COMP8280 Mobile Data Networks Assignment

Assignment Help Computer Engineering
Reference no: EM132648816

COMP8280 Mobile Data Networks - Macquarie University

Objectives

This assignment has been designed to test the following areas:

• Transport Layer Protocols
• Cellular Networks
• Long Term Evolution Networks
• Mobile Ad Hoc Networks

Assessment

For all questions in this assignment not only content but also presentation will affect your mark. You will lose marks (and not necessarily only a small portion) if there are problems with the presentation, particularly with clarity. This means that your answers to each question should be a coherent statement and that the spelling and grammar of your submission will be taken into account in assessing its presentation.

1.
The following packets are transmitted in a SCTP session. The marked packet is lost. What are the complete contents of the last packet, including the SACK chunk, from Node 2?

2. (300 words)
LTE uses an all IP data network, with voice calls reduced to a multimedia application. Describe the benefits to the network operator of this approach, including the relationship between the core network and the radio access network, as well as other benefits from using a full IP network rather than the GPRS approach.

3. A) The Ad Hoc network shown below (including node R) is currently operating. The network is running the AODV routing protocol. Show the steps required to route a packet from node Q to node B. In particular, show what state is maintained at nodes Q, P, J, F and B in the network.

B) What changes occur to the route, and how are these determined if node R drops out of the network?

4. (500 words)
Consider a scenario wherein a mobile host (MH) is communicating with a base station (BS) using the Berkeley Snoop protocol. The BS sends the following packets in the queue to the MH in the following order: P1, P2, P3, P4, and P5. Packets P2 and P3 are dropped but packet P4 reaches the MH causing it to generate the first duplicate acknowledgement (DUPACK). Before this DUPACK packet arrives at the BS, BS has sent out packet P5. List the sequence of steps that will be performed by BS and MH to bring the system to a consistent state.

A BS may receive a DUPACK from MH for packet that is no longer cached. Explain how such a situation could arise in the network.

How would the BS react when it receives a DUPACK for a packet that is either not there in the snoop cache or has been marked as having been retransmitted by the sender? (1 mark) For each of these cases explain if the DUPACK must be transmitted back to the original sender or not. If yes, then why. If no, then why not.

5. (300 words)
Consider the TCP multiple acknowledgement scheme. A base station (BS) may receive an out of sequence packet that was buffered at an earlier point in time. How can such a situation arise in the network? (3 marks) Actions taken by the BS will depend upon the sequence number of the received packet from the sender (in the wired segment) and sequence number of the last unacknowledged packet (at the BS). Based on these sequence number values, explain the different responses the BS can generate to bring the system to a consistent state.

6. (500 words)
There are three cells along a road, cells C1, C2 and C3.
A voice call, call 1, is in progress in cell C1. The mobile device moves so that cell C2 is now the better base station. Both cell C1 and cell C2 currently have no free channels. Describe how the call would move from cell C1 to cell C2 using channel carrying and how this solves the handoff problem between these cells for this call. (6 marks) While call 1 is in cell C1 a second voice call, call 2, that originated in cell C3 but has already moved to cell C2, and retains the channels from cell C3, needs to move to cell C1. Cell C1 still has no free channels. Describe what happens to the channel assignments for these two calls. (3 marks) Describe the handoff procedure for call 1 to progress from cell C2 to cell C3.

Attachment:- Mobile Data Networks.rar

Reference no: EM132648816

Questions Cloud

Why the lagrange multiplier is crucially used : Explain in technical details why the lagrange multiplier is crucially used in analyzing the theory of the consumer.
Calculate the lower and upper acceptable transfer price : Assume that the Body Lotion Division selling all the speackers at cost to Body Butter Division. Can they still get profit for their divison?
What is the percent change in real gdp : The government of a country decides to double its current level of spending, causing real GDP to increase from $20,000 to $120,000.
Elasticity of demand at the equilibrium price : The demand curve for a good is given by the equation P = 100 - 0.001Q and the supply curve is given by the equation P = 20 + 0.004Q
COMP8280 Mobile Data Networks Assignment : COMP8280 Mobile Data Networks Assignment Help and Solution, Macquarie University - Assessment Writing Service - What changes occur to the route
What credible economists say about effects that tariffs have : Discuss what credible economists say about the effects that tariffs, changing trade agreements, and/or manipulating exchange rates will have on the total US.
Write down the budget equation : Write down the budget equation that you would have after you paid the entry fee for each of the two plans.
Make profit reports for stock and custom : Make profit reports for Stock and Custom, assuming the company allocates costs using headcount, space occupied, and sales as allocation bases
Nature and causes of the wealth of nations : In "An Inquiry into the Nature and Causes of the Wealth of Nations" published in 1776, Adam Smith wrote:

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why is partitioning with oversampling advised in the case

Why is partitioning with oversampling advised in this case? List and interpret the set of rules that characterize churners.

  Make the three data members private

Write a class to contain the following information about towns: the name (a sequence of characters); the population (an integer);

  Define the issues engineering managers must consider

Research some of the issues engineering managers must consider when deciding on the best door hardware for the most cost-effective security for their facility.

  Create motorway class that can be use as extra documentation

Create a Motorway class that can be used as extra documentation with directions. Include data members such as name of motorway, type and direction.

  Perform stateless or stateful packet filtering

Use the Internet to identify three network firewalls, and create a table that compares their features.

  How do people benefit from playing video games

Do you think playing video games to escape from reality is healthy? How do people benefit from playing video games?

  Demonstrate you successfully followed the steps in the lab

Demonstrate you successfully followed the steps in this lab by preparing screen captures of you running the lab as specified in the Instructions above.

  Which department is associated with the lowest revenue

Find out other warehouses whose average quantity on hand is not smaller than That of Atlanta warehouse.

  Determine whether a given string with no white space

Write a program to determine whether a given string with no white space characters is a valid C identifier.

  How the data is analyzed and used with structured data

Write a 1 to 2-page paper. In the paper review the concept of unstructured data, outline the areas where this data can come from, evaluate the process.

  Dtproperties and sysdiagrams

Exclude the tables “dtproperties” and “sysdiagrams”. List the column CountOfTable, in which the Table is the chosen table name.

  Find a boolean expression for the boolean function

A threshold gate represents a Boolean function. Find a Boolean expression for the Boolean function represented by this threshold gate.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd