0% found this document useful (0 votes)
17 views14 pages

MC Assignment2

The document discusses the IEEE 802.11 protocol architecture, detailing its data link control layers, physical layer components, and MAC management tasks. It also covers the need for micro-mobility in mobile IP, introducing Cellular IP as a solution for managing frequent network changes without overwhelming home agents. Additionally, it outlines various topics related to wireless LAN threats, Bluetooth protocol architecture, Self-Organizing Networks, triangular routing, LTE architecture components, and differences between IEEE 802.11 standards.

Uploaded by

SHREYA BHUVAD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views14 pages

MC Assignment2

The document discusses the IEEE 802.11 protocol architecture, detailing its data link control layers, physical layer components, and MAC management tasks. It also covers the need for micro-mobility in mobile IP, introducing Cellular IP as a solution for managing frequent network changes without overwhelming home agents. Additionally, it outlines various topics related to wireless LAN threats, Bluetooth protocol architecture, Self-Organizing Networks, triangular routing, LTE architecture components, and differences between IEEE 802.11 standards.

Uploaded by

SHREYA BHUVAD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

1. Draw and explain in Protocol architecture of IEEE 802.11.

 Below figure shows the most common scenario: an IEEE 802.11 wireless LAN connected to a switched
IEEE 802.3 Ethernet via a bridge.

 Applications should not notice any difference apart from the lower bandwidth and perhaps higher
access time from the wireless LAN.Consequently, the higher layers (application, TCP, IP) look the same
for wireless nodes as for wired nodes.

 The upper part of the data link control layer, the logical link control (LLC), covers the differences of the
medium access control layers needed for the different media.

 The IEEE 802.11 standard only covers the physical layer PHY and medium access layer MAC like the
other 802.x LANs do.

 The physical layer is subdivided into the physical layer convergence protocol (PLCP) and the physical
medium dependent(PMD) . The basic tasks of the MAC layer comprise medium access, fragmentation of
user data, and encryption.

 The PLCP sublayer provides a carrier sense signal, called clear channel assessment (CCA) and provides
a common PHY service access point (SAP) independent of the transmission technology.

 Finally, the PMD sublayer handles modulation and encoding/decoding of signals.

 The MAC management supports

1. Association and re-association of a station to an access point


2. Roaming between different access points.

3. Controls authentication mechanisms,

4. Encryption,

5. Synchronization of a station with regard to an access point,

6. Power management to save battery power,

7. Also maintains the MAC management information base (MIB).

 The main tasks of the PHY management include channel tuning and PHY MIB maintenance.

 Finally, station management interacts with both management layers and is responsible for additional
higher layer functions (e.g., control of bridging and interaction with the distribution system in the case
of an access point).

2. What is the need of Micro Mobility? Explain Cellular IP in Detail.

Micro Mobility  Mobile IP represents a simple and scalable global mobility solution but lacks the
support for fast handoff control and paging.  Imagine a large number of mobile devices changing
networks quite frequently ; a high load on the home agents as well as on the networks is generated by
registration and binding update messages.  IP micro-mobility protocols can complement mobile IP by
offering fast and almost seamless handover control in limited geographical areas.  The basic underlying
idea is the same for all micro-mobility protocols: Keep the frequent updates generated by local changes
of the points of attachment away from the home network and only inform the home agent about major
changes, i.e., changes of a region.  In some sense all micro-mobility protocols establish a hierarchy. 
The following section presents three of the most commonly used approaches.

Cellular IP

 Why Cellular IP?

 Large number of mobile devices changing network frequently and moving very fast causes high load
on home agent and on network generated by registration and binding update messages.

 Cellular IP provides local handovers without renewed registration by installing a single cellular IP
gateway (CIPGW) for each domain, which acts to the outside world as a foreign agent (see Below figure).

 Inside the cellular IP domain, all nodes collect routing information for accessing MNs based on the
origin of packets sent by the MNs towards the CIPGW.

 A mobile node moving between adjacent cells will temporarily be able to receive packets via both old
and new base stations (BS) if this is supported by the lower protocol layers.

 Cellular IP requires changes to the basic mobile IP protocol and is not transparent to existing systems.

 The foreign network’s routing tables are changed based on messages sent by mobile nodes.
 These should not be trusted blindly even if they have been authenticated.

Cellular IP Architecture:

 This could be exploited by systems in the foreign network for wiretapping packets destined for an MN
by sending packets to the CIPGW with the source address set to the MN’s address.

Advantage

 Manageability: Cellular IP is mostly self-configuring, and integration of the CIPGW into a firewall would
facilitate administration of mobility-related functionality.

Disadvantages

 Efficiency: Additional network load is induced by forwarding packets on multiple paths.

 Transparency: Changes to MNs are required.

 Security: Routing tables are changed based on messages sent by mobile nodes.

 Additionally, all systems in the network can easily obtain a copy of all packets destined for an MN by
sending packets with the MN’s source address to the CIPGW.
3. Write short note on
a. HMIPv6
b. Voice over LTE(VoLTE)

4. What are various Wireless LAN Threats and how we can secure the wireless network.
5. Explain in detail Bluetooth protocol architecture. Explain the terms PICONET and
SCATTERNET in terms of Bluetooth.
6. What do you mean by Self Organization Network (SON)? Draw and explain architecture of
SON.
7. What is triangular routing? Explain route optimization to avoid triangular routing.
8. Explain different components used in LTE architecture with diagram.
9. difference between ieee 802.11, ieee 802.11 a and ieee 802.11 b

You might also like