1 Network Architecture and Design Wireless & Mobile Systems IEEE 802.11 WLAN.

Slides:



Advertisements
Similar presentations
Introduction to IEEE Wireless LAN Standard Huafeng Lü Sep 10, 2002.
Advertisements

Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
Network Technology CSE Network Technology CSE3020 Week 9.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CPET 260 – Network I Wireless Networks Bluetooth.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Wireless Networking So we talked about wired networks. What about wireless?
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Wireless Local Area Networks (WLAN)
WLAN b a Johan Montelius
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
IEEE WLAN By Orly Meir & Ilan Bar IEEE overview.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
IEEE Wireless LAN Standard
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless MAC.
Wireless MAC.
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
CS 457 – Lecture 7 Wireless Networks
WiFi Networks: IEEE b Wireless LANs
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
WiFi Networks: IEEE b Wireless LANs
IEEE Wireless Local Area Networks (RF-LANs)
Presentation transcript:

1 Network Architecture and Design Wireless & Mobile Systems IEEE WLAN

2 Network Architecture and Design The wireless revolution NO WIRES Goals One Wireless standard for at Home, in the Office, and on the Move. Interoperability with wired networks Security, QOS, Roaming users. Usage: Entertainment (films, shows, gaming, music,..) Information (Internet,..) E-commerce (secure home shopping,..) Social contacts ( , voice, interest groups,..) PC (documents, data, printing, scanner, server,...) Control (A/V devices, security,..)

3 Network Architecture and Design IEEE vs Similarity Same LLC (Logical Link Control). There in no differences for upper layer protocol Differences WLAN is not private (not protected) WLAN is exposed to more distractions (environment problems) Reflectors Changes in strength on the Rx signal in small position change Moving object can change the wave signal Other infrared devices overlap the Tx path. Etc… Mobility The WLAN user can move from one place to another – big advantage. But it cause internal complexity. Roaming between access points and between different IP networks (Mobile IP or DHCP). Servers and services need to be changed (Printer, Proxy server, file server, etc…) IEEE PHY has NO collision detection IEEE use collision detection algorithm. IEEE use collision avoidance algorithm. Translation of  is not on the scope of the IEEE spec’

4 Network Architecture and Design Architecture

5 Network Architecture and Design WLAN requirements Mobility Tolerant to faults Support: Small and transient (temporary) Networks Large [semi-]permanent Networks Power saving without losing network connectivity. Allow all network protocols to run over WLAN without any considerations.

6 Network Architecture and Design Wireless Network Overview APs (access points) and stations BSS (Basic service set) DS (Distribution system) and ESS (Extended Service Set) Ad-hoc networks

7 WLAN network BSS DS (usually Ethernet) ESS Wireless connection BSS AP STA AP STA

8 Network Architecture and Design APs & stations Each node in the IEEE network may be station (STA) or and access point In definition AP contains a station.

9 Network Architecture and Design BSS Set of arbitrary stations, and one AP Station have to be associated with the AP in order to be part of the BSS Local relay function through the AP. Advantage : When station is in power saving mode the AP will buffer traffic for the (sleeping) mobile station. Disadvantage: Consume twice bandwidth

10 Network Architecture and Design DS Logical communication between the APs The DS is the backbone of the WLAN and may be constructed over wired or wireless connection. The communication between the APs over the DS, is in the scope of TGf (IAPP – inter access point protocol). The connection of the several BSS networks  forms Extended Service Set (ESS)

11 Network Architecture and Design ESS Group more than one BSS networks The APs communicate among themselves to form relay between the BSS domains, through abstract distribution system (DS)

12 Network Architecture and Design Ad-hoc networks (IBSS) Temporary set of stations Forming as ad-hoc network – an independent BSS (IBSS), means that there is no connection to wired network No AP No relay function (direct connection) Simple setup

13 Network Architecture and Design Ad-hoc networks No Relay Direct connection

14 IEEE services Station services ( similar to wired network ) Authentication (login) De-authentication (logout) Privacy Data delivery Distribution services Association Make logical connection between the AP to the station – the AP will not receive any data from a station before the association. assist the DS to know where to deliver the mobile data. (sets the AID) Reassociation ( Similar to the association ) Send repeatedly to the AP. Help to AP to know if the station has moved from/to another BSS. After Power Save Disassociation Manually disconnect (PC shutdown or adapter is ejected) Distribution (AP forwarding using the DS) Determine how to deliver Internal in the BSS It’s own station To another BSS or network

