Top Banner
Wireless LANs • Rat’s nest of wires • Variety of power cords and adapters • Cables for modems, printers, scanner, mouse and keyboards • NEED OF CONNECTING COMPUTERS
64
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wireless presentation-1

Wireless LANs

• Rat’s nest of wires

• Variety of power cords and adapters

• Cables for modems, printers, scanner, mouse and keyboards

• NEED OF CONNECTING COMPUTERS

Page 2: Wireless presentation-1

Challenges• Radio and Infrared transmissions susceptible to

noise and interference– Unreliable transmission

• Strength varies in time and space– Fading

• Finite Radio Spectrum– Shared with other systems

• Radio spectrum regulated by different bodies

Page 3: Wireless presentation-1

Wireless LANs

• IEEE 802.11 Standards

• Non IEEE Standards like– Bluetooth, HIPERLAN, HomeRF

Page 4: Wireless presentation-1

What is IEEE 802.11?

• IEEE:– Institute of Electrical and Electronics Engineers

• 802.11:– Family of standards set forth by the IEEE to

define the specifications for wireless LANs– Defines:

• Medium Access Control (MAC)

• Physical Layer (PHY) Specifications

Page 5: Wireless presentation-1

IEEE 802.11 and the ISO stack

Page 6: Wireless presentation-1

What is IEEE 802.11?

• Local, high-speed wireless connectivity for fixed, portable and moving stations – stations can be moving at pedestrian and

vehicular speeds

• Standard promises interoperability– vendors products on the same physical layer

should interoperate

• Targetted for use in– inside buildings, outdoor areas, anywhere!

Page 7: Wireless presentation-1

IEEE 802.11

• Uses Direct Sequence spread spectrum (DSSS) technology– Frequency-Hopping spread spectrum (FHSS)

can only be used for 1 or 2Mbps in US due to FCC regulations

• Operates in unlicensed 2.4 GHz ISM band– ISM: Industrial, Scientific and Medical– ISM regulatory range:

• 2.4 GHz to 2.4835 GHz for North America

Page 8: Wireless presentation-1

IEEE 802.11

• Supported Speeds and Distances– 1, 2, 5.5, 11 Mbps at distances of 150-2000 feet

without special antenna– Greater distances can be achieved by using

special antennas– Distance (or signal strength) greatly depends on

obstructions such as buildings and other objects– Maximum speed obtained depends on signal

strength

Page 9: Wireless presentation-1

IEEE 802.11b

• ‘b’ in IEEE 802.11b– September 1999, 802.11b “High Rate”

amendment was ratified by the IEEE– 802.11b amendment to 802.11 only affects the

physical layer, basic architecture is the same• Added two higher speeds

– 5.5 and 11 Mbps

• More robust connectivity

• 802.11b is the current ‘favorite’ in 802.11– also known as Wi-Fi (Wireless Fidelity)

Page 10: Wireless presentation-1

IEEE 802.11a

• “Fast Ethernet” standard of wireless LANs

• Speeds of up to 54 Mbps

• 5 GHz (U-NII band) instead of 2.4 GHz – Unlicensed National Information Infrastructure

• OFDM instead of DSSS for encoding– Orthogonal Frequency Division Multiplexing

Page 11: Wireless presentation-1

IEEE 802.11a

• Advantages– higher speed– less RF interference than 2.4 GHz

• 2.4 GHz used by Bluetooth, cordless/cellular phones, etc.

– some interoperability, vendors currently have “dual-standard” 802.11a/b equipment

• Disadvantages– shorter range, need to increase AP density or

power 4X to compensate

Page 12: Wireless presentation-1

IEEE 802.11g

• Another high-speed standard

• Viewed as a ‘step’ towards 802.11a

• Speeds of up to 54 Mbps– may be more like 20+ Mbps

• Still works at 2.4 GHz – not in the 5 GHz range like 802.11a

• Advantages– compatible with 802.11b– better range than 802.11a, for now

Page 13: Wireless presentation-1

IEEE 802.11e

• Another upcoming standard for WLANs– adds quality-of-service features to MAC layer of

802.11b compatible networks• error correction

• better bandwidth management– significantly improves multimedia performance

• works around RF interference– handles interference by moving away from it

– i.e., moves to a new frequency when interference from a 2.4 GHz cordless phone is detected

Page 14: Wireless presentation-1

IEEE 802.11 and the ISO stack

Page 15: Wireless presentation-1

IEEE 802.11 Physical Layer

• 802.11 Physical Layer Specifications– include FHSS, DSSS, IR

• PLCP: Physical Layer Convergence Protocol– interface used by the other physical layer specs– maps data units into a suitable framing format

• PMD system: Physical Medium Dependent– defines the characteristics/method of Tx/Rx data

through a wireless medium between 2 or more stations

Page 16: Wireless presentation-1

IEEE 802.11 Physical Layer

• Spread Spectrum– spreads the transmitted signal over a wide range

of spectrum– avoids concentrating power in a single narrow

frequency band– noise makes this necessary so that receiver can

accurately decode the transmitted signal– 2 major approaches to spread spectrum:

• FHSS: Frequency Hopping Spread Spectrum

• DSSS: Direct Sequence Spread Spectrum

Page 17: Wireless presentation-1

IEEE 802.11 Data Link Layer

• 2 Sublayers– Logical Link Control (LLC)– Media Access Control (MAC)

• 802.11 uses the same 802.2 LLC– same 48-bit addressing as other 802 LANs

• MAC address is 6 bytes or 48 bits

– allows for simple bridging to wired networks

• MAC sublayer is unique in 802.11

Page 18: Wireless presentation-1

IEEE 802.11 MAC Sublayer

• MAC: Regulates access to the medium

• Wired IEEE 802 LANs use CSMA/CD

• 802.11 uses CSMA/CA

• CSMA: carrier sense multiple access– CD: with collision detection– CA: with collision avoidance

• Collision detection is not possible in 802.11– near/far problem: can’t transmit and “hear” a

collision at the same time

Page 19: Wireless presentation-1

IEEE 802.11 MAC Sublayer

• CSMA/CA avoids collisions by explicit packet acknowledgment (ACK)– station wishing to transmit first senses the medium– if no activity detected, station waits an additional,

random amount of time then transmits if the medium is still free

– ACK packet is sent by receiving station to confirm the data packet arrived intact

– collision assumed if sending station doesn’t get ACK, data is retransmitted after a random time

Page 20: Wireless presentation-1

IEEE 802.11 MAC Sublayer

• Other unique features in 802.11– IFS: Inter Frame Space

• time interval between frames

– Handling hidden stations (hidden-node problem)• virtual carrier sense

– Power management functions– Data security (MAC address, WEP)

• WEP: Wired Equivalent Privacy

– Multirate support– Fragmentation / Defragmentation

Page 21: Wireless presentation-1

Coordination Functions of MAC

• Determine when a station in a BSS is allowed to transmit and when it may be able to receive PDUs over the wireless medium

• Distributed Coordination Function (DCF)– Provides support for asynchronous data transfer of

MAC SDUs on a best effort basis– Contention Mode for all station

Page 22: Wireless presentation-1

Coordination Functions of MAC

• Point Coordination Function– Optional and sits on top of DCF– May be implemented by an AP– Connection-oriented time bound transfer of MAC

SDUs– Contention and contenion-free periods– Medium usage controlled by AP (synchronization

and timing)

Page 23: Wireless presentation-1

DCF• Basic access method• Contention services for fair service to all stations• All stations required to support DCF• Based on CSMA-CA protocol

– All stations obliged to remain quiet for a certain minimum period after a transmission has been completed called the interframe space (IFS)

– High priority frames: SIFS– PCF Priority access to the medium: PIFS– DCF Interframe Space: DIFS

• Transmit data and management MPDUs

Page 24: Wireless presentation-1

IEEE 802.11: A Closer Look

Page 25: Wireless presentation-1

IEEE 802.11 Frame Types• Three types of frames

– Control• RTS, CTS, ACK, Contention-Free (CF), PS-Poll• Used for handshaking and for positive acknowledgements during

the data transfer

– Management• Probe request/response• Station Association and Disassociation with the AP• Timing and Synchronization• Authentication / deauthentication• Announcement traffic indication message (ATIM)

