CAN201计网历年大题收集

news2024/11/15 21:42:23

网络性能计算

e.g1.1 算RTT

 

传输时间

when you enter the URL in your browser, it initiates an HTTP request. This request is encapsulated in TCP, which is then further encapsulated in IP for routing. The data is transmitted over the physical medium using link layer protocols like Ethernet. Finally, your router facilitates the communication between your computer and the web server.

e.g1.2 算RTT


 

Consider the IP address of total amount of time:

 Time elapses from when the client clicks on the link until the client receives the object :


e.g2

e.g3

e.g4 RTT计算+延迟计算

误差检验

e.g1 校验和

 

 

0110001111010011

 if 11010011+00101100 != 111111111, it shows there's errrors in transmission. 

Not possible

Possible, the two errors happen in the same bit, the error couldn't be detected

 

  1. Physical Layer (Layer 1): parity checks and cyclic redundancy checks (CRC).

  2. Data Link Layer (Layer 2): Error Detection Method: Frame Check Sequence (FCS) is commonly used at this layer. CRC is a common algorithm for generating FCS to detect errors in data frames. 

  3. Network Layer (Layer 3): no

  4. Transport Layer (Layer 4): Transport layer protocols, such as TCP

  5. Application Layer (Layer 5): Error detection at the application layer depends on the specific application protocol being used. For example, protocols like File Transfer Protocol (FTP) may include their own error detection mechanisms. SSL

 

  • The sender and receiver both agree on the generator polynomial beforehand.
  • The sender performs a division operation on the extended message (data + appended zeros) using the generator polynomial.
  • The remainder of this division, which is the result of the CRC calculation, is the CRC check value.

Efficiency, Simple Implementation, Collision Resistance, Widely Used in Networking Protocols 

e.g2 校验和

 

because to translate the sum, 

HTTP

e.g1

 

protocol + hostname + path to a file

http://sat.xjtlu.edu.cn/can201/index.html

The browser is running HTTP version 1.1

 "Connection: keep-alive" -> persistent

在HTTP/1.1中,持久连接可以通过在响应头部中设置Connection: keep-alive来指示。如果响应头部中包含Connection: keep-alive,则表示该连接是持久连接。如果响应头部中没有包含该字段或者设置为Connection: close,则表示该连接是非持久连接

HTTP/1.0就都是非持久连接了

**********

The server usually uses the Domain Name System (DNS) to resolve the web server's domain name to its IP address. The following is an overview of this process.

The client sends a request to the server with the web server's domain name, e.g. "www.xjtlu.edu.cn".

The server checks its local cache to see if it already has an IP address for that domain name. If it does, it uses that IP address to connect to the web server.

通过DNS协议得到websever 的ip address的

If the server does not have the IP address in its cache, it sends a request to the DNS server to resolve the domain name.

The DNS server checks its own cache to see if it already has the IP address for the domain name. If it does, it sends the IP address back to the server.

If the DNS server does not have the IP address in its cache, it may send requests to other DNS servers in a hierarchical fashion to resolve the IP address, starting with the root DNS server, followed by the TLD, and then the authoritative DNS server.

Once the DNS server resolves the domain name to an IP address, it sends the IP address back to the server.

The server stores that IP address in its cache and uses it to connect to the web server and request content.

  1. Browser checks its cache: The browser may first check its local cache to see if it has recently resolved the domain name to an IP address. If it finds a match, it can use that IP address.

  2. Operating System's DNS cache: If the browser's cache doesn't have the information, the browser may then check the operating system's DNS cache for a previously resolved IP address.

  3. DNS resolution: If the domain name's IP address is not found in the caches, the browser sends a DNS query to a DNS server. This DNS server is typically provided by the user's Internet Service Provider (ISP) or a third-party DNS service.

  4. DNS server lookup: The DNS server looks up the IP address associated with the domain name in its records. If it has the information, it returns the IP address to the browser.

  5. Browser connects to the server: Once the browser has the IP address, it can establish a connection to the web server using that address. The server then responds to the browser's request, and the web page is loaded.

*******

这个考的概率大 

直接从User-Agent 的后面开始找

Mozilla/5.0

The browser type information is needed by the server to send different versions of the same object to different types of browsers.

The browser is included as a header field in the HTTP request message because it provides the server with important information about the client making the request. Here are a few reasons why the browser is required in the HTTP request message

Device compatibility. Different browsers have different capabilities and support different technologies, so browser information helps the server determine if the client can handle the requested content.

Security. Different browsers have different levels of security, and the server can use this information to determine if the client is using the latest secure browser before serving content.

Analysis and logging. Browser information is used to analyze the performance of the site and to understand how the site is being used, such as browser type, version, etc.

Content delivery. Depending on the browser, the server may choose to deliver different content, such as images or web styles, to optimize the user experience.

Malicious user agents. Some attackers may use malware, scripts, or malware to make requests that provide a fake user agent to evade detection. User agent strings are useful in detecting such cases

Compliance: Certain regulations, such as GDPR, CCPA, etc., may require logging of user agents for compliance purposes.

In summary, browser information in HTTP request messages is used to provide the server with important information about the client that can be used to optimize user experience, security and performance, and compliance.

e.g2

TCP/UDP相关

e.g1

 

e.g2

 

e.g3

 

e.g4

e.g5

 

网桥转发表

 

 

3. 网络RSA

 e.g1

Router works on the network layer.  and is responsible for forwarding packets between different networks. It understands IP addresses and makes decisions based on those addresses to send packets from the source network to the destination network.

Switch works on the link layer.It is mainly responsible for transferring data frames between devices in the same network. It uses the MAC address to decide which device the packet should be forwarded to

e.g2

 

3

interface理解为谁和谁是一个子网

subnet1: Host1, host2

subnet2 Host3

subnet3 Host4,host5

25的意思是前面25位都是subnet part,后面才是host part

首先先把ip地址写成二进制的形式

10.0.2.1

00001010  00000000 00000010 0000 0001

这里橙色部分是确定不变的

largest

后面剩7位,所以是2^7-1(留一广播位),127

00001010  00000000 00000010 0111 1110

10.0.2.127

mask 是划分到了25位

255.255.255.1000 0000

所以是

255.255.255. 2^(8-1) = 255.255.255.128

ARP协议只能在一段链路或者一个网络中使用

思路:发的源头没有arp table但是中途是有的

an overview of the steps for sending an IP datagram from Host 1 to Host 5:
Host 1 creates an IP datagram containing the destination IP address of Host 5, and the source IP address of 10.0.1.2, the packet also contains the destination port and source port

Host 1 checks its ARP table to see if it has the MAC address of the next hop router, R1, corresponding to the IP address 10.0.1.1. If it is empty, Host 1 sends an ARP request broadcast to all devices on the local network. Switch 1 receives and forwards.

Router R1 receives the ARP request from switch 1 and checks its ARP table, it finds the corresponding IP address and MAC address of Host 1 (10.0.1.2 and aa-aa-aa-aa-aa-aa) and sends an ARP reply with its own MAC address (11-11-11-11-11-11)

Host 1 receives the ARP reply and updates its ARP table with the IP address and MAC address of R1

Host 1 sends the IP datagram to R1's MAC address, the packet will go to switch 1, switch 1 will check its MAC table and finds the corresponding port to forward the packet to R1

R1 receives the IP datagram, checks its routing table, and finds the route to the destination IP address of Host 5.

R1 checks its ARP table, finds the corresponding MAC address of host 5 and sends the IP datagram directly to host 5, the packet will go to switch 2, switch 2 will check its MAC table and finds the corresponding port to forward the packet to Host 5.

Host 5 receives the IP datagram.

3.加密

e.g1

Symmetric cryptosystems have a problem of key transportation. The secret key is to be transmitted to the receiving system before the actual message is to be transmitted. Every means of electronic communication is insecure as it is impossible to guarantee that no one will be able to tap communication channels.

A disadvantage of using public-key cryptography for encryption is speed. There are many secret-key encryption methods that are significantly faster than any currently available public-key encryption method.

When there is no CA distributing the public keys, the main problem that arises is the problem of trust. Without a trusted third party to issue and distribute the public keys, it can be difficult for the parties involved to trust that the key they are using actually belongs to the intended recipient.

Additionally, without a CA, there will be no way to verify the authenticity of the public key, or to ensure that the public key belongs to a specific individual or organization. This could make it easier for an attacker to impersonate a legitimate entity or to create a false identity and use it to intercept or manipulate sensitive information.

Another problem with not having a CA is the difficulty in revocation of keys. In case of a compromised key, there will be no authority responsible to revoke the key, this would mean the compromised key would continue to be used which would be a huge security risk.

In summary, without a CA distributing public keys, it can be difficult for parties to trust the authenticity of the keys, increasing the risk of man-in-the-middle attacks or impersonation, and would make it harder to ensure the authenticity of the public keys and to revoke them in case of compromise.
感觉它好喜欢好喜欢考disadvantage

如果没有钥匙认证就很容易伪造钥匙,会传递错误的信息给对方

e.g2

 

x不会考

session key 会话密钥

8 bit hash value = 2^8 hash values

The total number of possible 4096-byte data blocks is 2^(4096 * 8)

Since we have a uniform hash function, each of the 256 hash values is equally likely to be produced for any of the 2^(32768) data blocks.

Number of data blocks per hash value = 2^(32768) / 256 = 2^(32768 - 8)

e.g3

 

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/1377964.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

中国信通院联合发布《数字孪生城市白皮书(2023年)》

2017年“数字孪生城市”概念被首次提出,2021年我国“十四五”规划纲要明确“探索建设数字孪生城市”,2023年《数字中国建设整体布局规划》再次提出“全面提升数字中国建设的整体性、系统性、协同性”以及“探索建设数字孪生城市”等要求。数字孪生城市建…

ES高级查询

ES中提供了一种强大的检索数据方式,这种检索方式称为Query DSL,这种方式的丰富查询语法让ES检索变得更强大,更简洁。 1.常见查询 1.1查询所有[match_all] match_all关键字:返回索引中的全部文档。 GET /products/_search { &…

基于springboot+vue药店管理系统

摘要 药店管理系统的设计和应用在当前社会背景下具有巨大的实际意义和社会价值。随着医药行业的不断发展和社会健康水平的提高,药店作为医疗服务的一部分,其管理方式也需要不断创新与优化。该系统的研究不仅关系到单一药店的运营效率,更涉及到…

CSS 中的伪装大师:伪类和伪元素的奇妙世界

🤍 前端开发工程师(主业)、技术博主(副业)、已过CET6 🍨 阿珊和她的猫_CSDN个人主页 🕠 牛客高级专题作者、在牛客打造高质量专栏《前端面试必备》 🍚 蓝桥云课签约作者、已在蓝桥云…

【设计模式-04】Factory工厂模式

简要描述 简单工厂静态工厂工厂方法 FactoryMethod 产品维度扩展 抽象工厂 产品一族进行扩展Spring IOC 一、工厂的定义 任何可以产生对象的方法或类,都可以称之为工厂单例也是一种工厂不可咬文嚼字,死扣概念为什么有了new之后,还要有工厂&am…

一阶低通滤波器

一阶低通滤波器 X为输入,Y为滤波后得到的输出值;本次的输出结果主要取决于上次的滤波输出值,其中a是和滤波效果有关的一个参数,称为滤波系数;它决定新采样值在本次滤波结果中所占的权重; 滤波系数a越小&a…

12GoF之代理模式

解决问题的思维:AOP 解决问题技术:代理技术 代理技术太麻烦,因此使用框架 Spring AOP框架(底层是代理技术:jdk动态daili,cglib) 代理模式是GoF23种设计模式之一。属于结构型设计模式。 代理…

【BetterBench】2024年都有哪些数学建模竞赛和大数据竞赛?

2024年每个月有哪些竞赛? 2024年32个数学建模和数据挖掘竞赛重磅来袭!!! 2024年数学建模和数学挖掘竞赛时间目录汇总 一月 (1)2024年第二届“华数杯”国际大学生数学建模竞赛 报名时间:即日起…

List列表操作中的坑

使用 Arrays.asList 把数据转换为 List 的三个坑 在如下代码中,我们初始化三个数字的 int[]数组,然后使用 Arrays.asList 把数组转换为 List: int[] arr {1, 2, 3}; List list Arrays.asList(arr); log.info("list:{} size:{} class…

Angular - 笔记

文章目录 语法属性绑定引用模板变量组件绑定父组件传子组件 input子组件传父组件 outputEventEmitter ViewChildViewChildren获取子组件对象列表 管道常用模块 函数localStorage实现数据持久化简介使用 参考文档 语法 属性绑定 Angular 的双向绑定语法是方括号和圆括号的组合 …

代码随想录算法训练DAY23|二叉树9

算法训练DAY23|二叉树9 669. 修剪二叉搜索树 力扣题目链接 给定一个二叉搜索树,同时给定最小边界L 和最大边界 R。通过修剪二叉搜索树,使得所有节点的值在[L, R]中 (R>L) 。你可能需要改变树的根节点,所以结果应当返回修剪好的二叉搜索…

如何使用 Python、Node.js 和 Go 创建基于 YOLOv8 的对象检测 Web 服务

1. 介绍 这是有关 YOLOv8 系列文章的第二篇。在上一篇文章中我们介绍了YOLOv8以及如何使用它,然后展示了如何使用 Python 和基于 PyTorch 的官方 YOLOv8 库创建一个 Web 服务来检测图像上的对象。 在本文中,将展示如何在不需要PyTorch和官方API的情况下…

【Python进阶必备】一文掌握re库:实战正则表达式

目录 re库初识 re库基础使用方法 compile()函数 基本用法 正则表达式常用规则字符 match与search方法 match search match/search findall与finditer方法 使用findall()返回所有匹配项 使用findall()提取多个组的匹配 使用finditer()逐个返回Match对象 使用findi…

STM32---基本定时器(含源码)小白可入

写在前面:定时器是STM32中一个十分重要的外设,并且在STM32中具有多个定时器。定时器的包括基本定时器、通用定时器以及高级控制定时器,这些定时器相关独立,不共享任何资源。当然,其难易程度也是逐渐增加的,…

U盘启动安装win11遇到缺少计算机所需的介质驱动程序问题

一、使用U盘制作启动盘遇到问题 下载了windows原版镜像,验证了md5,确保文件没有损坏。使用ultroiso制作u盘启动盘,开始安装后出现下图的报错: 在网上搜索解决方案,主要有以下几种: 安装的时候&#xff0c…

2024年【电工(初级)】最新解析及电工(初级)模拟考试

题库来源:安全生产模拟考试一点通公众号小程序 电工(初级)最新解析根据新电工(初级)考试大纲要求,安全生产模拟考试一点通将电工(初级)模拟考试试题进行汇编,组成一套电…

直接写一区! ZOA-PCNN-AT-SVM斑马优化并行卷积-支持向量机融合注意力机制的故障识别程序,特征可视化,实验多!图多!

适用平台:Matlab2023版本及以上 本原创程序提出的ZOA-PCNN-AT-SVM故障识别模型还没有人写!在此基础上进一步对参考模型进行多重改进,程序注释清晰,干货满满,下面对文章和程序做简要介绍! ①识别模型部分参…

【竞技宝】DOTA2:梦幻联赛开战在即 中国区前两名将晋级正赛

北京时间2024年1月12日,近期DOTA2刚刚结束了别墅杯东南亚/中国区的封闭预选赛,而别墅杯的正赛还要等到下个月才会正式开打,而即将在明天开始进行的是梦幻联赛S22的中国区预选赛,除官方直邀的XG战队直接晋级正赛之外,其…

C++力扣题目106,105--中序和后序,前序和中序遍历构造二叉树

106.从中序与后序遍历序列构造二叉树 力扣题目链接(opens new window) 根据一棵树的中序遍历与后序遍历构造二叉树。 注意: 你可以假设树中没有重复的元素。 例如,给出 中序遍历 inorder [9,3,15,20,7]后序遍历 postorder [9,15,7,20,3] 返回如下的二叉树&am…

功能强大:JMeter 常用插件全解析

JMeter 作为一个开源的接口性能测试工具,其本身的小巧和灵活性给了测试人员很大的帮助,但其本身作为一个开源工具,相比于一些商业工具(比如 LoadRunner),在功能的全面性上就稍显不足。这篇博客,…