Вы находитесь на странице: 1из 19

What is Signal and also explain about signal propagation?

In electronics, a signal is an electric current or electromagnetic field used to convey data from one place to another. The simplest form of signal is a direct current (DC) that is switched on and off; this is the principle by which the early telegraph worked. More complex signals consist of an alternating-current (AC) or electromagnetic carrier that contains one or more data streams. Data is superimposed on a carrier current or wave by means of a process called modulation. Signal modulation can be done in either of two main ways:analog and digital. In recent years, digital modulation has been getting more common, while analog modulation methods have been used less and less. There are still plenty of analog signals around, however, and they will probably never become totally extinct. Except for DC signals such as telegraph and baseband, all signal carriers have a definable frequency or frequencies. Signals also have a property calledwavelength, which is inversely proportional to the frequency. In some information technology contexts, a signal is simply "that which is sent or received," thus including both the carrier and the data together. In telephony, a signal is special data that is used to set up or control communication. See signaling Signal Propagation: A radio system transmits information to the transmitter. The information is transmitted through an antenna which converts the RF signal into an electromagnetic wave. The transmission medium for electromagnetic wave propagation is free space. Transmission range: receiver receives signal with an error rate low enough to be able to communicate Detection range: transmitted power is high enough to detect the transmitter, but high error rate forbids communication Interference range: sender interferes with other transmissions by adding to the noise. Radio waves exhibit three fundamental propagation behavior Ground wave (< 2 MHz) : waves with low frequency follow earths surface can propagate long distances Used for submarine communication or AM radio Sky wave (2-30 MHz) : waves reflect at the ionosphere and bounce back and forth between ionosphere and earth , travelling around the world Used by international broadcast and amateur radio Line of Sight (> 30 MHz) : emitted waves follow a straight line of sight allows straight communication with satellites or microwave links on the ground used by mobile phone system, satellite systems

2. What is antenna? Explain briefly about various types of antenna? An electrical conductor or system of conductors used for radiating electromagnetic energy into space or for collecting electromagnetic energy from the space. An integral part of a wireless system Radiation Patterns: Antenna radiates power in all directions, but typically does not radiate equally in all directions. Ideal antenna is one that radiates equal power in all direction called an isotropic antenna all points with equal power are located on a sphere with the antenna as its center Omnidirectional Antenna

Produces omni directional radiation pattern of equal strength in all directions Vector A and B are of equal length Directional Antenna: Radiates most power in one axis (direction), radiates less in other direction, vector B is longer than vector A : more power radiated along B than A directional along X Dipole Antenna: Half-wave dipole or Hertz, antenna consists of two straight collinear conductor of equal length Length of the antenna is half the wavelength of the signal. Quarter-wave antenna: Quarter-wave or marconi antenna, has a veritcal conductor of, length quarter of the wavelength of the signal Sectorized Antenna: Several directional antenna, combined on a single pole, to provide sectorized antenna each sector serves receivers, listening it its direction 3. Explain Multipath Propagation in Detail? Wireless signal can arrive at the receiver through different pahs LOS Reflections from objects Diffraction Occurs at the edge of an impenetrable body that is large compared to the wavelength of the signal.

Multipath Propagation (source: Stallings) Inter Symbol Interference (ISI) in multipath (source: Stallings) Effect of Multipath Propagation: Multiple copies of the signal may arrive with different phases. If the phases add destructively, the signal level reduces relative to noise. Inter Symbol Interference (ISI) 4. What is multiplexing? Discuss in detail about different types in Meltiplexing? A fundamental mechanism in communication system and networks Enables multiple users to share a medium For wireless communication, multiplexing can be carried out in four dimensions: space, time, frequency and code

