Beruflich Dokumente
Kultur Dokumente
Module B
http://mobnet.epfl.ch
1
100 m 3 MHz
1m 300 MHz
10 mm 30 GHz
1 m 300 THz
VLF
LF
MF
HF
VHF
UHF
SHF
EHF
visible light UV
VLF = Very Low Frequency LF = Low Frequency MF = Medium Frequency HF = High Frequency VHF = Very High Frequency
UHF = Ultra High Frequency SHF = Super High Frequency EHF = Extra High Frequency UV = Ultraviolet Light
= c/f
Frequency allocation
Mobile phones
Disadvantages
lower bitrate compared to wired networks (1-100 Mbit/s) More difficult to secure
low power no special permissions or licenses needed to use the LAN robust transmission technology easy to use for everyone, simple management protection of investment in wired networks (internetworking) Security, privacy, safety (low radiation) transparency concerning applications and higher layer protocols location awareness if necessary
Radio
uses IR diodes
Advantages
simple, cheap, available in many mobile devices no licenses needed simple shielding possible
typically using the license free ISM band at 2.4 GHz and 5 GHz coverage of larger areas possible (radio can penetrate walls, furniture etc.)
Advantages
Disadvantages
interference by sunlight, heat sources etc. many things shield or absorb IR light low bandwidth
Disadvantages
very limited license free frequency bands shielding more difficult, interference with other electrical devices more difficult to secure
Example
Examples
Ad hoc network
Station (STA)
802.x LAN
terminal with access mechanisms to the wireless medium and radio contact to the access point group of stations using the same radio frequency station integrated into the wireless LAN and the distribution system bridge to other (wired) networks interconnection network to form one logical network (ESS: Extended Service Set) based on several BSS
9
STA1
Access Point
Portal
Distribution System
STA2
802.11 LAN
STA3
STA2
application TCP IP 802.11 MAC 802.11 PHY 802.11 MAC 802.11 PHY 802.3 MAC 802.3 PHY
11
clear channel assessment signal (carrier sense) modulation, coding channel selection, MIB coordination of all management functions
MAC Management
PHY Management
Station Management
PHY
PLCP
a Mnot a S i t
PMD
12
Infrared
850-950 nm, diffuse light, around 10 m range carrier detection, energy detection, synchronization
13
exchange of data packets based on best-effort support of broadcast and multicast implemented using PCF (Point Coordination Function)
collision avoidance via randomized back-off mechanism minimum distance between consecutive packets ACK packet for acknowledgements (not for broadcasts) avoids hidden terminal problem access point polls terminals according to a list
PCF (optional)
highest priority, for ACK, CTS, polling response medium priority, for time-bounded service using PCF lowest priority, for asynchronous data service
contention
next frame t
direct access if medium is free DIFS Note : :IFS durations are specific to each PHY Note IFS durations are specific to each PHY
time slot
15
DIFS
station ready to send starts sensing the medium (Carrier Sense based on CCA, Clear Channel Assessment) if the medium is free for the duration of an Inter-Frame Space (IFS), the station can start sending (IFS depends on service type) if the medium is busy, the station has to wait for a free IFS, then the station must additionally wait a random back-off time (collision avoidance, multiple of slot-time) if another station occupies the medium during the back-off time of the station, the back-off timer stops (to increase fairness)
16
t Here St4 and St5 happen to have the same back-off time busy medium not idle (frame, ack etc.) packet arrival at MAC boe elapsed backoff time bor residual backoff time Note: broadcast is not acknowledged 17 Note: broadcast is not acknowledged
The size of the contention window can be adapted The size of the contention window can be adapted (if more collisions, then increase the size) (if more collisions, then increase the size)
The ACK is sent right at the end of SIFS The ACK is sent right at the end of SIFS (no contention) (no contention)
other stations
DIFS
data t
Contention window RTS/CTS can be present for RTS/CTS can be present for some packets and not for other some packets and not for other
19
Fragmentation mode
DIFS sender receiver RTS SIFS CTS SIFS frag1 SIFS ACK1 SIFS frag2 SIFS ACK2
DIFS contention
data t
Fragmentation is used in case the size of the packets sent has to be reduced (e.g., to diminish the probability of erroneous frames) Each fragi (except the last one) also contains a duration (as RTS does), which determines the duration of the NAV By this mechanism, fragments are sent in a row In this example, there are only 2 fragments 20
D2
Purpose: provide a time-bounded service Not usable for ad hoc networks Di represents the polling of station i Ui represents transmission of data from station i
21
t3
t4
contention period
In
22
control frames, management frames, data frames important against duplicated frames due to lost ACKs receiver, transmitter (physical), BSS identifier, sender (logical) sending time, checksum, frame control, data
2 6 6 6 2 6 Duration Address Address Address Sequence Address ID 1 2 3 Control 4 version, type, fragmentation, security, ... 0-2312 Data 4 CRC
