Download 802.11i: WiFi Protected Access

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Introduction
Chapter 1
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
‫دیباچه‬
‫درخت چنار تنومند تنها روی تپه ایستاده بود‪ .‬صدها سال بود که آنجا بود و‬
‫گویی تا ابد نیز قرار بود بماند‪ .‬ریشه هایش همچون پنجه ای آهنین در اعماق‬
‫خاک فرو رفته بود؛ آنچنان که گویی کس ی را یارای برکندن آن نیست‪.‬‬
‫ا‬
‫یک شب صاعقه ای درخت را به دو نیم کرد؛ درخت از درون کامل تهی و‬
‫پوسیده بود‪.‬‬
‫آین راند (اطلس شانه باالانداخت)‬
Uses of Computer Networks
•
•
•
•
Business Applications
Home Applications
Mobile Users
Social Issues
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Business Applications (1)
A network with two clients and one server
The server can also be a local printer
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Business Applications (2)
* The client-server model involves requests and replies
* Business Networks can be joined by VPNs
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Business Applications (3)
•
Setting up a communication medium:
•
•
•
•
•
Email Service
Phone Service: VoIP
Video Conference
Desktop Sharing: Interactive team working
Telemedicine
•
•
Remote patient monitoring
e-commerce
•
Electronic shopping, ticket booking, …
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home Applications (1)
o
o
o
o
o
o
o
o
Gaming
TV, Radio
Photo and Video editing
Music
Internet connection
Online news
Online digital library : ACM, IEEE, …
Ubiquitous computing: Smart homes, smart metering systems, …
o
o
o
a)
Power-line networks
Zigbee networks
RFID technology
Internet of Things (IoT)
Metcalfe’s law: the value of a network is proportional to the
square of the number of users
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home Applications (2)
* In a peer-to-peer system there are no fixed clients and servers.
* BitTorrent is an example
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home Applications (3)




Instant Messaging: sms, mms, …
Multiperson messaging: Twitter, Viber, Telegram, …
Audio & video Sharing: YouTube, Facebook , Instagram, …
Colaborating content creation: Wikipedia

e-commerce:
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Mobile Users
Combinations of wireless networks and mobile computing
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Mobile Users (1)

Smart Phones : 3G, 4G Mobile networks

Global positioning system (GPS) + google map

m-commerce (mobile commerce)

