IT 8602 Mobile Communication Key April-May 2025
IT 8602 Mobile Communication Key April-May 2025
9. What are the mechanisms of the Transmission Control Protocol (TCP) that influence the
efficiency of TCP in a mobile environment?
Transmission Control Protocol (TCP) plays a vital role in reliable data communication, but
its efficiency can be impacted in mobile environments due to issues like network
variability and limited resources. The key mechanisms that influence its performance in
mobile settings are Slow Start and Congestion Control, Retransmission Timeout (RTO)
Adaptation, Fast Retransmit and Fast Recovery, Selective Acknowledgment (SACK),
Explicit Congestion Notification (ECN), TCP Variants for Mobile Networks.
Part – B
11a. Explain in detail the random assignment schemes that are used in CDMA
protocol. (13)
Random Assignment Schemes – ALOHA, Slotted ALOHA, CSMA, CSMA/CD, CSMA/CA
1. ALOHA
➢ Simple communication scheme developed at the university of Hawaii. Basic form is
called pure ALOHA scheme
➢ If a node has data to send, it begins to transmit. It does not check whether the channel
is busy before transmitting. If the frame successfully reaches the destination, the next
frame is sent
➢ If frame fails to be received, it is sent again. This scheme works acceptably when the
chances of contention are small. Collisions can become unacceptably high if the
number of contenders for transmission is high.
2. Slotted ALOHA
➢ Chances of collisions are attempted to be reduced by enforcing restrictions on
sender’s transmitting time. Time is divided into equal-sized slots in which a packet can
be sent. Size of the pkt is restricted.
➢ A node wanting to send a pkt, can start to do so only at the beginning of a slot
➢ Employs beacon signals that are sent at precise intervals that mark the beginning of a
slot, at which point the nodes having data to send can start to transmit. All senders
have to be synchronized and transmission can only start at the beginning of a time
slot.
➢ Does not work very well if the number of stations contending to send data is high.
To overcome such collisions, in collision detection scheme, all nodes were forced to wait
for a random amount of time before sensing the medium again. If the medium is sensed
to be busy, a node waiting to transmit waits for a further random amount of time and so
on. Thus, the chance of 2 nodes starting to transmit at the same time would be greatly
reduced.
5. CSMA/CA - Career Sense Multiple Access with Collision Avoidance
➢ In this scheme, once a sender senses the medium to be free, transmits an RTS (Ready
To Send) packet to receiver before the actual data transmission. On receiving this, the
receiver sends a CTS (Clear To Send) packet, and the actual data transfer commences
only after that.
➢ When other nodes sharing the medium sense the CTS pkt, they refrain from
transmitting until the transmission from the sending node is complete. Every node
that hears the RTS and CTS messages defer their transmission during the specified
time period in order to avoid a collision.
The CSMA/CA scheme solves Hidden Terminal and Exposed Terminal problem:
➢ Before the start of its transmission, sender A sends a RTS. B receives the RTS that
contains the sender’s name and receiver’s name, length of the future transmission.
➢ In response to RTS, B sends CTS as acknowledgement. CTS contains the names of
sender and receiver and the length of the planned transmission. This CTS is heard by
C and the medium is reserved for use by A for the duration of the transmission.
➢ On receipt of CTS from B, C refrains from transmitting anything for the time indicated
in the CTS. Thus, collision cannot occur at B during data transmission, and the hidden
terminal problem is solved.
➢ On the other hand, if C wants to transmit to any other station D, it can freely do so
without waiting for the medium to become free. It learns from CTS that B is
communicating with some A and not to itself. Thus, the exposed terminal problem
also gets solved.
➢ If a packet (RTS / CTS) transmitted by a node is lost, the node uses the binary
exponential back-off (BEB) algorithm to back off a random interval of time before
retrying. The binary exponential back-off mechanism used in MACA might lead to
starvation of certain flows sometimes.
➢ Another problem of MACA is clearly the overheads associated with the RTS and CTS
transmissions – for short and time-critical data packets, this is not negligible.
6. Polling
Where one station is to be heard by all others (e.g., the base station of a mobile phone
network or any other dedicated station), polling schemes can be applied. Polling is a
strictly centralized scheme with one master station and several slave stations.
The master can poll the slaves according to many schemes: round robin or randomly or
according to reservations etc. The master could also establish a list of stations wishing to
transmit during a contention phase. After this phase, the station (master) polls each
station on the list.
11 b. Categorize and correlate the differences between TDMA< FDMA and CDMA.
Authentication
➢ Before a subscriber can use any service from the GSM network, he or she must be
authenticated. Authentication is based on the SIM, which stores the individual
authentication key Ki, the user identification IMSI, and the algorithm used for
authentication A3.
➢ Authentication uses a challenge-response method: the access control AC generates a
random number RAND as challenge, and the SIM within the MS answers with SRES
(signed response) as response.
➢ The AuC performs the basic generation of random values RAND, signed responses SRES,
and cipher keys Kc for each IMSI, and then forwards this information to the HLR. The
current VLR requests the appropriate values for RAND, SRES, and Kc from the HLR.
➢ For authentication, the VLR sends the random value RAND to the SIM. Both sides, network
and subscriber module, pass these values to the authentication algorithm A3 to generate
SRES.
➢ The MS sends back the SRES generated by the SIM; the VLR can now compare both values.
If they are the same, the VLR accepts the subscriber, otherwise the subscriber is rejected.
Encryption
• To ensure privacy, all messages containing user-related information are encrypted in
GSM over the air interface. After authentication, MS and BSS can start using encryption
by applying the cipher key Kc.
• Kc is generated using the individual key Ki and a random value by applying the algorithm
A8. The SIM in the MS and the network both calculate the same Kc based on the random
value RAND. The key Kc itself is not transmitted over the air interface.
➢ MS and BTS can now encrypt and decrypt data using the algorithm A5 and the cipher key
Kc. The figure shows that Kc should be a 64-bit key – which is not very strong, but can
offer protection against simple eavesdropping.
12 a(ii) How a GSM network provides security to the customers?
GSM offers several security services using confidential information stored in the AuC and
in the individual SIM. The SIM stores personal, secret data and is protected with a PIN
against unauthorized use. The security services offered by GSM are explained below:
➢ Access control and authentication: The first step includes the authentication of a valid
user for the SIM. The user needs a secret PIN to access the SIM. The next step is the
subscriber authentication. This step is based on a challenge-response scheme.
➢ Confidentiality: All user-related data is encrypted. After authentication, BTS and MS apply
encryption to voice, data, and signaling. This confidentiality exists only between MS and
BTS, but it does not exist end-to-end or within the whole fixed GSM/telephone network.
➢ Anonymity: To provide user anonymity, all data is encrypted before transmission, and
user identifiers (which would reveal an identity) are not used over the air. Instead, GSM
transmits a temporary identifier (TMSI), which is newly assigned by the VLR after each
location update. Additionally, the VLR can change the TMSI at any time.
13 a. Explain Bluetooth architecture and its working principles.
• Bluetooth operates in the 2.4 GHz ISM band. Bluetooth operates on 79 channels in the
2.4 GHz band with 1 MHz carrier spacing. Each device performs frequency hopping with
1,600 hops/s in a pseudo random fashion. Bluetooth applies FHSS for interference
mitigation.
• A Bluetooth piconet is a collection of Bluetooth devices which are synchronized to the
same hopping sequence. The below figure shows a collection of devices with different
roles.
• One device in the piconet can act as master (M), all other devices connected to the master
must act as slaves (S). The master determines the hopping pattern in the piconet and the
slaves have to synchronize to this pattern. Each piconet has a unique hopping pattern. If
a device wants to participate it has to synchronize to this pattern.
• Two additional types of devices are shown: parked devices (P) cannot actively participate
in the piconet (i.e., they do not have a connection), but are known and can be reactivated
within some milliseconds. Devices in stand-by (SB) do not participate in the piconet.
• Each piconet has exactly one master and up to seven simultaneous slaves. More than 200
devices can be parked. The reason for the upper limit of eight active devices, is the 3-bit
address used in Bluetooth.
• If a parked device wants to communicate and there are already seven active slaves, one
slave has to switch to park mode to allow the parked device to switch to active mode.
• The below figure gives an overview of the formation of a piconet. All active devices use
the same hopping sequence for getting synchronized.
• The first step involves a master sending its clock and device ID. All Bluetooth devices have
the same networking capabilities, i.e., they can be master or slave.
• There is no distinction between terminals and base stations, any two or more devices can
form a piconet. The unit establishing the piconet automatically becomes the master, all
other devices will be slaves.
• The hopping pattern is determined by the device ID, a 48-bit worldwide unique identifier.
The phase in the hopping pattern is determined by the master’s clock.
• After adjusting its internal clock according to the master, a device may participate in the
piconet. All active devices are assigned a 3-bit active member address (AMA). All parked
devices use an 8-bit parked member address (PMA). Devices in stand-by do not need an
address.
• All users within one piconet have the same hopping sequence and share the same 1 MHz
channel. As more users join the piconet, the throughput per user drops quickly. This led
to the idea of forming groups of piconets called scatternet. Only those units that really
must exchange data share the same piconet, so that many piconets with overlapping
coverage can exist simultaneously.
13 b. Compare Bluetooth and WiFi in terms of working, range, speed and applications.
Bluetooth and WiFi are both wireless communication technologies, but they serve
different purposes and have distinct characteristics. Here’s a comparison based on
various factors:
Bluetooth is best for short-range, low-power connections, such as pairing devices like
headphones, speakers, and smartwatches.
WiFi is designed for high-speed internet access and works well for activities like
streaming, gaming, and large data transfers.
WiFi offers higher bandwidth for more demanding applications, including home and
office networking.
14a. How would you analyze the challenges and advantages of Mobile IP in ensuring seamless
mobility while maintaining IP connectivity?
IP packet delivery
• The below figure illustrates packet delivery to and from the MN.
CN to MN:
1. A correspondent node CN wants to send an IP packet to the MN. CN does not need to
know anything about the MN’s current location and sends the packet as usual to the IP
address of MN. The CN will be source and MN will be the destination address.
The internet routes the packet to the router responsible for the home network of MN
using the standard routing mechanisms of the internet.
2. The HA now intercepts the packet, knowing that MN is currently not in its home network.
The packet is not forwarded into the subnet as usual, but encapsulated and tunneled to
the COA.
A new header is put in front of the old IP header showing the COA as new destination and
HA as source of the encapsulated packet
3. The foreign agent now decapsulates the packet, i.e., removes the additional header, and
forwards the original packet with CN as source and MN as destination to the MN. The
MN receives the packet with the same sender and receiver address as it would have done
in the home network.
MN to CN:
4. The MN sends the packet as usual with its own fixed IP address as source and CN’s address
as destination. The router with the FA acts as default router and forwards the packet in
the same way as it would do for any other node in the foreign network.
Agent discovery
• One initial problem of an MN after moving is how to find a foreign agent. The MN needs
to know that it has moved. Mobile IP provides two solutions: agent advertisement and
agent solicitation.
Agent advertisement
• The foreign agents and home agents advertise their presence periodically using special
agent advertisement messages. These advertisement messages (ICMP packets) can be
seen as a beacon broadcast into the subnet.
• The agent advertisement packet with the extension for mobility is shown in figure. The
upper part represents the ICMP packet while the lower part is the extension needed for
mobility.
• Mobile nodes must be reached with the appropriate link layer address. The TTL field of
the IP packet is set to 1 for all advertisements to avoid forwarding them.
• The IP destination address according to standard router advertisements can be either set
to [Link], which is the multicast address for all systems on a link, or to the broadcast
address [Link].
14 b (i). Illustrate DSR routing in detail.
Dynamic Source Routing
• When only some user data has to be transmitted in DSDV, the nodes exchange routing
information to keep track of the topology. Routes between all the nodes are always
maintained, although there may currently be no data exchange at all. This causes
unnecessary traffic and prevents nodes from saving battery power.
Dynamic source routing (DSR) divides the task of routing into two separate problems:
Route discovery: A node only tries to discover a route to a destination only if it has to send
something to this destination and there is currently no known route.
➢ Route maintenance: If a node is continuously sending packets via a route, it has to make
sure that the route is held upright. As soon as a node detects problems with the current
route, it has to find an alternative.
Dynamic source routing eliminates all periodic routing updates and works as follows:
• If a node needs to discover a route, it broadcasts a route request with a unique identifier
and the destination address as parameters. Any node that receives a route request does
the following:
➢ If the node has already received the request (which is identified using the unique
identifier), it drops the request packet.
➢ If the node recognizes its own address as the destination, the request has reached its
target.
➢ Otherwise, the node appends its own address to a list of traversed hops in the packet and
broadcasts this updated route request.
➢ Using this approach, the route request collects a list of addresses representing a possible
path on its way towards the destination. As soon as the request reaches the destination,
it can return the request packet containing the list to the initiator in reverse order.
➢ One condition for this is that the links work bi-directionally. If this is not the case, and the
destination node does not currently maintain a route back to the initiator of the request,
it has to start a route discovery by itself.
➢ The destination may receive several lists containing different paths from the initiator. It
could return the best path, the first path, or several paths to offer the initiator a choice.
14 b(ii) Show the working of DSDV routing in detail.
Destination Sequence Distance Vector (DSDV)
• DSDV routing is an enhancement to distance vector routing for ad-hoc networks. Distance
vector routing is used as routing information protocol (RIP) in wired networks. It performs
extremely poorly with certain network changes due to the count-to-infinity problem.
• The strategies to avoid this problem which are used in fixed networks do not help in the
case of wireless ad-hoc networks, due to the rapidly changing topology. This might create
loops or unreachable regions within the network. DSDV now adds two things to the
distance vector algorithm:
• Sequence numbers: Each routing advertisement comes with a sequence number. Within
ad-hoc networks, advertisements may propagate along many paths. Sequence numbers
help to apply the advertisements in correct order. This avoids the loops.
• Damping: Advertisements containing changes in the topology currently stored, are not
forwarded immediately. A node waits without forwarding as these changes may be
probably unstable. Waiting time depends on the time between the first and the best
announcement of a path to a certain destination.
• The routing table for N1 in figure would be as shown in the table below:
• For each node N1 stores the next hop toward this node, the metric (number of hops), the
sequence number of the last advertisement for this node, and the time at which the path
has been installed first. The table contains flags and a settling time helping to decide when
the path can be assumed stable.
• Router advertisements from N1 now contain data from the first, third, and fourth column:
destination address, metric, and sequence number. Besides being loop-free at all times,
DSDV has low memory requirements and a quick convergence via triggered updates.
15 a. Analyze the problems of HTTP van WSP solve? Why are these solutions especially needed
in wireless mobile environments?
• The wireless session protocol (WSP) has been designed to operate on top of the
datagram service WDP or the transaction service WTP. For both types, security can be
inserted using the WTLS security layer if required.
• WSP provides a shared state between a client and a server to optimize content transfer.
WSP tries to replace the stateless HTTP protocol. Client users can continue to work from
where they left the browser or when the network was interrupted, or users can get their
customized environment every time they start the browser.
• Content providers can customize their pages to clients’ needs and do not have to
retransmit the same pages over and over again. WSP offers the following general features
needed for content exchange between cooperating clients and servers:
1. Session management: WSP introduces sessions that can be established from a client to
a server and may be long lived. Sessions can also be released in an orderly manner. The
capabilities of suspending and resuming a session are important to mobile applications.
Session lifetime is independent of transport connection lifetime or continuous operation
of a bearer network.
2. Capability negotiation: Clients and servers can agree upon a common level of protocol
functionality during session establishment. Example parameters to negotiate are
maximum client SDU size, maximum outstanding requests, protocol options, and server
SDU size.
3. Content encoding: WSP also defines the efficient binary encoding for the content it
transfers. WSP offers content typing and composite objects.
• While WSP is a general-purpose session protocol, WAP has specified the wireless session
protocol/browsing (WSP/B) which comprises protocols and services most suited for
browsing-type applications.
• In addition to the general features of WSP, WSP/B offers the following features adapted
to web browsing:
1. HTTP/1.1 functionality: WSP/B supports the functions HTTP/1.1 offers, such as extensible
request/reply methods, composite objects, and content type negotiation. WSP/B is a
binary form of HTTP/1.1.
HTTP/1.1 content headers are used to define content type, character set encoding,
languages etc., but binary encodings are defined for well-known headers to reduce
protocol overheads.
2. Exchange of session headers: Client and server can exchange request/reply headers that
remain constant over the lifetime of the session. These headers may include content
types, character sets, languages, device capabilities, and other static parameters. WSP/B
will not interpret header information but passes all headers directly to service users.
3. Push and pull data transfer: Pulling data from a server is the traditional mechanism of
the web. This is also supported by WSP/B using the request/response mechanism from
HTTP/1.1.
Additionally, WSP/B supports three push mechanisms for data transfer: a confirmed data
push within an existing session context, a non-confirmed data push within an existing
session context, and a non- confirmed data push without an existing session context.
4. Asynchronous requests: Optionally, WSP/B supports a client that can send multiple
requests to a server simultaneously.
15b. Analyze which WTP class reflects the typical web access best? How is unnecessary
overhead avoided when using WSP on top of this class of web browsing?
WTP Class 2
• WTP class 2 transaction service provides the classic reliable request/response transaction
known from many client/server scenarios. Depending on user requirements, many
different scenarios are possible for initiator/responder interaction.
• The below figure shows the basic transaction of class 2 without-user acknowledgement.
Here, a user on the initiator’s side requests the service and the WTP entity sends the
invoke PDU to the responder.
• The WTP entity on the responder’s side indicates the request with the [Link]
primitive to a user. The responder now waits for the processing of the request, the user
on the responder’s side can finally give the result UD* to the WTP entity on the responder
side using [Link].
• The result PDU can now be sent back to the initiator, which implicitly acknowledges the
invoke PDU. The initiator can indicate the successful transmission of the invoke message
and the result with the two service primitives [Link] and [Link].
• A user may respond to this result with [Link]. An acknowledgement PDU is then
generated which finally triggers the [Link] primitive on the responder’s side. This
example clearly shows the combination of two reliable services (TR-Invoke and TR-Result)
with an efficient data transmission/acknowledgement.
• The wireless session protocol (WSP) has been designed to operate on top of the
datagram service WDP or the transaction service WTP. For both types, security can be
inserted using the WTLS security layer if required.
• WSP provides a shared state between a client and a server to optimize content transfer.
WSP tries to replace the stateless HTTP protocol. Client users can continue to work from
where they left the browser or when the network was interrupted, or users can get their
customized environment every time they start the browser.
Content providers can customize their pages to clients’ needs and do not have to
retransmit the same pages over and over again.
Part C
16a. Optimize the resource allocation using SDMA, TDMA, FDMA and CDMA for a mobile
network. Assume the following conditions:
The network has 5 users, each with different data rate requirements:
User 1: 2 MBPS
User 2: 4 MBPS
User 3: 6 MBPS
User 4: 8 MBPS
User 5: 1 MBPS
The total available bandwidth is 100 MHz, and each user requires different amounts of
bandwidth and time to transmit.
Assumptions (for simplicity):
1. Shannon Capacity approximation is not strictly applied — allocations are proportional.
2. Each access technique is used independently for comparative optimization.
3. Spectral efficiency is assumed to be 1 bps/Hz (i.e., data rate = bandwidth).
4. Time is normalized to 1 second per scheduling unit (for TDMA).
5. No overlap in resource domains (FDMA = frequency orthogonal, TDMA = time orthogonal,
etc.)
