90 likes | 432 Views
Review for Networking Neil Tang 01/16/2009. Chapter 1. Time Division Multiplexing (TDM) VS. Statistical Multiplexing (how do they work, weakness and strength) (Ch1.2) OSI 7-layer model and the major functionalities of each layer (Ch1.3) Typical examples of protocols in each layer (Ch1.3)
E N D
Review for Networking Neil Tang01/16/2009 CS440 Computer Networks
Chapter 1 • Time Division Multiplexing (TDM) VS. Statistical Multiplexing (how do they work, weakness and strength) (Ch1.2) • OSI 7-layer model and the major functionalities of each layer(Ch1.3) • Typical examples of protocols in each layer (Ch1.3) • Latency, bandwidth and effective throughput (Ch1.5) CS440 Computer Networks
Chapter 2 • Shannon’s theorem (pp.75) • Different encoding schemes (weakness, strength)(Ch2.2) • Error detection algorithms (Checksum, CRC)(Ch2.4) • Sliding window algorithm (procedure, sequence number)(Ch2.5) • Ethernet (CSMA/CD)(Ch2.6) • 802.11(the hidden and exposed terminal problems, CSMA/CA) (Ch2.8) CS440 Computer Networks
Chapter 3 • Three packet switching and forwarding schemes (how do they work, weakness and strength) (Ch3.1) • Switch implementation (switch architecture, head-of-line problem, self-routing) (Ch3.4) CS440 Computer Networks
Chapter 4 • IP packet format (fields in the header) (Ch4.1) • IP fragmentation (MTU, how to decide size, offset) (Ch4.1) • IP addressing (5 classes) (Ch4.1) • The basic functionalities of ARP, DHCP and ICMP. (Ch4.1) • Distance vector routing and RIP (routing algorithm) (Ch4.2.2) • Link state routing and OSPF (flooding and routing algorithm) (Ch4.2.3) • Distance vector routing vs. link state routing (differences, strengths, weakness) (Ch4.4) CS440 Computer Networks
Chapter 4 • Routing performance metrics (hop-count, delay, utilization) (Ch4.2.4) • Subnetting (subnet mask) (Ch4.3.1) • CIDR (Ch4.3.2) • Autonomous System (AS) and BGP (Ch4.3.3) • Mobile IP (forwarding procedure, tunneling, route optimization) (Ch4.2.5) • IPv6 (Ch4.3.5) CS440 Computer Networks
Chapter 5 • Requirements for end-to-end protocols • UDP (what it can do and what it cannot do) (Ch5.1) • Three-way handshake in TCP (Ch5.2.3) • State Transition Diagram (Ch5.2) • Flow control in TCP (Ch5.2.4) • Silly window syndrome and Nagle’s algorithm (Ch5.2.5) • Three algorithms (original, Karn, Jacobson) for retransmission (5.2.6) CS440 Computer Networks
Chapter 9 • DNS (information in each kind of name server, resolution procedure) (Ch9.1) • RFC822/MIME (binary data) (Ch9.2.1) • SMTP (interaction procedure) (Ch9.2.1) • HTTP (request/response message, TCP connection, caching) (Ch9.2.2) • SNMP(MIB) CS440 Computer Networks
Reference • Course Website http://www.cs.montana.edu/courses/440/ • Textbook Computer Networks: A Systems Approach (4th Edition), by Larry Peterson and Bruce Davie Morgan Kaufmann, 2007. CS440 Computer Networks