• No results found

COMP 3331/9331: Computer Networks and Applications

N/A
N/A
Protected

Academic year: 2021

Share "COMP 3331/9331: Computer Networks and Applications"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

(1)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 1

COMP 3331/9331:

Computer Networks and

Applications

Week 10

Wireless Networks

Reading Guide: Chapter 6: 6.1 – 6.3

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 2

Wireless and Mobile Networks

Background:

• 

# wireless (mobile) phone subscribers now exceeds #

wired phone subscribers!

• 

computer nets: laptops, palmtops, PDAs,

Internet-enabled phone promise anytime untethered Internet

access

• 

two important (but different) challenges

•  wireless: communication over wireless link

•  mobility: handling mobile user who changes point of

attachment to network

COMP3331/9331

Wireless Networks + Security 3

Wireless Networks: Roadmap

• 

6.1 Introduction

• 

6.2

Wireless links,

characteristics

•  CDMA • 

6.3

IEEE 802.11 wireless

LANs ( wi-fi )

• 

REST EXCLUDED

(2)

Computer Networks and Applications

Wireless Networks + Security 4

Elements of a wireless network

network infrastructure

wireless hosts •  laptop, PDA, IP phone •  run applications •  may be stationary

(non-mobile) or mobile •  wireless does not always

mean mobility

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 5

Elements of a wireless network

network infrastructure

base station •  typically connected to

wired network •  relay - responsible for

sending packets between wired network and wireless host(s) in its

area

•  e.g., cell towers

802.11 access points

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 6

Elements of a wireless network

network infrastructure

wireless link

•  typically used to connect mobile(s) to base station •  also used as backbone

link

•  multiple access protocol coordinates link access •  various data rates,

(3)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 7

Characteristics of selected wireless link

standards

Indoor 10-30m Outdoor 50-200m Mid-range outdoor 200m – 4 Km Long-range outdoor 5Km – 20 Km .056 .384 1 4 5-11 54 IS-95, CDMA, GSM 2G UMTS/WCDMA, CDMA2000 3G 802.15 802.11b 802.11a,g

UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO 3G cellular enhanced 802.16 (WiMAX) 802.11a,g point-to-point 200 802.11n D at a ra te (Mb ps) data COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 8

News: White Spaces

• 

TV Spectrum (700Mhz range) is freeing up as we move

from analog to digital transmissions

• 

White Space: Unused radio spectrum space

• 

Idea: Why not use this idle spectrum for wireless

communication?

• 

This idea can be extended to other frequencies as well

•  Secondary users can transmit over unused spectrum until

primary users become active

•  Secondary users should be able to sense the presence of primary

users

• 

US FCC approved the use of the 700MHz TV spectrum

• 

Working prototype developed by Microsoft

http://news.cnet.com/8301-30686_3-20017435-266.html

COMP3331/9331

Wireless Networks + Security 9

Elements of a wireless network

network infrastructure

infrastructure mode •  base station connects

mobiles into wired network

•  handoff: mobile changes base station providing connection into wired network

(4)

Computer Networks and Applications

Wireless Networks + Security 10

Elements of a wireless network

Ad hoc mode •  no base stations •  nodes can only transmit

to other nodes within link coverage

•  nodes organize themselves into a network: route among themselves

E.g: wireless sensor networks, vehicular ad-hoc networks

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 11

Wireless network taxonomy

single hop multiple hops

infrastructure (e.g., APs)

no infrastructure

host connects to base station (WiFi, WiMAX, cellular) which connects to larger Internet no base station, no connection to larger Internet (Bluetooth, ad hoc nets)

host may have to relay through several

wireless nodes to connect to larger Internet: mesh networks

no base station, no connection to larger Internet. May have to relay to reach other a given wireless node MANET, VANET

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 12

Wireless Networks: Roadmap

• 

6.1

Introduction

• 

6.2 Wireless links,

characteristics

•  CDMA • 

6.3

IEEE 802.11 wireless

LANs ( wi-fi )

(5)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 13

Wireless Link Characteristics (1)

Differences from wired link ….

• 

decreased signal strength:

radio signal attenuates as it

propagates through matter (path loss)

• 

interference from other sources:

standardized wireless

network frequencies (e.g., 2.4 GHz) shared by other

devices (e.g., phone); devices (motors) interfere as well

• 

multipath propagation:

radio signal reflects off objects

ground, arriving at the destination at slightly different

times

…. make communication across (even a point to point)

wireless link much more difficult

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 14

Wireless Link Characteristics (2)

•  SNR: signal-to-noise ratio

•  larger SNR – easier to extract signal from noise (a good thing )

•  SNR versus BER tradeoffs

•  given physical layer: increase power -> increase SNR->decrease BER (bit error rate)

•  given SNR: choose physical layer that meets BER requirement, giving highest throughput

