MC
MC
1Q. Discuss the advantages and disadvantages of GSM compared to other cellular technologies (e.g., CDMA, LTE).
Advantages of GSM:
1. Global Standard:
o GSM is widely adopted worldwide, making it easy to use internationally with roaming agreements.
o Uses SIM cards, allowing users to easily switch devices without changing numbers.
3. Better Coverage:
o GSM networks have broader coverage, especially in rural and remote areas.
4. Cost-Effective:
6. Interference Handling:
o Uses TDMA and FDMA, which are less susceptible to interference compared to CDMA.
Disadvantages of GSM:
o GSM data speeds (GPRS/EDGE) are slower compared to CDMA and LTE.
2. Limited Capacity:
o TDMA-based GSM has a fixed number of time slots, limiting the number of users.
3. Security Issues:
o GSM encryption is weaker compared to CDMA and LTE, making it more vulnerable to hacking.
o Lacks native support for advanced features like VoLTE (Voice over LTE) and high-speed data.
6. Older Technology:
1. Efficiency:
o Means using the channel to send as much data as possible with minimal delays.
o Problem: Other devices may have to wait too long, which is unfair.
2. Fairness:
o Problem: This can waste time if some devices have little or no data to send, reducing efficiency.
3. Trade-offs:
4. Example:
▪ Efficient but unfair: One student talks for a long time, others wait.
▪ Fair but inefficient: Each student gets 10 seconds, even if they don’t need it.
5. Conclusion:
o A good MAC protocol balances efficiency (fast data transfer) and fairness (equal access) to work well
for everyone.
2Q. Compare and contrast the performance of CSMA protocols (e.g., CSMA/CA,CSMA/CD) in different wireless
environments.
1. Basic Idea:
o FDMA divides the total available spectrum into smaller frequency bands.
2. How It Works:
o Each user gets a fixed frequency band for the entire duration of their communication.
o Example: Imagine a radio with multiple stations; each station uses a different frequency, so they
don’t interfere with each other.
3. Advantages:
o Simple to implement.
4. Disadvantages:
o Requires guard bands between frequencies to prevent interference, which reduces overall efficiency.
5. Applications:
Advantages of TDMA:
o Multiple users share the same frequency by dividing it into time slots, maximizing spectrum
utilization.
o Users can be allocated more time slots for higher data rates if needed.
o Devices transmit only during their assigned time slots, saving battery life.
o Unlike FDMA, TDMA doesn’t require guard bands between frequencies, saving bandwidth.
Disadvantages of TDMA:
1. Synchronization Required:
o All devices must be synchronized to avoid overlapping time slots, adding complexity.
2. Transmission Delays:
o Users must wait for their turn to transmit, which can cause delays.
3. Limited Capacity:
4. Susceptible to Interference:
5. Higher Costs:
Mobile IP is a communication protocol that allows a device (called a mobile node) to move between different
networks while maintaining the same IP address. It ensures seamless connectivity even when the device changes its
location.
o Every mobile node has a permanent home address on its home network.
o A Home Agent (HA) on the home network keeps track of the mobile node’s current location.
o When the mobile node moves to a foreign network, it obtains a temporary address called the Care-
of Address (CoA).
3. Binding Update:
o The mobile node informs its Home Agent about its new location by sending a binding
update message with its CoA.
4. Packet Tunneling:
o When a correspondent node sends packets to the mobile node’s home address, the HA intercepts
them.
o The HA encapsulates the packets in a new IP header with the CoA as the destination address. This
process is called tunneling.
o The encapsulated packets are sent to the Foreign Agent (or directly to the mobile node if it has a
CoA).
o The FA decapsulates the packets and delivers them to the mobile node.
6. Return Traffic:
o The mobile node sends reply packets directly to the correspondent node using its CoA.
o This avoids the need for tunneling in the reverse direction, improving efficiency.
Key Components:
• Home Agent (HA): Tracks the mobile node’s location and tunnels packets to its CoA.
• Foreign Agent (FA): Assists the mobile node in the foreign network and delivers packets.
• Care-of Address (CoA): Temporary address of the mobile node in the foreign network.
2Q. Discuss the triangle routing problem and how Mobile IP addresses it
o In Mobile IP, when a correspondent node (CN) sends packets to a mobile node (MN), the packets
first go to the Home Agent (HA) on the home network.
o The HA then tunnels the packets to the mobile node’s Care-of Address (CoA) in the foreign network.
▪ CN → HA → MN.
o The return traffic, however, goes directly from the MN to the CN (MN → CN).
