SlideShare a Scribd company logo
1 of 29
Wireless&mobilenetworks
CC531: Advanced Networks
Computer Networking,
A top-down approach:Kurose – Ross (8th edition)
Introduction
 Types of wireless and mobile networks
A network that is wireless, but not mobile
A network that is mobile, but not wireless
A network that is both wireless and mobile
 Assumption:
Users are connected into larger network infrastructure by a wireless link at the
network’s edge.
• Wireless LANs as IEEE 802.11
• Cellular networks as 3G network
Introduction
 Elements of a wireless network:
1. Wireless hosts
End devices / end systems.
They run applications and initiate communication.
• Laptop
• Smartphone
• Desktop computer
Wireless hosts may or not be mobile.
network
infrastructure
Introduction
 Elements of a wireless network:
2. Wireless links:
A host connects to a base station through
wireless communication links.
Wireless links connect wireless hosts that
are located at the network’s edge.
Wireless links may also be used to connect
hosts within a network.
network
infrastructure
Introduction
 Elements of a wireless network:
2. Wireless links:
A host connects to a base station through
wireless communication links.
Wireless links connect wireless hosts that
are located at the network’s edge.
Wireless links may also be used to connect
hosts within a network.
network
infrastructure
Introduction
 Elements of a wireless network:
3. Base station:
It is the key part of the wireless network
infrastructure.
It has no counterpart in a wired network.
It is responsible for sending & receiving
data packets.
It is responsible for coordinating the
transmission of multiple wireless hosts.
network
infrastructure
Introduction
 Elements of a wireless network:
 Hosts mode of operation:
a) Infrastructure mode:
 Base station connects mobiles into wired network
 handoff: mobile changes base station providing connection
into wired network
b) Ad-hoc mode:
 no base stations
 nodes can only transmit to other nodes within link coverage
network
infrastructure
Introduction
 Categories of wireless networks
1. Single-hop, infrastructure based:
 These networks has a single base station that is connected to the internet.
• IEEE 802.11 network in a classroom
 All data transmissions are one hop away from the base station.
2. Single-hop, infrastructure-less:
 IEEE 802.11networks in ad-hoc mode
 Bluetooth devices
Introduction
 Categories of wireless networks
3. Multi-hop, infrastructure based:
 Base station, located in a wireless network, is connected to a larger wired network.
 Data communications may be done through several relays.
• Wireless mesh network
4. Multi-hop, infrastructure-less:
 Many nodes may be used to relay data until it reaches destination
 Nodes may be mobile
• MANETs ( Mobile Ad-hoc Networks)
• VANETs (Vehicular Ad-hoc Networks)
Wireless links & Network
characteristics
 Important differences between wired links & wireless links:
1. Decreasing signal strength:
 Radio signals attenuates as it passes through matter.
 In space, electro-magnetic radiations disperse as the distance between the sender and receiver
increases (path-loss)
2. Interference from all sources:
 Radio signals of the same frequencies will interfere with each other.
• 2.4 GHZ wireless phones & 802.11 b wireless LAN
3. Multipath propagation:
 It occurs when a portion of the electromagnetic waves reflect-off objects, it take paths of different
lengths between the sender and receiver.
Wireless links & Network
characteristics
 Signal to noise ratio (SNR):
 It is the relative measure of the strength of the received signal and the noise.
 SNR is measured in dB.
 Large SNR makes it easier to extract the transmitted signal from the background noise.
 Bit error rate (BER):
 It is the probability that a transmitted bit is received in error at the receiver.
The higher SNR, the lower BER
 Sender can increase SNR by increasing the transmission power, sender can decrease the probability
that a frame is received in error by increasing the transmission power.
Wireless links & Network
characteristics
 Hidden terminal problem:
 A physical obstruction is preventing A & C from hearing
each other.
 However, their transmissions are interfering with each
other.
 In one scenario, Station A can communicate with Station
B. Station C can also communicate with Access Point
Station B.
 However, Stations A and C cannot communicate with each
other as they are out of range of each other, and thus start
to transmit simultaneously preventing B from receiving
messages intended for it.
A
B
C
Wireless links & Network
characteristics
 Fading / signal attenuation problem:
 An undetectable collision at the receiver that may result
from fading of the signal’s strength in the wireless
medium.
 Both A & C are placed at a distance where they can’t
detect each other’s signal transmission.
 However, their signals are not string enough to interfere.
A B C
A’s signal
strength
space
C’s signal
strength
Wireless links & Network
characteristics
 Managing multiple access is more complex in a wireless network.
 Categories / classes of medium access protocols:
 Channel partitioning
• This method divides the channels into smaller pieces (time slots, frequencies, code)
 Random access
• This method make use of the whole channel without any division, which allows collisions.
• Random access must implement collision recovery mechanisms.
 Taking turns
• Nodes take turns in accessing the channel.
• Nodes with more to send take longer turns.
Question 1
 What is meant by a mobile IP?
Question 1
 What is meant by a mobile IP?
 It is a communication protocol that is designed to allow mobile device users to move from one network
to another while maintaining a permanent IP address.
Question 2
 Explain the function of the following entities:
Mobile Node (MN)
Home Agent (HA)
Home Address
Home Network
Foreign Network
Foreign Agent (FA)
Care of address (COA)
Mobility Binding
Correspondent node (CN)
Question 2
 Explain the function of the following entities:
 Mobile Node (MN)
 a node moving to different network, with permanent home address.
 Home Agent (HA)
a router on a mobile node’s home network which tunnels datagrams for delivery to the mobile
when it is away from home, and maintains current location information for the mobile node.
Home Address
the static fixed IP address allocated to a
mobile node by home agent.
Home Network
 a network, having a network IP matching
that of a mobile node’s home address.
Question 2
 Explain the function of the following entities:
 Foreign Network
a network other than a mobile node’s home network.
 Foreign Agent (FA)
router in foreign network that provides COA and tunneling with home agent and forward the
packets to MN.
Care of address (COA)
termination point of a tunnel toward a MN in the
foreign network.
Mobility Binding
the association of a home address with a care of
address.
Correspondent node (CN)
 a peer node with which a mobile node is communicating.
Question 3
 Discuss the different phases in Mobile IP.
Question 3
 Discuss the different phases in Mobile IP.
Agent discovery: Mobile IP defines the protocols used by a home or foreign agent to
advertise its services to mobile nodes, and protocols for mobile nodes to solicit the
services of a foreign or home agent
Registration: Mobile IP defines the protocols used by the mobile node and/or foreign
agent to register and deregister COAs with a mobile node’s home agent.
Data transfer: the manner in which datagrams are forwarded to mobile nodes by a
home agent, including rules for forwarding datagrams, rules for handling error
conditions, and several forms of encapsulation
Question 3
 Discuss the different phases in Mobile IP.
Question 4
 Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile
nodes to use the same care-of address in mobile IP? Explain your answer.
Question 4
 Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile
nodes to use the same care-of address in mobile IP? Explain your answer.
Two mobiles could certainly have the same care-of-address in the same visited network. Indeed, if the care-
of-address is the address of the foreign agent, then this address would be the same.
Once the foreign agent decapsulates the tunneled datagram and determines the address of the mobile, then
separate addresses would need to be used to send the datagrams separately to their different destinations
(mobiles) within the visited network.
Question 5
 Suppose the correspondent in Figure 6.22 were mobile. Sketch the additional network-layer infrastructure
that would be needed to route the datagram from the original mobile user to the (now mobile)
correspondent. Show the structure of the datagram(s) between the original mobile user and the (now
mobile) correspondent, as in Figure 6.23.
Question 5
 Solution
Question 6
 How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays
of datagrams between the source and the destination?
Question 6
 How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays
of datagrams between the source and the destination?
Because datagrams must be first forward to the home agent, and from there to the mobile node, the delays
will generally be longer than via direct routing.
Note that it is possible, however, that the direct delay from the correspondent to the mobile (i.e., if the
datagram is not routed through the home agent) could actually be smaller than the sum of the delay from
the correspondent to the home agent and from there to the mobile. It would depend on the delays on these
various path segments.
Note that indirect routing also adds a home agent processing (e.g., encapsulation) delay.
Question 7
 How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays
of datagrams between the source and the destination?

More Related Content

Similar to Wireless & Mobile Networks Guide

Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtapVikas Jagtap
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Communication technology
Communication technologyCommunication technology
Communication technologyAbhishek Curtis
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Networking & tele communication
Networking & tele communicationNetworking & tele communication
Networking & tele communicationRahul Tanwar
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYPRINCE KUMAR
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
Rifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdfRifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdfRifDhy22
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingAlisha Jain
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSManju La
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 

Similar to Wireless & Mobile Networks Guide (20)

Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless
WirelessWireless
Wireless
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Networking & tele communication
Networking & tele communicationNetworking & tele communication
Networking & tele communication
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
Rifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdfRifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdf
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Chapter_7.pptx
Chapter_7.pptxChapter_7.pptx
Chapter_7.pptx
 
Chapter 7 v8.0
Chapter 7 v8.0Chapter 7 v8.0
Chapter 7 v8.0
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 

More from NourhanTarek23

CSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdfCSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdfNourhanTarek23
 
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdfCSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdfNourhanTarek23
 
CSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptxCSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptxNourhanTarek23
 
Lect02 Introducing Programming.ppt
Lect02 Introducing Programming.pptLect02 Introducing Programming.ppt
Lect02 Introducing Programming.pptNourhanTarek23
 
Lect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.pptLect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.pptNourhanTarek23
 
Software engineering.pptx
Software engineering.pptxSoftware engineering.pptx
Software engineering.pptxNourhanTarek23
 
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives  IOT and Big Data Era.pptxLect01 Computers Impact on Our lives  IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptxNourhanTarek23
 
Lab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptxLab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptxNourhanTarek23
 
Introduction to computer.pptx
Introduction to computer.pptxIntroduction to computer.pptx
Introduction to computer.pptxNourhanTarek23
 
Introduction to Spring sec2.pptx
Introduction to Spring sec2.pptxIntroduction to Spring sec2.pptx
Introduction to Spring sec2.pptxNourhanTarek23
 
Introduction to Spring sec1.pptx
Introduction to Spring sec1.pptxIntroduction to Spring sec1.pptx
Introduction to Spring sec1.pptxNourhanTarek23
 
Problem set 3-solution.pptx
Problem set 3-solution.pptxProblem set 3-solution.pptx
Problem set 3-solution.pptxNourhanTarek23
 

More from NourhanTarek23 (15)

CSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdfCSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdf
 
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdfCSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
 
CSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptxCSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptx
 
Lect02 Introducing Programming.ppt
Lect02 Introducing Programming.pptLect02 Introducing Programming.ppt
Lect02 Introducing Programming.ppt
 
Lect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.pptLect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.ppt
 
Software engineering.pptx
Software engineering.pptxSoftware engineering.pptx
Software engineering.pptx
 
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives  IOT and Big Data Era.pptxLect01 Computers Impact on Our lives  IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
 
Lab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptxLab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptx
 
section5.pptx
section5.pptxsection5.pptx
section5.pptx
 
Introduction to computer.pptx
Introduction to computer.pptxIntroduction to computer.pptx
Introduction to computer.pptx
 
AOP sec3.pptx
AOP sec3.pptxAOP sec3.pptx
AOP sec3.pptx
 
Introduction to Spring sec2.pptx
Introduction to Spring sec2.pptxIntroduction to Spring sec2.pptx
Introduction to Spring sec2.pptx
 
Introduction to Spring sec1.pptx
Introduction to Spring sec1.pptxIntroduction to Spring sec1.pptx
Introduction to Spring sec1.pptx
 
QoS.pptx
QoS.pptxQoS.pptx
QoS.pptx
 
Problem set 3-solution.pptx
Problem set 3-solution.pptxProblem set 3-solution.pptx
Problem set 3-solution.pptx
 

Recently uploaded

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

Wireless & Mobile Networks Guide

  • 1. Wireless&mobilenetworks CC531: Advanced Networks Computer Networking, A top-down approach:Kurose – Ross (8th edition)
  • 2. Introduction  Types of wireless and mobile networks A network that is wireless, but not mobile A network that is mobile, but not wireless A network that is both wireless and mobile  Assumption: Users are connected into larger network infrastructure by a wireless link at the network’s edge. • Wireless LANs as IEEE 802.11 • Cellular networks as 3G network
  • 3. Introduction  Elements of a wireless network: 1. Wireless hosts End devices / end systems. They run applications and initiate communication. • Laptop • Smartphone • Desktop computer Wireless hosts may or not be mobile. network infrastructure
  • 4. Introduction  Elements of a wireless network: 2. Wireless links: A host connects to a base station through wireless communication links. Wireless links connect wireless hosts that are located at the network’s edge. Wireless links may also be used to connect hosts within a network. network infrastructure
  • 5. Introduction  Elements of a wireless network: 2. Wireless links: A host connects to a base station through wireless communication links. Wireless links connect wireless hosts that are located at the network’s edge. Wireless links may also be used to connect hosts within a network. network infrastructure
  • 6. Introduction  Elements of a wireless network: 3. Base station: It is the key part of the wireless network infrastructure. It has no counterpart in a wired network. It is responsible for sending & receiving data packets. It is responsible for coordinating the transmission of multiple wireless hosts. network infrastructure
  • 7. Introduction  Elements of a wireless network:  Hosts mode of operation: a) Infrastructure mode:  Base station connects mobiles into wired network  handoff: mobile changes base station providing connection into wired network b) Ad-hoc mode:  no base stations  nodes can only transmit to other nodes within link coverage network infrastructure
  • 8. Introduction  Categories of wireless networks 1. Single-hop, infrastructure based:  These networks has a single base station that is connected to the internet. • IEEE 802.11 network in a classroom  All data transmissions are one hop away from the base station. 2. Single-hop, infrastructure-less:  IEEE 802.11networks in ad-hoc mode  Bluetooth devices
  • 9. Introduction  Categories of wireless networks 3. Multi-hop, infrastructure based:  Base station, located in a wireless network, is connected to a larger wired network.  Data communications may be done through several relays. • Wireless mesh network 4. Multi-hop, infrastructure-less:  Many nodes may be used to relay data until it reaches destination  Nodes may be mobile • MANETs ( Mobile Ad-hoc Networks) • VANETs (Vehicular Ad-hoc Networks)
  • 10. Wireless links & Network characteristics  Important differences between wired links & wireless links: 1. Decreasing signal strength:  Radio signals attenuates as it passes through matter.  In space, electro-magnetic radiations disperse as the distance between the sender and receiver increases (path-loss) 2. Interference from all sources:  Radio signals of the same frequencies will interfere with each other. • 2.4 GHZ wireless phones & 802.11 b wireless LAN 3. Multipath propagation:  It occurs when a portion of the electromagnetic waves reflect-off objects, it take paths of different lengths between the sender and receiver.
  • 11. Wireless links & Network characteristics  Signal to noise ratio (SNR):  It is the relative measure of the strength of the received signal and the noise.  SNR is measured in dB.  Large SNR makes it easier to extract the transmitted signal from the background noise.  Bit error rate (BER):  It is the probability that a transmitted bit is received in error at the receiver. The higher SNR, the lower BER  Sender can increase SNR by increasing the transmission power, sender can decrease the probability that a frame is received in error by increasing the transmission power.
  • 12. Wireless links & Network characteristics  Hidden terminal problem:  A physical obstruction is preventing A & C from hearing each other.  However, their transmissions are interfering with each other.  In one scenario, Station A can communicate with Station B. Station C can also communicate with Access Point Station B.  However, Stations A and C cannot communicate with each other as they are out of range of each other, and thus start to transmit simultaneously preventing B from receiving messages intended for it. A B C
