Professional Documents
Culture Documents
a. Discuss the reason behind more errors in wireless link compared to wired
link?
b. What is connection oriented from the perspective of transport layer.
c. What is the full form of FEC?
d. What is the difference between centralized and decentralized system?
e. What is encapsulation?
f. What do you mean by mobility binding?
g. Explain the terminologies
a. Foreign agent
b. Correspondent node
c. Home network
h. Explain any two methods to control congestion?
i. Discuss the transaction oriented TCP.
j. Short Note on 4G
k. Challenges of 4g and explain any 2
l. Explain the features of Transaction Oriented TCP.
m. What are the functions of network layers?
1. Discuss the reason behind more errors in wireless link compared to wired
link?
[1]Wireless links are not as strong as wired links. The radio quality may differ
significantly over time, thus, the bandwidth is generally lower, and transmission errors
occur more often. [2] More errors are generated while sending signals over a
unidirectional radio based medium than in a guided medium such as coax or fiber. Signal
strength is weakened with the distance between the portable station and the base station,
and radio signals bounce off objects, leading to interference and multi-path effects. To
screen upper protocol layers from transmission errors, interleaving, error correction and
retransmissions can be used at lower layers. In several wireless networks, the Data link
layer performs error recovery according to an Automatic repeat request (ARQ) protocol
The Transmission Control Protocol (TCP) has proved proficient in classical wired
networks, presenting an ability to acclimatize to modern, high-speed networks and
present new scenarios for which it was not formerly designed. Wireless access to the
Internet requires that information reliability be reserved while data is transmitted over the
radio channel. Automatic repeat request (ARQ) schemes and TCP techniques are often
used for error-control at the link layer and at the transport layer, respectively.
Since TCP uses an ARQ mechanism based on positive acknowledgments, reliability is
achieved. Every byte is numbered and the number of the first byte in a segment is used as
a sequence number in the TCP header.
A cumulative acknowledgment is transmitted by a receiver in reply to an incoming
segment, which implies that many segments can be acknowledged at the same time.
TCP manages a retransmission timer which starts when a segment is transmitted. If
the timer expires before the acknowledgement of the segment, TCP retransmits the
segment.
Intermittent connectivity and High bit error rates characterize wireless links. This can
result in considerable deprivation in the performance of TCP over wireless networks
because non-congestion related packet losses can be misunderstood by TCP as
indications of network congestion which results in unnecessary congestion control. TCP
interprets the entire data loss as congestion in the network and thus, TCP decreases its
transmission rate to reduce the congestion. TCP was primarily designed for wired
networks which have a very different character from wireless.
2) Wireless Internet should work indoor and outdoor, for both fixed and movable users.
The complex performance of TCP over wireless has been the center of attention in recent
years, and researchers experimenting with TCP are always intense to show the efficiency
of their enhancements by displaying results from numerous tests over varying network
conditions, largely making use of accepted network simulators, and seldom using
wireless testbeds. The key issue for TCP over wireless is of elevated packet loss rate of
unsystematic nature on the transmission channels, which was not present in TCP's design
from day one.
As packet switched Internet is reaching more and more private and business users, The
challenge in modeling the performance of TCP over wireless channels is the complexity
in setting up a true wireless testbed and performing experiments, and gathering precise
statistics on TCP's true performance of a server placed somewhere in the Internet
transporting data over HTTP or FTP. Another challenge is in the acquirement of right
equipment and tools to set up the wireless testbed. Hence, researchers frequently choose
to simulate and emulate as the mode of experimenting with TCP, using predefined
wireless channel models. Once limited, Wi-Fi hotspots are widespread now easily
connecting users to web pages, email, or file downloads from a larger wired Internet. The
innovative communication standard is a wireless network communicating to a fixed
wired host at an end point. Mixing wired and wireless networks underneath the TCP/IP
presents numerous challenges. TCP was formerly proposed for wired networks which are
of a very different nature from wireless networks. A few of the challenges presented by
wireless networks are elevated bit error rates, route changes, and disconnections due to
mobility [6]. If placed in this setting without any modifications, TCP will offer a
consistent transport; on the other hand, performance will decline considerably. Numerous
solutions have been proposed to adapt TCP to pure wireless and heterogeneous networks.
Decentralized networks are organized in a much more distributed fashion. Each node
within the network functions as a separate authority with independent decision-making
power regarding how it interacts with other systems. These networks also distribute
processing power and workload functions among connected servers
5. What is encapsulation?
simple method that describes how to take an IP datagram and make it the payload
of another IP datagram.
Encapsulation is required because each datagram we intercept and forward needs to
be resent over the network to the device's care-of address.
6. What do you mean by mobility binding?
The Mobile Node sends its registration request to the Home Agent. The HA now sets
up a mobility binding containing the mobile node's home IP address and the current
COA.
7. Explain the terminologies in Mobile IP
a.Foreign agent: It is a router in foreign network to which mobile node is
currently connected. The packets from the home agent are sent to the foreign
agent which delivers it to the mobile node.
Open loop congestion control policies are applied to prevent congestion before it
happens. The congestion control is handled either by the source or the destination.
Closed loop congestion control technique is used to treat or alleviate congestion after it
happens. Several techniques are used by different protocols; some of them are:
1. Backpressure :
Backpressure is a technique in which a congested node stop receiving packet from
upstream node. This may cause the upstream node or nodes to become congested
and rejects receiving data from above nodes. Backpressure is a node-to-node
congestion control technique that propagate in the opposite direction of data flow.
The backpressure technique can be applied only to virtual circuit where each node
has information of its above upstream node.
1. In above diagram the 3rd node is congested and stops receiving packets as a result
2nd node may be get congested due to slowing down of the output data flow.
Similarly 1st node may get congested and informs the source to slow down.
2. Choke Packet Technique :
Choke packet technique is applicable to both virtual networks as well as datagram
subnets. A choke packet is a packet sent by a node to the source to inform it of
congestion. Each router monitor its resources and the utilization at each of its
output lines. whenever the resource utilization exceeds the threshold value which
is set by the administrator, the router directly sends a choke packet to the source
giving it a feedback to reduce the traffic. The intermediate nodes through which
the packets has traveled are not warned about congestion.
TCP for Transactions (T/TCP) is a possible successor to both TCP and UDP. It is a
transaction-oriented protocol based on a minimum transfer of segments, so it does not
have the speed problems associated with TCP. By building on TCP, it does not have the
unreliability problems associated with UDP. With this in mind, RFC1379 was published
in November 1992. It discussed the concepts involved in extending the TCP protocol to
allow for a transaction-oriented service. Some of the main points the RFC discussed were
bypassing the three-way handshake and shortening the TIME-WAIT state from 240
seconds to 12 seconds. Eighteen months later, RFC1644 was published, with the
specification for Transaction TCP. T/TCP cuts out much unnecessary handshaking and
error detection done by the current TCP protocol, and as a result, increases the speed of
connection and reduces the necessary bandwidth.
What is a Transaction?
The term “transaction” refers to the request sent by a client to a server, along with the
server's reply. RFC955 lists some of the common characteristics of transaction processing
applications:
Asymmetrical Model: the two end points take different roles; this is a typical
client-server role where the client requests the data and the server responds.
Short Duration: normally, a transaction runs for a short time span.
Few Data Packets: each transaction is a request for a small piece of information,
rather than a large transfer of information both ways.
Background to T/TCP
The growth of the Internet has put a strain on the bandwidth and speed of networks.
There are now more users than ever, and a more efficient form of data transfer is needed.
The absolute minimum number of packets required in a transaction is two: one request
followed by one response. UDP is the one protocol in the TCP/IP protocol stack that
allows this, but the problem is the unreliability of the transmission.
T/TCP has the reliability of TCP and comes very close to realizing the 2-packet exchange
(three in fact). T/TCP uses the TCP state model for its timing and retransmission of data,
but introduces a new mechanism to allow the reduction in packets.
Even though three packets are sent using T/TCP, the data is carried on the first two, thus
allowing the applications to see the data with the same speed as UDP. The third packet is
the acknowledgment to the server by the client that it has received the data, which is how
the TCP reliability is incorporated.
Basic Operation
Consider a DNS system, one where a client sends a request to a server and expects a
small amount of data in return. A diagram of the transaction can be seen in Figure 1. This
diagram is very similar to a UDP request with a saving of 66% in packets transferred
compared to TCP. Obviously, in cases where a large amount of data is being transferred,
there will be more packets transmitted and thus a decrease in the percentage saved.
