SlideShare uma empresa Scribd logo
1 de 29
Wireless&mobilenetworks
CC531: Advanced Networks
Computer Networking,
A top-down approach:Kurose – Ross (8th edition)
Introduction
 Types of wireless and mobile networks
A network that is wireless, but not mobile
A network that is mobile, but not wireless
A network that is both wireless and mobile
 Assumption:
Users are connected into larger network infrastructure by a wireless link at the
network’s edge.
• Wireless LANs as IEEE 802.11
• Cellular networks as 3G network
Introduction
 Elements of a wireless network:
1. Wireless hosts
End devices / end systems.
They run applications and initiate communication.
• Laptop
• Smartphone
• Desktop computer
Wireless hosts may or not be mobile.
network
infrastructure
Introduction
 Elements of a wireless network:
2. Wireless links:
A host connects to a base station through
wireless communication links.
Wireless links connect wireless hosts that
are located at the network’s edge.
Wireless links may also be used to connect
hosts within a network.
network
infrastructure
Introduction
 Elements of a wireless network:
2. Wireless links:
A host connects to a base station through
wireless communication links.
Wireless links connect wireless hosts that
are located at the network’s edge.
Wireless links may also be used to connect
hosts within a network.
network
infrastructure
Introduction
 Elements of a wireless network:
3. Base station:
It is the key part of the wireless network
infrastructure.
It has no counterpart in a wired network.
It is responsible for sending & receiving
data packets.
It is responsible for coordinating the
transmission of multiple wireless hosts.
network
infrastructure
Introduction
 Elements of a wireless network:
 Hosts mode of operation:
a) Infrastructure mode:
 Base station connects mobiles into wired network
 handoff: mobile changes base station providing connection
into wired network
b) Ad-hoc mode:
 no base stations
 nodes can only transmit to other nodes within link coverage
network
infrastructure
Introduction
 Categories of wireless networks
1. Single-hop, infrastructure based:
 These networks has a single base station that is connected to the internet.
• IEEE 802.11 network in a classroom
 All data transmissions are one hop away from the base station.
2. Single-hop, infrastructure-less:
 IEEE 802.11networks in ad-hoc mode
 Bluetooth devices
Introduction
 Categories of wireless networks
3. Multi-hop, infrastructure based:
 Base station, located in a wireless network, is connected to a larger wired network.
 Data communications may be done through several relays.
• Wireless mesh network
4. Multi-hop, infrastructure-less:
 Many nodes may be used to relay data until it reaches destination
 Nodes may be mobile
• MANETs ( Mobile Ad-hoc Networks)
• VANETs (Vehicular Ad-hoc Networks)
Wireless links & Network
characteristics
 Important differences between wired links & wireless links:
1. Decreasing signal strength:
 Radio signals attenuates as it passes through matter.
 In space, electro-magnetic radiations disperse as the distance between the sender and receiver
increases (path-loss)
2. Interference from all sources:
 Radio signals of the same frequencies will interfere with each other.
• 2.4 GHZ wireless phones & 802.11 b wireless LAN
3. Multipath propagation:
 It occurs when a portion of the electromagnetic waves reflect-off objects, it take paths of different
lengths between the sender and receiver.
Wireless links & Network
characteristics
 Signal to noise ratio (SNR):
 It is the relative measure of the strength of the received signal and the noise.
 SNR is measured in dB.
 Large SNR makes it easier to extract the transmitted signal from the background noise.
 Bit error rate (BER):
 It is the probability that a transmitted bit is received in error at the receiver.
The higher SNR, the lower BER
 Sender can increase SNR by increasing the transmission power, sender can decrease the probability
that a frame is received in error by increasing the transmission power.
Wireless links & Network
characteristics
 Hidden terminal problem:
 A physical obstruction is preventing A & C from hearing
each other.
 However, their transmissions are interfering with each
other.
 In one scenario, Station A can communicate with Station
B. Station C can also communicate with Access Point
Station B.
 However, Stations A and C cannot communicate with each
other as they are out of range of each other, and thus start
to transmit simultaneously preventing B from receiving
messages intended for it.
A
B
C
Wireless links & Network
characteristics
 Fading / signal attenuation problem:
 An undetectable collision at the receiver that may result
from fading of the signal’s strength in the wireless
medium.
 Both A & C are placed at a distance where they can’t
detect each other’s signal transmission.
 However, their signals are not string enough to interfere.