Space division multiplexing: Channels are assigned on the basis of space (but operate on same frequency) The assignment makes sure that the transmission do not interfere with each (with a guard band in between) Frequency Division Multiplexing: Frequency domain is subdivided into several non-overlapping frequency bands Each channel is assigned its own frequency band (with guard spaces in between) Time Division Multiplexing: A channel is given the whole bandwidth for a certain amount of time All senders use the same frequency, but at different point of time Frequency and time division multiplexing: A channel use a certain frequency for a certain amount of time and then uses a different frequency at some other time Used in GSM systems Code division multiplexing: separation of channels achieved by assigning each channel its own code guard spaces are realized by having distance in code space (e.g. orthogonal codes) transmitter can transmit in the same frequency band at the same time, but have to use different code Provides good protection against interference and tapping but the receivers have relatively high complexity has to know the code and must separate the channel with user data from the noise composed of other transmission has to be synchronized with the transmitter 5. What is modulation? Explain in detail. Process of combining input signal and a carrier frequency at the transmitter Digital to analog modulation necessary if the medium only carries analog signal Analog to analog modulation needed to have effective transmission (otherwise the antenna needed to transmit original signal could be large) permits frequency division multiplexing Amplitude Shift Keying (ASK) ASK is the most simple digital modulation scheme Two binary values, 0 and 1, are represented by two different amplitude In wireless, a constant amplitude cannot be guaranteed, so ASK is typically not used Frequency Shift Keying (FSK) The simplest form of FSK is binary FSK assigns one frequency f1 to binary 1 and another frequency f2 binary 0 Simple way to implement is to switch between two oscillators one with f1 and the other with f2 The receiver can demodulate by having two bandpass filter Phase Shift Keying (PSK) Uses shifts in the phase of a signal to represent data

Shifting the phase by 1800 each time data changes: called binary PSK The receiver must synchronize in frequency and phase with the transmitter Quadrature Phase Shift Keying (Q-PSK) Higher bit rate can be achieved for the same bandwidth by coding two bits into one phase shift. 450 for data 11 1350 for data 10 2250 for data 00 3150 for data 01

6. What is spread spectrum. Explain Direct sequence and frequency hopping spread spectrum? Spread Spectrum Spreading the bandwidth needed to transmit data Spread signal has the same energy as the original signal, but is spread over a larger frequency range provides resistance to narrowband interference Direct Sequence Spread Spectrum Takes a user bit sequence and performs an XOR with, what is known as, chipping sequence Each user bit duration tb chipping sequence has smaller pulses tc If chipping sequence is generated properly it may appear as random noise sometimes called pseudo-noise (PN) tb/tc is known as the spreading factor determines the bandwidth of the resultant signal Used by 802.11b Frequency Hopping Spread Spectrum Total available bandwidth is split into many channels of smaller bandwidth and guard spaces Transmitter and receiver stay on one of these channels for a certain time and then hop to another channel Implements FDM and TDM Pattern of channel usage : hopping sequence Time spent on a particular channel: dwell time Slow hopping Transmitter uses one frequency for several bit period systems are cheaper, but are prone to narrow band interference Fast hopping Transmitter changes frequency several times in one bit period Transmitter and receivers have to stay synchronized within smaller tolerances Better immuned to narrow band interference as they stick to one frequency for a very short period Receiver must know the hopping sequence and stay synchronized with the transmitter Used by bluetooth 7. Explain in detail about Cellular wireless networks.

A cellular network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver known as a cell site or base station. When joined together these cells provide radio coverage over a wide geographic area. This enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.) to communicate with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more than one cell during transmission. Cellular networks offer a number of advantages over alternative solutions: increased capacity reduced power use larger coverage area reduced interference from other signals

An example of a simple non-telephone cellular system is an old taxi driver's radio system where the taxi company has several transmitters based around a city that can communicate directly with each taxi. In a cellular radio system, a land area to be supplied with radio service is divided into regular shaped cells, which can be hexagonal, square, circular or some other irregular shapes, although hexagonal cells are conventional. Each of these cells is assigned multiple frequencies (f1 - f6) which have correspondingradio base stations. The group of frequencies can be reused in other cells, provided that the same frequencies are not reused in adjacent neighboring cells as that would cause co-channel interference. The increased capacity in a cellular network, compared with a network with a single transmitter, comes from the fact that the same radio frequency can be reused in a different area for a completely different transmission. If there is a single plain transmitter, only one transmission can be used on any given frequency. Unfortunately, there is inevitably some level of interference from the signal from the other cells which use the same frequency. This means that, in a standard FDMA system, there must be at least a one cell gap between cells which reuse the same frequency. In the simple case of the taxi company, each radio had a manually operated channel selector knob to tune to different frequencies. As the drivers moved around, they would change from channel to channel. The drivers know which frequency covers approximately what area. When they do not receive a signal from the transmitter, they will try other channels until they find one that works. The taxi drivers only speak one at a time, when invited by the base station operator (in a sense TDMA).

