Table of Contents

Answer -1.

Answer -2.

Answer -3.

Answer -4

Answer -5.

Answer -6.


Total Quality Management - Answer 1

The given scenario of SCTP transmission shows that "TSN 149" is being lost during transmission process. So,

  • When the packet is being lost during the transmission then last acknowledgement will be resend.
  • But when double TSN are contained in the packet, in this case, second packet will be acknowledged.

So, ACK 148 and ACK 152 will be maintained in packet as shown below:

Total Quality Management - Answer 2

The voice over LTE which is commonly called VoLTE is commonly used to deliver the voice services by maintaining the data flow through the use of LTE channels. The MSSN (multimedia sub system network) is commonly used with IP for defining the followed processes and services of VoLTE. Any type of communication like file communication, video communication or voice communication can be maintained with VoLTE on real time bases. The legacy of CWN is mainly maintained for defining the communication in this service. Network operators can take the following advantages from this service:

  • The use of CSN (circuit switched network) in this service reduces the dependency on legacy network. The infrastructure cost for defining the processes is also reduced for operator benefits.
  • The data and voice capabilities of this service are very high. The network operators can provide 4G or 5 G services with it.
  • The interference is minimum among communication. The voice quality is also improved with this service.

The working process followed in VoLTE is pointed below:

  • The cellular devices and maintained infrastructure of antenna will maintain all functionality.
  • The calling facility to maintain communication is maintained by mobile network.
  • The MSSN is commonly used with IP for defining the followed processes and services of VoLTE.
  • All types of communications are maintained with this service from the developed infrastructure.

The points showing the relationship "radio access network (RAN)" and "core network (CN)" are pointed under:

  • The processes defined in CN maintains RAN as its important part.
  • The processes of HUPA and HSPA are not supported by RAN but because of high data rate CN maintains them.

When IP network is being followed in place of GPRS approach, then, following benefits can be obtained:

  • When the access time is limited, then, higher data rate can be maintained.
  • The developed infrastructure can maintain both internet and voice communication services.

Total Quality Management - Answer 3

The routing on user demand is mainly maintained by the AODV protocol. The required route to reach the destination node is being searched by this protocol in the routing table. As any routing table is not provided, so, following steps will be followed by this AODV protocol for routing data packet to node B from the node Q:

Step 1:

  1. The Q node will send the RREQ to node P.

Step 2:

  1. The RREQ will be send by P node to N node and I node.
  2. N node will send the same request to J, E and D nodes.
  3. I node will send the same request to F and D node.

Step 3:

  1. J node will send the same request to E and C node.
  2. K node will send request to K, L, M and O nodes.
  3. E node will send request to A, C,D and F nodes.
  4. D node will send request to A, C , B and F nodes. .

Step 4:

  1. The route will be saved by B node.
  2. Now B node will send packet to Q node by following route: B -> F-> I -> R -> P -> Q.


  1. As R node is deleted, so, the route for reaching from B to Q node will also be changed.
  2. Now B node will send packet to Q node by following route: B->D-> E-> J-> L-> P -> Q.

Total Quality Management - Answer 4

The provided scenario is showing the "Berkeley Snoop Protocol" is being used for maintaining the required communication among the base station BS and mobile host MH. The packet sequence of P1 to P5 is being transferred by the base station BS. The provided scenario also shows that P2 and P3 packets are being dropped but packet number 4 is being reached to mobile host. In this case, duplicate acknowledgement is being send for the missing packets. In the same time, packet 5 is also transmitted by the BS base station. So, following sequence will be maintained for transmitting all packets from BS to MH:

  • The BS will send all the packets from P1 to P5 to its MH.
  • The packet P1 will be received by MH and its acknowledgement will be provided to BS. The provided scenario also shows that P2 and P3 packets are being dropped, so duplicate acknowledgement for P1 will be provided.
  • In the same time, packet 5 is also transmitted by the BS base station, so, it will also be acknowledged by mobile host MH.
  • As duplicate acknowledgement is being received for P1, so, packets P2 and P3 will again be transmitted and acknowledgement for packet 4 and packet 5 will be ignored.
  • The packets 2, 3 will be retransmitted by BS.
  • The packet 5 will be transmitted by BS.
  • All acknowledgement are received and successful packet transmission is completed.

When DUPACK is being received by BS, then, handling of this situation can be done in following manner:

  • All packets from P1 to P5 will be transmitted.
  • Packet 1 is received, so, it will be acknowledgement.
  • P2 and P3 packets are being dropped, so duplicate acknowledgement for P1 will be provided.
  • Delivery of packet 5 is done and is received.
  • The packets 2, 3, 4 and 5 will be retransmitted by BS and all received acknowledgement will be ignored.
  • Acknowledgement for packet 2, 3, 4 and 5 will be provide to BS. If any packet is still missing and acknowledgement is not yet received, then, that packet will be retransmitted for the followed sequence.

