Mobile Communications
Download
Report
Transcript Mobile Communications
Mobile Networks
Module B
WLAN – Engineering Aspects
Prof. JP Hubaux
http://mobnet.epfl.ch
1
Reminder on frequencies and wavelenghts
twisted
pair
coax cable
1 Mm
300 Hz
10 km
30 kHz
VLF
LF
optical transmission
100 m
3 MHz
MF
HF
1m
300 MHz
VHF
VLF = Very Low Frequency
LF = Low Frequency
MF = Medium Frequency
HF = High Frequency
VHF = Very High Frequency
UHF
10 mm
30 GHz
SHF
EHF
100 m
3 THz
infrared
1 m
300 THz
visible light UV
UHF = Ultra High Frequency
SHF = Super High Frequency
EHF = Extra High Frequency
UV = Ultraviolet Light
Frequency and wave length:
= c/f
wave length , speed of light c 3x108m/s, frequency f
2
Frequencies for mobile communication
VHF-/UHF-ranges for mobile radio
simple, small antenna for cars
deterministic propagation characteristics, reliable connections
SHF and higher for directed radio links, satellite communication
small antenna
large bandwidth available
Wireless LANs use frequencies in UHF to SHF spectrum
some systems planned up to EHF
limitations due to absorption by water and oxygen molecules
(resonance frequencies)
weather dependent fading, signal loss caused by heavy rainfall etc.
3
Frequency allocation
Mobile
phones
Cordless
telephones
Wireless
LANs
Europe
USA
Japan
NMT 453-457MHz,
463-467 MHz;
GSM 890-915 MHz,
935-960 MHz;
1710-1785 MHz,
1805-1880 MHz
CT1+ 885-887 MHz,
930-932 MHz;
CT2
864-868 MHz
DECT
1880-1900 MHz
IEEE 802.11
2400-2483 MHz
HIPERLAN 1
5176-5270 MHz
AMPS, TDMA, CDMA
824-849 MHz,
869-894 MHz;
TDMA, CDMA, GSM
1850-1910 MHz,
1930-1990 MHz;
PACS 1850-1910 MHz,
1930-1990 MHz
PACS-UB 1910-1930 MHz
PDC
810-826 MHz,
940-956 MHz;
1429-1465 MHz,
1477-1513 MHz
IEEE 802.11
2400-2483 MHz
IEEE 802.11
2471-2497 MHz
PHS
1895-1918 MHz
JCT
254-380 MHz
4
Characteristics of wireless LANs
Advantages
flexibility
(almost) no wiring difficulties (e.g., historic buildings)
more robust against disasters like, e.g., earthquakes, fire - or users
pulling a plug...
Disadvantages
lower bitrate compared to wired networks (1-10 Mbit/s)
More difficult to secure
5
Design goals for wireless LANs
low power
no special permissions or licenses needed to use the LAN
robust transmission technology
easy to use for everyone, simple management
protection of investment in wired networks (internetworking)
security (no one should be able to read my data), privacy (no one
should be able to collect user profiles), safety (low radiation)
transparency concerning applications and higher layer protocols,
but also location awareness if necessary
6
Comparison: infrared vs. radio transmission
Infrared
uses IR diodes
Radio
Advantages
simple, cheap, available in
many mobile devices
no licenses needed
simple shielding possible
Disadvantages
interference by sunlight, heat
sources etc.
many things shield or absorb IR
light
low bandwidth
Example
IrDA (Infrared Data Association)
interface available everywhere
typically using the license free
ISM band at 2.4 GHz
Advantages
coverage of larger areas
possible (radio can penetrate
walls, furniture etc.)
