Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

QB106823

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

UNIT-III

1. What are the requirements of mobile IP?


 Compatibility
 Transparency
 Scalability and efficiency
 Security

2. Mention the different entities in a mobile IP.


 Mobile Node
 Correspondent Node
 Home Network
 Foreign Network
 Foreign Agent
 Home Agent
 Care-Of address
 Foreign agent COA
 Co-located COA

3. Define Mobile node:


A mobile node is an end-system or router that can change its point of attachment to the
Internet using mobile IP. The MN keeps its IP address and can continuously with any other
system in the Internet as long as link layer connectivity is given.
4. Explain Cellular IP.
Cellular IP provides local handovers without renewed registration by installing a single
cellular IP gateway for each domain, which acts to the outside world as a foreign agent.

5. What do you mean by mobility binding?


The Mobile Node sends its registration request to the Home Agent. The HA now sets up
a mobility binding containing the mobile node’s home IP address and the current COA.
6. Define COA.
The COA (care of address) defines the current location of the MN from an IP point of
view. All IP packets sent to the MN are delivered to the COA, not directly to the IP address of
the MN. Packet delivery toward the MN is done using the tunnel. DHCP is a good candidate for
supporting the acquisition of Care Of Addresses.

7. Define a tunnel.
A tunnel establishes a virtual pipe for data packets between a tunnel entry and a tunnel
endpoint. Packets entering a tunnel are forwarded inside the tunnel and leave the tunnel
unchanged.

8. What is encapsulation?
Encapsulation is the mechanism of taking a packet consisting of packet header and data
putting it into the data part of a new packet.

9. What is decapsulation?
The reverse operation, taking a packet out of the data part of another packet, is called
decapsulation.

10. Define an outer header.


The HA takes the original packet with the MN as destination, puts it into the data part of
a new packet and sets the new IP header in such a way that the packet is routed to the COA. The
new header is called the outer header.

11. Define an inner header.


There is an inner header which can be identical to the original header as this case for IP-
in-IP encapsulation, or the inner header can be computed during encapsulation.

12. What is meant by generic routing encapsulation?


Generic routing encapsulation allows the encapsulation of packets of one protocol suite
into the payload portion of a packet of another protocol suite.

13. Why is need of routing?


Routing is to find the path between source and destination and to forward the
packets appropriately.

14. What is the use of network address translation?


The network address translation is used by many companies to hide internal resources
and to use only some globally available addresses.

15. Define triangular routing.


The inefficient behavior of a non-optimized mobile IP is called triangular routing. The
triangle is made up of three segments, CN to HA, HA to COA\MN, and MN back to CN.

16. What is meant by a binding cache?


One way to optimize the route is to inform the CN of the current location by caching it in
a binding cache which is a part of the local routing table for the CN.

17. Define binding request.


Any node that wants to know the current location of an MN can send a binding request to
the HA. The HA can check if the MN has allowed dissemination of its current location. If the
HA is allowed to reveal the location it sends back a binding update.

18. What is known as Binding update?


This message sent by the HA to CNs reveals the current location of the MN. The message
contains the fixed IP address of the MN and the COA. The binding update can request an
acknowledgement.

19. Explain binding acknowledgement.


If requested, a node returns this acknowledgement receiving a binding update message.

20. Define binding warning.


If a node decapsulates a packet for a MN, but it is not the current FA for this MN, this
node sends a binding warning. The warning contains MN’s home address and a target node
address.

21. What are the advantages of cellular IP?


 Manageability:
 Cellular IP is mostly self-configuring, and integration of the CIPGW into a firewall
would facilitate administration of mobility-related functionality.
 Efficiency
 Transparency
 Security

22. What is known as mobility anchor point?


HMIPv6 provides micro-mobility support by installing a mobility anchor point, which is
responsible for a certain domain and acts as a local HA within this domain for visiting MNs.
23. Explain destination sequence distance vector routing.
Destination sequence distance vector routing is an enhancement to distance vector
routing for ad-hoc networks and is used as routing information protocol in wired networks.

24. What are the two things added to the distance vector algorithm?
 Sequence Numbers
 Damping

25. How the dynamic source routing does divide the task of routing into two separate
problems?
 Route discovery
 Route Maintenance
26. How can DHCP be used for mobility and support of mobile IP?
Normally, a mobile node uses a care-of-address. In some cases, the mobile node may
have to act as its own foreign agent by using co-located care of address. The means by which a
mobile node acquires a co-located address is beyond the scope of mobile IP. One means is to
dynamically acquire temporary IP address an the move using services such as DHCP.

27. List out the some of the popular Routing protocols.


 DSDV(Destination Sequence Distance Vector)
 DSR(Dynamic Source Routing)
 AODV(Ad-Hoc On Demand Vector Routing)

28. What is meant by Transparency?


Mobility should remain invisible for many higher layer Protocols and applications. The
only affects of mobility should be a higher delay and lower bandwidth which are natural in the
case of mobile networks.

29. Specify the field of minimal encapsulation method in mobile network layer.
 Minimal encapsulation doing,
 Avoids repetition of identical fields e.g. TTL, IHL, version, TOS
 Only applicable for unfragmented packets, no space left for fragment identification

30. What do you meant by roaming?


Moving between access points is called roaming. Even wireless networks may require
more than one access point to coverall rooms. In order to provide uninterrupted service, we
require roaming when the user moves from one access point to another.

31. What is mobile routing?


Even if the location of a terminal is known to the system, it still has to route the traffic
through the network to the access point currently responsible for the wireless terminal. Each time
a user moves to a new access point, the system must reroute traffic. This is known as mobile
routing.
UNIT 3
MOBILE TRANSPORT LAYER
16 marks
1. (a) Write brief notes on congestion control in traditional TCP.
(b) Compare several enhancements to TCP for mobility giving their relative advantages and
disadvantages
2. (a) Describe transaction oriented TCP
(b) Explain Mobile TCP. How does a supervisory host send TCP packets to the mobile node and
to a fixed TCP connection.
3. (a) How does selective transmission improve the transmission efficiency? What are the
modifications required in the TCP receiver to implement the selective retransmission protocol.
(b)Explain snooping TCP. What are it's advantages and disadvantages?
4. (a) Describe indirect TCP. Explain the modifications of indirect TCP as the selective repeat
protocol and mobile - end transport protocol.
(b) What are the advantages and disadvantages of indirect TCP?
5. (a)Why mobility results in packet loss?
(b) Compare the error rate in wired networks and mobile networks.
(c) Why we cannot change TCP completely just to support mobile users? What are the
consequences of it?
6. (a) What are the applications in which packet delayed is equivalent to packet lost? Explain.
(b) What are the applications for which packet loss can create severe problems? Explain it
7. (a)Why Access point maintains buffers in Indirect TCP?
(b) How Indirect TCP hides the problems of wireless links from fixed host?
(c) The foreign agent can act as a gateway to translate between the different protocolsin
Indirect TCP. Comment

You might also like