The points showing BS reactions when it receives any DUPACK are supplied below:

  • When any fixed host is being providing the DUPACK to the BS and this packet is not present in the cache, then, it will require a retransmission.
  • The record of all received DUPACK will be handled by the TCP.
  • On bases of set priority, the retransmission will again be performed.
  • Based on the maintained through put, The DUPACK will be retransmitted.

Yes, it is very important that DUPACK retransmitted and its supporting reasons are:

  • So that the original sender can retrieve the full message.
  • To avoid any type of packet loss.
  • To maintain sequence of transferred data packets.
  • The track of DUPACK can also be maintained with it. By doing so, the lost packets can be retransmitted and full packet sequence is being received on the base station.

Total Quality Management - Answer 5

The dependency on sender is being maintained by TCP so that lost packets can be again retransmitted. The packets which bare being received by the receiver, all of them are being acknowledged. The collection of all the received acknowledgements will be maintained. Before the time to transmit the required packets is completed and acknowledgement is not being received, then, retransmission is same time is again done by the sender. The RTO time of waiting is defined by the base station, then host will perform transmission of packets again by following the defined sequences of processes. But in case of time up for the packet transmission is occurred, then, partial ACK will be provided to the base station from the sender side. When cached packets are received on the BS, then, these packets will be provided to host station in the defined RTO time and PACK will be provided. When duplicate acknowledgement is forwarded to the host station then TCP is being required for performing the retransmission of lost packets. The TCP will trigger the retransmission of duplicate packets for which the DUPACK is being received. The duplicate ACK is being redirected on the receiver cache by the TCP. 

The packet loss is mainly identified by the maintained sequence numbers for data packets, so that, the data replication and rearrangement can be done. The wireless link is being used by the base station for maintaining the transportation connections. The sequence numbers will also help in making adjustments' for the packets, duplicate packets are removed, lost packets can be retransmitted and maintaining control on the transmitted packets. The consistent states of the transferred packets with DUPACK can be maintained with sequence numbers. The excessive congestions in retransmission of TCP can be maintained with sequence number. The quick retransmission will also be possible with maintaining the sequence numbers.

Total Quality Management - Answer 6

The cell C1, C2 and C3 are being placed on the common road. When, the call from first C1 cell is in progress, then, the identical channel will be show busy state for remaining C2 and C3 cell. The busy state will be shown to remaining cells C2 and C3. The "Handover" and "Handoff " concepts are mainly used to handle the provided condition. These "Handover" and "Handoff " concepts will help in maintaining the movement from C1 to C2. All the sessions and calls for defining the movement from C1 to C2 or C3 will be defined by the handover process. The change in session will also be maintained by it. As the call from C1 is already in progress then this call will be handover to C2 and any termination of call is not occurred. The C1 will receive the signals from C2 base station will carry out this movement with handoff for handling this occurred condition.

When C1 is not having the free stations and two calls call 1 and call 2 are maintained by C1 from C3, then, movement to C2 will be carried out. The handover process can easily manage this condition. The new call is being connected with C3and C2 will maintain both the calls from C1. The channel of C3 will be used by C2. Now a different channel will be developed so that any collision among the calls can be avoided.

The handoff procedure followed for maintaining progress of C1 through C2 and C3 is pointed below:

  • The new channel will be borrowed and that cell will be locked.
  • This newly booked channel will be prohibited for C2 and C3.
  • The acceptance test for the mobile network will be carried out.
  • The movement alert will be provided to C1.
  • the C1 will accept the new channel and maintains the ongoing call with C2 and C3.

7. References for Mathematical Model of Optimal Distribution

Kosenko, V. V. (2017). Mathematical model of optimal distribution of applied problems of safety-critical systemsover the nodes of the information and telecommunication network.

Azad, M. A., & Bag, S. (2017, April). Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network. In Proceedings of the Symposium on Applied Computing (pp. 1711-1717).

Damola, A. (2016). U.S. Patent No. 9,426,690. Washington, DC: U.S. Patent and Trademark Office.

Mozhaiev, M., Kuchuk, N., & Usatenko, M. (2019). The method of jitter determining in the telecommunication network of a computer system on a special software platform. Innovative technologies and scientific solutions for industries, (4 (10)), 134-140.

Mostovich, D., Fabrikantov, P., Vladyko, A., & Buinevich, M. (2017, February). High-level vulnerabilities of software-defined networking in the context of telecommunication network evolution. In 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 184-186). IEEE.

Nevzorova, Y. S., Аrous, K. М., & Salakh, М. Т. R. (2016). Method for hierarchical coordinated multicast routing in a telecommunication network. Telecommunications and Radio Engineering, 75(13).

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Management Assignment Help

Get It Done! Today

Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
Upload your assignment
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts


  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

  • Total

  • Let's Start

Browse across 1 Million Assignment Samples for Free

Explore MASS
Order Now

My Assignment Services- Whatsapp Tap to ChatGet instant assignment help