Why is it a Problem?
o Inefficient Routing: The path taken by packets is longer than necessary, increasing latency and
network load.
o Increased Delay: Packets travel via the HA, even when the CN and MN are close to each other.
o Higher Load on HA: The HA becomes a bottleneck as all traffic passes through it.
1. Route Optimization:
o Mobile IP allows the correspondent node (CN) to learn the mobile node’s Care-of Address (CoA).
o Once the CN knows the CoA, it can send packets directly to the MN, bypassing the HA.
o The mobile node sends a binding update message to the CN, informing it of its current CoA.
3. Direct Communication:
o After receiving the binding update, the CN sends packets directly to the MN’s CoA.
o This eliminates the need for tunneling through the HA, reducing latency and network load.
4. Security Measures:
o Binding updates are secured using authentication to prevent attacks like spoofing.
• Reduced Latency: Packets take the shortest path between CN and MN.
Snooping TCP is a technique used in wireless networks to improve TCP performance. A snooping agent (usually at the
base station) monitors TCP packets and handles retransmissions locally to reduce delays caused by wireless errors.
o Make the snooping agent’s buffer size flexible to avoid overflow and handle more data efficiently.
o Instead of resending all packets, only retransmit the ones that are lost or corrupted. This saves time
and bandwidth.
o Spread snooping agents across the network to handle more users and avoid overloading a single
agent.
o Use methods like Explicit Loss Notification (ELN) to tell the difference between wireless errors and
network congestion.
o Coordinate with the MAC layer to detect and fix errors faster.
o Use backup snooping agents to keep things running if the main agent fails.
7. Improve Security:
• Better Performance: Handles more users and data without slowing down.
• No Single Point of Failure: Backup agents ensure the system keeps working.
1. Buffer Overflow: The snooping agent’s buffer may overflow, causing packet loss.
2. Scalability Issues: It becomes inefficient in large networks with many mobile nodes.
4. Limited to Wireless Links: It only addresses wireless errors, not end-to-end issues.
UNIT-5
Power-Aware Computing:
1. Definition:
o Power-aware computing refers to designing systems that optimize energy consumption to improve
efficiency and extend battery life, especially in portable and IoT devices.
2. Key Concepts:
o Energy Efficiency: Designing hardware (e.g., low-power processors) and software (e.g., energy-
efficient algorithms) to minimize power usage.
o Dynamic Power Management: Adjusting power levels based on workload. For example, reducing
CPU speed or turning off unused components when idle.
o Low-Power Modes: Devices enter sleep or standby modes when not in use to save energy.
o Energy Harvesting: Using renewable energy sources like solar, thermal, or kinetic energy to power
devices.
3. Applications:
o Mobile Devices: Extending battery life in smartphones and laptops.
o IoT Devices: Enabling long-lasting sensors and wearable devices.
o Data Centers: Reducing energy consumption in servers and cooling systems.
4. Importance:
o Reduces energy costs and environmental impact.
o Enhances user experience by prolonging device usage.
Context-Aware Computing:
1. Definition:
o Context-aware computing involves systems that adapt their behavior based on the context of the
user or environment, such as location, time, or activity.
2. Key Concepts:
o Context: Information about the user (e.g., location, preferences) or environment (e.g., temperature,
lighting).
o Sensing: Using sensors (e.g., GPS, accelerometer, microphone) to collect context data.
o Adaptation: Changing system behavior based on context. For example, switching to dark mode at
night or adjusting volume in a noisy environment.
o Personalization: Tailoring services to the user’s preferences and needs.
3. Applications:
o Smartphones: Adjusting brightness, volume, or notifications based on user activity or environment.
o Navigation Apps: Suggesting routes based on real-time traffic and user preferences.
o Smart Homes: Automating tasks like turning on lights or adjusting thermostats based on user
presence.
4. Importance:
o Improves user experience by making systems more intuitive and responsive.
o Enhances efficiency by automating tasks based on context.
Comparison:
Aspect Power-Aware Computing Context-Aware Computing
Goal Save energy and extend battery life. Adapt behavior based on user/environment.
Focus Energy efficiency and power management. Sensing, adaptation, and personalization.
Applications Mobile devices, IoT, data centers. Smartphones, smart homes, navigation apps.
SAQS
1) Define GSM
• GSM stands for Global System for Mobile Communications.
• It is a 2G digital cellular standard used for voice calls, SMS, and basic data services.
• GSM uses TDMA (Time Division Multiple Access) to allow multiple users to share the same frequency
channel.