Disadvantages
very limited license free
frequency bands
shielding more difficult,
interference with other electrical
devices
more difficult to secure
Examples
IEEE 802.11, Bluetooth
7
Infrastructure vs. ad hoc networks
infrastructure
network
AP: Access Point
AP
AP
wired network
AP
Ad hoc network
8
IEEE 802.11 - Architecture of an
infrastructure network
Station (STA)
802.11 LAN
STA1
802.x LAN
Basic Service Set (BSS)
BSS1
Portal
Access
Point
Access
Point
ESS
group of stations using the same
radio frequency
Access Point
Distribution System
station integrated into the wireless
LAN and the distribution system
Portal
BSS2
bridge to other (wired) networks
Distribution System
STA2
terminal with access mechanisms
to the wireless medium and radio
contact to the access point
802.11 LAN
STA3
interconnection network to form
one logical network (ESS:
Extended Service Set) based
on several BSS
9
802.11 - Architecture of an ad-hoc network
Direct communication within a
limited range
802.11 LAN
STA3
STA1
BSS1
STA2
Station (STA):
terminal with access
mechanisms to the wireless
medium
Basic Service Set (BSS):
group of stations using the
same radio frequency
802.11 LAN
BSS2
STA5
STA4
10
Interconnection of IEEE 802.11 with Ethernet
fixed terminal
mobile station
server
infrastructure network
access point
application
application
TCP
TCP
IP
IP
802.11 MAC
802.11 MAC
802.3 MAC
802.3 MAC
802.11 PHY
802.11 PHY
802.3 PHY
802.3 PHY
11
802.11 - Layers and functions
PLCP (Physical Layer Convergence Protocol)
MAC
clear channel assessment
signal (carrier sense)
PMD (Physical Medium Dependent)
MAC Management
access mechanisms,
fragmentation, encryption
synchronization, roaming, MIB,
power management
modulation, coding
PHY Management
channel selection, MIB
Station Management
IP
PHY
MAC
MAC Management
PLCP
PHY Management
PMD
coordination of all management
functions
Station Management
12
802.11 - Physical layer
3 versions: 2 radio: DSSS and FHSS (both typically at 2.4 GHz), 1 IR
data rates 1, 2, 5 or 11 Mbit/s
DSSS (Direct Sequence Spread Spectrum)
DBPSK modulation (Differential Binary Phase Shift Keying) or DQPSK
(Differential Quadrature PSK)
chipping sequence: +1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1 (Barker code)
max. radiated power 1 W (USA), 100 mW (EU), min. 1mW
FHSS (Frequency Hopping Spread Spectrum)
spreading, despreading, signal strength
min. 2.5 frequency hops/s, two-level GFSK modulation (Gaussian
Frequency Shift Keying)
Infrared
850-950 nm, diffuse light, around 10 m range
carrier detection, energy detection, synchronization
13
802.11 - MAC layer principles (1/2)
Traffic services
Asynchronous Data Service (mandatory)
exchange of data packets based on “best-effort”
support of broadcast and multicast
Time-Bounded Service (optional)
implemented using PCF (Point Coordination Function)
Access methods (called DFWMAC: Distributed Foundation Wireless
MAC)
DCF CSMA/CA (mandatory)
collision avoidance via randomized „back-off“ mechanism
minimum distance between consecutive packets
ACK packet for acknowledgements (not for broadcasts)
DCF with RTS/CTS (optional)
avoids hidden terminal problem
PCF (optional)
access point polls terminals according to a list
DCF: Distributed Coordination Function
PCF: Point Coordination Function
14
802.11 - MAC layer principles (2/2)
Priorities
defined through different inter frame spaces
no guaranteed, hard priorities
SIFS (Short Inter Frame Spacing)
PIFS (PCF IFS)
highest priority, for ACK, CTS, polling response
medium priority, for time-bounded service using PCF
DIFS (DCF, Distributed Coordination Function IFS)
lowest priority, for asynchronous data service
DIFS
DIFS
medium busy
PIFS
SIFS
direct access if
medium is free DIFS
Note : IFS durations are specific to each PHY
contention
next frame
t
time slot
15
802.11 - CSMA/CA principles
DIFS
DIFS
medium busy
direct access if
medium has been free
for at least DIFS
contention window
(randomized back-off
mechanism)
next frame
t
time slot
station ready to send starts sensing the medium (Carrier Sense
based on CCA, Clear Channel Assessment)
if the medium is free for the duration of an Inter-Frame Space (IFS),
the station can start sending (IFS depends on service type)
if the medium is busy, the station has to wait for a free IFS, then the
station must additionally wait a random back-off time (collision
avoidance, multiple of slot-time)
if another station occupies the medium during the back-off time of
the station, the back-off timer stops (to increase fairness)
16
802.11 – CSMA/CA broadcast
=
DIFS
DIFS
station1
station2
DIFS
boe
bor
boe
busy
DIFS
boe bor
boe
busy
busy
station3
boe busy
station4
boe bor
station5
boe
busy
(detection by upper layer)
(detection by upper layer)
t
Here St4 and St5 happen to have
the same back-off time
busy
medium not idle (frame, ack etc.)
boe elapsed backoff time
packet arrival at MAC
bor residual backoff time
The size of the contention window can be adapted
(if more collisions, then increase the size)
Note: broadcast is not acknowledged 17
802.11 - CSMA/CA unicast
Sending unicast packets
station has to wait for DIFS before sending data
receiver acknowledges at once (after waiting for SIFS) if the packet
was received correctly (CRC)
automatic retransmission of data packets in case of transmission
errors
DIFS
sender
data
SIFS
receiver
ACK
DIFS
other
stations
waiting time
The ACK is sent right at the end of SIFS
(no contention)
data
t
Contention
window
18
802.11 – DCF with RTS/CTS
Sending unicast packets
station can send RTS with reservation parameter after waiting for DIFS
(reservation determines amount of time the data packet needs the medium)
acknowledgement via CTS after SIFS by receiver (if ready to receive)
sender can now send data at once, acknowledgement via ACK
other stations store medium reservations distributed via RTS and CTS
DIFS
sender
RTS
data
SIFS
receiver
other
stations
CTS SIFS
SIFS
NAV (RTS)
NAV (CTS)
defer access
NAV: Net Allocation Vector
ACK
DIFS
data
t
Contention
window
RTS/CTS can be present for
some packets and not for other
19
Fragmentation mode
DIFS
sender
RTS
frag1
SIFS
receiver
CTS SIFS
frag2
SIFS
ACK1 SIFS
SIFS
ACK2
NAV (RTS)
NAV (CTS)
other
stations
NAV (frag1)
NAV (ACK1)
DIFS
contention
data
t
• Fragmentation is used in case the size of the packets sent has to be
reduced (e.g., to diminish the probability of erroneous frames)
• Each fragi (except the last one) also contains a duration (as RTS does),
which determines the duration of the NAV
• By this mechanism, fragments are sent in a row
• In this example, there are only 2 fragments
20
802.11 – Point Coordination Function (1/2)
t0 t1
medium busy PIFS
point
coordinator
wireless
stations
stations‘
NAV
SuperFrame
SIFS
D1
SIFS
SIFS
D2
SIFS
U1
U2
NAV
contention free period
• Purpose: provide a time-bounded service
• Not usable for ad hoc networks
• Di represents the polling of station i
• Ui represents transmission of data from station i
21
802.11 – Point Coordination Function (2/2)
t2
point
coordinator
wireless
stations
stations‘
NAV
• In
D3
PIFS
SIFS
D4
t3
t4
CFend
SIFS
U4
NAV
contention free period
contention
period
t
this example, station 3 has no data to send
22
802.11 - MAC frame format
Types
control frames, management frames, data frames
Sequence numbers
important against duplicated frames due to lost ACKs
Addresses
receiver, transmitter (physical), BSS identifier, sender (logical)
Miscellaneous
bytes
2
Frame
Control
sending time, checksum, frame control, data
2
6
6
6
2
6
Duration Address Address Address Sequence Address
ID
1
2
3
Control
4
version, type, fragmentation, security, ...
0-2312
4
Data
CRC
detection of duplication
23
MAC address format
scenario
ad-hoc network
infrastructure
network, from AP
infrastructure
network, to AP
infrastructure
network, within DS
to DS from
DS
0
0
0
1
address 1 address 2 address 3 address 4
DA
DA
SA
BSSID
BSSID
SA
-
1
0
BSSID
SA
DA
-
1
1
RA
TA
DA
SA
DS: Distribution System
AP: Access Point
DA: Destination Address
SA: Source Address
BSSID: Basic Service Set Identifier
- infrastructure BSS : MAC address of the Access Point
- ad hoc BSS (IBSS): random number
RA: Receiver Address
TA: Transmitter Address
24
802.11 - MAC management
Synchronization
Purpose
for the physical layer (e.g., maintaining in sync the frequency hop
sequence in the case of FHSS)
for power management
Principle: beacons with time stamps
Power management
sleep-mode without missing a message
periodic sleep, frame buffering, traffic measurements
Association/Reassociation
integration into a LAN
roaming, i.e. change networks by changing access points
scanning, i.e. active search for a network
MIB - Management Information Base
managing, read, write
25
Synchronization (infrastructure case)
beacon interval
access
point
medium
B
B
busy
busy
B
busy
B
busy
t
value of the timestamp
B
beacon frame
• The access point transmits the (quasi) periodic beacon signal
• The beacon contains a timestamp and other management information used for
power management and roaming
• All other wireless nodes adjust their local timers to the timestamp
26
Power management
Idea: switch the transceiver off if not needed
States of a station: sleep and awake
Timing Synchronization Function (TSF)
stations wake up at the same time
Infrastructure case
Traffic Indication Map (TIM)
list of unicast receivers transmitted by AP
Delivery Traffic Indication Map (DTIM)
list of broadcast/multicast receivers transmitted by AP
Ad-hoc case
Ad-hoc Traffic Indication Map (ATIM)
announcement of receivers by stations buffering frames
more complicated - no central AP
collision of ATIMs possible (scalability?)
