Questions
-
Where would you use exact-match packet forwarding? Where would you use longest-prefix? Whyis 2-choice better than standard hashing?
-
What are the different types of queueing structures in a router? What are the pros and cons of each? Explain the HoL blocking problem in input-queued routers.
-
Describe the ALOHA protocol. Derive the optimal transmission probability in ALOHA. What is the overall utilization of the medium with this probability?
-
How are the operating conditions of WiFi different from ALOHA? How is WiFi different fromEthernet?
-
What is modulation? What is the signal-to-noise ratio? What is a checksum?
-
Explain the problem of wireless bit-rate adaptation. Explain the SampleRate algorithm.
-
What are some performance metrics you might care about during video streaming? Give an example of a design that optimizes for each metric in isolation
-
What distinguishes a peer-to-peer application from a client-server application? Compare and contrast the networking characteristics of Bitcoin and BitTorrent.
-
How many hosts can a leaf-spine topology made up of k switches with k ports each support? Describe the load balancing algorithm between the leaf and spine switches.
-
Describe some security and privacy concerns with IoT things. What is a data mule? Is it more efficient to send 100 PB of data across the country using a truck or using the Internet? Explain why.
-
Describe the two core concepts behind software-defined networking. Explain what policy routing is.
-
What are the three properties that a correct implementation of TLS guarantees? What is one property it explicitly does not guarantee? Explain the difference between public-private key encryption/decryption and symmetric key encryption/decryption.
-
What is the main difference between the security adversary in network surveillance and censorship and the security in standard discussions of security protocols? Explain a few ways in which a network censor can censor access to the Internet for its customers.