You are on page 1of 58

Lecture 13 and 14: WLAN

Anders Vstberg vastberg@kth.se 08-790 44 55


Slides are a selection from the slides from chapter 12,13, and 14 from: http://williamstallings.com/Wireless/Wireless2e.html

Mobile IP Uses
Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile user's point of attachment changes dynamically and all connections are automatically maintained despite the change Nomadic - user's Internet connection is terminated each time the user moves and a new connection is initiated when the user dials back in
New, temporary IP address is assigned

Operation of Mobile IP
Mobil node is assigned to a particular network home network IP address on home network is static home address Mobile node can move to another network foreign network Mobile node registers with network node on foreign network foreign agent Mobile node gives care-of address to agent on home network home agent

Capabilities of Mobile IP
Discovery mobile node uses discovery procedure to identify prospective home and foreign agents Registration mobile node uses an authenticated registration procedure to inform home agent of its care-of address Tunneling used to forward IP datagrams from a home address to a care-of address

Discovery
Mobile node is responsible for ongoing discovery process
Must determine if it is attached to its home network or a foreign network

Transition from home network to foreign network can occur at any time without notification to the network layer Mobile node listens for agent advertisement messages
Compares network portion of the router's IP address with the network portion of home address

Agent Solicitation
Foreign agents are expected to issue agent advertisement messages periodically If a mobile node needs agent information immediately, it can issue ICMP router solicitation message
Any agent receiving this message will then issue an agent advertisement

Move Detection
Mobile node may move from one network to another due to some handoff mechanism without IP level being aware
Agent discovery process is intended to enable the agent to detect such a move

Algorithms to detect move:


Use of lifetime field mobile node uses lifetime field as a timer for agent advertisements Use of network prefix mobile node checks if any newly received agent advertisement messages are on the same network as the node's current care-of address

Co-Located Addresses
If mobile node moves to a network that has no foreign agents, or all foreign agents are busy, it can act as its own foreign agent Mobile agent uses co-located care-of address
IP address obtained by mobile node associated with mobile node's current network interface

Means to acquire co-located address:


Temporary IP address through an Internet service, such as DHCP May be owned by the mobile node as a long-term address for use while visiting a given foreign network

Registration Process
Mobile node sends registration request to foreign agent requesting forwarding service Foreign agent relays request to home agent Home agent accepts or denies request and sends registration reply to foreign agent Foreign agent relays reply to mobile node

Registration Operation Messages


Registration request message
Fields = type, S, B, D, M, V, G, lifetime, home address, home agent, care-of-address, identification, extensions

Registration reply message


Fields = type, code, lifetime, home address, home agent, identification, extensions

Registration Procedure Security


Mobile IP designed to resist attacks
Node pretending to be a foreign agent sends registration request to a home agent to divert mobile node traffic to itself Agent replays old registration messages to cut mobile node from network

For message authentication, registration request and reply contain authentication extension
Fields = type, length, security parameter index (SPI), authenticator

Types of Authentication Extensions


Mobile-home provides for authentication of registration messages between mobile node and home agent; must be present Mobile-foreign may be present when a security association exists between mobile node and foreign agent Foreign-home may be present when a security association exists between foreign agent and home agent

Tunneling
Home agent intercepts IP datagrams sent to mobile node's home address
Home agent informs other nodes on home network that datagrams to mobile node should be delivered to home agent

Datagrams forwarded to care-of address via tunneling


Datagram encapsulated in outer IP datagram

Mobile IP Encapsulation Options


IP-within-IP entire IP datagram becomes payload in new IP datagram
Original, inner IP header unchanged except TTL decremented by 1 Outer header is a full IP header

Minimal encapsulation new header is inserted between original IP header and original IP payload
Original IP header modified to form new outer IP header

Generic routing encapsulation (GRE) developed prior to development of Mobile IP

Wireless LAN Applications


LAN Extension Cross-building interconnect Nomadic Access Ad hoc networking

Wireless LAN Configurations

LAN Extension
Wireless LAN linked into a wired LAN on same premises
Wired LAN
Backbone Support servers and stationary workstations

Wireless LAN
Stations in large open areas Manufacturing plants, stock exchange trading floors, and warehouses

Cross-Building Interconnect
Connect LANs in nearby buildings
Wired or wireless LANs

Point-to-point wireless link is used Devices connected are typically bridges or routers

Nomadic Access
Wireless link between LAN hub and mobile data terminal equipped with antenna
Laptop computer or notepad computer

Uses:
Transfer data from portable computer to office server Extended environment such as campus

Ad Hoc Networking
Temporary peer-to-peer network set up to meet immediate need Example:
Group of employees with laptops convene for a meeting; employees link computers in a temporary network for duration of meeting

Wireless LAN Requirements


Throughput Number of nodes Connection to backbone LAN Service area Battery power consumption Transmission robustness and security Collocated network operation License-free operation Handoff/roaming Dynamic configuration

Wireless LAN Categories


Infrared (IR) LANs Spread spectrum LANs Narrowband microwave

Strengths of Infrared Over Microwave Radio


Spectrum for infrared virtually unlimited
Possibility of high data rates

Infrared spectrum unregulated Equipment inexpensive and simple Reflected by light-colored objects
Ceiling reflection for entire room coverage