Example of frequency reuse factor or pattern

Unit IV 1. What are the requirements of a mobile IP? Mobile IP (or IP mobility) is an Internet Engineering Task Force (IETF) standard communicationsprotocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address. The requirements of mobile IP: Mobile IP allows a node to change its point of attachment to the Internet without needing to change its IP address. This is not simply a configuration simplification, but can facilitate continuous application-level connectivity as the node moves from point to point. A possible solution to this problem would be to distribute routes through the network to declare the node's new location and to update the routing tables so that packets can be correctly dispatched. This might, at first, seem attractive, but it is a solution that scales very poorly since it would be necessary to retain hostspecific routes for each mobile host. As the number of mobile hosts in the Internet increases (and the growth of web access from mobile devices such as cell phones and palm-tops is very rapid), it would become impractical to maintain such tables in the core of the Internet. The solution developed by the IETF involves protocol extensions whereby packets targeted at a mobile host are sent to its home network (as if the host were not mobile) and passed to a static (nonmobile) node called the node'shome agent . The mobile host registers its real location with the home agent, which is responsible for forwarding the packets to the host. If the mobile host is at home (attached to its home network), forwarding is just plain old IP forwarding, but if the host is roving, packets must be tunneled across the Internet to a care-of address where the host has registered its attachment to a foreign agent . At the care-of address (the end of the tunnel) the packets are forwarded to the mobile host. This is illustrated in Figure 10.1 . Note that this tunneling process is only required in one direction. Packets sent by the mobile host may be routed through the network using the standard IP procedures. It is worth observing that although mobile IP can be used to address any IP mobility issue, its use within wireless LANs and mobile phone networks might be better served by linklayer (i.e., sub-IP) procedures

such as link-layer handoff. These processes are typically built into the link-layer mechanisms and involve less overhead than mobile IP. Such processes do, however, require that the mobile host remains logically connected within the IP subnet to which its address belongs -- it becomes the responsibility of the link layer to maintain connections or virtual connections into that subnet. An alternative to tunneling in mobile IP might be to use source routing within IP. IPv4 has been enhanced with optional extensions to support source routing. However, since the source routing extensions to IPv4 are a relatively new development and are in any case optional, many (or even most) deployed IPv4 nodes do not support them. This means that they are not a lot of use for developing mobile IP services over existing IPv4 networks. They may be of more use in new networks that are being constructed for the first time since the Service Providers can insist on these extensions from their equipment vendors.

Figure 10.1 If the mobile node is away from home, IP traffic is sent to a home agent and tunneled across the Internet to a foreign agent for delivery to the mobile node. IPv6 offers some alternatives to tunneling for mobile IP by using the routing extension header. In this way the mobile node can establish communications with its home agent and then use information learned to directly route packets to the destination, bypassing the home agent. Since this feature is built into IPv6 and so supported by all IPv6 implementations, it makes IPv6 a popular option for mobile IP deployments. The main requirement for a mobile IP is that the mobile IP has to be compatible with all lower layer used for standard, non mobile, IP. Mobile IP should remain invisible to higher layers and applications. The end systems enhanced by the implementation of mobile IP must be able to communicate with the fixed systems since in current situation fixed systems are in huge amount and working in all over the world. The effects of mobility include higher delay and low bandwidth so there is also a requirement for bandwidth aware applications. The mobility could cause huge routing advertisements that could possibly flood the whole network so special care regarding efficiency is required.

2. What are the entities in mobile IP?

Mobile IP Functional Entities


Mobile IP introduces the following new functional entities:

Mobile node (MN) Host or router that changes its point of attachment from one network to another network while maintaining all existing communications by using its IP home address. Home agent (HA) Router or server on the home network of a mobile node. The router intercepts datagrams that are destined for the mobile node. The router then delivers the datagrams through the care-of address. The home agent also maintains current information on the location of the mobile node.

Foreign agent (FA) Router or server on the foreign network that the mobile node visits. Provides host routing services to the mobile node. The foreign agent might also provide a care-of address to the mobile node while the mobile node is registered.

Mobile IP enables routing of IP datagrams to mobile nodes. The home address of the mobile node always identifies the mobile node regardless of where the mobile node is attached. When away from home, a care-of address is associated with the mobile node's home address. The care-of address provides information about the current point of attachment of the mobile node. Mobile IP uses a registration mechanism to register the care-of address with a home agent. The home agent redirects datagrams from the home network to the care-of address. The home agent constructs a new IP header that contains the care-of address of the mobile node as the destination IP address. This new header encapsulates the original IP datagram. Consequently, the home address of the mobile node has no effect on the routing of the encapsulated datagram until the datagram arrives at the care-of address. This type of encapsulation is called tunneling. After the datagram arrives at the care-of address, the datagram is de-encapsulated. Then the datagram is delivered to the mobile node. The following figure shows a mobile node that resides on its home network, Network A, before the mobile node moves to a foreign network, Network B. Both networks support Mobile IP. The mobile node is always associated with the home address of the mobile node, 128.226.3.30.

Mobile Node Residing on Home Network

The following figure shows a mobile node that has moved to a foreign network, Network B. Datagrams that are destined for the mobile node are intercepted by the home agent on the home network, Network A. The datagrams are encapsulated. Then, the datagrams are sent to the foreign agent on Network B. The foreign agent strips off the outer header. Then the foreign agent delivers the datagram to the mobile node that is located on Network B. Mobile Node Moving to a Foreign Network

The care-of address might belong to a foreign agent. The care-of address might be acquired by the mobile node through the Dynamic Host Configuration Protocol (DHCP) or the Point-to-Point Protocol (PPP). In the latter situation, a mobile node has a colocated care-of address. Mobility agents (home agents and foreign agents) advertise their presence by using agent advertisement messages. Optionally, a mobile node can solicit an agent advertisement message. The mobile node uses any mobility agent that is attached locally through an agent solicitationmessage. A mobile node uses the agent advertisements to determine whether the mobile node is on the home network or a foreign network. The mobile node uses a special registration process to inform the home agent about the current location of the mobile node. The mobile node is always listening for mobility agents advertising their presence. The mobile node uses these advertisements to help determine when the mobile node moves to another subnet. When a mobile node determines that the mobile node has moved its location, the mobile node uses the new foreign agent to forward a registration message to the home agent. The mobile node uses the same process when the mobile node moves from one foreign network to another foreign network. When the mobile node detects that it is located on the home network, the mobile node does not use mobility services. When the mobile node returns to the home network, the mobile nodederegisters with the home agent.

3. Explain tunneling and encapsulation in mobile IP.


Once a mobile node on a foreign network has completed a successful registration with its home agent, the Mobile IP datagram forwarding process described in the general operation topic will be fully activated. The home agent will intercept datagrams intended for the mobile node as they are routed to its home network, and forward them to the mobile node. This is done by encapsulating the datagrams and then sending them to the node's care-of address. Mobile IP Data Encapsulation Techniques Encapsulation is required because each datagram we intercept and forward needs to be resent over the network to the device's care-of address. In theory, the designers might conceivably have done this by just having the home agent change the destination address and stick it back out on the network, but there are various complications that make this unwise. It makes more sense to take the entire datagram and wrap it in a new set of headers before retransmitting. In our mail analogy, this is comparable to taking a letter received for our traveling consultant and putting it into a fresh envelope for forwarding, as opposed to just crossing off the original address and putting a new one on. The default encapsulation process used in Mobile IP is called IP Encapsulation Within IP, defined in RFC 2003 and commonly abbreviated IP-in-IP. It is a relatively simple method that describes how to take an IP datagram and make it the payload of another IP datagram. In Mobile IP, the new headers specify how to send the encapsulated datagram to the mobile node's care-of address. In addition to IP-in-IP, two other encapsulation methods may be optionally used:Minimal Encapsulation Within IP, defined in RFC 2004, and Generic Routing Encapsulation (GRE), defined in RFC 1701. To use either of these, the mobile node must request the appropriate method in its Registration Request and the home agent must agree to use it. If foreign agent care-of addressing is used, the foreign agent also must support the method desired. The Mobile IP Data Delivery Tunnel

The encapsulation process creates a logical construct called a tunnel between thedevice that encapsulates and the one that decapsulates. This is the same idea of a tunnel used in discussions of virtual private networks (VPNs), IPSec tunnel mode, or the various other tunneling protocols used for security. The tunnel represents a conduit over which datagrams are forwarded across an arbitrary internetwork, with the details of the encapsulated datagram (meaning the original IP headers) temporarily hidden. In Mobile IP, the start of the tunnel is the home agent, which does the encapsulation. The end of the tunnel depends on what sort of care-of address is being used: Foreign Agent Care-Of Address: The foreign agent is the end of the tunnel. It receives encapsulated messages from the home agent, strips off the outer IP header and then delivers the datagram to the mobile node. This is generally done using layer two, because the mobile node and foreign agent are on the same local network, and of course, the mobile node does not have its own IP address on that network (it is using that of the foreign agent.) Co-Located Care-Of Address: The mobile node itself is the end of the tunnel and strips off the outer header. Normally, the tunnel described above is used only for data grams that have been sent to the mobile node and captured by the home agent. When the mobile nodes wants to send a datagram, it doesn't tunnel it back to the home agent; this would be needlessly inefficient. Instead it just sends out the datagram directly using whatever router it can find on its current network, which may or may not be a foreign agent. When it does this, it uses its own home address as the source address for any requests it sends. As a result, any response to those requests will go back to the home network. This sets up a triangle of sorts for these kinds of transactions: 1. The mobile node sends a request from the foreign network to some third party devicesomewhere on the internetwork. 1. The third party device responds back to the mobile node. However, this sends the reply back to the mobile node's home address on its home network. 1. The home agent intercepts the response on the home network and tunnels it back to the mobile node. The reverse transaction would be pretty much the same, just in the reverse order. In that case the third party (Internet) device would send a request to mobile node, which would be received and forwarded by the home agent. The mobile node would reply back directly to the Internet host. Mobile IP Encapsulation and Tunneling

This example illustrates how a typical request/reply message exchange in Mobile IP results in a triangle of communication. In step #1, the mobile node sends a request to a remote server somewhere on the Internet. It uses its own home address as the source for this request, so in step #2 the reply goes back to the home agent. Step #3 consists of the home agent tunneling the reply back to the mobile node. 4. Describe Dynamic host configuration protocol DHCP (Dynamic Host Configuration Protocol) is a communications protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. Using the Internet Protocol, each machine that can connect to the Internet needs a unique IP address, which is assigned when an Internet connection is created for a specific computer. Without DHCP, the IP address must be entered manually at each computer in an organization and a new IP address must be entered each time a computer moves to a new location on the network. DHCP lets a network administrator supervise and distribute IP addresses from a central point and automatically sends a new IP address when a computer is plugged into a different place in the network. DHCP is an extension of an earlier network IP management protocol, Bootstrap Protocol (BOOTP). DHCP is a more advanced protocol, but both configuration management protocols are commonly used and DHCP can handle BOOTP client requests. Some organizations use both protocols, but understanding how and when to use them in the same organization is important. Some operating systems, including Windows NT/2000, come with DHCP servers. A DHCP or BOOTP client is a program that is located in (and perhaps downloaded to) each computer so that it can be configured The Dynamic Host Configuration Protocol (DHCP) is an auto configuration protocol used on IP networks. Computers that are connected to IP networks must be configured before they can communicate with other computers on the network. DHCP allows a computer to be configured automatically, eliminating the need for intervention by a network administrator. It also provides a central database for keeping track of computers that have been connected to the network. This prevents two computers from accidentally being configured with the same IP address. In the absence of DHCP, hosts may be manually configured with an IP address. Alternatively IPv6 hosts may use stateless address auto configuration to generate an IP address. IPv4 hosts may use link-local addressing to achieve limited local connectivity.

In addition to IP addresses, DHCP also provides other configuration information, particularly the IP addresses of local caching DNS resolvers. Hosts that do not use DHCP for address configuration may still use it to obtain other configuration information. There are two versions of DHCP, one for IPv4 and one for IPv6. While both versions bear the same name and perform much the same purpose, the details of the protocol for IPv4 and IPv6 are sufficiently different that they can be considered separate protocols.