Sequence numbers
Addresses
Miscellaneous
bytes
2 Frame Control
detection of duplication
23
DS: Distribution System AP: Access Point DA: Destination Address SA: Source Address BSSID: Basic Service Set Identifier - infrastructure BSS : MAC address of the Access Point - ad hoc BSS (IBSS): random number RA: Receiver Address TA: Transmitter Address
24
Purpose
for the physical layer (e.g., maintaining in sync the frequency hop sequence in the case of FHSS) for power management
Power management
sleep-mode without missing a message periodic sleep, frame buffering, traffic measurements
Association/Reassociation
integration into a LAN roaming, i.e. change networks by changing access points scanning, i.e. active search for a network
B busy busy
B busy B
B busy
The access point transmits the (quasi) periodic beacon signal The beacon contains a timestamp and other management information used for power management and roaming All other wireless nodes adjust their local timers to the timestamp
26
B1
Each node maintains its own synchronization timer and starts the transmission of a beacon frame after the beacon interval Contention back-off mechanism only 1 beacon wins All other stations adjust their internal clock according to the received beacon and suppress their beacon for the current cycle
27
Power management
Idea: switch the transceiver off if not needed States of a station: sleep and awake Timing Synchronization Function (TSF)
Infrastructure case
Ad-hoc case
28
D B busy busy
T busy
d busy p d
D B
broadcast/multicast
beacon interval
station1 station2
B1 B2 B2
B1
ATIM: Ad hoc Traffic Indication Map (a station announces the list of buffered frames) Potential problem: scalability (high number of collisions)
30
802.11 - Roaming
No or bad connection? Then perform: Scanning
scan the environment, i.e., listen into the medium for beacon signals or send probes into the medium and wait for an answer station sends a request to one or several AP(s)
Reassociation Request
Reassociation Response
success: AP has answered, station can now participate failure: continue scanning
31
Security of 802.11
RC4
IV
RC4
P=
C(M)
Note: several security weaknesses have been identified and WEP should not be used anymore.
32
Supplicant
Authenticator
Authentication Server
EAP: Extensible Authentication Protocol (RFC 2284, 1998) EAPOL: EAP over LAN RADIUS: Remote authentication dial in user service (RFC 2138, 1997)
Features: - Supports a wide range of authentication schemes, thanks to the usage of EAP - One-way authentication - Optional encryption and data integrity
33
Authentication server
EAP-response/OTP, OTPpassword
EAP-success
Port authorized
: exchange of EAPOL frame : exchange of EAP frames in a higher layer protocol (e.g., RADIUS) Notes : : Notes 1. Weaknesses have been found in 802.1x as well, but are corrected in the 1. Weaknesses have been found in 802.1x as well, but are corrected in the various implementations. various implementations. 2. New standard in the making : :IEEE 802.11i 2. New standard in the making IEEE 802.11i
34
IEEE 802.11a
5 GHz band Based on OFDM (orthogonal frequency-division multiplexing) transmission rates up to 54 Mbit/s Coverage is not as good as in 802.11b
IEEE 802.11g
IEEE 802.11n
MIMO (multiple-input multiple-output) 40MHz channel (instead of 20MHz) Can operate in the 5GHz or 2.4Ghz (risk of interference with other systems, however) Bitrates up to 600Mb/s Security, makes use of IEEE 802.1x For vehicular communications For mesh networks
35
IEEE 802.11
Very widespread Often considered as the system underlying larger scale ad hoc networks (although far from optimal, not designed for this purpose) Tremendous potential as a competitor of 3G cellular networks in hot spots
Bluetooth Security perceived as a major obstacle; initial solutions were flawed in both IEEE 802.11 (WEP) and Bluetooth Future developments
36
References
J. Schiller: Mobile Communications, Addison-Wesley, Second Edition, 2004 Leon-Garcia & Widjaja: Communication Networks, McGrawHill, 2000 IEEE 802.11 standards, available at www.ieee.org www.bluetooth.com J. Edney and W. Arbaugh: Real 802.11 Security, Addison-Wesley, 2003
37
Note: this and the following slides are provided here because AODV is used in the hands-on exercises. We will come back to this topic in a later module of the course.
38
F Q A
R C N
I L
39
F Q A
R C N
I L
Note: if one of the intermediate nodes (e.g., A) Note: if one of the intermediate nodes (e.g., A) 40 knows aaroute to D, it responds immediately to S knows route to D, it responds immediately to S
F Q A
R C N
I L
41
F Q A
R C N
I L
42
F Q A
R C N
I L
43
F Q A
R C N
I L
44
F Q A
R C N
I L
45
F Q A
R C N
I L
46
47
F Q A Data
R C N
I L
The route is not included in the packet header The route is not included in the packet header
48
F Q A Data
X
I
R C N
M L
49
F Q A RERR(G-J) G
X
I
R C N
M L
When receiving the Route Error message (RERR), When receiving the Route Error message (RERR), S removes the broken link from its cache. S removes the broken link from its cache. 50 It then initializes aanew route discovery. It then initializes new route discovery.
51