Exam Review. Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various.

Slides:



Advertisements
Similar presentations
1  Changes in IPv6 – Expanded addressing capabilities (32 to 128 bits), anycast address – A streamlined 40-byte header – Flow labeling and priority –
Advertisements

1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
Internet Multicast Routing  group addressing  class D IP addresses  link layer multicast  two protocol functions  group management –IGMP  route establishment.
期末複習. 注意事項 範圍從投影片 3-77 至 5-67 會考部分已列在下面幾張投影片 請同學好好把握 祝大家都能 all pass.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
EECS 122 Communications Networks Department of Electrical Engineering and Computer Sciences University of California Berkeley Slides: K. Fall, K. Lai,
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
CSIT435 Spring 2001 Final Examination Study Guide.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
EECC694 - Shaaban #1 lec #7 Spring The OSI Reference Model Network Layer.
Network Architecture for Cyberspace
CMPSCI 453/653 Department of Computer Science
12-1 Last time □ BGP policy □ Broadcast / multicast routing ♦ Spanning trees Source-based, group-shared, center-based ♦ Reverse path forwarding, pruning.
Finals Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Copyright 2003 By Your Name CCNA 3 Chapter 1 Review: The OSI Reference Model and Routing.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Our Last Class!!  summary  what does the future look like?
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
D ISTRIBUTED I NFORMATION S YSTEM 2010 SUMMARY Edith Ngai Uppsala University.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Final Review EECS 489 Computer Networks Z. Morley Mao Monday April 16, 2007.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
ICS156 final review Xiaowei Yang. What this course is about  Reinforcing basic networking concepts  Practical networking knowledge  Today Review concepts.
Chapter 15 Multicasting and Multicast Routing
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
CSci4211: Final Review1 Final Review  Final Exam Time: Dec 16 (Tues) 6:30pm-8:30pm Venue: STSS (Science Teaching & Student Services)  “ comprehensive.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
CMPSCI 653/453 Professor Don Towsley Department of Computer Science Department of Computer Science University of Massachusetts University of Massachusetts.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
COMPUTER COMMUNICATIONS AND NETWORKS. Networks fundamentals  Basic understanding of networks, its ontology as LAN, WAN, MAN, PAN, WLAN etc with the comprehensive.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Internet routing protocols m RIP m OSPF m IGRP m BGP r Router architectures r IPv6 Today: r IPv6.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Midterm Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
TCP/IP Protocol Suite 1 Multicasting and Multicast Routing Protocols Differentiate between a unicast and a multicast message Understand multicast link.
Network Architecture IS250 Spring 2010 John Chuang
COMPUTER NETWORKS COMPUTER NETWORKS AIM To understand the basic concepts of data communication, networking and the usage of protocols. OBJECTIVES To study.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Networking CS 3470, Section 1 Sarah Diesburg
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Course Review 2015 Computer networks 赵振刚
Introduction to Computer Networks
Introduction to Networking Prof. Ananjan Maiti. Overview of the course OSI and TCP/IP Models:  Open Systems Interconnection (OSI)  Transmission Control.
What’s “Inside” a Router?
Review First mile problem Internet End Users Last mile
Network Layer I have learned from life no matter how far you go
Network Architecture for Cyberspace
Computer Networking 숙명여자대학교 컴퓨터 과학과 최 종원.
CS 381: Introduction to Computer Networks
Internet protocol stack
CCN – revision lecture.
Presentation transcript:

Exam Review

Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various layers of a protocol stack  ISO/OSI model  Advantages of layering, disadvantages?

Physical Layer  Physical media and their characteristics  Twisted pair  Broadband cable  Fiber optics  Wireless  Architectures to reach end-users at home  Cable modems  ADSL  ISDN

Data Link Layer  Services: framing, reliable communication, sharing, addressing  ARQ-based protocols  Stop-and-wait, Go-back-N  Point-to-point protocols  HDLC  Multiple access protocols  Aloha  Slotted aloha  CSMA and its variants (non-persistent, 1-persistent, p-persistent)  Case study: Ethernet

Data Link Layer  Group random access: use a well-defined algorithm to resolve contention (instead of random backoff)  Token passing protocols  Case study: IEEE  TDMA  Reservation-based protocols  How do we resolve data link layer addresses?  ARP  How do we interconnect LANS?  Bridges, repeaters and switched ethernet

Network Layer  Services: virtual circuits, datagrams  Routing  Centralized versus distributed, static versus adaptive  Two basic approaches –Link state: centralized, dynamic; use Dijkstra’s shortest path –Distance vector: distributed, dynamic  Broadcast-based routing: reverse path forwarding  Multicast routing –Shared trees versus source-based trees –DVMRP and link state multicast routing  Hierarchical routing: inter-domain and intra-domain routing

Network Layer  Case study: IP  IPv4  Fragmentation and reassembly issues  Intradomain routing: RIP (distance vector-based), OSPF (link state)  Interdomain rotuing: BGP –Can exchange full path information –policy-based routing  IP Multicast –IGMP: used to join/leave from a multicast group –PIM: used to route and deliver packets Sparse mode versus dense mode, rendezvous points

Network Layer  ICMP: exchange control information  IPv6: new functionality, compatibility issues  Tunneling  Case study #2: ATM  ATM Network layer  Virtual circuits  Call setup  Switches and routers  Switching fabrics: memory, bus, crossbar

Transport Layer  Multiplexing and demultiplexing to applications  UDP case study  Principles of reliable data transfer  Rdt 3.0: stop-and-wait protocol  Pipelined protocols –Go-back-N –Selective repeat  Flow control  Implicit versus explicit flow control  Flow control in TCP

Transport Layer  Congestion control  End-to-end, network-indicated, rate-based  Case study: TCP  Byte-stream, cumulative acks, go-back-N  TCP ACK generation  Round-trip estimation and setting timeouts  Connection management: three way handshaking  Congestion control: slow start and congestion avoidance phases, AIMD

Application Layer  Presentation services: part of the application layer  ASN.1  XDR  Interface (API)  The socket abstraction  Client-server programming using sockets –Connectionless versus connection-oriented  Example application layer protocols  Http: http 1.0, persistent http, web caching  DNS: distributed database for resolving IP addresses