0% found this document useful (0 votes)
9 views12 pages

Mc extra 2

The document discusses Dynamic Host Configuration Protocol (DHCP), which automates the assignment of IP addresses and configuration information to devices on a network, reducing manual errors and administrative overhead. It highlights the benefits of DHCP, such as reliable IP address configuration and centralized management, as well as the importance of DHCP servers in maintaining a pool of IP addresses for clients. Additionally, the document briefly mentions HiperLAN, a wireless LAN standard, and introduces concepts related to mobile computing, such as handover processes and Voice over IP (VoIP).

Uploaded by

honestreply999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
9 views12 pages

Mc extra 2

The document discusses Dynamic Host Configuration Protocol (DHCP), which automates the assignment of IP addresses and configuration information to devices on a network, reducing manual errors and administrative overhead. It highlights the benefits of DHCP, such as reliable IP address configuration and centralized management, as well as the importance of DHCP servers in maintaining a pool of IP addresses for clients. Additionally, the document briefly mentions HiperLAN, a wireless LAN standard, and introduces concepts related to mobile computing, such as handover processes and Voice over IP (VoIP).

Uploaded by

honestreply999
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
10:00PM Mon 2 Jun ooo 476869862-Mobile-computing-Akash-8th... » Done vetieau io UNECUy peupur unas 8y ue pau cA, Q.3. What is DHCP? What are the Benefits of DHCP. Why use DHCP. Ans. DHCP: Dynamic Host Configuration Protocol (DIICP) is a clienUserver protocol that automatically provides an Internct Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol ZOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server. The Microsoft. Windows Server 2003 operating system includes a DHCP Server service, which is an optional networking component. All Windows-based clients inchide the DHCP client as part of TCP/IP, including Windows Server 2003, Microsoft Windows XP, Windows 2000, Windows NT 4.0, Windows Millennium Edition (Windows Me), and Windows 98. Benefits of DHCP In Windows Server 2003, the DHCP Server service provides the following benefits: Reliable IP address configuration. DHCP minimizes configuration errors caused by manual IP address configuration, such as typographical errors, or address conflicts caused by the assignment of an IP address to more than one computer at the same time. 10:01PM Mon 2 Jun . = 476869862-Mobile-computing-Akash-8th... » Done 12-2016 Eighth Semester, Mobile Computing Reduced network administration: DHCP includes the following features to reduce network administration: 1. Centralized and automated TCPAP configuration. 2. The ability to define TCP/P configurations from a central location. 3. The ability to assign a full range of additional TCP/P configuration values by means of DHCP options. 4, The efficient handling of IP addre frequently, such as those for portable co wireless network, 5. The forwarding of initial DHCP messages by using a DHCP relay agent, thus climinating the need to have a DHCP server on every subset. ‘Why Use DHCP ss changes for clients that must be updated ‘puters that move to different locations on a ‘must have a unique unicast IP address to tt DHCP, IP addresses must be configured re removed from the network. DHCP enables this entire process to be automated and managed centrally. The DHCP server maintains a pool of IP addresses and leases an address to any DHCI enabled client when it starts up on the network. Because the IP addresses are dynamic eased) rather than static (permanently assigned), adiresses no longer in vee are ‘automatically returned to the pool for reallocation, ‘The network administrator establishes DHCP servers that maintain TCPAP «configuration information and provide address configuration to DHCP-enabled clients inthe form of lease offer. The DHCP server stores the configuration information in a database, which includes: 1. Valid TCP/IP configuration parameters for all clients on the network. 2.Valid IP addresses, maintained in a pool for assignment to clients, as well as excluded addresses. Reserved IP addresses associated with particular DHCP clients, This allows consistent assignment ofa single IP address to a single DHCP client. 4.The lease duration, or the length of time for which the IP address can be used before alease renewal is required. Q.4.a) Describe Hiper LAN. Discuss variuos features of Hiper LAN. ‘Ans. HiperLAN (High Performance Radio LAN)ia a Wirelese LAN standard {1] It ~ is a European altemative for the [EEE 802.11 standards the IEEE is an international organization). It is defined by the European Telecommunications Standards Institute (ETSH). In ETSI the standards are defined by the BRAN project (Broadband Radio ‘Access Networks). The HiperLAN standard family has four different versions, 2. Slow mobility (1.4 m/s) Open in CollaNote ® om oy 10:10PM = Mon 2 Jun — != 476869862-Mobile-c... » Open inCo eee seo hth Semester, Maile Compting rome cate wit ner eS er he a cmt I aeeltohe leerber Ths TL ered slog ie sees ipa ne ruthndover procera OST © ‘Ans The proceso Baader o df itn any ear ate is ferent smgreance Is etal paces an pertermelnsorety handover ean rere in ‘helo a te cal. Dropped cle orepataay annayingio wera the umber ‘etapetealsrsen cose dation ereaser ae he ro kl tochange ‘SanahereterscriglyGStthandre war neato whith prea aenton, Sr poidmhon developing te wanda ‘When mabe ser tal frome area ofeoerageor alt snthe cel within ‘Reeallwse apy tesueths ak nth theme hse tat cme to mek ‘tnemobe ectee Indeed. thes rrasereeinadengnmaterinmce | Cellesyetem eign andl heed With ar anda ink te piorbasstation terminated befor o s he errand ete new ev bee aten That sn at etc ied {ean more thanooe base sonata grea ine, naton othe bande ay eg ‘mhenthe gal tregin at heme eed om base stat agree tha that sCSeetate|Thengea tenga eee lire swrago ver ‘hellaiar elephone commision, sf bandef refers to the orrappng of ‘iat, end rece sistem mare han oe repent ane ‘Sot han chlo ened eodedvin lil ss (CLA atm ‘tse mewatn a ery a Teer ann Mor saya tins sta in THD, Beas coche "Types of 08M handover antinte M sen her aur ofhandver hal cane permed + Intra.BTS handowers Thiam of OSM hanover corse eqs ange the eget orale being wl bys mse beans nerve tho ‘eso Tn thorn of G33 busdove th mae rea sac erase ‘tin iraecier bt changes the chanel ols Inter nia BSC hanover Ths oo GM Nodes OSM ant secure hen the make move so of te carrageenan BIS hoes sane treed th same BS In hint te BEE aes petoratrtaets ‘rditasion eu thane nosint bo moistee rte ed BS on + Inter BSC handover, When th mile moves ot ef ane felted ‘nyove BSC, a mare nvelved forme aaah tobe pred adage 476869862-Mobile-c.. ¥ OpeninCallaNote () Q Ef @ done 1 menage i tense tee neater ane on "a ent ten ‘emmaatomindliain nthe Speen naan ee 476869862-Mobile-c.. ¥ OpeninCollaNote (fh) Q = @ done | D 26otse END TERM EXAMINATION [MAY-JUNE 2018), EIGHTH SEMESTER (B.TECH) MOBILE COMPUTING (ETIT-402) ine he = ‘etc not on fetishism. ‘Qian any ewig nba 7 Qian Mince ‘ho fraser Pe hm meen nr on EEE woe Scene ee robbs Eas Brant eit SESS eptn te mertonihpa ‘SciN intent wlan La Toe Wa nse lu ed ‘Sy er eps TERM tee wg ‘St nn te cpr pret tt tee geal {Lhe wes en onl he “Th EE 2.1 ana ey pi PY ad mai tne ithe wet Le Ta ue eed a he ‘Sager Pub nee Theos an AC prema os ta ‘ecto af een aft alone reser ee ‘Su eed car aes met 0A el presen ‘ean snc gs Py OPO ee ‘eGttmoaaanendenndipionanyspae €- Se "ig Eo ror eee and dng ee the =. EL premrene | Seca an ciate erent ees Re ets ars nro 59 81) Limonene severe on dma se hc ein 0) Bt Tm Binion 20722217) ‘Reset I aides mths Sod acne far pcg ats nar et ‘Sera iy dentro er as jie tat tema pe ‘cle in yar sus ed at iret men Thonn ete tn se aes sii rer =e Seti nanees racemase Scam Spain sess hth Sema Mabe Comes te utes mrs Manner nn Beart cn retin} Beta : SE oe ea ma nteet Abhtn ciate re Peper eect rertierd eet eat ning a ce ints orp Sai oe ee pepe arent meena teint Shetek hry cng eet wins device rtd Rotcioofueer ao nes tee ie 3 Sieceth ruil ead ar i rather diy oth hr hn ap anette dnc ewe ang moe SatGainen he onpueneedoke nthe WOmentecter yar person wip tnt, we go eae nh eer om et de ing red Wniyswpenancurmeea eee ‘head ocean areal rmig esata, 1 ied spit Dymicntor tplasy {Carry ovimement ‘inept canes “Taney fos scat ha maison ed inital pe {Tinga hve 9 asad eae oer (G2 (iteplainthe proces of packet atvery «s An Tae ote mente Mile ode Om ne atin oath epbtniiea prthenuvmetefetn Cruse Nace o [STEP cso the pocket a al he abn With Ser bed sacNend Destin ena Tho tr ha othe nj raton {eisai ots tb cette ter eyo me SRSSTIOC Tans dne sng th star eating means ft tert (STEP 2The Aso divert the pace, owing tht MO caret ot ne eae eter: Te pce fora bot or Dt enapaad ‘SctwanietstheCOA Anew henderson nt ofthe Pear showag he ‘Conta deaston nd HA sosoure ofthe nrapltedpace. STEP 3 The orig az Frew decapuae te pk, renee the nina arian OAs deities re) ad rede ‘heel pee with 3 a ere and N a dentin th MB Auth mbit nat ae Ply th Rais thst ith te Sac are aN ad Detain ‘STEP 4:7 UX enh pct MN Sore ddr end a Deion ‘Addr The rer withthe Pc etl oer norway Sanne at woof ay ser note eign eter Spl mechan ‘roa a anda atin chant may hn bre Sy ae tne deter th pce om Mn OX 4.) MaboratethearchtectureoPalmOSund explain (©) ‘Ane At thigh el therehatr fhe Pal OS deve, em ce a, emt broken dw at the gers: pin, Operating Sen ad ‘ee othe Pai O8 Apion Programming Inerfce (APD pois th sylenton erlpr sin ua fbroereldepeodnse nd pve alaper ‘Mirco If thr APT on recy emp h ppl al tht ‘tsny mere ran Pn OSes edo ret harcne Tht ‘Sipe enamine weaker and ata vectors that ean fend at epsining interoperate a. 22018 ‘Right Semester, Mebile Computing ‘The SOR Servin diner rte allows the devs Sacer vaste sve nto enable do non "The appleatoe preven the apliton ae aerate serve tower lage yong ne fe may profiles eae he ‘Common Blaeooth security lrvee ‘There area mumber of wae in which Blsonth scat 4s be penta, fe, ‘ceases pas The majors of Batt ary {lst be ollorng eres. ina = BlaJoching®Blajachng i ofan nota major malicious ceca pro sough there canbe ros wih epi cole semaoe tot tei a Sis leueth oor Sonuth ners pay reece Tee, [Sth repent wil net esl what the rmasogeie sadn ntti Sex rate eat atbeanntal on tn eh eo + Blucbugring Tis mort anissn. This frm Bett est ty ‘acer tremetly ares ane nd an tafeatures Thema nde plang ey ‘id ecaiog st nage wean eves Gat nt eka tht pos Shanon " + Car Watapering Tis avoles he of sfware hallows bahia a Inorderte prc again tee adie forme of valerie atc fBlvcoth embed devices ar upgrading he wey io esure tat hee Bare ecu nen donot avin th tha pote Q5.(0) How th voices tranamitted over internet? Discuss the coneeroed protest forte o ‘Ans YIP vin over IP) ithe tranamiainot we and mle content oe terete IP) etwees VelP hstarallyrferredts wing toanne pe ‘rah exchones PER) but he eri now wed iterchngeoly ih IP lpg eis enabled a group oftechvlgie ad metbedlgie edt daira sermons over the iter eterprielral re peor or wie ore eee ‘iP eniplterlade dented deste VP panes slpboneeppliatins anne ‘on Pend bl ders, abd WODRTC cabled browoer- How does VoIP werk? ‘oP sss to napalta nuit data packets, rans the packets 8 ‘Pato ed unenesplta the peta ck oto aio atthe eth nd of it ‘Soneiton By eliminating tone ofcretwiched newer fr wie, oP redo fntorkintatracar ees, enables poder o dire eo erie eer halt ‘ending and pat nee, and alors septa prt ng vend ‘ePaper fT based networks by enabling at ale ‘sting otags and redandant commusiabonsbtneen ndpina snd atmo tse 0.29, hich the standard fr compre pocket ‘Many euipmet vendors sls eth ewnpoptary des. Yc gal 47 sateen opresin ue, bet emo ean bandwith requires ‘WP opsaly spor conve copmaetns vie he FFU T38 pete tend former VIP elP rater in ea ts ‘ce ven ncaa nt Pn aly raid wih he RT ‘rans Prtcl (ETP or tou eric, the Secure Rea Tine rape pn The Ses Innis Proral (SIP) woo en aed gal ‘betirmnyncens mania se oda ‘Withee ra two uty erie (S54 pal wed | seo ce nteng-omsve options enue te eee ‘Naina compen el WIP tenn ining ant POKe manag ner islpane nosber: dvs, fetes ud en: gateway ee ‘tris and poeta lol arith vent oath sap tad ‘Shin bere cone oprovde seca, ell pale anagem sad eer "AV pte can loins eatin trshng tsbet fr BY —erhaned ‘11—eliroting aed manages tras colt el pertrmane watt ot fea prone vee quay manepmet ‘elP telephones: The wo mantypene WP alephees re hardwarebae and stare bose y ‘Ahardwarebased WIP phooe ook i taditna hard-wired rele epone a eaten ilar nares chan spenkrer eons ose, ‘ale ID phy SIP phone cans poe calleufrncng end ‘Soware bated IP phones known tpone ae stare ats ina snasompeteror abn vee Thesafien er mere fon la Ms aseiane Sande witha ouch endear I ply Abed eupyed witha icptone enone tothe computer or ob dec make cl Unreal ‘hircompatrormoble deve ithe be bala mzrphone ed eae, ‘Qo. (a) How the data replationtn mobs computing ebandlod? Hapa synchronous repliation ifereatite between online ain repatlon and ‘tine data replication. 6.00) How the movementsof ue ae atareplestis? Explain. (6) ‘Axe Datarepileation. ‘ Aecata elena we data ae tin th ator. * Now itbeames psa bale zn requt renter enero te Saale, without aceaig a ore HL * Se now instead of MU er «FH lig ba Q.1. (a) If BT/BC is total number of voice channels, C/I is carrier to interference ration of system. Give the relation (m) among voice quality, dropped ior rate and capacity. “ @ ‘Ans, The cellular radio capacity, m, of TDMA can be determined by the relationship Aix m-B where Bis the total allocated spectrum for the system, B, is the channel bandwidth, and Kis the number of cells in a frequency reuse pattern and can be obtained by, x-%% where q is the co-channel interference reduction factor (CIRF). In mobile radio environment, we may assume a fourth power rule, i.y=4, = number of channelalcel! - ‘Where M is the total number of equivalent channels and (C/I) is the minimum received earrier-to interference ratio per channel or per time slot, ‘The C/I ratio of CDMA and TDMA system is related to E/N, through oe ey TN, Be Where R,, is the transmission data rate, B, is the transmission bandwidth, E, is the energy per bit and N, is the interference power per hertz. @) if. University-b.iech}-Akash Books [Parameters BLUETOOTH HIPERLAN-2 802.11WLAN “Application Wireless network | Access to ATM fixed | Wireless networks network Frequency, Band| 2.45GHz 8 CHs 2.4 GHz Maximum Data | Mbps 54 Mbps 2 Mbps rate ‘Topology Ad-hoc Cellular, centralized | Can be adhoc or infra- . based Error control | Ara/fec maclayer | Ara/fec phy layer ARQ, Range Upto 10m 50-200m 100m Interface low high medium Medium Access | Master is ——T AP centralized CSMA/CA methods for medium Connectivity Connection less and Connection oriented | Connectionless Oriented . QoS (Quality of | Statistical ATM/802.1p/RSVP | PCF (optional) Service) Frequency Frequeney hopping|. Dynamic frequency | Frequency hopping or Selection aelection (DSS) sss ‘Typical Outdoor! 100 metres - - Range Encryption DES, SDES DES, sDES 40 bit RO Authentication | No X509 No Q.1. (g) Explain three types of multiple access techniques. Why CDMA a OR Q7. a) With an example explain the process of the dynamic source routing ‘of the ad-hoc network. @) ‘Ans. Dynamic Source Routing Protocol: The dynamic source routing (DSR) ‘protocol deploys source routing, Each node caches the specified route to destination during source routing of a packet through that node. This enables a node to provide route specification when a packet source routes from that node. Bach node deletes the specified route to destination. The deletion is done during routing of error packet in reverse path to the source. The error packet is sent by reverse path in case it is observed by a router that there is a disconnection during forward path to destination. The process of deletion, oflink shown by the routing table or route-cache is called as link reversal. DSRensures that each data packet includes the routing-node addresses also. Itis ‘a reactive protocol. It means the router node reacts to the changes and dynamically maintains only the routing addresses from source to destination. The routing addresses at the packets are the active paths to a destination at a given instant. « ‘The router does unicast routing. It means packets are routed to a single destined address, Let us first understand the two phases, Phase 1 and 2, ofthe protocol in order to understand the header for source routing, caching of specific route addresses, and the reversal processes of route address specifications. Phase 1 in DSR Protocol Source node initiates a route discovery process. It broadcasts the packets, each with a header. It then expects a return of acknowledgement from each destination. The packets are called route request (RREQ) packets. DSR uses flooding (sends multiple RREQs). Abheader for each RREQ packet has the (i) unique request number and (ii) source and destination addresses. This enables identification of the (i) RREQ at each intermediate node in the request and (i) acknowledged packet(s). Initially only the source address is given in the header when the routing process starts, When the packet reaches a neighbour, thats, any intermediate node, the node ‘adds its own address in the header ifitis able to successfully send the packet to its next

You might also like