There are two approaches based on the connection you are using – Wired Connection -
> Detection and recovery after the congestion
This thing needs to -> have better flow control mechanism.
The evolved packet core communicates with packet data networks in the outside world
such as the internet, private corporate networks or the IP multimedia subsystem. The
interfaces between the different parts of the system are denoted Uu, S1 and SGi as shown
below:
The internal architecture of the user equipment for LTE is identical to the one used by
UMTS and GSM which is actually a Mobile Equipment (ME). The mobile equipment
comprised of the following important modules:
Universal Integrated Circuit Card (UICC) : This is also known as the SIM card
for LTE equipments. It runs an application known as the Universal Subscriber
Identity Module (USIM).
A USIM stores user-specific data very similar to 3G SIM card. This keeps information
about the user's phone number, home network identity and security keys etc.
The architecture of evolved UMTS Terrestrial Radio Access Network (E-UTRAN) has
been illustrated below.
The E-UTRAN handles the radio communications between the mobile and the evolved
packet core and just has one component, the evolved base stations, called eNodeB or
eNB. Each eNB is a base station that controls the mobiles in one or more cells. The base
station that is communicating with a mobile is known as its serving eNB.
LTE Mobile communicates with just one base station and one cell at a time and there are
following two main functions supported by eNB:
The eBN sends and receives radio transmissions to all the mobiles using the
analogue and digital signal processing functions of the LTE air interface.
The eNB controls the low-level operation of all its mobiles, by sending them
signalling messages such as handover commands.
Each eBN connects with the EPC by means of the S1 interface and it can also be
connected to nearby base stations by the X2 interface, which is mainly used for signalling
and packet forwarding during handover.
A home eNB (HeNB) is a base station that has been purchased by a user to provide
femtocell coverage within the home. A home eNB belongs to a closed subscriber group
(CSG) and can only be accessed by mobiles with a USIM that also belongs to the closed
subscriber group.
The architecture of Evolved Packet Core (EPC) has been illustrated below. There are few
more components which have not been shown in the diagram to keep it simple. These
components are like the Earthquake and Tsunami Warning System (ETWS), the
Equipment Identity Register (EIR) and Policy Control and Charging Rules Function
(PCRF).
Below is a brief description of each of the components shown in the above architecture:
The Home Subscriber Server (HSS) component has been carried forward from
UMTS and GSM and is a central database that contains information about all the
network operator's subscribers.
The Packet Data Network (PDN) Gateway (P-GW) communicates with the
outside world ie. packet data networks PDN, using SGi interface. Each packet
data network is identified by an access point name (APN). The PDN gateway has
the same role as the GPRS support node (GGSN) and the serving GPRS support
node (SGSN) with UMTS and GSM.
The serving gateway (S-GW) acts as a router, and forwards data between the base
station and the PDN gateway.
The mobility management entity (MME) controls the high-level operation of the
mobile by means of signalling messages and Home Subscriber Server (HSS).
The Policy Control and Charging Rules Function (PCRF) is a component which is
not shown in the above diagram but it is responsible for policy control decision-
making, as well as for controlling the flow-based charging functionalities in the
Policy Control Enforcement Function (PCEF), which resides in the P-GW.
The interface between the serving and PDN gateways is known as S5/S8. This has two
slightly different implementations, namely S5 if the two devices are in the same network,
and S8 if they are in different networks.
(a) Explain Traditional TCP methods - Congestion Control, Slow Start , Fast
Retransmission.
[6]
OR
(c) Explain the priniciple behind WiMAX - OFDM (refer the block diagrams)
[6]
Question: 3.
[12]
OR
Chapter 2
Chapter 3
Chapter 4
26 Explain Traditional TCP methods - Congestion Control , Slow Start , Fast Retranmission.
27 Explain Classical TCP Improvment - Indirect, Snoop, Mobile, Selective and Transaction
Oriented TCP.
Question can be formed like - Explain Indirect TCP with its adv and disadv. *** ( *** very
important).
Chapter 6
Chapter 7
33 Explain Adhoc network with its adv and disad and with its usage.
Chpater 8