* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download An Overview of Broadband Over Power Line
Survey
Document related concepts
Quality of service wikipedia , lookup
Computer network wikipedia , lookup
Telecommunications in Russia wikipedia , lookup
Windows Vista networking technologies wikipedia , lookup
Telecommunications engineering wikipedia , lookup
Point-to-Point Protocol over Ethernet wikipedia , lookup
Telecommunication wikipedia , lookup
Wireless security wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Transcript
Home Network Technologies 家庭網路相關網路技術 Home Networking Technology Computer Home Network Internet Broadband Access Technology ISP TV Broadband Access Technologies • • • • • • Digital Subscriber Line (DSL) Cable Modem Broadband Over Power Line (BOPL) Fiber-to-the-Home (FTTH) IEEE 802.16 (WiMax) GPRS; 3.5G Outlines • Broadband Over Power Line • Digital Subscriber Line (DSL) Technology • Cable Modem Broadband Over Power Line (BOPL) • Use existing electrical lines to provide the medium for a high speed communications network • Superimposing voice or data signals onto the line carrier signal using OFDM • Two categories – In-house – access In-House BPL • connecting machines within a building • HomePlug: an alliance for in-house BPL Access BPL • Delivers the last mile of broadband to the home Access BPL Architecture Coupler Internet VoIP Backhaul Backhaul Point Coupler Wireless link Bridge Medium-voltage lines Low-voltage lines Coupler Coupler Bridge Backhaul Point Advantages of BPL • Power lines are our most ubiquitous infrastructure • Lower cost of deployment – Existing wires Main Concerns • Radio Frequency Interference (RFI) to licensed service • power lines are inherently a very noisy environment – Every time a device turns on or off, it introduces a pop or click into the line. – Energy-saving devices often introduce noisy harmonics into the line Digital Subscriber Line (DSL) Technology • The key in DSL technology is modulation, a process in which one signal modifies a properties of another. • Hardware: DSL requires modems and splitters for endusers; carriers use DSLAMs (digital subscriber line access multiplexers) • Differences between xDSL technologies: speed, operating distance, applications, ratio between up and downstream • Different approaches: ATM-based ADSL, ISDN DSL. • The important thing is what is running over xDSL... xDSL - Digital Subscriber Line Technology ADSL: Asymmetric Digital Subscriber Line • twisted pair copper (single loop) • asymmetric: most commonly: – downlink: 256 Kbps - 8 Mbps – uplink : 64 Kbps - 2 Mbps • limited distance (18000 feet over 26-gauge copper) RADSL: Rate-Adaptive Digital Subscriber Line • varying speeds depending upon line quality; asymmetric – downlink: 1.5 Mbps - 8 Mbps – uplink : 176 Kbps - 1 Mbps • limited distance (18000 feet over 26-gauge copper) HDSL: High-speed Digital Subscriber Line • full-duplex, symmetric – 1.544 Mbps or 2.048 Mbps in each direction • two twisted pairs (for T1) and 3 pairs (for E1) • max distance 12,000 feet VDSL: Very-high-bit-rate Digital Subscriber Line (known as BDSL) • asymmetric – downlink: 12.96-51.84 Mbps – uplink : 1.6 - 2.3 Mbps • max 4,500 - 1,000 feet • applications: High definition TV, multimedia Cable Modem • primarily used to deliver broadband Internet access on Hybrid Fibre-Coaxial (HFC) Internet Cable Modem Computer CMTS Cable TV Television Company Cable Modem Standards • DOCSIS (Data Over Cable Service Interface Specification) – 1.0 (1997): typical 2 Mbps upstream – 1.1 (1999): 10 Mbps upstream – 2.0 (2002) : 30 Mbps upstream Hybrid Fibre-Coaxial (HFC) • combines optical fiber and coaxial cable The Downstream & Upstream Path • The downstream data path of the cable modem uses a SINGLE 6mhz TV channel, which is typically in the higher frequencies range (550 MHz and above) because higher frequencies can carry information faster. • The lower end of the radio frequency spectrum (5MHz – 42 MHz) is used for the upstream or the return path. • In terms of data bandwidth, the typical upstream channel usually has a capacity of around 5 Mbps. • The total downstream bandwidth for a single channel is around 30 Mbps. Downstream Channel Multiple TV Channels Upstream signaling 5-42 MHz ... 50 MHz - 550 MHz 550 MHz - 750 and up MHz Cable TV Spectrum Cable Modem: Modulation & Demodulation Phase • Demodulation Phase: – tunes to the appropriate 6 MHz downstream channel (42 MHz – 850 MHz). – demodulates the signal and extracts the downstream data that is destined for it – converts the data into an Ethernet or USB signal to be fed into the user’s computer. • Modulation Phase: The cable modem receives data on its Ethernet or USB interface and modulates the data onto the upstream carrier frequency, negotiates channel access with the CMTS and sends the data. Protecting the Downstream Channel (and the upstream as well) • A component of the DOCSIS 1.1 standard called Baseline Privacy Initiative+ (BPI+) is bi-directional encryption between cable modem and the CMTS • Each DOCSIS 1.1 compliant cable modem has a digital certificate stored in its firmware. This allows for the cable modem to be authenticated onto the network. • The authentication takes place when the CMTS verifies the certificate presented by the modem. (The certificate is signed by the manufacturer’s private key). • Encryption is based on 56-bit Triple-DES • This scheme effectively renders any sniffing attempts useless, unless cracking of the Triple-DES scheme is possible DOCSIS Security Overview -- BPI+ -Internet CM Authentication (X.509 Certificates) Key Management (RSA, Tri-DES) abcdef CMTS Data Encryption (DES) Mfg Certificate ...... Digitally Signed by: DOCSCSIS Root CM Certificate ...... Digitally Signed by: Mfg CA x$a9E! abcdef TFTP Server Secure Software Download CM New CM Code ...... (X.509 Certificate) CM Code File Digitally Signed by: Manufacturer PC The Device • The cable modem bridges Ethernet frames between a customer LAN and the coax cable network • It does, however, also support functionalities at other layers – Ethernet PHY and DOCSIS PHY – IP address – UDP, port-based packet filtering – DHCP, SNMP, TFTP Fiber-to-the-Home (FTTH) // Copper Fiber CO/HE CO/HE // Old networks, optimized for voice 24 kbps - 1.5 Mbps CO/HE // Optical networks, optimized for voice, video and data Note: network may be aerial or underground 19 Mbps - 1 Gbps + FTTH Characteristics • FTTH is an optical access network in which the optical network unit is on or within the customer’s premise. • Although the first installed capacity of a FTTH network varies, the upgrade capacity of a FTTH network exceeds all other transmission media. Optical Access Network CO/HE // Optical Line Termination Source: www.ftthcouncil.org Optical Network Unit Why FTTH? • • • • • • Enormous information carrying capacity Easily upgradeable Ease of installation Allows fully symmetric services Reduced operations and maintenance costs Benefits of optical fiber: – – – – – Very long distances Strong, flexible, and reliable Allows small diameter and light weight cables Secure Immune to electromagnetic interference (EMI) Fiber versus Copper Glass Copper • Uses light • Transparent • Dielectric materialnonconductive – EMI immune • Low thermal expansion • Brittle, rigid material • Chemically stable • Uses electricity • Opaque • Electrically conductive material – Susceptible to EMI • High thermal expansion • Ductile material • Subject to corrosion and galvanic reactions • Fortunately, it’s recyclable Architecture and Transport Architecture (Electronics) • PON • Active node • Hybrid Transport: ATM or Ethernet CO/HE // FTTH Architectures • Passive Optical Networks (PONs) – Shares fiber optic strands for a portion of the networks distribution – Uses optical splitters to separate and aggregate the signal – Power required only at the ends • Active Node – Subscribers have a dedicated fiber optic strand – Many use active (powered) nodes to manage signal distribution • Hybrid PONs – Literal combination of an Active and a PON architecture FTTH Technical Considerations • Data – – – – – How much per home? How well can you share the channel? Security – how do you protect the subscriber’s data? What kind of QoS parameters do you specify? Compatible business services? • SLAs • T1 • Support for voice? • Support for video? – Broadcast – IPTV FTTH Technical Considerations • Data – How much per home? – How well can you share the channel? – Security – how do you protect the subscriber’s data? – What kind of QoS parameters do you specify? FTTH Technical Considerations: Speed • Data requirements – Competition: ADSL, cable modem ~0.5 to ~1.5 Mb/s shared, asymmetrical – FTTH ~10 to 30 Mb/s non-shared or several 100 Mb/s shared, symmetrical – SDTV video takes 2-4 Mb/s today at IP level – HDTV takes maybe 5 times STDV requirement – Pictures can run 1 MB compressed – 5.1 channel streaming audio would run ~380 kb/s FTTH Technical considerations: Security • Security – Data is shared in the downstream direction in most systems – Your Gateway filters out all packets not intended for you – But there is fear that someone will snoop on your data – FSAN has a low-complexity, low-security encryption scheme – 802.3ah has formed a committee to study security – Manufacturers have taken their own tacks on security, from none to robust FTTH Data Flow and Security: Downstream Time division multiplex (TDM) – each subscriber’s data gets its turn. T D // // // H // // T // Tom // Box on side of home separates out only the data bound for that subscriber. But the fear is that someone will fool his box into giving data intended for another subscriber. Solution is to encrypt the data. H Harry D Dick FTTH Data Flow and Security: Upstream Time division multiple access (TDMA) – similar to downstream, with gap for laser start/stop T D // // // H // // Tom // // Due to the physics of the network, Harry’s data flows upstream but does not come to Tom’s box, so Tom cannot see Harry’s data H Harry Dick FTTH Data Flow and QoS If Dick has paid for more bandwidth, he gets more T D // // // // H // T // Tom // If Tom’s packets need higher priority (e.g., telephone), they go first H Harry D Dick Video Delivery with FTTH • several different ways – Broadcast (cable TV standards) • Analog or Digital • Benefit from high volume and rich applications of cable boxes – IPTV – TV transmitted over Internet Protocol • Feasible, and some people are doing it in place of broadcast • Bandwidth hog, but statistics can work for you – Interesting hybrid model awaits hybrid STTs, but can give the best of both worlds IPTV Unicast (VOD) Router B Router A (headend) Router E In-hom e routing Router C (network) VOD server Router D (NID) Program stream Program request In-hom e routing In-hom e routing In-hom e routing Set top term inal Subscriber's TV Home Networking Technologies • IEEE 802.3/Ethernet • IEEE 802.11 a/b/g/n (WiFi) • Bluetooth • In-House BPL (HomePlug) IEEE 802.3 Family • Original IEEE 802.3 (Ethernet) – 10 Mbps • Fast Ethernet – 1000 Mbps • Gigabit Ethernet – 1 Gbps • 10 G Ethernet – 10 Gbps Gigabit Ethernet Networks • 1000 Mbps transmission rate • IEEE 802.3 CSMA/CD frame format • Medium: Twisted pair (UTP, STP) or Fiber • Hub- or switch-based topology • Do not support priority scheme • Bandwidth utilization is not guaranteed to be fair • Do not support guaranteed delay service • Low bandwidth utilization under heavy loads • Suitable for multimedia communications Gigabit Ethernet Architecture 10 Mbps 100 Mbps 1000 Mbps 1000 Mbps Gigabit Ethernet Full-duplex Switch 1000BaseT 1000 Mbps 100BaseT 100 Mbps 1000BaseT 1000 Mbps Gigabit Ethernet Communication Structure Ethernet Upper Layers Logical Link Control (LLC) Media Access Control (MAC) Gigabit Media Independent Interface (GMII) 1000BASE-T Codec 8B/10B Coding/Decoding 1000BASE-LX 1270-1355 nm 光傳送接收器 SMF 3 km 1000BASE-SX 770-860 nm 光傳送接收器 1000BASE-CX STP 傳送接收器 1000BASE-T 4-Pair 傳送接收器 MMF 50 um MMF 62.5 um Balance Shielded Copper Cat-5 UTP 550m 550m 300m 25m 100m MMF Gigabit Ethernet Physical Layer • 1000BASE-T (UTP, IEEE 802.3ab) • 1000BASE-CX (Short copper jumpers, IEEE 802.3z) • 1000BASE-SX (Shortwave fiber, IEEE 802.3z) • 1000BASE-LX (Longwave fiber, IEEE 802.3z) Gigabit Ethernet Characteristics • Good fault tolerance – Hub/Repeater architecture • Carrier Extension for short frames. • Frame Bursting to increase performance (optional). Half-Duplex vs. Full-Duplex • Gigabit Ethernet can operate in either halfduplex or full-duplex mode. • Half-duplex poses some difficult problems that can result in restrictions on the allowable topologies and/or changes to the Ethernet MAC algorithm. • Full-duplex is simpler to implement than a half-duplex MAC. Limitations of Half-duplex Operation • CSMA/CD implies an intimate relationship between the minimum length of a frame (L, measured in bit-times, not absolute time) and the maximum round-trip propagation delay (2a) of the network: L > 2a transmission time frame_ size transmission _ rate time A maximum hub distance B round trip propagation delay space 10 Mbps Ethernet • For the original 10 Mbps Ethernet, a compromise was struck. • Minimum frame = 512 bits (64 bytes), not including the preamble and Physical Layer overhead. • Minimum data field = 46 bytes rarely imposes a significant padding overhead (IP header + TCP header = 40 bytes). • At 10 Mbps, 512 bit-times is 51.2us. Depends on the type of cable used and the network configuration, the extent of a 10 Mbps Ethernet can be on the order of from 2-3 Km. 7 1 Preamble SFD 6 6 DA SA 2 LEN 46 4 Data FCS Minimum Frame Length (512 bits) bytes Network Extent • For a given minimum-length frame, the extent of a network scales inversely with data rate. 10,000 m ~ 2800m 1,000 m ~ 205m 100 m ~ 20m 10m 10Mbps 100 Mbps 1000 Mbps 100 Mbps Fast Ethernet • For 100 Mbps Fast Ethernet, a conscious choice had to be made to do one or more of the following: Increase the minimum frame length so that large networks (with multiple repeaters) could be supported. Change the CSMA/CD algorithm to avoid the conflict. Leave the minimum frame as is, and decrease the extent of the network accordingly. Limitations of Half-duplex Operation • For Hub-based configuration (1995 ~), the only truly important distance was from the user to the wiring closet (<100m, 200m diameter). • A change to the minimum frame length would have required changes to higher-layer software, including device driver and protocol suite implementation. Also difficult to seamlessly bridge between 10 Mbps and 100 Mbps network with different minimum frame lengths. • A change to the CSMA/CD algorithm would have significantly delayed the release of the Fast Ethernet standard. Limitations of Half-duplex Operation • Fast Ethernet uses The same 512-bit minimum frame. Decrease the network extent to the order of 200m, using twisted-pair cabling. No change to the CSMA/CD algorithm. • For Gigabit Ethernet, network extent is only about 20m!!, if the same approach is used. Carrier Extension • For Ethernet/Fast Ethernet, the minimum frame length = slotTime = 512 bits. • Gigabit Ethernet keeps the 512-bit minimum frame length but sets slotTime to 512 bytes • In Gigabit Ethernet, frames that shorter than slotTime are extended by appending a carrierextension field so that they are exactly one slotTime long. • Frames longer than slotTime are untouched Carrier Extended Frame Format 512-byte Short Frame 8 Preamble/SFD 6 6 2 DA SA LEN 46 - 493 Data 4 FCS 448 - 1 bytes Extension Minimum Nonextended Frame Length (64 bytes) Carrier-Extended Frame (64-511 Bytes) 8 Preamble/SFD 6 6 2 DA SA LEN 494 - 1500 Data Non-Carrier-Extended Frame ( 512 Bytes) 4 bytes FCS Channel Efficiency • The use of carrier extension for short frames imposes a significant performance degradation. • In the worst-case (a stream of minimum length frames of 512 bits with a 64-bit preamble/SFD and a 96-bit interframe gap), the channel efficiency is 512 length of = 12% slot time 4096 + 64 + 96 • For Ethernet (Fast Ethernet), 512 512 + 64 + 96 = 76% Frame Bursting • The solution is to allow a station to send multiple frames, while extending only the first one with carrier extension (Frame Bursting). • No additional frames are sent if a collision occurs before the slotTime expires. • After that time, the station can begin sending additional frames without contending again. • The interframe gap is filled with non-data symbols. • The bursting station may continue to start new frames for up to one burstLength, which limits the maximum time that a station is allowed to dominate the channel. Frame Bursting Maximum Time to start of Last frame in Burst (8192 Bytes) SlotTime (512 Bytes) Carrier detection 傳送 訊框 Carrier extension Inter-Frame Spacing (96 bit time) frame 1 Preamble frame 2 frame 3 SFD DA SA LEN LLC PAD FCS frame 4 Frame Bursting • Transmitters are not required to implement frame bursting. • A trade-off between complexity and performance. • Receiver must be prepared to receive bursted frames. • Even if the first frame in a burst is longer than a slotTime (no carrier-extension), a station may still continue to burst frames up to the burstLength time. • Normally, no collision should occur after the first slotTime during a burst of frames. Half-Duplex Operational Parameters Parameters SlotTime (Bit times) interFrameGap (us) attempLimit backoffLimit jamSize maxFrameSize minFrameSize extendSize burstLength (bits) Ethernet Type 10Mbps 1 Mbps 512 512 9.6 100 Mbps 1000 Mbps 512 4096 96 0.96 0.096 16 10 32 1518 64 0 16 10 32 1518 64 0 16 10 32 1518 64 0 16 10 32 1518 64 448 - - - 65,536 Full-Duplex MAC • When an Ethernet operates in full-duplex mode, all of the complexity of carrier sense, collision detection, carrier extension, frame bursting, backoff algorithm, and so on, has no bearing !! • Only shared medium needs these. • The full-duplex MAC is not really a MAC at all. • With a dedicated channel, a station may transmit at will. Limitations of Full-duplex Operation • The underlying physical channel must be capable of supporting simultaneous, bi-directional communications without interference (1000BASE-X and 1000BASE-T families). • Exactly two devices on the LAN segment. • The interfaces in both devices must be capable of and configured to use full-duplex mode. • If all of these conditions are met, then full-duplex mode not only can be used, it should be used. Operation of Full-Duplex MAC • A station can send a frame any time there is a frame in its transmit queue and it is not currently sending a frame. • Stations should similarly receive frames at any time, subject to interframe spacing. • Do not defer transmissions to received traffic. • No need for carrier-extension in full-duplex mode !! • No explicit need for frame bursting !! • Full-duplex MAC can “burst” at any time (not just after an extended carrier) and for any length of time (not just for a burstLength period) !! Gigabit Ethernet Protocol Stack • • • • CS: Convergence Sublayer MDI: Medium Dependent Interface MII: Medium Independent Interface GMII: Gigabit Medium Independent Interface LLC MAC Higher Layers & Netrotk PLS CS MII AUI MII PLS PMD MDI PMA MDI Medium 1 Mbps, 10 Mbps CS GMII PCS PMA PMD AUI Data link Physical CS MDI PCS PMA PMD MDI Medium Medium Medium 10 Mbps 100 Mbps 1000 Mbps PHY 10 Gigabit Ethernet Protocol Stack OSI Ref. Proposed IEEE 802.3ae Layers LLC MAC Higher Layers & Netrotk Reconciliation Sublayer (RS) XGMII XGMII XGMII 64B/66B PCS Data link Physical 64B/66B PCS WIS 8B/10B PCS PMA PMA PMA PMD PMD PMD Medium Medium Medium 10GBase-R 10GBase-W 10GBase-X IEEE 802.11 Family • Differs in Physical Layer • IEEE 802.11b – 2.45 GHz / 11 Mbps (100 m) • IEEE 802.11a – 5.8 GHz / 54 Mbps (70 m) • IEEE 802.11g – 2.4 GHz / 54 Mbps (100 m) • IEEE 802.11n – 2.4/5 GHz / 100+ (max. 600) Mbps (100+ m) 2.4 GHz Radio Licenses NOT required in these bands 5 GHz Direct Sequence Spread Spectrum IEEE 802.11 Standard for WLAN operations at data rates up to 2 Mbps in the 2.4 GHz ISM band. DSSS modulation. IEEE 802.11a Standard for WLAN operations at data rates up to 54 Mbps in the 5 GHz band. Proprietary “rate doubling" has achieved 108 Mbps. Realistic rating