•  SNR may change with mobility: dynamically adapt physical layer (modulation technique, rate)

10 20 30 40 QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) SNR(dB) BER 10-1 10-2 10-3 10-5 10-6 10-7 10-4

SNR (db) = 20 log (amp of signal/amp of noise)

COMP3331/9331

Wireless Networks + Security 15

Wireless network characteristics

Multiple wireless senders and receivers create

additional problems (beyond multiple access):

A B

C

Hidden terminal problem

•  B, A hear each other •  B, C hear each other •  A, C can not hear each other means A, C unaware of their

interference at B A B C A s signal strength space C s signal strength

Signal fading:

•  B, A hear each other •  B, C hear each other •  A, C can not hear each other

(6)

Computer Networks and Applications

Wireless Networks + Security 16

Recall: Multiple Access Protocols

Random Access

Taking Turns

Channel Partitioning

• 

TDMA

• 

FDMA

• 

Now we study CDMA

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 17

Code Division Multiple Access (CDMA)

• 

used in several wireless broadcast channels (cellular,

satellite, etc) standards

• 

unique code assigned to each user; i.e., code set

partitioning

• 

all users share same frequency, but each user has own

chipping sequence (i.e., code) to encode data

• 

encoded signal

= (original data) X (chipping sequence)

• 

decoding:

inner-product of encoded signal and chipping

sequence

• 

allows multiple users to coexist and transmit

simultaneously with minimal interference (if codes are

orthogonal )

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 18

CDMA: Encoding and Decoding

• 

Assume original data are represented by 1 and -1

• 

Encoded signal

= (original data) modulated by (chipping

sequence)

•  assume cm = 1 1 1 -1 1 -1 -1 -1

•  if data is 1, send 1 1 1 -1 1 -1 -1 -1 •  if data is -1 send -1 -1 -1 1 -1 1 1 1

• 

Decoding:

inner-product (summation of bit-by-bit product) of

encoded signal and chipping sequence

(7)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 19

CDMA Encode/Decode

slot 1 slot 0 d1 = -1 1 1 1 1 1 - - 1 1 - 1 - Zi,m= di.cm d0 = 1 1 1 1 1 1 - - 1 1 - 1 - 1 1 1 1 1 - - 1 1 - 1 - 1 1 1 1 1 - 1 - 1 - 1 - slot 0 channel output slot 1 channel output channel output Zi,m

sender code data bits slot 1 slot 0 d1 = -1 d0 = 1 1 1 1 1 1 - 1 - 1 - 1 - 1 1 1 1 1 - - 1 1 - 1 - 1 1 1 1 1 - - 1 1 - 1 - 1 1 1 1 1 - 1 - 1 - 1 - slot 0 channel output slot 1 channel output receiver code received input Di = m=1

Σ

Zi,m.cm M M Code of user m cm: 1 1 1 -1 1 -1 -1 -1

-  The number of bits of each chipping sequence is M - The i th data bit is di; write it down by duplicating it M times

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 20

CDMA: two-sender interference

Sender 1

Sender 2

Code 1: 1 1 1 -1 1 -1 -1 -1 Code 2: 1 -1 1 1 1 -1 1 1

COMP3331/9331

Wireless Networks + Security 21

CDMA codes

CDMA codes are orthogonal.

E.g: (1,1,1,-1,1,-1,-1,-1) and (1,-1,1,1,1,-1,1,1)

Inner product of the codes should be zero

If there are multiple CDMA codes all of the codes

have to be orthogonal to each other.

• 

E.g: 3 codes: A, B and C. Then A x B = 0, B x C = 0

and A x C = 0

C1: 1 1 1 -1 1 -1 -1 -1 C2: 1 -1 1 1 1 -1 1 1 --- C1 . C2 = 1 +(-1) + 1 + (-1) +1 + 1+ (-1)+(-1)=0

(8)

Computer Networks and Applications

Wireless Networks + Security 22

Roadmap

• 

6.1

Introduction

• 

6.2

Wireless links,

characteristics

•  CDMA • 

6.3 IEEE 802.11 wireless

LANs ( wi-fi )

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 23

IEEE 802.11 Wireless LAN

• 

802.11b

•  2.4-5 GHz unlicensed spectrum

•  up to 11 Mbps

•  direct sequence spread spectrum

(DSSS) in physical layer •  all hosts use same chipping code

• 

802.11a

•  5-6 GHz range •  up to 54 Mbps • 

802.11g

•  2.4-5 GHz range •  up to 54 Mbps • 

802.11n:

multiple antennae •  2.4-5 GHz range •  up to 200 Mbps

•  Standard ratified in Sept 2009

•  all use CSMA/CA for multiple access •  all have base-station and ad-hoc network versions

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 24

802.11 LAN architecture

•  wireless host communicates with base station

•  base station = access point (AP)

•  Basic Service Set (BSS) (aka cell ) in infrastructure mode contains:

•  wireless hosts

•  access point (AP): base

station

•  ad hoc mode: hosts only BSS 1 BSS 2 Internet switch or router AP AP

(9)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 25

802.11: Channels, association

•  802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different

frequencies

•  AP admin chooses frequency for AP

•  interference possible: channel can be same as that chosen by neighboring AP!

•  3 non-overlapping channels in 802.11b: 1, 6 and 11

•  host: must associate with an AP

•  scans channels, listening for beacon frames containing AP s name (SSID) and MAC address

•  selects AP to associate with

•  may perform authentication

•  will typically run DHCP to get IP address in AP s subnet

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 26

802.11b channels

COMP3331/9331

Wireless Networks + Security 27

802.11: passive/active scanning

AP 2 AP 1 H1 BBS 2 BBS 1 1 2 2 3 4 Active Scanning:

(1)  Probe Request frame broadcast from H1

(2)  Probes response frame sent from APs

(3)  Association Request frame sent: H1 to selected AP

(4)  Association Response frame sent: Selected AP to H1 AP 2 AP 1 H1 BBS 2 BBS 1 1 2 3 1 Passive Scanning:

(1)  beacon frames sent from APs (host scans for beacons on 11 channels) (2)  association Request frame sent:

H1 to selected AP

(3)  association Response frame sent: Selected AP to H1

(10)

Computer Networks and Applications

Wireless Networks + Security 28

IEEE 802.11: multiple access

• 

avoid collisions: 2

+

nodes transmitting at same time

• 

802.11: CSMA - sense before transmitting

•  don t collide with ongoing transmission by other node

• 

802.11: no collision detection! Why?

•  difficult to receive (sense collisions) when transmitting due to weak

received signals (fading)

•  can t sense all collisions in any case: hidden terminal, fading •  goal: avoid collisions: CSMA/C(ollision)A(voidance)

A B C A B C A s signal strength space C s signal strength COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 29

IEEE 802.11 MAC Protocol: CSMA/CA

802.11 sender

1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 ifsense channel busy then

start random backoff time timer counts down while channel idle transmit when timer expires

if no ACK, increase random backoff interval, repeat 2 802.11 receiver

- if frame received OK

return ACK after SIFS (ACK needed due to hidden terminal problem) sender receiver DIFS data SIFS ACK COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 30

CSMA/CA vs CSMA/CD

In 802.11 if sender senses channel to be busy, the

sender backs off for a random time (based on

exponential back-off)

In Ethernet, if the sender senses channel to be

busy, the sender keeps sensing the channel until it

becomes free

(11)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 31

Avoiding collisions & dealing with

hidden nodes

idea: allow sender to reserve channel rather than random access of data frames: avoid collisions of long data frames

•  sender first transmits small request-to-send (RTS) packets to BS using CSMA (OPTIONAL used for Longer data frames)

•  RTSs may still collide with each other (but they re short)

•  BS broadcasts clear-to-send CTS in response to RTS after waiting for SIFS duration

•  RTS/CTS heard by all nodes

•  sender transmits data frame after waiting for SIFS duration

•  other stations defer transmissions by setting Network Allocation Vector (NAV)

Avoid data frame collisions completely

using small reservation packets!

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 32

Collision Avoidance: RTS-CTS exchange

AP A B time RTS(A) RTS(B) RTS(A) CTS(A) CTS(A) DATA (A) ACK(A) ACK(A) reservation collision defer COMP3331/9331

Wireless Networks + Security 33

RTS/CTS Illustration

t DIFS data defer access other stations receiver sender data DIFS new contention RTS CTS SIFS SIFS NAV (RTS) NAV (CTS) B AP CTS CTS A RTS RTS

(12)

Computer Networks and Applications

Wireless Networks + Security 34

frame control duration address 1 address 2 address 4 address 3 payload CRC 2 2 6 6 6 2 6 0 - 2312 4 seq control

802.11 frame: addressing

Address 2: MAC address of wireless host or AP transmitting this frame Address 1: MAC address of wireless host or AP

to receive this frame Address 3:of router interface to which MAC address AP is attached

Address 4: used only in ad hoc mode

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 35

Internet router

AP

H1 R1

AP MAC addr H1 MAC addr R1 MAC addr

address 1 address 2 address 3

802.11 frame

R1 MAC addr AP MAC addr

dest. address source address

802.3 (Ethernet) frame

802.11 frame: addressing

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 36

frame control duration address 1 address 2 address 4 address 3 payload CRC 2 2 6 6 6 2 6 0 - 2312 4 seq control

Type Subtype AP To From AP More frag Retry Power mgt More data WEP Rsvd Protocol version 2 2 4 1 1 1 1 1 1 1 1

802.11 frame: more

duration of reserved transmission time (RTS/CTS) frame seq # (for reliable ARQ)

frame type (RTS, CTS, ACK, data)

(13)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 37

switch

AP 2 AP 1

H1 BBS 2

BBS 1

802.11: mobility within same subnet

router

• 

H1 remains in same IP

subnet: IP address can

remain same

• 

switch: which AP is

associated with H1?