1. FDMA (Frequency Division Multiple Access)
Each user is allocated a portion of the 100 MHz frequency band proportional to their data rate.
Bandwidth per user (assuming 1 bps/Hz):
• User 1: 2 MHz
• User 2: 4 MHz
• User 3: 6 MHz
• User 4: 8 MHz
• User 5: 1 MHz
Total = 21 MHz used, remaining 79 MHz unused (can be reallocated or considered guard
bands).
Advantage: Simple, low interference.
Disadvantage: Inefficient spectrum usage.
U1 2 Mbps 9.52%
U2 4 Mbps 19.05%
U3 6 Mbps 28.57%
U4 8 Mbps 38.10%
U5 1 Mbps 4.76%
Highly efficient, but depends on spatial separation and antenna technology (like MIMO).
Maximizes reuse if physical separation is feasible.
All users get the full 100 MHz bandwidth due to ideal spatial reuse.
4. CDMA (Code Division Multiple Access)
All users transmit simultaneously over the full 100 MHz, distinguished by unique spreading
codes.
Assuming equal spreading gain, user bandwidth needs to be proportional to rate:
• Assign spreading codes such that user data rate is supported over full spectrum.
• With 100 MHz and 21 Mbps, each bit needs ~4.76 MHz (on average).
• So, spreading factor (SF) = bandwidth/data rate.
U1 2 Mbps 50
U2 4 Mbps 25
U3 6 Mbps 16.67
U4 8 Mbps 12.5
U5 1 Mbps 100
All users share the same spectrum simultaneously.
Needs good power control and synchronization.
Can degrade as users increase (code collisions, noise rise).
Users share the full spectrum, with bandwidth effectively allocated based on spreading gain and
data rate.
16b. Evaluate the impact of mobility on the GSM, GPRS, and UMTS networks.
Mobility has a significant impact on mobile networks like GSM, GPRS, and UMTS. As users move
across cell boundaries, the network must ensure service continuity, maintain QoS, and efficiently
manage resources. Below is a detailed evaluation of mobility's impact on each technology:
1. GSM (Global System for Mobile Communications)
Low-speed users
GSM handles well — predictable handovers and minimal call drops.
(pedestrians)
High-speed users More frequent handovers, increased signalling load, higher risk of
(vehicles, trains) call drops.
Challenges:
• Hard handover delay affects call quality.
• Limited handover intelligence (no soft handovers like in CDMA/UMTS).
2. GPRS (General Packet Radio Service)
Mobility in GPRS:
GPRS adds packet-switched data on top of GSM.
• Maintains two location registers: Routing Area (RA) and Location Area (LA).
• Mobility handled via Routing Area Updates for packet data.
Impact of Mobility:
Stationary/slow
Stable data session continuity, good performance.
movement
Moderate movement Acceptable handover and session persistence (e.g., web browsing).
Challenges:
• Session interruption during cell reselection.
• No real-time QoS — latency-sensitive apps (e.g., VoIP) suffer under mobility.
3. UMTS (Universal Mobile Telecommunications System)
Mobility Features:
UMTS is a 3G network with integrated circuit-switched and packet-switched domains.
• Supports soft and softer handovers using WCDMA (multiple base stations maintain the
connection).
• Includes RNC (Radio Network Controller) to manage mobility efficiently.
Impact of Mobility:
Mobility
Impact
Scenario
High-speed More complex, but better managed than GSM/GPRS due to advanced
trains handover techniques.
Advantages:
• Soft handover improves call reliability.
• Better QoS control for data and voice under mobility.
• Fast cell reselection for packet services.
Summary Comparison
Designed for Voice Data over GSM Integrated voice and data
High-speed mobility Call drops, signal Session drop, Handled well with soft
impact loss delays handovers
Conclusion
• GSM: Handles mobility well for voice at low to moderate speeds but struggles at high
speeds.
• GPRS: Adds basic data mobility but is not well-suited for real-time or high-mobility
environments.
• UMTS: Offers the best support for mobility, especially with high-speed users and data-
intensive applications.