StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless IP Using Foreign Agent Information - Assignment Example

Cite this document
Summary
The paper "Wireless IP Using Foreign Agent Information" discusses a state where the wireless network connects or joins a wired Ethernet network to a wireless network. There are also central connection points for wireless local area networks (WLAN) for the clients. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Wireless IP Using Foreign Agent Information
Read Text Preview

Extract of sample "Wireless IP Using Foreign Agent Information"

When the network connection is not in the infrastructure mode, then it is in the ad-hoc wireless networks. This mode of operation allows nodes on the wireless network to communicate directly with each other. The infrastructure mode is better compared to the alternative ad-hoc wireless networks because it offers scalability, and security management at a central point and improves the reach. While AP devices seem as the only shortcoming of this infrastructure mode of operation. 

Question 2

The node does not need to be mobile because the internet through the access point has only one IP address. The node becomes mobile if the IP address and the name change and this happens in new locations. If the laptop user accesses the internet through the same AP then he/she is still within the same location. Dynamic Host Configuration (DHCP) could be used to solve the mobility of a node where the new IP address is acquired in a new location.


Question 3

  1. X(t) will continue to come to fill the client buffer, the received TCP buffer will be drained at a rate of d by the client application after the client buffer has been filled by the incoming buffer from the server buffer. The client will therefore store the received data without playing it back immediately as it receives it this provides a playout delay. The data is played from the buffer allowing the received data to fill the backup of the buffer. The playout delay is increased by accumulating more data in the buffer before playing it. Unusual delay of the playout results in data in the buffer dipping more than usual than the prefilled data. Therefore the client buffer evolves with the buffering and playout delays in addition to delays by the network.   When considering switching from TCP to UDP sound quality should be a factor because TCP gives better sound quality than UDP.

 

Question 4

  1. When a high-priority packet arrives during the transmission of a low-priority packet, preemptive scheduling occurs. There is an interruption of lower priority packet while higher priority packet is transmitted in full. Preemptive scheduling does not make sense in networks since it wastes a lot of bandwidth given that the lower packet is partially received which does not make sense. In the figure assume that packets 1, 3, and 4 are of higher priority while 2 and 5 are of lower priority the transmission of packets will be interrupted if the higher priority packets arrive before the completion of lower priority packets.

In a preemptive priority queuing the packets of higher priority will be sent first before the transmission of lower priority packets hence packets 1,3,4,2 then 5 sequences will be followed.

  1. Delay play-out is used to compensate for delays in the network and the delay of the jitter in the transmission of the packets.
Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Information Technology Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1447428-week
(Information Technology Assignment Example | Topics and Well Written Essays - 1000 Words)
Information Technology Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1447428-week.
“Information Technology Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1447428-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless IP Using Foreign Agent Information

Definition and Characteristics of Mobile IP

The paper "Definition and Characteristics of Mobile ip" tells us about FQDN.... In the current Internet, ip addresses are used to identify particular end systems.... ip addresses are often thought of as being semantically equivalent to a Domain Name Server's Fully Qualified Domain Name.... A mobile host needs to have a stable ip address to be uniquely identifiable to other Internet hosts.... When a mobile host moves from one network to another, the ip address of an MH will change due to the enforced hierarchical address structure of the Internet....
22 Pages (5500 words) Essay

Mobile Internet Protocol Issues

Ghosh (2006) states that 'the Internet infrastructure is built on top of a collection of protocols, called the TCP/ip protocol suite.... Transmission Control Protocol (TCP) and Internet Protocol (ip) are the core protocols in this suite; ip requires the location of any host connected to the Internet to be uniquely identified.... However, the higher-level protocols require the ip address of a host to be fixed for identifying connections'....
10 Pages (2500 words) Essay

Evolution of security cameras and computer monitoring software

Various types Emphasis has been laid on the requirement and usage of software to protect information and technology.... These are equally important for protection of official possessions, infrastructure, data and information, storage systems of products and official data, etc in all spheres of life including offices, business units, production houses, hospitals, manufacturing plants, hospitality and entertainment setups, travel mediums, financial institutions, etc; infact, this list would include all the places having potential risk of attracting loss, damage, or harm from external sources....
12 Pages (3000 words) Essay

Wi-Fi Technology: Wireless Fidelity

However, our focus in this paper would be upon the exploitation of WPS and how it can be easily compromised using brute-force attacks and other kinds of attacks.... An essay "Wi-Fi Technology: wireless Fidelity" outlines that it was originally designed to allow network elements to roam in warehouses and manufacturing facilities without getting out of reach of the connected network and without being subjected to cumbersomeness of wired network elements.... The wireless Networks cost less than the wired connections where cables are required to connect every other computer....
10 Pages (2500 words) Essay

Comparing Mobile IP, TCP/IP and IPv6

IP controls addressing information and some control information so that routing of data packets is possible.... Connectionless means that IP does not exchange control information, called a handshake, to establish an end-to-end connection before sending data.... This paper "Comparing Mobile ip, TCP/ip and IPv6" discusses the Transmission Control Protocol/Internet Protocol suite as the foundation on which the Internet and the World Wide Web operates....
10 Pages (2500 words) Case Study

Advanced Networks

This is done by using a single IP address to serve multiple computers and using the PORT number, which is an adjunct to the IP address, to differentiate among computers and among specific connections.... The author of the paper describes the reasons for the inexhaustive availability of ip addresses, the encoding scheme with Cat 5, 100 Base-TX, time-space diagram, Distance vector routing algorithms, and Piconet and Scatternet in the context of Bluetooth networking ....
12 Pages (3000 words) Assignment

Technology and Foundations into the Wireless Network

SNMP offers client interface, management agent, network management, and information management.... The market is full of wireless management tools whereas the paper narrows down to the analysis of the network problems that arise in wireless network monitoring using the Observer platform.... 1a, g, and b are easily and simply achieved using management platforms that are available.... The key important reason for using the Observer is that it is open-source....
18 Pages (4500 words) Term Paper

Mobile IP Operation Principles

Part of a node's IP address offers information on the node's physical location on the network since the subnet can be determined, this is however founded on the notion that nodes are stationary.... The paper "Mobile ip Operation Principles" focuses on the critical analysis of the main operation principles of mobile Internet Protocol (ip).... The Internet Protocol (ip) has advanced the Internet....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us