Wireless Mesh Networks

Slides:



Advertisements
Similar presentations
Medium Access Control Onno W. Purbo
Advertisements

Contents IEEE MAC layer operation Basic CSMA/CA operation
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
MAC Architecture Module-7 Jerry Bernardini Community College of Rhode Island 6/18/2015Wireless Networking J. Bernardini1.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
WLAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE WLAN architecture Basic routing example IAPP.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
IEEE Wireless LAN Standard
WLAN.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Chapter 14 Wireless LANs.
WLAN 1. IEEE Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers – IR – FHSS – DSSS.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
IEEE : High-rate WPAN Overview
Wireless Local Area Network
September 2004 Extending MAC Management operation for external networks information advertisement to the AP using L 2.5
Chapter 6 Wireless and Mobile Networks
Wireless LANs Wireless proliferating rapidly.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Ad Hoc/Sensor Networks: From IEEE 802
Wireless Technology.
Wireless Mesh Networks
CSE 4905 Network Security Overview
Chapter 2 Wireless LANS and PANS
CS 457 – Lecture 7 Wireless Networks
Proposal for ESS Mesh Date: Authors:
EEC-484/584 Computer Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Basic processes in IEEE networks Configuration parameters
Chapter 15 Wireless LANs.
Stephen McCann, Siemens Roke Manor
Protocol Details John Bellardo UCSD.
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
2/17/2019 Interpretations of the Distribution System Service Based on the Specification W. Steven Conner, Intel Corp. Tricci So, Nortel Networks.
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
EEC-484/584 Computer Networks
Suggested Clarification of s ESS Mesh Terminology
Mobility Support in Wireless LAN
Computer Networks Presentation IEEE Architecture
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
Response to Coexistence Presentations
Naval Research Laboratory Dynamic Backbone Subnets
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

Wireless Mesh Networks Anatolij Zubow (zubow@informatik.hu-berlin.de) WLAN – 802.11 Overview

Contents IEEE 802.11 WLAN architecture Management frames Basic routing example IAPP and mobility management Basic frame structure MAC header structure Usage of MAC address fields Management frames Some IEEE 802.11 standard amendments

IEEE 802.11 WLAN architecture 802.11 defines two BSS (Basic Service Set) options: Infrastructure BSS Independent BSS (Ad-Hoc network) wired LAN AP

Infrastructure BSS This is by far the most common way of implementing WLANs. The base stations connected to the wired infrastructure are called access points (AP). Wireless stations in an Infrastructure BSS must always communicate via the AP (never directly). Before stations can use the BSS: Association. Infrastructure BSS wired LAN AP

Independent BSS Mainly of interest for military applications. No access point is required, stations can communicate directly. Efficient routing of packets is not a trivial problem (routing is not a task of 802.11). Independent BSS (Ad-Hoc network)

Extended Service Set (ESS) This is a larger WLAN network consisting of a number of BSS networks interconnected via a common backbone AP AP AP 802.11 supports link-layer mobility within an ESS (but not outside the ESS)

Distribution System (DS) This is the mechanism by which APs and other nodes in the wired IP subnetwork communicate with each other. Distribution System (DS) Router External network (LAN or Internet) AP AP This communication, using the Inter-Access Point Protocol (IAPP), is essential for link-layer mobility (→ stations can seamlessly move between different BSS networks).

Distribution system (2) For instance, when a wireless station moves from one BSS to another, all nodes must update their databases, so that the DS can distribute packets via the correct AP. Distribution System (DS) Router AP 1 AP 2 AP 1, AP 2 and router: update your databases! Packets for this WS will now be routed via AP 2. WS WS moves to another BSS

Distribution System (DS) Basic routing example When WS associates with AP 2, the router in charge of the IP subnet addressing obtains an IP address from the DHCP (Dynamic Host Configuration Protocol) server. External network (LAN or Internet) Distribution System (DS) Router AP 1 AP 2 2 1 Association Fetch IP address 1 DHCP Server 2 WS

Basic routing example (2) The router must maintain binding between this IP address and the MAC address of the wireless station. External network (LAN or Internet) Distribution System (DS) Router 124.2.10.57  00:90:4B:00:0C:72 AP 1 AP 2 00:90:4B:00:0C:72 WS

Basic routing example (3) The globally unique MAC address of the wireless station is used for routing the packets within the IP subnetwork (DS + attached BSS networks). External network (LAN or Internet) Distribution System (DS) Router 124.2.10.57  00:90:4B:00:0C:72 AP 1 AP 2 00:90:4B:00:0C:72 WS

Basic routing example (4) The router must also know (and use) the MAC address of the access point via which the packets must be routed. For this purpose, a special protocol (IAPP) is needed! External network (LAN or Internet) Distribution System (DS) Router 00:03:76:BC:0D:12 124.2.10.57  00:90:4B:00:0C:72 00:03:76:BC:0D:12 AP 1 AP 2 00:90:4B:00:0C:72 WS

IAPP (Inter-Access Point Protocol) IAPP (defined in IEEE 802.11f) offers mobility in the Data link layer (within an ESS = Extended Service Set). External network (LAN or Internet) Distribution System (DS) Router AP 1 AP 2 AP 3 1 2 IAPP: APs must be able to communicate with each other when the station moves around in the WLAN

In addition to IAPP … IAPP alone is not sufficient to enable seamless handovers in a WLAN. The stations must be able to measure the signal strengths from surrounding APs and decide when and to which AP a handover should be performed (no 802.11 standardised solutions are available for this operation). In 802.11 networks, a handover means reassociating with the new AP. There may be two kinds of problems: will handover work when APs are from different vendors? will handover work together with security solutions?

