Finals Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.

Slides:



Advertisements
Similar presentations
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
Advertisements

Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Exam Review. Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
11- IP Network Layer4-1. Network Layer4-2 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection.
CSIT435 Spring 2001 Final Examination Study Guide.
Networking and Internetworking: Standards and Protocols i206 Fall 2010 John Chuang Some slides adapted from Coulouris, Dollimore and Kindberg.
Bob Baker Communications Bob Baker September 1999.
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 15.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
Chapter 4 Queuing, Datagrams, and Addressing
Process-to-Process Delivery:
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 4 Network Layer.
Midterm Review - Network Layers. Computer 1Computer 2 2.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Network Layer 4-1 Chapter 4 Network Layer. Network Layer 4-2 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3.
7-1 Last time □ Wireless link-layer ♦ Introduction Wireless hosts, base stations, wireless links ♦ Characteristics of wireless links Signal strength, interference,
1 CSE3213 Computer Network I Network Layer (7.1, 7.3, ) Course page: Slides modified from Alberto Leon-Garcia.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
Final Review CS1652 Jack Lange University of Pittsburgh.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
Final Review Focus- Chapter 4: Network layer Chapter 5: Data link layer Notes: Physical layer Understand previous chapters covered in class. Final exam.
Network Layer4-1 The Internet Network layer forwarding table Host, router network layer functions: Routing protocols path selection RIP, OSPF, BGP IP protocol.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Datagram networks r no call setup at network layer r routers: no state about end-to-end connections m no network-level concept of “connection”
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r Understand principles behind network layer services: m Routing (path selection) m dealing with.
1 CSE 5346 Spring Network Simulator Project.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
The Internet Network layer
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Midterm Review. Chapter 1 Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
IP Internet Protocol. IP TCP UDP ICMPIGMP ARP PPP Ethernet.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction to Networks
Chapter 4: Network Layer
Computer Communication Networks
Chapter 4 Network Layer All material copyright
Networking CS 3470, Section 1 Sarah Diesburg
Whirlwind Tour Of Lectures So Far
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Course Review 2015 Computer networks 赵振刚
Chapter 4-1 Network layer
CS 457 – Lecture 10 Internetworking and IP
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Network Layer: Control/data plane, addressing, routers
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Finals Review

Chapter 1

Internet Concepts Applications, End-hosts, Routers, Switches, Communication Links Overall architecture How they are organized Network edge vs network core Circuit-switching vs packet switching FDM vs TDM Datagram vs Virtual Circuit network Both are forms of Packet switching Statistical Multiplexing

Internet Concepts … What is a protocol Definition Examples 5 Layers of TCP/IP protocol stack 7 Layers of OSI protocol stack Encapsulation of packets

Types of Services Connection-oriented vs Connectionless service Reliable vs unreliable service Byte-stream vs datagram delivery Flow-control vs Congestion Control In-order vs out-of-order (rather any-order) delivery Quality-of-service vs best-effort delivery Performance requirements: Bandwidth, Delay, Data loss rate

Types of delay Queuing delay Transmission delay Propagation delay Their formulas Numerical problems Should be able to solve, if you understand the basic concepts

Chapter 2

Application Architectures Client-Server model Pure peer-to-peer model Hybrid peer-to-peer model Differences between them Examples of each

Addressing IP address Binary vs Dotted decimal representation Conversion between the two Port numbers Reserved vs unreserved ports

Sockets Definition Components of a socket What constitutes a socket? What constitutes a connection? Half-association vs full-association

Application layer protocols HTTP General view of the architecture HTTP servers design Persistent vs. non-persistent HTTP Persistent HTTP with and without pipelining Don ’ t worry about memorizing syntax of protocol messages But understand how the protocol works

Application layer protocols … FTP Protocol overview Control vs Data connection Why do we need two connections

Application layer protocols … Architecture overview How gets from one place to another Difference between mailbox and message queues Protocol overview SMTP, POP3, IMAP, HTTP How they differ SMTP vs. HTTP Push vs Pull architecture Why is it so easy to send SPAM s? What is the main drawback of current architecture that lets this happen?

Domain Name System Overview What does it do? How it works? Why is it not centralized? Root vs TLD vs Authoritative vs Local DNS servers What ’ s the hierarchy? Where does Local DNS server belong?

Domain Name System … Iterative vs recursive queries Pros and cons of each DNS caching – how it helps? Types of DNS records How to insert new records into DNS

Socket API Sequence of Socket API calls At client and at server For TCP and for UDP How do you specify a server ’ s port number How does a client get a port number?

Chapter 3

Transport layer overview What does it do? Importance of sockets Importance of port numbers Reliable vs. unreliable delivery Multiplexing and demultiplexing

UDP Why is it needed at all? How is a UDP socket identified Is it a half or a full association? UDP header components Demultiplexing in UDP Using single UDP socket to talk to multiple remote machines.

TCP What services does it provide? How is a TCP connection identified Is it a half or a full association? TCP header components Demultiplexing in TCP Using single UDP socket to talk to multiple remote machines.

Detecting errors Checksum What does it mean? Does a correct checksum mean no errors? How is it computed?

Reliable data transfers Concept of Finite State Machines States, Events, transitions, actions Simple FSMs for Stop-and-Wait protocol at sender/receiver With no errors With bit errors With packet losses

Pipelined RDT Protocols Go-back-N Selective Repeat Sender/Receiver algorithms Relationship between window size and sequence number range.