  • 13. Wireless links & Network characteristics  Fading / signal attenuation problem:  An undetectable collision at the receiver that may result from fading of the signal’s strength in the wireless medium.  Both A & C are placed at a distance where they can’t detect each other’s signal transmission.  However, their signals are not string enough to interfere. A B C A’s signal strength space C’s signal strength
  • 14. Wireless links & Network characteristics  Managing multiple access is more complex in a wireless network.  Categories / classes of medium access protocols:  Channel partitioning • This method divides the channels into smaller pieces (time slots, frequencies, code)  Random access • This method make use of the whole channel without any division, which allows collisions. • Random access must implement collision recovery mechanisms.  Taking turns • Nodes take turns in accessing the channel. • Nodes with more to send take longer turns.
  • 15. Question 1  What is meant by a mobile IP?
  • 16. Question 1  What is meant by a mobile IP?  It is a communication protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address.
  • 17. Question 2  Explain the function of the following entities: Mobile Node (MN) Home Agent (HA) Home Address Home Network Foreign Network Foreign Agent (FA) Care of address (COA) Mobility Binding Correspondent node (CN)
  • 18. Question 2  Explain the function of the following entities:  Mobile Node (MN)  a node moving to different network, with permanent home address.  Home Agent (HA) a router on a mobile node’s home network which tunnels datagrams for delivery to the mobile when it is away from home, and maintains current location information for the mobile node. Home Address the static fixed IP address allocated to a mobile node by home agent. Home Network  a network, having a network IP matching that of a mobile node’s home address.
  • 19. Question 2  Explain the function of the following entities:  Foreign Network a network other than a mobile node’s home network.  Foreign Agent (FA) router in foreign network that provides COA and tunneling with home agent and forward the packets to MN. Care of address (COA) termination point of a tunnel toward a MN in the foreign network. Mobility Binding the association of a home address with a care of address. Correspondent node (CN)  a peer node with which a mobile node is communicating.
  • 20. Question 3  Discuss the different phases in Mobile IP.
  • 21. Question 3  Discuss the different phases in Mobile IP. Agent discovery: Mobile IP defines the protocols used by a home or foreign agent to advertise its services to mobile nodes, and protocols for mobile nodes to solicit the services of a foreign or home agent Registration: Mobile IP defines the protocols used by the mobile node and/or foreign agent to register and deregister COAs with a mobile node’s home agent. Data transfer: the manner in which datagrams are forwarded to mobile nodes by a home agent, including rules for forwarding datagrams, rules for handling error conditions, and several forms of encapsulation
  • 22. Question 3  Discuss the different phases in Mobile IP.
  • 23. Question 4  Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
  • 24. Question 4  Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer. Two mobiles could certainly have the same care-of-address in the same visited network. Indeed, if the care- of-address is the address of the foreign agent, then this address would be the same. Once the foreign agent decapsulates the tunneled datagram and determines the address of the mobile, then separate addresses would need to be used to send the datagrams separately to their different destinations (mobiles) within the visited network.
  • 25. Question 5  Suppose the correspondent in Figure 6.22 were mobile. Sketch the additional network-layer infrastructure that would be needed to route the datagram from the original mobile user to the (now mobile) correspondent. Show the structure of the datagram(s) between the original mobile user and the (now mobile) correspondent, as in Figure 6.23.
  • 27. Question 6  How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays of datagrams between the source and the destination?
  • 28. Question 6  How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays of datagrams between the source and the destination? Because datagrams must be first forward to the home agent, and from there to the mobile node, the delays will generally be longer than via direct routing. Note that it is possible, however, that the direct delay from the correspondent to the mobile (i.e., if the datagram is not routed through the home agent) could actually be smaller than the sum of the delay from the correspondent to the home agent and from there to the mobile. It would depend on the delays on these various path segments. Note that indirect routing also adds a home agent processing (e.g., encapsulation) delay.
  • 29. Question 7  How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays of datagrams between the source and the destination?