Académique Documents
Professionnel Documents
Culture Documents
(6M)
Station (STA)
terminal with access mechanisms to the wireless medium and radio contact to
the access point
Access Point
station integrated into the wireless LAN and the distribution system
Portal
Distribution System
radio: Specification of the air interface, i.e., frequencies, modulation, and transmit
power
Link manager protocol: Link set-up and management between devices including
security functions and parameter negotiation
cable replacement protocol RFCOMM that emulates a serial line interface following
the EIA-232 (formerly RS-232) standards. enables many legacy applications and
protocols to run over Bluetooth.
The telephony control protocol specification – binary (TCS BIN) describes a bit-
oriented protocol that defines call control signaling for the establishment of voice and
data calls between Bluetooth devices.
The host controller interface (HCI) between the baseband and L2CAP provides a
command interface to the baseband controller and link manager, and access to the
hardware status and control registers.
Classical Internet applications can still use the standard TCP/IP stack running over
PPP or use the more efficient Bluetooth network encapsulation protocol (BNEP).
A real difference to other protocol stacks is the support of audio. Audio applications
may directly use the baseband layer after encoding the audio signals.
Radio layer
This requires small, low power chips which can be built into handheld devices.
Bluetooth uses the license-free frequency band at 2.4 GHz allowing for
worldwide operation with some minor adaptations to national restrictions.
Bluetooth transceivers use Gaussian FSK for modulation and are available in three
classes:
● Power class 1: Maximum power is 100 mW and minimum is 1 mW (typ.
100 m range without obstacles). Power control is mandatory.
● Power class 2: Maximum power is 2.5 mW, nominal power is 1 mW, and
minimum power is 0.25 mW (typ. 10 m range without obstacles). Power
control is optional.
● Power class 3: Maximum power is 1 mW.
Baseband
each device participating in a certain piconet hops at the same time to the same carrier
frequency .
If a master or a slave sends a packet covering three or five slots, the radio transmitter
remains on the same frequency.
3 (b) What is the basic purpose of DHCP? Name the entities of DHCP. (3M)
Purpose
DHCP Server and DHCP Client. When a computer is added to a network, it goes through a
four-step process in order to get an IP address. The computer acts as DHCP Client in this
process and gets an IP address from the DHCP Server.
4(a) How does dynamic source routing handle routing? What is the motivation behind
dynamic source routing compared to other routing algorithms from fixed networks?(3M)
Discover a path
only if a path for sending packets to a certain destination is needed and no path
is currently available
Maintaining a path
only while the path is in use one has to make sure that it can be used
continuously
Path discovery
if the station is the receiver (i.e., has the correct destination address)
then return the packet to the sender (path was collected in the packet)
if the packet has already been received earlier (identified via ID) then
discard the packet
Optimizations
stations can use the cached information for path discovery (own paths
or paths for other hosts)
Maintaining paths
listen into the medium to detect if other stations forward the packet (if
possible)
Motivation
Although dynamic source routing offers benefits compared to other algorithms by being
much more bandwidth efficient, problems arise if the topology is highly dynamic and
links are asymmetrical.
no changes to the TCP protocol for hosts connected to the wired Internet,
millions of computers use (variants of) this protocol
splitting of the TCP connection at, e.g., the foreign agent into 2 TCP
connections, no real end-to-end connection any longer
hosts in the fixed part of the net do not notice the characteristics of the
wireless part
Advantages
no changes in the fixed network necessary, no changes for the hosts (TCP
protocol) necessary, all current optimizations to TCP still work
transmission errors on the wireless link do not propagate into the fixed
network
simple to control, mobile TCP is used only for one hop between, e.g., a
foreign agent and mobile host
Disadvantages
higher latency possible due to buffering of data within the foreign agent and
forwarding to a new foreign agent
Snooping TCP
the foreign agent therefore “snoops” the packet flow and recognizes
acknowledgements in both directions, it also filters ACKs
FA buffers data until it receives ACK of the MH, FA detects packet loss via
duplicated ACKs or time-out
FA detects packet loss on the wireless link via sequence numbers, FA answers
directly with a NACK to the MH
Advantages:
standard TCP.
Problems
snooping TCP does not isolate the wireless link as good as I-TCP. If long time
to retransmit from FA then it triggers retransmission from correspondent host.
WAP is designed in a layered fashion, so that it can be extensible, flexible, and scalable. As
a result, the WAP protocol stack is divided into five layers −
Application Layer
Wireless Application Environment (WAE). This layer is of most interest to content
developers because it contains among other things, device specifications, and the content
development programming languages, WML, and WMLScript.
Session Layer
Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the WAP
Forum to provide fast connection suspension and reconnection.
Transaction Layer
Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram service, such as
User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to
provide a simplified protocol suitable for low bandwidth wireless stations.
Security Layer
Wireless Transport Layer Security (WTLS). WTLS incorporates security features that are
based upon the established Transport Layer Security (TLS) protocol standard. It includes
data integrity checks, privacy, service denial, and authentication services.
Transport Layer