CSE 461 Midterm Review
A quick tour of what we have learned so far
CSE 461 Midterm Review A quick tour of what we have learned so far - - PowerPoint PPT Presentation
CSE 461 Midterm Review A quick tour of what we have learned so far Midterm Topic Coverage Midterm is on Everything we covered in lecture slides, textbook, and Feb. 10, Mon assignments before Section 3.1 (Backward Learning and Spanning Tree
A quick tour of what we have learned so far
Everything we covered in lecture slides, textbook, and assignments before Section 3.1 (Backward Learning and Spanning Tree Algorithm will not be included)
Midterm is on
OSI Model (Open Systems Interconnection):
, MAC, PPP
Note: Presentation and Session layers are usually counted into Transport layer; Ethernet is a mix of link and physical layer.
Transmission Delay:
Propagation Delay
Meaning: The amount of data that can be held in the wire.
Example:
Suppose data are being transferred from West Coast to East Coast. The bandwidth is 50 Mbps, and the propagation delay is 70 ms. What is the bandwidth delay product? Bandwidth x Delay = 50 Mbps x 70 ms = 50 x 10^6 bps x 70 x 10^(-3) s = 3500 x 10^3 / 8 bytes = 427 KB
Coding:
Modulation:
Variables: B: bandwidth S: signal strength N: noise strength Nyquist Limit:
Shannon Capacity:
Ways to determine the start and end of a frame?
How does each of framing method work? Any advantage and disadvantage? Time: 2 min
Content:
Advantage:
Disadvantage:
Idea:
Advantage:
Disadvantage (Trade-off):
[A, B, ESC, FLAG, ESC, C] => [A, B, ESC, ESC, ESC, FLAG, ESC, ESC, C]
Idea:
behind.
Advantage:
Disadvantage:
Say the original message is:
01100 11111 11111 11111 00100
Using bit stuffing, the encoded message should be:
01100 111110 111110 111110 00100
Error Detection:
=> Up to d errors will always be detected
Error Correction:
=> Up to d errors will always be corrected
Hamming Distance:
When should we use detection over correction? When should we use correction over detection? Time: 2 min
Situations to use Error Detection:
Situations to use Error Correction:
Error Detection
Error Correction:
We know that for a 11-bit long message with k = 4 check bits, we have the following check bit to message bits coverage:
1 => 1, 3, 5, 7, 9,11,13,15 2 => 2, 3, 6, 7,10,11,14,15 4 => 4, 5, 6, 7,12,13,14,15 8 => 8, 9,10,11,12,13,14,15
Can you see any pattern in the coverage? (2 min)
The corresponding bit of the check bit is always 1! Take check bit 4 for example. 4 = 0b0100.
4 = 0b0100 5 = 0b0101 6 = 0b0110 7 = 0b0111 12 = 0b1100 13 = 0b1101 14 = 0b1110 15 = 0b1111
Message M (11 bits) is encoded into M’ (15 bits) by adding 4 bits of hamming
0 0 0 0 1 0 1 0 1 0 0 1 0 0 0 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Given that 1 bit is flipped in M’, which bit is that?
1 => 1, 3, 5, 7, 9,11,13,15 2 => 2, 3, 6, 7,10,11,14,15 4 => 4, 5, 6, 7,12,13,14,15 8 => 8, 9,10,11,12,13,14,15
Calculate the syndrome:
0 0 0 0 1 0 1 0 1 0 0 1 0 0 0 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 p1=(0+0+1+1+1+0+0+0) mod 2=1 p2=(0+0+0+1+0+0+0+0) mod 2=1 p4=(0+1+0+1+1+0+0+0) mod 2=1 p8=(0+1+0+0+1+0+0+0) mod 2=0 => syndrome=p8p4p2p1=0111
The syndrome is 0111 and we know the mapping:
1 => 1, 3, 5, 7, 9,11,13,15 2 => 2, 3, 6, 7,10,11,14,15 4 => 4, 5, 6, 7,12,13,14,15 8 => 8, 9,10,11,12,13,14,15
=> The error bit is in the coverage of checkbit 1, 2, and 4, but not in 8! => The error bit is bit 7
0 0 0 0 1 0 1 0 1 0 0 1 0 0 0
What should we do? Stop-and-Wait
Idea:
Problems:
Meaning:
Common ways to share a link among multiple users?
Problem?
Still inefficient. Network traffic is bursty and users’ need fluctuate by time.
What do we do next? Multiple Access protocols
Idea:
Performance:
Idea:
Problem?
Idea:
Idea:
Problem:
sending node finishes, thus causing collisions
Improvement?
number of waiting nodes.
Idea:
Performance:
What exactly are hidden terminal problem and exposed terminal problem? How would we solve these problems?
Situation:
Both node A and node C want to send to node B. A and B, B and C are within each other’s range, respectively. However, A and C cannot hear each other. That means, A and C are the hidden terminal for each other. Collision would occur in this case. A B C
Situation:
Node B wants to send to node A, and node C wants to send to node D. Node B and C are within each other’s range and would wait for the other node to send first. As the result, both nodes are waiting even though they are trying to send to different nodes. A B C D
Idea:
packet to the receiver, asking for its permission
(Clear-To-Send) packet to the sender, telling it to send
the receiver and thus would wait for it to finish
Advantages: