Review for Networking Neil Tang 01162009 - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Review for Networking Neil Tang 01162009

Description:

Time Division Multiplexing (TDM) VS. Statistical Multiplexing (how do they work, ... OSI 7-layer model and the major functionalities of each layer (Ch1.3) ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 10
Provided by: Jian77
Category:
Tags: model | neil | networking | osi | review | tang

less

Transcript and Presenter's Notes

Title: Review for Networking Neil Tang 01162009


1
Review for Networking Neil Tang01/16/2009
2
Chapter 1
  • Time Division Multiplexing (TDM) VS. Statistical
    Multiplexing (how do they work, weakness and
    strength) (Ch1.2)
  • OSI 7-layer model and the major functionalities
    of each layer (Ch1.3)
  • Typical examples of protocols in each layer
    (Ch1.3)
  • Latency, bandwidth and effective throughput
    (Ch1.5)

3
Chapter 2
  • Shannons theorem (pp.75)
  • Different encoding schemes (weakness,
    strength)(Ch2.2)
  • Error detection algorithms (Checksum, CRC)(Ch2.4)
  • Sliding window algorithm (procedure, sequence
    number)(Ch2.5)
  • Ethernet (CSMA/CD)(Ch2.6)
  • 802.11(the hidden and exposed terminal problems,
    CSMA/CA) (Ch2.8)

4
Chapter 3
  • Three packet switching and forwarding schemes
    (how do they work, weakness and strength) (Ch3.1)
  • Switch implementation (switch architecture,
    head-of-line problem, self-routing) (Ch3.4)

5
Chapter 4
  • IP packet format (fields in the header) (Ch4.1)
  • IP fragmentation (MTU, how to decide size,
    offset) (Ch4.1)
  • IP addressing (5 classes) (Ch4.1)
  • The basic functionalities of ARP, DHCP and ICMP.
    (Ch4.1)
  • Distance vector routing and RIP (routing
    algorithm) (Ch4.2.2)
  • Link state routing and OSPF (flooding and routing
    algorithm) (Ch4.2.3)
  • Distance vector routing vs. link state routing
    (differences, strengths, weakness) (Ch4.4)

6
Chapter 4
  • Routing performance metrics (hop-count, delay,
    utilization) (Ch4.2.4)
  • Subnetting (subnet mask) (Ch4.3.1)
  • CIDR (Ch4.3.2)
  • Autonomous System (AS) and BGP (Ch4.3.3)
  • Mobile IP (forwarding procedure, tunneling, route
    optimization) (Ch4.2.5)
  • IPv6 (Ch4.3.5)

7
Chapter 5
  • Requirements for end-to-end protocols
  • UDP (what it can do and what it cannot do)
    (Ch5.1)
  • Three-way handshake in TCP (Ch5.2.3)
  • State Transition Diagram (Ch5.2)
  • Flow control in TCP (Ch5.2.4)
  • Silly window syndrome and Nagles algorithm
    (Ch5.2.5)
  • Three algorithms (original, Karn, Jacobson) for
    retransmission (5.2.6)

8
Chapter 9
  • DNS (information in each kind of name server,
    resolution procedure) (Ch9.1)
  • RFC822/MIME (binary data) (Ch9.2.1)
  • SMTP (interaction procedure) (Ch9.2.1)
  • HTTP (request/response message, TCP connection,
    caching) (Ch9.2.2)
  • SNMP(MIB)

9
Reference
  • Course Website
  • http//www.cs.montana.edu/courses/440/
  • Textbook
  • Computer Networks A Systems Approach (4th
    Edition), by Larry Peterson and Bruce Davie
    Morgan Kaufmann, 2007.
Write a Comment
User Comments (0)
About PowerShow.com