23
Chapters: All Final Review Professor Rick Han University of Colorado at Boulder [email protected]

Chapters: All Final Review Professor Rick Han University of Colorado at Boulder [email protected]

  • View
    220

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Chapters: AllFinal Review

Professor Rick HanUniversity of Colorado at Boulder

[email protected]

Page 2: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Announcements

• HW #5 solutions posted on May 4• Final May 7, 4:30-7 pm• Tuesday’s lecture now on Web• Office Hours Monday: 3-5 pm• Next, final review…

Page 3: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Format of Final• 2 ½ hours• Comprehensive• In class• Closed book• Calculator OK• About 5-6 multi-part questions • About 20-25 minutes for each multi-part

question

Page 4: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Format of Final (2)• Breakdown:

• ~4 questions on topics since last midterm (all lectures from Feb. 28 onward)• ~1 each on security, application layer

protocols, TCP, and IP (including BGP and multicast)

• ~2 questions on topics before the midterm• ~2 on MAC/link layer and IP

Page 5: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final• List is not all-inclusive; some topics may

appear on final not listed here• How does ___ work? Why is it used?• Sections in textbook relevant to final:

• Chapter 1: 1.1-1.3• Chapter 2: 2.1-2.8• Chapter 3: 3.1-3.2• Chapter 4: 4.1-4.4• Chapter 5: 5.1-5.2• Chapter 6: 6.2-6.4• Chapter 7: none• Chapter 8: 8.1-8.4• Chapter 9: 9.1-9.2

Page 6: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (2)• All topics in lecture notes are relevant to final• Relevant topics in lecture notes but not in the

textbook:• SACK TCP• TCP extensions: window scale & time stamp• Wireless TCP: snoop• Web caching proxies• Load balancing via DNS, HTTP Redirect, • NAT’s for address translation, firewalling, load

balancing• SMB/Samba• Stream ciphers and WEP

Page 7: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (3)• All topics listed in the Midterm Review, plus

the following…• IP:

• Addressing, Subnets, and CIDR• BGP• IP multicast

• Link-state multicast• DVMRP• PIM

• UDP• Unreliable datagram delivery• Header, Checksum• Multiplexing/demultiplexing

Page 8: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (4)• TCP:

• Reliable Stream Delivery• Header, Checksum• Connection setup

• How does a 3-way handshake work and why does it work?

• SYN, SYN/ACK• How does FIN and FIN/ACK exchange differ

from SYN and SYN/ACK exchange? (half-closed)

• State machine• What states are traversed during connection

setup?• In a normal termination, how does TIME_WAIT

state differ from CLOSE_WAIT?

Page 9: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (5)• TCP:

• Sliding window• Sequence #’s and segments• Window-based flow control

• Cumulative ACK’s• Receiver window advertisements• Sender-side vs. receiver-side sliding window

flow control• What is TCP Persist and why is it useful?

• TCP Extensions• Timestamp address wrap-around with seq.

#’s• Window scaling keeps pipe full over LFN’s

Page 10: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (6)• TCP:

• Adaptive Retransmission• Under what conditions does TCP retransmit?

• Timeout• 3 duplicate ACK’s

• How is the RTT originally estimated?• New RTT estimate = (old RTT estimate) + (1 - ) (new RTT)

• How is the timeout originally computed from RTT?• RTO = RTT, where = 2

• What were Karn/Partridge’s refinements to original approach?• Recompute RTT only for unambiguous

ACK’s• Backoff the timeout exponentially

Page 11: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (7)• TCP:

• Adaptive Retransmission• What were Jacobsen/Karels refinements to

timeout algorithm?• Make the timeout a function of both the

average and deviation – but why?• RTO = Smoothed Ave + 4 * Smoothed Dev

Page 12: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (8)• TCP:

• Congestion Control• W = min (CW, FW) – why?

• send no more packets than the network can handle without loss

• Sawtooth behavior of CW – what’s the basic principle?• Probe network by expanding CW until loss,

then reduce CW, then grow CW again, etc.• Slow Start is actually exponential increase• How does a sender detect that CW is too large?

• A timeout occurs

Page 13: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (9)• TCP:

• Congestion Control• Additive Increase/Multiplicative Decrease

• After a timeout, divide CW by 2 and store in ssthresh

• Slow start up to ssthresh, then add /CW if CW packets in a RTT are safely ACK’ed

• If 3 duplicate ACKs are received, then infer that one segment has been lost• Retransmit immediately, rather than wait

for a timeout : called Fast Retransmit• Cancel slow start, and drop CW to half its

value (approximately) rather than to one : called Fast Recovery

Page 14: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (10)• TCP:

• Congestion Avoidance• Back off before there are packet losses

• Informed by increasing RTT – Source-based• Informed by routers of congestion – DECbit

(explicit), RED (implicit by dropped packets)

• Queueing Disciplines• What is a drop-tail policy?• How do Fair Queueing and Weighted Fair

Queueing enforce fairness? How are they work-conserving?

Page 15: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (11)• SACK-TCP

• Why is this an improvement over vanilla TCP?• How are selective ACK’s achieved?

• Wireless TCP• What is the major problem with TCP over

wireless?• Solutions:

• End-to-End approaches: ECN, ELN• Split connection• Link-Layer• Snoop TCP is a hybrid: TCP-aware

• Retransmit locally and suppress duplicate ACK’s – all without having to terminate TCP connection

• Advantages and disadvantages?

Page 16: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (12)• Application Layer:

• DNS• Hierarchical naming• Hierarchical resolution of names: local, root &

authoritative name servers with iterative/recursive resolution

• Load distribution – DNS round robin• HTTP

• Stateless Request/Response protocol using text

• Persistent HTTP 1.1• HTTP Caching Proxies – relevant headers?• HTTP Redirect for load balancing

• SMTP, MIME, and how is email relayed via SMTP mail gateways?

Page 17: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (13)• Network Address Translation (NAT)

• How does it work?• Replace sender’s IP addr and source TCP port

with NAT’s IP addr and source TCP port• “Dynamic” NAT serves as firewall• “Static” NAT allows inbound traffic on designated

ports• Load balancing via NAT• IPSec and NAT’s – what’s the conflict?

• TCP ports are encrypted• Even if TCP ports were visible, can’t modify

packet without causing tampering to be detected via digital signature

Page 18: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (14)• SMB/Samba

• Protocol for mapping file systems between UNIX and Windows – how does it work?

• What is NETBIOS and how does it relate to SMB?

• Security:• What are the six major characteristics of concern

in security?• Confidentiality, Integrity, Authentication, Non-

Repudiation, Availability, Authorization• What are different types of cryptanalysis attacks?

• Brute force, ciphertext-only, known-plaintext, chosen-plaintext, adaptive chosen-plaintext

Page 19: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (15)• Security:

• Symmetric Key Cryptography• Same secret key on both endpoints• DES uses 16 stages; each employs principles of

confusion and diffusion• What is a block cipher, how is it vulnerable, and

how does Cipher-Block-Chaining (CBC) address this?

• How do stream ciphers work?• What are various ways to securely distribute a

shared secret key to both endpoints?• Diffie-Helman Key Exchange• Public key encryption of shared symmetric

key• Key Distribution Center (KDC) – Kerberos

Page 20: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (16)• Security:

• Public Key Cryptography• Asymmetric keys: a public key and a private

key• Helps provide Confidentiality, Authentication,

Integrity• Based on the difficulty of inverting one-way

functions• How does RSA work? (see example)

Page 21: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (17)• Security:

• Authentication via• public-key digital signatures• 3-way handshakes• Trusted 3rd party• Public keys (Fig. 8.11)

• How do one-way hashes provide data integrity?• What are some counterexamples?

• Checksums for IP and WEP

Page 22: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (18)• Security:

• Secure distribution of public keys• Trusted 3rd party Certificate Authorities (CA)• What is a digital certificate and how does it

certify the provider of the certificate?• SSL/TLS – how is the secure connection

established?• IPSec

• End-to-end encryption at the network layer• Impact on NAT’s• How do the two protocols AH and ESP provide

confidentiality, integrity, and/or authentication?• How is a VPN created using IPSec?

Page 23: Chapters: All Final Review Professor Rick Han University of Colorado at Boulder rhan@cs.colorado.edu

Prof. Rick Han, University of Colorado at Boulder

Potential Topics for Final (19)• Security:

• Firewalls• Packet filters• Proxies• What are some sample policies that firewalls

could implement? How are they flawed?

• Good luck on the Final!