A B C
A’s signal
strength
space
C’s signal
strength
Wireless links & Network
characteristics
 Managing multiple access is more complex in a wireless network.
 Categories / classes of medium access protocols:
 Channel partitioning
• This method divides the channels into smaller pieces (time slots, frequencies, code)
 Random access
• This method make use of the whole channel without any division, which allows collisions.
• Random access must implement collision recovery mechanisms.
 Taking turns
• Nodes take turns in accessing the channel.
• Nodes with more to send take longer turns.
Question 1
 What is meant by a mobile IP?
Question 1
 What is meant by a mobile IP?
 It is a communication protocol that is designed to allow mobile device users to move from one network
to another while maintaining a permanent IP address.
Question 2
 Explain the function of the following entities:
Mobile Node (MN)
Home Agent (HA)
Home Address
Home Network
Foreign Network
Foreign Agent (FA)
Care of address (COA)
Mobility Binding
Correspondent node (CN)
Question 2
 Explain the function of the following entities:
 Mobile Node (MN)
 a node moving to different network, with permanent home address.
 Home Agent (HA)
a router on a mobile node’s home network which tunnels datagrams for delivery to the mobile
when it is away from home, and maintains current location information for the mobile node.
Home Address
the static fixed IP address allocated to a
mobile node by home agent.
Home Network
 a network, having a network IP matching
that of a mobile node’s home address.
Question 2
 Explain the function of the following entities:
 Foreign Network
a network other than a mobile node’s home network.
 Foreign Agent (FA)
router in foreign network that provides COA and tunneling with home agent and forward the
packets to MN.
Care of address (COA)
termination point of a tunnel toward a MN in the
foreign network.
Mobility Binding
the association of a home address with a care of
address.
Correspondent node (CN)
 a peer node with which a mobile node is communicating.
Question 3
 Discuss the different phases in Mobile IP.
Question 3
 Discuss the different phases in Mobile IP.
Agent discovery: Mobile IP defines the protocols used by a home or foreign agent to
advertise its services to mobile nodes, and protocols for mobile nodes to solicit the
services of a foreign or home agent
Registration: Mobile IP defines the protocols used by the mobile node and/or foreign
agent to register and deregister COAs with a mobile node’s home agent.
Data transfer: the manner in which datagrams are forwarded to mobile nodes by a
home agent, including rules for forwarding datagrams, rules for handling error
conditions, and several forms of encapsulation
Question 3
 Discuss the different phases in Mobile IP.
Question 4
 Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile
nodes to use the same care-of address in mobile IP? Explain your answer.
Question 4
 Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile
nodes to use the same care-of address in mobile IP? Explain your answer.
Two mobiles could certainly have the same care-of-address in the same visited network. Indeed, if the care-
of-address is the address of the foreign agent, then this address would be the same.
Once the foreign agent decapsulates the tunneled datagram and determines the address of the mobile, then
separate addresses would need to be used to send the datagrams separately to their different destinations
(mobiles) within the visited network.
Question 5
 Suppose the correspondent in Figure 6.22 were mobile. Sketch the additional network-layer infrastructure
that would be needed to route the datagram from the original mobile user to the (now mobile)
correspondent. Show the structure of the datagram(s) between the original mobile user and the (now
mobile) correspondent, as in Figure 6.23.
Question 5
 Solution
Question 6
 How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays
of datagrams between the source and the destination?
Question 6
 How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays
of datagrams between the source and the destination?
Because datagrams must be first forward to the home agent, and from there to the mobile node, the delays
will generally be longer than via direct routing.
Note that it is possible, however, that the direct delay from the correspondent to the mobile (i.e., if the
datagram is not routed through the home agent) could actually be smaller than the sum of the delay from
the correspondent to the home agent and from there to the mobile. It would depend on the delays on these
various path segments.
Note that indirect routing also adds a home agent processing (e.g., encapsulation) delay.
Question 7
 How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays
of datagrams between the source and the destination?

Mais conteúdo relacionado

Semelhante a ’mobile ip.pptx

Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtapVikas Jagtap
 
wifi-technology
 wifi-technology wifi-technology
wifi-technologytardeep
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Communication technology
Communication technologyCommunication technology
Communication technologyAbhishek Curtis
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Networking & tele communication
Networking & tele communicationNetworking & tele communication
Networking & tele communicationRahul Tanwar
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYPRINCE KUMAR
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
Rifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdfRifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdfRifDhy22
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingAlisha Jain
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSManju La
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 

Semelhante a ’mobile ip.pptx (20)

Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 
wifi-technology
 wifi-technology wifi-technology
wifi-technology
 
Wireless
WirelessWireless
Wireless
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Networking & tele communication
Networking & tele communicationNetworking & tele communication
Networking & tele communication
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
Rifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdfRifdhy RM (computer network).pdf
Rifdhy RM (computer network).pdf
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Chapter_7.pptx
Chapter_7.pptxChapter_7.pptx
Chapter_7.pptx
 
Chapter 7 v8.0
Chapter 7 v8.0Chapter 7 v8.0
Chapter 7 v8.0
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLSMOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
MOBILE IP,DHCP,ADHOC ROUTING PROTOCOLS
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 

Mais de NourhanTarek23

CSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdfCSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdfNourhanTarek23
 
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdfCSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdfNourhanTarek23
 
CSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptxCSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptxNourhanTarek23
 
Lect02 Introducing Programming.ppt
Lect02 Introducing Programming.pptLect02 Introducing Programming.ppt
Lect02 Introducing Programming.pptNourhanTarek23
 
Lect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.pptLect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.pptNourhanTarek23
 
Software engineering.pptx
Software engineering.pptxSoftware engineering.pptx
Software engineering.pptxNourhanTarek23
 
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives  IOT and Big Data Era.pptxLect01 Computers Impact on Our lives  IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptxNourhanTarek23
 
Lab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptxLab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptxNourhanTarek23
 
Introduction to computer.pptx
Introduction to computer.pptxIntroduction to computer.pptx
Introduction to computer.pptxNourhanTarek23
 
Introduction to Spring sec2.pptx
Introduction to Spring sec2.pptxIntroduction to Spring sec2.pptx
Introduction to Spring sec2.pptxNourhanTarek23
 
Introduction to Spring sec1.pptx
Introduction to Spring sec1.pptxIntroduction to Spring sec1.pptx
Introduction to Spring sec1.pptxNourhanTarek23
 
Problem set 3-solution.pptx
Problem set 3-solution.pptxProblem set 3-solution.pptx
Problem set 3-solution.pptxNourhanTarek23
 

Mais de NourhanTarek23 (15)

CSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdfCSE031.Lecture_05.Networks.pdf
CSE031.Lecture_05.Networks.pdf
 
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdfCSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
CSE031.Lecture_07-FlowCharts_Pseudocode .Part_II.pdf
 
CSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptxCSE031.Lecture_11-Operating_Systems.Part_I.pptx
CSE031.Lecture_11-Operating_Systems.Part_I.pptx
 
Lect02 Introducing Programming.ppt
Lect02 Introducing Programming.pptLect02 Introducing Programming.ppt
Lect02 Introducing Programming.ppt
 
Lect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.pptLect01 Introduction of Visual Basic.ppt
Lect01 Introduction of Visual Basic.ppt
 
Software engineering.pptx
Software engineering.pptxSoftware engineering.pptx
Software engineering.pptx
 
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives  IOT and Big Data Era.pptxLect01 Computers Impact on Our lives  IOT and Big Data Era.pptx
Lect01 Computers Impact on Our lives IOT and Big Data Era.pptx
 
Lab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptxLab 7 - Bash Script.pptx
Lab 7 - Bash Script.pptx
 
section5.pptx
section5.pptxsection5.pptx
section5.pptx
 
Introduction to computer.pptx
Introduction to computer.pptxIntroduction to computer.pptx
Introduction to computer.pptx
 
AOP sec3.pptx
AOP sec3.pptxAOP sec3.pptx
AOP sec3.pptx
 
Introduction to Spring sec2.pptx
Introduction to Spring sec2.pptxIntroduction to Spring sec2.pptx
Introduction to Spring sec2.pptx
 
