Вы находитесь на странице: 1из 5

Wireless Communication

CSE 6057 Class Assignment # 5 Fall 2011


MohammadMamunElahi Page # 1 January 15, 2013

Mobility Management: Network and Transport Layer
Date: Fr i day, December 13, 2011

Q.1 Suppose the correspondent in the following Figure 1 were mobile. Sketch the additional networklayer
infrastructure that would be needed to route the datagram from the original mobile user to the (now mobile)
correspondent. Show the structure of the datagram(s) between the original mobile user and the (now mobile)
correspondentasinFigure2.

Figure1 Figure2
Solution: I f t he cor r espondent i s mobi l e, t hen any dat agr ams dest i ned t o
t he cor r espondent woul d have t o pass t hr ough t he correspondents home
agent. The foreign agent i n t he net wor k bei ng vi si t ed woul d al so need t o
be i nvol ved, si nce i t i s t hi s f or ei gn agent t hat not i f i es t he
cor r espondent s home agent of t he l ocat i on of t he cor r espondent . Dat agr ams
r ecei ved by t he cor r espondent s home agent woul d need t o be
encapsul at ed/ t unnel ed bet ween t he cor r espondent s home agent and f or ei gn
agent .
Q.2Inthefollowingfigure,fillupthepacketswithIPaddresses:
Solution:

Wireless Communication
CSE 6057 Class Assignment # 5 Fall 2011
MohammadMamunElahi Page # 2 January 15, 2013
Q.3Considertwomobilenodesinaforeignnetworkhavingaforeignagent.Isitpossibleforthetwomobilenodes
tousethesamecareofaddressinmobileIP?Explainyouranswer.
Solution: Two mobi l es coul d cer t ai nl y have t he same car e- of - addr ess i n t he
same vi si t ed net wor k. I ndeed, i f t he car e- of - addr ess i s t he addr ess of t he
f or ei gn agent , t hen t hi s addr ess woul d be t he same. Once t he f or ei gn agent
decapsul at es t he t unnel ed dat agr am and det er mi nes t he addr ess of t he
mobi l e, t hen separ at e addr esses woul d need t o be used t o send t he
dat agr ams separ at el y t o t hei r di f f er ent dest i nat i ons ( mobi l es) wi t hi n t he
vi si t ed net wor k.

Q.4Consideraschemeinwhichamobilehosttravelstoforeign networkswhileretainingitshomeIPaddress.To
supportthis,mobilehostsadvertisetheirhomeIPaddresstoforeignrouters,whothenpropagatethisinformation
to other routers during routing updates. Name at least three advantages and three disadvantages of this scheme
comparedtoMobileIP.
Solution:
+ The new scheme enabl es mor e ef f i ci ent r out i ng t han Mobi l e I P
( assumi ng t hat t he r out er s r ecei ve t i mel y r out e updat es) . Mobi l e I P
suf f er s t he i nef f i ci ency of t r i angl e r out i ng.
+ The new scheme avoi ds t he over head of encapsul at i on.
+ The new scheme i s mor e f aul t t ol er ant t han Mobi l e I P, wher e t he home
agent i n Mobi l e I P i s a si ngl e poi nt of f ai l ur e.
+ I n t he new scheme t he mobi l e host does not need t o al l ocat e an
addr ess i n t he f or ei gn net wor k.
- The new scheme woul d pr opagat e r out i ng updat es sl owl y.
- The new scheme r equi r es modi f yi ng r out er s. Rout er s woul d have t o be
modi f i ed t o handl e t he new adver t i sement s f r omhost s.
- I f l ar ge number s of mobi l e host s use t he new scheme, r out i ng t abl es
woul d become ver y l ar ge. Ever y mobi l e host woul d cr eat e an ent r y i n t he
r out i ng t abl e. Cur r ent l y, t hi s does not happen because al l t he host s i n
a subnet can be aggr egat ed i nt o one r out i ng t abl e ent r y.
- The new scheme does not pr eser ve l ocat i on pr i vacy. Anyone can use
t r acer out e t o det er mi ne whi ch net wor k t he mobi l e host i s connect ed t o,
whi ch can pr ovi de t he mobi l e host s geogr aphi c l ocat i on.

Q.5Howcanamobilehostdeterminethatithasmovedfromonenetworktoanother?
Solution:The MHs t r y t o di scover FAs and t hus det ect i t s movement . HAs and
FAs per i odi cal l y i dent i f y t hemsel ves by br oadcast i ng agent
adver t i sement s. The MH r ecei ves t hese agent adver t i sement s. That i s how
i t can det ect i t s own movement .

Q.6 What happens when a Mobile IP user moves from one foreign network to another? Can TCP connections be
maintainedthroughsuchatransition?
Solution: The MN r egi st er s wi t h di f f er ent FAs. HAs and FAs br oadcast t hei r
pr esence on each net wor k t o whi ch t hey ar e at t ached ( Beacon messages
vi a I CMP Rout er Di scover y Pr ot ocol ( I RDP) ) . MN l i st ens f or
adver t i sement and t hen i ni t i at e r egi st r at i on. When MN moves t o a
di f f er ent f or ei gn net wor k, i t r egi st er s i t s COA wi t h i t s HA.
Regi st r at i on cont r ol messages ar e sent vi a UDP t o a wel l known por t .
Yes, t he TCP connect i ons can be mai nt ai ned.

Q.7ExplainbrieflyhowthestandardTCPhandlespacketloss.
Solution: TCP assumes t hat : ( i ) packet l oss occur s onl y due t o congest i on,
and ( i i ) packet l oss i s r ar e. Thus, once a packet l oss i s det ect ed, TCP
r educes t he congest i on wi ndow si ze at t he sender . ( Not e: The exact
r educt i on depends on t he ver si on of TCP; i t can be, f or exampl e, a
r educt i on t o 1 segment , or r educt i on t o hal f of t he cur r ent wi ndow
si ze.
Wireless Communication
CSE 6057 Class Assignment # 5 Fall 2011
MohammadMamunElahi Page # 3 January 15, 2013
Q.8ExplaintheeffectofdisconnectionofaMobileHost(running802.11andstandardTCP)betweentwosessions
(connections)withtwoAccessPoints(AP1andAP2).
Solution: The Mobi l e Host ( MH) moves out of r ange of AP1, at whi ch poi nt
packet s ar e not del i ver ed t o AP1 and t he end node whi ch MH communi cat es
wi t h vi a TCP. As a r esul t , even i f MH wer e t he onl y node wi t hi n r ange
of t he AP, t he MH s wi ndow i s unnecessar i l y shr unk by TCP. When MH get s
i n r ange of AP2 and r e- est abl i shes i t s connect i on, i t wi l l r esume
t r ansmi t t i ng wi t h a smal l wi ndow si ze, t hus achi evi ng l ower t hr oughput
t han i t coul d ( agai n, assumi ng f or exampl e MH bei ng t he onl y node
wi t hi n r ange of AP2) .

Q.9 Propose an interaction between the data link layer protocol and TCP (both running at the Mobile Host) that
could improve TCP performance in the mobile and wireless environment. (Note: Please do not consider
modificationsattheaccesspoint.)
Solution: The dat a l i nk l ayer pr ot ocol of t he MH coul d pr ovi de
not i f i cat i ons t o t he MH s TCP on t he t ype of er r or s t hat cause packet
l oss. I n par t i cul ar , i f t he dat a l i nk l ayer coul d i nf or m t hat er r or s
ar e due t o di sconnect i on ( e. g. , t he AP i s not r eachabl e) or due t o
wi r el ess channel er r or s ( e. g. , l ow si gnal t o noi se r at i o) , t hen TCP
woul d not be mi sl ed t hat such l oss i s due t o congest i on, and t he MH
sender wi ndow si ze woul d not be unnecessar i l y r educed.

Q.10ConsidertwooftheTCPvariantsthatweredevelopedformobile,wirelessenvironments,ITCPandMTCP,
and the related congestion window of the sender. What is the objective of those protocols with respect to the
sender window, when packet loss (due to channel errors or disconnections) occurs at mobile hosts wireless
connection? (Note: Pleasegivea brief answer; responses that simplyexplain howITCP and MTCP work will not
earnanycredit.)
Solution:Bot h I - TCP and M- TCP t r y exact l y t o di st i ngui sh packet l osses due
t o t r ansmi ssi on or di sconnect i on er r or s f r om t hose due t o congest i on.
When a t r ansmi ssi on or di sconnect i on er r or s occur t he pr ot ocol s pr event
sender s wi ndow f r om shr i nki ng and accor di ngl y pr event t hr oughput f r om
suf f er i ng.

