求助:he program does not have an entry point or

prettyicy 2009-10-26 09:41:35
求助各位高手:
写了个makefile,make后成功,但运行程序时,提示
0509-151 The program does not have an entry point or
the o_snentry field in the auxiliary header is invalid.
0509-194 Examine file headers with the 'dump -ohv' command.

网上搜了搜,有人遇到相同问题,说是编译的时候少加了一个参数 -brtl
但不知道加在哪里%>_<%

请大家帮帮忙%>_<%
...全文
509 20 打赏 收藏 转发到动态 举报
写回复
用AI写文章
20 条回复
切换为时间正序
请发表友善的回复…
发表回复
fleim 2012-07-05
  • 打赏
  • 举报
回复
AIX 下通常用xlC来编译c++代码,例如我写了一个string的类,包含俩文件 string.h 和 string.cpp ,现在我想将其编译成动态链接库(.so文件),方法为:

xlC -G -o libstring.so string.cpp

AIX下.so文件最好用 libxxxxx.so的方式来命名,因为在后面与其他文件一起编译链接成可执行文件时会好办些

我又写了一个test.cpp 包含main方法 用来测试string.so中的类是不是可以正常使用,现在我们假设libstring.so文件的path为:/home/hello/lib 那么编译链接成可执行文件时,命令为:

xlC -brtl -L/home/hello/lib -lstring -o test test.cpp
(如果找不到,用xlC -brtl /home/hello/lib/libstring.so -o test test.cpp)
xlC 中: -brtl表示: Enables run-time linking for the output file. DCE thread libraries and heap debug libraries are not compatible with run-time linking. Do not specify the -brtl compiler option if you are invoking the compiler with xlc_r4 or xlC_r4, or if the -qheapdebug compiler option is specified.
就是对于输出的可执行文件,启动运行时动态链接,根据公司头的解释,在加入这项时,连接器会在可执行文件和.so文件之间建立一个签名(signature),用来说明他们俩的接口,而.so文件的搜寻和载入则是由OS来负责的。

-L说明.so文件或者.a文件(静态链接库)所在的path,-l说明链接库的名称,比如 我们写 -lxxx ,连接器会去搜寻 libxxx.so 或者 libxxx.a 文件来进行处理。




fleim 2012-07-05
  • 打赏
  • 举报
回复
xlc对应-g;

xlC对应-g或-G。

否则编译后,运行时报如下错误:

exec(): 0509-036 Cannot load program ./t because of the following errors:
0509-151 The program does not have an entry point or
the o_snentry field in the auxiliary header is invalid.
0509-194 Examine file headers with the 'dump -ohv' command.


xue98 2009-10-26
  • 打赏
  • 举报
回复
If the linker command (ld) was used instead of the compiler driver (cc) as follows:
$ cc -c main.c
$ ld main.o func1.so func2.so func3.so -brtl
then the program would print the following error message, since the generated
executable would not contain the necessary start up routine:
$ LIBPATH=$PWD ./a.out
exec(): 0509-036 Cannot load program ./a.out because of the following errors:
0509-151 The program does not have an entry point or
the o_snentry field in the auxiliary header is invalid.
0509-194 Examine file headers with the 'dump -ohv' command.
xue98 2009-10-26
  • 打赏
  • 举报
回复
using the wrong AIX linker. It should be using the executable linker, not the library linker.

好像是连接器的问题

your gcc is using AIX's ld, I'm afraid the fix we have will only work if gcc
is using GNU's ld.

is this gcc the "standard" gcc from AIX?, could you get another one that is
configured to use GNU ld instead?; you could find by running :

$ gcc -print-prog-name=ld
prettyicy 2009-10-26
  • 打赏
  • 举报
回复
好像没有/usr/vacpp/bin/xlC_r、

删除再make,执行依然报相同的错
xue98 2009-10-26
  • 打赏
  • 举报
回复
你把 icytest icytest.o 这两个文件删除了, 然后再 make 一下

你机器上面有 /usr/vacpp/bin/xlC_r 吗?
prettyicy 2009-10-26
  • 打赏
  • 举报
回复
是AIX

make完以后,运行可执行程序
提示
exec(): 0509-036 Cannot load program icytest because of the following errors:
0509-151 The program does not have an entry point or
the o_snentry field in the auxiliary header is invalid.
0509-194 Examine file headers with the 'dump -ohv' command.
prettyicy 2009-10-26
  • 打赏
  • 举报
回复
是AIX

make完以后,运行可执行程序
提示
exec(): 0509-036 Cannot load program icytest because of the following errors:
0509-151 The program does not have an entry point or
the o_snentry field in the auxiliary header is invalid.
0509-194 Examine file headers with the 'dump -ohv' command.
xue98 2009-10-26
  • 打赏
  • 举报
回复
结帖

你用的AIX 系统?
prettyicy 2009-10-26
  • 打赏
  • 举报
回复
谢谢你。
可是运行时还是报错
0509-036 Cannot load program icytest because of the following errors:
0509-151 The program does not have an entry point or
the o_snentry field in the auxiliary header is invalid.
0509-194 Examine file headers with the 'dump -ohv' command.

顺便问下怎么给分。。。
xue98 2009-10-26
  • 打赏
  • 举报
回复
0509-151 The program does not have an entry point or
the o_snentry field in the auxiliary header is invalid.
0509-194 Examine file headers with the 'dump -ohv' command.

报错的前面是什么?
xue98 2009-10-26
  • 打赏
  • 举报
回复
你用的AIX 系统?/
xue98 2009-10-26
  • 打赏
  • 举报
回复
CC = cc $(Q64) -g -brtl
prettyicy 2009-10-26
  • 打赏
  • 举报
回复
是sybase
想写个程序,往表里插记录
xue98 2009-10-26
  • 打赏
  • 举报
回复
你这是连接sybase 数据库的程序吧。
prettyicy 2009-10-26
  • 打赏
  • 举报
回复
在makefile里加上吗?
谢谢你了。
我菜鸟一只还是不懂
xue98 2009-10-26
  • 打赏
  • 举报
回复
[Quote=引用楼主 prettyicy 的回复:]
求助各位高手:
写了个makefile,make后成功,但运行程序时,提示
0509-151 The program does not have an entry point or
                  the o_snentry field in the auxiliary header is invalid.
        0509-194 Examine file headers with the 'dump -ohv' command.

网上搜了搜,有人遇到相同问题,说是编译的时候少加了一个参数  -brtl
但不知道加在哪里%>_ <%

请大家帮帮忙%>_ <%

[/Quote]gcc 的时候
gcc -brtl
但 gcc -b 参数的意思是
-b <machine> Run gcc for target <machine>, if installed
prettyicy 2009-10-26
  • 打赏
  • 举报
回复
Makefile内容如下:

SHELL = sh
CC = cc $(Q64) -g
RM = @rm -f
MV = @mv
CP = @cp
ECHO = @echo

##### sybase used #####
RELDIR = $(SYBASE)/$(SYBASE_OCS)
INCDIR = $(RELDIR)/include
LIBDIR1 = $(RELDIR)/lib
INCLUDE = -I. -I$(INCDIR)
LIBPATH = -L$(LIBDIR1)
PRECOMP = cpre
SYBLIBS = -lct -ltcl -lcs -lcomn -lintl
SYSLIBS = -lm
##### sybase used #####

# paths and flags
BIN = $(HOME)/bin
LIBDIR = $(HOME)/lib

LIBAPL = -lnhapinh -lacct -lln -lbase -lpubdb -lcomm -lbaltcp\
-lpubdb_m -lcom -lde -lcif -lcard\
-lrpt -lrept -lpthreads -lnhlink \
-lct -ltcl -lcs -lcomn -lintl -lnh
INC = -I$(HOME)/src/incl_c -I$(HOME)/src/incl_ec -I$(HOME)/src/incl_pub $(INCLUDE)
CLIB = -L$(HOME)/lib -L. $(LIBPATH)
CFLAGS = $(INC) $(CLIB)
APPINCLUDE= -I$(HOME)/src/incl_c -I$(HOME)/src/incl_ec -I$(HOME)/src/incl_pub
PROCINCLUDE= include=$(HOME)/src/incl_c include=$(HOME)/src/incl_ec include=$(HOME)/src/incl_pub
EFLAGS = $(CFLAGS)

TARGET1 = icytest
OBJS1 = icytest.o \


all: $(TARGET1)

$(TARGET1): $(OBJS1)
$(CC) -G $(LIBPATH) $(SYBLIBS) $(SYSLIBS) $(CFLAGS) -o $@ $(OBJS1)
#$(RM) $(HOME)/lib/$@
#$(MV) $@ $(HOME)/lib

# implicit

.SUFFIXES: .cp .c .o
.cp.o:
$(PRECOMP) $(APPINCLUDE) $*.cp
$(CC) $(INC) -O -g -s -c $*.c
@mv $*.c $*.b
.c.o:
$(CC) $(CFLAGS) $(APPINCLUDE) -g -O -s -c $*.c

# clearing object codes

clean: cleanup
$(RM) $(TARGET)

cleanup:
$(RM) $(OBJS)
cleanall:
$(RM) *.b
$(RM) *.o
$(RM) $(TARGET1)


prettyicy 2009-10-26
  • 打赏
  • 举报
回复
谢谢关注。
程序:
#include <sys/time.h>
#include <unistd.h>
#include <stdio.h>
#include <varargs.h>
#include <errno.h>
#include "public.h"
#include "sybhesql.h"
#define EXTERN
#include <string.h>
#include <fcntl.h>
#include <sys/stat.h>

EXEC SQL INCLUDE SQLCA;



int main(int argc, char *argv[])
{
/*变量定义*/
struct timeval t1,t2;
long long timeoff;
int i=0; /*为了循环插入记录*/
/*宿主变量声明*/
EXEC SQL BEGIN DECLARE SECTION;
char username[30];
char password[30];
char a[21];
double b=0.00;
double c=0.00;
int d=0;
char comm[500];
EXEC SQL END DECLARE SECTION;
/*变量初始化*/
strcpy(username, "dhctran1");
strcpy(password, "dhctran1");
memset(a, 0, sizeof(a));
memset(comm, 0, sizeof(comm));

/*连接数据库*/
EXEC SQL CONNECT :username IDENTIFIED BY :password;
if(sqlca.sqlcode)
{
printf("exec err[%d],[%s]\n", sqlca.sqlcode, sqlca.sqlerrm.sqlerrmc);
return -1;
}

/*写SQL语句*/
strcpy(comm, "insert into icytest values('苹果苹果', 1.2, 0.9, 6)");
strcpy(comm, " insert into icytest values('香蕉香蕉',1.5,1.2,10)");
strcpy(comm, " insert into icytest values('西瓜西瓜', 0.3, 0.2 , 2)");

EXEC SQL set string_rtruncation off; /* 避免9502错误?? */
if(sqlca.sqlcode)
{
/*printf("set err[%d][%s]\n",sqlca.sqlcode, sqlca.sqlerrm.sqlerrm.c);*/
return -1;
}

/*循环插入*/
while(i++<100)
{
get_cur_time(&t1);
/*准备*/
EXEC SQL PREPARE insert_com FROM :comm; /*icytest_insert是语句名*/
/*if(sqlca.sqlcode)
(
printf("prepare err[%d],[%s]\n",sqlca.sqlcode, sqlca.sqlerrm.sqlerrm.c);
return -1;
)*/
/*执行*/
EXEC SQL exec icytest_insert;
if(sqlca.sqlcode)
{
/*printf("exec err[%d][%s]",sqlca.sqlcode, sqlca.sqlerrm.sqlerrm.c);*/
return -1;
}
get_cur_time(&t2);
get_l_time_val(&t1, &t2, &timeoff);
printf("use time=[%lld]\n", timeoff);
}

EXEC SQL COMMIT WORK; /*提交*/
EXEC SQL DISCONNECT ALL; /*断开与服务器的连接*/
printf(";) icytest success!\n");

return 1; /*又返回值的函数一定要有返回值*/
}

xue98 2009-10-26
  • 打赏
  • 举报
回复
程序在哪里?
Computer Networking: A Top-Down Approach, 6th Edition Solutions to Review Questions and Problems Version Date: May 2012 This document contains the solutions to review questions and problems for the 5th edition of Computer Networking: A Top-Down Approach by Jim Kurose and Keith Ross. These solutions are being made available to instructors ONLY. Please do NOT copy or distribute this document to others (even other instructors). Please do not post any solutions on a publicly-available Web site. We’ll be happy to provide a copy (up-to-date) of this solution manual ourselves to anyone who asks. Acknowledgments: Over the years, several students and colleagues have helped us prepare this solutions manual. Special thanks goes to HongGang Zhang, Rakesh Kumar, Prithula Dhungel, and Vijay Annapureddy. Also thanks to all the readers who have made suggestions and corrected errors. All material © copyright 1996-2012 by J.F. Kurose and K.W. Ross. All rights reserved Chapter 1 Review Questions There is no difference. Throughout this text, the words “host” and “end system” are used interchangeably. End systems include PCs, workstations, Web servers, mail servers, PDAs, Internet-connected game consoles, etc. From Wikipedia: Diplomatic protocol is commonly described as a set of international courtesy rules. These well-established and time-honored rules have made it easier for nations and people to live and work together. Part of protocol has always been the acknowledgment of the hierarchical standing of all present. Protocol rules are based on the principles of civility. Standards are important for protocols so that people can create networking systems and products that interoperate. 1. Dial-up modem over telephone line: home; 2. DSL over telephone line: home or small office; 3. Cable to HFC: home; 4. 100 Mbps switched Ethernet: enterprise; 5. Wifi (802.11): home and enterprise: 6. 3G and 4G: wide-area wireless. HFC bandwidth is shared among the users. On the downstream channel, all packets emanate from a single source, namely, the head end. Thus, there are no collisions in the downstream channel. In most American cities, the current possibilities include: dial-up; DSL; cable modem; fiber-to-the-home. 7. Ethernet LANs have transmission rates of 10 Mbps, 100 Mbps, 1 Gbps and 10 Gbps. 8. Today, Ethernet most commonly runs over twisted-pair copper wire. It also can run over fibers optic links. 9. Dial up modems: up to 56 Kbps, bandwidth is dedicated; ADSL: up to 24 Mbps downstream and 2.5 Mbps upstream, bandwidth is dedicated; HFC, rates up to 42.8 Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; 10-20 Mbps download; bandwidth is not shared. 10. There are two popular wireless Internet access technologies today: Wifi (802.11) In a wireless LAN, wireless users transmit/receive packets to/from an base station (i.e., wireless access point) within a radius of few tens of meters. The base station is typically connected to the wired Internet and thus serves to connect wireless users to the wired network. 3G and 4G wide-area wireless access networks. In these systems, packets are transmitted over the same wireless infrastructure used for cellular telephony, with the base station thus being managed by a telecommunications provider. This provides wireless access to users within a radius of tens of kilometers of the base station. 11. At time t0 the sending host begins to transmit. At time t1 = L/R1, the sending host completes transmission and the entire packet is received at the router (no propagation delay). Because the router has the entire packet at time t1, it can begin to transmit the packet to the receiving host at time t1. At time t2 = t1 + L/R2, the router completes transmission and the entire packet is received at the receiving host (again, no propagation delay). Thus, the end-to-end delay is L/R1 + L/R2. 12. A circuit-switched network can guarantee a certain amount of end-to-end bandwidth for the duration of a call. Most packet-switched networks today (including the Internet) cannot make any end-to-end guarantees for bandwidth. FDM requires sophisticated analog hardware to shift signal into appropriate frequency bands. 13. a) 2 users can be supported because each user requires half of the link bandwidth. b) Since each user requires 1Mbps when transmitting, if two or fewer users transmit simultaneously, a maximum of 2Mbps will be required. Since the available bandwidth of the shared link is 2Mbps, there will be no queuing delay before the link. Whereas, if three users transmit simultaneously, the bandwidth required will be 3Mbps which is more than the available bandwidth of the shared link. In this case, there will be queuing delay before the link. c) Probability that a given user is transmitting = 0.2 d) Probability that all three users are transmitting simultaneously = = (0.2)3 = 0.008. Since the queue grows when all the users are transmitting, the fraction of time during which the queue grows (which is equal to the probability that all three users are transmitting simultaneously) is 0.008. 14. If the two ISPs do not peer with each other, then when they send traffic to each other they have to send the traffic through a provider ISP (intermediary), to which they have to pay for carrying the traffic. By peering with each other directly, the two ISPs can reduce their payments to their provider ISPs. An Internet Exchange Points (IXP) (typically in a standalone building with its own switches) is a meeting point where multiple ISPs can connect and/or peer together. An ISP earns its money by charging each of the the ISPs that connect to the IXP a relatively small fee, which may depend on the amount of traffic sent to or received from the IXP. 15. Google's private network connects together all its data centers, big and small. Traffic between the Google data centers passes over its private network rather than over the public Internet. Many of these data centers are located in, or close to, lower tier ISPs. Therefore, when Google delivers content to a user, it often can bypass higher tier ISPs. What motivates content providers to create these networks? First, the content provider has more control over the user experience, since it has to use few intermediary ISPs. Second, it can save money by sending less traffic into provider networks. Third, if ISPs decide to charge more money to highly profitable content providers (in countries where net neutrality doesn't apply), the content providers can avoid these extra payments. 16. The delay components are processing delays, transmission delays, propagation delays, and queuing delays. All of these delays are fixed, except for the queuing delays, which are variable. 17. a) 1000 km, 1 Mbps, 100 bytes b) 100 km, 1 Mbps, 100 bytes 18. 10msec; d/s; no; no 19. a) 500 kbps b) 64 seconds c) 100kbps; 320 seconds 20. End system A breaks the large file into chunks. It adds header to each chunk, thereby generating multiple packets from the file. The header in each packet includes the IP address of the destination (end system B). The packet switch uses the destination IP address in the packet to determine the outgoing link. Asking which road to take is analogous to a packet asking which outgoing link it should be forwarded on, given the packet’s destination address. 21. The maximum emission rate is 500 packets/sec and the maximum transmission rate is 350 packets/sec. The corresponding traffic intensity is 500/350 =1.43 > 1. Loss will eventually occur for each experiment; but the time when loss first occurs will be different from one experiment to the next due to the randomness in the emission process. 22. Five generic tasks are error control, flow control, segmentation and reassembly, multiplexing, and connection setup. Yes, these tasks can be duplicated at different layers. For example, error control is often provided at more than one layer. 23. The five layers in the Internet protocol stack are – from top to bottom – the application layer, the transport layer, the network layer, the link layer, and the physical layer. The principal responsibilities are outlined in Section 1.5.1. 24. Application-layer message: data which an application wants to send and passed onto the transport layer; transport-layer segment: generated by the transport layer and encapsulates application-layer message with transport layer header; network-layer datagram: encapsulates transport-layer segment with a network-layer header; link-layer frame: encapsulates network-layer datagram with a link-layer header. 25. Routers process network, link and physical layers (layers 1 through 3). (This is a little bit of a white lie, as modern routers sometimes act as firewalls or caching components, and process Transport layer as well.) Link layer switches process link and physical layers (layers 1 through2). Hosts process all five layers. 26. a) Virus Requires some form of human interaction to spread. Classic example: E-mail viruses. b) Worms No user replication needed. Worm in infected host scans IP addresses and port numbers, looking for vulnerable processes to infect. 27. Creation of a botnet requires an attacker to find vulnerability in some application or system (e.g. exploiting the buffer overflow vulnerability that might exist in an application). After finding the vulnerability, the attacker needs to scan for hosts that are vulnerable. The target is basically to compromise a series of systems by exploiting that particular vulnerability. Any system that is part of the botnet can automatically scan its environment and propagate by exploiting the vulnerability. An important property of such botnets is that the originator of the botnet can remotely control and issue commands to all the nodes in the botnet. Hence, it becomes possible for the attacker to issue a command to all the nodes, that target a single node (for example, all nodes in the botnet might be commanded by the attacker to send a TCP SYN message to the target, which might result in a TCP SYN flood attack at the target). 28. Trudy can pretend to be Bob to Alice (and vice-versa) and partially or completely modify the message(s) being sent from Bob to Alice. For example, she can easily change the phrase “Alice, I owe you $1000” to “Alice, I owe you $10,000”. Furthermore, Trudy can even drop the packets that are being sent by Bob to Alice (and vise-versa), even if the packets from Bob to Alice are encrypted. Chapter 1 Problems Problem 1 There is no single right answer to this question. Many protocols would do the trick. Here's a simple answer below: Messages from ATM machine to Server Msg name purpose -------- ------- HELO Let server know that there is a card in the ATM machine ATM card transmits user ID to Server PASSWD User enters PIN, which is sent to server BALANCE User requests balance WITHDRAWL User asks to withdraw money BYE user all done Messages from Server to ATM machine (display) Msg name purpose -------- ------- PASSWD Ask user for PIN (password) OK last requested operation (PASSWD, WITHDRAWL) OK ERR last requested operation (PASSWD, WITHDRAWL) in ERROR AMOUNT sent in response to BALANCE request BYE user done, display welcome screen at ATM Correct operation: client server HELO (userid) --------------> (check if valid userid) <------------- PASSWD PASSWD --------------> (check password) <------------- AMOUNT WITHDRAWL --------------> check if enough $ to cover withdrawl (check if valid userid) <------------- PASSWD PASSWD --------------> (check password) <------------- AMOUNT WITHDRAWL --------------> check if enough $ to cover withdrawl <------------- BYE Problem 2 At time N*(L/R) the first packet has reached the destination, the second packet is stored in the last router, the third packet is stored in the next-to-last router, etc. At time N*(L/R) + L/R, the second packet has reached the destination, the third packet is stored in the last router, etc. Continuing with this logic, we see that at time N*(L/R) + (P-1)*(L/R) = (N+P-1)*(L/R) all packets have reached the destination. Problem 3 a) A circuit-switched network would be well suited to the application, because the application involves long sessions with predictable smooth bandwidth requirements. Since the transmission rate is known and not bursty, bandwidth can be reserved for each application session without significant waste. In addition, the overhead costs of setting up and tearing down connections are amortized over the lengthy duration of a typical application session. b) In the worst case, all the applications simultaneously transmit over one or more network links. However, since each link has sufficient bandwidth to handle the sum of all of the applications' data rates, no congestion (very little queuing) will occur. Given such generous link capacities, the network does not need congestion control mechanisms. Problem 4 Between the switch in the upper left and the switch in the upper right we can have 4 connections. Similarly we can have four connections between each of the 3 other pairs of adjacent switches. Thus, this network can support up to 16 connections. We can 4 connections passing through the switch in the upper-right-hand corner and another 4 connections passing through the switch in the lower-left-hand corner, giving a total of 8 connections. Yes. For the connections between A and C, we route two connections through B and two connections through D. For the connections between B and D, we route two connections through A and two connections through C. In this manner, there are at most 4 connections passing through any link. Problem 5 Tollbooths are 75 km apart, and the cars propagate at 100km/hr. A tollbooth services a car at a rate of one car every 12 seconds. a) There are ten cars. It takes 120 seconds, or 2 minutes, for the first tollbooth to service the 10 cars. Each of these cars has a propagation delay of 45 minutes (travel 75 km) before arriving at the second tollbooth. Thus, all the cars are lined up before the second tollbooth after 47 minutes. The whole process repeats itself for traveling between the second and third tollbooths. It also takes 2 minutes for the third tollbooth to service the 10 cars. Thus the total delay is 96 minutes. b) Delay between tollbooths is 8*12 seconds plus 45 minutes, i.e., 46 minutes and 36 seconds. The total delay is twice this amount plus 8*12 seconds, i.e., 94 minutes and 48 seconds. Problem 6 a) seconds. b) seconds. c) seconds. d) The bit is just leaving Host A. e) The first bit is in the link and has not reached Host B. f) The first bit has reached Host B. g) Want km. Problem 7 Consider the first bit in a packet. Before this bit can be transmitted, all of the bits in the packet must be generated. This requires sec=7msec. The time required to transmit the packet is sec= sec. Propagation delay = 10 msec. The delay until decoding is 7msec + sec + 10msec = 17.224msec A similar analysis shows that all bits experience a delay of 17.224 msec. Problem 8 a) 20 users can be supported. b) . c) . d) . We use the central limit theorem to approximate this probability. Let be independent random variables such that . “21 or more users” when is a standard normal r.v. Thus “21 or more users” . Problem 9 10,000 Problem 10 The first end system requires L/R1 to transmit the packet onto the first link; the packet propagates over the first link in d1/s1; the packet switch adds a processing delay of dproc; after receiving the entire packet, the packet switch connecting the first and the second link requires L/R2 to transmit the packet onto the second link; the packet propagates over the second link in d2/s2. Similarly, we can find the delay caused by the second switch and the third link: L/R3, dproc, and d3/s3. Adding these five delays gives dend-end = L/R1 + L/R2 + L/R3 + d1/s1 + d2/s2 + d3/s3+ dproc+ dproc To answer the second question, we simply plug the values into the equation to get 6 + 6 + 6 + 20+16 + 4 + 3 + 3 = 64 msec. Problem 11 Because bits are immediately transmitted, the packet switch does not introduce any delay; in particular, it does not introduce a transmission delay. Thus, dend-end = L/R + d1/s1 + d2/s2+ d3/s3 For the values in Problem 10, we get 6 + 20 + 16 + 4 = 46 msec. Problem 12 The arriving packet must first wait for the link to transmit 4.5 *1,500 bytes = 6,750 bytes or 54,000 bits. Since these bits are transmitted at 2 Mbps, the queuing delay is 27 msec. Generally, the queuing delay is (nL + (L - x))/R. Problem 13 The queuing delay is 0 for the first transmitted packet, L/R for the second transmitted packet, and generally, (n-1)L/R for the nth transmitted packet. Thus, the average delay for the N packets is: (L/R + 2L/R + ....... + (N-1)L/R)/N = L/(RN) * (1 + 2 + ..... + (N-1)) = L/(RN) * N(N-1)/2 = LN(N-1)/(2RN) = (N-1)L/(2R) Note that here we used the well-known fact: 1 + 2 + ....... + N = N(N+1)/2 It takes seconds to transmit the packets. Thus, the buffer is empty when a each batch of packets arrive. Thus, the average delay of a packet across all batches is the average delay within one batch, i.e., (N-1)L/2R. Problem 14 The transmission delay is . The total delay is Let . Total delay = For x=0, the total delay =0; as we increase x, total delay increases, approaching infinity as x approaches 1/a. Problem 15 Total delay . Problem 16 The total number of packets in the system includes those in the buffer and the packet that is being transmitted. So, N=10+1. Because , so (10+1)=a*(queuing delay + transmission delay). That is, 11=a*(0.01+1/100)=a*(0.01+0.01). Thus, a=550 packets/sec. Problem 17 There are nodes (the source host and the routers). Let denote the processing delay at the th node. Let be the transmission rate of the th link and let . Let be the propagation delay across the th link. Then . Let denote the average queuing delay at node . Then . Problem 18 On linux you can use the command traceroute www.targethost.com and in the Windows command prompt you can use tracert www.targethost.com In either case, you will get three delay measurements. For those three measurements you can calculate the mean and standard deviation. Repeat the experiment at different times of the day and comment on any changes. Here is an example solution: Traceroutes between San Diego Super Computer Center and www.poly.edu The average (mean) of the round-trip delays at each of the three hours is 71.18 ms, 71.38 ms and 71.55 ms, respectively. The standard deviations are 0.075 ms, 0.21 ms, 0.05 ms, respectively. In this example, the traceroutes have 12 routers in the path at each of the three hours. No, the paths didn’t change during any of the hours. Traceroute packets passed through four ISP networks from source to destination. Yes, in this experiment the largest delays occurred at peering interfaces between adjacent ISPs. Traceroutes from www.stella-net.net (France) to www.poly.edu (USA). The average round-trip delays at each of the three hours are 87.09 ms, 86.35 ms and 86.48 ms, respectively. The standard deviations are 0.53 ms, 0.18 ms, 0.23 ms, respectively. In this example, there are 11 routers in the path at each of the three hours. No, the paths didn’t change during any of the hours. Traceroute packets passed three ISP networks from source to destination. Yes, in this experiment the largest delays occurred at peering interfaces between adjacent ISPs. Problem 19 An example solution: Traceroutes from two different cities in France to New York City in United States In these traceroutes from two different cities in France to the same destination host in United States, seven links are in common including the transatlantic link. In this example of traceroutes from one city in France and from another city in Germany to the same host in United States, three links are in common including the transatlantic link. Traceroutes to two different cities in China from same host in United States Five links are common in the two traceroutes. The two traceroutes diverge before reaching China Problem 20 Throughput = min{Rs, Rc, R/M} Problem 21 If only use one path, the max throughput is given by: . If use all paths, the max throughput is given by . Problem 22 Probability of successfully receiving a packet is: ps= (1-p)N. The number of transmissions needed to be performed until the packet is successfully received by the client is a geometric random variable with success probability ps. Thus, the average number of transmissions needed is given by: 1/ps . Then, the average number of re-transmissions needed is given by: 1/ps -1. Problem 23 Let’s call the first packet A and call the second packet B. If the bottleneck link is the first link, then packet B is queued at the first link waiting for the transmission of packet A. So the packet inter-arrival time at the destination is simply L/Rs. If the second link is the bottleneck link and both packets are sent back to back, it must be true that the second packet arrives at the input queue of the second link before the second link finishes the transmission of the first packet. That is, L/Rs + L/Rs + dprop = L/Rs + dprop + L/Rc Thus, the minimum value of T is L/Rc  L/Rs . Problem 24 40 terabytes = 40 * 1012 * 8 bits. So, if using the dedicated link, it will take 40 * 1012 * 8 / (100 *106 ) =3200000 seconds = 37 days. But with FedEx overnight delivery, you can guarantee the data arrives in one day, and it should cost less than $100. Problem 25 160,000 bits 160,000 bits The bandwidth-delay product of a link is the maximum number of bits that can be in the link. the width of a bit = length of link / bandwidth-delay product, so 1 bit is 125 meters long, which is longer than a football field s/R Problem 26 s/R=20000km, then R=s/20000km= 2.5*108/(2*107)= 12.5 bps Problem 27 80,000,000 bits 800,000 bits, this is because that the maximum number of bits that will be in the link at any given time = min(bandwidth delay product, packet size) = 800,000 bits. .25 meters Problem 28 ttrans + tprop = 400 msec + 80 msec = 480 msec. 20 * (ttrans + 2 tprop) = 20*(20 msec + 80 msec) = 2 sec. Breaking up a file takes longer to transmit because each data packet and its corresponding acknowledgement packet add their own propagation delays. Problem 29 Recall geostationary satellite is 36,000 kilometers away from earth surface. 150 msec 1,500,000 bits 600,000,000 bits Problem 30 Let’s suppose the passenger and his/her bags correspond to the data unit arriving to the top of the protocol stack. When the passenger checks in, his/her bags are checked, and a tag is attached to the bags and ticket. This is additional information added in the Baggage layer if Figure 1.20 that allows the Baggage layer to implement the service or separating the passengers and baggage on the sending side, and then reuniting them (hopefully!) on the destination side. When a passenger then passes through security and additional stamp is often added to his/her ticket, indicating that the passenger has passed through a security check. This information is used to ensure (e.g., by later checks for the security information) secure transfer of people. Problem 31 Time to send message from source host to first packet switch = With store-and-forward switching, the total time to move message from source host to destination host = Time to send 1st packet from source host to first packet switch = . . Time at which 2nd packet is received at the first switch = time at which 1st packet is received at the second switch = Time at which 1st packet is received at the destination host = . After this, every 5msec one packet will be received; thus time at which last (800th) packet is received = . It can be seen that delay in using message segmentation is significantly less (almost 1/3rd). Without message segmentation, if bit errors are not tolerated, if there is a single bit error, the whole message has to be retransmitted (rather than a single packet). Without message segmentation, huge packets (containing HD videos, for example) are sent into the network. Routers have to accommodate these huge packets. Smaller packets have to queue behind enormous packets and suffer unfair delays. Packets have to be put in sequence at the destination. Message segmentation results in many smaller packets. Since header size is usually the same for all packets regardless of their size, with message segmentation the total amount of header bytes is more. Problem 32 Yes, the delays in the applet correspond to the delays in the Problem 31.The propagation delays affect the overall end-to-end delays both for packet switching and message switching equally. Problem 33 There are F/S packets. Each packet is S=80 bits. Time at which the last packet is received at the first router is sec. At this time, the first F/S-2 packets are at the destination, and the F/S-1 packet is at the second router. The last packet must then be transmitted by the first router and the second router, with each transmission taking sec. Thus delay in sending the whole file is To calculate the value of S which leads to the minimum delay, Problem 34 The circuit-switched telephone networks and the Internet are connected together at "gateways". When a Skype user (connected to the Internet) calls an ordinary telephone, a circuit is established between a gateway and the telephone user over the circuit switched network. The skype user's voice is sent in packets over the Internet to the gateway. At the gateway, the voice signal is reconstructed and then sent over the circuit. In the other direction, the voice signal is sent over the circuit switched network to the gateway. The gateway packetizes the voice signal and sends the voice packets to the Skype user.   Chapter 2 Review Questions The Web: HTTP; file transfer: FTP; remote login: Telnet; e-mail: SMTP; BitTorrent file sharing: BitTorrent protocol Network architecture refers to the organization of the communication process into layers (e.g., the five-layer Internet architecture). Application architecture, on the other hand, is designed by an application developer and dictates the broad structure of the application (e.g., client-server or P2P). The process which initiates the communication is the client; the process that waits to be contacted is the server. No. In a P2P file-sharing application, the peer that is receiving a file is typically the client and the peer that is sending the file is typically the server. The IP address of the destination host and the port number of the socket in the destination process. You would use UDP. With UDP, the transaction can be completed in one roundtrip time (RTT) - the client sends the transaction request into a UDP socket, and the server sends the reply back to the client's UDP socket. With TCP, a minimum of two RTTs are needed - one to set-up the TCP connection, and another for the client to send the request, and for the server to send back the reply. One such example is remote word processing, for example, with Google docs. However, because Google docs runs over the Internet (using TCP), timing guarantees are not provided. a) Reliable data transfer TCP provides a reliable byte-stream between client and server but UDP does not. b) A guarantee that a certain value for throughput will be maintained Neither c) A guarantee that data will be delivered within a specified amount of time Neither d) Confidentiality (via encryption) Neither SSL operates at the application layer. The SSL socket takes unencrypted data from the application layer, encrypts it and then passes it to the TCP socket. If the application developer wants TCP to be enhanced with SSL, she has to include the SSL code in the application. A protocol uses handshaking if the two communicating entities first exchange control packets before sending data to each other. SMTP uses handshaking at the application layer whereas HTTP does not. The applications associated with those protocols require that all application data be received in the correct order and without gaps. TCP provides this service whereas UDP does not. When the user first visits the site, the server creates a unique identification number, creates an entry in its back-end database, and returns this identification number as a cookie number. This cookie number is stored on the user’s host and is managed by the browser. During each subsequent visit (and purchase), the browser sends the cookie number back to the site. Thus the site knows when this user (more precisely, this browser) is visiting the site. Web caching can bring the desired content “closer” to the user, possibly to the same LAN to which the user’s host is connected. Web caching can reduce the delay for all objects, even objects that are not cached, since caching reduces the traffic on links. Telnet is not available in Windows 7 by default. to make it available, go to Control Panel, Programs and Features, Turn Windows Features On or Off, Check Telnet client. To start Telnet, in Windows command prompt, issue the following command > telnet webserverver 80 where "webserver" is some webserver. After issuing the command, you have established a TCP connection between your client telnet program and the web server. Then type in an HTTP GET message. An example is given below: Since the index.html page in this web server was not modified since Fri, 18 May 2007 09:23:34 GMT, and the above commands were issued on Sat, 19 May 2007, the server returned "304 Not Modified". Note that the first 4 lines are the GET message and header lines inputed by the user, and the next 4 lines (starting from HTTP/1.1 304 Not Modified) is the response from the web server. FTP uses two parallel TCP connections, one connection for sending control information (such as a request to transfer a file) and another connection for actually transferring the file. Because the control information is not sent over the same connection that the file is sent over, FTP sends control information out of band. The message is first sent from Alice’s host to her mail server over HTTP. Alice’s mail server then sends the message to Bob’s mail server over SMTP. Bob then transfers the message from his mail server to his host over POP3. 17. Received: from 65.54.246.203 (EHLO bay0-omc3-s3.bay0.hotmail.com) (65.54.246.203) by mta419.mail.mud.yahoo.com with SMTP; Sat, 19 May 2007 16:53:51 -0700 Received: from hotmail.com ([65.55.135.106]) by bay0-omc3-s3.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.2668); Sat, 19 May 2007 16:52:42 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Sat, 19 May 2007 16:52:41 -0700 Message-ID: Received: from 65.55.135.123 by by130fd.bay130.hotmail.msn.com with HTTP; Sat, 19 May 2007 23:52:36 GMT From: "prithula dhungel" To: prithula@yahoo.com Bcc: Subject: Test mail Date: Sat, 19 May 2007 23:52:36 +0000 Mime-Version: 1.0 Content-Type: Text/html; format=flowed Return-Path: prithuladhungel@hotmail.com Figure: A sample mail message header Received: This header field indicates the sequence in which the SMTP servers send and receive the mail message including the respective timestamps. In this example there are 4 “Received:” header lines. This means the mail message passed through 5 different SMTP servers before being delivered to the receiver’s mail box. The last (forth) “Received:” header indicates the mail message flow from the SMTP server of the sender to the second SMTP server in the chain of servers. The sender’s SMTP server is at address 65.55.135.123 and the second SMTP server in the chain is by130fd.bay130.hotmail.msn.com. The third “Received:” header indicates the mail message flow from the second SMTP server in the chain to the third server, and so on. Finally, the first “Received:” header indicates the flow of the mail messages from the forth SMTP server to the last SMTP server (i.e. the receiver’s mail server) in the chain. Message-id: The message has been given this number BAY130-F26D9E35BF59E0D18A819AFB9310@phx.gbl (by bay0-omc3-s3.bay0.hotmail.com. Message-id is a unique string assigned by the mail system when the message is first created. From: This indicates the email address of the sender of the mail. In the given example, the sender is “prithuladhungel@hotmail.com” To: This field indicates the email address of the receiver of the mail. In the example, the receiver is “prithula@yahoo.com” Subject: This gives the subject of the mail (if any specified by the sender). In the example, the subject specified by the sender is “Test mail” Date: The date and time when the mail was sent by the sender. In the example, the sender sent the mail on 19th May 2007, at time 23:52:36 GMT. Mime-version: MIME version used for the mail. In the example, it is 1.0. Content-type: The type of content in the body of the mail message. In the example, it is “text/html”. Return-Path: This specifies the email address to which the mail will be sent if the receiver of this mail wants to reply to the sender. This is also used by the sender’s mail server for bouncing back undeliverable mail messages of mailer-daemon error messages. In the example, the return path is “prithuladhungel@hotmail.com”. With download and delete, after a user retrieves its messages from a POP server, the messages are deleted. This poses a problem for the nomadic user, who may want to access the messages from many different machines (office PC, home PC, etc.). In the download and keep configuration, messages are not deleted after the user retrieves the messages. This can also be inconvenient, as each time the user retrieves the stored messages from a new machine, all of non-deleted messages will be transferred to the new machine (including very old messages). Yes an organization’s mail server and Web server can have the same alias for a host name. The MX record is used to map the mail server’s host name to its IP address. You should be able to see the sender's IP address for a user with an .edu email address. But you will not be able to see the sender's IP address if the user uses a gmail account. It is not necessary that Bob will also provide chunks to Alice. Alice has to be in the top 4 neighbors of Bob for Bob to send out chunks to her; this might not occur even if Alice provides chunks to Bob throughout a 30-second interval. Recall that in BitTorrent, a peer picks a random peer and optimistically unchokes the peer for a short period of time. Therefore, Alice will eventually be optimistically unchoked by one of her neighbors, during which time she will receive chunks from that neighbor. The overlay network in a P2P file sharing system consists of the nodes participating in the file sharing system and the logical links between the nodes. There is a logical link (an “edge” in graph theory terms) from node A to node B if there is a semi-permanent TCP connection between A and B. An overlay network does not include routers. Mesh DHT: The advantage is in order to a route a message to the peer (with ID) that is closest to the key, only one hop is required; the disadvantage is that each peer must track all other peers in the DHT. Circular DHT: the advantage is that each peer needs to track only a few other peers; the disadvantage is that O(N) hops are needed to route a message to the peer that is closest to the key. 25. File Distribution Instant Messaging Video Streaming Distributed Computing With the UDP server, there is no welcoming socket, and all data from different clients enters the server through this one socket. With the TCP server, there is a welcoming socket, and each time a client initiates a connection to the server, a new socket is created. Thus, to support n simultaneous connections, the server would need n+1 sockets. For the TCP application, as soon as the client is executed, it attempts to initiate a TCP connection with the server. If the TCP server is not running, then the client will fail to make a connection. For the UDP application, the client does not initiate connections (or attempt to communicate with the UDP server) immediately upon execution Chapter 2 Problems Problem 1 a) F b) T c) F d) F e) F Problem 2 Access control commands: USER, PASS, ACT, CWD, CDUP, SMNT, REIN, QUIT. Transfer parameter commands: PORT, PASV, TYPE STRU, MODE. Service commands: RETR, STOR, STOU, APPE, ALLO, REST, RNFR, RNTO, ABOR, DELE, RMD, MRD, PWD, LIST, NLST, SITE, SYST, STAT, HELP, NOOP. Problem 3 Application layer protocols: DNS and HTTP Transport layer protocols: UDP for DNS; TCP for HTTP Problem 4 The document request was http://gaia.cs.umass.edu/cs453/index.html. The Host : field indicates the server's name and /cs453/index.html indicates the file name. The browser is running HTTP version 1.1, as indicated just before the first pair. The browser is requesting a persistent connection, as indicated by the Connection: keep-alive. This is a trick question. This information is not contained in an HTTP message anywhere. So there is no way to tell this from looking at the exchange of HTTP messages alone. One would need information from the IP datagrams (that carried the TCP segment that carried the HTTP GET request) to answer this question. Mozilla/5.0. The browser type information is needed by the server to send different versions of the same object to different types of browsers. Problem 5 The status code of 200 and the phrase OK indicate that the server was able to locate the document successfully. The reply was provided on Tuesday, 07 Mar 2008 12:39:45 Greenwich Mean Time. The document index.html was last modified on Saturday 10 Dec 2005 18:27:46 GMT. There are 3874 bytes in the document being returned. The first five bytes of the returned document are : point of view, the connection is being closed while it was idle, but from the client's point of view, a request is in progress.” Problem 7 The total amount of time to get the IP address is . Once the IP address is known, elapses to set up the TCP connection and another elapses to request and receive the small object. The total response time is Problem 8 . . Problem 9 The time to transmit an object of size L over a link or rate R is L/R. The average time is the average size of the object divided by R:  = (850,000 bits)/(15,000,000 bits/sec) = .0567 sec The traffic intensity on the link is given by =(16 requests/sec)(.0567 sec/request) = 0.907. Thus, the average access delay is (.0567 sec)/(1 - .907)  .6 seconds. The total average response time is therefore .6 sec + 3 sec = 3.6 sec. The traffic intensity on the access link is reduced by 60% since the 60% of the requests are satisfied within the institutional network. Thus the average access delay is (.0567 sec)/[1 – (.4)(.907)] = .089 seconds. The response time is approximately zero if the request is satisfied by the cache (which happens with probability .6); the average response time is .089 sec + 3 sec = 3.089 sec for cache misses (which happens 40% of the time). So the average response time is (.6)(0 sec) + (.4)(3.089 sec) = 1.24 seconds. Thus the average response time is reduced from 3.6 sec to 1.24 sec. Problem 10 Note that each downloaded object can be completely put into one data packet. Let Tp denote the one-way propagation delay between the client and the server. First consider parallel downloads using non-persistent connections. Parallel downloads would allow 10 connections to share the 150 bits/sec bandwidth, giving each just 15 bits/sec. Thus, the total time needed to receive all objects is given by: (200/150+Tp + 200/150 +Tp + 200/150+Tp + 100,000/150+ Tp ) + (200/(150/10)+Tp + 200/(150/10) +Tp + 200/(150/10)+Tp + 100,000/(150/10)+ Tp ) = 7377 + 8*Tp (seconds) Now consider a persistent HTTP connection. The total time needed is given by: (200/150+Tp + 200/150 +Tp + 200/150+Tp + 100,000/150+ Tp ) + 10*(200/150+Tp + 100,000/150+ Tp ) =7351 + 24*Tp (seconds) Assuming the speed of light is 300*106 m/sec, then Tp=10/(300*106)=0.03 microsec. Tp is therefore negligible compared with transmission delay. Thus, we see that persistent HTTP is not significantly faster (less than 1 percent) than the non-persistent case with parallel download. Problem 11 Yes, because Bob has more connections, he can get a larger share of the link bandwidth. Yes, Bob still needs to perform parallel downloads; otherwise he will get less bandwidth than the other four users. Problem 12 Server.py from socket import * serverPort=12000 serverSocket=socket(AF_INET,SOCK_STREAM) serverSocket.bind(('',serverPort)) serverSocket.listen(1) connectionSocket, addr = serverSocket.accept() while 1: sentence = connectionSocket.recv(1024) print 'From Server:', sentence, '\n' serverSocket.close() Problem 13 The MAIL FROM: in SMTP is a message from the SMTP client that identifies the sender of the mail message to the SMTP server. The From: on the mail message itself is NOT an SMTP message, but rather is just a line in the body of the mail message. Problem 14 SMTP uses a line containing only a period to mark the end of a message body. HTTP uses “Content-Length header field” to indicate the length of a message body. No, HTTP cannot use the method used by SMTP, because HTTP message could be binary data, whereas in SMTP, the message body must be in 7-bit ASCII format. Problem 15 MTA stands for Mail Transfer Agent. A host sends the message to an MTA. The message then follows a sequence of MTAs to reach the receiver’s mail reader. We see that this spam message follows a chain of MTAs. An honest MTA should report where it receives the message. Notice that in this message, “asusus-4b96 ([58.88.21.177])” does not report from where it received the email. Since we assume only the originator is dishonest, so “asusus-4b96 ([58.88.21.177])” must be the originator. Problem 16 UIDL abbreviates “unique-ID listing”. When a POP3 client issues the UIDL command, the server responds with the unique message ID for all of the messages present in the user's mailbox. This command is useful for “download and keep”. By maintaining a file that lists the messages retrieved during earlier sessions, the client can use the UIDL command to determine which messages on the server have already been seen. Problem 17 a) C: dele 1 C: retr 2 S: (blah blah … S: ………..blah) S: . C: dele 2 C: quit S: +OK POP3 server signing off b) C: retr 2 S: blah blah … S: ………..blah S: . C: quit S: +OK POP3 server signing off C: list S: 1 498 S: 2 912 S: . C: retr 1 S: blah ….. S: ….blah S: . C: retr 2 S: blah blah … S: ………..blah S: . C: quit S: +OK POP3 server signing off Problem 18 For a given input of domain name (such as ccn.com), IP address or network administrator name, the whois database can be used to locate the corresponding registrar, whois server, DNS server, and so on. NS4.YAHOO.COM from www.register.com; NS1.MSFT.NET from ww.register.com Local Domain: www.mindspring.com Web servers : www.mindspring.com 207.69.189.21, 207.69.189.22, 207.69.189.23, 207.69.189.24, 207.69.189.25, 207.69.189.26, 207.69.189.27, 207.69.189.28 Mail Servers : mx1.mindspring.com (207.69.189.217) mx2.mindspring.com (207.69.189.218) mx3.mindspring.com (207.69.189.219) mx4.mindspring.com (207.69.189.220) Name Servers: itchy.earthlink.net (207.69.188.196) scratchy.earthlink.net (207.69.188.197) www.yahoo.com Web Servers: www.yahoo.com (216.109.112.135, 66.94.234.13) Mail Servers: a.mx.mail.yahoo.com (209.191.118.103) b.mx.mail.yahoo.com (66.196.97.250) c.mx.mail.yahoo.com (68.142.237.182, 216.39.53.3) d.mx.mail.yahoo.com (216.39.53.2) e.mx.mail.yahoo.com (216.39.53.1) f.mx.mail.yahoo.com (209.191.88.247, 68.142.202.247) g.mx.mail.yahoo.com (209.191.88.239, 206.190.53.191) Name Servers: ns1.yahoo.com (66.218.71.63) ns2.yahoo.com (68.142.255.16) ns3.yahoo.com (217.12.4.104) ns4.yahoo.com (68.142.196.63) ns5.yahoo.com (216.109.116.17) ns8.yahoo.com (202.165.104.22) ns9.yahoo.com (202.160.176.146) www.hotmail.com Web Servers: www.hotmail.com (64.4.33.7, 64.4.32.7) Mail Servers: mx1.hotmail.com (65.54.245.8, 65.54.244.8, 65.54.244.136) mx2.hotmail.com (65.54.244.40, 65.54.244.168, 65.54.245.40) mx3.hotmail.com (65.54.244.72, 65.54.244.200, 65.54.245.72) mx4.hotmail.com (65.54.244.232, 65.54.245.104, 65.54.244.104) Name Servers: ns1.msft.net (207.68.160.190) ns2.msft.net (65.54.240.126) ns3.msft.net (213.199.161.77) ns4.msft.net (207.46.66.126) ns5.msft.net (65.55.238.126) d) The yahoo web server has multiple IP addresses www.yahoo.com (216.109.112.135, 66.94.234.13) e) The address range for Polytechnic University: 128.238.0.0 – 128.238.255.255 f) An attacker can use the whois database and nslookup tool to determine the IP address ranges, DNS server addresses, etc., for the target institution. By analyzing the source address of attack packets, the victim can use whois to obtain information about domain from which the attack is coming and possibly inform the administrators of the origin domain. Problem 19 The following delegation chain is used for gaia.cs.umass.edu a.root-servers.net E.GTLD-SERVERS.NET ns1.umass.edu(authoritative) First command: dig +norecurse @a.root-servers.net any gaia.cs.umass.edu ;; AUTHORITY SECTION: edu. 172800 IN NS E.GTLD-SERVERS.NET. edu. 172800 IN NS A.GTLD-SERVERS.NET. edu. 172800 IN NS G3.NSTLD.COM. edu. 172800 IN NS D.GTLD-SERVERS.NET. edu. 172800 IN NS H3.NSTLD.COM. edu. 172800 IN NS L3.NSTLD.COM. edu. 172800 IN NS M3.NSTLD.COM. edu. 172800 IN NS C.GTLD-SERVERS.NET. Among all returned edu DNS servers, we send a query to the first one. dig +norecurse @E.GTLD-SERVERS.NET any gaia.cs.umass.edu umass.edu. 172800 IN NS ns1.umass.edu. umass.edu. 172800 IN NS ns2.umass.edu. umass.edu. 172800 IN NS ns3.umass.edu. Among all three returned authoritative DNS servers, we send a query to the first one. dig +norecurse @ns1.umass.edu any gaia.cs.umass.edu gaia.cs.umass.edu. 21600 IN A 128.119.245.12 The answer for google.com could be: a.root-servers.net E.GTLD-SERVERS.NET ns1.google.com(authoritative) Problem 20 We can periodically take a snapshot of the DNS caches in the local DNS servers. The Web server that appears most frequently in the DNS caches is the most popular server. This is because if more users are interested in a Web server, then DNS requests for that server are more frequently sent by users. Thus, that Web server will appear in the DNS caches more frequently. For a complete measurement study, see: Craig E. Wills, Mikhail Mikhailov, Hao Shang “Inferring Relative Popularity of Internet Applications by Actively Querying DNS Caches”, in IMC'03, October 27­29, 2003, Miami Beach, Florida, USA Problem 21 Yes, we can use dig to query that Web site in the local DNS server. For example, “dig cnn.com” will return the query time for finding cnn.com. If cnn.com was just accessed a couple of seconds ago, an entry for cnn.com is cached in the local DNS cache, so the query time is 0 msec. Otherwise, the query time is large. Problem 22 For calculating the minimum distribution time for client-server distribution, we use the following formula: Dcs = max {NF/us, F/dmin} Similarly, for calculating the minimum distribution time for P2P distribution, we use the following formula: Where, F = 15 Gbits = 15 * 1024 Mbits us = 30 Mbps dmin = di = 2 Mbps Note, 300Kbps = 300/1024 Mbps. Client Server N 10 100 1000 u 300 Kbps 7680 51200 512000 700 Kbps 7680 51200 512000 2 Mbps 7680 51200 512000 Peer to Peer N 10 100 1000 u 300 Kbps 7680 25904 47559 700 Kbps 7680 15616 21525 2 Mbps 7680 7680 7680 Problem 23 Consider a distribution scheme in which the server sends the file to each client, in parallel, at a rate of a rate of us/N. Note that this rate is less than each of the client’s download rate, since by assumption us/N ≤ dmin. Thus each client can also receive at rate us/N. Since each client receives at rate us/N, the time for each client to receive the entire file is F/( us/N) = NF/ us. Since all the clients receive the file in NF/ us, the overall distribution time is also NF/ us. Consider a distribution scheme in which the server sends the file to each client, in parallel, at a rate of dmin. Note that the aggregate rate, N dmin, is less than the server’s link rate us, since by assumption us/N ≥ dmin. Since each client receives at rate dmin, the time for each client to receive the entire file is F/ dmin. Since all the clients receive the file in this time, the overall distribution time is also F/ dmin. From Section 2.6 we know that DCS ≥ max {NF/us, F/dmin} (Equation 1) Suppose that us/N ≤ dmin. Then from Equation 1 we have DCS ≥ NF/us . But from (a) we have DCS ≤ NF/us . Combining these two gives: DCS = NF/us when us/N ≤ dmin. (Equation 2) We can similarly show that: DCS =F/dmin when us/N ≥ dmin (Equation 3). Combining Equation 2 and Equation 3 gives the desired result. Problem 24 Define u = u1 + u2 + ….. + uN. By assumption us <= (us + u)/N Equation 1 Divide the file into N parts, with the ith part having size (ui/u)F. The server transmits the ith part to peer i at rate ri = (ui/u)us. Note that r1 + r2 + ….. + rN = us, so that the aggregate server rate does not exceed the link rate of the server. Also have each peer i forward the bits it receives to each of the N-1 peers at rate ri. The aggregate forwarding rate by peer i is (N-1)ri. We have (N-1)ri = (N-1)(usui)/u = (us + u)/N Equation 2 Let ri = ui/(N-1) and rN+1 = (us – u/(N-1))/N In this distribution scheme, the file is broken into N+1 parts. The server sends bits from the ith part to the ith peer (i = 1, …., N) at rate ri. Each peer i forwards the bits arriving at rate ri to each of the other N-1 peers. Additionally, the server sends bits from the (N+1) st part at rate rN+1 to each of the N peers. The peers do not forward the bits from the (N+1)st part. The aggregate send rate of the server is r1+ …. + rN + N rN+1 = u/(N-1) + us – u/(N-1) = us Thus, the server’s send rate does not exceed its link rate. The aggregate send rate of peer i is (N-1)ri = ui Thus, each peer’s send rate does not exceed its link rate. In this distribution scheme, peer i receives bits at an aggregate rate of Thus each peer receives the file in NF/(us+u). (For simplicity, we neglected to specify the size of the file part for i = 1, …., N+1. We now provide that here. Let Δ = (us+u)/N be the distribution time. For i = 1, …, N, the ith file part is Fi = ri Δ bits. The (N+1)st file part is FN+1 = rN+1 Δ bits. It is straightforward to show that F1+ ….. + FN+1 = F.) The solution to this part is similar to that of 17 (c). We know from section 2.6 that Combining this with a) and b) gives the desired result. Problem 25 There are N nodes in the overlay network. There are N(N-1)/2 edges. Problem 26 Yes. His first claim is possible, as long as there are enough peers staying in the swarm for a long enough time. Bob can always receive data through optimistic unchoking by other peers. His second claim is also true. He can run a client on each host, let each client “free-ride,” and combine the collected chunks from the different hosts into a single file. He can even write a small scheduling program to make the different hosts ask for different chunks of the file. This is actually a kind of Sybil attack in P2P networks. Problem 27 Peer 3 learns that peer 5 has just left the system, so Peer 3 asks its first successor (Peer 4) for the identifier of its immediate successor (peer 8). Peer 3 will then make peer 8 its second successor. Problem 28 Peer 6 would first send peer 15 a message, saying “what will be peer 6’s predecessor and successor?” This message gets forwarded through the DHT until it reaches peer 5, who realizes that it will be 6’s predecessor and that its current successor, peer 8, will become 6’s successor. Next, peer 5 sends this predecessor and successor information back to 6. Peer 6 can now join the DHT by making peer 8 its successor and by notifying peer 5 that it should change its immediate successor to 6. Problem 29 For each key, we first calculate the distances (using d(k,p)) between itself and all peers, and then store the key in the peer that is closest to the key (that is, with smallest distance value). Problem 30 Yes, randomly assigning keys to peers does not consider the underlying network at all, so it very likely causes mismatches. Such mismatches may degrade the search performance. For example, consider a logical path p1 (consisting of only two logical links): ABC, where A and B are neighboring peers, and B and C are neighboring peers. Suppose that there is another logical path p2 from A to C (consisting of 3 logical links): ADEC. It might be the case that A and B are very far away physically (and separated by many routers), and B and C are very far away physically (and separated by many routers). But it may be the case that A, D, E, and C are all very close physically (and all separated by few routers). In other words, a shorter logical path may correspond to a much longer physical path. Problem 31 If you run TCPClient first, then the client will attempt to make a TCP connection with a non-existent server process. A TCP connection will not be made. UDPClient doesn't establish a TCP connection with the server. Thus, everything should work fine if you first run UDPClient, then run UDPServer, and then type some input into the keyboard. If you use different port numbers, then the client will attempt to establish a TCP connection with the wrong process or a non-existent process. Errors will occur. Problem 32 In the original program, UDPClient does not specify a port number when it creates the socket. In this case, the code lets the underlying operating system choose a port number. With the additional line, when UDPClient is executed, a UDP socket is created with port number 5432 . UDPServer needs to know the client port number so that it can send packets back to the correct client socket. Glancing at UDPServer, we see that the client port number is not “hard-wired” into the server code; instead, UDPServer determines the client port number by unraveling the datagram it receives from the client. Thus UDP server will work with any client port number, including 5432. UDPServer therefore does not need to be modified. Before: Client socket = x (chosen by OS) Server socket = 9876 After: Client socket = 5432 Problem 33 Yes, you can configure many browsers to open multiple simultaneous connections to a Web site. The advantage is that you will you potentially download the file faster. The disadvantage is that you may be hogging the bandwidth, thereby significantly slowing down the downloads of other users who are sharing the same physical links. Problem 34 For an application such as remote login (telnet and ssh), a byte-stream oriented protocol is very natural since there is no notion of message boundaries in the application. When a user types a character, we simply drop the character into the TCP connection. In other applications, we may be sending a series of messages that have inherent boundaries between them. For example, when one SMTP mail server sends another SMTP mail server several email messages back to back. Since TCP does not have a mechanism to indicate the boundaries, the application must add the indications itself, so that receiving side of the application can distinguish one message from the next. If each message were instead put into a distinct UDP segment, the receiving end would be able to distinguish the various messages without any indications added by the sending side of the application. Problem 35 To create a web server, we need to run web server software on a host. Many vendors sell web server software. However, the most popular web server software today is Apache, which is open source and free. Over the years it has been highly optimized by the open-source community. Problem 36 The key is the infohash, the value is an IP address that currently has the file designated by the infohash.   Chapter 3 Review Questions Call this protocol Simple Transport Protocol (STP). At the sender side, STP accepts from the sending process a chunk of data not exceeding 1196 bytes, a destination host address, and a destination port number. STP adds a four-byte header to each chunk and puts the port number of the destination process in this header. STP then gives the destination host address and the resulting segment to the network layer. The network layer delivers the segment to STP at the destination host. STP then examines the port number in the segment, extracts the data from the segment, and passes the data to the process identified by the port number. The segment now has two header fields: a source port field and destination port field. At the sender side, STP accepts a chunk of data not exceeding 1192 bytes, a destination host address, a source port number, and a destination port number. STP creates a segment which contains the application data, source port number, and destination port number. It then gives the segment and the destination host address to the network layer. After receiving the segment, STP at the receiving host gives the application process the application data and the source port number. No, the transport layer does not have to do anything in the core; the transport layer “lives” in the end systems. For sending a letter, the family member is required to give the delegate the letter itself, the address of the destination house, and the name of the recipient. The delegate clearly writes the recipient’s name on the top of the letter. The delegate then puts the letter in an envelope and writes the address of the destination house on the envelope. The delegate then gives the letter to the planet’s mail service. At the receiving side, the delegate receives the letter from the mail service, takes the letter out of the envelope, and takes note of the recipient name written at the top of the letter. The delegate then gives the letter to the family member with this name. No, the mail service does not have to open the envelope; it only examines the address on the envelope. Source port number y and destination port number x. An application developer may not want its application to use TCP’s congestion control, which can throttle the application’s sending rate at times of congestion. Often, designers of IP telephony and IP videoconference applications choose to run their applications over UDP because they want to avoid TCP’s congestion control. Also, some applications do not need the reliable data transfer provided by TCP. Since most firewalls are configured to block UDP traffic, using TCP for video and voice traffic lets the traffic though the firewalls. Yes. The application developer can put reliable data transfer into the application layer protocol. This would require a significant amount of work and debugging, however. Yes, both segments will be directed to the same socket. For each received segment, at the socket interface, the operating system will provide the process with the IP addresses to determine the origins of the individual segments. For each persistent connection, the Web server creates a separate “connection socket”. Each connection socket is identified with a four-tuple: (source IP address, source port number, destination IP address, destination port number). When host C receives and IP datagram, it examines these four fields in the datagram/segment to determine to which socket it should pass the payload of the TCP segment. Thus, the requests from A and B pass through different sockets. The identifier for both of these sockets has 80 for the destination port; however, the identifiers for these sockets have different values for source IP addresses. Unlike UDP, when the transport layer passes a TCP segment’s payload to the application process, it does not specify the source IP address, as this is implicitly specified by the socket identifier. Sequence numbers are required for a receiver to find out whether an arriving packet contains new data or is a retransmission. To handle losses in the channel. If the ACK for a transmitted packet is not received within the duration of the timer for the packet, the packet (or its ACK or NACK) is assumed to have been lost. Hence, the packet is retransmitted. A timer would still be necessary in the protocol rdt 3.0. If the round trip time is known then the only advantage will be that, the sender knows for sure that either the packet or the ACK (or NACK) for the packet has been lost, as compared to the real scenario, where the ACK (or NACK) might still be on the way to the sender, after the timer expires. However, to detect the loss, for each packet, a timer of constant duration will still be necessary at the sender. The packet loss caused a time out after which all the five packets were retransmitted. Loss of an ACK didn’t trigger any retransmission as Go-Back-N uses cumulative acknowledgements. The sender was unable to send sixth packet as the send window size is fixed to 5. When the packet was lost, the received four packets were buffered the receiver. After the timeout, sender retransmitted the lost packet and receiver delivered the buffered packets to application in correct order. Duplicate ACK was sent by the receiver for the lost ACK. The sender was unable to send sixth packet as the send win
这是复习及备战六级的秘籍,很赞的资源哦2008年6月大学英语六级A卷真题 Part I Writing (30 minutes) Will E-books Replace Traditional Books? 1.随着信息技术的发展,电子图书越来越多; 2.有人认为电子图书将会取代传统图书,理由是… 3.我的看法。 Part Ⅱ Reading Comprehension(Skimming and Scanning)(15 minutes) What Will the World Be Like in Fifty Years? This week some top scientists, including Nobel Prize winners, gave their vision of how the world will look in 2056, from gas-powered cars to extraordinary health advances, John Ingham reports on what the world’s finest minds believe our futures will be. For those of us lucky enough to live that long, 2056 will be a world of almost perpetual youth, where obesity is a remote memory and robots become our companions. We will be rubbing shoulders with aliens and colonising outer space. Better still, our descendants might at last live in a world at peace with itself. The prediction is that we will have found a source of inexhaustible, safe, green energy, and that science will have killed off religion. If they are right we will have removed two of the main causes of war-our dependence on oil and religious prejudice. Will we really, as today’s scientists claim, be able to live for ever or at least cheat the ageing process so that the average person lives to 150? Of course, all these predictions come with a scientific health warning. Harvard professor Steven Pinker says: “This is an invitation to look foolish, as with the predictions of domed cities and nuclear-powered vacuum cleaners that were made 50 year ago.” Living longer Anthony Atala, director of the Wake Forest Institute in North Carolina, believes failing organs will be repaired by injecting cells into the body. They will naturally go straight to the injury and help heal it. A system of injections without needles could also slow the ageing process by using the same process to “tune” cells. Bruce Lahn, professor of human genetics at the University of Chicago, anticipates the ability to produce “unlimited supplies” of transplantable human organs without the need for human donors. These organs would be grown in animals such as pigs. When a patient needed a new organ, such as a kidney, the surgeon would contact a commercial organ producer, give him the patient’s immunological profile and would then be sent a kidney with the correct tissue type. These organs would be entirely composed of human cells, grown by introducing them into animal hosts, and allowing them to develop into an organ in place of the animal’s own. But Prof. Lahn believes that farmed brains would be “off limits”. He says: “Very few people would want to have their brains replaced by someone else’s and we probably don’t want to put a human brain in an animal body.” Richard Miller, a professor at the University of Michigan, thinks scientist could develop “authentic anti-ageing drugs” by working out how cells in larger animals such as whales and human resist many forms of injuries. He says: “It is now routine, in laboratory mammals, to extend lifespan by about 40%. Turning on the same protective systems in people should, by 2056, create the first class of 100-year-olds who are as vigorous and productive as today’s people in their 60s” Aliens Colin Pillinger, professor of planetary sciences at the Open University, says: I fancy that at least we will be able to show that life did start to evolve on Mars well as Earth.” Within 50years he hopes scientists will prove that alien life came here in Martian meteorites(陨石). Chris McKay, a planetary scientist at NASA’s Ames Research Center. believes that in 50 years we may find evidence of alien life in the ancient permanent frost of Mars or on other planers. He adds: There is even a chance we will find alien life forms here on Earth. It might be as different as English is to Chinese. Princeton professor Freeman Dyson thinks it “likely” that life form outer space will be discovered before 2056 because the tools for finding it, such as optical and radio detection and data processing, are improving. He says: “As soon as the first evidence is found, we will know what to look for and additional discoveries are likely to follow quickly. Such discoveries are likely to have revolutionary consequences for biology, astronomy and philosophy. They may also change the way we look at ourselves and our place in the universe.” Colonies in space Richard Gott, professor of astrophysics at Princeton, hopes man will set up a self-sufficient colony on Mars, which would be a “life insurance policy against whatever catastrophes, natural or otherwise, might occur on Earth. “The real space race is whether we will colonise off Earth on to other worlds before money for the space programme runs out.” Spinal injuries Ellen Heber-Katz, a professor at the Wistar Institute in Philadelphia, foresees cures for injuries causing paralysis such as the one that afflicted Superman star Christopher Reeve. She says: “I believe that the day is not far off when we will be able to prescribe drugs that cause severed (断裂的) spinal cords to heal, hearts to regenerate and lost limbs to regrow.” “People will come to expect that injured or diseased organs are meant to be repaired from within, in much the same way that we fix an appliance or automobile: by replacing the damaged part with a manufacturer-certified new part.” She predicts that within 5 to 10 years fingers and toes will be regrown and limbs will start to be regrown a few years later. Repairs to the nervous system will start with optic nerves and, in time, the spinal cord.” Within 50 years whole body replacement will be routine,” Prof. Heber-Katz adds. Obesity Sydney Brenner, senior distinguished fellow of the Crick-Jacobs Center in California, won the 2002 Nobel Prize for Medicine and says that if there is a global disaster some humans will survive-and evolution will favour small people with bodies large enough to support the required amount of brain power.” Obesity,” he says.” will have been solved.” Robots Rodney Brooks, professor of robotics at MIT, says the problems of developing artificial intelligence for robots will be at least partly overcome. As a result, “the possibilities for robots working with people will open up immensely” Energy Bill Joy, green technology expert in California, says:” The most significant breakthrough would be to have an inexhaustible source of safe, green energy that is substantially cheaper than any existing energy source.” Ideally, such a source would be safe in that it could not be made into weapons and would not make hazardous or toxic waste or carbon dioxide, the main greenhouse gas blamed for global warming. Society Geoffrey Miller, evolutionary psychologist at the University of New Mexico, says: The US will follow the UK in realizing that religion is not a prerequisite (前提)for ordinary human decency. “This, science will kill religion-not by reason challenging faith but by offering a more practical, universal and rewarding moral framework for human interaction.” He also predicts that “absurdly wasteful” displays of wealth will become unfashionable while the importance of close-knit communities and families will become clearer. These three changer, he says, will help make us all” brighter, wiser, happier and kinder”. 1.What is john lngham’s report about? A) A solution to the global energy crisis B) Extraordinary advances in technology. C) The latest developments of medical science D) Scientists’ vision of the world in half a century 2. According to Harvard professor Steven Pinker, predictions about the future_____. A) may invite trouble B) may not come true C) will fool the public D) do more harm than good 3. Professor Bruce Lahn of the University of Chicago predicts that____. A) humans won’t have to donate organs for transplantation B) more people will donate their organs for transplantation C) animal organs could be transplanted into human bodies D) organ transplantation won’t be as scary as it is today 4. According to professor Richard Miller of the University of Michigan, people will____. A) life for as long as they wish B) be relieved from all sufferings C) live to 100 and more with vitality D) be able to live longer than whales 5.Priceton professor Freeman Dyson thinks that____. A) scientists will find alien life similar to ours B) humans will be able to settle on Mars C) alien life will likely be discovered D) life will start to evolve on Mars 6.According to Princeton professor Richard Gott, by setting up a self-sufficient colony on Mars, Humans_____. A) might survive all catastrophes on earth B) might acquire ample natural resources C) Will be able to travel to Mars freely D)Will move there to live a better life 7.Ellen Heber-Katz, professor at the Wistar Institute in Philadelphia, predicts that_____. A) human organs can be manufactured like appliances B) people will be as strong and dynamic as supermen C) human nerves can be replaced by optic fibers D) lost fingers and limbs will be able to regrow 8. Rodney Brooks says that it will be possible for robots to work with humans as a result of the development of _____ 9. The most significant breakthrough predicted by Bill Joy will be an inexhaustible green energy source that can’t be used to make__. 10. According to Geoffrey Miller, science will offer a more practical, universal and rewarding moral framework in place of_______. Part III Listening Comprehension (35minutes) Section A 11. A) The man might be able to play in the World Cup. B) The man’s football career seems to be at an end. C) The man was operated on a few weeks ago. D) The man is a fan of world-famous football players. 12. A) Work out a plan to tighten his budget B) Find out the opening hours of the cafeteria. C) Apply for a senior position in the restaurant. D) Solve his problem by doing a part-time job. 13. A) A financial burden. B) A good companion C) A real nuisance. D) A well-trained pet. 14. A) The errors will be corrected soon. B) The woman was mistaken herself. C) The computing system is too complex. D) He has called the woman several times. 15. A) He needs help to retrieve his files. B) He has to type his paper once more. C) He needs some time to polish his paper. D) He will be away for a two-week conference. 16. A) They might have to change their plan. B) He has got everything set for their trip. C) He has a heavier workload than the woman. D) They could stay in the mountains until June 8. 17. A) They have to wait a month to apply for a student loan. B) They can find the application forms in the brochure. C) They are not eligible for a student loan. D) They are not late for a loan application. 18. A) New laws are yet to be made to reduce pollutant release. B) Pollution has attracted little attention from the public. C) The quality of air will surely change for the better. D) It’ll take years to bring air pollution under control. Questions 19 to 22 are based on the conversation you have just heard. 19. A) Enormous size of its stores. B) Numerous varieties of food. C) Its appealing surroundings. D) Its rich and colorful history. 20. A) An ancient building. B) A world of antiques. C) An Egyptian museum. D) An Egyptian Memorial. 21. A) Its power bill reaches £9 million a year. B) It sells thousands of light bulbs a day. C) It supplies power to a nearby town. D) It generates 70% of the electricity it uses. 22. A) 11,500 B) 30,000 C) 250,000 D) 300,000 Questions 23 to 25 are based on the conversation you have just heard. 23. A) Transferring to another department. B) Studying accounting at a university C) Thinking about doing a different job. D) Making preparations for her wedding. 24. A) She has finally got a promotion and a pay raise. B) She has got a satisfactory job in another company. C) She could at last leave the accounting department. D) She managed to keep her position in the company. 25. A) He and Andrea have proved to be a perfect match. B) He changed his mind about marriage unexpectedly. C) He declared that he would remain single all his life. D) He would marry Andrea even without meeting her. Section B Passage One Questions 26 to 29 are based on the passage you have just heard. 26.A) They are motorcycles designated for water sports. B) They are speedy boats restricted in narrow waterways. C) They are becoming an efficient form of water transportation. D) They are getting more popular as a means or water recreation. 27.A) Water scooter operators’ lack of experience. B) Vacationers’ disregard of water safety rules. C) Overloading of small boats and other craft. D) Carelessness of people boating along the shore. 28.A) They scare whales to death. B) They produce too much noise. C) They discharge toxic emissions. D) They endanger lots of water life. 29.A)Expand operating areas. B) Restrict operating hours. C) Limit the use of water scooters. D) Enforce necessary regulations. Passage Two Questions 30 to 32 are based on the passage you have just heard. 30.A) They are stable. B) They are close. C) They are strained. D) They are changing. 31.A) They are fully occupied with their own business. B) Not many of them stay in the same place for long. C) Not many of them can win trust from their neighbors. D) They attach less importance to interpersonal relations. 32.A) Count on each other for help. B) Give each other a cold shoulder. C) Keep a friendly distance. D) Build a fence between them. Passage Three Questions 33 to 35 are based on the passage you have just heard. 33.A) It may produce an increasing number of idle youngsters. B) It may affect the quality of higher education in America. C) It may cause many schools to go out of operation. D) It may lead to a lack of properly educated workers. 34. A)It is less serious in cities than in rural areas. B) It affects both junior and senior high schools. C) It results from a worsening economic climate. D) It is a new challenge facing American educators. 