• self-learning (link-layer):

switch will see frame from H1 and remember which switch port can be used to reach H1

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 38

802.11: advanced capabilities

Rate Adaptation

• 

base station, mobile

dynamically change

transmission rate

(physical layer

modulation technique) as

mobile moves, SNR

varies

QAM256 (8 Mbps) QAM16 (4 Mbps) BPSK (1 Mbps) 10 20 30 40 SNR(dB) BER 10-1 10-2 10-3 10-5 10-6 10-7 10-4 operating point 1. SNR decreases, BER increase as node moves away from base station 2. When BER becomes too high, switch to lower transmission rate but with lower BER

COMP3331/9331

Wireless Networks + Security 39 M radius of coverage S S S P P P P M S Master device Slave device Parked device (inactive)

P

802.15: personal area network

•  less than 10 m diameter •  replacement for cables (mouse,

keyboard, headphones) •  ad hoc: no infrastructure •  master/slaves:

•  slaves request permission to send (to master)

•  master grants requests

•  802.15: evolved from Bluetooth specification

•  2.4-2.5 GHz radio band

•  up to 4Mbps

•  Frequency hopping spread spectrum (FHSS)

(14)

Computer Networks and Applications

Wireless Networks + Security 40

802.16: WiMAX (SELF-STUDY)

like 802.11 & cellular:

base station model

• 

transmissions to/from base

station by hosts with

omnidirectional antenna

• 

base station-to-base station

backhaul with

point-to-point antenna

unlike 802.11:

• 

range ~ 6 miles ( city

rather than coffee shop )

• 

~14 Mbps

Long Term Evolution

(LTE) - emerging

point-to-multipoint point-to-point

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 41

802.16: WiMAX: downlink, uplink scheduling

• 

transmission frame

• 

down-link sub-frame: base station to node

• 

uplink sub-frame: node to base station

pre

am. DL-

MAP UL- MAP

DL burst 1 SS #1 DL burst 2 DL burst n Initial maint. request conn. downlink subframe SS #2 SS #k uplink subframe … … … …

base station tells nodes who will get to receive (DL map) and who will get to send (UL map), and when

• 

WiMAX standard provide mechanism for scheduling, but

not scheduling algorithm

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 42

Quiz

The 802.11 protocol does not implement collision

detection because

• 

Collision detection was found to be useless in wired

Ethernet

• 

The adapter would not be able to detect all collisions

due to hidden terminal

• 

Collisions are not possible in 802.11

In 802.11 a host can re-associate with a new AP in

the subnet without changing its IP address

• 

True or False

(15)

COMP3331/9331

Computer Networks and Applications

Wireless Networks + Security 43

Wireless, mobility: impact on higher layer protocols

• 

logically, impact should be minimal …

• 

best effort service model remains unchanged

• 

TCP and UDP can (and do) run over wireless, mobile

• 

… but performance-wise:

• 

packet loss/delay due to bit-errors (discarded packets, delays

for link-layer retransmissions), and handoff

• 

TCP interprets loss as congestion, will decrease congestion

window un-necessarily

• 

delay impairments for real-time traffic

• 

limited bandwidth of wireless links

COMP3331/9331

Computer Networks and Applications

Summary

References

Related documents

The results indicate that good relationship exists between service quality dimensions (reliability, empathy, assurance, responsiveness and tangibility) and customer satisfaction..

Following satisfactory completion of the pre-send vetting, ESPs may allow the sender to complete a test send of messages to a small, randomly selected segment of their lists.

Project Leader, Vertebrate Pest Control, Control and Eradication, Department of Food and Agriculture, Sacramento,

avoid data frame collisions completely using small reservation packets. Collision Avoidance: RTS-CTS exchange AP A B time RTS(A) RTS(B) RTS(A) CTS(A) CTS(A) DATA (A)

allow sender to “reserve” channel rather than random access of data frames: avoid collisions of long data frames. sender first transmits small request-to-send (RTS) packets to BS

• Before data transmit, perform RTS/CTS handshake • RTS: request to send • CTS: clear to send SIFS SIFS SIFS CTS RTS Sender Receiver reservation handshake 20B 14B 14B 29B − 2347B

While most measures of QOL consider how physical and mental health problems affect everyday life [ 4 , 5 ], the World Health Organization’s Quality of Life

Small businesses in developing economies need to take seriously the security issues in cloud computing when planning cloud migration and sufficient provisions must be in place