CSE 123b Communications Software



Similar documents
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Introduction to LAN/WAN. Network Layer (part II)

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

How To Write A Transport Layer Protocol For Wireless Networks

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Lecture 28: Internet Protocols

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Routing in packet-switching networks

10CS64: COMPUTER NETWORKS - II

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Introduction to TCP/IP

CS335 Sample Questions for Exam #2

IP address format: Dotted decimal notation:

CSE 3214: Computer Network Protocols and Applications

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Access Control: Firewalls (1)

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Network Security CS 192

DDoS attacks on electronic payment systems. Sean Rijs and Joris Claassen Supervisor: Stefan Dusée

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Congestion Control Review Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

First Midterm for ECE374 03/24/11 Solution!!

Introduction to LAN/WAN. Network Layer

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Challenges of Sending Large Files Over Public Internet

Review: Lecture 1 - Internet History

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Routing Protocols (RIP, OSPF, BGP)

VPN Lesson 2: VPN Implementation. Summary

Computer Networks and the Internet

Unix System Administration

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring Four parts

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Strategies. Addressing and Routing

CS 5480 Computer Networks

Lecture 12: Link-state Routing"

CS5008: Internet Computing

CS 356 Lecture 16 Denial of Service. Spring 2013

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

Route Discovery Protocols

A S B

Internetworking and Internet-1. Global Addresses

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Scalable Internet Services and Load Balancing

Per-Flow Queuing Allot's Approach to Bandwidth Management

CSE 3461 / 5461: Computer Networking & Internet Technologies

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

Transport Layer Protocols

Protocol Rollback and Network Security

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Introduction to Networks and the Internet

Attack and Defense Techniques

Midterm. Name: Andrew user id:

Basic & Advanced Administration for Citrix NetScaler 9.2

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Directory and File Transfer Services. Chapter 7

TCP for Wireless Networks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Stateful Firewalls. Hank and Foo

Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Network Security Fundamentals

DATA COMMUNICATOIN NETWORKING

Firewalls, Tunnels, and Network Intrusion Detection

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Web Caching and CDNs. Aditya Akella

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

EECS 489 Winter 2010 Midterm Exam

How To Understand The Internet From A Telephone To A Computer (For A Computer)

Firewall Firewall August, 2003

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Key Management and Distribution

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Content Networking Fundamentals

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Computer Networks CS321

CSE 473s Introduction to Computer Networks

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

CS 4803 Computer and Network Security

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

Transcription:

CSE 123b Communications Software Spring 2004 Final Review Stefan Savage

Final Mechanics Will cover entire year of material (but likely with some bias to the material post-midterm) Based on lecture material, homeworks, textbook reading and project work Closed book, closed note, closed PDA, cell phone, etc You get one 8.5x11 sheet of notes (both sides is fine) Will be similar in style to midterm (although I will try to make more of the questions more focused) June 7, 2004 CSE 123b Final Review 2

Protocol Layering & Internetworking Why do we layer protocols? Pros/Cons? What are the layers and what functions do they serve? What layer do the protocols we ve studied fall into? What is Internetworking? What is it good for? What features does the IP protocol provide and why (and why not others?) What is the end-to-end principle and how you might use it when designing a set of protocols? June 7, 2004 CSE 123b Final Review 3

Reliable communications What is the difference between ARQ and FEC? How does ARQ work? How to detect delayed or duplicated packets? How to detect lost packets? What are Stop and wait and sliding window? How does the window size impact throughput? How to implement each? How does flow control work in sliding window protocols? June 7, 2004 CSE 123b Final Review 4

Connections How to differentiate packets belonging to different sessions? (distinct conversations between pairs of processes) Connection-oriented vs connection-less protocols Usefulness of each? How to establish a reliable connection? How to tear down a reliable connection? How do you use state machines to implement this? How do TCP and UDP work wrt these issues? June 7, 2004 CSE 123b Final Review 5

Congestion Control How does queuing work? How is congestion caused? What techniques can be used to reduce/manage congestion? How to detect congestion? How to respond to it? How does TCP congestion control work? Slow start? Congestion Avoidance? Fast retransmission and fast recovery? What assumptions are being made in these protcols? June 7, 2004 CSE 123b Final Review 6

Intra-domain Routing What purpose does routing serve? What are the pros/cons of destination-based routing? What is the difference between routing and forwarding? How does Distance Vector Routing work? Poison reverse and split horizon? How does Link State Routing work? What is in a link-state packet? Reliable Flooding? Shortest-Path algorithm? June 7, 2004 CSE 123b Final Review 7

Inter-domain routing Why are inter and intra-domain routing different? What is a path vector protocol? Why is it appropriate for inter-domain routing? How is BGP used to enforce routing policies? Routing policies? What is peering vs transit? Why do they exist? June 7, 2004 CSE 123b Final Review 8

Muulticast What is it? How does it work in a local-area network (IGMP)? Shared tree vs source-based tree (pros/cons) How does RPM work? How does tunneling work? June 7, 2004 CSE 123b Final Review 9

MobileIP What are the problems in supporting mobility for TCP/IP? What were the design constraints of mobile IP? What is the relation between correspondent host, home agent, foreign agent and mobile host? June 7, 2004 CSE 123b Final Review 10

Naming/DNS How does the DNS namespace work and why is it hierarchical? Hierarchical namespace? What is in a DNS Record? How do DNS lookups work? Name caching? June 7, 2004 CSE 123b Final Review 11

HTTP/Web/Caching/CDNs CDNs How does the HTTP protocol work? Performance/Overhead? What problem is solve by persistent connections? How is Web caching implemented in HTTP? How is caching used to improve performance? What problem is addressed by CDNs What workload characteristics impact the performance of caching Mechanisms How does DNS-based load balancing work for CDNs? June 7, 2004 CSE 123b Final Review 12

P2P What does it mean to be peer-to-peer? Centralized vs structured vs unstructured? How does unstructured lookup work in Gnutella? How does structured lookup work in Chord? How are P2P workloads different from Web workloads? June 7, 2004 CSE 123b Final Review 13

Network Security Communications Security Public vs Private Key technologies; pros/cons of each General protocols for authenticity, integrity, confidentiality Software vulnerabilities Generally how do buffer overflows work? Denial-of-service attacks What are they? How do they deny service? What kinds of DoS attacks can be detected using the backscatter technique, which cannot? What can we tell about techniques? What kinds of attacks to firewalls and intrusion detection systems protect against? Network worms: why do they spread? What factors control their growth? June 7, 2004 CSE 123b Final Review 14

10,000 foot questions What happens when you click on a Web page link? Application layer, naming, transport, routing, etc How do you get songs or videos from a P2P network? Search protocol, transport layer, routing, etc Why kinds of challenges are faced in deploying new protocols? June 7, 2004 CSE 123b Final Review 15

Questions? June 7, 2004 CSE 123b Final Review 16

Thanks Its been a tough class but you guys have gotten through it (almost :-) You re ready to cause problems on the Internet See you at the final and good luck! June 7, 2004 CSE 123b Final Review 17