southern methodist university fall 2003 eets 8316/ntu cc745-n wireless networks

48
#1 EETS 8316/NTU TC 745, Fall 2003 ENGINEERING SMU Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks Lecture 10: Wireless LAN Instructor: Jila Seraj email: [email protected] http://www.engr.smu.edu/~jseraj/ tel: 214-505-6303

Upload: hayes

Post on 14-Jan-2016

28 views

Category:

Documents


0 download

DESCRIPTION

Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks. Lecture 10: Wireless LAN. Instructor : Jila Seraj email : [email protected] http://www.engr.smu.edu/~jseraj/ tel: 214-505-6303. Session Outline. Wireless LAN. Wireless LAN. Wish List High speed - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#1EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Southern Methodist University Fall 2003

EETS 8316/NTU CC745-NWireless Networks

Lecture 10: Wireless LAN

Instructor: Jila Serajemail: [email protected]

http://www.engr.smu.edu/~jseraj/tel: 214-505-6303

Page 2: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#2EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Session Outline

Wireless LAN

Page 3: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#3EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Wireless LAN

Wish List—High speed

—Low cost

—No use/minimal use of the mobile equipment battery

—Can work in the presence of other WLAN

—Easy to install and use

—Etc

Page 4: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#4EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Wireless LAN Architecture

Server

PDA Laptop

LaptopLaptop

Laptop

Access Point Access Point

Ad Hoc

Pager

DS

Page 5: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#5EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Wireless LAN Architecture, Cont…

Logical Link Control Layer

MAC Layer: Consist of two sub layer, physical Layer and physical convergence layer

Physical convergence layer, shields LLC from the specifics of the physical medium. Together with LLC it constitutes equivalent of Link Layer of OSI

Page 6: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#6EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

What Is Hidden Node?

A CB

A can hear BC can hear BA can not hear CC can not hear A sending data

Page 7: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#7EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

LBT MAC Protocol

LBT= Listen Before You Talk

—Based on CSMA-CA

—First send Ready To Send (RTS) to the receiving node

—Receiving node send a Continue To Send (CTS) message, takes care of hidden node.

—Data transmission starts after RTS/CTS.

—Data is acknowledged on the MAC level. Counteract error caused by RF environment.

Page 8: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#8EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Integrated CSMA/TDMA MAC Protocol

Supports guaranteed bandwidth traffic and random access traffic

The bandwidth is divided into a random part and a reserved part.

Random part is LBT, reserved part

During high traffic all bandwidth can be used for reserved traffic (like wireless telephony)

H1 Reserved-1 H2 Reserved-2 H3 LBT

Page 9: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#9EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Reservation/Polling MAC Protocol

Works only with AP

Fair and slow. First-in-First-Out

Wireless station send a request.

All requests are queued.

Wireless stations are polled in the same order that the requests have arrive.

All data reception is acknowledged.

Page 10: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#10EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Power Management

Battery life of mobile computers/PDAs are very short. Need to save

The additional usage for wireless should be minimal

Wireless stations have three states

—Sleep

—Awake

—Transmit

Page 11: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#11EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Power Management, Cont…

AP knows the power management of each node

AP buffers packets to the sleeping nodes

AP send Traffic Delivery Information Message (TDIM) that contains the list of nodes that will receive data in that frame, how much data and when.

The node is awake only when it is sending data, receiving data or listening to TDIM.

Page 12: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#12EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Access Point Functions

Access point has three components

—Wireless LAN interface to communicate with nodes in its service area

—Wireline interface card to connect to the backbone network

—MAC layer bridge to filter traffic between sub-networks. This function is essential to use the radio links efficiently

Page 13: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#13EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Bridge Functions

Speed conversion between different devices, results in buffering.

Frame format adaptation between different incompatible LANs

Adding or deleting fields in the frame to convert between different LAN standards

Page 14: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#14EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Routing

Building routing tables can be done as

—Source tree, keeps track where other nodes are and the best way of reaching them. When sending a packet the route is also determined. It must be done in each node and is heavy.

—Spanning tree, is built iteratively, each bridge advertises it identity and all other bridges it knows and how many hops it takes to get there. Then each bridge follows a specific algorithm to calculate how get to each bridge with least hop.

Page 15: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#15EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Bridge Functions, Routing

Create a routing table for sending packets

Listen to all packets being sent.

Find out which nodes are in which sub-network by analyzing the source address. Store that data in a routing table.

If a packet is addressed to a known node, only repeat the data on that sub-network, otherwise repeat it on all networks.

Page 16: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#16EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Bridge Functions, Routing, Cont…

Age the entries after a timer value has expired since the last communication

If the timer is too long, we might send data to a node that might have left the sub-network or is turned off or even gone to coverage area of another access point.

If the timer is too short, we remove the user too early and repeat the packet destined to it in all sub-networks.

Other functions of a bridge, buffering for speed conversion, changing frame format between LANs.

Page 17: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#17EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobility Management

AP has three components—WLAN interface

—Backbone LAN interface

—MAC layer bridge functionBackbone Network

Access PointAccess Point

Access Point

Page 18: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#18EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobility Management, Cont..

A node can associate when it enters the coverage area of an AP

A node can disassociate when power down or leaving the service area

It shall re-associate when it handoffs to another AP.

AP bridge function keeps track of all nodes associated with it.

Page 19: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#19EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

WLAN Addressing

In wireline LAN, each node has an IP address that is associated with its physical location

When a device can move from one location to another, the association between the physical location and IP address no longer holds

The solution is presented in mobile IP

Page 20: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#20EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobile IP Principals

Internet is a large network and introducing a new function, e. g. Mobile IP can not be disruptive.

Constraints of mobile IP are

—Mobility should be at network layer

—No impact on higher levels

—No impact on the nodes not directly involved in the mobile IP function

—Uninterrupted operation for mobile devices

Page 21: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#21EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobile IP Principals, Cont…

The principle is very simple, use c/o addressing

For each mobile device, we associate a Home IP address associated with a Home Network.

The new LAN is called the Visiting Network

The software that takes care of mobility in each server (router) is called agent.

Page 22: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#22EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobile IP Principals, Cont…

Two types of agents, Home Agent and Visiting Agent.

Whenever the mobile device connects to a new network, a c/o address is given to it by the Visiting Agent.

This c/o address is reported to the Home Agent.

All packets addressed to the mobile device are addressed to its Home Address, and thus sent to its Home Network.

Page 23: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#23EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobile IP Principals, Cont…

Upon reception of the packet, the Home Agent recognized the address belonging to a mobile device.

Home Agents looks up the c/o address in its table.

The packet is then wrapped in a new packet with the c/o address on it, called encapsulation

C/o address causes the packet to be forwarded to the Visiting Agent.

Page 24: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#24EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobile IP Principals, Cont…

Visiting Agent recognizes the received address as the c/o address, unwrap the packet; called de-capsulation; and send it to its intended receiver.

This activity is called tunneling, referring to the idea creating a tunnel between the Home Network and Visiting Network and sending all data to that mobile device on that tunnel.

Several tunnels can be created between two networks

Page 25: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#25EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Mobility Management in WLAN

Mobile IP principles are used to take care of mobility in the wireless LAN.

Every wireless device has an address in its Home LAN, and gets a c/o address in the Visiting LAN.

Page 26: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#26EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

IEEE 802.11 WLAN, History

1997 IEEE 802.11 working group developed standard for inter-working wireless LAN products for 1 and 2 Mbps data rates in 2.4 GHz ISM (industrial, scientific, and medical) band (2400-2483 MHz)

Required that mobile station should communicate with any wired or mobile station transparently (802.11 should appear like any other 802 LAN above MAC layer), so 802.11 MAC layer attempts to hide nature of wireless layer (eg, responsible for data retransmission)

Page 27: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#27EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

802.11 WLAN History, Cont..

1999 IEEE 802.11a amendment for 5 GHz band operation and 802.11b amendment to support up to 11 Mbps data rate at 24 GHz

MAC sub layer uses CSMA/CA (carrier sense multiple access with collision avoidance)

Page 28: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#28EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

802.11 Architecture

MAC Layer

Physical Layer ConvergenceProcedure (PLCP)

Physical Medium Dependent(PMD) sub layer

MAC provides asynchronous, connectionless service

Page 29: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#29EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Frame type and subtypes

Three type of frames—Management

—Control

—Asynchronous data

Each type has subtypes

Control—RTS

—CTS

—ACK

Page 30: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#30EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Frame type and subtypes, Cont..

Management

—Association request/ response

—Re-association request/ response

—Probe request/ response

—privacy request/ response

—Beacon (Time stamp, beacon interval, TDIM period, TDIM count, channels sync info, ESS ID, TIM broadcast indicator)

Page 31: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#31EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Frame type and subtypes, Cont..

Management…

—TIM (Traffic Indication Map) indicates traffic to a dozing node

—dissociation

—Authentication

Page 32: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#32EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Authentication

Three levels of authentication

—Open: AP does not challenge the identity of the node.

—Password: upon association, the AP demands a password from the node.

—Public Key: Each node has a public key. Upon association, the AP sends an encrypted message using the nodes public key. The node needs to respond correctly using it private key.

Page 33: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#33EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

802.11 MAC Frame Format

FrameControl

Duration Addr 1

ProtocolVersion

Type Sub type To DS

FromDS

RetryLastFragment

RSVDEPPower Mgt

CRCSequenceControl

User Data

Address 4Addr 2 Addr 3

MAC Header

Page 34: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#34EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

802.11 MAC Frame Format

Address Fields contains

—Source address

—Destination address

—AP address

—Transmitting station address

DS = Distribution System

User Data, up to 2304 bytes long

Page 35: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#35EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

IEEE 802.11 LLC Layer

Provides three type of service for exchanging data between (mobile) devices connected to the same LAN

—Acknowledged connectionless

—Un-acknowledged connectionless, useful for broadcasting or multicasting.

—Connection oriented

Higher layers expect error free transmission

Page 36: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#36EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

IEEE 802.11 LLC Layer, Cont..

Each SAP (Service Access Point) address is 7 bits. One bit is added to it to indicate whether it is order or response.

Control has three values—Information, carry user data—Supervisory, for error control and flow

control—Unnumbered, other type of control packet

Destination SAP

Source SAP

DataControl

Page 37: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#37EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

IEEE 802.11 LLC <-> MAC Primitives

Four types of primitives are exchanged between LLC and MAC Layer

Request: order to perform a function

Confirm: response to Request

Indication: inform an event

Response: inform completion of process began by Indication

Page 38: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#38EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Reception of packets

AP Buffer traffic to sleeping nodes

Sleeping nodes wake up to listen to TIM (Traffic Indication Map) in the Beacon

AP send a DTIM (Delivery TIM) followed by the data for that station.

Beacon contains, time stamp, beacon interval, DTIM period, DTIM count, sync info, TIM broadcast indicator

Page 39: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#39EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN

1995 ETSI technical group RES 10 (Radio Equipment and Systems) developed HIPERLAN/1 wireless LAN standards using 5 channels in 5.15-5.3 GHz frequency range—Technical group BRAN (Broadband Radio

Access Network) is standardizing HIPERLAN/2 for wireless ATM

—ETSI URL for Hiperlan information http://www.etsi.org/frameset/home.htm?/technicalactiv/Hiperlan/hiperlan2.htm

Page 40: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#40EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN Characteristics

HIPERLANs with same radio frequencies might overlap

—Stations have unique node identifiers (NID)

—Stations belonging to same HIPERLAN share a common HIPERLAN identifier (HID)

—Stations of different HIPERLANs using same frequencies cause interference and reduce data transmission capacity of each HIPERLAN

—Packets with different HIDs are rejected to avoid confusion of data

Page 41: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#41EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN Protocol Layers

Data link layer = logical link control (LLC) sub layer + MAC sub layer + channel access control (CAC) sub layer

data link

physical

LLC

MAC

network

CAC

Page 42: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#42EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN Protocol Layers, Cont..

MAC sub layer:—Keeps track of HIPERLAN addresses (HID

+ NID) in overlapping HIPERLANs—Provides lookup service between network

names and HIDs—Converts IEEE-style MAC addresses to

HIPERLAN addresses—Provides encryption of data for security

Page 43: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#43EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN Protocol Layers, Cont..

MAC sub layer:—Provides “multi hop routing” – certain

stations can perform store-and-forwarding of frames

—Recognizes user priority indication (for time-sensitive frames)

Page 44: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#44EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN Protocol Layers, Cont..

CAC sub layer:—Non-preemptive priority multiple access

(NPMA) gives high priority traffic preference over low priority

—Stations gain access to channel through channel access cycles consisting of 4 phases:

Page 45: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#45EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN Protocol Layers, Cont…

CAC is designed to give each station (of same priority) equal chance to access the channel —First stations with highest priority data are

chosen. The rest will back off until all higher priority data is transmitted.

—Stations with the same priority level data, compete according to a given rule to choose “survivors”

—Survivors wait a random number of time slots and then listen to see if the channel is idle

Page 46: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#46EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

HIPERLAN Protocol Layers, Cont…

—If the channel is idle then it starts transmitting.

—Those who could not transmit wait until next period

Page 47: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#47EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

Reading assignment

Mobile Data and Wireless LAN technologies, Riffat Dayem, Chapters 4, 6 and 8.

Wirless LAN, Jim Geier, Part I chapter 3, Part II chapter 4

Page 48: Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks

#48EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU

3G

http://www.3gpp.org/