Week 7 - Data-link error control and Data-Link Control (DLC) Flashcards

1
Q

What causes errors to occur in the first place?

A

Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 2 types of error?

A
  1. Single bit
  2. Burst error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If a codeword is valid, is it uncorrupted?

A

No, we cannot guarantee that the codeword is uncorrupted even if it’s valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Block Coding?

A

It’s the basis of datawords and codewords.

A message is divided into blocks.

Each block has redundant bits added for error control which creates a codeword (ex: hamming code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is hamming distance?

A

The number of bits that differ between 2 words.

(NOTE: min hamming distance for error detection refers to the min HD between VALID codewords.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are linear block codes?

A

XOR of 2 valid codewords creates another valid codeword.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is linear block code - Parity-check code?

A

Add 1 bit to the dataword to create codeword with parity bit. Even parity considered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is linear block code - Cyclic codes?

A

Code word rotated to the left to create another valid codeword.
(Ex: 1011000 -> 0110001)
Performance-oriented, used in LAN/WAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Checksum?

A

Error detection for message of any length, typically used in network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Forward error correction (FEC) for?

A

Used in real-time media, takes too long to retransmit so we add redundant bits that allow us to correct the error at the transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 FEC techniques?

A
  1. Hamming distance
  2. XOR operations
  3. Chunk interleaving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does DLC frame data?

A
  1. Fixed size frame
  2. Variable sized (byte/bit oriented approach)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What 2 ways does the data-link layer implement flow control?

A
  1. Buffer overflow, drops packets
  2. Receiver sends feedback to sender
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data-link error control, what happens when error is detected? (2 outcomes)

A
  1. frame dropped (udp?)
  2. frame dropped + ACK sent (tcp?)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 DLC protocols for error and flow control?

A
  1. Simple (no flow or error control)
  2. Stop-and-wait (timer used by sender)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is byte stuffing?

A

Adding an ESC char whenever there is an ESC or FLAG in the text

17
Q

What is bit stuffing?

A

Adding an extra 0 after 5 consecutive 1s so that 01111110 in the text does not get mistaken for a flag.