Lecture 13 and 14: WLAN Anders Västberg 08-790 44 55 Slides are a selection from the slides from chapter 12,13, and 14 from:

Slides:



Advertisements
Similar presentations
LAN Protocol Architecture
Advertisements

Wireless LAN (not assessed) Dr Sandra I. Woolley.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Wireless LAN Technology
Wireless Local Area Network (LAN)
Wireless LAN Presented By : Pooja Maheshwari Guided By : Dr Jerry Gao.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may be stationary (non- mobile) or.
Chapter 11: Wireless LANs Business Data Communications, 5e.
Mobile IP and Wireless Application Protocol
Local Area Network Technology
WLAN b a Johan Montelius
IE 419/519 Wireless Networks Lecture Notes #2 Wireless LAN Technology.
Copyright © NDSL, Chang Gung University. Permission required for reproduction or display. Wireless LAN Technology 長庚大學資訊工程學系 陳仁暉 副教授 Tel: (03)
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Chapter 8: Wireless Services Part 2: Wireless LAN
Wireless LAN Technology. WIRELESS LAN TECHNOLOGY Overview-Wireless LAN Applications a wireless LAN is one that makes use of a wireless transmission medium.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
LectA..ppt - 04/06/05 CDA 6505 Network Architecture and Client/Server Computing Wireless LANs by Zornitza Genova Prodanoff.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Wireless LAN Technology.
Data and Computer Communications
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 14 “Wireless LANs”.
WIRELESS PROTOCOLS. The ISO OSI Reference Model A Network is a complex piece of hardware and Software.A Network is a complex piece of hardware and Software.
Ch 6. Wireless LANs Myungchul Kim
Chapter 5 outline 5.1 Introduction and services
Wireless Personal Communications Systems – CSE5807
Chapter 11: Wireless LANs Business Data Communications, 6e.
Wireless LAN Applications
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Strengths of Infrared Over Microwave Radio Spectrum for infrared virtually unlimited Possibility of high data rates Infrared spectrum unregulated Equipment.
CWNA Guide to Wireless LANs, Second Edition
Instructor: Dr. Mustafa Shakir
CSE 6590 Wireless LANs and IEEE MAC 15 October 2015.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Jaringan Komputer Dasar Data Link Layer (2) Aurelio Rahmadian.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless LAN. Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic Access Ad hoc networking.
Data and Computer Communications Eighth Edition by William Stallings Chapter 17 – Wireless LANs.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Introduction to Mobile Communications TCOM 552, Lecture #9 Hung Nguyen, Ph.D. 06 November, 2006.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
IEEE Wireless LAN Standard
WLAN.
WLAN.
Chapter 14 Wireless LANs.
Wireless LAN Technology Chapter 13. Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic Access Ad hoc networking.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
ECEN 489, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 11.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless LAN Technology Chapter 13. Wireless LAN  Wireless LAN is one that make use of a wireless transmission medium.  Wireless LAN use infrared or.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Wireless LAN.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Wireless LAN Technology.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Mesh Networks
Wireless LAN Technology
Chapter 2 Wireless LAN Technology and the IEEE 802
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
Wireless LAN Technology
Presentation transcript:

Lecture 13 and 14: WLAN Anders Västberg Slides are a selection from the slides from chapter 12,13, and 14 from:

Mobile IP Uses Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile – user's point of attachment changes dynamically and all connections are automatically maintained despite the change Nomadic - user's Internet connection is terminated each time the user moves and a new connection is initiated when the user dials back in –New, temporary IP address is assigned

Operation of Mobile IP Mobil node is assigned to a particular network – home network IP address on home network is static – home address Mobile node can move to another network – foreign network Mobile node registers with network node on foreign network – foreign agent Mobile node gives care-of address to agent on home network – home agent

Capabilities of Mobile IP Discovery – mobile node uses discovery procedure to identify prospective home and foreign agents Registration – mobile node uses an authenticated registration procedure to inform home agent of its care-of address Tunneling – used to forward IP datagrams from a home address to a care-of address

Discovery Mobile node is responsible for ongoing discovery process –Must determine if it is attached to its home network or a foreign network Transition from home network to foreign network can occur at any time without notification to the network layer Mobile node listens for agent advertisement messages –Compares network portion of the router's IP address with the network portion of home address

Agent Solicitation Foreign agents are expected to issue agent advertisement messages periodically If a mobile node needs agent information immediately, it can issue ICMP router solicitation message –Any agent receiving this message will then issue an agent advertisement

Move Detection Mobile node may move from one network to another due to some handoff mechanism without IP level being aware –Agent discovery process is intended to enable the agent to detect such a move Algorithms to detect move: –Use of lifetime field – mobile node uses lifetime field as a timer for agent advertisements –Use of network prefix – mobile node checks if any newly received agent advertisement messages are on the same network as the node's current care-of address

