Review Sheet, CMP405/CMP743
(The exam will focus on, but not completely limited to the following topics)
Define the following terms
FDM, TDP, CDMA
DoS attack, DDoS attack
Explain the difference between a client and server in the client/server model.
Discuss the difference between DSL and Cable service, two popular broadband access
network technologies. Which one provi
des a user with a dedicated access link? Which
one provides a user with a shared link? Can we say one of them is better than the other?
List a number of popular wireless access network technologies. Discuss the differences
between WiFi, 3G and WiMAX
are the differences between circuit switching and packet switching?
How does delay take place during data delivery? Explain the 4 factors that contribute to
the data transmission delay between two routers.
Explain the difference between
and propagation delay. Understand their impacts on long distance
transmission and short distance transmission.
Calculate end to end delay on a number of datagrams transmitted from one end of the
Internet to the other end, when the transmission delay and pr
opagation delay at each
hop is given.
Why are network models split into layers? List at least 3 reasons.
The name of message sent at each layer in the TCP/IP model.
Give examples of protocols and devices at each layer in the TCP/IP model.
Remember the nam
es of the layers in the TCP/IP 5 layer model and the names of the
layers in the ISO/OSI 7 layer model. Remember the major functions of each layer in the
What is data encapsulation and de
capsulation? Understand how data encapsulation
apsulation happens during the end to end transmission of a message.
Why packets get lost in the Internet?
What are tier
2 and tier
3 in the Internet architecture? What are the differences
between tiers? Does any ISP officially claim i
tself as a
1, 2 or 3 ISP? (Advanced topic:
If not, how did we know the roles played by different ISP’s?)
HTTP protocol, HTTP Get, HTTP Ok
Persistent and non
Web Caching, Proxy
Root DNS server
TLD DNS servers
Authoritative DNS Servers
Local DNS server
Learn to find information such as HTTP version, pa
th, homepage, last modified time,
server type… in an HTTP message
Is HTTP a s
tateful protocol or stateless protocol by design? What is a cookie? Does the
What is web caching? What can we use web caching for other than improving the
ciency of Internet usage? Learn to calculate the average web accessing time in an
Ethernet when a web cache is used.
How does the SMTP protocol work? Does a user use SMTP protocol to access his/her
emails? If not, what are the major methods a user can ac
cess (read/delete) their emails?
Why I call protocols such as HTTP, SMTP, FTP dinosaur protocols? Is there any problem
the fact that these protocols use ASCII characters directly in the messages?
Is DNS supported by a single machine? Or it is a distri
Other than provided domain name to IP address translation, what other services the
DNS system can provide?
Describe how the hierarchical DNS system works in responding a DNS query? What are
the differences between recursive DNS queries and i
terative DNS queries?
To register a website, how many DNS records have to be created, at least?
Learn to do calculations comparing the difference between the efficiency of the client
server model and the P2P model. You don’t have to memorize the equations,
though. If I
have a question for you in the exam, I’ll give you the formula needed.
How to use a Circular DHT to support a distributed database? Where do you need to use
a hash function? Why do you need to use a hash function?
Brief explain how skype uses
the P2P model to support online conferencing between
two computers hiden behind firewalls.
(you can skip section 3.6 and section 3.7.1)
known port numbers
Stop and Wait Protocol
Selective Repeat Protocol
SYN bit, ACK bit, FIN bit
TCP Flow Control
TCP Congestion Control
Saw tooth behavior
What are the services provided by the transport layer? Which ones can be su
TCP? Which one can be supported by UDP?
Discuss the difference between TCP and UDP and how you choose the right transport
layer protocol for an application.
What is a port multiplexing and port de
multiplexing? What is a socket?
Explain the diff
erence between a UDP socket and a TCP socket?
Be able to example the operation of an FSM when a diagram is given.
Under what assumptions the Rdt 2.x protocol can work? Under what assumptions the
3.0 protocol has to be used to ensure reliable data transmission?
What are the problems with the stop and wait protocol? This includes the Rdt2.0 and
(alternate bit protocol)
Learn to calculate the channel utilization rate of
Discuss the difference between GBN and SR.
What are the differences between two major TCP implementations,
When are well known port numbers used?
How does TCP establish and terminate connections? Describe the TCP 3 way
mechanism in detail. What are the 4 major numbers exchanged between two end
systems during a TCP 3 way handshake?
What is SYN FLOODING Attack? (Advanced topic, what are SYN Cookies?)
How does TCP realize reliable data transmission? How does TCP
set up timers for
segments transmitted? What is fast re
How does TCP break data into segments? How do TCP set sequence numbers on
segments that are used to transmit a large chunk of data? Learn to draw a chart for all
the segments involved in
the transmission of a chunk of data using TCP. With starting
sequence number known from both sides of a TCP transaction, write down the
sequence numbers and acknowledgement numbers carries in every data segment and
How does TCP flow control w
ork? How does TCP congestion control work? What is the
difference between flow control and congestion control?
What determines a computer’s receiving window size?
What is slow start?
What is fast recovery?
Review the homework questions I assigned, I’ll
give you 1 or 2 problems on calculation.
Learn how to analyze network traces using Wireshark. You are going to be given one
question on analyzing captured frames.
Review your labs
Chapter 4. Network Layer
FCFS scheduling in
routers (page 339)
WFQ in routers (page 339)
Random Early Detection (page 339)
Drop Tail (page 339)
HOL blocking (page 341)
TTL field in IP header
Lease time in DHCP
BGP, eBGP, iBGP
What are the differences between Virtual Circuit
and Datagram networks at the
Describe the general architecture (Figure 4.6) of a router and explain the functionality of
each component in the architecture. Be able to draw a diagram on this.
Describe the three ways routers do switching inte
rnally. (Memory, Bus, Crossbar)
Discuss the trade
offs involved (disadvantages, advantages)
Talk about how IP Packet fragmentation is done. Discuss the problems with
fragmentation. How to avoid fragmentation at the network layer?
What is a subnet? Why do w
e need subnets? Is IP routing done based on individual IP
How does DHCP work? Be able to write down the 4 messages exchanged between a
DHCP server and a DHCP client. What are the information that can be provided by a
DHCP server to a client, in
addition to an IP address?
How does NAT work? Why is NAT important? Especially for countries other than the US.
List out at least 3 differences between IPv4 and IPv6 and explain why they have the
Compare the differences between link state rout
ing algorithms and distance vector
Given the topology of a network, be able to calculate the best routes from a router
toward each other node using the Dijkstra’s Algorithm.
Why do we need hierarchical routing? What are Autonomous System
s? In addition to
AS routing, what are the other major function of the BGP routing protocol?
What is routing policy? Give an example of a case in which due to a certain routing
policy, an AS may choose not to tell its neighbor about a subne
t it has route for.
Chapter 5. Data Link Layer
Broadcast MAC address
MAC address table
Forwarding and filtering
What is the function of the link layer? With the network layer, we are already able to
deliver packets end to end. Explain why we still need the link layer?
List out the 4 major type of addresses we learned in this course. Discuss their
differences. In th
is chapter, you learn the difference between link layer addresses and
network layer addresses. Why do we need link layer addresses while every computer
may already have an IP address? I give you two reasons. You can expand on this.
What is a multiple acces
s protocol? When do we need it?
How does slotted ALHOA works? What is the bandwidth utilization ratio of the slotted
ALOHA? Why is it so bad?
Describe the basic operations of the CSMA protocol. Why is it much better than ALOHA?
Describe how the Token Ring
protocol works. What are the problems of the token ring
What are the differences between a centralized and a decentralized multiple access
protocol? What are the tradeoffs here?
Give me an example of a centralized multiple
does ARP do? Why do we need ARP? What happens when a computer in an
Ethernet wants to talk to another computer in the same Ethernet, knowing only its IP
address? What happens when a computer in an Ethernet wants to talk to a computer in
the global Internet
, knowing only its IP address? (hint, gateway router)
Describe how ARP works. In the ARP protocol, which message is sent as a LAN broadcast
How does an Ethernet switch work? How does self
What are the differences between a switch
and a hub in an Ethernet?
What happens when a switch doesn’t have an entry in its forwarding table about a
destination MAC address? What happens when a response frame is received by the
Suppose a switch is used to connect multiple computers togeth
er, what happens when
multiple computers want to send frames to the same computer at the same time?
Why do we want to use VLANs? (Consider cost reduction, flexible network configuration,
How does VLAN trunking work? Why do we need it?