ECE 435 Network Engineering Lecture 8

Similar documents
ECE 435 Network Engineering Lecture 19

ECE 435 Network Engineering Lecture 22

Wireless LANs. ITS 413 Internet Technologies and Applications

Data Communications. Data Link Layer Protocols Wireless LANs

Chapter 6 Medium Access Control Protocols and Local Area Networks

Wireless Communication and Networking CMPT 371

Wireless Communications

Wireless Communication and Networking CMPT 371

Multiple Access Links and Protocols

Wireless LAN -Architecture

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Wireless Protocols. Training materials for wireless trainers

Wireless and Mobile Networks

Guide to Wireless Communications, Third Edition. Objectives

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

MSIT 413: Wireless Technologies Week 8

Data and Computer Communications. Chapter 13 Wireless LANs

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Introduction to IEEE

Mohamed Khedr.

Mobile Communications Chapter 7: Wireless LANs

Mobile & Wireless Networking. Lecture 7: Wireless LAN

3.1. Introduction to WLAN IEEE

Computer Communication III

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

CHAPTER 8: LAN Standards

MAC in /20/06

Lecture 16: QoS and "

IEEE Wireless LANs

ICE 1332/0715 Mobile Computing (Summer, 2008)

Local Area Networks NETW 901

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Wireless and Mobile Networks 7-2

Wireless# Guide to Wireless Communications. Objectives

Last Lecture: Data Link Layer

Optional Point Coordination Function (PCF)

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Lecture (08) Wireless Traffic Flow and AP Discovery

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

Chapter 6 Wireless and Mobile Networks

Computer Networks. Wireless LANs

Enabling Technologies

CSC 4900 Computer Networks: Wireless Networks

Wireless technology Principles of Security

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless Local Area Networks (WLAN)

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

Mohammad Hossein Manshaei 1393

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Nomadic Communications Labs. Alessandro Villani

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless Communication Session 4 Wi-Fi IEEE standard

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Functions of physical layer:

Multiple Access in Cellular and Systems

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

CSE 461: Wireless Networks

Advanced Computer Networks WLAN

HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS

Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Data and Computer Communications

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) Part I

Internet Protocol Stack

IEEE Wireless LANs Part I: Basics

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Solutions to Exercise Session 4,

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Introduction to Wireless Networking ECE 401WN Spring 2009

Basic processes in IEEE networks

Wireless Networks (MAC)

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Mobile Communications Chapter 7: Wireless LANs

Mohammad Hossein Manshaei 1393

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

MAC. Fall Data Communications II 1

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Transcription:

ECE 435 Network Engineering Lecture 8 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 26 September 2016

HW#3 was posted Announcements note the warnings you were getting on toupper() was because you need to include ctype.h tempest was NSA standards for keeping from being wirelessly spied on 1

Wireless Frames Diagram? Frame format frame Control (2) Duration/ID (2) Addr1 (6) Addr2 (6) Addr3 (6) Sequence control(2) Address4 (6) Frame body (0-2312) FCS (4) Control: Version (2) Type (2) [data, ctonrol, management], subtype(4) [rts,cts],tods/fromds(1,1), MF (1) more fragments to follow, Retry(1) 2

powermanagement(1), More(1) [more coming], W(1) WEP [encryption], O(1) frames must be in-order Duration says how long will occupy channel Addresses source, destination transmitter address, receiver addr. Last two optional, usually if bridge. Sequence: 12 for frame, 4 for fragment Up to 2312 byte of Data Checksum 3

802.11 Why not just Ethernet over the Air Hidden station/terminal problem A in range of B, B in range of C, but A cannot see C. If A and C transmit at same time, they ll not get collision, only way of knowing is if not get ACK. Exposed station problem. A and C not overlap, but B does not know this so holds out To deal with this, Distributed Coordination Function 4

(DCF) and point coordination function (PCF) 5

DCF Distributed Coordination Function Basic DCF No central control Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Different from Ethernet CSMA/CD. Every time ready to transmit, looks to see if can transmit (listen to see if channel clear) If clear, waits DIFS (inter frame) time and transmits If busy, waits until clear and then also a random backoff 6

time before starting There is a short inter-frame interval (SIFS) which gives time for receiver to transmit an ACK packet. If source does not get an ACK, then it backs off and retries Optional RTS/CTS mode Before sending data, sends short RTS (request to send) packet Receiver responds with short CTS (clear to send) Data only sent if CTS sent properly All stations can see both CTS *and* RTS, this and 7

hopefully avoids collisions. There s a duration field too to hint how long it will take 8

Wireless Networks Ad-hoc mode peer to peer Infrastructure mode many to access point (AP) which has a wired connection In infrastructure mode all access goes through the AP 9

Service Sets A basic service set (BSS) is a group of nodes that all recognize each other An extended service set (ESS) is a group of overlapping BSSes with APs that are connected together An AP keeps the BSSes in line by periodically transmitting beacon frames 10

PCF Point Coordination Function PCF provides central control. A point coordinator in the AP periodically transmits a beacon to announce a contention-free period (CFP). Stations keep quiet. Sort of like time-division multiplexing For power saving, base station can tell receiver to go to sleep, and buffer packets for it until wakes up Can combine PCF and DCF in same cell. 11

Must provide 9 services Wireless Services intracell for dealing with things outside of a cell Association allow stations to connect to base stations. When arriving announce its identity and capability Disassociation either side may break the association, should do it before shutting down Reassociation can change preferred base station, useful for handover (but best-effort) 12

Distribution determines best way to route frames Integration in case frame needs to be sent through a non-802.11 network Intercell Authentication check password Deauthentication to leave network Privacy encryption Data delivery modeled on Ethernet, no guarantees frames will get in 13

Encryption WEP Wired Equivalent Privacy Used RC4 and CRC32 Deprecated 2004 Meant to be 64 bit, originally 40 but due to export limitations Later 128-bit. Can enter in hex or ASCII chars Can be cracked fairly quickly these days WPA Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) 64 or 128 bit encryption key 14

WPA2 15

Authenticated Three states: not authenticated, authenticated but not associated, authenticated and associated device sends probe requests. Advertise data rates and what version of 802.11 supported. BSSID of ff:ff:ff:ff:ff:ff so all access points that hear it will respond if an access point (AP) supports a common data rate, it will respond with SSID, data rate, encryption mode, etc device chooses an access point and authenticates. 16

Originally this would have been WEP, but deprecated so often happens in open and usually succeeds. Device sends a 802.11 open authentication frame, seq 0x01 AP responds saying open with seq 0x02 if AP receives frames other than auth or probe from device, responds with a deauth to make it start over A device can be authenticated to multiple APs but only associated with one device determines who to associate with and requests 17

AP responds and creates association ID once associated then WPA/WPA2 has to happen still before data can flow 18

More 802.11b signal typically around 32mW Often use dbmw where 0dBm=1mW 1dBm = 0.001258925W P = 1W 10 P dbm/10 /1000 200??? -68 dbm = 160pW P dbm = 10 log 10 (1000 P W /1W ) 802.11b, DSSS 2.4GHz, 2412MHz as first channel, 14 channels 5MHz apart 1-14. 802.11g same as 802.11b when talking to b, but a modes 19

when talking to other g 802.11a 5GHz band, channels 1-199 starting at 5005MHz 5MHz apart CMSA/CA uses RTS/CTS. 802.11g needs to do this if 802.11b present, slowing things down 20-50% 20

Linux Interface wlan0 IEEE 802.11abg ESSID:"Whatever" Mode:Managed Frequency:2.452 GHz Acce Bit Rate=54 Mb/s Tx-Power=200 dbm Retry short limit:7 RTS thr:off Fra Encryption key:xxxxx Power Management:off Link Quality=42/70 Signal level=-68 db Rx invalid nwid:0 Rx invalid crypt:0 Tx excessive retries:0 Invalid misc:0 21

Bluetooth Applications Headsets Wireless controllers (Wii, PS3) 22

Bluetooth 1994 Ericsson. formed a SIG. With IBM, Intel, Nokia and Toshiba Named after Harald Blaatand (Bluetooth II (940-981) a Viking kind who united (conquered) Denmark and Norway. Unite various standards. Get rid of cables, specifically serial cables Interferes with 802.11 23

IEEE came in an decided to take standard and make it 802.15.1 but no longer maintains it 24

Bluetooth Architecture Basic unit: piconet, master node and up to seven *active* slave nodes within 10m Many can exist in an area, and can be connected by a bridge. Connected piconets are called a scatternet There can also be up to 255 parked nodes in a picnoet When parked, can only respond to activation on beacon Hold and siff? 25

Slaves designed to be cheap, so dumb. Master is smart and runs them. slave/slave communication not possible Master broadcasts clock 312.5us. even, slave in odd. Master transmits in 26

Bluetooth Applications Profiles Bluetooth V1.1 has 13 different application protocols. Required generic access link management service discovery discovering services Serial port Object exchange Networking LAN access Dial-up 27

Fax Telephony Cordless phone Intercom Headset File exchange Object push File transfer Synchronization 28