IT 347 Final Review Winter 2011 J.J. Ekstrom. IT 347 Course Topics Network Models Protocols and Encapsulation Reliable Delivery / Sliding Window Clients,

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
1 Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS.
v3.1 CIS151 Module 2 JEOPARDY K. MartinG. Valencia.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
OSI Reference Model An overview. Standards and the internet International Organization for Standardization ISO 70’s.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Chapter 15 Networks. Chapter Goals Types of networks Topologies Open Systems Home Internet connections 15-2.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
Slide 15-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter Networks.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Routing and Routing Protocols Routing Protocols Overview.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
Network – internet – part2  Address at diff. layers  Headers at diff. layers  Equipment at diff. layers.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Chapter 3: Networking and Internetworking 1. Introduction Networking issues for distributed systems: Performance,scalability,reliability,security,mobility,
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Networking Protocols John R. Durrett ISQS 6343 #1.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
Slides for Chapter 3: for CS Only Networking and Internetworking Pages –
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
CIS6930: IP Quality of Service General Information What are we going to cover? What are you expected to do?
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Another Model?! The TCP/IP Reference Model By: Allan Johnson.
Chapter 10 Switching and Routing Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Virtualization of networks
NET 3710 WAN Data Networks.
Network Overview.
CS 3214 Computer Systems Networking.
A quick intro to networking
Whirlwind Tour Of Lectures So Far
Connecting Network Components
CS 280: Summary: A day in the life of a web request
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Course Review 2015 Computer networks 赵振刚
CS 3214 Computer Systems Networking.
SWITCHING & ROUTING.
Chapter 6 The Data Link layer
PPPoE Internet Point to Point Protocol over Ethernet
IS 4506 Server Configuration (HTTP Server)
Chapter 1. Introduction Data Communications
IS 4506 Configuring the FTP Service
Chapter 8 – Data switching and routing
Presentation transcript:

IT 347 Final Review Winter 2011 J.J. Ekstrom

IT 347 Course Topics Network Models Protocols and Encapsulation Reliable Delivery / Sliding Window Clients, Servers and Sockets Layer 2 Layer 3 The BIG I Network Management

Network Models Node, Link, Channel, Cloud Bandwidth, Throughput, Latency, Volume, Jitter, Round Trip Time OSI Internet

Protocols and Encapsulation Ethernet IP UDP TCP

Reliable Delivery Sliding Windows for Packets (Layer 2) Sliding Windows for Byte Streams (TCP)

Clients and Servers Socket Programming / Client-Server Threads and Asynchronous I/O HTTP / Web Server

Layer 2 Standards 802.1D, 802.1Q Layer 2 Forwarding Learning Bridges Spanning Tree Virtual LANS

Layer 3 Standards: IETF RFCs Routing Distance Vector Link State Gateways (routers) between networks Interior and Exterior Gateways

The BIG I History: ArpaNet, NSFNet Internet Service Providers (ISP) The issue of trust BGP-4 Peering Points Whose interests are being protected by whom?

Network Management HTTP SNMP Console Control Variables Standards: De facto Microsoft SMS, HP, IBM Tivoli… De jure DMTF, IETF, ISO, …

Security Public Key Infrastructure Signing Encrypting Certificate Authorities

Tunnels Any layer on any layer Overhead issues Security issues Many types with many characteristics

MPLS Multi-protocol Label Switching Management of Multiple use backbone Mainly for Provider convenience Big bonus is traffic engineering Fast switching with decision made at ingress edge router. Can be used for tunneling.

Questions?