35. A) Allowing them to choose their favorite teachers. B) Creating a more relaxed learning environment. C) Rewarding excellent academic performance. D) Helping them to develop better study habits. Section C I'm interested in the criminal justice system of our country. It seems to me that something has to be done if we’re to (36) ___ as a country. I certainly don't know what the answers to our problems are. Things certainly get (37) ____in a hurry when you get into them. But I wonder if something couldn't be done to deal with some of these problems. One thing I'm concerned about is our practice of putting (38) _____ in jail who haven't harmed anyone. Why not work out some system (39) _____ they can pay back the debts they owe society instead of (40) ___ another debt by going to prison, and of course, coming under the (41) ____of hardened criminals? I'm also concerned about the short prison sentences people are (42) ______ for serious crimes. Of course, one alternative to this is to (43) ______ capital punishment, but I'm not sure I would be for that. I'm not sure it's right to take an eye for eye. (44) _____. I also think we must do something about the insanity plea. In my opinion, anyone who takes another person’s life intentionally is insane; however, (45) _____. It’s sad, of course, that a person may have to spend the rest of his life, or (46) ______. Part IV Reading Comprehension (Reading in Depth) (25 minutes) Section A Questions 47 to 51 are based on the following passage. If movie trailers(预告片)are supposed to cause a reaction, the preview for "United 93" more than succeeds. Featuring no famous actors, it begins with images of a beautiful morning and passengers boarding an airplane. It takes you a minute to realize what the movie’s even about. That’s when a plane hits the World Trade Center. the effect is visceral(震撼心灵的). When the trailer played before "Inside Man" last week at a Hollywood theater, audience members began calling out, "Too soon!" In New York City, the response was even more dramatic. The Loews theater in Manhattan took the rare step of pulling the trailer from its screens after several complaints. “United 93” is the first feature film to deal explicitly with the events of September 11, 2001, and is certain to ignite an emotional debate. Is it too soon? Should the film have been made at all? More to the point, will anyone want to see it? Other 9/11 projects are on the way as the fifth anniversary of the attacks approaches, most notably Oliver Stone's " World Trade Center." but as the forerunner, “United 93” will take most of the heat, whether it deserves it or not. The real United 93 crashed in a Pennsylvania field after 40 passengers and crew fought back against the terrorists. Writer-director Paul Greengrass has gone to great lengths to be respectful in his depiction of what occurred, proceeding with the film only after securing the approval of every victim's family. "Was I surprised at the agreement? Yes. Very. Usually there’re one or two families who're more reluctant," Greengrass writes in an e-mail. "I was surprised at the extraordinary way the United 93 families have welcomed us into their lives and shared their experiences with us." Carole O'Hare, a family member, says, “They were very open and honest with us, and they made us a part of this whole project.” Universal, which is releasing the film, plans to donate 10% of its opening weekend gross to the Flight 93 National Memorial Fund. That hasn't stopped criticism that the studio is exploiting a national tragedy. O’Hare thinks that’s unfair. “This story has to be told to honor the passengers and crew for what they did,” she says. “But more than that, it raises awareness. Our ports aren’t secure. Our borders aren’t secure. Our airlines still aren’t secure, and this is what happens when you’re not secure. That’s the message I want people to hear.” 47. The trailer for “United 93” succeeded in ________ when it played in the theaters in Hollywood and New York City. 48. The movie “United 93” is sure to give rise to _______________. 49. What did writer-director Paul Greengrass obtain before he proceeded with the movie? 50. Universal, which is releasing “United 93”, has been criticized for _________. 51. Carole O’Hare thinks that besides honoring the passengers and crew for what they did, the purpose of telling the story is to _________ about security. Part IV Reading Comprehension (Reading in Depth) (25 minutes) Section A Questions 47 to 51 are based on the following passage. If movie trailers(预告片)are supposed to cause a reaction, the preview for "United 93" more than succeeds. Featuring no famous actors, it begins with images of a beautiful morning and passengers boarding an airplane. It takes you a minute to realize what the movie’s even about. That’s when a plane hits the World Trade Center. the effect is visceral(震撼心灵的). When the trailer played before "Inside Man" last week at a Hollywood theater, audience members began calling out, "Too soon!" In New York City, the response was even more dramatic. The Loews theater in Manhattan took the rare step of pulling the trailer from its screens after several complaints. “United 93” is the first feature film to deal explicitly with the events of September 11, 2001, and is certain to ignite an emotional debate. Is it too soon? Should the film have been made at all? More to the point, will anyone want to see it? Other 9/11 projects are on the way as the fifth anniversary of the attacks approaches, most notably Oliver Stone's " World Trade Center." but as the forerunner, “United 93” will take most of the heat, whether it deserves it or not. The real United 93 crashed in a Pennsylvania field after 40 passengers and crew fought back against the terrorists. Writer-director Paul Greengrass has gone to great lengths to be respectful in his depiction of what occurred, proceeding with the film only after securing the approval of every victim's family. "Was I surprised at the agreement? Yes. Very. Usually there’re one or two families who're more reluctant," Greengrass writes in an e-mail. "I was surprised at the extraordinary way the United 93 families have welcomed us into their lives and shared their experiences with us." Carole O'Hare, a family member, says, “They were very open and honest with us, and they made us a part of this whole project.” Universal, which is releasing the film, plans to donate 10% of its opening weekend gross to the Flight 93 National Memorial Fund. That hasn't stopped criticism that the studio is exploiting a national tragedy. O’Hare thinks that’s unfair. “This story has to be told to honor the passengers and crew for what they did,” she says. “But more than that, it raises awareness. Our ports aren’t secure. Our borders aren’t secure. Our airlines still aren’t secure, and this is what happens when you’re not secure. That’s the message I want people to hear.” 47. The trailer for “United 93” succeeded in ________ when it played in the theaters in Hollywood and New York City. 48. The movie “United 93” is sure to give rise to _______________. 49. What did writer-director Paul Greengrass obtain before he proceeded with the movie? 50. Universal, which is releasing “United 93”, has been criticized for _________. 51. Carole O’Hare thinks that besides honoring the passengers and crew for what they did, the purpose of telling the story is to _________ about security. Section B Passage One Questions 52 to 56 are based on the following passage. Imagine waking up and finding the value of your assets has been halved. No, you’re not an investor in one of those hedge funds that failed completely. With the dollar slumping to a 26-year low against the pound, already-expensive London has become quite unaffordable. A coffee at Starbucks, just as unavoidable in England as it is in the United States, runs about $8. The once all-powerful dollar isn’t doing a Titanic against just the pound. It is sitting at a record low against the euro and at a 30-year low against the Canadian dollar. Even the Argentine peso and Brazilian real are thriving against the dollar. The weak dollar is a source of humiliation, (屈辱),for a nation’s self-esteem rests in part on the strength of its currency. It’s also a potential economic problem, since a declining dollar makes imported food more expensive and exerts upward pressure on interest rates. And yet there are substantial sectors of the vast U.S. economy-from giant companies like Coca-Cola to mom-and-pop restaurant operators in Miami-for which the weak dollar is most excellent news. Many Europeans may view the U.S. as an arrogant superpower that has become hostile to foreigners. But nothing makes people think more warmly of the U.S. than a weak dollar. Through April, the total number of visitors from abroad was up 6.8 percent from last year. Should the trend continue, the number of tourists this year will finally top the 2000 peak? Many Europeans now apparently view the U.S. the way many Americans view Mexico-as a cheap place to vacation, shop and party, all while ignoring the fact that the poorer locals can’t afford to join the merrymaking. The money tourists spend helps decrease our chronic trade deficit. So do exports, which thanks in part to the weak dollar, soared 11 percent between May 2006 and May 2007. For first five months of 2007, the trade deficit actually fell 7 percent from 2006. If you own shares in large American corporations, you’re a winner in the weak-dollar gamble. Last week Coca-Cola’s stick bubbled to a five-year high after it reported a fantastic quarter. Foreign sales accounted for 65 percent of Coke’s beverage (饮料)business. Other American companies profiting from this trend include McDonald’s and IBM. American tourists, however, shouldn’t expect any relief soon. The dollar lost strength the way many marriages break up-slowly, and then all at once. And currencies don’t turn on a dime. So if you want to avoid the pain inflicted by the increasingly pathetic dollar, cancel that summer vacation to England and look to New England. There, the dollar is still treated with a little respect. 52. Why do Americans feel humiliated? A) Their economy is plunging B) Their currency has slumped C) They can’t afford trips to Europe D) They have lost half of their assets. 53.How does the current dollar affect the life of ordinary Americans? A) They have to cancel their vacations in New England. B) They find it unaffordable to dine in mom-and-pop restaurants. C) They have to spend more money when buying imported goods. D) They might lose their jobs due to potential economic problems. 54. How do many Europeans feel about the U.S with the devalued dollar? A) They feel contemptuous of it B) They are sympathetic with it. C) They regard it as a superpower on the decline. D) They think of it as a good tourist destination. 55. what is the author’s advice to Americans? A) They treat the dollar with a little respect B) They try to win in the weak-dollar gamble C) They vacation at home rather than abroad D) They treasure their marriages all the more. 56. What does the author imply by saying “currencies don’t turn on a dime” (Line 2,Para 7)? A) The dollar’s value will not increase in the short term. B) The value of a dollar will not be reduced to a dime C) The dollar’s value will drop, but within a small margin. D) Few Americans will change dollars into other currencies. Passage Two Questions 57 to 61 are based on the following passage. In the college-admissions wars, we parents are the true fights. We’re pushing our kids to get good grades, take SAT preparatory courses and build resumes so they can get into the college of our first choice. I’ve twice been to the wars, and as I survey the battlefield, something different is happening. We see our kids’ college background as a prize demonstrating how well we’ve raised them. But we can’t acknowledge that our obsession(痴迷) is more about us than them. So we’ve contrived various justifications that turn out to be half-truths, prejudices or myths. It actually doesn’t matter much whether Aaron and Nicole go to Stanford. We have a full-blown prestige panic; we worry that there won’t be enough prizes to go around. Fearful parents urge their children to apply to more schools than ever. Underlying the hysteria(歇斯底里) is the belief that scarce elite degrees must be highly valuable. Their graduates must enjoy more success because they get a better education and develop better contacts. All that is plausible—and mostly wrong. We haven’t found any convincing evidence that selectivity or prestige matters. Selective schools don’t systematically employ better instructional approaches than less selective schools. On two measures—professors’ feedback and the number of essay exams selective schools do slightly worse. By some studies, selective schools do enhance their graduates’ lifetime earnings. The gain is reckoned at 2-4% for every 100-poinnt increase in a school’s average SAT scores. But even this advantage is probably a statistical fluke(偶然). A well-known study examined students who got into highly selective schools and then went elsewhere. They earned just as much as graduates from higher-status schools. Kids count more than their colleges. Getting into Yale may signify intelligence, talent and ambition. But it’s not the only indicator and, paradoxically, its significance is declining. The reason: so many similar people go elsewhere. Getting into college is not life’s only competition. In the next competition—the job market and graduate school—the results may change. Old-boy networks are breaking down. princeton economist Alan Krueger studied admissions to one top Ph.D. program. High scores on the GRE helped explain who got in; degrees of prestigious universities didn’t. So, parents, lighten up. The stakes have been vastly exaggerated. Up to a point, we can rationalize our pushiness. America is a competitive society; our kids need to adjust to that. But too much pushiness can be destructive. The very ambition we impose on our children may get some into Harvard but may also set them up for disappointment. One study found that, other things being equal, graduates of highly selective schools experienced more job dissatisfaction. They may have been so conditioned to being on top that anything less disappoints. 57.Why dose the author say that parents are the true fighters in the college-admissions wars? A) They have the final say in which university their children are to attend. B) They know best which universities are most suitable for their children. C) They have to carry out intensive surveys of colleges before children make an application. D) They care more about which college their children go to than the children themselves. 58.Why do parents urge their children to apply to more schools than ever? A) They want to increase their children’s chances of entering a prestigious college. B)They hope their children can enter a university that offers attractive scholarships. C) Their children will have a wider choice of which college to go to. D) Elite universities now enroll fewer student than they used to. 59.What does the author mean by “kids count more than their colleges”Line1, para.4? A) Continuing education is more important to a person’s success. B) A person’s happiness should be valued more than their education. C) Kids’ actual abilities are more important than their college background. D) What kids learn at college cannot keep up with job market requirements. 60.What does Krueger’s study tell us? A) Getting into Ph.D. programs may be more competitive than getting into college. B) Degrees of prestigious universities do not guarantee entry to graduate programs. C) Graduates from prestigious universities do not care much about their GRE scores. D) Connections built in prestigious universities may be sustained long after graduation. 61.One possible result of pushing children into elite universities is that______ A) they earn less than their peers from other institutions B) they turn out to be less competitive in the job market C) they experience more job dissatisfaction after graduation D) they overemphasize their qualifications in job application Part V Cloze Seven years ago, when I was visiting Germany, I met with an official who explained to me that the country had a perfect solution to its economic problems. Watching the U.S. economy 62 during the’ 90s, the Germans had decided that they, too, needed to go the high-technology _63_. But how? In the late’ 90s, the answer schemed obvious: Indians. _64_ all, Indian entrepreneurs accounted for one of every three Silicon Valley start-ups. So the German government decided that it would _65_ Indians to Germany just as America does: by _66_ green cards. Officials created something called the German Green Card and _67_ that they would issue 20,000 in the first year. _68_, the Germans expected that tens of thousands more Indians would soon be begging to come, and perhaps the _69_ would have to be increased. But the program was a failure. A year later _70_ half of the 20,000 cards had been issued. After a few extensions, the program was _71_. I told the German official at the time that I was sure the _72_ would fail. It’s not that I had any particular expertise in immigration policy, _73_ I understood something about green cards, because I had one (the American _74_). The German Green Card was misnamed, I argued, _75_ it never, under any circumstances, translated into German citizenship. The U.S. green card, by contrast, is an almost _76_ path to becoming American (after five years and a clean record). The official _77_ my objection, saying that there was no way Germany was going to offer these people citizenship. “We need young tech workers,” he said. “That’s what this program is all _78_.” So Germany was asking bright young _79_ to leave their country, culture and families, move thousands of miles away, learn a new language and work in a strange land—but without any _80_ of ever being part of their new home. Germany was sending a signal, one that was _81_ received in India and other countries, and also by Germany’s own immigrant community. 62. A) soar B) hover C) amplify D) intensify 63. A) circuit B) strategy C) trait D) route 64. A) Of B) After C) In D) At 65. A) import B) kidnap C) convey D) lure 66. A) offering B) installing C) evacuating D) formulating 67. A) conferred B) inferred C) announced D) verified 68. A) Specially B) Naturally C) Particularly D) Consistently 69. A) quotas B) digits C) measures D) scales 70. A) invariably B) literally C) barely D) solely 71. A) repelled B) deleted C) combated D) abolished 72. A) adventure B) response C) initiative D) impulse 73. A) and B) but C) so D) or 74. A) heritage B) revision C) notion D) version 75. A) because B) unless C) if D) while 76. A) aggressive B) automatic C) vulnerable D) voluntary 77. A) overtook B) fascinated C) submitted D) dismissed 78. A) towards B) round C) about D) over 79. A) dwellers B) citizens C) professionals D) amateurs 80. A) prospect B) suspicion C) outcome D) destination 81. A) partially B) clearly C) brightly D) vividly Part VI Translation 82. We can say a lot of things about those ________________(毕生致力于诗歌的人): they are passionate, impulsive, and unique. 83. Mary couldn’t have received my letter, ___________ (否则她上周就该回信了). 84. Nancy is supposed to ____________________ (做完化学实验) at least two weeks ago. 85. Never once ___________________ (老两口互相争吵) since they were married 40 years ago. 86. ________________________ (一个国家未来的繁荣在很大程度上有赖于) the quality of education of its
partI Writing (30 minute)