Description of the communication steps 1. The client broadcasts a DHCPDISCOVER. 2. Each server may respond with a DHCPOFFER message. 3. The client receives one or more DHCPOFFER messages from one or more servers and chooses one server from which to request configuration parameters. The client broadcasts a DHCPREQUEST message. 4. Those servers not selected by the DHCPREQUEST message use the message as notification that the client has declined that server's offer. The server selected in the DHCPREQUEST message commits the responds with a DHCPACK message containing the configuration parameters for the requesting client. 5. The client receives the DHCPACK message with configuration parameters. At this point, the client is configured. If the client receives a DHCPNAK message, the client restarts the configuration process. 6. The client may choose to relinquish its lease on a network address by sending a DHCPRELEASE message to the server (e.g. on shutdown). 7. The server receives the DHCPRELEASE message and marks the lease as free. 5. Explain routing in IPv6. Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP) that is designed to succeed Internet Protocol version 4 (IPv4). The Internet operates by transferring data in small packets that are independently routed across networks as specified by an international communications

protocol known as the Internet Protocol. Each data packet contains two numeric addresses that are the packet's origin and destination devices. Since 1981, IPv4 has been the publicly used Internet Protocol, and it is currently the foundation for most Internet communications. The Internet's growth has created a need for more addresses than IPv4 has. IPv6 allows for vastly more numerical addresses, but switching from IPv4 to IPv6 may be a difficult process. IPv6 was developed by the Internet Engineering Task Force(IETF) to deal with the long-anticipated IPv4 address exhaustion, and is described in Internet standard document RFC 2460, published in December 1998.[1] Like IPv4, IPv6 is an Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks. While IPv4 allows 32 bits for an Internet Protocol address, and can therefore support 232 (4,294,967,296) addresses, IPv6 uses 128-bit addresses, so the new address space supports 2128(approximately 340 undecillion or 3.41038 ) addresses. This expansion allows for many more devices and users on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT), which gained widespread deployment as an effort to alleviate IPv4 address exhaustion. Routing is the process of forwarding packets between connected network segments. For IPv6-based networks, routing is the part of IPv6 that provides forwarding capabilities between hosts that are located on separate segments within a larger IPv6-based network. IPv6 is the mailroom in which IPv6 data sorting and delivery occur. Each incoming or outgoing packet is called an IPv6 packet. An IPv6 packet contains both the source address of the sending host and the destination address of the receiving host. Unlike link-layer addresses, IPv6 addresses in the IPv6 header typically remain the same as the packet travels across an IPv6 network. Routing is the primary function of IPv6. IPv6 packets are exchanged and processed on each host by using IPv6 at the Internet layer. Above the IPv6 layer, transport services on the source host pass data in the form of TCP segments or UDP messages down to the IPv6 layer. The IPv6 layer creates IPv6 packets with source and destination address information that is used to route the data through the network. The IPv6 layer then passes packets down to the link layer, where IPv6 packets are converted into frames for transmission over networkspecific media on a physical network. This process occurs in reverse order on the destination host. IPv6 layer services on each sending host examine the destination address of each packet, compare this address to a locally maintained routing table, and then determine what additional forwarding is required. IPv6 routers are attached to two or more IPv6 network segments that are enabled to forward packets between them. IPv6 routers IPv6 network segments, also known as links or subnets, are connected by IPv6 routers, which are devices that pass IPv6 packets from one network segment to another. This process is known as IPv6 routing and is shown in the following illustration.

IPv6 routers provide the primary means for joining together two or more physically separated IPv6 network segments. All IPv6 routers have the following characteristics: IPv6 routers are physically multihomed hosts. A physically multihomed host is a network host that uses two or more network connection interfaces to connect to each physically separated network segment. IPv6 routers provide packet forwarding for other IPv6 hosts. IPv6 routers are distinct from other hosts that use multihoming. An IPv6 router must be able to forward IPv6-based communication between networks for other IPv6 network hosts. You can implement IPv6 routers by using a variety of hardware and software products, including a computer running a member of the Windows Server 2003 family with the IPv6 protocol. Routers that are dedicated hardware devices running specialized software are common. Regardless of the type of IPv6 routers that you use, all IPv6 routing relies on a routing table to communicate between network segments. Routing tables t passes the packet to a protocol layer above IPv6 on the local host. It forwards the packet through one of its attached network interfaces. It discards the packet.

IPv6 searches the routing table for the route that is the closest match to the destination IPv6 address. The most specific to the least specific route is determined in the following order: 1. A route that matches the destination IPv6 address (a host route with a 128-bit prefix length). 2. A route that matches the destination with the longest prefix length. 3. The default route (the network prefix ::/0). Unit V Explain traditional TCP. The Transmission Control Protocol / Internet Protocol is the main protocol suite used with the Internet. This allows users to share and distribute information across the local network. Large enterprises, however, usually have several sites situated in different areas of the same country and more recently, different countries as well. To connect sites that are situated within the same country, companies lease transmission lines between those sites, from the public carriers such as British Telecom. This forms a Wide Area Network (WAN). To connect sites that are situated in other countries, companies use different types of communication, for example satellites, optic fibres across land and / or sea etc. The networks that are formed from this type of communication are called Internetworks or just Internets.

