Advanced Networking Flashcards

1
Q

What year was Bluetooth version 1 released?

A

Bluetooth version 1 was released in 1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the organization that founded bluetooth, currently owns the Bluetooth trademark, controls bluetooth research and development and license marketing?

A

Bluetooth Special Interest Group (SIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What band frequency(i.e., GHz) does bluetooth operate?

A

Bluetooth operates at 2.4ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What ways can you avoid interference with Wi-Fi?

A

To avoid interference in WiFi you can implement

Time Division Multiplexing

or

5GHz Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What frequency-shift keying filter algorithm does bluetooth use?

A

Bluetooth uses Gauassian Filter and Differential filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some challenges of RF communication under water?

A

Battery power is limited and usually batteries can not be recharged because solar energy cannot be exploited.
The available bandwidth is severely limited.
Channel characteristics, including long and variable propagation delays, multi-path and fading problems.
High bit error rates.
Underwater sensors are prone to failures because of fouling, corrosion, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the generic idea of Underwater Acoustic Sensor Network (UWASN)?

A

Multiple sensor nodes are needed to raise information rates and have short-range communication, resulting in excellent coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe DSRC channel allocation

A

Channel 172 designated for V2V safety of life
Channel 184 designated higher power for public safety

Dedicated short-range communications (DSRC) band allocated by FCC: 5.850-5.925 GHz: Seven 10-MHz channels
Seven 10 MHz channels in 5.9 GHz band
Channel 178 used as Control Channel (CCH)
Channels 174, 176, 180, 182 used as service channels (SCH)
Channel 184 is reserved for future High Availability Low Latency (HALL)
Channel 172 is unused
Different EIRP for 4 Classes:
A/B: 23 dBm, C:33 dBm, D: 43dBm (Govt), 33 dBm (others)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the WSMP message header

A

WAVE Short Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Between DSRC and the emerging 5G technologies, which do you think will “win” in the automotive industry for V2X communications?

A

I think 5G will win because most people will have 5G technology available. The reason I think DSRC won’t win is because it is designed for short range communication, which means it is good for cities but long-range communication is needed on highways using cellular technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some security concerns with the emerging 5G technologies?

What are some proposed solutions?

A

Some 5G threats could be hackers being able to access user locations and attack on devices. This is dangerous especially when it comes to self-driving cars running on 5G because its a life-critical application.

A few solutions would be securing the edge of the network to enable realtime detection capabilities. Allowing the network to find and stop breaches before they make it to the core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the hidden terminal problem

A

In wireless networking, the hidden node problem or hidden terminal problem occurs when a node can communicate with a wireless access point, but cannot directly communicate with other nodes that are communicating with that AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe RTS / CTS Protocol

A

RTS/CTS (Request To Send / Clear To Send) is the optional mechanism used by the 802.11 wireless networking protocol to reduce frame collisions introduced by the hidden node problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RTS / CTS Frame Description

A

The RTS frame contains five fields, which are:

Frame Control
Duration
RA (Receiver Address)
TA (Transmitter Address)
FCS
The CTS frame contains four fields, which are:

Frame Control
Duration
RA (Receiver Address)
FCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe Stop and Wait Protocol

A

It is the simplest flow control method. In this, the sender will send one frame at a time to the receiver. The sender will stop and wait for the acknowledgment from the receiver. This time(i.e. the time between message sending and acknowledgement receiving) is the waiting time for the sender and the sender is totally idle during this time. When the sender gets the acknowledgment(ACK), then it will send the next data packet to the receiver and wait for the acknowledgment again and this process will continue as long as the sender has the data to send

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Stop and Wait Protocol

A

The sender sends the packet and waits for the ACK (acknowledgement) of the packet. Once the ACK reaches the sender, it transmits the next packet in row. If the ACK is not received, it re-transmits the previous packet again.

17
Q

Describe Go-back-N

A

The sender sends N packets which is equal to the window size. Once the entire window is sent, the sender then waits for a cumulative ACK to send more packets. On the receiver end, it receives only in-order packets and discards out-of-order packets. As in case of packet loss, the entire window would be re-transmitted

18
Q

Describe 2-D parity bit check

A

Parity check bits are calculated for each row, which is equivalent to a simple parity check bit. Parity check bits are also calculated for all columns, then both are sent along with the data. At the receiving end these are compared with the parity bits calculated on the received data

19
Q

Describe Checksum

A

In checksum error detection scheme, the data is divided into k segments each of m bits.
In the sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum is complemented to get the checksum.
The checksum segment is sent along with the data segments.
At the receiver’s end, all received segments are added using 1’s complement arithmetic to get the sum. The sum is complemented.
If the result is zero, the received data is accepted; otherwise discarded.

20
Q

Describe CRC

A

Unlike checksum scheme, which is based on addition, CRC is based on binary division.
In CRC, a sequence of redundant bits, called cyclic redundancy check bits, are appended to the end of data unit so that the resulting data unit becomes exactly divisible by a second, predetermined binary number.
At the destination, the incoming data unit is divided by the same number. If at this step there is no remainder, the data unit is assumed to be correct and is therefore accepted.
A remainder indicates that the data unit has been damaged in transit and therefore must be rejected.

21
Q

Describe Hamming Code

A

Hamming code is a set of error-correction codes that can be used to detect and correct the errors that can occur when the data is moved or stored from the sender to the receiver.

22
Q

What is EDGE Computing and why is it important for IoT?

A

Edge computing is a distributed computing paradigm which brings computation and data storage closer to the location where it is needed, to improve response times and save bandwidth