This is a task that I have to answer to all the questions. reference style, I do not know yet. so, I asked the instructor about it. and all the questions have the word limits. for example, when you...

1 answer below »

This is a task that I have to answer to all the questions. reference style, I do not know yet. so, I asked the instructor about it. and all the questions have the word limits.






for example, when you see '300 words' that means write in 300 words. if it is over 300 words, I have deduction and when you see '250~300 words' that means write minimum 250 words but not over 300 words.if I write below 250 or over 300 I have deduction.






please see every files what I have uploaded and finish it please.






And I have to request you the most important thing. please write every sources what you see and use as a reference. I have been in trouble 2 weeks ago. I went to the faculty discipline committee and got 60% deduction penalty. I think Turnitin which is used by the instructors can catch someone's idea as well.






Request


1. please write every sources what you see and use and the reference has to be IEEE style.


2. please finish it before the deadline.


3. it is a Mobile data network (Wireless network) course. so, please no off-topic


4. please see every files what I have attached.




Assignment01-2021.pdf 1 COMP8250 Mobile Data Networks Assignment 1 Lecturer in charge: Rajan Shankaran ([email protected]) Total Marks: 40 Weighting (Value): 20% Due: Week 7 – Tuesday, 7th of September 2021, 6 pm. (Via Turnitin). This assignment will test your knowledge in the following areas: • Medium Access Control. • Wireless LAN. • Mobile IP. Assignment Type: Problem Solving (Individual Assignment) The purpose of the problem-solving assignment is to help the students to get accustomed to dealing with real world problem situations/issues. It is designed to help students analyse a particular problem and find its best solution. Questions 1. [8 marks] Explain why the vulnerable time in ALOHA depends on the frame transmission time (Tfr), whereas in CSMA it depends on the frame propagation time (TP). (300 words) 2. [10 marks] Highlight and explain the key limitations of the Binary Exponential Back-off (BEB) algorithm that is used in Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA). Explain how the Multiplicative Increase and Linear Decrease (MILD) algorithm used in the Multiple Access with Collision Avoidance for Wireless (MACAW) protocol can address these deficiencies. Explain why the MILD algorithm may also suffer from performance degradation. (400 words) 3. [10 marks] Consider a novel Mobile IP scheme in which a mobile station announces its permanent (home) IP address to agents in foreign networks. These agents, in turn, announce this information to other routers using their regular routing protocol update messages. Compare and contrast this scheme with IETF Mobile IP scheme. (300 Words) 4. [12 marks] (Refer to figure 1) An organization has deployed a campus network using cellular IP. The Cellular IP network extends the wired infrastructure of the campus as shown in the figure 1 below. The gateways (GW) in Cellular IP connect their respective wireless segments to the wired segment. Each Base Station (BS) in the wireless segment provides layer 3 functionality (in other words, they act as IP forwarding engines). The 2 campus network supports multicast routing. This campus network strictly adheres to the Cellular IP standard. Assume that this campus network deploys Source Based Multicast Routing scheme - a protocol that builds source-based multicast distribution trees (Refer to Appendix on page 6 of this document for a brief explanation on Source Based Multicast Routing). A visiting mobile node denoted as MN in the figure below enters the wireless network and initially gets registered to its home network via BS1-GW1 and acquires a Care of Address (CoA - an address from the campus network address space). The CoA assigned to the MN remains unchanged irrespective of MN’s movements within the campus network. In other words, MN does not need to acquire a new CoA upon moving to a wireless segment under the same or under a different gateway. While initially at BS1, the MN joins a multicast group G whose scope is local to this campus network, that is, all members of the group (sources and receivers) reside within this campus network. Assume that hosts H1, H3, H5, and H7 are members of this group G with H1 and H7 also acting as Multicast sources. Furthermore, assume that MN can also operate as a source for group G multicast traffic. In this scenario, explain what problems can arise in multicast communication when: • (6 marks) MN is mobile and is a recipient of multicast packets. (200-250 words) • (6 marks) MN is mobile and is a source of multicast traffic. (200-250 words). Figure 1 BS: Base Station GW: Gateway H: Host G: Multicast Group 3 Submission You must make an online submission on ilearn via Turnitin. Assignments will normally be marked and returned online. There are no hardcopy submissions for written assignments. Ensure you submit the correct file. The submission process shows you a complete preview of your entire assignment after you have uploaded it but before you have submitted it. Carefully check through every single page to ensure everything is there and the correct version has been uploaded, and only then press CONFIRM. Note: Multiple submissions may be possible via Turnitin prior to the final due date and time of an assessment task. Teaching staff will use the originality report to judge whether plagiarism has occurred and whether penalties should apply for breaches of the Academic Honesty Policy. Any similar text identified by Turnitin will be considered carefully to see if it is indeed a breach of the Academic Honesty Policy. Note • Answers must be within the specified word limit. This is an absolute word limit, and no excess will be allowed. • Assumptions (if any) must be stated clearly in your answers. Remember, there may not be one right answer for some of the questions. Rather, your explanations do need to present your case clearly. The explanations you provide do not have to be long; a concise one is preferred to a rambling one. Late Submission No extensions will be granted without an approved application for Special Consideration. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24-hour period or part thereof that the submission is late. For example, 25 hours late in submission for an assignment worth 10 marks – 20% penalty or 2 marks deducted from the total. No submission will be accepted after solutions have been posted. Assessment For all questions in this assignment not only the contents but also the presentation will affect your mark. You will lose marks (and not necessarily only a small portion) if there are problems with the presentation, particularly with clarity. This means that your answers to each question should be a coherent statement and that the spelling and grammar of your submission will be considered in assessing its presentation. For full marks, your answers should all be clear, coherent, and correct, and strictly within the word limits. The standards of marking described in the unit outline L.O. 1-6 will be applied to this assignment as relevant to the assignment topics. 4 The questions will be marked individually, the marks totalled, and a final grade assigned that is no more than indicated by the total marks, and no more than allowed by the standards specified above and in the unit outline. Plagiarism In this assignment, you must be particularly careful to avoid plagiarising your articles or any other sources of information. Do not try to present someone else’s work as your own! The prescribed penalty is an ‘F’ grade for the assignment. When you use a source other than yourself to write a paper, you must cite that source. Sources available on the Internet must also be cited, including the Web address of the site. If you take an original source and modify it to turn in as your own work, you are also guilty of plagiarism. You need to write your own words and phrases that express your own ideas. You should be well aware of the University's plagiarism policy. 5 Appendix Source Based Multicast Routing Consider a single sender. In Source-Based Multicast Routing, the routing process builds shortest path trees rooted at the sender. The router delivers packets to each receiver along the shortest path. In a nutshell, it builds a shortest path spanning tree routed at the source to all intended destinations. Source Based Multicast Routing (SBMR) (Refer to Figure 2) The SBMR techniques implement the Reverse Path Multicast (RPM) algorithm. The RPM constructs an implicit spanning tree for each source. ⚫ It accepts a packet from a source S, on link L, if L is the shortest path toward S (Reverse Path Check) ⚫ Uses a unicast routing table which contains shortest paths to each node in the network. In this technique, the first packet flooded across the internetwork. The packet scope is restricted by a TTL value. Due to flooding, all routers in the network get a copy of the packet. Routers not having any downstream router in a multicast tree are called leaf routers. If a leaf router has no group members on its sub-networks, a Prune message is sent upstream to parent router (one hop up). The prune state is maintained in every router. This process is repeated every hop upwards. These cascaded prune messages create/truncate the original RPM tree. Prune information only held for a certain lifetime (soft state). A Graft message is sent to quickly recover back a previous pruned branch. It cancels out the previously received prune message. Graft cascades reliably hop by hop toward the source. Due to this graft and prune feature, messages are forwarded on only by those links leading to a group member. Figure 2 __MACOSX/._Assignment01-2021.pdf Lecture 02-1.pdf Dr. Rajan Shankaran Mobile Data Networks Mobile Data Networks Lecture 3 : Media Access  Motivation  Random Access  Controlled Access  Channelization Comparison Introduction: Medium Access Control  The air (Ether) is a shared media (like Ethernet cable).  Therefore protocols are needed to regulate the contention between many transmitters which tend to use the media anywhere, anytime and independently.  These protocols are normally implemented through the link layer (layer 2)  Layer 2 is subdivided into the logical link control (LLC),layer 2b, and the MAC, layer 2a  Medium Access Control is implemented via (MAC) sub layer  Medium access control comprises all mechanisms that regulate user access to a medium using SDM, TDM, FDM, or CDM.  MAC is thus similar to traffic regulations in the highway Dr. Rajan Shankaran Mobile Data Networks Sublayers of Data Link Layer Dr. Rajan Shankaran Mobile Data Networks Logical Link Control 802.11 Protocol Stack Dr
Answered 31 days AfterAug 06, 2021

Answer To: This is a task that I have to answer to all the questions. reference style, I do not know yet. so, I...

Shubham answered on Aug 27 2021
153 Votes
Question 1
The ALOHA includes the vulnerable time of 2xTfr. It is because of no rule can be used for defining the station for sending the frame. The station can send soon after another station or soon before another station that have finished. This is because the station has been allowed for sending d
uring the beginning of the time that is synchronized slowly if the station misses the moment and it can wait until the beginning of the next time slot. The station can start at the beginning of the slot that has findings the sending of the frame. But in this process, here is still the possibility for collision this can happen if two stations try to send frame at the beginning of the same time slot. This reduces the vulnerability to one-half and it is equal to Trf. In the pure ALOHA, if the bit of a frame collides with another bit of another frame then bit of the frame can discard. In pure AOHA, the transmitting station does not listen to the medium before the process of transmission. It do provides with any way for knowing another frame that is already underway. The use of another frame can provides with transmitted frame. It is the vulnerable time that is equal to the twice of frame time because it counts the time for the transmission of another frame for making current frame vulnerable. If the vulnerable time is considered as equal to the frame time, then any frame transmitted that is transmitted prior to the considered frame can be transmitted in the frame time of the considered frame that can result in collision. If a sender X starts the process of transmission then the time instant 0 and it finished with instant t. Then the sender Y continues till the instant 2t and the frame do not collide.
Question 2
Back-off algorithm is the collision resolution mechanism can be used for the ransom access MAC protocol. It is the algorithm that can be used in the Ethernet for scheduling the retransmission after the collision. The collision takes place between the 2 stations and the transmission restarts as soon after the collision. This results in another collision and it forms an infinite loop for the collision that results in deadlock. In order to avoid deadlock, a back-off algorithm is used.
MACA uses a type of short and the station sends information that is sent to RTS. The recorder is free for receiving CTS and the sender can send the information. The station is overhearing RTS wait that is long enough for CTS [1]. The overhearing CTS wait for the length of the data. As a result, the terminal problem can be avoided and the exposed terminal problem. The sender cannot receive CTS within the period for retransmission using binary exponential backoff. MACAW is designed and it is based on observation. In the backoff algorithm, MACAW replaced with MILD ensures that the backoff interval can grow slowly and shrink slowly. It enables better congestion detection. MACAW shares the backoff timer among stations by putting the information in the header. MACAW is used for providing a separate...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here