You are on page 1of 7

Q. What is the basic MAC scheme used in WiMAX to support quality-of-service? The MAC Layer of IEEE 802.

16 was designed for PMP broadband wireless access applications. very-high-data-rate applications with a variety of quality of service (QoS) requirements. MAC layer protocol be flexible and efficient over a vast range of different data traffic models. The MAC layer of IEEE 802.16 divided into convergence-specific and common part sublayers. Convergence-specific sub layers are used to map the transport-layer-specific traffic to a MAC that is flexible enough to efficiently carry any traffic type. Common part sub layer, is independent of the transport mechanism, and responsible for fragmentation and segmentation of MAC service data units (SDUx) into MAC protocol data units (PDUs), QoS control, and scheduling and retransmission of MAC PDUs WiMax provides QoS to ensure priority transmission for real-time voice and video and to offer differentiated service levels for different traffic types. o o o A key feature of 802.16 is that it is a connection oriented technology. The subscriber station (SS) cannot transmit data until it has been allocated a channel by the Base Station (BS). This allows 802.16e to provide strong support for Quality of Service (QoS).

Q. What is basic MAC scheme used in Bluetooth? Bluetooth vs. Wi-Fi IEEE 802.11 in networking?

Bluetooth and Wi-Fi have many applications: setting up networks, printing, or transferring files. o Wi-Fi is for resident equipment and its applications. WLAN, the wireless local area networks. a replacement for cabling for general local area network access in work areas.

Bluetooth for non-resident equipment and its applications. wireless personal area network (WPAN). a replacement for cabling

Wi-Fi is a wireless version of a traditional Ethernet network, and requires configuration to set up shared resources, transmit files, and to set up audio links (for example, headsets and hands-free devices). Wi-Fi uses the same radio frequencies as Bluetooth, but with higher power, resulting in a faster connection and better range from the base station. o o Security Ability to offer a given QoS

Q. What makes it possible that WiMAX can achieve a much higher data rates compared with the W-CDMA. WCDMA Wideband Code Division Multiple Access uses Direct Sequence Spread Spectrum (DSSS) It is based on 3GPP Release 99 and provides data rates of 384 Kbps for wide area coverage and up to 2 Mbps for hot-spot areas. it uses Quadrature Phase Shift Keying (QPSK) for its modulation. WiMAX (IEEE 802.16e) WiMAX, IEEE 802.16e utilizes Orthogonal Frequency Division Multiplexing Access (OFDM/OFDMA) Each sub-carrier then uses QPSK or QAM for modulation. Because WiMax is based on IEEE 802.16 and HiperMAN, IEEE 802.16 divides its media-access control layer into sublayers that support different transport technologies, including IPv4, IPv6, Ethernet, and asynchronous transfer mode. This lets vendors use WiMax no matter which transport technology they support. transmission rangeup to 31 miles WiMax systems to transmit at high power rates and because the approachs use of directional antennas produces focused signals. no more than 500 subscribers per 802.16 base station. WiFi, on the other hand, has a range of only several hundred feet

As Figure 1 shows, WiMax proponents initial vision is that carriers will set up rooftop transceivers as base stations connected to the Internet. Each base station would use WiMax technology to send and receive data to and from fixed subscriber antennas, mounted on rooftops or external walls. From the comparison of OFDMA and CDMA based technologies, we can conclude that WiMAX systems for portable/nomadic use will have better performance (interference rejection, spectral efficiency, multipath tolerance), high data quality of service support (data oriented MAC, symmetric link) and lower future equipment costs (low chipset complexity, high spectral efficiencies). Q. What is ubiquitous computing? Ubiquitous computing (ubicomp) is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is usually considered advancement from the desktop paradigm. More formally Ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs." Ubiquitous computing presents challenges across computer science: in systems design and engineering, in systems modeling, and in user interface design. Contemporary human-computer interaction models, whether command-line, menu-driven, or GUI-based, are inappropriate and inadequate to the ubiquitous case. Contemporary devices that lend some support to this latter idea include mobile phones, digital audio players, radio-frequency identification tags, GPS, and interactive whiteboards. Mark Weiser proposed three basic forms for ubiquitous system devices, see also Smart device: tabs, pads and boards.

Tabs: wearable centimetre sized devices Pads: hand-held decimetre-sized devices Boards: metre sized interactive display devices.

These three forms proposed by Weiser are characterized by being macro-sized, having a planar form and on incorporating visual output displays. Ubiquitous computing touches on a wide range of research topics, including distributed computing, mobile computing, sensor networks, human-computer interaction, and artificial intelligence. Q. Compare and contrast IP and Mobile IP?

IP addresses are typically associated with a fixed non-mobile location such as a router or a client computer. IP routes packets from a source to a destination by allowing routers to forward packets from incoming network interfaces to outbound interfaces according to routing tables. These routing tables typically maintain the next-hop information for each destination IP address, which is based on the number of networks to which that IP address is connected. If the node is mobile, packets sent to this node may never make it as, logically, mobility will force a new IP address to be associated with the node every time it changes its connection point. Constantly changing IP address of a node will make transparent mobility impossible.

Mobile IP was designed to solve this problem by allowing the node to use two IP addresses: Home address Care-of address Mobile IP is optimized only for: macro level mobility and relatively slow moving hosts

Mobile IP routing.
o

Mobile IP was defined in August 2002.

Function
o o o

Mobile IP is IP-Mobility Management (IP-MM). One of its principal functions is to define a way to identify a point on the Internet that physically moves away from its addressed location. This issue is resolved by allowing a unit a second "care of" address, which enables an IP address to be patched to a different location.

Q. Importance of IPV6 in mobility? IPv6 Next generation Internet Protocol Addressing 16 Byte address space Link local, site local, globally routable address Unicast, multicast, anycast address Each node is identified by its own IP address IP address = network prefix + host number

Mobile IP components Mobile Node (MN) Home Agent (HA) and home link Foreign Agent (FA) and foreign link Correspondent Node (CN) Mobile IP protocol Agent Discovery Obtaining COA (Care-of-Address) from FA Registration of COA with HA Tunneling of CN packets from HA to FA Standard routing of packets from MN to CN Advantages from IPv6 Stateless Address Auto configuration To configure the care-of address There is no need of Foreign Agent Neighbor Discovery To detect movement Rout optimization IPv6 Routing Headers IP Security Implement strong authentication and encryption features Additional facilities Coexistence with Internet Ingress Filtering Smooth Handoffs as part of route optimization Renumbering of home networks Automatic home agent discovery Q. Explain CODA Coda is the successor of AFS (Andrew File System) and offers two different types of replication: server replication and caching on clients. Disconnected clients work only on the cache, i.e., applications use only cached replicated files. Figure 1. shows the cache between an application and the server. Coda is a transparent extension of the clients cache manager. This very general architecture is valid for most of todays mobile systems that utilize a cache.

Coda follows an optimistic approach and allows read and write access to all files. The system keeps a record of changed files, but does not maintain a history of changes for each file. The cache always has only one replicate (possibly changed). After reconnection, Coda compares the replicates with the files on the server. If Coda notices that two different users have changed a file, reintegration of this file fails and Coda saves the changed file as a copy on the server to allow for manual reintegration. The optimistic approach of Coda is very coarse grained, working on whole files.

In short, Coda is a distributed filesystem with its origin in AFS2. It has many features that are very desirable for network filesystems. Currently, Coda has several features not found elsewhere. 1. 2. 3. 4. 5. 6. 7. 8. 9. disconnected operation for mobile computing is freely available under a liberal license high performance through client side persistent caching server replication security model for authentication, encryption and access control continued operation during partial network failures in server network network bandwith adaptation good scalability well defined semantics of sharing, even in the presence of network failures

Q. Explain AODV, DSDV and DSR Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc mobile networks based on the Bellman-Ford algorithm. The main contribution of the algorithm was to solve the routing loop problem. Each entry in the routing table contains a sequence number, the sequence numbers are generally even if a link is present; else, an odd number is used.

For example the routing table of Node A in this network is Destination Next Hop Number of Hops Sequence Number Install Time A A 0 A 46 001000 B B 1 B 36 001200 C B 2 C 28 001500

Disadvantages of DSDV

DSDV requires a regular update of its routing tables, battery power Use bandwidth even when the network is idle. .; for highly dynamic networks.

Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad hoc networks (MANETs) and other wireless ad-hoc networks. It is a reactive routing protocol, meaning that it establishes a route to a destination only on demand. a distance-vector routing protocol. AODV avoids the counting-to-infinity problem of other distance-vector protocols by using sequence numbers on route updates, a technique pioneered by DSDV. AODV is capable of both unicast and multicast routing.

Advantages and disadvantages of AODV

advantage routes are established on demand and destination sequence numbers. disadvantages intermediate nodes can lead to inconsistent routes if the source sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number lead to heavy control overhead. the periodic beaconing leads to unnecessary bandwidth consumption. 'Dynamic Source Routing' (DSR) is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one. However, it uses source routing instead of relying on the routing table at each intermediate device.

Advantages and disadvantages of DSR


Advantage uses a reactive approach which eliminates the need to periodically flood the network with table update messages which are required in a table-driven approach.
Disadvantage the route maintenance mechanism does not locally repair a broken link. the connection setup delay is higher than in table-driven protocols.

You might also like