Co-Located Addresses If mobile node moves to a network that has no foreign agents, or all foreign agents are busy, it can act as its own foreign agent Mobile agent uses co-located care-of address –IP address obtained by mobile node associated with mobile node's current network interface Means to acquire co-located address: –Temporary IP address through an Internet service, such as DHCP –May be owned by the mobile node as a long-term address for use while visiting a given foreign network

Registration Process Mobile node sends registration request to foreign agent requesting forwarding service Foreign agent relays request to home agent Home agent accepts or denies request and sends registration reply to foreign agent Foreign agent relays reply to mobile node

Registration Operation Messages Registration request message –Fields = type, S, B, D, M, V, G, lifetime, home address, home agent, care-of-address, identification, extensions Registration reply message –Fields = type, code, lifetime, home address, home agent, identification, extensions

Registration Procedure Security Mobile IP designed to resist attacks –Node pretending to be a foreign agent sends registration request to a home agent to divert mobile node traffic to itself –Agent replays old registration messages to cut mobile node from network For message authentication, registration request and reply contain authentication extension –Fields = type, length, security parameter index (SPI), authenticator

Types of Authentication Extensions Mobile-home – provides for authentication of registration messages between mobile node and home agent; must be present Mobile-foreign – may be present when a security association exists between mobile node and foreign agent Foreign-home – may be present when a security association exists between foreign agent and home agent

Tunneling Home agent intercepts IP datagrams sent to mobile node's home address –Home agent informs other nodes on home network that datagrams to mobile node should be delivered to home agent Datagrams forwarded to care-of address via tunneling – Datagram encapsulated in outer IP datagram

Mobile IP Encapsulation Options IP-within-IP – entire IP datagram becomes payload in new IP datagram –Original, inner IP header unchanged except TTL decremented by 1 –Outer header is a full IP header Minimal encapsulation – new header is inserted between original IP header and original IP payload –Original IP header modified to form new outer IP header Generic routing encapsulation (GRE) – developed prior to development of Mobile IP

Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic Access Ad hoc networking

Wireless LAN Configurations

LAN Extension Wireless LAN linked into a wired LAN on same premises –Wired LAN Backbone Support servers and stationary workstations – Wireless LAN Stations in large open areas Manufacturing plants, stock exchange trading floors, and warehouses

Cross-Building Interconnect Connect LANs in nearby buildings –Wired or wireless LANs Point-to-point wireless link is used Devices connected are typically bridges or routers

Nomadic Access Wireless link between LAN hub and mobile data terminal equipped with antenna –Laptop computer or notepad computer Uses: –Transfer data from portable computer to office server –Extended environment such as campus

Ad Hoc Networking Temporary peer-to-peer network set up to meet immediate need Example: –Group of employees with laptops convene for a meeting; employees link computers in a temporary network for duration of meeting

Wireless LAN Requirements Throughput Number of nodes Connection to backbone LAN Service area Battery power consumption Transmission robustness and security Collocated network operation License-free operation Handoff/roaming Dynamic configuration

Wireless LAN Categories Infrared (IR) LANs Spread spectrum LANs Narrowband microwave

Strengths of Infrared Over Microwave Radio Spectrum for infrared virtually unlimited –Possibility of high data rates Infrared spectrum unregulated Equipment inexpensive and simple Reflected by light-colored objects –Ceiling reflection for entire room coverage Doesn’t penetrate walls –More easily secured against eavesdropping –Less interference between different rooms

Drawbacks of Infrared Medium Indoor environments experience infrared background radiation –Sunlight and indoor lighting –Ambient radiation appears as noise in an infrared receiver –Transmitters of higher power required Limited by concerns of eye safety and excessive power consumption –Limits range

Spread Spectrum LAN Configuration Multiple-cell arrangement Within a cell, either peer-to-peer or hub Peer-to-peer topology –No hub –Access controlled with MAC algorithm CSMA –Appropriate for ad hoc LANs

IEEE 802 Protocol Layers

Protocol Architecture Functions of physical layer: –Encoding/decoding of signals –Preamble generation/removal (for synchronization) –Bit transmission/reception –Includes specification of the transmission medium

Protocol Architecture Functions of medium access control (MAC) layer: –On transmission, assemble data into a frame with address and error detection fields –On reception, disassemble frame and perform address recognition and error detection –Govern access to the LAN transmission medium Functions of logical link control (LLC) Layer: –Provide an interface to higher layers and perform flow and error control

Separation of LLC and MAC The logic required to manage access to a shared-access medium not found in traditional layer 2 data link control For the same LLC, several MAC options may be provided

MAC Frame Format MAC control –Contains Mac protocol information Destination MAC address –Destination physical attachment point Source MAC address –Source physical attachment point CRC –Cyclic redundancy check

Logical Link Control Characteristics of LLC not shared by other control protocols: –Must support multiaccess, shared-medium nature of the link –Relieved of some details of link access by MAC layer

LLC Services Unacknowledged connectionless service –No flow- and error-control mechanisms –Data delivery not guaranteed Connection-mode service –Logical connection set up between two users –Flow- and error-control provided Acknowledged connectionless service –Cross between previous two –Datagrams acknowledged –No prior logical setup