– sent after each frame

– Data• Transmission of data

Page 26: Wireless presentation-1

CSMA-CA operation• A station is allowed to transmit an initial MAC PDU

under DCF if the station detects the medium idle for a period DIFS or greater. If the station detects medium busy, then it must calculate a random backoff time to schedule a reattempt. A station that has scheduled a reattempt monitors the medium and decrements a counter each time an idle contention slot expires. The station is allowed to transmit when its backoff timer expires during the contention period.

• Idle period after a DIFS period called contention window (CW)

Page 27: Wireless presentation-1

Handshaking in CSMA-CA

• Required when there is hidden station problem. If a station A wants to send data frame to station B, station A first sends a request-to-send (RTS) frame. If station B receives the RTS frame, then B issues a clear-to-send (CTS) frame. All stations within range of B receive CTS frame and are aware that station A has been given permission to send, so they remain quiet while station A proceeds with its data frame transmission. If the data frame arrives without error, station B responds with an ACK. If two stations send RTS frames at the same time and they collide at B then the stations must execute a backoff to schedule a later attempt.

Page 28: Wireless presentation-1

DIFS

DIFS

Next Frame

Contention Window

SIFS

PIFS

Busy Medium

Defer Access Wait forreattempt time

Time

Basic CSMA-CA operation

Page 29: Wireless presentation-1

IEEE 802.11 Topologies

• Three basic topologies for WLANs– IBSS: Independent Basic Service Set– BSS: Basic Service Set– ESS: Extended Service Set

• Independent of type of PHY chosen

Page 30: Wireless presentation-1

IEEE 802.11 IBSS

• IBSS: Independent Basic Service Set– Peer-to-peer or ad-hoc network– Wireless stations communicate directly with one

another– Generally are not connected to a larger network– No Access Point (AP)

Page 31: Wireless presentation-1

IEEE 802.11 BSS

• BSS: Basic Service Set– Infrastructure mode– An AP connects clients to a wired network

Page 32: Wireless presentation-1

BSS

• Defined as group of stations that coordinate their access to the medium under a given instance of the medium access control

• Area covered by BSS called Basic Service Area (BSA)– Analogous to a cell in cellular network– Upto a diameter of tens of meters

Page 33: Wireless presentation-1

BSS and Adhoc Wireless Network

• Adhoc Network consists of group of stations within range of each other

• Typically temporal in nature

• Can be formed spontaneously anywhere

• Disbanded after a limited period of time

Page 34: Wireless presentation-1

IEEE 802.11 ESS

• ESS: Extended Service Set– A set of BSSs interconnected by a distribution

system– Consists of overlapping BSSs (each with an AP)

• DS connects APs together, almost always Ethernet

• ESS allows clients to seamlessly roam between APs

Page 35: Wireless presentation-1

Access Point

• Similar in functionality to base station in a cellular system

• ESS can also provide gateway access for wireless users into a wired network such as Internet– Such access accomplished via a device called portal

• Infrastructure network refers to combination of BSSs, a distribution system and portals

Page 36: Wireless presentation-1

Access Points (APs)

• To join an infrastructure BSS, a station must select an AP and establish an association with it

• This establishes mapping between station and the AP

• Station can then send and receive data messages via the AP

• Reassociation and Dissociation services

Page 37: Wireless presentation-1

Access Points (APs)

• Usually connects wireless and wired networks– if not wired

• acts as an extension point

• Creation of ESS by overlapping AP coverage

– allows roaming operation– APs should be on different channels

Page 38: Wireless presentation-1

Access Points (APs)

• Capacity and Bandwidth– Possible to keep these higher by using these

techniques• Reducing size of coverage areas

• Reducing client-to-AP ratio

• Using bandwidth aggregation– AP-to-client ratio

– load balancing

Page 39: Wireless presentation-1

Access Points (APs)

• Roaming– More than 1 AP provides signals to a single

client– Client is responsible for choosing the best AP

• first, signal strength. second, network utilization.

– When signal in use degrades, client tries to find another AP

• if found, tries to authenticate and associate

Page 40: Wireless presentation-1

Access Points (APs)

• Configuration– Management usually done via

• HTTP, Telnet, SNMP, serial interface

– Configuring Security Settings• SSID: Service Set Identifier

• WEP: Wired Equivalent Privacy

• EAP: Extensible Authentication Protocol

– Configuring Network Settings• DHCP: Dynamic Host Configuration Protocol

• NAT: Network Address Translation

Page 41: Wireless presentation-1

Access Points (APs)

• How to setup a secure access point– Enable WEP or EAP– Change SSID and disable broadcast– Change the management password of your AP

• some have 2: read-only as well as read-write

– Use MAC address filtering– Consider not using DHCP

• instead use fixed IP addresses for wireless NICs

– Consider other mechanisms for privacy• PPTP, VPN, SSL, SSH

Page 42: Wireless presentation-1

IEEE 802.11 Security

• Authentication– Open system– Shared key

• Authorization– MAC address

• Privacy– WEP: Wired Equivalent Privacy

Page 43: Wireless presentation-1

Overview of the Bluetooth technology

Page 44: Wireless presentation-1

• Bluetooth must be able to:• Recognize any other Bluetooth device in radio range• Permit easy connection of these devices• Be aware of the device types• Support service discovery• Support connectivity aware applications

• Examples of Bluetooth uses:• Briefcase email: access email while the PC is still in the

briefcase; when PC receives an email, you are notified thru the mobile phone. Use the mobile phone to browse the email.

• Cordless desktop: connect your desktop/laptop cordlessly to printers, scanner, keyboard, mouse, etc.

Bluetooth

Page 45: Wireless presentation-1

• Bluetooth radio modules operate in the unlicensed ISM band centered at at 2.45GHz. RF channels:2420+k MHZ, k=0..78.

• Bluetooth devices within 10m of each other can share up to 720kbps of capacity

• Projected cost for a Bluetooth chip is ~$5. Plus its low power consumption, means you could literally place one anywhere.

• Can operate on both circuit and packet switching modes, providing both synchronous and asynchronous data services

• It is intended to support an open-ended list of applications, including data, audio, graphics and even video.

Bluetooth

Page 46: Wireless presentation-1

Bluetooth Architecture

• Up to 8 devices can communicate in a small network, called piconet.• 10 piconets can coexist in the same coverage range of the Bluetooth

radio.• Each piconet has 1 MASTER and the rest serve as SLAVES.

SLAVES within a piconet only have links to the MASTER.• Multi-hop communication is obtained thru the scatternet.

Page 47: Wireless presentation-1
Page 48: Wireless presentation-1

• Does not address routing, most network functions are pushed into the link layer

• Does not support multi-hop multicasting

• Does not address how to cope with mobility !

• The MASTER node is the bottleneck

• No. of nodes in piconet is limited

• Does not address power-saving methods done at upper layers, above the link-layer

Bluetooth Limitations

Page 49: Wireless presentation-1

Any kind of network simulation

Including mobile and wireless network simulation

NS : Network Simulator

Page 50: Wireless presentation-1

OutlinesUse NS to simulate wireless network

Extend NS to support mobile and wireless application: Internal implementation

Page 51: Wireless presentation-1

ns-2 overview•Collection of various protocols at multiple layers

TCP(reno, tahoe, vegas, sack)

MAC(802.11, 802.3, TDMA)

Ad-hoc Routing (DSDV, DSR, AODV, TORA)

Sensor Network (diffusion, gaf)

Multicast protocols, Satellite protocols, and many others

•Codes are contributed from multiple research communities

Good: Large set of simulation modules

Bad: Level of support and documentation varies

•The source code and documentation is currently maintained by VINT project at ISI

