Advanced Networking Flashcards
What year was Bluetooth version 1 released?
Bluetooth version 1 was released in 1999
What is the name of the organization that founded bluetooth, currently owns the Bluetooth trademark, controls bluetooth research and development and license marketing?
Bluetooth Special Interest Group (SIG)
What band frequency(i.e., GHz) does bluetooth operate?
Bluetooth operates at 2.4ghz
What ways can you avoid interference with Wi-Fi?
To avoid interference in WiFi you can implement
Time Division Multiplexing
or
5GHz Wi-Fi
What frequency-shift keying filter algorithm does bluetooth use?
Bluetooth uses Gauassian Filter and Differential filter
What are some challenges of RF communication under water?
Battery power is limited and usually batteries can not be recharged because solar energy cannot be exploited.
The available bandwidth is severely limited.
Channel characteristics, including long and variable propagation delays, multi-path and fading problems.
High bit error rates.
Underwater sensors are prone to failures because of fouling, corrosion, etc.
What is the generic idea of Underwater Acoustic Sensor Network (UWASN)?
Multiple sensor nodes are needed to raise information rates and have short-range communication, resulting in excellent coverage
Describe DSRC channel allocation
Channel 172 designated for V2V safety of life
Channel 184 designated higher power for public safety
Dedicated short-range communications (DSRC) band allocated by FCC: 5.850-5.925 GHz: Seven 10-MHz channels
Seven 10 MHz channels in 5.9 GHz band
Channel 178 used as Control Channel (CCH)
Channels 174, 176, 180, 182 used as service channels (SCH)
Channel 184 is reserved for future High Availability Low Latency (HALL)
Channel 172 is unused
Different EIRP for 4 Classes:
A/B: 23 dBm, C:33 dBm, D: 43dBm (Govt), 33 dBm (others)
Describe the WSMP message header
WAVE Short Message Protocol
Between DSRC and the emerging 5G technologies, which do you think will “win” in the automotive industry for V2X communications?
I think 5G will win because most people will have 5G technology available. The reason I think DSRC won’t win is because it is designed for short range communication, which means it is good for cities but long-range communication is needed on highways using cellular technology.
What are some security concerns with the emerging 5G technologies?
What are some proposed solutions?
Some 5G threats could be hackers being able to access user locations and attack on devices. This is dangerous especially when it comes to self-driving cars running on 5G because its a life-critical application.
A few solutions would be securing the edge of the network to enable realtime detection capabilities. Allowing the network to find and stop breaches before they make it to the core.
Describe the hidden terminal problem
In wireless networking, the hidden node problem or hidden terminal problem occurs when a node can communicate with a wireless access point, but cannot directly communicate with other nodes that are communicating with that AP
Describe RTS / CTS Protocol
RTS/CTS (Request To Send / Clear To Send) is the optional mechanism used by the 802.11 wireless networking protocol to reduce frame collisions introduced by the hidden node problem.
RTS / CTS Frame Description
The RTS frame contains five fields, which are:
Frame Control Duration RA (Receiver Address) TA (Transmitter Address) FCS The CTS frame contains four fields, which are:
Frame Control
Duration
RA (Receiver Address)
FCS
Describe Stop and Wait Protocol
It is the simplest flow control method. In this, the sender will send one frame at a time to the receiver. The sender will stop and wait for the acknowledgment from the receiver. This time(i.e. the time between message sending and acknowledgement receiving) is the waiting time for the sender and the sender is totally idle during this time. When the sender gets the acknowledgment(ACK), then it will send the next data packet to the receiver and wait for the acknowledgment again and this process will continue as long as the sender has the data to send
Describe Stop and Wait Protocol
The sender sends the packet and waits for the ACK (acknowledgement) of the packet. Once the ACK reaches the sender, it transmits the next packet in row. If the ACK is not received, it re-transmits the previous packet again.
Describe Go-back-N
The sender sends N packets which is equal to the window size. Once the entire window is sent, the sender then waits for a cumulative ACK to send more packets. On the receiver end, it receives only in-order packets and discards out-of-order packets. As in case of packet loss, the entire window would be re-transmitted
Describe 2-D parity bit check
Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. Parity check bits are also calculated for all columns, then both are sent along with the data. At the receiving end these are compared with the parity bits calculated on the received data
Describe Checksum
In checksum error detection scheme, the data is divided into k segments each of m bits.
In the sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum is complemented to get the checksum.
The checksum segment is sent along with the data segments.
At the receiver’s end, all received segments are added using 1’s complement arithmetic to get the sum. The sum is complemented.
If the result is zero, the received data is accepted; otherwise discarded.
Describe CRC
Unlike checksum scheme, which is based on addition, CRC is based on binary division.
In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number.
At the destination, the incoming data unit is divided by the same number. If at this step there is no remainder, the data unit is assumed to be correct and is therefore accepted.
A remainder indicates that the data unit has been damaged in transit and therefore must be rejected.
Describe Hamming Code
Hamming code is a set of error-correction codes that can be used to detect and correct the errors that can occur when the data is moved or stored from the sender to the receiver.
What is EDGE Computing and why is it important for IoT?
Edge computing is a distributed computing paradigm which brings computation and data storage closer to the location where it is needed, to improve response times and save bandwidth