CS263: Wireless Communications and Sensor Networks

Similar documents
Local Area Networks NETW 901

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks. Networks: Wireless LANs 1

Unit 7 Media Access Control (MAC)

Wireless Local Area Networks (WLANs) Part I

Wireless Communications

CMPE 257: Wireless and Mobile Networking

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Data and Computer Communications. Chapter 13 Wireless LANs

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Multiple Access Links and Protocols

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless LANs. ITS 413 Internet Technologies and Applications

CMPE 257: Wireless and Mobile Networking

Chapter 6 Medium Access Control Protocols and Local Area Networks

CSE 461: Wireless Networks

Lecture 16: QoS and "

Mohamed Khedr.

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Last Lecture: Data Link Layer

IEEE Technical Tutorial. Introduction. IEEE Architecture

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

Multiple Access in Cellular and Systems

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

3.1. Introduction to WLAN IEEE

MSIT 413: Wireless Technologies Week 8

IEEE MAC Sublayer (Based on IEEE )

Computer Networks. Wireless LANs

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Wireless LAN. Access Point. Provides network connectivity over wireless media

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

ICE 1332/0715 Mobile Computing (Summer, 2008)

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 6 Wireless and Mobile Networks

Wireless Protocols. Training materials for wireless trainers

Wireless LAN -Architecture

MAC. Fall Data Communications II 1

Wireless and Mobile Networks 7-2

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Network Security Spring 2013

CS698T Wireless Networks: Principles and Practice

Wireless Network Security Spring 2014

MULTIPLE ACCESS PROTOCOLS 2. 1

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Lesson 2-3: The IEEE x MAC Layer

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Advanced Computer Networks WLAN

15-441: Computer Networking. Wireless Networking

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Wireless Local Area Network (IEEE )

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

Wireless Network Security Spring 2015

Wireless Communication and Networking CMPT 371

CSE 461: Multiple Access Networks. This Lecture

CSC 4900 Computer Networks: Wireless Networks

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Guide to Wireless Communications, Third Edition. Objectives

Wireless technology Principles of Security

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Mobile and Sensor Systems

Wireless and Mobile Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Introduction to IEEE

Wireless Communication and Networking CMPT 371

CS263: Wireless Communications and Sensor Networks

Wireless# Guide to Wireless Communications. Objectives

IEEE Wireless LANs

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Data Link Layer -2- Network Access

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Mobile Communications Chapter 7: Wireless LANs

IEEE Wireless LANs Part I: Basics

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

ECE442 Communications Lecture 3. Wireless Local Area Networks

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Wireless Network Security Spring 2012

Wireless Network and Mobility

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

ICE 1332/0715 Mobile Computing (Summer, 2008)

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

ECEN 5032 Data Networks Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer

Mohammad Hossein Manshaei 1393

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Transcription:

CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1

All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP and 802.1x Security 2004 Matt Welsh Harvard University 2

802.11 / WiFi IEEE working group 802.11 formed in 1990 Now the most popular and pervasive Wireless LAN standard Access point Distribution system Basic service set 2004 Matt Welsh Harvard University 3

Infrastructure vs. Independent Mode Independent mode: Nodes communicate directly with each other Infrastructure mode: All communications must be relayed by access point 2004 Matt Welsh Harvard University 4

Extended Service Set Model Entire ESS looks like a single virtual LAN! Propagate association information Distribution system Create association 2004 Matt Welsh Harvard University 5

Extended Service Set Model Entire ESS looks like a single virtual LAN! A Transmit to node B Distribution system B 2004 Matt Welsh Harvard University 6

Distributed Coordination Function 802.11 uses a variant of CSMA Called the Distributed Coordination Function (DCF) Access point controls when nodes can transmit. No collision detection rather, collision avoidance (CSMA/CA) Recall CSMA: Before a node transmits, it listens for activity on the network If medium is busy, node waits to transmit After medium is clear, don't immediately start transmitting... Otherwise all nodes would start talking at the same time! Instead, delay a random amount of time (random backoff) 2004 Matt Welsh Harvard University 7

DCF Illustrated Interframe space (IFS) Sender Channel busy Wait Backoff Transmit Backoff Transmit ACK ACK Receiver time 2004 Matt Welsh Harvard University 8

Exponential Backoff ACK-based scheme for reliability Receiver sends ACK after each successful transmission Sender will retransmit if no ACK is heard, after waiting for a random interval Binary exponential backoff First backoff interval between [0... 31] time slots If collision occurs, new backoff interval chosen between [0... 63] slots Repeat until backoff interval reaches [0...1023] slots. Why increase the backoff interval each time??? 2004 Matt Welsh Harvard University 9