Page 52: Wireless presentation-1

Introduction•ns-2 is an discrete event driven simulation

Physical activities are translated to events

Events are queued and processed in the order of their scheduled occurrences

Time progresses as the events are processed

1 2

Time: 1.5 sec Time: 1.7 sec

Time: 1.8 secTime: 2.0 sec

Page 53: Wireless presentation-1

TX Pkt Event @ 1.5sec

Node 1 Module

Node 2 Module

TX Pkt Event @ 1.5sec

RX Pkt Event @ 1.7sec

RX Pkt Event @ 1.7sec

TX Ack Event @ 1.8sec

TX Ack Event @ 1.8sec

RX Ack Event @ 2.0sec

RX Ack Event @ 2.0sec

Event Queue

Simulation Finished!

Event Driven Simulation

Page 54: Wireless presentation-1
Page 55: Wireless presentation-1

Network Components inside a mobile nodeLink Layer

ARP

Interface Queue

Mac Layer: IEEE 802.11

Network Interface

Radio Propagation Model

Friss-space attenuation(1/ ) at near distance

Two ray Ground (1/ ) at far distance

2r2r

Page 56: Wireless presentation-1

Mobile Node Modules

•AgentResponsible for packet generations and receptions

Can think of it as an Application layer

CBR(Constant Bit Rate), TCP, Sink, FTP, etc.

•RTagent(DSDV, TORA, AODV) or DSRAd-hoc network routing protocols

Configure multi hop routes for packets

•LL (Link Layer) Runs data link protocols

Fragmentation and reassembly of packet

Runs Address Resolution Protocol(ARP) to resolve IP address to MAC address conversions

Page 57: Wireless presentation-1

Mobile Node Modules (Continued)

•IFq (Interface Queue)PriQueue is implemented to give priority to routing protocol packets

Supports filter to remove packets destined to specific address

•Mac Layer IEEE 802.11 protocol is implemented

Uses RTS/CTS/DATA/ACK pattern for all unicast pkts and DATA for broadcast pkts

Page 58: Wireless presentation-1

Mobile Node Modules (Continued)

•NetIF (Network Interfaces)Hardware interface used by mobilenode to access the channel

Simulates signal integrity, collision, tx error

Mark each transmitted packet with transmission power, wavelength etc.

•Radio Propagation Model Uses Friss-space attenuation(1/r2) at near distance and Two ray ground (1/r4) at far distance

Decides whether the packet can be received by the mobilenode with given distance, transmit power and wavelength

Implements Omni Directional Antenna module which has unity gain for all direction

Page 59: Wireless presentation-1

Wireless Simulation in ns-2 (Mobile Node Diagram - DSDV)

Agent(Src/ Sink)

Port

Demux

LL

I Fq

MAC

NetIFRadio

PropagationModel

Channel

ARP

Addr

Demux

RTagent(DSDV)

Page 60: Wireless presentation-1

Agent(Src/ Sink)

Port

Demux

DSR

LL

IFq

MAC

NetIFRadio

PropagationModel

Channel

ARP

Wireless Simulation in ns-2 (Mobile Node Diagram - DSR)

Page 61: Wireless presentation-1

Abstract the real mobile world into your simulationNode

Packets

Wireless channel and channel access

Forwarding and routing

Radio propagation model

Trace/Visualization

Event scheduler to make everything running

Page 62: Wireless presentation-1

Implementing mobile node by Extending “standard” NS node

Classifier:Forwarding

Agent: Protocol Entity

Node Entry

Node

ARP

Radio Propagation Model

MobileNode

LL

MAC

PHY

LL

CHANNEL

LL

MAC

LL:Link layer object

IFQ:Interface queue

MAC:Mac object

PHY PHY:Net interface

Routing

Page 63: Wireless presentation-1

ReferencesAnand Trivedi’s IEEE 802.11 Page

– http://alpha.fdu.edu/~anandt/introduction.html

• IEEE 802.11 Working Group Page– http://www.ieee802.org/11/– Can download the 802 standards here for FREE– Has links to all the latest 802.11 developments

• O’Reilly– http://oreilly.wirelessdevnet.com/

• http://wireless.telerama.com

Page 64: Wireless presentation-1

THAT’S ALL