MC_Module 3 MU Questions with Solution
MC_Module 3 MU Questions with Solution
Facilitates guaranteed transmission of the IP packet responses through the tunnel to the HA
• Now, the HA transmits the response to the CN • A low value of time-to-live at the FA does not lead to
packet expiries. Information is multicast to a mobile node (MN) when it sets the option for multicast
listening • Uses Bi-directional tunnelling method over a mobile IP network. Assume that a MNi visits a
foreign network with FAj • A multicast-tree multicasts a packet to HAj • HAj forwards the multicasted IP
packets to MNj after registration. HAj establishes a bi-directional tunnel between HAi and FAj • FAj
transmits the received multicast message or packet to MNj. Suppose MNi visits another foreign network
with FAk • MNi requests FAk , and FAk forwards the transmit request for the multicast to Haj.
Disadvantages of reverse tunnel approach
Duplication of multicast IP packets when multiple MNs of HAj and other HAs visit the same FA • Because
several HAs create several bi-directional tunnels, through which they transmit multicast packets multiple
times. • When the built bi-directional tunnels do not converge into one, the packets maybe duplicated.
IP packets reach by short and long paths, when there is no DMSP (designated multicast provider)
2) Explain agent registration process in mobile
communication
Soln: Agent Registration: Mobile node after discovering the foreign agent, sends registration
request (RREQ) to the foreign agent. Foreign agent in turn, sends the registration request to the
home agent with the care-of-address. Home agent sends registration reply (RREP) to the
foreign agent. Then it forwards the registration reply to the mobile node and completes the
process of registration. The reply message contains the necessary codes to inform the mobile
node and the foreign agent about the status of the registration request. The message also
contains the lifetime that is granted by the home agent. The lifetime can be smaller than the
original request. The registration reply can also contain a dynamic home address assignment
A starts sending to B, C does not receive this transmission. C also wants to send something to B and
senses the medium. C also starts sending causing a collision at B. But A cannot detect this collision at
B and continues with its transmission. Here A is hidden for C and vice versa
Multiple access with collision avoidance (MACA) MACA for Hidden terminal problem –
A does sends a request to send (RTS) first. -> B receives the RTS that contains the name of sender and
receiver, as well as the length of the future transmission. (RTS is not heard by C) -> This RTS triggers an
acknowledgement from B, called clear to send (CTS). -> The CTS again contains the names of sender
(A) and receiver (B) of the user data, and the length of the future transmission. -> This CTS is now heard
by C -> After receiving a CTS, C is not allowed to send anything for the duration indicated in the CTS
toward B. ->A collision cannot occur at B during data transmission, and the hidden terminal problem
is solved.
MACA for Exposed terminal problem B wants to send data to A, C to someone else. But C senses the
medium before transmitting, sensing a busy medium caused by the transmission from B. C defers,
although C could never cause a collision at A.
With MACA, -> B has to transmit an RTS first containing the name of the receiver (A) and the sender
(B). -> C does not react to this message as it is not the receiver, but A acknowledges using a CTS which
identifies B as the sender and A as the receiver of the following data transmission. -> C does not receive
this CTS and concludes that A is outside the detection range. -> C can start its transmission assuming
it will not cause a collision at A. The problem with exposed terminals is solved Disadvantage of MACA
overheads associated with the RTS and CTS transmissions – for short and time-critical data packets,
this is not negligible. MACA also assumes symmetrical transmission and reception conditions.
The M-TCP (mobile TCP)1 approach has the same goals as I-TCP and snooping TCP: to
prevent the sender window from shrinking if bit errors or disconnection but not congestion
cause current problems. M-TCP wants to improve overall throughput, to lower the delay, to
maintain end-to-end semantics of TCP, and to provide a more efficient handover.
Additionally, M-TCP is especially adapted to the problems arising from lengthy or frequent
disconnections (Brown, 1997). M-TCP splits the TCP connection into two parts as I-TCP
does. An unmodified TCP is used on the standard host-supervisory host (SH) connection,
while an optimized TCP is used on the SH-MH connection. The supervisory host is
responsible for exchanging data between both parts similar to the proxy in ITCP.
The M-TCP approach assumes a relatively low bit error rate on the wireless link. Therefore,
it does not perform caching/retransmission of data via the SH. If a packet is lost on the wireless
link, it has to be retransmitted by the original sender. This maintains the TCP end-to-end
semantics. The SH monitors all packets sent to the MH and ACKs returned from the MH. If
the SH does not receive an ACK for some time, it assumes that the MH is disconnected. It
then chokes the sender by setting the sender‟s window size to 0. Setting the window size to 0
forces the sender to go into persistent mode, i.e., the state of the sender will not change no
matter how long the receiver is disconnected. This means that the sender will not try to
retransmit data. As soon as the SH (either the old SH or a new SH) detects connectivity again,
it reopens the window of the sender to the old value. The sender can continue sending at full
speed. This mechanism does not require changes to the sender‟s TCP. The wireless side uses
an adapted TCP that can recover from packet loss much faster. This modified TCP does not
use slow start, thus, M-TCP needs a bandwidth manager to implement fair sharing over the
wireless link.
The advantages of M-TCP are the following:
1 It maintains the TCP end-to-end semantics. The SH does not send any ACK itself but
forwards the ACKs from the MH.
2 If the MH is disconnected, it avoids useless retransmissions, slowly starts or breaking
connections by simply shrinking the sender ‘s window to 0. Since it does not buffer data in
the SH as I-TCP does, it is not necessary to forward buffers to a new SH. Lost packets will
be automatically retransmitted to the new SH.
Disadvantages:
1 As the SH does not act as proxy as in I-TCP, packet loss on the wireless link due to bit
errors is propagated to the sender. M-TCP assumes low bit error rates, which is not always a
valid assumption.
2 A modified TCP on the wireless link not only requires modifications to the MH protocol
software but also new network elements like the bandwidth manager.
When the mobile node receives an agent advertisement, the mobile node registers through
the foreign agent, even when the mobile node might be able to acquire its own co-located
care-of address. This feature enables sites to restrict access to mobility services. Through
agent advertisements, mobile nodes detect when they have moved from one subnet to
another.
Mobile IP registration provides a flexible mechanism for mobile nodes to communicate their
current reachability information to their home agent. The registration process enables mobile
nodes to perform the following tasks:
If a mobile node is registering a foreign agent care-of address, the mobile node
registers using that foreign agent.
If a mobile node is using a co-located care-of address, and receives an agent
advertisement from a foreign agent on the link on which it is using this care-of
address, the mobile node registers using that foreign agent (or another foreign agent
on this link).
If a mobile node uses a co-located care-of address, the mobile node registers directly
with its home agent.
If a mobile node returns to its home network, the mobile node deregisters with
its home agent.
These registration processes involve the exchange of registration requests and registration
reply messages. When registering using a foreign agent, the registration process takes the
following steps, which the subsequent illustration depicts:
1. The mobile node sends a registration request to the prospective foreign agent to begin
the registration process.
2. The foreign agent processes the registration request and then relays it to the home
agent.
3. The home agent sends a registration reply to the foreign agent to grant or deny the
request.
4. The foreign agent processes the registration reply and then relays it to the mobile node
to inform it of the disposition of its request.
When the mobile node registers directly with its home agent, the registration process requires
only the following steps:
the sender would apply CS and CD, but the collisions happen at the receiver
it might be the case that a sender cannot “hear” the collision, i.e., CD does not work
furthermore, CS might not work if, e.g., a terminal is “hidden” Hidden and exposed terminals
Hidden terminals A sends to B, C cannot receive A C wants to send to B, C senses a “free” medium
(CS fails) collision at B, A cannot receive the collision (CD fails) A is “hidden” for C
Exposed terminals B sends to A, C wants to send to another terminal (not A or B) C has to wait, CS
signals a medium in use but A is outside the radio range of C, therefore waiting is not necessary C is
“exposed” to B