SIFS and DIFS 802.11 provides four different interframe spacing times Provide different traffic priorities Standard IFS time is the Distributed IFS (DIFS) Short IFS (SIFS) used for higher priority frames e.g., ACK packets from AP back to a node Allows ACKs to sneak in before contention period begins Sender Channel busy Wait Backoff Transmit DIFS DIFS Backoff Transmit Receiver SIFS ACK 2004 Matt Welsh Harvard University 10

Fragmentation and Reassembly time Sender Channel busy Wait Backoff RTS Transmit frame 0 Transmit frame 1 Backoff CTS ACK ACK Receiver Long messages broken into multiple frames Node can transmit next frame in a sequence immediately after receiving ACK But, must do backoff before sending next message Transmitter reserves the channel using request to send (RTS) Receiver transmits clear to send (CTS) to initiate transmission of long message 2004 Matt Welsh Harvard University 11

Hidden Terminal Problem A B C Node C is not aware of Node A's transmissions! Collisions can occur at Node B Solution: Network Allocation Vector (NAV) Each message includes length of time other nodes must wait to send Node B's CTS to Node A can be heard by Node C CTS will prevent Node C from transmitting before Node A is done 2004 Matt Welsh Harvard University 12

802.11 Standards Standard Frequency Data rate Range 802.11b 2.4 Ghz, DSSS 11 Mbps ~300 feet, Widely deployed and inexpensive ~100' indoors 802.11g 2.4 Ghz, O-FDM 54 Mbps < 802.11b Backwards compatible with 802.11b 802.11a 5 Ghz, O-FDM 54 Mbps ~80 feet Uses UNII band, products emerging now 2004 Matt Welsh Harvard University 13

802.11b PHY Original 802.11 standard used Frequency Hopping, G-FSK Divide 2.4 Ghz band into 78 channels, 1 MHz wide Dwell time of 390 ms per channel 26 different, fixed (globally known) hop sequences 802.11b standardized on DSSS with Q-PSK modulation 8-bit Complementary Code Keying (previous lecture) Band divided into 14 channels, 5 MHz wide each However, DSSS energy spread over a 22 MHz band!!! Channel 1 Channel 6 Channel 11 25 MHz This means that not all channels can be used simultaneously. 2004 Matt Welsh Harvard University 14

802.11 Security: WEP Wireless networks are inherently a broadcast medium! It is easy to intercept transmissions between end hosts Compare to wired systems: Must physically tap into the wires Nightmare for companies: Hacker in the parking lot with a laptop Wired Equivalent Privacy (WEP) Rather than provide 802.11 with a truly robust security solution, goal was to prevent casual snooping Problem: WEP was developed from scratch by a closed committee, standard not readily accessible for review by researchers WEP relies on a secret key being shared by end hosts and APs Traffic between nodes is encrypted using this key Requires key to be distributed in some fashion by system admins Makes it very difficult to change the key later! 2004 Matt Welsh Harvard University 15

WEP Weaknesses In 2001, researchers at UC Berkeley demonstrated that WEP was vulnerable to a range of attacks 40-bit encryption keys are susceptible to brute force attacks WEP reuses portions of the random keystring making analysis possible Attackers can modify contents of frames without necessarily decrypting them Not long afterwards, WEP cracking software was demonstrated Adam Stubblefield, Rice undergrad doing internship at AT&T, wrote the code in less than a week on a Linux laptop Open source AirSnort software now widely available Can recover a WEP key after intercepting 5-10 million packets Bottom line: Don't depend on WEP! WEP is so flawed that it is not worth using in many cases. -- Matthew S. Gast, 802.11 Wireless Networks: The Definitive Guide 2004 Matt Welsh Harvard University 16

What to do? Industry is working on solutions based on new 802.1x standard This is not without its problems, however Better solution: End-to-end security Don't depend on underlying network infrastructure to ensure security Rather, perform authentication and encryption at the application level Common solution: SSL/TLS protocol Same protocol used by Web browsers to talk to secure Web servers Provides a range of authentication and encryption options No assumptions about security of the underlying network 2004 Matt Welsh Harvard University 17

Next Lecture Bluetooth and 802.15.4 Reading: Stallings Chapter 15 (No required reading on 802.15.4) 2004 Matt Welsh Harvard University 18