CS 441, Fall 2002 Information about Test 2 --------------------------------------------------------------------------- The second test in this course takes place in class on Friday, December 6. It covers material from Chapters 4, 5, and 7 in the text, plus labs 5 through 9, assignments, and some material on PVM. The reading assignments from the text did not cover all sections of Chapters 4, 5, and 7. The assigned material included: Chapter 4: The introduction, pages 271--279 Pages 280--282 in Section 4.2 Section 4.2, 4.3, and 4.4 Chapter 5: Section 5.1, pages 379 to 384 Sections 5.4, 5.5, 5.6, and 5.7 Chapter 7: Pages 565--577 Pages 588-602 Pages 608--612 Here are some of the important terms and ideas for this test: mime types binary files vs. text files configuration files for servers threads and threaded servers thread pools shared variables and mutexes Network layer IP numbers class A, B, and C IP networks subnetting and subnet masks IP numbers reserved for internal use NAT (Network Address Translation) IP masquerading firewall backbone topology network interfaces eth0, eth1 hosts with multiple IP addresses the TTL field in the IP header, and how it is used by traceroute packet fragmentation routers routing table routing algorithm link state routing: link state broadcast + shortest path algorithm distance vector routing: distance table, communicate with neighbors only autonomous systems hierarchical routing inter-autonomous-system routing intra-autonomous-system routing Link layer frames adapters (network cards) PPP (point-to-point protocol) token ring Ethernet (802.3) CSMA/CD (Carrier Sense Multiple Access with Collision Detection) shared communication media collision how an ethernet adapter responds to a collision exponential backoff ethernet 48-bit MAC address ARP (Address Resolution Protocol) repeaters hubs bridges switches collision domain wireless networking 802.11 wireless base stations CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) hidden terminal problem avoiding collisions: RTS (request to send), CTS (clear to send) Network security secure communication: secrecy, authentication, message integrity encryption keys secret key encryption (such as DES) public key system (such as RSA) private keys and public keys secrecy in a public key system authentication in a public key system secure hash functions (such as MD5) for message integrity Distributed computing Beowulf clusters PVM (Parallel Virtual Machine) master/slave computations message passing