is 20-26 Mbps. IEEE 802.11b Wi-Fi™ or “high-speed wireless” 1, 2, 5.5 and 11 Mbps in the 2.4 GHz band. All 802.11b systems are backward compliant. Realistic rating is 2 to 4 Mbps. IEEE 802.11g 802.11a backward compatible to the 802.11b 2.4 GHz band using OFDM. Orthogonal Frequency Division Multiplexing Adaptive Rate Selection • Performance of the network will also be affected by signal strength and degradation in signal quality due to distance or interference. • As the signal becomes weaker, Adaptive Rate Selection (ARS) may be invoked. Access Point (AP) • Usually connects wireless and wired networks – if not wired • acts as an extension point (wireless bridge) • consists of a radio, a wired network interface (e.g., 802.3), and bridging software conforming to the 802.1d bridging standard • Number of clients supported – device dependent AP as a Wireless Bridge fixed terminal mobile terminal server infrastructure network access point application Application TCP TCP IP IP LLC LLC LLC 802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC 802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY Basic Service Set (BSS) Coordinated function BSS Independent Basic Service Set (IBSS) A BSS without Access Point IBSS Ad hoc mode Extended Service Set (ESS) • ESS: one or more BSSs interconnected by a Distribution System (DS) • Traffic always flows via Access Point • allows clients to seamlessly roam between APs Distributed System (DS) • A thin layer in each AP – embodied as part of the bridge function – keeps track of AP-MN associations – delivers frames between APs • Three types: – Integrated: A single AP in a standalone network – Wired: Using cable to interconnect APs – Wireless: Using wireless to interconnect APs ESS: Single BSS (with integrated DS) A cell Access Point 91.44 to 152.4 meters BSS ESS: BSS’s with Wired Distribution System (DS) 20-30% overlap BSS BSS ESS: BSS’s with Wireless Distribution System (DS) BSS BSS ESSID in an ESS • ESSID differentiates one WLAN from another • Client must be configured with the right ESSID to be able to associate itself with a specific AP • ESSID is not designed to be part of security mechanism, and it is unfitted to be one • AP broadcast the SSID(s) they support • Client association requests contain the ESSID • Transmitted in the clear ESSID Connecting to the Network Access Point Client Probe Request Probe Response Authentication Request Authentication Response Probing 802.11 Authentication Association Request Association Response Association Probing Phase • Find an available AP • APs may operate at different channels (11 channels in total in case of 802.11a) • Should scan a channel at least MinChannelTime • If an AP is found, should last MaxChannelTime Active Scanning AP MN probe request with SSID probe response If SSID matches Service Set Identifier (SSID) Passive Scanning AP MN beacon with SSID Service Set Identifier (SSID) Full Scanning MN AP 1 AP 2 Scan channel 1 AP 3 MinChannelTime Scan channel 2 Beacon or Probe Resp Scan channel 3 … Scan channel 11 MaxChannelTime Authentication and Association Types WLAN authentication occurs at Layer 2. It is the process of authenticating the device not the user. Authentication request Authentication response (Accept or Reject) 802.11 Authentication Methods • Open Authentication (standard) • Shared key authentication (standard) • MAC Address authentication (commonly used) Open Authentication • The authentication request contain a NULL authentication protocol. It must have the AP SSID. • The access point will grant any request for authentication Access Point Client Authentication Request Authentication response Shared Key Authentication • Requires that the client configures a static WEP key Access Point Client Authentication Request Authentication response (challenge) Authentication Request(encrypted challenge) Authentication response(Success/Failure) MAC Address Authentication • Not specified in the 802.11 standard, but supported by many vendors (e.g. Cisco) • Can be added to open and shared key authentication Client Access Point Auth. Request Auth. Response (Success/Reject) RADIUS Server Access-Request (MAC sent as RADIUS req.) Access-Success/Reject 實際驗證 Open Authentication WEP Encapsulation 1. 2. 3. 4. P = M || checksum(M) KeyStream = RC4 (IV || k) C = XOR (P, KeyStream) Transmit (IV, C) {p=plaintext} {k=shared-key} {c=ciphertext} {IV=init-vector} IV Initialization Vector (IV) || seed WEP Key Plaintext RC4 PRNG Key Stream || C Ciphertext P CRC-32 Integrity Check Value (ICV) Message WEP Decapsulation 1. 2. 3. WEP Key IV Ciphertext Message KeyStream = RC4 (IV || k) P’ = XOR (C, KeyStream) = M’ || checksum(M) If checksum(M’) = (checksum(M))’ Then P’ is accepted M’ || Seed RC4 PRNG Key stream P’ Plaintext CRC 32 ICV ICV’ ICV' = ICV? 802.1X • based on EAP (extensible authentication protocol, RFC 2284) – still one-way authentication – initially, MN is in an unauthorized port – an “authentication server” exists – after authorized, the MH enters an authorized port – 802.1X ties it to the physical medium, be it Ethernet, Token Ring or wireless LAN. Three Main Components • supplicant: usually the client software • authenticator: usually the access point • authentication server: usually a Remote Authentication Dial-In User Service (RADIUS) server Extensible Authentication Protocol (EAP) • the AP does not provide authentication to the client, but passes the duties to a more sophisticated device, possibly a dedicated server, designed for that purpose. Authentication server Authentication request Authentication request Authentication response Authentication response 802.1X – How it works Client AP Auth Server “RADIUS” Let me in! (EAP Start) What’s your ID? (EAP-request identity message) ID = [email protected] (EAP Response) The answer is “47” Is [email protected] OK? Prove to me that you are [email protected] EAP Challenge/ Authentication Let him in. Here is the session key. Come in. Here is the session key. network http://yyy.local\index.htm Encrypted session Distributed Coordination Function: CSMA/CA • CSMA: Carrier Sense Multiple Access – physical carrier sense: physical layer – virtual carrier sense: MAC layer • network allocation vector (NAV) • CA: Collision Avoidance – random backoff procedure • shall be implemented in all stations and APs Contention Window data frame random 1 The winner contention window busy DIFS random 2 All stations must wait DIFS after medium is free random 3 time SIFS: Giving Priority to RTS/CTS/ACK data frame Source busy Destination contention window ACK DIFS DIFS SIFS SIFS Others Defer access SIFS: Transmitting Fragments Source DIFS SIFS Fragment 1 SIFS Fragment 2 Destination SIFS ACK Others Defer access SIFS ACK Contention Window EIFS: Low Priority Retransmission data frame Source busy Destination contention window DIFS SIFS can resend EIFS DIFS No ACK SIFS Others Defer access contension CSMA/CA with RTS/CTS SIFS SIFS data frame Source RTS busy Destination ACK contention window CTS DIFS SIFS SIFS Others NAV (RTS) NAV (CTS) RTS/CTS is Optional • system parameter RTSThread – RTS/CTS is used only when frame size RTSThread Throughput Issues • When a source node sends a frame, the receiving node returns a positive acknowledgment (ACK). – This can consume 50% of the available bandwidth. • This overhead, combined with the collision avoidance protocol (CSMA/CA) reduces the actual data throughput to a maximum of 5.0 to 5.5 Mbps on an 802.11b wireless LAN rated at 11 Mbps. What is Bluetooth? • Major joint computing and telecomm industry initiative • Plan to deliver a revolutionary radio-based solution – Cable replacement, no line of sight restrictions – Prefect for mobile devices - small, low power, low cost – Open specification (license free) Bluetooth Characteristics • • • • • • Data/voice access Cable replacement technology 1 Mbps symbol rate Range 10+ meters Low cost Low power Ultimate Headset (Voice Access) Cordless Computer (Cable Replacement) Automatic Synchronization In the Office At Home Bluetooth World Application of Bluetooth • Integrated in – – – – mobile