Q.11 (a) Give an example where the length of the roundtrip is 3 hops (triangle routing). Assign each node the
necessary IP address(es). Indicate what Mobile IP functions do the intermediate nodes play. Draw the nodes as
vertices,andusedirectededgesandnumberstoshowthepacketflowandorderofpackets.
(b) Give an example where the length of the roundtrip is 4 hops. Assign each node the necessary IP addresses.
IndicatewhatMobileIPfunctionstheintermediatenodesplay.Drawthenodesasvertices,andusedirectededges
andnumberstoshowthepacketflowandorderofpackets.
Solution:(a)We assume basi c Mobi l e I Pv4.

Wireless Communication
CSE 6057 Class Assignment # 5 Fall 2011
MohammadMamunElahi Page # 4 January 15, 2013
(b) Give an example where the length of the roundtrip is 4 hops. Assign each node the necessary IP
addresses. Indicate what Mobile IP functions the intermediate nodes play. Draw the nodes as vertices, and use
directededgesandnumberstoshowthepacketflowandorderofpackets.Foreachdirectededge,indicatewhether
thetrafficistunneled.IndicatewhichversionofMobileIPv4youassumed.
Solution: We assume basi c Mobi l e I Pv4. A sol ut i on wi t h t he Rever se
Tunnel i ng ext ensi on i s al so possi bl e.

Q.12 A mobile node receives data from a fixed host using TCP. At some point in time t0, the mobile node is
disconnected.Themobilenodereconnectsafterafewsecondsattimet1,andkeepsthesameIPaddress.Hencethe
TCP connection does not break. However, after the mobile node is reconnected, the fixed host resumes data
transmissiononlyattimet1+,i.e.,withaconsiderabledelay.Explainwhythishappens,andproposeawayto
circumventthisproblem.
Solution: Packet s f r om t he f i xed host ar e l ost , and af t er ever y t i me- out ,
t he RTO i s doubl ed. Hence, af t er t he node r e- connect s, i t wi l l t ake a
whi l e bef or e t he f i xed host at t empt s anot her r et r ansmi ssi on. Exampl e
sol ut i on: af t er t he mobi l e node r e- connect s, i t can t r i gger a
r et r ansmi ssi on wi t h a t r i pped dupl i cat e ack.

Q.13ConsidertwovariantsofTCPformobilenetworks,ITCPandSnoopingTCP.Oneofthesevariantspreserves
reliable endtoend semantics, the other does not. Which variant preserves endtoend semantics? Provide an
examplescenariowhichdemonstratesthatonevariantdoesnotpreserveendtoendsemantics,andtheotherdoes.
When giving the example, please list the entities involved and the packets exchanged. (List only, please avoid
lengthydescriptions.)
Wireless Communication
CSE 6057 Class Assignment # 5 Fall 2011
MohammadMamunElahi Page # 5 January 15, 2013
Solution: Snoopi ng TCP does, and I - TCP does not pr eser ve r el i abl e end- t o-
end semant i cs. Exampl e scenar i o ent i t i es: Cor r espondent Node ( CN) ,
For ei gn Agent ( FA) , Mobi l e Node ( MN) .
I - TCP: 1) CN sends packet 2) FA r ecei ves packet 3) FA sends ack
f or packet t o CN 4) FA cr ashes bef or e i t can f or war d t he packet t o t he
MN. Now, CN bel i eves t hat t he packet was del i ver ed, but i t was not
r el i abl e end- t o- end semant i cs ar e vi ol at ed.
Snoopi ng TCP: The FA wi l l not send an ack i n st ep 3) . The CN wi l l
t i me- out wai t i ng f or an ack f or t he packet , and hence r eal i ze t hat t he
packet was not del i ver ed.

Q.14Solvedintheclass.

Вам также может понравиться