Topic: Wireless and Mobile Networks

Similar documents
Topic: Wireless and Mobile Networks

Topic: Wireless and Mobile Networks

Wireless and Mobile Networks 7-2

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Data Communications. Data Link Layer Protocols Wireless LANs

CSC 4900 Computer Networks: Wireless Networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mohammad Hossein Manshaei 1393

CSCI-1680 Wireless Chen Avin

Last Lecture: Data Link Layer

Computer Networks. Wireless LANs

Wireless and Mobile Networks

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

CS 332 Computer Networks Wireless Networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

COMP 3331/9331: Computer Networks and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

3.1. Introduction to WLAN IEEE

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Data and Computer Communications. Chapter 13 Wireless LANs

Chapter 6 Wireless and Mobile Networks

Mohammad Hossein Manshaei 1393

Computer Communication III

Introduction to IEEE

Multiple Access Links and Protocols

Wireless LAN -Architecture

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

MAC in /20/06

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Advanced Computer Networks WLAN

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless Communication and Networking CMPT 371

Mobile devices for wireless

Mohamed Khedr.

Wireless Protocols. Training materials for wireless trainers

Multiple Access in Cellular and Systems

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Wireless Communication Session 4 Wi-Fi IEEE standard

Nomadic Communications WLAN MAC Fundamentals

Mobile Communications Chapter 7: Wireless LANs

Chapter 6 Medium Access Control Protocols and Local Area Networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

COMP 3331/9331: Computer Networks and Applications

Local Area Networks NETW 901

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Home Area Networks. Outline

Lecture 16: QoS and "

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Mobile Communications Chapter 7: Wireless LANs

Module 6: Wireless Mobile Networks

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

IEEE WLAN (802.11) Copyright. Nomadic Communications

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Internet Protocol Stack

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Guide to Wireless Communications, Third Edition. Objectives

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

CSC 8560 Computer Networks: Wireless and Mobility

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless Local Area Networks (WLANs) Part I

IEEE MAC Sublayer (Based on IEEE )

CSE 461: Wireless Networks

Chapter 7: Wireless LANs

M06:Wireless and Mobile Networks. Corinna Schmitt

ECE442 Communications Lecture 3. Wireless Local Area Networks

MSIT 413: Wireless Technologies Week 8

Medium Access Control

Hands-On Exercises: IEEE Standard

Wireless Communication and Networking CMPT 371

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Chapter 7: Wireless LANs

Wireless Local Area Networks. Networks: Wireless LANs 1

Mobile and Sensor Systems

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

CSC 498R: Internet of Things 2

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Mobile Communications Chapter 7: Wireless LANs

Link Layer. 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

15-441: Computer Networking. Wireless Networking

Wireless# Guide to Wireless Communications. Objectives

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

MULTIPLE ACCESS PROTOCOLS 2. 1

Transcription:

Topic: Wireless and Mobile Networks What you will learn IEEE 802.11 Mobile IPv6 Centralized Architectures and CAPWAP Planning a wireless access network A glance at VANETs 1/67 Elements of a wireless network network infrastructure wireless hosts laptop, palmtop, smartphone, or desktop may be stationary (nonmobile) or mobile wireless does not always mean mobility 2/67 1

Elements of a wireless network (cont.) transmission range Coverage area network infrastructure wireless link used to connect a wireless host to a base station or to another wireless host also used as backbone link A MAC protocol coordinates link access Various link rates, transmission range 3/67 Elements of a wireless network (cont.) network infrastructure base station typically connected to a wired network relay - responsible for sending and receiving packets to and from a wireless host associated with it e.g., cell towers, 802.11 access points 4/67 2

Elements of a wireless network network infrastructure infrastructure mode base station connects mobile hosts into a wired network handoff (or handover or roaming): mobile host changes base station handoff 5/67 Elements of a wireless network ad hoc mode no base stations nodes can only transmit to other nodes within coverage area nodes organize themselves into a network: route among themselves 6/67 3

Wireless network taxonomy infrastructure (e.g., APs) single hop Wireless hosts connect to a base station, which connects to a larger wired network, e.g., the Internet (WiFi, WiMAX, cellular networks). multiple hops There is a base station, which is wired to the larger network. Wireless hosts may have to relay their communication through other wireless nodes to communicate via the base station. Wireless Mesh Networks no infrastructure There is no base station, no connection to a larger wired network (Bluetooth). No base station. Hosts may have to relay messages in order to reach a destination (MANET, VANET). MANET: Mobile Ad hoc NETwork VANET: Vehicular Ad hoc NETwork 7/67 Some popular wireless network standards Key characteristics: coverage area and data rate Data rate (Mbps) 1300 54 5-11 4 1.384.056 802.11ac 600 802.11n 802.11a,g 802.11b 802.15 4G: LTE 802.11a,g point-to-point Enhanced 3G: HSPA 3G: UMTS/WCDMA, CDMA2000 2G: IS-95, CDMA, GSM Indoor 10-30m Outdoor 50-200m Mid-range outdoor 200m 4 Km Long-range outdoor 5Km 20 Km transmission range 8/67 4

The Wireless Channel A radio channel between a transmitter unit u and a receiver unit v is established if and only if the power P r of the radio signal received by unit v is above a certain threshold β β depends on the features of the wireless transceiver and on the communication data rate (the higher the data rate, the higher β) The received power P r depends on the transmission power P t and on the Path Loss PL(u,v), which models the radio signal degradation with distance P r = P r > β P t PL(u,v) The Free Space propagation model assumes the ideal propagation condition that there is only one clear Line-Of-Sight (LOS) path between the transmitter and receiver The path loss PL(u,v) is proportional to d 2, with d being the distance between u and v 9/67 Signal propagation Usually there is no clear line-of-sight path Receiving power additionally influenced by other mechanisms (frequency dependent), such as: Atmosphere (weather conditions) Shadowing (the higher the frequency, the more a signal behaves like light) Reflection Scattering Diffraction (at edges) shadowing reflection scattering diffraction caused by objects much larger than the wavelength of the signals if the size of an obstacle is in the order of the wavelength or less 10/67 5

Multi-path propagation Signal can take many different paths between sender and receiver LOS pulses Multipath pulses signal at sender signal at receiver The signal reaches a receiver directly and phase shifted (delay spread) Distorted signal depending on the phases of the different parts Time dispersion: signal is dispersed over time Inter Symbol Interference (ISI): it limits the bandwidth of a radio channel If the receiver knows the delays of the different paths, it can compensate for the distorsion caused by the channel The sender can first transmit a training sequence known by the receiver The receiver then compares the received signal to the original training sequence and programs an equalizer used to compensate for the distortion 11/67 Effects of mobility Due to mobility, channel characteristics change over time and location If changes are too fast, the receiver cannot adapt fast enough the parameters of the equalizer and, thus, the error rate of transmission increases dramatically Quick changes in the power received (short term fading) Power long term fading Additional changes in distance to sender obstacles further away Slow changes in the average power received (long term fading) short term fading Typically, senders can compensate for long-term fading by increasing/decreasing sending power The received power always stays within certain limits t 12/67 6

Antenna Diversity Due to multipath fading, the electromagnetic field distribution in two points that are few centimetres apart may be very different Antenna diversity technique can be used to try to solve the problem Access Point with two or more antennas RX1 RX2 13/67 Bit Error Rate-BER and Signal-to-Noise Ratio-SNR larger SNR easier to extract signal from noise SNR versus BER tradeoffs given physical layer: increase power -> increase SNR- >decrease BER given SNR: choose physical layer that meets BER requirement, giving the highest throughput The SNR may change with mobility: dynamically adapt physical layer (modulation technique, rate) BER 10-1 10-2 10-3 10-4 10-5 10-6 10-7 10 20 30 40 SNR(dB) QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) 14/67 7

Motivation for a specialized MAC Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access with Collision Detection send as soon as the medium is free, listen into the medium to detect a possible collision (original method in IEEE 802.3) Problems in wireless networks The transmission power in the area of the transmitting antenna is several magnitude higher than the receiving power It is costly to build hardware that simultaneously transmits and listens in order to detect a collision Collision happens at the receiver Collision detection would not work due to the hidden terminal problem Since wireless networks do not use CD, once a station begins to transmit a frame, it transmit the frame entirely 15/67 Motivation - hidden and exposed terminals Hidden terminals: A and C cannot hear each other because of obstacles, signal attenuation A sends to B, C cannot receive A C wants to send to B, C senses a free medium (Carrier Sense fails) collision at B, A cannot receive the collision (CD would fail) A is hidden for C (and vice versa) C A B A B C D Exposed terminals B sends to A, C wants to send to another terminal (for example, D) C has to wait, Carrier Sense signals a medium in use but A is outside the radio range of C, therefore waiting is not necessary C is exposed to B 16/67 8

WiFi: IEEE 802.11 wireless LAN Standards: 802.11 legacy, 802.11b, 802.11a, 802.11g, 802.11n, 802.11ac,... 802.11 802.11a 802.11b 802.11g Frequency ISM 2,4 GHz U-NII 5 GHz ISM 2,4 GHz ISM 2,4 GHz Data Rate 1, 2 6, 9, 12, 18, 24, 36, 48, 54 1, 2, 5.5, 11 1, 2, 5.5, 11, 6, 9, 12, 15, 24, 36, 48, 54 Physical layer FHSS, DSSS OFDM DSSS DSSS/OFDM Modulation BPSK, QPSK BPSK, QPSK, 16/QAM, 64/QAM BPSK, QPSK, CCK BPSK, QPSK, CCK, 16/QAM, 64/QAM Compatibility NONE NONE 802.11 802.11, 802.11b IEEE 802.11n-2007 uses Multiple-In Multiple Out (MIMO) technology In order to mitigate RF impairments and enhance transmission rate, multiple antennas on both the sending side and the receiving side transmit/receive different signals RF band: 2.4 GHz, 5 GHz Data rates from 54 Mbit/s to 600 Mbit/s (with 4x4 MIMO) IEEE 802.11ac-2013, uses frequencies in the 5GHz band The first generation of 802.11ac products (Wave 1) supports data rates up to 1.3 Gbps, the second generation (Wave 2) supports data rates up to 3.5 Gbps. Eventually, data rates up to 6.9 Gbps (with 8x8 MIMO) should be supported 17/67 IEEE 802.11 network - Infrastructure mode STA 1 ESS 802.11 LAN BSS 1 Access Point BSS 2 Portal Distribution System Access Point 802.x LAN STA 2 802.11 LAN STA 3 Station (STA) Access Point (AP) Basic Service Set (BSS) group of STAs and a central AP using the same radio frequency BSS Identifier (BSSID): MAC address of the AP Distribution System interconnection network to form a logical network (ESS: Extended Service Set) based on several BSS Each ESS is identified by a Service Set IDentifier (SSID) consisting of up to 32 alphanumeric (case sensitive) characters The SSID is included in beacons sent by the AP (see later) Portal bridge to other (wired) networks 18/67 9

IEEE 802.11 network - Ad-hoc mode STA 1 802.11 LAN IBSS 1 STA 2 IBSS 2 STA 3 Direct communication within a limited range Station (STA): terminal with access mechanisms to the wireless medium Independent Basic Service Set (IBSS): group of stations using the same radio frequency for an IBSS, the SSID is chosen by the station that starts the network STA 5 STA 4 802.11 LAN 19/67 802.11b/g Channels and EIRP 20/67 10

802.11b/g Channels and EIRP (cont.) Maximum EIRP (Equivalent Isotropic Radiated Power) for IEEE802.11b 100 mw (20 dbm) IEEE802.11g 50 mw (17 dbm) When installing an access point, a network administrator assigns an SSID (displayed when you view available wireless networks on your notebook) and a channel number Sets of non-overlapping channels (in Europe) 1-6 - 11 2-7 - 12 3-8 - 13 Maximum transmission rate of 33 Mbps by installing three 802.11b APs at the same physical location (Co-location) 21/67 Joining a BSS with AP A STA willing to join a BSS must get in contact with the AP Passive scanning The station scans the channels for a Beacon frame that is periodically broadcast (normally, every 100ms) by every AP Beacons include the Timestamp (for synchronization of stations), the SSID, the Beacon Interval (useful for power management, based on alternating between sleep and wake states), the Traffic Indicator Map (a list of stations whose frames have been buffered at the AP), the transmission parameters (e.g., the channel number, the supported data rates) Actually, the beacons are not always periodic because a beacon is also deferred if the medium is busy (see later) Active scanning (the station tries to find an AP) Directed probe: The client sends a probe request with a specific destination SSID; only APs with a matching SSID will reply with a probe response Broadcast probe: The client sends a null SSID in the probe request; all APs receiving the probe-request will respond with a probe-response for each SSID they support Useful for service discovery 22/67 11

Joining a BSS with AP (cont.) An STA selects one of the APs for association It may be required to authenticate itself Shared Key authentication Server-based authentication. The IEEE 802.11i standard (WiFi Protected Access 2- WPA2 for WiFi Alliance) secures WLANs It provides for much stronger security mechanisms than Wired Equivalent Privacy (WEP) Advanced Encryption Standard (AES) is adopted for data privacy It provides for an extensible set of authentication mechanisms IEEE 802.1x + EAP (Extensible Authentication Protocol) Typically, username and password are employed The RADIUS server and protocol are de facto standard components for 802.11i STA: client station AP: access point wired network AS: Authentication server (RADIUS) 802.1x Radius 23/67 Joining a BSS with AP (cont.) Association process STA AP: Association Request frame AP STA: Association Response frame BBS 1 BBS 2 BBS 1 BBS 2 AP 1 1 1 1 AP 2 2 2 AP 1 AP 2 2 3 3 4 H1 H1 Passive scanning 2: Association Request frame 3: Association Response frame Active scanning (broadcast probe) Only after the association is completed, a station can transmit and receive data frames IEEE 802.11f standardizes the exchange of information between APs to support roaming (handoff) 24/67 12

IEEE 802.11 MAC Protocol Performs the following functions: Control Medium Access Virtual resource reservation is possible MAC PDU (frame) format Error control Data segmentation and reassembly Three frame types: 1. Control: positive ACK, handshaking for accessing the channel (RTS, CTS) 2. Data Transfer: information to be transmitted over the channel 3. Management: synchronization, authentication, roaming, power management, 25/67 Data transfer services Three access methods: A mandatory basic method based on a version of CSMA/CA An optional method avoiding the hidden terminal problem A contention-free method for time-bounded service (for real-time traffic) The first two methods are summarized as Distributed Coordination Function (DCF) DCF only offers asynchronous data service The third method (not really implemented) is called Point Coordination Function (PCF) PCF is based on the polling of the stations and controlled by the AP (Point Coordinator) PCF offers both asynchronous service and time-bounded service 26/67 13

Time Slot The system is synchronous Time is divided into slots A slot is the system time unit and its duration depends on the implementation of the physical layer. For example: 802.11g: 20 μs 802.11a: 9 μs Stations are synchronized with the AP in the infrastructure mode and among each other in the ad hoc mode Synchronization is maintained through beacon frames (remember that beacons include the timestamp) 27/67 Inter-Frame Spaces (IFSs) The waiting time before medium access is controlled through different inter-frame spaces (priorities of medium access) SIFS (Short IFS) the highest priority level, for ACK, CTS, polling response PIFS (PCF IFS) = SIFS + 1 slot time medium priority, for time-bounded service using PCF DIFS (DCF, Distributed Coordination Function IFS) = SIFS + 2 slot times the lowest priority, for the asynchronous data service DIFS medium busy DIFS PIFS SIFS contention next frame direct access if medium is free DIFS t 28/67 14

Basic DCF using CSMA/CA DIFS DIFS contention window (randomized back-off mechanism) medium busy next frame direct access if medium is free DIFS slot time CSMA/CA: Carrier Sense Multiple Access/Collision Avoidance A station (wireless host or an AP) ready to send starts sensing the medium. Carrier Sense is based on the Clear Channel Assessment signal (CCA) if the medium is idle for at least the duration of DIFS, the station can access the medium at once This allows for short access delay under light load if the medium is busy or the medium is not idle for at least DIFS, the station has to wait until the medium is idle for DIFS again, then the station must additionally wait a random backoff time (multiple of slot-time) chosen within a Contention Window (CW) Collision Avoidance The station counts down. If another station occupies the medium during the back-off time of the station, the back-off timer stops (fairness!!!) 29/67 t Basic DCF A simpler version (no ACKs) DIFS DIFS bo e bo r DIFS bo e bo r DIFS bo e busy station 1 bo e busy station 2 station 3 busy bo e busy bo e bo r station 4 station 5 busy bo e medium not idle (frame, ack etc.) packet arrival at MAC elapsed backoff time bo e bo r bo e busy bo e bo r A collision of an unicast frame triggers a retransmission with a new random selection of the backoff time (see next slides) t bo r residual backoff time 30/67 15

IEEE 802.11 unicast data transfer An additional feature is provided for unicast data transfer The receiver of the data transmission answers with an acknowledgement (ACK) at once (after waiting for SIFS) if the packet was received correctly (CRC) If no ACK is returned, the sender automatically retransmits the frame sender DIFS data receiver SIFS ACK other stations waiting time DIFS contention data t 31/67 Exponential backoff For a retransmission a new random backoff time is chosen Retransmissions are not privileged The system tries to adapt to the current number of stations trying to send The number of slots is a random variable uniformly distributed in [0,CW-1] The contention window starts with a size of, e.g., CW min = 7 Each time a collision occurs, the contention window doubles up to a maximum, CW max. For i=1, CW1 = CWmin For i>1, CWi = (2 CWi-1 + 1), with i>1 being the number of consecutive attempts for transmitting the MPDU For any i, CWi CWmax 32/67 16

DCF with RTS/CTS handshaking sender receiver DIFS RTS SIFS CTS SIFS data SIFS ACK other stations NAV (RTS) NAV (CTS) defer access DIFS contention After waiting for DIFS (plus a random backoff time if the medium was busy or was not idle for at least DIFS) the sender can issue a Request To send (RTS) The RTS packet includes the receiver of the data transmission to come and the duration of the whole data transmission (in the duration field) Every station receiving this RTS has to set its Net Allocation Vector (NAV) in accordance with the duration field The NAV then specifies the earliest time instant at which the station can try to access the medium again 33/67 data t DCF with RTS/CTS handshaking (cont.) After waiting for SIFS, the receiver of the data transmission answers with a Clear To Send (CTS) Based on duration field, every station receiving this CTS has to adjust its NAV Finally, the sender can send the DATA after SIFS After SIFS, the receiver of the DATA acknowledges if the transfer was correct RTS/CTS is a virtual reservation scheme (virtual carrier sensing) Designed to solve the hidden terminal problem Collisions can only occur at the beginning while the RTS is sent Using RTS/CTS can result in a non-negligible overhead An RTS threshold can determine when to use the additional mechanism (basically at larger data frame size) and when to disable it (short data frames) Area covered by RTS/CTS RTS/CTS works well, as all stations are within the transmission range of the AP RTS D A CTS B C A is hidden for C C is hidden for A 34/67 17

802.11 frame duration of reserved transmission time (RTS/CTS) used to filter duplicates frame control 2 2 6 6 6 2 6 0-2312 4 duration address 1 address 2 address 3 seq control address 4 payload CRC 2 2 4 1 1 1 1 1 1 1 1 Protocol To From More Power More Type Subtype Retry WEP Rsvd version AP AP frag mgt data This bit is set to 1 if the frame is a retransmission Set to 1, this bit indicates that the station goes into power-save mode 35/67 802.11 frame: addressing (cont.) scenario to AP from address 1 address 2 address 3 address 4 AP ad-hoc network 0 0 DA SA BSSID - infrastructure 0 1 DA BSSID SA - network, from AP infrastructure 1 0 BSSID SA DA - network, to AP infrastructure network, within DS 1 1 RA TA DA SA DS: Distribution System AP: Access Point DA: Destination Address SA: Source Address BSSID: Basic Service Set Identifier RA: Receiver Address. It is the MAC address of the receiving AP within the DS TA: Transmitter Address. It is the MAC address of the transmitting AP within the DS The address 1 identifies the physical receiver(s) of the frame The address 2 represents the physical transmitter of the frame The address 3 and the address 4 are necessary for the logical assignment of frames ( logical sender, BSS identifier, logical receiver) If the address 4 is not needed, the field is omitted 36/67 18

802.11 frame: addressing (cont.) H1 R1 router Internet R1 MAC addr H1 MAC addr 802.11 frame dest. address source address 802.3 frame AP MAC addr H1 MAC addr R1 MAC addr address 1 address 2 address 3 physical receiver logical and physical sender logical receiver 37/67 Mobility in the same IP subnet The mobile node H1 moves from BSS1 to BSS2. IP Router Remaining in the same IP subnet, H1 keeps its IP L2 switch address and all of its ongoing TCP connections switch: which AP is associated with H1? H1 Backward-Learning: the switch will see the frame from H1 and remember which switch port can be used to reach H1 BSS1 BSS2 38/67 19

Moving within the Internet: MIPv6 Mobile IPv6 allows devices to be reachable and maintain ongoing TCP connections (e.g., FTP) while moving within the Internet topology Correspondent node Home Agent Subnet A Internet IPv6 IPv6 router Mobile node Subnet B 39/67 MIPv6 terminology Mobile Node (MN): a mobile node is a node that changes its location within the Internet topology Correspondent Node (CN): any node that communicates with the mobile node Home address: a stable address that belongs to the mobile node and is used by correspondent nodes to reach mobile nodes based on the 64-bit prefix assigned to the home link combined with the mobile node s interface identifier used also to allow a mobile node to be reachable by having a stable entry in the DNS Home link: a link to which the home address prefix is assigned Home Agent (HA): a router located on the home link that acts as a proxy for the mobile node while away from the home link. The home agent redirects packets addressed to a mobile node s home address to its current location (care-of address) using IP-in-IP tunneling Foreign link: any link (other than the home link) visited by a mobile node 40/67 20

MIPv6 terminology (cont.) Care-of Address (CoA): an address that is assigned to the mobile node when located in a foreign link formed based on stateless or stateful (DHCP) autoconfiguration Binding: the association of the mobile node s home address with a care-of address for a certain period of time The binding is refreshed (if the refresh timer expires) or updated when the mobile node gets a new care-of address Binding cache: a cache containing a number of bindings for one or more mobile nodes A binding cache is maintained by both the home agent and the correspondent node Binding Update List: a list maintained by the mobile node containing all bindings that were sent to the mobile node s home agent and correspondent nodes maintained in order for the mobile node to know when a binding needs to be refreshed 41/67 Overview of MIPv6 While at home, the MN uses its permanent IP address (home address) When the mobile node moves from its home link to a foreign link, it first forms a CoA based on the prefix of the foreign link announced through the router advertisements Following address configuration, the mobile node informs its HA of such movement by sending a Binding Update (BU) message Correspondent node Home Agent Subnet A Internet IPv6 IPv6 router Binding Update Subnet B 42/67 21

Overview of MIPv6 (cont.) The home agent validates the message and, if the binding update is accepted, it creates an entry for the binding information in its binding cache (or updates an already existing entry) Then, it acknowledges the binding update sent by the MN Correspondent node Home Agent Subnet A Internet IPv6 IPv6 router Binding Ack Subnet B 43/67 Overview of MIPv6 (cont.) The home agent sends a proxy neighbor advertisement (actually, more than once) addressed to the all-nodes multicast address on the link (FF02::1) The advertisement includes the mobile node s home address in the target address field and the home agent s link-layer address Hence, the home agent ensures that any IP packet addressed to the mobile node is forwarded to the home agent s link-layer address The Home Agent flag is set in a router advertisement to indicate that the router sending this router advertisement is also functioning as a Mobile IPv6 home agent on this link The home agent also defends the mobile node s addresses (remember the DAD procedure related to IPv6) Upon receiving a packet addressed to the mobile node s home address, the home agent tunnels it to the mobile node s care-of address, which is included in the mobile node s binding cache entry (IPv6-in-IPv6) 44/67 22

Overview of MIPv6 (cont.) The tunnel entry point is the home agent (source address in the outer header), and the tunnel exit point is the mobile node s care-of address The tunnel is bidirectional The tunnel to the mobile node can be secured using IPsec Correspondent node Home Agent Subnet A Internet IPv6 IPv6 router tunnel Subnet B 45/67 Overview of MIPv6 (cont.) Routing packets through the home agent adds delays and uses more network bandwidth than direct communication Routing optimization is about routing packets between a mobile node and a correspondent node, using the shortest possible path The mobile node informs the correspondent node of its current location The correspondent node maintains a binding cache similar to the one maintained by the home agent. Correspondent node Home Agent Subnet A binding update and binding Ack Internet IPv6 IPv6 packets Subnet B 46/67 23

Autonomous Architecture The Access Points (Fat AP) completely implement and terminate the 802.11 function There is no backhauling of wireless traffic from the FAT AP to another device Fat APs can provide VLAN tagging, based on the SSID that the client uses to associate with the AP (Multiple SSIDs), and router-like functions, such as DHCP server capabilities Fat APs also have enhanced capabilities such as Access Control Lists (ACLs), QoS-related functions, such as enforcing IEEE 802.1p priority or DSCP (DiffServ) Each AP is independently managed The downside of such APs is complexity, so that they have uses only in small network installations 47/67 Centralized Architecture An important motivation is the location of APs Aiming at providing optimum radio connectivity for end stations, APs are typically mounted in areas which are hard-to-reach Network managers prefer to install APs just once and not have to perform complex maintenance on them WLAN Controllers CAPWAP Protocol between WLAN Controller and AP for Configuration and Control Lightweight Access Points (APs) 48/67 24

Centralized Architecture (cont.) APs are connected to a WLAN controller (WLC) through a secure tunnel The tunnel should ensure low delay for packets The Control and Provisioning of Wireless Access Points (CAPWAP) is the protocol used in order to communicate CAPWAP is responsible for discovery and selection of an WLC by the AP CAPWAP control packets are encrypted APs backhaul wireless 802.11 frames to the WLC encapsulated within CAPWAP data packets CAPWAP data packets encryption is possible, but this may result in severe throughput degradation 49/67 Centralized Architecture (cont.) Split MAC architecture: the implementation of the MAC functions is divided between the AP and the WLC APs are lightweight in the sense that they handle only a part of MAC functionalities Vendors differ in the type of MAC splitting between the AP and the WLC Typically, APs handle real-time MAC functions, such as beacon generation, probe response, control frame processing (RTS, CTS) and so on leave all the non real time MAC functionalities (authentication, association,...) to be processed by the WLC APs provide the wireless encryption while using the WLC for the actual key exchance 50/67 25

Centralized Architecture (cont.) The WLC manages the firmware and configurations of the controlled APs performs Radio Resource Management based on configuration and monitoring of the controlled APs Through CAPWAP control messages, the APs send statistics (number of transmit retries, number of erroneous frames, ) to the WLC For example, if two APs controlled by a WLC are interfering with each other, the WLC can send a signal to one of the APs to reduce its strength Handles QoS enforcement and ACL-based filtering Manages layer-2 and layer-3 mobility (the WLC acts as Mobile IP Home Agent) The extent of the several functions varies according to the vendor implementation...wlc location.. On a per-building basis? On a per-campus basis 51/67 Planning a wireless access network 52/67 26

Implications for backhaul cabling The first generation of 802.11ac products supports data rate up to 1.3 Gbps The second generation of 802.11ac products supports data rate up to 3.5 Gbps Operating at capacity, 802.11ac equipment is capable of far exceeding the performance provided by a 1000BASE-T uplink To support the multi-gigabit backhaul, future installations can be expected to utilize APs with dual or even quad 1000BASE-T uplinks, or possibly a 10GBASE-T uplink Category 6A (Class E A ) cabling should be used backhaul cabling OM3 or OM4 multimode optical fiber for backhaul should be considered where data rates higher than 10 Gbps are anticipated and for outdoor locations where distances are greater than 100m 53/67 Standards for access point cabling ISO/IEC TR-24704 proposes what it considered to be an optimal pattern for locating wireless access points The design is based on an array of tight-fitting hexagonal cells The coverage area of each cell is limited to a 12-meter radius TR-24704 recommends terminating the cable for each cell at an outlet located as close to the centre of the cell as possible 12 m 54/67 27

Standards for access point cabling (cont.) TIA TSB-162-A suggests a square grid of cabling areas, each about 18 meters wide In anticipation of the IEEE 802.11ac evolution, the revision of this standard recommends Category 6A cabling TC 55/67 Standards for access point cabling (cont.) TIA-4966 recommends that AP density within large open indoor spaces be based on expected occupancy (see table) When developing a coverage plan for facilities with multiple partitioned areas, density should be based on square footage One access point per 230 square meters for a typical office building One access point per 150 square meters in case of facilities that may be less RF friendly 56/67 28

Planning the cabling architecture Careful planning based on the RF environment, interference levels and sources, future capacity needs, cabling requirements and power needs Ideally, the cabling architecture and coverage analysis should work hand in hand to provide the maximum capacity and flexibility to meet both current and future end user needs When locating the APs, it is recommended that an RF survey be conducted to optimize the AP location(s) within a given cell Sample floor plan 57/67 RF environment An analysis of the RF environment is recommended In environments where capacity and other concerns are minimal, simply assessing RF propagation may be sufficient Some programs allow network planners to input the site s layout, conduct AP modelling, and compare RF simulations and surveys RF planning diagram with one access point deployed (grey area denotes limited or no coverage) 58/67 29

RF environment (cont.) Signal weakness could be due to a number of variables, including the presence of RF-blocking materials such as cabinets or equipment, or structural impediments such as concrete walls Adding additional APs significantly improves coverage RF planning diagram using three APs 59/67 Planning for higher capacity Along with ensuring an adequate RF signal, the aggregate throughput should be considered The space has to be divided into cells, as recommended by TIA TSB-162-A or ISO/IEC TR 24704. Floor plan configured for a square-grid deployment (TIA TSB-162-A) 60/67 30

Planning for higher capacity (cont.) AP positions and density can be adjusted to suit the occupancy RF planning diagram for high density AP deployment 61/67 AP location and cabling It is recommended to provide at least two cabling runs to each grid cell, as some grid cells may require two or more APs, and, moreover, link aggregation can be needed FD/HC Structured cabling diagram In addition to the RF environment and capacity planning, there are a number of other factors to consider in cabling and locating wireless access points (accessibility, power requirements, aesthetics,..) 62/67 31

Ad Hoc Wireless Networks Collection of mobile hosts capable to form a temporary network without the support of any fixed infrastructure (infrastructureless, selforganizing, self-configuring) Network operations, such as routing and resource management, are performed in a distributed and cooperative manner Due to limited radio transmission range, multi-hop routing is usually used Each node can act as a host and as a router: a packet is forwarded from one node to another until it reaches the destination 63/67 Applications of Ad Hoc Wireless Networks Some interesting scenarios: Military applications Emergency operations Vehicular communications Underwater communications Acoustic communications 64/67 32

Ad Hoc Wireless Networks (cont.) Due to mobility associated with the nodes, network topology may experience continuous changes A B A B Different power levels among different nodes introduce asymmetric links Resources are typically constrained (bandwidth, battery power, etc.) 65/67 Effectiveness of RTS/CTS in Ad Hoc Networks The effectiveness of RTS/CTS handshake is based on the assumption that hidden nodes are within the transmission range of receivers (so that they can receive CTS packet successfully) Some node out of the transmission range of the receiver may still interfere with the receiver Nodes within the interference range (R i ) of a receiver are called hidden nodes hidden node Area covered by RTS/CTS R tx tx d rx r hidden node Interference area not covered by RTS/CTS R i 66/67 33

Radio ranges Three radio ranges related to a wireless radio: Transmission Range (R tx ): it represents the range within which a packet is successfully received if there is no interference from other radios. The transmission range is mainly determined by transmission power and radio propagation properties (i.e., attenuation). Carrier Sensing Range (R cs ): it is the range within which a transmitter triggers carrier sense detection. This range is mainly determined by the antenna sensitivity and by the transmission power. Interference Range (R i ): it defines the interference area A i = π R i2 around a receiver. All nodes located in this area are hidden nodes of the receiver. When the receiver is receiving a packet, if a hidden node starts a transmission, a collision will happen at the receiver. Transmission range and Carrier sensing range are fixed and affected by the properties of the wireless radios The interference range is not fixed, but related to the transmitter-receiver distance and can go far beyond the transmission range 67/67 34