注意:此部分试题在答题卡1上。

Directions:For this part ,you are allowed 30minute to write a short essay on the topic of students selecting their
fectures.You should write at least 120 words following the outline when bellow:

1.有些大学允许学生自由选择某些课程的任课教师
2.学生选择教师时所考虑的主要因素
3.学生自选任课教师的益处和可能产生的问题

On Students Selecting Lecturers

范文:

On Students Choosing Lecturers

Nowadays, some universities give students the right to choose who teaches some of their classes. This has led to some debate over whether students should be given this much power.

There are several factors that students consider when choosing a lecturer, including the teaching style of the lecturer, the lecturer's academic background, and the lecturer's reputation among students. The ideal lecturer is one who has an interesting teaching style, a diverse academic background, and a good reputation among students.

There are both positive and negative aspects to allowing students to choose their lecturers. Giving students the choice encourages them to take ownership for their classes, and also puts pressure on teachers to improve their teaching quality.

However, the factors that students consider might not be the ones that lead to the highest quality of education. Schools might end up with lecturers who teach interesting classes without much content.

Part II Reading comprehension (skimming and scanning ) (15 minute)

Directions: In this part,you will have 15 minute to go over the passage quickly and answer the questions on Answer sheet1

For questions 1-7,mark
Y(for YES) if the statement agrees with the information given in the passage;
N(for NO) if statement cintradicts the information given in the passage;
NG(for NOT CIVEN) if the information is not given in the passage.
for question 8-10 ,complete the sentenced with the information given in the passage.

Highway

A goverment study recommended a national highway systerm of33,920 miles,and congress passed the Federcal-Aid Highway Act of 1944,which called for strict,centrakky controlled desert criterra.

The interstate highway system was finally launched in 1956 and has been hailed as one of the greatest public works projects of the century .To bulid its 44,000-mile web of highways,bridge.and tunnels hundreds of unique engineering designs and solutions had to be worked out.Consider the many geographic ,features of the country:mountains,steep grades,wetlands,rivers,desorts and plains.Variables included the slope of the land,the ability of the pavement to support the load.Innovative, designs of roadways,tunnels,bridges,overpasses,and interchanges that could run through or bypass urban areas soon began to weave their way across the country ,forever altering the face of American .

Long-span,segmented-concrete,cable-stayed bridges such as Hale Boggs in Louisiana and the Sunshine Skyway in Florida,and remarkable tunnels like Fort Mchenry in Maryland and Mr.bakerin Washington developed under the nation's physical challenges,Traffic control systems and methods of construction developed uder the interstate program soon influenced highway construction around the world,ang were invaluable in improving the condition of urban streets and traffic patterns.

Today .the interstate system links every major city in the U.S,and the U.S with Canada and Mexico,Built with safety in mind the highways have wide lanes and shoulders,dividing medians,or barriers,long entry and exit lanes,ourves engineered for safe turns,and limited access,The death rate on highways is half that of all other U.S roads (0.86 deaths per 100 million passenger miles compared to 1.99 deaths per 100 million on all other roads)

By opening the North American continent,highways have enabled consumer goods and services to reach people in remote and rural areas of jobs,access to the growth options in terms of jobs access to cutural progreams health care ,and other benefits.Above all,the interstate system provides individuals with what they enerish most:personal freedom of mobility.

The interstate system has been an essential element of the nation's economic growth in terms of shipping and job creation:more than 75 percent of the nation's freight deliveries arrive by truck.and most products that arrive by rail or air use interstates for the last leg of the journey by vehiole.
Not only has the highway system affected the American economy by providing shipping routes,it has led to the growth of spin-off industries like service stations ,motels,restaurants,and shopping centres.It has allower the rwlocation of manufacturing plants and other industries from urban areas to rural.

By the end of the century there was an immense network of paved roads ,residential streets,expressways,and freeways built to support millions of vehicles,The high way system was officially renamed for Eisenhower to honor his vison and leadership.The year construction began he said:"Together,the united forces of our communication and transportation systems are dynamic elements in the very name we bear -United States.Without them ,we would be a mere alliance of many sepaeate parts."

参考答案:1.Y N NG 2. Y N NG 3.Y NO NG 5. Y N NG 6.Y N NG 7.Y N NG

8.The greatest benefit brought about by the interstate system was___________
9.Trucks using the interstate highways deliver more than__________________
10.The interterstate systerm was renamed afterEisenhower in recognition_____________

参考答案:08. personal freedom of mobility
参考答案:09. 75 percent
参考答案:10. his vision and leadership

Part Ⅲ Listening Comprehension

section A

Directions: In this section,you will hear 8short conversationa and 2 long sentance.At the end of each conversations,one ore

more qusetions will be asked about what was both the conversation and the questions will be spoken only once,After each

question there will be a pause.you must read the four choices with A) B) C)and D).and decide which is the best answer ,then letter on Answer sheet 2 with a single line though the centre.
注意:此部分答题在答题卡2上作答。

11.
A)The girls got on well with each other.
B)It's understandable that girls don't get along.
C)She was angry eith the other young stars.
D)The girls lacked the courage to fight.

12.
A)The woman does her own housework.
B)The woman needs a housekeeper.
C)The woman's house is in a mess.
D)The woman works as a housekeeper.

13.
A)The Edwards are quite well-off.
B)The Edwards should cut down on their living expenses.
C)It'll be unwise for the Edwards to buy another house.
D)It's too expensive for the Edwards to live in their present house.

14.
A)The woman didn't except it to be so warm at noon.
B)The woman is sensitive to weather changes.
C)The weather forrcast was unreliable
D)The weather turned cold all of a sudden.

15.
A)At a clinic.
B)At a restaurant.
C)In a supermarket.
D)In an ice cream shop.

16.
A)The woman did not feel any danger growing up in the Bronx.
B)The man thinks it was quite safe living in the Bronx district.
C)The woman started working at an early age to support her family .
D)The man doesn's think it safe to send an 8-year-old to buy things.

17.
A)The man has never seen the woman before.
B)The two speakers work for the same company.
C)The two speakers work in the same floor.
D)The woman is interested in market research.

18.
A)The woman can't tolerate any noise.
B)The man is looking foe an apartment.
C)The man has missed his appointment.
D)the woman is going to take a train trip.

Questions 19 to 21 are based on the conversation you have just heard.

19.
A)To make a business report to the woman .
B)To be interviewed for a job in the woman's company.
C)To resign from his position in the woman's company.
D)To exchange stock market infotmation with the woman.

20.
A)He is head of a small teading company.
B)He works in an international insurance company.
C)He leads s team of brokers in a big company.
D)He is a public relations officer in a small company.

21.
A)The woman thinks Mr.Saunders is asking for more than they can offer.
B)Mr.Saunders will share one third of the woman's responsibilities.
C)Mr.Saunders believes that he deserves more paid vacations.
D)The woman seems to be satisfied with Mr.Saunders' past experience.

22.
A)She's worried about the seminar.
B)The man keeps intertupting her.
C)She finds it too hard.
D)She lacks interest in it.

23.
A)The lecturers are boring.
B)The course is poorly designed.
C)She prefers Philosophy to English.
D)She enjoys literature more.

24.
A)Karen's friend.
B)Karen's parents.
C)Karen's lecturers.
D)Karen's herself.

25.
A)Changing her major.
B)Spending less of her parents' money.
C)Getting transferred to the Englidh Department.
D)Leaving the university.

Section B

Directions: In this section, you will hear 3 short passages. At the end of each passage, you will hear some questions. Both the passage and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A),B),C) and D).Then mark the corresponding letter on the Answer Sheet with a single line through the centre.

注意:此部分试题请在答题卡2上作答.

Passage One

Question 26 to 29 are based on the passage you have just heard.

26.
A)Rent a grave.
B)Burn the body.
C)Buty the dead near a church.
D)buy a piece of land for a grave.

27.
A)To solve the problem of lacj of land.
B)To see whether they have decayed.
C)To follow the Greek religious practice.
D)To move them to a multi-Storey

28.
A)They should be buried lying dowm .
B)They should be buried standing up.
C)They should be buried after being washed.
D)They should be buried when partially decayed.

29.
A)Burning dead bodies to ashes.
B)Storing dead bodies in a remote place.
C)Placing dead bodies in a bone room.
D)Digging up dead bodies after three years.

Passage Two

Question 30 to 32 are based on the passage you have just heard.

30.
A)Many foreign tourist visit the Unite States every year.
B)Americans enjoy eating out with their friends.
C)The United States is a country of immigrants.
D)Americans prefer foreign foods to their own food.

31.
A)They can make friends with people from other countries.
B)They can get to know people of other cultures and their lifestyles.
C)They can practise speaking foreign languages there.
D)They can meet with businessmen from all over the world.

32.
A)The couple cook the dishes and the children help them .
B)The husband does the cooking and the wife serves as the address.
C)The mother does the cooking while the famepand children withon the guests.
D)A hired cook prepares the dishes and the farmily members serve the guests.

Passage Three

Questions 33 to 35 are based on the passage you have just heard .

33.
A)He took them to watch a basketball game.
B)He trained them to play European football.
C)He let them compete in getting balls out of a basket.
D)He taught them to play an exciting new game.

34.
A)The players found the basket too high to teach.
B)The players had trouble getting the ball out of the basket.
C)The players had difficulty understanding the complex rules.
D)The players soon found the game boring.

35.
A)By removing the bottom of the basket.
B)By lowering the position of the basket.
C)By simplifying the complex rules.
D)By altering the size Of the basket.

Sectin C

Directions :In this section,you will hear a passage three times ,when the passage is read for the first time,you should listen carefully for its general idea.When the passage is read for the second time ,you are required to fill in the blanks numbered from 36 to 43 with the exact words you have just heard.For
blank numbered from 44 to 46 you are required to fill in the missing infornation,For these blanks ,you can either use the exact words you have just heard or write down the main points in your own words.Flinally,when the passage is read for the third time,you should check what you have written .

注意:此部分试题在答题卡2上;请在答题卡2上作答。



partIII Reading Comprehension

for American time is money. They say,"you only get so much time in this life; you'd better use it wisely." The (36)__________without be better than the past or present. As American are(37)__________to see things, unless people use their time for constructive activitica, Thus American(38)__________a "well-organized" preson is punctual and is(40)__________of other people's time. They do not(41)__________people's time with conversation or other activity that has no(42)__________beneficial outcome.

The American attitude toward time is not(43)__________shared by thers, especially non-Europeans. They are more likely to regard time as(44)__________.
One of the more difficult things many studenta must adjust to in the states is the notion that time must be saved whenever possible and used wisely every day.

In the contest(45)__________.MeDonald's, KFC, and eating meals. As MeDonald's restaurants(46)__________, bringing not just hamburgers but an emphasis on speed, efficiency, and shiny cieanliness.



Part IV reading comprehension(reading in depth)

Section A

Directions: you may not use any of the words in the bank more than true.

Question 47 to 56 are based on the following passage.
EI NIno is name given to the masterious and often unpredictable change in the climate of the world.This strange ___47_____happens every five to eight years.It starts in the PAacific Ocean and is thought to be caused by a failure in the trade winds(信风),which affects the ocean currents driven by these winds. As the trade winds lessen in ____48____,the ocean comperatures rise causing the Peru current flowing in form the east to warm up by as much as 5`C.
The warming of the ocean has far-reaching effects.The hot,humid(潮湿的)air over the ocean causes severe ___49___thunderstorms.The rainfall is increased acrossAounth American ____50____floods to Peru.In the West pacific,there are droughts affecting Australia and Indonesia.So while some parts of the world perpare for heavy rains and floods,other parts face drought,poor crops and____51____.
EI Nino usually lasts for about 18 months The 1982-83 EI Nino brough the most___52____weather in mordern history .Its effect was worldwide and it left more than 2,000 people dead and caused over eight billion pounds ____53___of damage.The 1990 EI Nino will ____55___,but they are still not __56___sure what leads to it or what affects how strong it will be.

注意:此部分试题请在答题卡2上作答。

A)estimate I)completely
B)strength J)destructive
C)deliberately K)starvation
D)notify L)bringing
E)tropical M)exhaustion
F)phenomenonN)worth
G)stable O)strike
H)attraction

参考答案:

47. P phenomenon
48. B strength
49. E tropical
50. L bringing
51. K starvation
52. J destructive
53. N worth
54. A estimate
55. O strike
56. I completely

Section B

Directions:There are 2 passage in this section .Eath passage is followed by some questions or unfinished statements.For each of them there are four choises maked A) B) C)and D) .You should decide on the best choise and mark the corresponding letter
on Answer sheet 2 with a single line through the centre.

Passage One

Questions 57 to 61 ared based on the following passage.
Communications technologies are far from equal when it comes tp conveying the truth.The first study to tell lies in phone conversations as they are in emails.The fact that emails are antomatically recorded-and can come back to haunt(困扰)you. APPears to be the key to the finding.
Jeff Hancock of Cornell University in Ithaca,Mew York,asked 30 students to keep a communications diary for a week.In it they noted the number of conversations or email exchanges they had lasting more than 10 minutes,and confessed to how many lies they told.Hancock then worked out the numberof lies per conversation foe each medium .He found that lies made up 14 per cent of emails,21 per cent of instant messages,27 per cent of face-to-face interactions and an astonishing 37 per cent of phone calls.



His resules to be presented at the conference on human-computer interaction in Vienna, Austria, in April, have surprised psychologists. Some ecpected emailers to be the biggest liars, reasoning that beacuse deception makes people unconfortable, the detachment(非直接接触)of emailing would make it easier to lie. Others expected people to lie more in face-to-face exchanges becaue we are most peactised at that form of communication.

But Hancock says it is also crucial whether a conversation is being recorded and could be reread, and whether it occurs in real time. People apprar to be afraid to lie when they know the communication could later be used to hold them to account, he says. This is why fewer lies appear in email than on the phone.

People are also more likey to lie in ral time in a instant message or phone call say-than if they have time to think of a rasponse, says Hancock. He fond many lies are spontaneous(脱口而出的)resonses to an unexpected demand, such as:"Do you like my dress?"

Hankcock hopes his research will help companies work our the besr ways for their employees to communicate.For instance,the phone might be the best medium foe sales where employees are encouraged to stretch the truth.But ,given his result,work assessment where honesty is a priority,might be best done using email.

注意:此部分试题请在答题卡2上作答。

57.Hancock's study focuses on ____________.
A)the consequences of lying in various communcations media.
B)the success of communications technologies in conveying ideas.
C)people are less likely to lie in instant messages.
D)people 's honesty levels across a range of communications media.
58.Hancock's research finding surprised those who belived that________________.
A)people are less likely to lie in instant messages.
B)people are unlikely to lie in face-to-face interactions.
C)people are most likely to lie in email communication
D)People are twice as likely to lie in phone conversations.
59. According to the passage,why are people more likely to tell the truth through certain media of communication?
A)They are afraid of leaving behind traces of their lies.
B)They believe that honesty is the best policy.
C)They tend to be relaxeg when using those media.
D)They are most practised at those forms of communication.
60. According to Hancock the telephone is a preferable medium for premoting sales because____________.
A)Salemen can talk directly to their cunstomers.
B)Salemen may feel less restrained to exaggerate.
C)Salemen can impress customers as being trustworthy.
D)Salemen may pass on instant messages effectively.
61. It can be inferren from the passage that_____________.
A)Honesty should be encouraged in interpersonal communications
B)more employers will use emails to communicate with their employees
C)suitable media should be chosem for different communication perposes
D) email is now the dominant medium of communication within a company.

Passage Two

Questions 62 to 66 are based on the following passage.
In a country that defines itself by ideals,not by shared blood,who should be allowed to come worl and live here?In the wake of the Sept.11 attacks these questions have never seemet more pressing.
on December .11,2001,as part of the effort to increase homeland securty ,federal and local authorities in 14 states staged "Operation Safe Travel" -raids on airports to arrest employees with false identification(身份证明).In Salt Lake City there were 69 arrests.But those captured were anything but terrorists,most of them illegal immigrants from Central or Sounth American .Authorities said the undocumented worker's illegal status made them open to blankmall(讹诈)by terrorists Many immigrants in Salt Lake City were angered by the arrests and said they felt as if they were being treated like disposable goods.
Mayor Anderson said those feelings were judtified to a certain extent."We're saying we want you to work in these places,we're going to look the other way in terms of what our laws are,and then when it's convenient for us,or when we can try to make a point in terms of national security,especially after Sept.11,then you'er disposable There are whole families being uprooted for all of the wrong reasons,"Anderson said.
If Sept.11 had never happened the airport workers would not have been arrested and could have gone on quietly living in America,probably indefinitely .Ana Castro,a ,amanager at a Ben & Jerry'sice cream shop at the airport.had been working 10 years with the same false Social Aecurity card when she was arrested in the December airport raid.Now she and her family are living under the threat of deporation(驱逐出境)。Castro's case is currently waiting to be settled.While she awaits the outcome ,the government has granted her permission to work here and she has returned to her job at Ben&Jerry's.
62.Accroding to the author ,the United States claims to be a nation____________.
A)composed of people having different vaules
B)encouraging individual pursuits
C)sharing common interests
D)founded on shared ideals
63.How did the immigrants in Salt Lake City feel about "Operation Safe Travel" ?
A)Guilty
B)Offended
C)Disappointed
D)Discouraged
64.Undocumented workers became the target of"Operation Safe Travel" because__________.
A)evidence was found that they were potential terrorists
B)most of them worked at airports under threat of terrorists
C)terrorists might take advantage of their illgal status
D) they were reportedly helping hide terrorists around the airport.
65.By saying"...we're going to look the other way in terms of what pur laws are"(Line 2 ,Para.4),Mayor Aiderson means"________________".
A)we will turn a blind eye to your illegal atatus
B)we will examine the laws in a different way
C)there are other ways of enforcing the law
D) the existing laws must not be ignored
66.What do we learn about Ana Castro from the last paragraph?
A)she will be deported sooner or later.
B)She is allowed to stady permanently .
C)Her case has been dropped
D)Her fate remains uncertain.



PartV Cloze (15 minutes)
Do you wakr up every day feeling too tired ,or even upset?if so .then a new alarm clock could be just for you .The clock ,called Sleep Smart,measures your sleep cycle,and waits ___67___you to be in your lightest phase of sleep ____68___rousing you.Its makers say that should ____69____you wake up feeling refreshed every morning.
As you sleep you pass ___70___a sequence of sleep states-light sleep,deep sleep and REM(raipd eye movement)sleep-that ____71___approximately every90 minutes .The point in that cycle at which you wake can ___72____how you feel later ,and may ____73____have a greater impact than hoew much or little you have slept,Being roused during a light phase____74____you are more likely to wake up energetic.


SleepSmart____75____the distinct pattern of brain waves____76____dring each phacs of sleep, via a headband equipped ____77____electrodes(电极)and a microprocessor. This measurese the lelctrical activity of the weather's brain, in much the ____78____way as some machines used for medical and reseach ____79____, and communicates wirelessly with a clock unit near the bed. You ____80____the clock with the latest time at ____81____you want to be wakende, and it ____82____duly(适时地)wakes you during the last light sleep phase before that.

The ____83____was invented by a group of students at Brown University in Rhode Island____84____a friend complained of waking up tired and performing poorly on a test." ____85____sleep deprived people ourselves, we started thinking of ____86____to do about it," says Eric Shashoua, a recent cillege graduate and now chief executive officer of Axon Sleep Research Laboratories, a company created by the stidents to develop their idea.



67.A)beside B)near C)for D) around
68.A)upon B)before C)towards D) till
69.A)ensure B)assure C)require D) request
70.A)through B)into C)about D) on
71.A)reveals B) reverses C)resumesD) repeats
72.A)effect B)affect C)reflect D) perfect
73.A)alteady B)every C)never D) even
74.A)means B)marks C)says D) dictates
75.A)removes B)relieves C)records D) recalls
76.A)proceeded B)produced C)proniunced D)progressed
77.A)by B)of C)with D)over
78.A)familiar B) similar C)tdentical D) same
79.A) findings B) prospects C)prpposals D)proposes
80.A) prompt B)program C)plug D) plan
81.A)where B)this C)which D) that
82.A)then B)also C)almost D) yet
83.A)claim B)conclusion C)concept D)explanation
84.A)once B)after C)since D) while
85.A)Besides B)Despite C)To D) As
86.A)what B)how C)whether D) when

part VI Translation

87. Having spent some time in the city, he had no trouble ________________(找到去历史博物馆的路).
参考答案:finding the way to the history museum
88. ______________________(为了挣钱供我上学), Mother often takes on more work than is good for her.
rfc是网络协义的重要学习资源,为方便大家查看,特收藏整理如下。下面是其中一篇内容: Network Working Group Steve Crocker Request for Comments: 1 UCLA 7 April 1969 Title: Host Software Author: Steve Crocker Installation: UCLA Date: 7 April 1969 Network Working Group Request for Comment: 1 CONTENTS INTRODUCTION I. A Summary of the IMP Software Messages Links IMP Transmission and Error Checking Open Questions on the IMP Software II. Some Requirements Upon the Host-to-Host Software Simple Use Deep Use Error Checking III. The Host Software Establishment of a Connection High Volume Transmission A Summary of Primitives Error Checking Closer Interaction Open Questions Crocker [Page 1] RFC 1 Host Software 7 April 1969 IV. Initial Experiments Experiment One Experiment Two Introduction The software for the ARPA Network exists partly in the IMPs and partly in the respective HOSTs. BB&N has specified the software of the IMPs and it is the responsibility of the HOST groups to agree on HOST software. During the summer of 1968, representatives from the initial four sites met several times to discuss the HOST software and initial experiments on the network. There emerged from these meetings a working group of three, Steve Carr from Utah, Jeff Rulifson from SRI, and Steve Crocker of UCLA, who met during the fall and winter. The most recent meeting was in the last week of March in Utah. Also present was Bill Duvall of SRI who has recently started working with Jeff Rulifson. Somewhat independently, Gerard DeLoche of UCLA has

18,773

社区成员

发帖
与我相关
我的任务
社区描述
Linux/Unix社区 专题技术讨论区
社区管理员
  • 专题技术讨论区社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