27
Power saving (infrastructure case)
Here the access point announces
data addressed to the station
TIM interval
access
point
DTIM interval
D B
T
busy
medium
busy
T
d
busy
busy
p
station
D B
d
t
T
TIM
D
B
broadcast/multicast
DTIM
awake
d data transmission
to/from the station
p Power Saving poll: I am awake, please send the data
28
802.11 - Roaming
No or bad connection? Then perform:
Scanning
scan the environment, i.e., listen into the medium for beacon
signals or send probes into the medium and wait for an answer
Reassociation Request
station sends a request to one or several AP(s)
Reassociation Response
success: AP has answered, station can now participate
failure: continue scanning
AP accepts Reassociation Request
signal the new station to the distribution system
the distribution system updates its data base (i.e., location
information)
typically, the distribution system now informs the old AP so it can
release resources
29
Security of 802.11
WEP: Wired Equivalent Privacy
Objectives:
Confidentiality
Access control
Data integrity
k
M
k
Integrity
checksum
IV
RC4
C(M)
P=
M
C(M)
IV
RC4
P=
M
C(M)
Note: several security weaknesses have been identified
30
The new solution for 802.11 security:
standard 802.1x
EAPOL
(over Ethernet or 802.11)
Supplicant
Encapsulated EAP,
Typically on RADIUS
Authenticator
Authentication Server
EAP: Extensible Authentication Protocol (RFC 2284, 1998)
EAPOL: EAP over LAN
RADIUS: Remote authentication dial in user service (RFC 2138, 1997)
Features:
- Supports a wide range of authentication schemes, thanks to the usage of EAP
- One-way authentication
- Optional encryption and data integrity
31
More on IEEE 802.1x
Example of authentication, using one-time passwords (OTP):
Supplicant
Authenticator
Authentication server
EAP-request/identity
EAP-response/identiy (MYID)
EAP-request/OTP,
OTP challenge
EAP-response/OTP,
OTPpassword
EAP-success
Authentication
successfully
completed
Port authorized
: exchange of EAPOL frame
: exchange of EAP frames in a higher layer protocol (e.g., RADIUS)
Notes :
1. Weaknesses have been found in 802.1x as well, but are corrected in the
various implementations.
2. New standard in the making : IEEE 802.11i
32
IEEE 802.11 – Standardization efforts
IEEE 802.11b
2.4 GHz band
Bitrates 1 – 11 Mbit/s
IEEE 802.11a
5 GHz band
transmission rates up to 54 Mbit/s
close cooperation with BRAN (ETSI Broadband Radio Access Network)
Coverage is not as good as in 802.11b
IEEE 802.11g
Available since 2003, highly popular
2.4 GHz band (same as 802.11b)
Bitrates up to 54Mb/s
IEEE 802.11i
Security, makes use of IEEE 802.1x
IEEE 802.11p
For vehicular communications
IEEE 802.11s
For mesh networks
+ many other…
33
ETSI - HIPERLAN
ETSI standard
European standard, cf. GSM, DECT, ...
Enhancement of local Networks and interworking with fixed networks
integration of time-sensitive services from the early beginning
HIPERLAN family
HIPERLAN 1 standardized since 1996
HIPERLAN 2 under standardization
Very uncertain future: few products available so far…
34
Conclusion on Wireless LANs
IEEE 802.11
Very widespread
Often considered as the system underlying larger scale ad hoc
networks (although far from optimal, not designed for this purpose)
Tremendous potential as a competitor of 3G cellular networks in hot
spots
Hiperlan
Too ambitious standard?
Bluetooth
Products available
Not as successful as initially thought
Security perceived as a major obstacle; initial solutions were
flawed in both IEEE 802.11 (WEP) and Bluetooth
Future developments
Ultra Wide Band?
35
References
J. Schiller: Mobile Communications, Addison-Wesley, Second Edition,
2004
Leon-Garcia & Widjaja: Communication Networks, McGrawHill, 2000
IEEE 802.11 standards, available at www.ieee.org
www.bluetooth.com
J. Edney and W. Arbaugh: Real 802.11 Security, Addison-Wesley,
2003
36