Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Zero-configuration networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Internet protocol suite wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
IEEE 802.11 wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks Lecture 10: Wireless LAN Instructor: Jila Seraj email: [email protected] http://www.engr.smu.edu/~jseraj/ tel: 214-505-6303 EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #1 Session Outline Wireless LAN EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #2 Wireless LAN Wish List — High speed — Low cost — No use/minimal use of the mobile equipment battery — Can work in the presence of other WLAN — Easy to install and use — Etc EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #3 Wireless LAN Architecture Ad Hoc Laptop Server Laptop DS Access Point Access Point Pager PDA EETS 8316/NTU TC 745, Fall 2003 Laptop Laptop SMU ENGINEERING #4 Wireless LAN Architecture, Cont… Logical Link Control Layer MAC Layer: Consist of two sub layer, physical Layer and physical convergence layer Physical convergence layer, shields LLC from the specifics of the physical medium. Together with LLC it constitutes equivalent of Link Layer of OSI EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #5 What Is Hidden Node? A B C A can hear B C can hear B A can not hear C C can not hear A sending data EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #6 LBT MAC Protocol LBT= Listen Before You Talk —Based on CSMA-CA —First send Ready To Send (RTS) to the receiving node —Receiving node send a Continue To Send (CTS) message, takes care of hidden node. —Data transmission starts after RTS/CTS. —Data is acknowledged on the MAC level. Counteract error caused by RF environment. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #7 Integrated CSMA/TDMA MAC Protocol Supports guaranteed bandwidth traffic and random access traffic The bandwidth is divided into a random part and a reserved part. Random part is LBT, reserved part During high traffic all bandwidth can be used for reserved traffic (like wireless telephony) H1 Reserved-1 H2 Reserved-2 H3 LBT EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #8 Reservation/Polling MAC Protocol Works only with AP Fair and slow. First-in-First-Out Wireless station send a request. All requests are queued. Wireless stations are polled in the same order that the requests have arrive. All data reception is acknowledged. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #9 Power Management Battery life of mobile computers/PDAs are very short. Need to save The additional usage for wireless should be minimal Wireless stations have three states —Sleep —Awake —Transmit EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #10 Power Management, Cont… AP knows the power management of each node AP buffers packets to the sleeping nodes AP send Traffic Delivery Information Message (TDIM) that contains the list of nodes that will receive data in that frame, how much data and when. The node is awake only when it is sending data, receiving data or listening to TDIM. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #11 Access Point Functions Access point has three components —Wireless LAN interface to communicate with nodes in its service area —Wireline interface card to connect to the backbone network —MAC layer bridge to filter traffic between sub-networks. This function is essential to use the radio links efficiently EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #12 Bridge Functions Speed conversion between different devices, results in buffering. Frame format adaptation between different incompatible LANs Adding or deleting fields in the frame to convert between different LAN standards EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #13 Routing Building routing tables can be done as —Source tree, keeps track where other nodes are and the best way of reaching them. When sending a packet the route is also determined. It must be done in each node and is heavy. —Spanning tree, is built iteratively, each bridge advertises it identity and all other bridges it knows and how many hops it takes to get there. Then each bridge follows a specific algorithm to calculate how get to each bridge with least hop. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #14 Bridge Functions, Routing Create a routing table for sending packets Listen to all packets being sent. Find out which nodes are in which sub-network by analyzing the source address. Store that data in a routing table. If a packet is addressed to a known node, only repeat the data on that sub-network, otherwise repeat it on all networks. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #15 Bridge Functions, Routing, Cont… Age the entries after a timer value has expired since the last communication If the timer is too long, we might send data to a node that might have left the sub-network or is turned off or even gone to coverage area of another access point. If the timer is too short, we remove the user too early and repeat the packet destined to it in all sub-networks. Other functions of a bridge, buffering for speed conversion, changing frame format between LANs. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #16 Mobility Management AP has three components — WLAN interface — Backbone LAN interface — MAC layer bridge function Backbone Network Access Point Access Point Access Point EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #17 Mobility Management, Cont.. A node can associate when it enters the coverage area of an AP A node can disassociate when power down or leaving the service area It shall re-associate when it handoffs to another AP. AP bridge function keeps track of all nodes associated with it. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #18 WLAN Addressing In wireline LAN, each node has an IP address that is associated with its physical location When a device can move from one location to another, the association between the physical location and IP address no longer holds The solution is presented in mobile IP EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #19 Mobile IP Principals Internet is a large network and introducing a new function, e. g. Mobile IP can not be disruptive. Constraints of mobile IP are —Mobility should be at network layer —No impact on higher levels —No impact on the nodes not directly involved in the mobile IP function —Uninterrupted operation for mobile devices EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #20 Mobile IP Principals, Cont… The principle is very simple, use c/o addressing For each mobile device, we associate a Home IP address associated with a Home Network. The new LAN is called the Visiting Network The software that takes care of mobility in each server (router) is called agent. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #21 Mobile IP Principals, Cont… Two types of agents, Home Agent and Visiting Agent. Whenever the mobile device connects to a new network, a c/o address is given to it by the Visiting Agent. This c/o address is reported to the Home Agent. All packets addressed to the mobile device are addressed to its Home Address, and thus sent to its Home Network. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #22 Mobile IP Principals, Cont… Upon reception of the packet, the Home Agent recognized the address belonging to a mobile device. Home Agents looks up the c/o address in its table. The packet is then wrapped in a new packet with the c/o address on it, called encapsulation C/o address causes the packet to be forwarded to the Visiting Agent. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #23 Mobile IP Principals, Cont… Visiting Agent recognizes the received address as the c/o address, unwrap the packet; called de-capsulation; and send it to its intended receiver. This activity is called tunneling, referring to the idea creating a tunnel between the Home Network and Visiting Network and sending all data to that mobile device on that tunnel. Several tunnels can be created between two networks EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #24 Mobility Management in WLAN Mobile IP principles are used to take care of mobility in the wireless LAN. Every wireless device has an address in its Home LAN, and gets a c/o address in the Visiting LAN. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #25 IEEE 802.11 WLAN, History 1997 IEEE 802.11 working group developed standard for inter-working wireless LAN products for 1 and 2 Mbps data rates in 2.4 GHz ISM (industrial, scientific, and medical) band (2400-2483 MHz) Required that mobile station should communicate with any wired or mobile station transparently (802.11 should appear like any other 802 LAN above MAC layer), so 802.11 MAC layer attempts to hide nature of wireless layer (eg, responsible for data retransmission) EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #26 802.11 WLAN History, Cont.. 1999 IEEE 802.11a amendment for 5 GHz band operation and 802.11b amendment to support up to 11 Mbps data rate at 24 GHz MAC sub layer uses CSMA/CA (carrier sense multiple access with collision avoidance) EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #27 802.11 Architecture MAC Layer Physical Layer Convergence Procedure (PLCP) Physical Medium Dependent (PMD) sub layer MAC provides asynchronous, connectionless service EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #28 Frame type and subtypes Three type of frames — Management — Control — Asynchronous data Each type has subtypes Control — RTS — CTS — ACK EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #29 Frame type and subtypes, Cont.. Management —Association request/ response —Re-association request/ response —Probe request/ response —privacy request/ response —Beacon (Time stamp, beacon interval, TDIM period, TDIM count, channels sync info, ESS ID, TIM broadcast indicator) EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #30 Frame type and subtypes, Cont.. Management… —TIM (Traffic Indication Map) indicates traffic to a dozing node —dissociation —Authentication EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #31 Authentication Three levels of authentication —Open: AP does not challenge the identity of the node. —Password: upon association, the AP demands a password from the node. —Public Key: Each node has a public key. Upon association, the AP sends an encrypted message using the nodes public key. The node needs to respond correctly using it private key. EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #32 802.11 MAC Frame Format MAC Header Frame Duration Addr 1 Addr 2 Addr 3 Sequence Address 4 User Control Control Data Protocol Version Type Sub type To From DS DS EETS 8316/NTU TC 745, Fall 2003 SMU Last Retry Power Fragment Mgt ENGINEERING CRC EP RSVD #33 802.11 MAC Frame Format Address Fields contains —Source address —Destination address —AP address —Transmitting station address DS = Distribution System User Data, up to 2304 bytes long EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #34 IEEE 802.11 LLC Layer Provides three type of service for exchanging data between (mobile) devices connected to the same LAN —Acknowledged connectionless —Un-acknowledged connectionless, useful for broadcasting or multicasting. —Connection oriented Higher layers expect error free transmission EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #35 IEEE 802.11 LLC Layer, Cont.. Destination Source SAP SAP Control Data Each SAP (Service Access Point) address is 7 bits. One bit is added to it to indicate whether it is order or response. Control has three values —Information, carry user data —Supervisory, for error control and flow control —Unnumbered, other type of control packet EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #36 IEEE 802.11 LLC <-> MAC Primitives Four types of primitives are exchanged between LLC and MAC Layer Request: order to perform a function Confirm: response to Request Indication: inform an event Response: inform completion of process began by Indication EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #37 Reception of packets AP Buffer traffic to sleeping nodes Sleeping nodes wake up to listen to TIM (Traffic Indication Map) in the Beacon AP send a DTIM (Delivery TIM) followed by the data for that station. Beacon contains, time stamp, beacon interval, DTIM period, DTIM count, sync info, TIM broadcast indicator EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #38 HIPERLAN 1995 ETSI technical group RES 10 (Radio Equipment and Systems) developed HIPERLAN/1 wireless LAN standards using 5 channels in 5.15-5.3 GHz frequency range —Technical group BRAN (Broadband Radio Access Network) is standardizing HIPERLAN/2 for wireless ATM —ETSI URL for Hiperlan information http://www.etsi.org/frameset/home.htm?/tec hnicalactiv/Hiperlan/hiperlan2.htm EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #39 HIPERLAN Characteristics HIPERLANs with same radio frequencies might overlap —Stations have unique node identifiers (NID) —Stations belonging to same HIPERLAN share a common HIPERLAN identifier (HID) —Stations of different HIPERLANs using same frequencies cause interference and reduce data transmission capacity of each HIPERLAN —Packets with different HIDs are rejected to avoid confusion of data EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #40 HIPERLAN Protocol Layers Data link layer = logical link control (LLC) sub layer + MAC sub layer + channel access control (CAC) sub layer network LLC data link MAC CAC physical EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #41 HIPERLAN Protocol Layers, Cont.. MAC sub layer: —Keeps track of HIPERLAN addresses (HID + NID) in overlapping HIPERLANs —Provides lookup service between network names and HIDs —Converts IEEE-style MAC addresses to HIPERLAN addresses —Provides encryption of data for security EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #42 HIPERLAN Protocol Layers, Cont.. MAC sub layer: —Provides “multi hop routing” – certain stations can perform store-and-forwarding of frames —Recognizes user priority indication (for timesensitive frames) EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #43 HIPERLAN Protocol Layers, Cont.. CAC sub layer: —Non-preemptive priority multiple access (NPMA) gives high priority traffic preference over low priority —Stations gain access to channel through channel access cycles consisting of 4 phases: EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #44 HIPERLAN Protocol Layers, Cont… CAC is designed to give each station (of same priority) equal chance to access the channel —First stations with highest priority data are chosen. The rest will back off until all higher priority data is transmitted. —Stations with the same priority level data, compete according to a given rule to choose “survivors” —Survivors wait a random number of time slots and then listen to see if the channel is idle EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #45 HIPERLAN Protocol Layers, Cont… —If the channel is idle then it starts transmitting. —Those who could not transmit wait until next period EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #46 Reading assignment Mobile Data and Wireless LAN technologies, Riffat Dayem, Chapters 4, 6 and 8. Wirless LAN, Jim Geier, Part I chapter 3, Part II chapter 4 EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #47 3G http://www.3gpp.org/ EETS 8316/NTU TC 745, Fall 2003 SMU ENGINEERING #48