phones PDA/handhelds Computers Wireless peripherals • Handsets • cameras – Network access devices • universal bridge to other networks or internet Masters and Slaves • Each Bluetooth device may be either a Master or Slave at any one time, thought not simultaneously. s m • Master — the device which initiates an exchange of data. • Slave — the device which responds to the master. Piconet • Two or more units sharing the same hopping sequence form a piconet (similar to a LAN). • Each piconet can have – only one master. – up to seven slaves. • Each piconet has max capacity (1 Mbps). m s s s Piconet Structure Master Active Slave Parked Slave Standby Scatternet • Multiple piconets form a scatternet. • Same device can be shard by two different piconets m s s m s s m s s Max 256 piconets s s s Frequency Hop Spread-Spectrum • Bluetooth channel is represented by a pseudo random hopping sequence through the entire 79 RF frequencies • Nominal hop rate of 1600 hops per second • Channel Spacing is 1 MHz Time Division Duplex (TDD) • Bluetooth is a Time Division Multiplexed system • 625 s/slot Slot k master slave 625s Slot k+1 Slot k+2 Multi-Slot Packets • Bluetooth defines data packets which are 1, 3, or 5 slots long 1-slot packet 3-slot packet 5-slot packet f(k) f(k+1) f(k+2) f(k+3) f(k+4) f(k+5) f(k+6) Time Division Multiplexing • Slaves must listen to the master • A slave can send only after receiving a poll 1 2 Master TX RX Slave 1 RX TX Slave 2 TX RX 2 RX TX TX RX 1 RX TX TX RX RX TX Putting It Altogether channel 78 77 76 75 Master … Slave 1 5 4 3 2 1 0 Slave 2 time Asynchronous Connection-Less (ACL) Links • One ACL link can exist between any two devices. • No slots are reserved. • Every even-slot is Master transmission & every old-slot is Slave response • Broadcast packets are ACL packets not addressed to any specific slaves. Synchronous Connection Oriented (SCO) Links • a symmetric link between Master and Slave with reserved channel bandwidth and slots. • Typically used for voice connection • A Master can support up to three SCO links. • A slave can support – up to 3 SCO links from the same master – two SCO links if the links are originated from different masters. • SCO packets are never retransmitted. SCO Traffics • Master reserves slots for SCO links Slot no master 0 1 SCO TX SCO RX Slave 1 Slave 2 SCO RX SCO TX 2 3 TX RX RX TX 4 TX RX 5 0 1 RX SCO TX SCO RX TX SCO RX SCO TX 2 Mixed Link Packets SCO MASTER SLAVE 1 SLAVE 2 SLAVE 3 ACL SCO ACL ACL SCO SCO ACL RFID • What is RFID? – RFID is an ADC (Automatic Data Capture) technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track … – RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item An RFID System Antenna RF Module Tag Reader Host Computer Interrogation Unit Micro Computer Computer Network Tx/Rx Antenna One or more RF tags Two or more antennas One or more interrogators One or more host computers Appropriate software RF Tag Chip + Antennae + Packaging = Tag Variations of RF Tags • Basic types: active vs. passive • Memory – Size (16 bits - 512 kBytes +) – Read-Only, Read/Write or WORM • • • • Arbitration (Anti-collision) Ability to read/write one or more tags at a time Frequency : 125KHz - 5.8 GHz Physical Dimensions – Thumbnail to Brick sizes – Incorporated within packaging or the item • Price ($0.50 to $150) RFID Frequencies Regulating Authority : ITU and Geo Organizations Frequency 125-150 kHz 13.56 MHz 433 MHz 860-960 MHz 2450 MHz Regulation Basically unregulated ISM band, differing power levels and duty cycle Non-specific Short Range Devices (SRD), Location Systems ISM band (Increasing use in other regions, differing power levels and duty cycle ISM band, differing power levels and duty cycle Range Data Speed Comments Animal identification and factory data collection systems Popular frequency for I.C. Cards (Smart Cards) ? 10 cm Low <1m Low to moderate 1 – 100 m Moderate DoD Active Moderate to high EAN.UCC GTAG, MH10.8.4 (RTI), AIAG B-11 (Tires), EPC (18000-6’) High IEEE 802.11b, Bluetooth, CT, AIAG B-11 2–5m 1–2m