TCP TCP services Byte-based sequence number and acks Estimating TCP ’ s Round Trip Time Timeout

TCP Reliable Data Transfer Handling lost ACKs Handling premature timeout Use of Cumulative Acks Fast Retransmit mechanism

TCP Flow Control Receiver advertising spare room in receive window. Sender limits unacked data to size of receive window

TCP Connection management 3-way Handshake SYN, ACK, SYN-ACK sequence Closing a connection FIN, ACK sequence

TCP Congestion Control (CC) Causes and costs of congestion End-to-end vs. Network Assisted CC Defining loss event Adjusting congestion window 1. AIMD 2. Slow start 3. Reaction to 3 duplicate ACKs 4. Reaction to Timeout Why treat 3 and 4 differently?

TCP Fairness Delay Modeling Definition of ‘ fairness ’ Why is TCP called ‘ fair ’ ? Impact of parallel TCP connections on fairness. TCP delay modeling with Slow Start Non-persistent HTTP Persistent pipelined HTTP Non-persistent HTTP with X parallel connections

Chapter 4 Network Layer

Basic concepts Key network layer functions Routing Forwarding Connection setup in some networks like ATM Routing vs. Forwarding Distinction between services provided by Internet and ATM networks

Virtual Circuits Networks Vs. Datagram Networks Vs. Circuit-switched networks Forwarding table Structure Maintenance Switching mechanism Signaling for VC setup

Datagram networks Forwarding Table structure Route Lookup mechanism Longest prefix matching Why Longest Prefix

Router Architecture Input port Functions Switching Fabric 3-types of fabrics Memory, bus, crossbar Advantages/Disadvantages of each Output port Queuing, Scheduling

Queue management Input vs Output port queuing Head-of-the-line (HOL) Blocking. Origins of congestion queuing delay and loss

IP datagram format ver length 32 bits data (variable length, typically a TCP or UDP segment) 16-bit identifier Internet checksum time to live 32 bit source IP address IP protocol version number header length (bytes) max number remaining hops (decremented at each router) for fragmentation/ reassembly total datagram length (bytes) upper layer protocol to deliver payload to head. len type of service “type” of data flgs fragment offset upper layer 32 bit destination IP address Options (if any) E.g. timestamp, record route taken, specify list of routers to visit. how much overhead with TCP? 20 bytes of TCP 20 bytes of IP = 40 bytes + app layer overhead

Basic IP concepts Fragmentation and Reassembly IP Addresses Notion of subnets CIDR addresses Why CIDR was adopted? Hierarchical addressing Route aggregation

Network Address Translation How does it work? Translation process Translation table Uses of NAT Problems with NAT

ICMP, IPV6 ICMP Use Location in protocol stack How does traceroute work? IPV6 Main differences with IPv4 Transitioning from IPV4 to IPV6 Tunnelling

Routing Algorithms Routing problem : finding the least-cost path Global vs. decentralized routing Static vs. dynamic routing Link state vs. distance vector routing

Link State Routing Dijkstra ’ s algorithm How does it work? Why is it the same as breadth-first search

Distance Vector Routing Bellman-Ford Equation Distance Vector Algorithm Count-to-infinity problem Good news vs. bad news Poisoned reverse technique Link State vs Distance Vector Message complexity Speed of convergence Robustness

Hierarchical Routing Autonomous systems Scalability of routing Administrative control Inter vs Intra AS routing Hot-potato routing

Routing Information Protocol (RIP) Distance Vector protocol Routing Recovery from Failures Implementation How ‘ routed ’ works

OSPF Link State routing Djikstra ’ s algo Route Advertisement exchange Additional Features over RIP Hierarchical OSPF

BGP Intra-AS routing What BGP advertisements mean Criteria for route selection Policy vs performance

Chapter 5 Data Link Layer

Data link layer services Framing Reliable delivery between adjacent nodes Flow control Error detection Error correction Half vs full-duplex transmission

Error Detection As opposed to correction Parity checking Single bit parity 2-Dimensional bit parity CRC checksum Advantages How to compute

Multiple Access Protocols Resolving contention on shared media Types Channel Partitioning Random Access Taking turns

Channel Partitioning Protocols Time Division Multiple Access (TDMA) Frequency Division Multiple Access (FDMA)

Random Access MAC Protocols The problem of collision Two components Detecting collisions Recovering from collisions

Aloha Slotted ALOHA Pure (unslotted) ALOHA Comparison Synchronization effort Efficiency (how to compute?)

CSMA and CSMA/CD CSMA Improvement over ALOHA Carrier Sensing before transmission CSMA/CD Sensing + detection

Link-Layer Addressing MAC address structure Each MAC address is globally unique Address Resolution Protocol (ARP) Routing across LANs How are MAC addresses in packets handled?

Ethernet Bus vs. Star topology 10BaseT vs 100BaseT vs Hubs vs Switches Why do we have distance restrictions on connected hosts? Hierarchical interconnections With Hubs With Switches Ethernet Frame Structure Channel access protocol CSMA/CD Binary Exponential Backoff

Switches Self-configuration Reverse Path Learning A.k.a backward learning A.k.a Transparent bridges Learning and forwarding algorithms Traffic isolation effect Hubs vs. Switches vs. Routers

Point-to-point Protocol (PPP) one sender, one receiver, one link PP design requirements Framing,bit transparency, error detection, liveness, address negotiation Data frame Byte Stuffing To differentiate header bit pattern from payload bits

ATM Origins of ATM Services provided by ATM ATM Protocol Stack Functions of different layers IP over ATM Why do we need it? How does it work?

MPLS Goals of MPLS What ’ s different and what ’ s similay to ATM? Why is it needed?