Beruflich Dokumente
Kultur Dokumente
11 standard
Imad Aad INRIA, Planete team
Outline
WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security
BER
Tx s
s0
Rx s0 + s1 + s2 s2
Obstacle 2
BER
No LOS
1525 dB drop
=4
=46
Distance
Distance
The hidden node problem Scarse bandwidth (?) Multipath, pathloss, interference / noise Protection / Privacy BER
Application layer
Network layer LLC sublayer MAC sublayer PHY layer IEEE 802.2 IEEE 802.11 IEEE 802.3
Outline
WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security
History
History
1970s: ALOHA 1972: Slotted ALOHA 1975: Carrier Sense Multiple Access (CSMA) non persistent p-persistent
History
1970s: ALOHA 1972: Slotted ALOHA 1975: Carrier Sense Multiple Access (CSMA) non persistent p-persistent CSMA with collision detections (CD): Ethernet (1976) CSMA w/ coll. avoidance (CA): IEEE 802.11 (1997)
Outline
WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security
Working modes
Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS)
IBSS
IEEE 802.11 p.9
Working modes
Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS)
BSS
IEEE 802.11 p.9
Working modes
Ad-hoc mode vs. Infrastructure mode (IS) Independent BSS (IBSS), Basic Service Set (BSS), Extended Service Set (ESS)
AP1
AP3
Outline
WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security
MAC sub-layer
DCF: Distributed Coordination Function (ad-hoc, IS modes) PCF: Polling Coordination Function (in IS mode, optional)
MAC sub-layer
Time
Backoff
MAC sub-layer
DCF: Distributed Coordination Function (ad-hoc, IS modes) - The hidden node problem
MAC sub-layer
SIFS Data SIFS ACK DIFS NAV (RTS) NAV (CTS) NAV (data) Defer access
Time
CW
Backoff
MAC sub-layer
DCF: Distributed Coordination Function (ad-hoc, IS modes) - Fairness ? ... depends on scenario - QoS ? ... not yet ... wait for 802.11e
MAC sub-layer
DCF: Distributed Coordination Function (ad-hoc, IS modes) PCF: Polling Coordination Function (in IS mode, optional)
CFP repetition interval CFP CP CFP repetition interval CFP CP
PCF
DCF
PCF
DCF
SIFS D3+ACK+Poll
SIFS CP CFEnd
MAC sub-layer
Packet fragmentation
Fragment burst SIFS SIFS Fragment 0 SIFS SIFS Fragment 1 SIFS SIFS Fragment 2 Time DIFS
CW
ACK0
ACK1
ACK2
Other
Outline
WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security
Application layer
Network layer LLC sublayer MAC sublayer PHY layer 3 PHY types: DSSS (most products) FHSS (less products) IR (unknown products)
2 2 32 32 #
4 4 54 54 #
6 6 76 76 #
@ @ A@ A@ #
1 KHz
1 MHz
1 GHz
1 THz
1 PHz
1 EHz
B B CB CB #
Freq.
(AM radio)
(SW radio)
(TV Cell.)
LF
MF
HF
VHF
UHF
SHF
! ! "! "! #
$ $ %$ %$ #
( ( )( )( #
0 0 10 10 #
D D ED ED #
30 KHz
300 KHz
3 MHz
30 MHz
300 MHz
3 GHz
30 GHz
F F GF GF #
Freq.
ISM
UNII
H H IH H #
P P QP P #
T T UT T #
V V WV V #
X X YX X #
902 MHz
928 MHz
2.4 GHz
2.4835 GHz
5.725 GHz
5.785 GHz
R R SR R #
Freq.
DSSS (Direct Sequence Spread Spectrum) FHSS (Freq. Hopping Spread Spectrum) IR (Infra Red)
DSSS: principle
1 bit period
Scrambled Data
10110111000
01001000111
11 chips
DSSS: principle
Transmitter baseband signal before spreading
1 bit period
Scrambled Data
10110111000
01001000111
11 chips
DSSS: principle
@ Transmitter
before spreading after spreading
@ Receiver
before despreading after despreading
narrowband interference
time
=0
time
DSSS: modulation
DBPSK DQPSK 90 (11)
g hg hg hg g g
(0)
a` a` b
(1)
dc dc b
(00)
pi pi b
(01) 180
e fe fe b rq rq b
180
0 (10) 270
e f f
1 Mbps
2Mbps
30dBr 50dBr
fc 22MHz fc 11MHz fc fc + 11MHz fc + 22MHz
(ch.10) 2.457 MHz (ch.11) 2.462 MHz (ch12) 2.467 MHz (ch13) 2.472 MHz
tu
DSSS (Direct Sequence Spread Spectrum) FHSS (Frequency Hopping Spread Spectrum) IR (Infra Red)
FHSS Modulation: GFSK binary 0/1: (for 1 Mbps) 00, 01, 10, 11: (for 2 Mbps)
x y w x y w u
(France)
y w
Fast-FH vs. Slow-FH: min 2.5 hops/s Bluetooth interference ?... YES
DSSS (Direct Sequence Spread Spectrum) FHSS (Freq. Hopping Spread Spectrum) IR (Infra Red)
Infra Red (IR) Pulse Position Modulation (PPM) 1 Mbps: 4 data bits 2 Mbps: 2 data bits
4PPM symbol
Data bits
00 01 10 11
1 0 1 1
Data
ed
ed
gf
gf
Txed Pulse
IEEE 802.11 p.13
ed
ed
10000100
gf
gf
Outline
WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security
IEEE 802.11b: 2.4 GHz. 1Mbps, 2Mbps, 5.5Mbps 11 Mbps. High Rate DSSS Modulation: (backward compatible)DBPSK, DQPSK Complementary Code Keying (CCK) + DQPSK, (opt.) Packet Binary Convolutional Coding (PBCC) + (BPSK,QPSK) Currently the most widely used one
54 Mbps!!
OFDM (Orthogonal Frequency Division Multiplexing) Principle: High-rate data is devided into several lower rate binary signals. Each low-rate signal modulates a different sub-carrier (48) Sub-carrier sets are orthogonal. Modulation: BPSK, QPSK, 16QAM and 64QAM FEC: Convolutional encoding needed (Viterbi) Close to Hiperlan 2 specs. coming soon
IEEE 802.11 p.15
Data In
Signal Mapper
S/P
IFFT
P/S
p(t)
Data Out
P/S
Equalizer/ Detector
FFT
S/P
Matched Filter
Outline
WLANs vs. Wired LANs History Working modes MAC sub-layer The PHY layer (1997) The PHY Extensions (1999) Security
Security
Plaintext
Encryption
Cyphertext
Decryption
Eavesdropper
Security
IV Initialization Vector (IV) Secret Key WEP PRNG XOR Message Key Sequence
Seed
Ciphertext
Plaintext
Security
WEP (Wired Equivalent Privacy) default keys / established keys 40-128 bit key Algorithm: RC4 (symmetric stream cypher) Cracking tools: WEPcrack, AirSnort: if 100MB-1GB of data can be gathered then one can guess the encryption password in less than a second!! Access control table ? ... inefcient Network ID ? ... inefcient
IEEE 802.11 p.17
Conclusion
it works! looks just like ethernet to higher layers no QoS support... yet. limited security management.