Compute the number of lost packets of the down-stream, Computer Networking

Assignment Help:

A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80ms.. A CN and the MH establish a bi-directional VoIP session (via UDP/IP) with voice-data rate of 16kb/sec transmitted in 40 packets per second. Consider for simplicity that the MH as well as the CN always send voice-data (no silence periods).

a) What are the (downstream) hand-over delays (min, max, average) when the MH changes IP address due to mobility? Assume thereby that no Layer 2 triggers are used and the periodic interval for agent advertisements is set to 3 seconds. The WLAN Layer-2 handover by itself should be assumed to take 500ms.

b) How much do the hand-over delays improve when Layer-2 triggers (Agent Solicitations) are used?

c) Compute the number of lost packets of the down-stream VoIP stream during these two hand-over scenarios.

d) The user of the mobile node becomes very nervous and walks quickly from one room to the other and back, changing rooms every 30 seconds. Compute the average downstream packet loss ratio.


Related Discussions:- Compute the number of lost packets of the down-stream

What do you mean by osi, What do you mean by OSI? The Open System Inter...

What do you mean by OSI? The Open System Interconnection (OSI) reference model explains how information from a software application in one computer moves by a network medium to

Pvm library routines, In this part we shall give a short description of the...

In this part we shall give a short description of the routines in the PVM 3 user library. Each PVM program should include the PVM header file "pvm3.h" (in a C program) or "fpvm3.h"

Define the method of encryption and decryption using by ssl, Encryption/dec...

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

State about the single sign-on intranet, State about the Single Sign-On Int...

State about the Single Sign-On Intranet This Intranet, if managed efficiently, allows maximum security by firewalling anyone from inappropriate sites automatically. For exam

Command to configure a explanation on an interface, Recognize the command t...

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

Designing an internet work, 1. Introduction This document describes t...

1. Introduction This document describes the research-based assignment for this module. This assignment consists of two parts: A formal report And a presentatio

Horizontal scaling and vertical scaling, What is meant by horizontal scalin...

What is meant by horizontal scaling and vertical scaling? Ans) Horizontal scaling means adding or removing client workstations with only a small performance impact. Vertical

Example programmes for parallel systems-adding element, Example Programmes ...

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd