●Networks can be interconnected by different devices.In the physical layer,networks can be connected by (66) or Hubs,which just move the bits from one network to an identical network.One layer up we find bridgas and swiehes,which operate at data link layer.They can accept (67) ,examine the MAC address,and forward the frames to a different network while doing minor protocol translation in the process.In the network layer,we have routers that can connect two netwoks.If two networks have (68) network layer,the router may be able to translate between the packet formats.In the transport layer we find transport gateway,which can interface between the two transport connections.Finally,in the application layer,application gateways translate message (69) .As an example,gateways between Internet e-mail and X.400 e-mail must (70) the e-mail message and change various header fields.(66) A.reapersB.relaysC.connectsD.modems(67) A.framesB.bytesC.packagesD.cells(68) A.specialB.dependentC.similarD.dissimilar(69) A.syntaxB.semanticsC.languagesD.format(70) A.analyzeB.pairsC.deleteD.create

●Networks can be interconnected by different devices.In the physical layer,networks can be connected by (66) or Hubs,which just move the bits from one network to an identical network.One layer up we find bridgas and swiehes,which operate at data link layer.They can accept (67) ,examine the MAC address,and forward the frames to a different network while doing minor protocol translation in the process.In the network layer,we have routers that can connect two netwoks.If two networks have (68) network layer,the router may be able to translate between the packet formats.In the transport layer we find transport gateway,which can interface between the two transport connections.Finally,in the application layer,application gateways translate message (69) .As an example,gateways between Internet e-mail and X.400 e-mail must (70) the e-mail message and change various header fields.

(66) A.reapers

B.relays

C.connects

D.modems

(67) A.frames

B.bytes

C.packages

D.cells

(68) A.special

B.dependent

C.similar

D.dissimilar

(69) A.syntax

B.semantics

C.languages

D.format

(70) A.analyze

B.pairs

C.delete

D.create


相关考题:

文中( 2 )处正确的答案是( )。A./etc/networks/dhcpdB./usr/sbin/dhcpC./etc/networks/dhcpD./usr/sbin/dhcpd

文中( 3 )处正确的答案是( )。A./etc/dhcpd.confB./etc/dhcp.confC./networks/dhcpd.confD./networks/dhcp.conf

In most WANs, the network contains numerous cables or telephone lines, each one connecting a pair ofA.hostsB.routersC.serversD.networks

The price you quoted is so high that we () help ()this transaction.A、can…to cancelB、can't...cancelingC、can…cancelingD、can't…to cancel

You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:\data.cap file. You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()A. Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.B. Add netmon.exe as the application name. Add the /networks */capture LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.C. Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.D. Add nmconfig.exe as the application name. Add the /networks * /capture LDAP /file e:\data.cap /stopwhen /timeafter 11hours line as arguments.

WhichtwoofthefollowingaretheimposedrestrictionstoproductionredeploymentinWebLogicServer?() A.Can’tcahngeapplication’sdeploymenttargetsB.Can’tcahngeapplication’ssecuritymodelC.Can’tcahngeapplication’snodemanagerD.Can’tcahngeapplication’spersistentstoresettings

TMS320X28XX系列处理器CAN总线接口支持标准()。 A.CAN 2.0A,CAN 2.0CB.CAN 2.0CC.CAN 2.0B,CAN 2.0CD.CAN 2.0A,CAM 2.0B

(72)A.computersB.routersC.switchesD.networks

Together with the network layer,the transport layer is the heart of the protocol ( ).The network layer provides end-to-end () delivery using datagrams or virtual circuits.The transport layer builds on the network layer to provide data transport from a process on a () machine to a process on a destination machine with a desired level of reliability that is independent of the physical (请作答此空) currently in use.It provides the abstractions that applications nedd to use the network..Without the () layer,the whole concept of layered protocols would make little sense.A.trafficB.connectionC.linesD.networks

在Linux中提供DHCP服务的程序是( ).A./etc/networks/dhcpdB./usr/sbin/dhcpC./etc/networks/dhcpD./usr/sbin/dhcpd