CS 312 - Internet Concepts
Fall 2008: Tues/Thurs 1:30-2:45pm, Kaufman 0100

Print - Admin




Syllabus (pdf)

Useful Links

Mid-Term Study Guide


  • Regarding terms, you should know the definitions and concepts well enough to be able to answer "compare and contrast", "fill-in-the-blank", and "definition matching" questions.
  • This is not meant to be an exhaustive list of possible questions for the exam. It is meant to give you a general idea of the possible types of questions that might be asked and an idea of the topics I think are most important.
  • You should also study homework questions and problems that we've discussed during lectures.


  • Terms:
    • protocol
    • router
    • multiplexing
    • connection-oriented
    • connectionless
    • packet-switching
    • circuit-switching
    • flow control
    • congestion control
    • out-of-band control vs. in-band control
    • push protocol vs. pull protocol
    • transmission delay
    • propagation delay
    • queuing delay
    • end-to-end delay
    • TCP
    • UDP
  • Why would it be better to use packet-switching instead of message-switching (assuming that packets are much smaller than messages)?
  • What are 2 types of multiplexing in circuit switching?
  • What are the 5 TCP/IP protocol layers?
  • What are the 4 types of delay that a packet can encounter when traveling through a network? For a fixed path and fixed packet size, which are constant and which are variable?
  • Compute transmission delay given link speed and packet size.
  • Compute the propagation delay given propagation speed and physical distance.
  • Compute when bits of a packet arrive at the destination given link speed, propagation delay, and packet size.
  • Compute the bandwidth-delay product of a link given link speed and propagation delay.


  • Terms:
    • client
    • server
    • port


  • Terms:
    • GET
    • persistent connections
    • non-persistent connections
    • parallel connections
    • persistent connections with pipelining
    • HTTP/1.0
    • HTTP/1.1
    • browser cache
  • What is the typical application-level exchange for a HTTP/1.0 transfer?
  • Which are typically larger - HTTP requests or HTTP responses?
  • Given a network topology, compute the total delay for a HTTP/1.0 request-response pair. Include all TCP-related operations (i.e., handshakes). Assume that the IP address is known.
  • List all TCP connections that would be needed to request a web page using HTTP/1.1 where the base page is at host1 and there are 3 embedded objects located at host1, host2, and host3, respectively.
  • Compute the minimum number of round-trip times (RTTs) needed to download all elements of a web page, given a network topology and number and size of embedded objects in the web page using non-persistent connections, persistent connections, N parallel connections, and HTTP/1.1.

Securing the Web

  • Terms:
    • HTTPS
    • authentication
    • encryption
    • symmetric cryptography
    • asymmetric cryptography (or public-key cryptography)
    • certification authority
    • certificate
  • Decrypt a message using a simple Caesar cipher.
  • Explain how a Alice can digitally sign a message for Bob using public-key cryptography. The goal is for Bob to be sure that only Alice could have sent the message.
  • Why are trusted third parties, like certification authorities, necessary for public key cryptography?
  • How can you tell if a website is using the secure HTTP protocol, HTTPS?

FTP and Email

  • Terms:
    • user agent
    • mailbox
    • active FTP
    • passive FTP
  • How many connections are used simultaneously for correct FTP operation?
  • Does FTP offer persistent connections?
  • Is FTP a transport-level protocol or an application-level protocol?
  • Is FTP the same as ftp?
  • Is FTP secure (are messages sent in plain text)?
  • When is SMTP used and when is POP used?
  • Why doesn't an email user agent directly contact the recipient's SMTP server?
  • Can a mail server be a client in SMTP?
  • Is SMTP secure (are messages sent in plain text)?
  • Is POP secure (are messages sent in plain text)?


  • Terms:
    • hostname
    • IP address
    • host aliasing
    • mail aliasing
    • recursive query
    • iterative query
    • TLD (top-level domain)
    • authoritative server
  • How can DNS be used for load distribution?
  • Why does it make sense for DNS to use UDP instead of TCP?
  • Does a typical DNS lookup a recursive query, iterative query, or some combination of both? Explain.
  • If a given hostname needs to be resolved, but the default name server has an empty cache, how many DNS requests will the default name server typically have to make before the address is resolved?
  • Why can't the root DNS servers store all of the hostname to IP address translations?
  • Given an example DNS name resolution that starts with an empty cache, show the contents of the cache after the name resolution has completed.
  • Is DNS a transport-level protocol or application-level?
  • When does DNS name resolution occur (i.e., before a TCP connection starts or after)?
  • Include the DNS name resolution processing time in other questions, such as determining response time of an HTTP request.

Communication over Internet / Web Miscellany

  • Terms:
    • phishing
    • spamming
    • computer virus
    • computer worm
    • Trojan horse
    • image resolution
    • image compression
    • wiki
    • blog
  • What is one way to avoid spam?
  • Name one website you can use to check out hoaxes or urban legends.
  • How is a listserv different from a email distribution list that you setup in your mail reader?
  • Why is it important to use an appropriate resolution for images that are to be displayed online?
  • Name three image compression methods / file formats.
  • Describe a situation in which the use of Google Documents might be helpful.
  • Describe a different situation in which the use of a wiki might be helpful.