对客户端状态信息进行简单的、持续的保持,这种弥补拓展了基于WWW应用的能力。

例题答案

(66)B

(67)C

(68)A

(69)D

(70)B


例题10(2006年5月试题71~75)

WebSQL is a SQL-like (71) language for extracting information from the web.Its capabilities for performing navigation of web (72) make it a useful tool for automating several web-related tasks that require the systematic processing of either all the links in a (73) , all the pages that can be reached from a given URL through (74) that match a pattern,or a combination of both.WebSQL also provides transparent access to index servers that can be queried via the Common (75) Interface.

(71)A.query

B.transaction

C.communication

D.programming

(72)A.browsers

B.servers

C.hypertexts

D.clients

(73)A.hypertext

B.page

C.protocol

D.operation

(74)A.paths

B.chips

C.tools

D.directories

(75)A.Router

B.Device

C.Computer

D.Gateway

例题分析

WebSQL是一种类似SQL的查询语言,用于从Web中提取信息。它能浏览Web超文本,这使得它成为自动处理多个跟Web相关任务的有用工具。这些跟Web相关的任务需要对一个页面中的所有链接,能从给定的URL中通过匹配某种模式的路径而获得的所有页面进行系统处理,或者是对这两者交织在一起的情况进行系统处理。WebSQL也提供了对可通过公共网关接口(CGI)查询的索引服务器进行透明访问的方法。

例题答案

(71)A

(72)C

(73)B

(74)A

(75)D


例题11(2006年11月试题66~70)

NAC's (Network Access Control) role is to restrict network access to only compliant endpoints and (66) users.However, NAC is not a complete LAN (67) solution; additional proactive and (68) security measures must be implemented.Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 100Gb/s, ensuring a high level of security plus application availability and performance.Nevis integrates NAC as the first line of LAN security (69) In addition to NAC,enterprises need to implement role-based network access control as well as critical proactive security measures-real-time, multilevel (70) inspection and microsecond threat containment.

(66)A.automated

B.distinguished

C.authenticated

D.destructed

(67)A.crisis

B.security

C.favorable

D.excellent

(68)A.constructive

B.reductive

C.reactive

D.productive

(69)A.defense

B.intrusion

C.inbreak

D.protection

(70)A.port

B.connection

C.threat

D.insurance


试题分析

NAC(网络访问控制)的任务就是只允许那些仅被允许的终端和被授权的用户进行网络访问。然而,NAC不是一个完整的局域网安全解决方案,还必须采取预防性的、具有反应性的额外安全措施。Nevis是最早的也是唯一全面的局域网安全解决方案,它富有远见地兼顾考虑了将来以10Gb/s的速率传输数据包时的安全问题,以确保高水平安全度的同时有较好的应用性和性能。Nevis整合了NAC作为局域网安全防护的第一道防线。除NAC之外,企业既要采取基于角色控制网络访问的策略,也要采取关键性的安全预防措施——实时的多级别威胁检测和微秒级的威胁遏制。

点评:

restrict … to的意思是将某某限制在某范围内,第一句中最后那个to跟restrict搭配,不是跟access搭配。

第三句中的deep,表示考虑很深远,考虑到未来,富有远见。

试题答案

(66)C

(67)B

(68)C

(69)A

(70)C


例题12(2006年11月试题71~75)

Virtualization is an approach to IT that pools and shares (71) so that utilization is optimized and supplies automatically meet demand.Traditional IT environments are often silos, where both technology and human (72) are aligned around an application or business function.With a virtualized (73) ,people, processes, and technology are focused on meeting service levels, (74) is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible.We offer a broad spectrum of virtualization (75) that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.

(71)A.advantages

B.resources

C.benefits

D.precedents

(72)A.profits

B.costs

C.resources

D.powers

(73)A.system

B.infrastructure

C.hardware

D.link

(74)A.content

B.position

C.power

D.capacity

(75)A.solutions

B.networks

C.interfaces

D.connections

试题分析

虚拟化是一种IT技术,它汇集并共享资源,从而优化资源使用并自动满足需求。在传统IT环境中,技术、人力资源好比围绕在应用或商务活动旁边的孤岛,彼此联系不密切。利用虚拟化的IT基础设施,人、加工处理和技术三者被聚焦在一起满足不同级别的服务,负载量动态分配,资源得到优化,而且全部IT基础设施的结构简单而灵活。我们提供广泛的虚拟化解决方案,允许客户选择最合适的方式及最优化整合IT基础设施资源的方案。

点评:

Silo,意为:筒仓,地窖,竖井,(导弹)发射井,在计算机数据库术语中,指的是一种先进先出(FIFO)存储缓冲区,常称为(数据)孤岛。文中的意思是:在传统IT环境中,技术、人力资源虽然以应用或商务活动为中心,但相互孤立,好比两个分散独立的“地窖”、“孤岛”,在技术这个“地窖”中只涉及技术,在人力资源这个“地窖”中只涉及人力资源,结合不够。

Focus,意为:聚焦,调整使其聚集在一起。…be focused on…指将某些东西整合在一起用于某方面。

试题答案

(71)B

(72)C

(73)B

(74)D

(75)A


例题13(2009年5月试题71~75)

The Border Gateway Protocol (BGP) is an interautonomous system (71) protocol. The primary function of a BGP speaking system is to exchange network (72) information with other BGP system. This network reachability information includes information on the list of Autonomous System (ASs) that reachability information traverses. BGP-4 provides a new set of mechanisms for supporting (73) interdomain routing. These mechanisms include support for advertising an IP (74) and eliminate the concept of network class within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including (75) of AS paths. These changes provide support for the proposed supernettting scheme.

(71)A.connecting

B.resolving

C.routing

D.supernettting

(72)A.secubility

B.reachability

C.capability

D.reliability

(73)A.answerless

B.connectionless C. confirmless

D.classless

(74)A.prefix

B.suffix

C.infix

D.reflex

(75)A.reservation

B.relation

C.aggregation

D.connection

试题分析

边界网关协议(BGP)是自治系统间的路由协议。BGP发布系统的基本功能就是与其他BGP系统交换网络可到达性信息。这种网络可到达性信息包含了可到达性信息穿越的自治系统的列表。BGP-4提供了一系列新的机制来支持无类别的域间路由。这些机制包括支持发布IP前缀,从而在BGP中排除了网络类别的概念。BGP-4也引入了路由聚合机制,包括AS通路的聚合。这些改变提供了对提议的超网方案的支持。

试题答案

(71)C

(72)B

(73)D

(74)A

(75)C


例题14(2009年11月试题71~75)

Routing protocols use different techniques for assigning (71) to individual networks. Further, each routing protocol forms a metric aggregation in a different way. Most routing protocols can use multiple paths if the paths have an equal (72) . Some routing protocols can even use multiple paths when paths have an unequal cost. In either case, load (73) can improve overall allocation of network bandwidth. When multiple paths are used, there are several ways to distribute the packets. The two most common mechanisms are per-packet load balancing and per-destination load balancing. Per-packet load balancing distributes the (74) across the possible routes in a manner proportional to the route metrics. Per-destination load balancing distributes packets across the possible routes based on (75) .

(71)A.calls

B.metrics

C.links

D.destinations

(72)A.user

B.distance

C.entity

D.cost

(73)A.bracketing

B.balancing

C.downloading

D.transmitting

(74)A.destinations

B.resources

C.packets

D.sources

(75)A.destinations

B.resources

C.packets

D.Sources

试题分析

各种路由协议使用不同的技术来为网络赋予度量值。进一步说,每一种路由协议都形成了不同的度量汇聚模式。大部分路由协议在各个通路具有相等费用时可以使用多个通路,某些路由协议甚至在各个通路费用不相等时也可以使用多个通路。在上述任何一种情况下,负载均衡都可以改进网络带宽的全局分配。当使用多个通路时,可以使用多种方法来分配分组。两种最常用的机制是按分组进行负载均衡和按目标进行负载均衡。按分组进行负载均衡是指按照路由度量的比例向各个可能的路由上分配分组。按目标进行负载均衡是指根据目标向各个可能的路由上分配分组。

试题答案

(71)B

(72)D

(73)B

(74)C

(75)A


例题15(2010年5月试题71~75)

Although a given waveform may contain frequencies over a very broad range, as a practical matter any transmission system will be able to accommodate only a limited band of (71) . This, in turn, limits the data rate that can be carried on the transmission (72) A square wave has an infinite number of frequency components and hence an infinite (73) . However, the peak amplitude of the kth frequency component, kf, is only 1/k, so most of the (74) in this waveform is in the first few frequency components. In general, any digital waveform will have (75) bandwidth. If we attempt to transmit this waveform as a signal over any medium, the transmission system will limit the bandwidth that can be transmitted.

(71)A.frequencies

B.connections

C.diagrams

D.resources

(72)A.procedure

B.function

C.route

D.medium

(73)A.source

B.bandwidth

C.energy

D.cost

(74)A.frequency

B.energy

C.amplitude

D.phase

(75)A.small

B.limited

C.infinite

D.finite

试题分析

虽然一个给定的波形包含了很宽的频率范围,但是任何实际的传输系统只能够通过有限的频带。这样,就限制了传输介质可以承载的数据速率。一个方波包含了无限多的频率成分,因而也具有无限的带宽。然而,第k个频率成分的峰值幅度kf只是1/k,所以波形的大部分能量只是包含在前面的少数频率成分中。一般来说,任何数字波形都有无限带宽。如果我们试图在某种介质上传输这种波形信号,则传输系统实际上会限制可以发送的带宽。

试题答案

(71)A

(72)D

(73)B

(74)B

(75)C


例题16(2010年11月试题71~75)

The metric assigned to each network depends on the type of protocol. Some simple protocol, like RIP, treats each network as equals. The (71) of passing through each network is the same; it is one (72) count. So if a packet passes through 10 network to reach the destination, the total cost is 10 hop counts. Other protocols, such as OSPF, allow the administrator to assign a cost for passing through a network based on the type of service required. A (73) through a network can have different costs(metrics). For example, if maximum (74) is the desired type of service, a satellite link has a lower metric than a fiber-optic line. On the other hand, if minimum (75) is the desired type of service, a fiber-optic line has a lower metric than a satellite line. OSPF allow each router to have several routing table based on the required type of service.

(71)A.number

B.connection

C.diagram

D.cost

(72)A.process

B.hop

C.route

D.flow

(73)A.flow

B.window

C.route

D.cost

(74)A.packet

B.throughput

C.error

D.number

(75)A.delay

B.stream

C.packet

D.cost

试题分析

赋予每一个网络的路由度量依赖于协议的类型。对于像RIP这样的简单协议,可以认为每个网络都是相同的,因而通过每一个网络的费用也都是相同的,其费用为1。所以,如果一个分组经过10个网络到达目标,则总的费用就是10跳。其他的协议,例如OSPF,允许网络管理员根据要求的服务类型赋予所通过的网络一个度量值。通过一个网络的路由可以具有不同的费用。例如,若期望的服务类型为最大吞吐率,则卫星链路比光纤线路的费用低。另一方面,如果期望的服务类型为最小延迟,则光纤线路比卫星线路的费用低。OSPF协议允许每一个路由器根据需要的服务类型设置几个不同的路由表。

试题答案

(71)D

(72)B

(73)C

(74)B

(75)A


例题17(2011年5月试题71~75)

Border Gateway Protocol (BGP) is inter-autonomous system (71) protocol. BGP is based on a routing method called path vector routing. Distance vector routing is not a good candidate for inter-autonomous system routing because there are occasions on which the route with the smallest (72) count is not the preferred route. For example, we may not want a packet through an not secure even though it is the shortest route. Also, distance vector routing is unstable due to the fact that the routers announce only the number of hop counts to the destination without actually defining the path that leads to that (73) . A router that receives a distance vector advertisement packet may be fooled if the shortest path is actually calculated through the receiving router itself. Link (74) routing is also not a good candidate for inter-autonomous system routing because an Internet is usually too big for this routing method. To use link state routing for the whole internet would require each router to have a huge link state database. It would also take a long time for each router to calculate its rousting (75) using the Dijkstra algorism.

(71)A.routing

B.switching

C.transmitting

D.receiving

(72)A.path

B.hop

C.route

D.packet

(73)A.connection

B.window

C.source

D.destination

(74)A.status

B.search

C.state

D.research

(75)A.table

B.state

C.metric

D.cost

试题分析

边界网关协议(BGP)是自治系统间的路由协议。BGP是基于路径选择的向量路由方法。距离向量路由作为自治系统间的路由不是一个好的选择,因为具有最小跳数的路由并不一定是最合适的路由。例如,我们不想一个数据包通过即使路径最短但不安全的路线,距离向量路由具有不确定性,因为它只告知了到达目的地路径的跳数,而没有真正定义具体的路径。如果接收路由器接收到了一个通过它本身来计算得到的距离向量广播包,那么显然它是被愚弄的。

链路状态路由作为自治系统间的路由也不是一个好的选择,因为在使用链路状态路由时,整个互联网将要求每个路由器有一个庞大的链路状态资料库,这就需要花费大量的时间去为路由器计算其路由表。

试题答案

(71)A

(72)B

(73)D

(74)C

(75)A

相关教程

共有条评论 网友评论

验证码: 看不清楚?