Sensor Networks : traffic monitoring , …

Vehicular networks

Wearable computers : smart watches, …
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Social Issues
•
•
•
•
•
•
•
•
•
•
•
•
Spreading wrong or offensive political or religious views
Censorship
Content pricing or Network neutrality
Digital Millennium Copyright Act
Employee-Employer issues
Content overhearing (e.g. by government)
Profiling users: internet cookies
misleading information
Spam
Electronic viruses
Phishing confidential information (e.g. bank acounts)
e-gambling
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Network Hardware
•
Transmission technology
•
broadcast: shared media e.g. wireless links
•
point-to-point (unicast): multihop, routing
•
Single target
Multicast
Broadcast
Scale
•
•
•
•
•
Personal area networks
Local area networks
Metropolitan area networks
Wide are networks
internetwork (the Internet)
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Personal Area Network
Bluetooth PAN configuration
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Local Area Networks
(a) 802.11 (WiFi)
*Virtual LAN (VLAN)
*Static or Dynamic Medium Access
(b) Switched Ethernet. (802.3)
Centralized
Decentralized
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Home Networks
Requirements
1.
Easy to use devices
2.
Reliable work
3.
Low price
4.
Compatibility
5.
Security
Technologies
a)
Wireless
b)
Wired
c)
Power-line
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Metropolitan Area Networks
A metropolitan area network based on cable TV
* WiMAX (802.16) is another example
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wide Area Networks (1)
WAN that connects three branch offices in Australia
* The transmission lines may be: telephone wires, optical fibers, or
wireless (e.g. Satellite) links
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wide Area Networks (2)
WAN using a virtual private network (VPN).
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Wide Area Networks (3)
WAN using an ISP network.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Network Software
•
Network architechture: multiple layers abstracted from each other
•
Protocol stack: agreement between same layer parties
•
Protocol replacement: must be done without changing the service
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocol Hierarchies (1)
Layer1 peer
Layers, protocols, and interfaces.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocol Hierarchies (2)
The philosopher-translator-secretary architecture
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Protocol Hierarchies (3)
Example information flow supporting virtual
communication in layer 5.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Design issues for the layers
•Reliability:
Error detection
Error correction
Routing
• Addressing
•Internetworking: Packet shaping
•Scalability
•Resource Allocation
•Flow or Congestion Control
•Quality of Service (QoS)
•Security
25
Connection-Oriented Versus
Connectionless Service
Telephone like
Mail like
Six different types of service.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Service Primitives (1)
Six service primitives that provide a simple
connection-oriented service
* Primitives run as system calls on an operating system
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Service Primitives (2)
A simple client-server interaction using
acknowledged datagrams.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
The Relationship of Services to
Protocols
The protocol peers are like objects in a program.
The services are like object functions.
The protocols are like object definitions.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011
Reference Models
•
•
OSI reference model: Valid model from ISO but unused protocols
Open System Interconnection (1983 developed, 1995 revised)
Networked Apps. like HTTP
Data structuring
Multiple sessions on a connection
Establish e2e connection
Routing+ congestion+
Connection+ address
Error+ Framing+ mac
Bit Transmission
TCP/IP Model
Base of ARPANET (Introduced 1974, Standardized 1989)
31
TCP/IP Protocols
32
The preferred reference model
Used in this class
33
Example networks - Internet
a)
Telephone based network
b) proposed distributed system for
ARPANET
34
(Advanced Research Projects Agency)
The original ARPANET design
56 Kbps
IMP :Interface Message Processor
35
TCP/IP developed in 1974
36
NSFNET
* National Science Foundation TCP/IP network that was connected to ARPANET in
the Carnegie-Mellon.
* NSF encouraged MERIT, MCI, and IBM to form a nonprofit corporation, ANS
(Advanced Networks and Services), as the first step along the
37
road to commercialization.
Internet architecture
-
DSLAM (Digital Subscriber Line Access Multiplexer)
-
CMTS (Cable Modem Termination System)
-
POP (Point of Presence)
-
IXPs (Internet eXchange Points)
38
Example networks- Mobile network
1)
First generation: analog voice transmission - AMPS(Advanced
Mobile Phone System)- 1982
2)
Second generation: digital voice and SMS- GSM(Global System for
Mobile communications)- 1991
3)
Third generation: broadband data- UMTS(Universal Mobile
Telecommunications System) + WCDMA(Wideband Code
DivisionMultipleAccess)- 2001
4)
Forth generation: higher bandwidth – WiMAX (802.16) + LTE
(Long Term Evolution)- 2011
39
Cellular network and frequency reuse
40
UMTS 3G architecture
-
RNC(Radio Network Controller)
MSC(Mobile Switching Center)
MGW(Media Gateway)
SGSN(Serving GPRS Support Node)
HSS(Home SubscriberServer)
- GMSC(Gateway Mobile Switching Center)
- PSTN(Public Switched Telephone Network)
41 Node)
- GGSN(Gateway GPRS Support
Mobility and Handover
42
Network example- Wireless LAN
a) WLAN with access point
b) 802.11 in ad hoc mode
*IEEE 802.11 or WiFi
*ISM (Industrial, Scientific, and Medical)band = 902-92843MHz, 2.42.5 GHz, 5.725-5.825 GHz
Multipath fading in WLANs
a)
b)
c)
d)
802.11 : 1-2 Mbps
802.11b : 11 Mbps by spread spectrum
802.11a,g: 54 Mbps by OFDM (Orthogonal Frequency Division Multiplexing)
44
802.11n (2009) : 450 Mbps by using multiple antennas
CSMA (Carrier Sense Multiple Access)
Hidden terminal problem
45
WLAN Security
a)
WEP (Wired Equivalent Privacy)
b)
802.11i: WiFi Protected Access (WPA, WPA2)
46
Network example- RFID
UHF: 902-928 MHz
Passive
Radio Frequency IDentification (RFID)
HF : 13.56 MHz
Active
47
Network example- Sensor Networks
Multihop topology of a sensor network
48
Network standardization
a)
ITU (International Telecommunication Union): 200 governments
–
ITU-T: telecommunications
–
ITU-R: radio communications
–
ITU-D: developement
b)
ISO (International Standards Organization): 157 members e.g. ANSI (U.S.), BSI
(Great Britain),…
–
CD (Committee Draft) DIS (Draft International Standard) IS
(International Standard)
c)
NIST (National Institute of Standards and Technology)
d)
IEEE (Institute of Electrical and Electronics Engineers)
49
IEEE 802 standards
50
Internet standardization
1) IAB (Internet Activities Board)
IRTF (Internet Research
Task Force)
IETF (Internet Engineering
Task Force)
www.ietf.org
RFCs (Request For Comments)
2) World Wide Web Consortium (W3C): 300 member
51
Metrics for network speed
Metrics for memory size
Kilo = 2e10 = 1024
Mega = 2e20 = 1,048,576
Giga = 2e30 = 1,073,741,824
Tera = 2e40 = 1,099,511,627,776
52
Home work assignment
Student
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
Assigned problems
20
35
24
36
9
26
11
25
26
3
10
9
25
32
13
29
25
1
23
15
34
1
18
16
18
29
12
30
18
2
7
27
18
6
13
23
8
28
9
34
10
29
7
11
4
22
26
21
16
24
24
26
24
35
8
27
9
5
23
17
17
25
29
13
25
16
32
31
10
23
22
21
33
10
12
5
35
24
18
24
21
24
21
27
20
37
9
4
5
3
15
17
14
29
24
29
35
36
8
6
26
4
20
20
32
18
15
25
28
20
13
6
22
10
2
28
9
17
26
14
28
15
26
27
17
1
13
16
11
8
31
16
33
15
29
15
30
28
14
8
30
36
13
25
17
31
29
7
32
37
20
33
22
6
8
16
28
31
30
12
20
4
5
6
26
19
8
19
6
3
32
21
35
26
22
31
33
37
1
33
23
37
20
18
30
9
19
34
22
32
28
22
10
25
4
24
25
28
33
37
29
22
35
22
1
5
32
18
32
8
21
24
2
23
14
2
19
8
5
8
6
7
2
24
11
20
26
19
20
17
5
19
32
33
11
8
21
24
16
8
36
4
4
6
7
23
22
2
35
27
28
3
32
35
37
32
30
19
7
15
5
2
35
12
11
13
18
24
1
32
21
32
13
17
3
7
25
13
34
5
37
20
27
37
11
16
18
29
31
4
7
14
3
20
13
7
8
34
25
18
34
4
28
28
21
7
23
12
5
8
34
3
9
2
17
1
34
8
4
12
17
4
37
13
12
3
12
2
19
29
24
4
3
29
34
20
5
31
13
11
28
1
2
25
23
20
27
27
29
11
Related documents