Introduction to Spring sec1.pptx
Introduction to Spring sec1.pptxIntroduction to Spring sec1.pptx
Introduction to Spring sec1.pptx
 
QoS.pptx
QoS.pptxQoS.pptx
QoS.pptx
 
Problem set 3-solution.pptx
Problem set 3-solution.pptxProblem set 3-solution.pptx
Problem set 3-solution.pptx
 

Último

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 

Último (20)

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

’mobile ip.pptx

  • 1. Wireless&mobilenetworks CC531: Advanced Networks Computer Networking, A top-down approach:Kurose – Ross (8th edition)
  • 2. Introduction  Types of wireless and mobile networks A network that is wireless, but not mobile A network that is mobile, but not wireless A network that is both wireless and mobile  Assumption: Users are connected into larger network infrastructure by a wireless link at the network’s edge. • Wireless LANs as IEEE 802.11 • Cellular networks as 3G network
  • 3. Introduction  Elements of a wireless network: 1. Wireless hosts End devices / end systems. They run applications and initiate communication. • Laptop • Smartphone • Desktop computer Wireless hosts may or not be mobile. network infrastructure
  • 4. Introduction  Elements of a wireless network: 2. Wireless links: A host connects to a base station through wireless communication links. Wireless links connect wireless hosts that are located at the network’s edge. Wireless links may also be used to connect hosts within a network. network infrastructure
  • 5. Introduction  Elements of a wireless network: 2. Wireless links: A host connects to a base station through wireless communication links. Wireless links connect wireless hosts that are located at the network’s edge. Wireless links may also be used to connect hosts within a network. network infrastructure
  • 6. Introduction  Elements of a wireless network: 3. Base station: It is the key part of the wireless network infrastructure. It has no counterpart in a wired network. It is responsible for sending & receiving data packets. It is responsible for coordinating the transmission of multiple wireless hosts. network infrastructure
  • 7. Introduction  Elements of a wireless network:  Hosts mode of operation: a) Infrastructure mode:  Base station connects mobiles into wired network  handoff: mobile changes base station providing connection into wired network b) Ad-hoc mode:  no base stations  nodes can only transmit to other nodes within link coverage network infrastructure
  • 8. Introduction  Categories of wireless networks 1. Single-hop, infrastructure based:  These networks has a single base station that is connected to the internet. • IEEE 802.11 network in a classroom  All data transmissions are one hop away from the base station. 2. Single-hop, infrastructure-less:  IEEE 802.11networks in ad-hoc mode  Bluetooth devices
  • 9. Introduction  Categories of wireless networks 3. Multi-hop, infrastructure based:  Base station, located in a wireless network, is connected to a larger wired network.  Data communications may be done through several relays. • Wireless mesh network 4. Multi-hop, infrastructure-less:  Many nodes may be used to relay data until it reaches destination  Nodes may be mobile • MANETs ( Mobile Ad-hoc Networks) • VANETs (Vehicular Ad-hoc Networks)
  • 10. Wireless links & Network characteristics  Important differences between wired links & wireless links: 1. Decreasing signal strength:  Radio signals attenuates as it passes through matter.  In space, electro-magnetic radiations disperse as the distance between the sender and receiver increases (path-loss) 2. Interference from all sources:  Radio signals of the same frequencies will interfere with each other. • 2.4 GHZ wireless phones & 802.11 b wireless LAN 3. Multipath propagation:  It occurs when a portion of the electromagnetic waves reflect-off objects, it take paths of different lengths between the sender and receiver.
  • 11. Wireless links & Network characteristics  Signal to noise ratio (SNR):  It is the relative measure of the strength of the received signal and the noise.  SNR is measured in dB.  Large SNR makes it easier to extract the transmitted signal from the background noise.  Bit error rate (BER):  It is the probability that a transmitted bit is received in error at the receiver. The higher SNR, the lower BER  Sender can increase SNR by increasing the transmission power, sender can decrease the probability that a frame is received in error by increasing the transmission power.
  • 12. Wireless links & Network characteristics  Hidden terminal problem:  A physical obstruction is preventing A & C from hearing each other.  However, their transmissions are interfering with each other.  In one scenario, Station A can communicate with Station B. Station C can also communicate with Access Point Station B.  However, Stations A and C cannot communicate with each other as they are out of range of each other, and thus start to transmit simultaneously preventing B from receiving messages intended for it. A B C
