Compute the number of lost packets of the down-stream, Computer Networking

Assignment Help:

A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80ms.. A CN and the MH establish a bi-directional VoIP session (via UDP/IP) with voice-data rate of 16kb/sec transmitted in 40 packets per second. Consider for simplicity that the MH as well as the CN always send voice-data (no silence periods).

a) What are the (downstream) hand-over delays (min, max, average) when the MH changes IP address due to mobility? Assume thereby that no Layer 2 triggers are used and the periodic interval for agent advertisements is set to 3 seconds. The WLAN Layer-2 handover by itself should be assumed to take 500ms.

b) How much do the hand-over delays improve when Layer-2 triggers (Agent Solicitations) are used?

c) Compute the number of lost packets of the down-stream VoIP stream during these two hand-over scenarios.

d) The user of the mobile node becomes very nervous and walks quickly from one room to the other and back, changing rooms every 30 seconds. Compute the average downstream packet loss ratio.


Related Discussions:- Compute the number of lost packets of the down-stream

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

Advantages, What are advantages of having e-commerce over extranets

What are advantages of having e-commerce over extranets

What is arcnet, What is ARCNet? The  Attached  Resource Computer Networ...

What is ARCNet? The  Attached  Resource Computer Network (ARCNet) standard was formed in 1977 at the Data Point Corporation by a scientist  -  John Murphy. ARCNet uses the toke

Command that forces the router to load into ROM, Determine the command that...

Determine the command that forces the router to load into ROM mode upon a reload?  Ans) boot system rom ia the command that forces the router to load into ROM mode upon a reload

Cidr presentation, Inside a device, every address mask is stored as a 32-bi...

Inside a device, every address mask is stored as a 32-bit number. When we submit a prefix and an address mask they use a changed form of dotted decimal addressing known CIDR addres

Explain the public-key cryptography, Q. Explain the Public-Key Cryptography...

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret

Explain fdm and tdm with example, Question 1 Explain FDM and TDM with exam...

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Implement a web server on personal computer, Question: a) The Systems ...

Question: a) The Systems Administrator of Acme Company performs the backup of the website database file every day at 15:50. The original file location is database.sql. The Ad

Explain tree interconnection network, Tree interconnection network:   In tr...

Tree interconnection network:   In tree interconnection network, processors are organised in a complete binary tree pattern. Figure: Tree interconnection network

Explain basic capabilities of mobile ip, Question: a) Describe the tria...

Question: a) Describe the triangular delivery and two crossing problem that appears in Mobile IP. b) Discovery, Registration and Tunneling are three basic capabilities of Mo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd