Mid Term Review. Mid Term Wed, April 6 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard.

Slides:



Advertisements
Similar presentations
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Advertisements

Ethernet – CSMA/CD Review
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Doc.: IEEE /1539r0 Submission Dec Minho Cheong, ETRISlide 1 Beam forming for 11ah Date: Authors:
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
Mid Term Review. Mid Term Wed, April 8 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
5-1 Data Link Layer r Wireless Networks m Wi-Fi (Wireless LAN) Example Problems m RTS/CTS.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Binary Exponential Backoff Binary exponential backoff refers to a collision resolution mechanism used in random access MAC protocols. This algorithm is.
Opersating Mode DCF: distributed coordination function
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Mid Term Review. Mid Term Tue, April 1 –Open Book –Open papers –Open laptop In class exam –Duration 1hour 15 minutes Exam level –Not too easy, not too.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
End-to-End Performance and Fairness in Multihop Wireless Backhaul Networks V. Gambiroza, B. Sadeghi, and E. Knightly Rice University.
IEEE WLAN.
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Recitation 8 Wireless Networks.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Tackling Exposed Node Problem in IEEE Mac Deepanshu Shukla ( ) Guide: Dr. Sridhar Iyer.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Wireless Sensor Networks M Homework #2. IEEE MAC Protocol - Star topology – Part I Consider a square area equipped with 30 nodes distributed.
Midterm Review. Physical Layer Physical layer design goal: send out bits as fast as possible with acceptable low error ratio C=B*log(1+S/N) – C is the.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Wireless Media Access Protocols Hari Balakrishnan LCS and EECS Massachusetts Institute of Technology
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Mid Term Review. Mid Term Wed, April 4 –Open Book –Open papers –Open laptop In class exam –Duration 1 hour 15 minutes Exam level –Not too easy, not too.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
MAC Protocols for Sensor Networks
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC Protocols for Sensor Networks
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Distributed Medium Access Control in Wireless Networks
Topics in Distributed Wireless Medium Access Control
CS 457 – Lecture 6 Ethernet Spring 2012.
Some Mid-Term Thoughts
Chapter 6 Multiple Radio Access.
Presentation transcript:

Mid Term Review

Mid Term Wed, April 6 –Open book –Open papers –Open slides In class exam –Duration 1 hour Exam level –Not hard

–Wireless medium access control CSMA/CD and CSMA/CA Carrier Sensing Backing off WiFi Design Rate control, Directional antennas –Energy management –Localization Fingerprinting Logical localization War-driving and unsupervised Map matching Location privacy –Location privacy Syllabus: Everything covered till today

Approximate Exam Format Around 4 questions Q1. to Q2. -- Set of true/false statements –You will need to justify your answer in one sentence Q3 -- Topic question with sub-parts –You may need to work out small problems –You may need to argue and/or identify flaws –You may need to give examples/counter-examples Q4. -- Design Question –You may need to sketch the design a system

Approximate Exam Format Questions should NOT require you to know paper details –No need to know how many bytes is RTS/CTS, –Or what is the exact equation in RADAR, –Or how much accuracy does UnLoc achieve … Remember it’s an open papers, open book, open slides exam

Some Focus Topics Understand Basics (Undergrad review) –Transmission time, propagation delay, Q delay –CSMA/CD Vs CSMA/CA Understand well –Carrier sensing, Backoff, Hidden/Exposed terminals –RTS/CTS, ACK, NAV, Spatial Reuse –Directional antennas, rate control –Energy management (Beacons, PSM, SleepWell) Localization –Fingerprinting –Unsupervised nature –Sensor data clustering –Notions of privacy, K-anonymity

Some Example Questions

(T/F): A transmitter need not carrier sense when it is backing off (T/F): Total time to transmit a packet is the sum of the time for the bits to leave the transmit antenna + propaation delay + time to receive all the bits at the receive antenna (T/F): Say a transmitter has picked a random backoff as 7 slots. Each slot is equal to a second. (T/F): Two links can be active in parallel because they are just adequately away from each other. If one of the links reduces its transmit rate, the links will have to operate in series. (T/F) Collision detection is where the recevier can identify that a collision has occurred by checking the CRC of the packet. (T/F): When using , let X be the max throughput a user gets by transmitting to an AP. With increasing number of contenders, the aggregate throughput will first increase and then decrease, relative to X. –(assume that all users transmit identical traffic and transmit at a specified data rate).

Some say that IEEE solves hidden terminal problems (HTP) by introducing the RTS/CTS mechanism. –1. List at least 2 counter-arguments. Use figures if necessary. –2. Assume that in Jupiter, signal power degrades linearly with distance (as opposed to exponentially with factor α). Will that be better or worse for the spatial reuse of the wireless network? Discuss in 2 or 3 sentences.

(T/F): Finding out logical locations from physical locations is difficult due to the absence of such lookup databases RADAR is deemed to violate privacy of users because APs can continuously learn where the users are. Does UnLoc violate privacy as well? If so, why? If not, why not? If so, is it possible to make UnLoc privacy preserving? SleepWell delays some beacons, implying that some clients will get their packets later than if SleepWell was not used. Does this degrade the latency observed by SleepWell? Can SleepWell improve the latency of transmission? Why?

Some Non-Examples What is the size of RTS/CTS packets? After how many attempts does WiFi drop the packet? What is the WiFi fingerpriting equation in SurroundSense? What is the equation that shows the received signal power for a beamformed communication These type of questions will not be asked

Any Questions? …

Please TA your class ppt slides if you have not done so already