  • 13. Wireless links & Network characteristics  Fading / signal attenuation problem:  An undetectable collision at the receiver that may result from fading of the signal’s strength in the wireless medium.  Both A & C are placed at a distance where they can’t detect each other’s signal transmission.  However, their signals are not string enough to interfere. A B C A’s signal strength space C’s signal strength
  • 14. Wireless links & Network characteristics  Managing multiple access is more complex in a wireless network.  Categories / classes of medium access protocols:  Channel partitioning • This method divides the channels into smaller pieces (time slots, frequencies, code)  Random access • This method make use of the whole channel without any division, which allows collisions. • Random access must implement collision recovery mechanisms.  Taking turns • Nodes take turns in accessing the channel. • Nodes with more to send take longer turns.
  • 15. Question 1  What is meant by a mobile IP?
  • 16. Question 1  What is meant by a mobile IP?  It is a communication protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address.
  • 17. Question 2  Explain the function of the following entities: Mobile Node (MN) Home Agent (HA) Home Address Home Network Foreign Network Foreign Agent (FA) Care of address (COA) Mobility Binding Correspondent node (CN)
  • 18. Question 2  Explain the function of the following entities:  Mobile Node (MN)  a node moving to different network, with permanent home address.  Home Agent (HA) a router on a mobile node’s home network which tunnels datagrams for delivery to the mobile when it is away from home, and maintains current location information for the mobile node. Home Address the static fixed IP address allocated to a mobile node by home agent. Home Network  a network, having a network IP matching that of a mobile node’s home address.
  • 19. Question 2  Explain the function of the following entities:  Foreign Network a network other than a mobile node’s home network.  Foreign Agent (FA) router in foreign network that provides COA and tunneling with home agent and forward the packets to MN. Care of address (COA) termination point of a tunnel toward a MN in the foreign network. Mobility Binding the association of a home address with a care of address. Correspondent node (CN)  a peer node with which a mobile node is communicating.
  • 20. Question 3  Discuss the different phases in Mobile IP.
  • 21. Question 3  Discuss the different phases in Mobile IP. Agent discovery: Mobile IP defines the protocols used by a home or foreign agent to advertise its services to mobile nodes, and protocols for mobile nodes to solicit the services of a foreign or home agent Registration: Mobile IP defines the protocols used by the mobile node and/or foreign agent to register and deregister COAs with a mobile node’s home agent. Data transfer: the manner in which datagrams are forwarded to mobile nodes by a home agent, including rules for forwarding datagrams, rules for handling error conditions, and several forms of encapsulation
  • 22. Question 3  Discuss the different phases in Mobile IP.
  • 23. Question 4  Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer.
  • 24. Question 4  Consider two mobile nodes in a foreign network having a foreign agent. Is it possible for the two mobile nodes to use the same care-of address in mobile IP? Explain your answer. Two mobiles could certainly have the same care-of-address in the same visited network. Indeed, if the care- of-address is the address of the foreign agent, then this address would be the same. Once the foreign agent decapsulates the tunneled datagram and determines the address of the mobile, then separate addresses would need to be used to send the datagrams separately to their different destinations (mobiles) within the visited network.
  • 25. Question 5  Suppose the correspondent in Figure 6.22 were mobile. Sketch the additional network-layer infrastructure that would be needed to route the datagram from the original mobile user to the (now mobile) correspondent. Show the structure of the datagram(s) between the original mobile user and the (now mobile) correspondent, as in Figure 6.23.
  • 27. Question 6  How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays of datagrams between the source and the destination?
  • 28. Question 6  How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays of datagrams between the source and the destination? Because datagrams must be first forward to the home agent, and from there to the mobile node, the delays will generally be longer than via direct routing. Note that it is possible, however, that the direct delay from the correspondent to the mobile (i.e., if the datagram is not routed through the home agent) could actually be smaller than the sum of the delay from the correspondent to the home agent and from there to the mobile. It would depend on the delays on these various path segments. Note that indirect routing also adds a home agent processing (e.g., encapsulation) delay.
  • 29. Question 7  How would mobility support for both hosts (the correspondent and the mobile) affect end-to-end delays of datagrams between the source and the destination?