Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Similar documents
Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Wireless LAN. Access Point. Provides network connectivity over wireless media

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Guide to Wireless Communications, Third Edition. Objectives

Wireless Local Area Networks. Networks: Wireless LANs 1

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

The Medium Access Control Sublayer

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Communications

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless# Guide to Wireless Communications. Objectives

Wireless Communication and Networking CMPT 371

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Wireless technology Principles of Security

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

EEC-484/584 Computer Networks

IEEE Romel Rudyard J. Lucentales, ECE 5

Wireless# Guide to Wireless Communications. Objectives

Wireless Communication and Networking CMPT 371

Medium Access Control Sublayer Chapter 4

Technical Introduction

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards

Chapter 6 Wireless and Mobile Networks

Wireless LAN -Architecture

Chapter 3.1 Acknowledgment:

Local Area Networks NETW 901

Guide to Wireless Communications, 3 rd Edition. Objectives

Overview of Wireless LANs

MSIT 413: Wireless Technologies Week 8

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

...IEEE What is IEEE compliance. Introduction. WaveLAN Sales Bulletin May IEEE Committee

Wireless and Mobile Networks 7-2

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Distributed Queue Dual Bus

Lecture Objectives. Lecture 1 Wireless Environment and Wireless LANs. Agenda (1) Agenda (2) Wireless Spectrum (1)

CSC 4900 Computer Networks: Wireless Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

Wi-Fi. Metro Part 1. Metropolitan based Wi- Friend or Foe?

Wireless Local Area Network (IEEE )

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

ECE 435 Network Engineering Lecture 8

Chapter 4: The Medium Access Layer

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Introduction to Wireless Networking ECE 401WN Spring 2009

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

Mohammad Hossein Manshaei 1393

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

IEEE Wireless LANs

CS263: Wireless Communications and Sensor Networks

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Amarjeet Singh. February 7, 2012

e-pg Pathshala Quadrant 1 e-text

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Investigation of WLAN

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Wireless and Mobile Networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Mobile and Sensor Systems

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

C H A P T E R Overview Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for Mac OS OL

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Wireless networks. Wireless Network Taxonomy

CMPE 257: Wireless and Mobile Networking

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

The Wi-Fi Boom. Dr. Malik Audeh Tropos Networks March 13, 2004

Unit 10. Author: W.Buchanan. Mobile Computing and A Model of the Internet (1)

Attack & Defense in Wireless Networks

Strengthening Unlicensed Band Wireless Backhaul

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect

CHAPTER 3 BLUETOOTH AND IEEE

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Functions of physical layer:

Medium Access Control Sublayer

Wireless# Guide to Wireless Communications. Objectives

CS 332 Computer Networks Wireless Networks

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

COMP 3331/9331: Computer Networks and Applications

Reading. Read 3 MPLS links on the class website

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

CS263: Wireless Communications and Sensor Networks

Computer Networks. Wireless LANs

Transcription:

Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July 1990 to develop CSMA/CA, a variation of CSMA/CD (Ethernet)-based wireless LANs. The working group produced the first 802.11 standard in 1997, which specifies wireless LAN devices capable of operating up to 2 Mbps using the unlicensed 2.4-GHz band. Currently, the working group has nine basic task groups and each is identified by a letter from a to i. Following are the current 802.11 task groups and their primary responsibilities: 802.11a. Provides a 5-GHz band standard for 54-Mbps transmission rate. 802.11b. Specifies a 2.4-GHz band standard for up to 11-Mbps transmission rate. 802.11c. Gives the required 802.11-specific information to the ISO/IEC 57 10038 (IEEE 802.1D) standard 802.11 The 802.11 Family of Standards 802.11d. Adds the requirements and definitions necessary to allow 802.11 wireless LAN equipment to operate in markets not served by the current 802.11 standard. 802.11e. Expands support for LAN applications with Quality of Service requirements. 802.11f. Specifies the necessary information that needs to be exchanged between access points to support the P802.11 DS functions. 802.11g. Develops a new PHY extension to enhance the performance and the possible applications of the 802.11b compatible networks by increasing the data rate achievable by such devices. 802.11h. Enhances the current 802.11 MAC and 802.11a PHY with network management and control extensions for spectrum and transmit power management in 5-GHz license exempt bands. 802.11i. Enhances the current 802.11 MAC to provide improvements in security. 58 802.11 refers to a family of specifications developed by the IEEE for wireless LAN technology. The original 802.11 standard specifies an over-the-air interface between a wireless client and a base station or between two wireless clients. The IEEE accepted the specification for 802.11 in 1997. The task groups within the 802.11 working group have produced few extensions to the original specification. The products of these extensions are named after the task group and the original specification-for example, 802.11b is an extension developed by the task group b. The most popular extensions of 802.11 specifications are 802.11b, 802.11a, and 802.11g 59 The 802.11 Standard Details The 802.11 standard specifies wireless LANs that provide up to 2 Mbps of transmission speed and operate in the 2.4-GHz Industrial, Scientific, and Medical (ISM) band using either frequency-hopping spread spectrum (FHSS) or direct-sequence spread spectrum (DSSS). The IEEE approved this standard in 1997. The standard defines a physical layer (PHY), a medium access control (MAC) layer, the security primitives, and the basic operation modes The Physical Layer The 802.11 standard supports both radio frequency- and infrared-based physical network interfaces. However, most implementations of 802.11 use radio frequency 60 61

802.11 Frequency Bandwidth 802.11 standard-compliant devices operate in the unlicensed 2.4-GHz ISM band. Due to the limited bandwidth available when the electromagnetic spectrum is used for data transmission, many factors have to be considered for reliable, safe, and high-performance operation. These factors include the technologies used to propagate signals within the RF band, the time that a single device is allowed to have an exclusive transmission right, and the modulation scheme. For these reasons, FCC regulations require that radio frequency systems must use spread spectrum technology when operating in the unlicensed bands Spread Spectrum Technology The 802.11 standard mandates using either DSSS or FHSS. In FHSS, the radio signal hops within the transmission band. Because the signal does not stay in one place on the band, FHSS can elude and resist radio interference. DSSS avoids interference by configuring the spreading function in the receiver to concentrate the desired signal, and to spread out and dilute any interfering signal 62 63 Direct-Sequence Spread Spectrum (DSSS) In DSSS the transmission signal is spread over an allowed band. The data is transmitted by first modulating a binary string called spreading code. A random binary string is used to modulate the transmitted signal. This random string is called the spreading code. The data bits are mapped to a pattern of "chips" and mapped back into a bit at the destination. The number of chips that represent a bit is the spreading ratio. The higher the spreading ratio, the more the signal is resistant to interference. The lower the spreading ratio, the more bandwidth is available to the user. The FCC mandates that the spreading ratio must be more than 10. Most products have a spreading ratio of less than 20. The transmitter and the receiver must be synchronized with the same spreading code. Recovery is faster in DSSS systems because of the ability to spread the signal over a wider band. 64 Frequency-Hopping Spread Spectrum (FHSS) This spread spectrum technique divides the band into smaller subchannels of usually 1 MHz. The transmitter then hops between the subchannels sending out short bursts of data for a given time. The maximum amount of time that a transmitter spends in a subchannel is called the dwell time. In order for FHSS to work correctly, both communicating ends must be synchronized (that is, both sides must use the same hopping pattern), otherwise they lose the data. FHSS is more resistant to interference because of its hopping nature. The FCC mandates that the band must be split into at least 75 subchannels and that no subchannel is occupied for more than 400 milliseconds. Debate is always ongoing about the security that this hopping feature provides. 65 Frequency-Hopping Spread Spectrum (FHSS) Since there are only 75 subchannels available, the hopping pattern has to be repeated once all the 75 subchannels have been hopped. HomeRF FHSS implementations select the initial hopping sequence in a pseudorandom fashion from among a list of 75 channels without replacement. After the initial 75 hops, the entire sequence is repeated without any replacement or change in the hopping order. An intruder could possibly compromise the system by monitoring and recording the hopping sequence and then waiting till the whole sequence is repeated. Once the hacker confirms the hopping pattern, he or she can predict the next subchannel that hopping pattern will be using thereby defeating the hopping advantage altogether. HomeRF radios, for example, hop through each of the 75 hopping channels at a rate of 50 hops per second in a total of 1.5 seconds, repeating the same pattern each time, enabling a hacker to guess the hopping sequence in 3 seconds Frequency-Hopping Spread Spectrum (FHSS) Nevertheless, this technique still provides a high level of security in that expensive equipment is needed to break it. Many FHSS LANs can be colocated if an orthogonal hopping sequence is used. Since the subchannels in FHSS are smaller than DSSS, the number of colocated LANs can be greater with FHSS systems. The most commonly used standard based on FHSS is HomeRF 66 67

The 802.11 Protocol Stack The 802.11 Extensions Part of the 802.11 protocol stack 68 The 802.11 Working Group realized that the initial standard that was passed in 1997 would not be sufficient to attract implementers. Therefore, the working group established various task groups with the responsibilities to develop different extensions to the 802.11 standard. The idea behind having different task groups is to develop standards for different types of usage scenarios that still conform to a basic set of operating rules and are still interoperable to a certain extent. The most promising standards at this time include 802.11b, 802.11a, 802.11g, and 802.11e 69 802.11b 802.11b 802.11b is an extension to 802.11 that operates at speeds up to 11 Mbps transmission (with a fallback to 5.5, 2, and 1 Mbps) in the 2.4-GHz band and uses only DSSS. 802.11b is also known as 802.11 high rate or wireless fidelity (Wi-Fi) Now with operating speeds up to 11 Mbps, it is far more practical to use the wireless LANs than the conventional wired LANs. It is being used in Small Office Home Office (SoHo) environments, enterprises, and by Wireless Internet Service Providers (WISPs). 802.11b Limitations 802.11b is haunted by the possibility of interference in the 2.4-GHz frequency band in which it operates. The 2.4-GHz frequency is already crowded and will soon be more so. Microwave ovens operate at 2.4 GHz and can deter the performance of 802.11 wireless networks. Many powerful cordless phones also operate at the 2.4-GHz frequency. If you use 802.11b networking products, forget about using these phones in the same area. Blue-tooth, the short-range wireless networking standard, which also operates in the 2.4-GHz range, is slated to coexist with wireless LANs 70 71 802.11a 802.11a is an extension to 802.11, which operates at speeds of up to 54-Mbps transmission rate (with a fallback to 48, 36, 24, 18, 12, and 6 Mbps) in the more recently allocated 5-GHz Unlicensed National Information Infrastructure (UNII) band. 802.11a uses an Orthogonal Frequency Division Multiplexing (OFDM) encoding scheme as its spread spectrum technology Because 802.11a operates in 5 GHz, it can coexist with 802.11b networks without causing any interference. 802.11a is being used to connect network backbones in small enterprise environments and the applications that 802.11a 802.11a networks are incompatible with the 802.11b networks due to the difference in the radio frequency band used by 802.11a (802.11b uses 2.4 GHz whereas 802.11a uses 5 GHz), and the speeds they operate at (802.11b has a maximum operating speed of 11 Mbps whereas 802.11a operates at up to 54 Mbps). The benefits of OFDM are high spectral efficiency, resiliency to RF interference, and lower multipath distortion require high bandwidth 72 73

802.11g The 802.11g standard is still under development. The 802.11g standard operates in the 2.4-GHz band and provides speeds up to 54 Mbps (with a fallback to 48, 36, 24, 18, 11, 5.5, 2, and 1 Mbps). The 802.11g differs from 802.11b because it can optionally use OFDM (802.11g draft mandates that OFDM be used for speeds above 20 Mbps). Though 802.11g devices would provide higher speed than the currently available 802.11b devices, it still suffers the interference issue with other devices operating in the same RF band, primarily the Bluetooth devices The MAC The working group chose the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), a derivative of CSMA/CD, as the MAC protocol for the 802.11 standard. CSMA/CA works as follows: The station listens before it sends. If someone is already transmitting, it waits for a random period and tries again. If no one is transmitting, then it sends a short message. This message is called the ready-to-send message (RTS). This message contains the destination address and the duration of the transmission. Other stations now know that they must wait that long before they can transmit. 74 75 The 802.11 MAC Sublayer Protocol The 802.11 MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem. 76 The use of virtual channel sensing using CSMA/CA 77 The 802.11 MAC Sublayer Protocol The 802.11 MAC Sublayer Protocol (4) A fragment burst. Because of the much higher probability of interference, a frame is sometimes split into Interframe spacing in 802.11 smaller fragments 78 79

The 802.11 Frame Structure 802.11 Services The 802.11 data frame Distribution Services Association Disassociation Reassociation Distribution Integration Intracell Services Authentication Deauthentication Privacy Data Delivery 80 81 802.11 Services Association Used by mobile stations to connect themselves to a base station Disassociation Breaking the relationship to a base station Re-association Used by a mobile station to change it s base station Useful for stations moving from one cell to another Distribution Determines how to route frames sent to a base station Integration Handles translating the frames into non-802.11 formats Broadband Wireless The 802.16 Protocol Stack The 802.16 Physical Layer The 802.16 MAC Sublayer Protocol The 802.16 Frame Structure 82 83 The 802.16 Protocol Stack QPSK Constellation 84 85

QAM-16 Constellation QAM-64 Constellation 86 87 The 802.16 Physical Layer The 802.16 Physical Layer (2) Frames and time slots for time division duplexing 88 89 802.16 MAC Sublayer The data link layer is subdivided into three sublayers In the security sublayer, the payload is encrypted, but the headers are not So, a snooper can see who is talking to whom, but not what is being said The MAC frame is composed of subframes They tell what is in which time slot and which time slots are free The 802.16 MAC Sublayer Protocol The downstream channel has 4 classes of service Constant bit rate service (CBR) Real-time variable bit rate service (VRT) Non-real-time variable bit rate service (NVRT) Best efforts service The first 3 classes map directly to various classes of service in ATM The last class maps to an IP or Ethernet class of service All 802.16 services are connection-oriented 90 91

The 802.16 Frame Structure Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Frame Structure (a) A generic frame. (b) A bandwidth request frame 92 93 Bluetooth Bluetooth came out of the efforts to define a Personal Area Network standard Realistically, it started because someone wanted to use his cell phone to connect to the Internet without a cable The IEEE came along afterwards and wrote the 802.15 standard Which basically standardized what the manufacturers had already standardized on The hope is that by having an impartial standard, the technology may gain wider adoption as it won t be subject to corporate whims and politics 94 Bluetooth The basic unit is the Personal Area Network, or Piconet A Piconet consists of a master node and up to 7 active slave nodes A Piconet can have up to 255 non-active parked nodes All communications is between master and slave There are no slave-slave communications 95 Bluetooth Architecture Bluetooth Applications Two piconets can be connected to form a scatternet 96 97

The Bluetooth Protocol Stack The Bluetooth Frame Structure The 802.15 version of the Bluetooth protocol architecture A typical Bluetooth data frame 98 99 Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs 100 Data Link Layer Switching Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN 101 Bridges from 802.x to 802.y Bridges from 802.x to 802.y Operation of a LAN bridge from 802.11 to 802.3 102 The IEEE 802 frame formats 103

Local Internetworking Spanning Tree Bridges A configuration with four LANs and two bridges 104 Two parallel transparent bridges 105 Spanning Tree Bridges (2) Remote Bridges (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree. 106 Remote bridges can be used to interconnect distant LANs 107 Repeaters, Hubs, Bridges, Switches, Routers and Gateways Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) Which device is in which layer (b) Frames, packets, and headers 108 (a) A hub. (b) A bridge. (c) a switch 109

Virtual LANs Virtual LANs (2) A building with centralized wiring using hubs and a switch (a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches 110 111 The IEEE 802.1Q Standard The IEEE 802.1Q Standard (2) Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not The 802.3 (legacy) and 802.1Q Ethernet frame formats 112 113