Differences between LLC and HDLC LLC uses asynchronous balanced mode of operation of HDLC (type 2 operation) LLC supports unacknowledged connectionless service (type 1 operation) LLC supports acknowledged connectionless service (type 3 operation) LLC permits multiplexing by the use of LLC service access points (LSAPs)

IEEE Architecture Distribution system (DS) Access point (AP) Basic service set (BSS) –Stations competing for access to shared wireless medium –Isolated or connected to backbone DS through AP Extended service set (ESS) –Two or more basic service sets interconnected by DS

IEEE Services

Distribution of Messages Within a DS Distribution service –Used to exchange MAC frames from station in one BSS to station in another BSS Integration service –Transfer of data between station on IEEE LAN and station on integrated IEEE 802.x LAN

Transition Types Based On Mobility No transition –Stationary or moves only within BSS BSS transition –Station moving from one BSS to another BSS in same ESS ESS transition –Station moving from BSS in one ESS to BSS within another ESS

Association-Related Services Association –Establishes initial association between station and AP Reassociation –Enables transfer of association from one AP to another, allowing station to move from one BSS to another Disassociation –Association termination notice from station or AP

Access and Privacy Services Authentication –Establishes identity of stations to each other Deathentication –Invoked when existing authentication is terminated Privacy –Prevents message contents from being read by unintended recipient

IEEE Medium Access Control MAC layer covers three functional areas: –Reliable data delivery –Access control –Security

Reliable Data Delivery More efficient to deal with errors at the MAC level than higher layer (such as TCP) Frame exchange protocol –Source station transmits data –Destination responds with acknowledgment (ACK) –If source doesn’t receive ACK, it retransmits frame Four frame exchange –Source issues request to send (RTS) –Destination responds with clear to send (CTS) –Source transmits data –Destination responds with ACK

Access Control

Medium Access Control Logic

Interframe Space (IFS) Values Short IFS (SIFS) –Shortest IFS –Used for immediate response actions Point coordination function IFS (PIFS) –Midlength IFS –Used by centralized controller in PCF scheme when using polls Distributed coordination function IFS (DIFS) –Longest IFS –Used as minimum delay of asynchronous frames contending for access

IFS Usage SIFS –Acknowledgment (ACK) –Clear to send (CTS) –Poll response PIFS –Used by centralized controller in issuing polls –Takes precedence over normal contention traffic DIFS –Used for all ordinary asynchronous traffic

MAC Frame Format

MAC Frame Fields Frame Control – frame type, control information Duration/connection ID – channel allocation time Addresses – context dependant, types include source and destination Sequence control – numbering and reassembly Frame body – MSDU or fragment of MSDU Frame check sequence – 32-bit CRC

Frame Control Fields Protocol version – version Type – control, management, or data Subtype – identifies function of frame To DS – 1 if destined for DS From DS – 1 if leaving DS More fragments – 1 if fragments follow Retry – 1 if retransmission of previous frame

Frame Control Fields Power management – 1 if transmitting station is in sleep mode More data – Indicates that station has more data to send WEP – 1 if wired equivalent protocol is implemented Order – 1 if any data frame is sent using the Strictly Ordered service

Control Frame Subtypes Power save – poll (PS-Poll) Request to send (RTS) Clear to send (CTS) Acknowledgment Contention-free (CF)-end CF-end + CF-ack

Data Frame Subtypes Data-carrying frames –Data –Data + CF-Ack –Data + CF-Poll –Data + CF-Ack + CF-Poll Other subtypes (don’t carry user data) –Null Function –CF-Ack –CF-Poll –CF-Ack + CF-Poll

Management Frame Subtypes Association request Association response Reassociation request Reassociation response Probe request Probe response Beacon

Management Frame Subtypes Announcement traffic indication message Dissociation Authentication Deauthentication

Wired Equivalent Privacy

Authentication Open system authentication –Exchange of identities, no security benefits Shared Key authentication –Shared Key assures authentication

Physical Media Defined by Original Standard Direct-sequence spread spectrum –Operating in 2.4 GHz ISM band –Data rates of 1 and 2 Mbps Frequency-hopping spread spectrum –Operating in 2.4 GHz ISM band –Data rates of 1 and 2 Mbps Infrared –1 and 2 Mbps –Wavelength between 850 and 950 nm

IEEE a and IEEE b IEEE a –Makes use of 5-GHz band –Provides rates of 6, 9, 12, 18, 24, 36, 48, 54 Mbps –Uses orthogonal frequency division multiplexing (OFDM) –Subcarrier modulated using BPSK, QPSK, 16-QAM or 64- QAM IEEE b –Provides data rates of 5.5 and 11 Mbps –Complementary code keying (CCK) modulation scheme

IEEE g and IEEE n IEEE g: Provides data rates up to 108 Mbps and is compatible with b IEEE n: Even higher data rates.