15 Network Architecture and Design Services example : Roaming AP1AP2 AP Authenticate and associate 2 – Laptop roaming 3 – Authenticate (if needed) and (re)associate 4 – Notify the new location of the laptop (disassociation of AP1) 2 3 4

16 Network Architecture and Design Old BSS AP1AP2 AP3 New BSS New BSS AP2 is out of service Services example : “Out of service”

17 Network Architecture and Design Medium Access Control (MAC) Layer

18 Network Architecture and Design MAC functionalities Reliability of data delivery service Control of shared WL network Frame Types (informational section) Management Privacy service (Wired Equivalent Privacy - WEP)

19 Network Architecture and Design Reliability of data delivery service Problems to solve The air is noisy and unreliable media The Hidden Node problem Solutions : Frame Exchange Protocol Every frame is acknowledged (ACK) CTS & RTS frames Fragment long data frames

20 Network Architecture and Design Acknowledgments (ACK) Note: as said before WL media has no PHY collision detection. Traffic flow: 1. Data is being sent (Source  Destination) 2. If the data was received correctly in the destination, an ACK (Destination  Source) will be sent back. If ACK is returned than go to Else (data was not received or ACK didn’t returned), increment the retry counter. 4. If retry counter < MAX_RETRY_COUNTER go to 1 5. Else (counter exceeded)  transmit failed (frame is lost) 6. Transmition succeeded, continue.

21 Network Architecture and Design The Hidden Node problem A B C Direct connections: A  B C  B Problems 1.A Send data to B 2.C can disturb transmition A  B because C can’t hear A

22 Network Architecture and Design Solving the Hidden Node problem Request To Send (RTS): Source announcing its transmition. Will cause its neighborhood stop transmitting Clear To Send (CTS): Destination received the RTS and announce the source to send the data. Will cause its (the destination) neighborhood stop transmitting.

23 Network Architecture and Design Area cleared by the CTS A B C 1. RTS RTSCTSDataACK Atomic unit 2. CTS Example Area cleared by the RTS 2. CTS

24 Network Architecture and Design Control of shared WL network MAC access mechanism Distributed Coordination Function Based on the IEEE Ethernet access mechanism. Point Coordination Function Token based mechanism (one Point Coordinator in the BSS at the AP, that gives the ‘token’ to speak) Not relevant to WLAN implementations.

25 Network Architecture and Design Distributed Coordination Function Carrier Sense Multiple Access Collision Avoidance (CSMA/CA), uses binary exponential backoff (Same as in IEEE 802.3) IEEE use collision detection algorithm. IEEE use collision avoidance (CA) algorithm Listen Before Talk – LBT ( don’t transmit while others transmit to avoid collision ) Network Allocation Vector (NAV) – the time till the network will be cleared from any transmitting. The NAV with the LBT assist to avoid collisions (CA)

26 Network Architecture and Design NAV setting SIFS – Short Interframe Space DIFS - Distributed Interframe Space Source Destination Other DIFS RTS SIFS CTS Data SIFS ACK DIFS NAV (RTS) NAV (CTS) Defer AccessBackoff Next transmition SIFS

27 Network Architecture and Design Fragmentation Needed to decrease the probability of the surrounding destruction (microwave ovens, etc…) by splitting frame to smaller parts It is possible to tune the size from which the frame will be fragmented by a MIB (management Information Base) parameter name - dot11FragmentationTreshold By default no fragmentation is being done.

28 Network Architecture and Design Privacy 1. Any one with antenna can here you 2. Wired Equivalent Privacy (WEP) 3. Only the data is encrypted (the MAC layer is not changed after the encryption). WEP doesn’t protect from traffic analysis. 4. RC4 – symmetric stream cipher algorithm with variable key length is used ( same key and algorithm for encryption and decryption )

29 Network Architecture and Design WEP details Two methods: Default keys (up to four) will be shared in the BSS or the whole ESS. It is useful to learn some default keys once The keys can be revealed more easily. One-To-One key mapping.

30 Network Architecture and Design MAC Management We need management environment in order to solve those problems: 1. Noisy media Many users on air Destructions from other WLANs 2. Every one can connect to the WLAN Security issues 3. Mobility 4. Power management

31 Network Architecture and Design Open Issues Load balancing between APs IP roaming problems ( In BSS & In IBSS ) “Tower of Babel” ~ different vendors No argument on: QOS Roaming Etc… PAN (connect from public area to remote ISP with security)

32 Network Architecture and Design End of Seventh Lecture