Lecture note 13

Download Report

Transcript Lecture note 13

IEEE 802.11 Wireless LAN
Part I
Introduction, Physical layer, basic MAC
13-1
Why Wireless Networking?
• Mobility
– Enable users to physically move while using an appliance.
• Cost Saving
– Easy to install in difficult-to-wire areas (E.g., a historical
Museum building)
– Quick to set up (no need to pull cables)
– Increased reliability due to less used cables (the probability
of cable down time thus becomes less)
– Get rid of messy cables in office, home, and other places.
13- 2
Wireless Signal Property
• Two type of antennas:
– Omni-directional
– Directional
13- 3
Signal Propagation and Quality
Is Often Unpredictable
• A small change in
position or direction
may result in dramatic
differences in signal
strength -- whether a
station is stationary or
mobile!
13- 4
Wireless LAN Usages
Ad hoc mode
Infrastructure mode
13- 5
IEEE 802.11 Equipments
Lucent’s Orinoco (formly Wavelan)
PCMCIA card
Lucent’s USB
interface card
Lucent’s access point
Lucent’s Orinoco PCI card
13- 6
Physical Technology
• Three physical technologies are defined and
used in IEEE 802.11:
– Direct-sequence spread spectrum
• Can support 1, 2, 5.5 and 11 Mbps bandwidth
• The most popular one in the current market.
– Frequency-hopping spread spectrum
• Can support only 1 and 2 Mbps bandwidth
• Popular once but now seldom used.
– Infrared light (diffused or point-to-point)
• Can support up to 16 Mbps bandwidth
• Rarely used.
13- 7
Why Direct Sequence Scheme?
• Spread a signal’s power
over a wider band of
frequencies.
• Thus this scheme requires
higher bandwidth to
transmit data signal.
• Because most interference
noise signal is typically
narrow in bandwidth,
• This will result in much
less interference and bit
errors.
13- 8
Frequency Hopping SS
• Must hop to another
channel in 400 ms.
• Sender and receiver
must use the same
frequency hopping
sequence to correctly
receive data.
Each channel uses 1
MHZ spectrum.
– Good for military
purpose because now
eavesdropping becomes
hard and signal jamming
also becomes hard.
13- 9
Direct Sequence SS
• Convert a data signal to a higher data rate bit
sequence (referred to as a chipping code).
• The code used in 802.11 is a 11-bit Barker
13- 10
sequence 10110111000.
802.11 Uses Unlicensed ISM Band
Nowadays
most 802.11
NICs use this
area.
Microwaves also
use this area. So
your 802.11
transfer may be
interfered by your
microwave!
13- 11
Modulation Techniques
• DQPSK
modulation is
used when the
transmission
rate is 2 Mbps.
13- 12
DSSS Physical Layer Frame Format
MAC Frame
• The physical layer header (23 bytes) and the MAC layer
header(34 bytes) together cause a lot of overhead.
• The SYNC field consists of alternating 0s and 1s. That is,
010101010101 …. A receiver will begin to synchronize
with the incoming signal after detecting the sync.
13- 13
DSSS Physical Layer Frame Format
• Start frame delimiter: always 1111001110100000.
• Signal: identifies the type of modulation that the receiver
must use to demodulate the signal. The value of this field is
equal to the data rate divided by 100 Kbps.
– In 802.11, a sender can send its frame at either 1, 2, 5.5, or 11 Mbps
rate.
– To enable the receiver to receive frames that are sent at different rates,
the sender always sends the PLCP preamble and header at the fixed 1
Mbps and the receive always listens for frames at 1 Mbps.
– Thus the receiver can correctly decode the signal field at 1 Mbps and
then switch to a different and higher rate to receive MPDU.
• Service: always 0.
• Length: define the number of microsecond to transmit the
MPDU.
13- 14
Lucent Orinoco(WaveLAN) Spec.
Although you have 11
channels to choose from,
selected channels should
be separated at least by 30
MHZ to avoid
interference. So, actually
there are only 3 nonoverlapping channels!
11 Mbps
5.5 Mbps
2 Mbps
1 Mbps
13- 15
Application 1
No access point is needed. PC can communicate easily
and directly among themselves. But no QoS can be achieved. 13- 16
Application 2
Access points are needed. But now Information on wired networks can
be accessed and the coverage area is larger. Also QoS now is possible
Although two PCs are in the same cell and can communicate directly,
their communication still needs to go through the access point. 13- 17
Application 2 (cont.)