IEEE 802.11 frame structure : TCP/IP protocol suite (usually) : IP IP packet IP IEEE 802 H LLC payload LLC MAC H MSDU (MAC SDU) MAC MPDU (MAC Protocol Data Unit) PHY H PSDU (PLCP Service Data Unit) PHY PPDU (PLCP Protocol Data Unit)

SDU (Service Data Unit) is sent between protocol layers PDU vs. SDU Payload of a PDU in layer N = SDU to/from the layer N+1 : : SDU (Service Data Unit) is sent between protocol layers IP IP LLC LLC MAC MAC PDU (Protocol Data Unit) is sent between network nodes (in a specific protocol layer) PHY PHY

MPDU (MAC Protocol Data Unit) MAC header structure MPDU (MAC Protocol Data Unit) Addr 1 Addr 2 Addr 3 Addr 4 (optional) MAC payload FCS Duration field (contains NAV value) Sequence Control field (numbering of frames modulo 4096) One byte (eight bits) Frame Control field (type of frame & various flag bits)

Content of Frame Control field One bit Protocol Type … Subt. of frame 1 2 3 4 5 6 7 8 Protocol: Indicates IEEE 802.11 MAC Type: 00 (Management frames) 01 (Control frames) 10 (Data frames) Subtype of frame: Describes type of management, control, or data frame in more detail (e.g. ACK => 1101)

Flags in Frame Control field One bit Protocol Type … Subt. of frame 1 2 3 4 5 6 7 8 1: Bit is set if frame is sent to AP 2: Bit is set if frame is sent from AP 3: Used in fragmentation 4: Bit is set if frame is retransmitted 5: Power management bit (power saving operation) 6: More data bit (power-saving operation) 7: Bit is set if WEP is used 8: Strict ordering of frames is required

Usage of MAC address fields MPDU (MAC Protocol Data Unit) Addr 1 Addr 2 Addr 3 Addr 4 Address 1: Receiver (wireless station or AP) Address 2: Sender (wireless station or AP) Address 3: Ultimate source/destination (router in DS) Address 4: Only used in Wireless Bridge solutions: LAN LAN AP AP

Direction: AP  wireless station Addr 1 Addr 2 Addr 3 Addr 1: Receiver (wireless station) Addr 2: Transmitter = BSSID (AP) Addr 3: Ultimate source (router) Router 3 2 BSSID: MAC address of AP SSID: Alphanumeric name of AP (or BSS) AP 1

MAC addressing example Frames to the WS must also include the MAC address of the ”ultimate source” to which return frames should be routed (then ”ultimate destination”). External network Distribution System (DS) Router 00:03:76:BC:0D:12 00:20:34:B2:C4:10 AP 1 AP 2 2 3 00:90:4B:00:0C:72 WS 1

Direction: Wireless station  AP Addr 1 Addr 2 Addr 3 Addr 1: Receiver = BSSID (AP) Addr 2: Transmitter (wireless station) Addr 3: Ultimate destination (router) Router 3 1 AP 2

Management frames In addition to the data frames (containing the user data to be transported over the 802.11 network) and control frames (e.g. acknowledgements), there are a number of management frames. Note that these management frames compete for access to the medium in equal terms (using CSMA/CA) with the data and control frames. Some of these management frames are presented on the following slides.

Beacon frames Beacon frames are broadcast (meaning that all stations shall receive them and read the information) at regular intervals from the Access Point. These frames contain (among others) the following information: Timestamp (8 bytes) is necessary, so that stations can synchronise to the network Beacon interval (2 bytes) in milliseconds Capability info (2 bytes) advertises network capabilities SSID (0 ... 32 bytes), alphanumeric “network name” The channel number used by the network (optional).

Probe request & response frames A probe request frame is transmitted from a wireless station during active scanning. Access points within reach respond by sending probe response frames. Probe request frames contain the following information: SSID (0 ... 32 bytes), alphanumeric “network name” Bit rates supported by the station. This is used by APs to see if the station can be permitted to join the network. Probe response frames actually contain the same kind of “network information” as beacon frames.

Association request & response frames Before a station can join an 802.11 network, it must send an association request frame. The AP responds with an association response frame. Association request frames contain (among others): SSID, capability info, bit rates supported. Association response frames contain (among others): Capability info, bit rates supported Status code (success or failure with failure cause) Association ID (used for various purposes)

Passive and active scanning Wireless stations can find out about 802.11 networks by using passive or active scanning. During passive scanning, the station searches beacon frames, moving from channel to channel through the complete channel set (802.11b => 13 channels). During active scanning, the station selects Channel 1 and sends a probe request frame. If no probe response frame is received within a certain time, the station moves to Channel 2 and sends a probe request frame, and so on.

Station connecting to a WLAN When a station moves into the coverage area of a WLAN, the following procedures take place: 1) Scanning: the station searches for a suitable channel over which subsequent communication takes place 2) Association: the station associates with an AP 3) IP address allocation: the station gets an IP address, for instance from a DHCP server 4) Authentication: only if this security option is required.

Handover to another AP When a station has noticed that the radio connection to another AP is a better than the existing connection: 1) Reassociation: the station associates with another AP 2) No new IP address is needed; however, the WLAN must be able to route downlink traffic via the new AP 3) Authentication: this security option, if required, will result in a substantially increased handover delay (complete procedure sequence: deauthentication, disassociation, reassociation, authentication).

Some IEEE 802.11 standard amendments f IAPP e QoS i Security 802.11 basic protocol MAC layer h DFS/TCP d Scanning a OFDM 5GHz b DSSS 2.4GHz g OFDM 2.4GHz Physical layer

Resources HUT Communications Laboratory, “Wireless Personal, Local, Metropolitan and Wide Area Networks”