TCP/IP consists of a suite or a layered stack of two core protocols and they are the internet and transport protocols. The Internet Protocol (IP) provides a number of core functions that assist the process of internetworking across dissimilar networks. These are: 1.Addressing. There are three types of address used with the current version of the internet protocol (IPv4), unicast,broadcast and multicast. Unicast addressing is used when a packet of information or datagram is to be sent to a single destination. Broadcast addressing is used when a message is to be delivered to every host on a destination LAN. A multicast address is used to deliver a datagram to a specific set of hosts, called a multicast group. This type of addressing is called IP Multicast. Hosts can join a multicast group at anytime and receive the datagrams that are sent to the group. 2. Fragmentation and reassembly. If the datagrams sent by a host are larger than the packet sizes used by a particular part of the internet, the datagrams will have to be fragmented into smaller chunks so that they can be transmitted. When these smaller packets are received, they have to be reassembled into the original sized packet, so that they can be used. 3. Routing. This is used to determine which subnets, within the internet, the datagrams must travto get to the destination host. This could involve travelling over several different LANs or WANs. 4. Error reporting. This consists of several functions that will detect errors, for example the process of reassembly could cause several packets to be discarded, and report them back to the IP in the source host. The transport protocols are designed to sit on ``top of'' the internet protocol mentioned above. They provide two modes of operation, connection-oriented or connectionless. A connection-oriented protocol creates a connection between the transmitter and the receiver before the data is actually transmitted. This is also known as a reliable transport service since the data is guaranteed to get to the destination. The Transmission Control Protocol (TCP) is an example of this type of service. A connectionless protocol, as the name suggests, does not form a connection and therefore can not guarantee that the data will be delivered. This mode of operation reduces the overhead associated with each message transfer because no network connection is established prior to the transmission. TCP/IP provides a connectionless protocol called the User Datagram Protocol (UDP). When users want to transmit information over the internet, using an internet-aware application, the information is first passed to the transport protocol layer. This layer will determine the type of delivery mechanism, e.g. TCP or UDP, to use. The information is then passed to the internet protocol layer, which attaches extra information, for example the destination host address etc. When a host receives information from the internet, the internet protocol will carry out several tests on the packets of information received. For example error reporting, which could result in the retransmission of particular packets, reassembly of packets etc. The information is then passed to the transport protocol layer which strips off any information to do with the delivery mechanism. 2.Explain classical TCP improvements E.g. HTTP (used by web services) typically uses TCP a. Reliable transport between client and server required TCP b. Steam oriented, not transaction oriented c. Network friendly: time-out congestion slow down transmission Well known TCP guesses quite often wrong in wireless and mobile networks d. Packet loss due to transmission errors e. Packet loss due to change of network

Result f. Severe performance degradation Transport protocols typically designed for g. Fixed end-systems h. Fixed, wired networks Research activities i. Performance j. Congestion control k. Efficient retransmissions TCP congestion control l. packet loss in fixed networks typically due to (temporary) overload situations m. router have to discard packets as soon as the buffers are full n. TCP recognizes congestion only indirect via missing acknowledgements, retransmissions unwise, they would only contribute to the congestion and make it even worse slow-start algorithm as reaction. TCP slow-start algorithm sender calculates a congestion window for a receiver start with a congestion window size equal to one segment exponential increase of the congestion window up to the congestion threshold, then linear increase missing acknowledgement causes the reduction of the congestion threshold to one half of the current congestion window congestion window starts again with one segment TCP fast retransmit/fast recovery TCP sends an acknowledgement only after receiving a packet if a sender receives several acknowledgements for the same packet, this is due to a gap in received packets at the receiver however, the receiver got all packets up to the gap and is actually receiving packets therefore, packet loss is not due to congestion, continue with current congestion window (do not use slow-start) Influences of mobility on TCP-mechanisms TCP assumes congestion if packets are dropped typically wrong in wireless networks, here we often have packet loss due to transmission errors furthermore, mobility itself can cause packet loss, if e.g. a mobile node roams from one access point (e.g. foreign agent in Mobile IP) to another while there are still packets in transit to the wrong access point and forwarding is not possible The performance of an unchanged TCP degrades severely however, TCP cannot be changed fundamentally due to the large base of installation in the fixed network, TCP for mobility has to remain compatible the basic TCP mechanisms keep the whole Internet together Indirect TCP or I-TCP segments the connection no changes to the TCP protocol for hosts connected to the wired Internet, millions of computers use (variants of) this protocol optimized TCP protocol for mobile hosts splitting of the TCP connection at, e.g., the foreign agent into 2 TCP connections, no real end-to-end connection any longer hosts in the fixed part of the net do not notice the characteristics of the wireless part

Indirect TCP II: Advantages no changes in the fixed network necessary, no changes for the hosts (TCP protocol) necessary, all current optimizations to TCP still work transmission errors on the wireless link do not propagate into the fixed network simple to control, mobile TCP is used only for one hop between, e.g., a foreign agent and mobile host therefore, a very fast retransmission of packets is possible, the short delay on the mobile hop is known Disadvantages loss of end-to-end semantics, an acknowledgement to a sender does now not any longer mean that a receiver really got a packet, foreign agents might crash higher latency possible due to buffering of data within the foreign agent and forwarding to a new foreign agent Transparent extension of TCP within the foreign agent buffering of packets sent to the mobile host lost packets on the wireless link (both directions!) will be retransmitted immediately by the mobile host or foreign agent, respectively (so called local retransmission) the foreign agent therefore snoops the packet flow and recognizes acknowledgements in both directions, it also filters ACKs changes of TCP only within the foreign agent Snooping TCP II: Data transfer to the mobile host FA buffers data until it receives ACK of the MH, FA detects packet loss via duplicated ACKs or time-out fast retransmission possible, transparent for the fixed network Data transfer from the mobile host FA detects packet loss on the wireless link via sequence numbers, FA answers directly with a NACK to the MH MH can now retransmit data with only a very short delay Integration of the MAC layer MAC layer often has similar mechanisms to those of TCP thus, the MAC layer can already detect duplicated packets due to retransmissions and discard them Problems snooping TCP does not isolate the wireless link as good as I-TCP snooping might be useless depending on encryption schemes

3.Write short notes on WAP. WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such ascellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging. While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate. The WAP layers are: Wireless Application Environment (WAE)

Wireless Session Layer (WSL) Wireless Transport Layer Security (WTLS) Wireless Transport Layer (WTP) The WAP was conceived by four companies: Ericsson, Motorola, Nokia, and Unwired Planet (now Phone.com). The Wireless Markup Language (WML) is used to create pages that can be delivered using WAP. There are other approaches to an industry standard besides WAP, including i-Mode Short for the Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators. WAP supports most wireless networks. These include CDPD, CDMA, GSM, PDC, PHS, TDMA, FLEX, ReFLEX, iDEN, TETRA, DECT, DataTAC, and Mobitex. WAP is supported by all operating systems. Ones specifically engineered for handheld devices include PalmOS, EPOC, Windows CE, FLEXOS, OS/9, and JavaOS. WAPs that use displays and access the Internet run what are called microbrowsers--browsers with small file sizes that can accommodate the low memory constraints of handheld devices and the lowbandwidth constraints of a wireless-handheld network. Although WAP supports HTML and XML, the WML language (an XML application) is specifically devised for small screens and one-hand navigation without a keyboard. WML is scalable from two-line text displays up through graphic screens found on items such as smart phones and communicators. WAP also supports WMLScript. It is similar to JavaScript, but makes minimal demands on memory and CPU power because it does not contain many of the unnecessary functions found in other scripting languages. Because WAP is fairly new, it is not a formal standard yet. It is still an initiative that was started by Unwired Planet, Motorola, Nokia, and Ericsson. Wireless Application Protocol (WAP) is an open international standard. A WAP browser is a commonly used web browser for small mobile devices such as cell phones. Before the introduction of WAP, mobile service providers had extremely limited opportunities to offer interactive data services, but needed interactivity to support Internet and Web applications such as: Email by mobile phone Tracking of stock-market prices Sports results News headlines Music downloads

Вам также может понравиться