Vous êtes sur la page 1sur 10

1. Draw and explain the IEEE 802.11 Protocol Architecture.

(6M)

Station (STA)

 terminal with access mechanisms to the wireless medium and radio contact to
the access point

Basic Service Set (BSS)

 group of stations using the same radio frequency

Access Point

 station integrated into the wireless LAN and the distribution system

Portal

 bridge to other (wired) networks

Distribution System

 interconnection network to form one logical network (EES: Extended Service


Set) based
on several BSS
2. With a neat sketch explain the Bluetooth Protocol stack. (6M)

 radio: Specification of the air interface, i.e., frequencies, modulation, and transmit
power

 Baseband: Description of basic connection establishment, packet formats, timing,


and basic QoS parameters .

 Link manager protocol: Link set-up and management between devices including
security functions and parameter negotiation

 Logical link control and adaptation protocol (L2CAP): Adaptation of higher


layers to the baseband .

 Service discovery protocol: Device discovery in close proximity plus querying of


service characteristics .

 cable replacement protocol RFCOMM that emulates a serial line interface following
the EIA-232 (formerly RS-232) standards. enables many legacy applications and
protocols to run over Bluetooth.

 The telephony control protocol specification – binary (TCS BIN) describes a bit-
oriented protocol that defines call control signaling for the establishment of voice and
data calls between Bluetooth devices.
 The host controller interface (HCI) between the baseband and L2CAP provides a
command interface to the baseband controller and link manager, and access to the
hardware status and control registers.

 Classical Internet applications can still use the standard TCP/IP stack running over
PPP or use the more efficient Bluetooth network encapsulation protocol (BNEP).

 A real difference to other protocol stacks is the support of audio. Audio applications
may directly use the baseband layer after encoding the audio signals.

Radio layer

 This requires small, low power chips which can be built into handheld devices.

 Bluetooth uses the license-free frequency band at 2.4 GHz allowing for
worldwide operation with some minor adaptations to national restrictions.

 A frequency-hopping/time-division duplex scheme is used for transmission, with a


fast hopping rate of 1,600 hops per second.

 Bluetooth transceivers use Gaussian FSK for modulation and are available in three
classes:
● Power class 1: Maximum power is 100 mW and minimum is 1 mW (typ.
100 m range without obstacles). Power control is mandatory.
● Power class 2: Maximum power is 2.5 mW, nominal power is 1 mW, and
minimum power is 0.25 mW (typ. 10 m range without obstacles). Power
control is optional.
● Power class 3: Maximum power is 1 mW.

Baseband

 It defines physical links and many packet formats.

 each device participating in a certain piconet hops at the same time to the same carrier
frequency .

 TDD is used for separation of the transmission directions.

 If a master or a slave sends a packet covering three or five slots, the radio transmitter
remains on the same frequency.

 Following example explains the frequency selection during data transmission.


3(a) Explain about IP-in-IP encapsulation in Mobile Network Layer. (3M)

Encapsulation of one packet into another as payload

IP-in-IP-encapsulation (mandatory, RFC 2003)

 tunnel between HA and COA

3 (b) What is the basic purpose of DHCP? Name the entities of DHCP. (3M)

Purpose

 simplification of installation and maintenance of networked computers

 supplies systems with all necessary information, such as IP address, DNS


server address, domain name, subnet mask, default router etc.

 enables automatic integration of systems into an Intranet or the Internet, can


be used to acquire a COA for Mobile IP

 Dynamic Host Configuration Protocol (DHCP) is a network protocol that


enables a server to automatically assign an IP address to a computer from a
defined range of numbers (that is, a scope) configured for a given network.
Dynamic Host Configuration Protocol (DHCP) involves two main entities;

DHCP Server and DHCP Client. When a computer is added to a network, it goes through a
four-step process in order to get an IP address. The computer acts as DHCP Client in this
process and gets an IP address from the DHCP Server.

4(a) How does dynamic source routing handle routing? What is the motivation behind
dynamic source routing compared to other routing algorithms from fixed networks?(3M)

Split routing into discovering a path and maintaining a path

Discover a path

 only if a path for sending packets to a certain destination is needed and no path
is currently available

Maintaining a path

 only while the path is in use one has to make sure that it can be used
continuously

No periodic updates needed!

Path discovery

 broadcast a packet with destination address and unique ID

 if a station receives a broadcast packet

 if the station is the receiver (i.e., has the correct destination address)
then return the packet to the sender (path was collected in the packet)

 if the packet has already been received earlier (identified via ID) then
discard the packet

 otherwise, append own address and broadcast packet

 sender receives packet with the current path (address list)

Optimizations

 limit broadcasting if maximum diameter of the network is known

 caching of address lists (i.e. paths) with help of passing packets

 stations can use the cached information for path discovery (own paths
or paths for other hosts)
Maintaining paths

 after sending a packet

 wait for a layer 2 acknowledgement (if applicable)

 listen into the medium to detect if other stations forward the packet (if
possible)

 request an explicit acknowledgement

 if a station encounters problems it can inform the sender of a packet or look-up


a new path locally

Motivation

Although dynamic source routing offers benefits compared to other algorithms by being
much more bandwidth efficient, problems arise if the topology is highly dynamic and
links are asymmetrical.

5 Describe Indirect and snooping TCP in detail. (6M)

Indirect TCP or I-TCP segments the connection

 no changes to the TCP protocol for hosts connected to the wired Internet,
millions of computers use (variants of) this protocol

 optimized TCP protocol for mobile hosts

 splitting of the TCP connection at, e.g., the foreign agent into 2 TCP
connections, no real end-to-end connection any longer

 hosts in the fixed part of the net do not notice the characteristics of the
wireless part
Advantages

 no changes in the fixed network necessary, no changes for the hosts (TCP
protocol) necessary, all current optimizations to TCP still work

 transmission errors on the wireless link do not propagate into the fixed
network

 simple to control, mobile TCP is used only for one hop between, e.g., a
foreign agent and mobile host

 therefore, a very fast retransmission of packets is possible, the short delay on


the mobile hop is known

Disadvantages

 loss of end-to-end semantics, an acknowledgement to a sender does now not


any longer mean that a receiver really got a packet, foreign agents might crash

 higher latency possible due to buffering of data within the foreign agent and
forwarding to a new foreign agent

Snooping TCP

“Transparent“ extension of TCP within the foreign agent

 buffering of packets sent to the mobile host

 lost packets on the wireless link (both directions!) will be retransmitted


immediately by the mobile host or foreign agent, respectively (so called
“local” retransmission)

 the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs

 changes of TCP only within the foreign agent


Data transfer to the mobile host

 FA buffers data until it receives ACK of the MH, FA detects packet loss via
duplicated ACKs or time-out

 fast retransmission possible, transparent for the fixed network

Data transfer from the mobile host

 FA detects packet loss on the wireless link via sequence numbers, FA answers
directly with a NACK to the MH

 MH can now retransmit data with only a very short delay.

Advantages:

 End-end semantics preserved: if foreign agent crashes approach falls to

 standard TCP.

 Correspondent Host need not be changed.

 Does not need a handover state.

 Next foreign agent need not to use the enhancement.

Problems

 snooping TCP does not isolate the wireless link as good as I-TCP. If long time
to retransmit from FA then it triggers retransmission from correspondent host.

 snooping might be useless depending on encryption schemes. If TCP header is


encrypted snooping wont work. If encryption used above transport then work.

 Additional mechanisms on the mobile host.,


6 Draw and explain the Wireless Application Protocol Architecture in detail (6M)

WAP is designed in a layered fashion, so that it can be extensible, flexible, and scalable. As
a result, the WAP protocol stack is divided into five layers −

Layers of WAP Protocol

Application Layer
Wireless Application Environment (WAE). This layer is of most interest to content
developers because it contains among other things, device specifications, and the content
development programming languages, WML, and WMLScript.

Session Layer

Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the WAP
Forum to provide fast connection suspension and reconnection.

Transaction Layer

Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram service, such as
User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to
provide a simplified protocol suitable for low bandwidth wireless stations.

Security Layer

Wireless Transport Layer Security (WTLS). WTLS incorporates security features that are
based upon the established Transport Layer Security (TLS) protocol standard. It includes
data integrity checks, privacy, service denial, and authentication services.
Transport Layer

Wireless Datagram Protocol (WDP). The WDP allows WAP to be bearer-independent by


adapting the transport layer of the underlying bearer. The WDP presents a consistent data
format to the higher layers of the WAP protocol stack, thereby offering the advantage of
bearer independence to application developers.
Each of these layers provides a well-defined interface to the layer above it. This means that
the internal workings of any layer are transparent or invisible to the layers above it. The
layered architecture allows other applications and services to utilise the features provided by
the WAP-stack as well. This makes it possible to use the WAP-stack for services and
applications that currently are not specified by WAP.
The WAP protocol architecture is shown below alongside a typical Internet Protocol stack.

Vous aimerez peut-être aussi