If these access points are on the same subnet, when a mobile
node move from one cell into another cell, its IP address need
not be changed. Otherwise, its IP address needs to be changed
and either DHCP or Mobile-IP is needed.
13- 18
Application 2 (cont.)
f1
f1
f1
f2
f1
f1
If these access points use the same frequency channel, when a mobile
node move from one cell into another cell, its used frequency channel
need not be changed. However, it packet transmission or reception
may be interfered by neighboring access points when it is at the cell
13- 19
boundary.
Application 3
Wireless local bridges can be used to wirelessly connect
two remote wired networks (e.g., two buildings). The
13- 20
range of these bridges can be up to 30 miles.
Application 4
Wireless relay nodes can act as routers to wirelessly forward
packets. (This type of network is called “packet radio
network.”) Some big cities in US have deployed this type 13of21
networks.
IEEE 802.11 Protocol Architecture
13- 22
Components of the IEEE 802.11
Architecture
• Basic service set: the basic building block
of an 802.11 LAN.
– Independent BSS: Also called “ad hoc
network”. Stations in the same IBSS can
communicate directly with each other.
– Infrastructure BSS: a station in the BSS needs
to become an access point. All other stations
need to send packets to the AP, which then
forwards the packet to the destination station.
13- 23
Example: BSS
13- 24
Distribution System
• To extend the coverage area of a wireless network,
sometimes we want to connect multiple BSSs.
• The component used to interconnect BSSs is
called “distribution system (DS).”
• The medium used for the DS can be different from
the wireless medium. (Normally most vendors just
use Ethernet as the DS.)
• The DS can be considered as a layer-2 network.
• An access point (AP) is a station that provides
access to the DS by providing DS services in
addition to acting as a station.
• Data move between a BSS and the DS via an AP. 13- 25
Example: Distribution System
13- 26
Extended Service Set
• A network that is formed by BSSs and DS
is called the “extended service set.”
• ESS network appears the same to an LLC
layer as an IBSS network.
• Stations within an ESS may communicate
and mobile stations may move from one
BSS to another transparently to LLC.
• (So, basically, an extended service set is a
layer-2 network.)
13- 27
Example: Extended Service Set
13- 28
Wired and Wireless Networks
Integration
• A portal is the logical point at which packets from
a non-802.11 LAN (e.g., 802.3 Ethernet) enter the
802.11 DS.
• It is possible for one device to offer both the
functions of an AP and a portal. (E.g., if the DS
itself is implemented from 802.2 Ethernet).
• Nowadays, what most people say “access point”
actually is a portal. This is because access points
in today’s markets all connect to an Ethernet.
13- 29
Example: Portal
13- 30
802.11 Architecture Services
• Station services
–
–
–
–
Authentication
Deauthentication
Privacy (WEP: wired equivalent privacy)
MSDU delivery
• Distribution system services
–
–
–
–
–
Association (always initiated by the station, not AP)
Disassociation (can be initiated by either AP or station)
Distribution
Integration
Reassociation (always initiated by the station, not AP)
13- 31
Station States
13- 32
Frame Types
• Class 1 Frames
– Control Frames
•
•
•
•
Request to send (RTS)
Clear to send (CTS)
Acknowledgement (ACK)
Contention-Free (CF)
– Management Frames
•
•
•
•
•
Probe request/response
Beacon
Authentication
Deauthentication
Announcement traffic indication message (ATIM)
– Data Frame
13- 33
Frame Types (cont.)
• Class 2 Frames
– Management frames
• Association request/response
• Reassociation request/response
• Disassociation
• Class 3 Frames
– Data frames
– Management frames
• Deauthentication
– Control Frames
• Power save poll
13- 34
MAC Generic Frame Format
13- 35
Frame Types
13- 36
Frame Subtypes
13- 37
Other fields in the Frame Control Field
• To DS: set to 1 if the frame is destined for the DS.
(I.e., the frame is from a 802.11 station to a host
on an Ethernet)
• From DS: set to 1 if this frame is from the DS.
(I.e., the frame is from a host on an Ethernet to a
802.11 station)
13- 38
Other fields in the Frame Control Field
• More fragment: set to 1 if another fragment of the
same frame will follow in a subsequent frame.
• Retry: set to 1 if this frame is a retransmission of an
earlier frame.
• Power management : set to 1 to indicate that this
station will be in a sleep mode.
• More data: If a station has additional frames to send to
a station that is in sleep mode, then the sending station
will place 1 in this field.
• WEP: set to 1 to indicate that the frame body has been
encrypted using the WEP algorithm.
• Order: set to 1 to indicate the receiving station that
13- 39
frames must be processed in order.
The Duration Field
• The unit of duration is microsecond. This field can
be used by RTS/CTS/DATA frames to reserve the
wireless channel for a period of time.
13- 40
802.11 Address Types
• Destination address (DA): The final destination address of
the MAC service data unit (MSDU).
• Source address (SA): The address of the MAC entity that
initiated the MSDU transmission.
• Receiver address (RA): The address of the access point
that is to receive the frame next.
• Transmitter address (TA): The address of the immediate
preceding access point sending the frame.
• BSSID: This is the ID of a BSS. In an infrastructure BSS,
this is the MAC address of the station in the access point.
In an IBSS, this is a locally administered address formed
from a random number.
• An address filed may contain DA, SA, RA, TA, BSSID.
13- 41
The Sequence Control Field
• Sequence number is used to detect duplicate frames. (There is
a per-source cache (address 2, seq#, frag#) for each source
station.)
• A frame can be fragmented into several fragments to reduce
the frame-error-rate that it may experience over lossy
wireless links.
• The fragment threshold is a parameter and can be configured.13- 42
MAC Layer Functional Descriptions
13- 43
MAC Architecture
• DCF is a distributed contention scheme. (called
CSMA/CA, every station must support it.)
• PCF is a centralized polling scheme. (Optional.
Actually no access points currently support it.)
13- 44
DCF Provides Priority
Data Frame
PCF Frame
Control Frame
(e.g., RTS/CTS/ACK)
• When the medium becomes idle, Because DCF
asks different types of frames to wait a different
amount of time before they can be sent to the
medium, DCF can provide three priority levels for
different types of frames.
13- 45
DCF Basic Access Method
• If a station wants to send a frame and the medium
is currently busy, the station should defer its
transmission until the medium becomes idle. 13- 46
DCF Basic Access Method
• Then it should wait a period of time equal to DIFS.
• If during this DIFS time the medium is idle, then
the station should start a backoff timer.
– Otherwise, the DIFS timer should be canceled and later
restarted when the medium again becomes idle.
• When the station’s backoff timer expires, the
station then can send its frame onto the medium.
– But, the backoff timer should be suspended whenever
the medium is busy.
13- 47
Backoff Procedure
When the medium becomes idle, resume the
backoff timer only after DIFS idle time.
Suspend the backoff timers if a transfer is going on.
13- 48
ACK Procedure
Retransmit timer expires here
• 802.11 performs a link-level ACK scheme. Depending on
frame sizes, a frame can be retransmitted up to 4 or 7 times.
• If the ACK is not received within a certain time but a valid
frame is received, the data transmission is deemed failed.
However the received valid frame can be processed. 13- 49
Exponential Backoff
The CW will be exponentially increased for successive
failed transmissions. CW will be reset to CWmin
immediately after a successful transmission, or the number
13- 50
of retransmission has exceeded a certain value.
Use of Network Allocation
Vector (NAV)
• NAV is used to reserve the medium.
• It is used in RTS/CTS/Data/ACK frames to avoid
13- 51
the hidden-terminal problem.
Fragment Transmission without
RTS/CTS
• It is SIFS, not DIFS. Therefore, the transmissions of all of the
fragments of a frame can be finished before another station
transmits a frame onto the medium (because it need to wait DIFS
idle time)
• If a fragment is lost, only the lost fragment is retransmitted, rather
13- 52
than the whole frame.
Fragment Transmission with
RTS/CTS
• The duration fields in the fragment and ACK frames are
used to update other stations’ NAVs to reserve the medium
for the transmissions of the next pair of fragment and ACK.
• This duration scheme is always used despite whether the
RTS/CTS scheme is used or not.
13- 53
Fragment Lost Handling
idle
seize the medium again
• Because the stations that are close to the sending and
receiving stations may hear the NAV update carried in the
fragment and ACK frames, they will not attempt to use the
medium. The result is that the sending station will seize the
13- 54
medium again.
IFS Timing Relationships
13- 55