Doesnt penetrate walls


More easily secured against eavesdropping Less interference between different rooms

Drawbacks of Infrared Medium


Indoor environments experience infrared background radiation
Sunlight and indoor lighting Ambient radiation appears as noise in an infrared receiver Transmitters of higher power required
Limited by concerns of eye safety and excessive power consumption

Limits range

Spread Spectrum LAN Configuration


Multiple-cell arrangement Within a cell, either peer-to-peer or hub Peer-to-peer topology
No hub Access controlled with MAC algorithm
CSMA

Appropriate for ad hoc LANs

IEEE 802 Protocol Layers

Protocol Architecture
Functions of physical layer:
Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium

Protocol Architecture
Functions of medium access control (MAC) layer:
On transmission, assemble data into a frame with address and error detection fields On reception, disassemble frame and perform address recognition and error detection Govern access to the LAN transmission medium

Functions of logical link control (LLC) Layer:


Provide an interface to higher layers and perform flow and error control

Separation of LLC and MAC


The logic required to manage access to a shared-access medium not found in traditional layer 2 data link control For the same LLC, several MAC options may be provided

MAC Frame Format


MAC control
Contains Mac protocol information

Destination MAC address


Destination physical attachment point

Source MAC address


Source physical attachment point

CRC
Cyclic redundancy check

Logical Link Control


Characteristics of LLC not shared by other control protocols:
Must support multiaccess, shared-medium nature of the link Relieved of some details of link access by MAC layer

LLC Services
Unacknowledged connectionless service
No flow- and error-control mechanisms Data delivery not guaranteed

Connection-mode service
Logical connection set up between two users Flow- and error-control provided

Acknowledged connectionless service


Cross between previous two Datagrams acknowledged No prior logical setup

Differences between LLC and HDLC


LLC uses asynchronous balanced mode of operation of HDLC (type 2 operation) LLC supports unacknowledged connectionless service (type 1 operation) LLC supports acknowledged connectionless service (type 3 operation) LLC permits multiplexing by the use of LLC service access points (LSAPs)

IEEE 802.11 Architecture


Distribution system (DS) Access point (AP) Basic service set (BSS)
Stations competing for access to shared wireless medium Isolated or connected to backbone DS through AP

Extended service set (ESS)


Two or more basic service sets interconnected by DS

IEEE 802.11 Services

Distribution of Messages Within a DS


Distribution service
Used to exchange MAC frames from station in one BSS to station in another BSS

Integration service
Transfer of data between station on IEEE 802.11 LAN and station on integrated IEEE 802.x LAN

Transition Types Based On Mobility


No transition
Stationary or moves only within BSS

BSS transition
Station moving from one BSS to another BSS in same ESS

ESS transition
Station moving from BSS in one ESS to BSS within another ESS

Association-Related Services
Association
Establishes initial association between station and AP

Reassociation
Enables transfer of association from one AP to another, allowing station to move from one BSS to another

Disassociation
Association termination notice from station or AP

Access and Privacy Services


Authentication
Establishes identity of stations to each other

Deathentication
Invoked when existing authentication is terminated

Privacy
Prevents message contents from being read by unintended recipient

IEEE 802.11 Medium Access Control


MAC layer covers three functional areas:
Reliable data delivery Access control Security

Reliable Data Delivery


More efficient to deal with errors at the MAC level than higher layer (such as TCP) Frame exchange protocol
Source station transmits data Destination responds with acknowledgment (ACK) If source doesnt receive ACK, it retransmits frame

Four frame exchange


Source issues request to send (RTS) Destination responds with clear to send (CTS) Source transmits data Destination responds with ACK

Access Control

Medium Access Control Logic

Interframe Space (IFS) Values


Short IFS (SIFS)
Shortest IFS Used for immediate response actions

Point coordination function IFS (PIFS)


Midlength IFS Used by centralized controller in PCF scheme when using polls

Distributed coordination function IFS (DIFS)


Longest IFS Used as minimum delay of asynchronous frames contending for access

IFS Usage
SIFS
Acknowledgment (ACK) Clear to send (CTS) Poll response

PIFS
Used by centralized controller in issuing polls Takes precedence over normal contention traffic

DIFS
Used for all ordinary asynchronous traffic

MAC Frame Format

MAC Frame Fields


Frame Control frame type, control information Duration/connection ID channel allocation time Addresses context dependant, types include source and destination Sequence control numbering and reassembly Frame body MSDU or fragment of MSDU Frame check sequence 32-bit CRC

Frame Control Fields


Protocol version 802.11 version Type control, management, or data Subtype identifies function of frame To DS 1 if destined for DS From DS 1 if leaving DS More fragments 1 if fragments follow Retry 1 if retransmission of previous frame

Frame Control Fields


Power management 1 if transmitting station is in sleep mode More data Indicates that station has more data to send WEP 1 if wired equivalent protocol is implemented Order 1 if any data frame is sent using the Strictly Ordered service

Control Frame Subtypes


Power save poll (PS-Poll) Request to send (RTS) Clear to send (CTS) Acknowledgment Contention-free (CF)-end CF-end + CF-ack

Data Frame Subtypes


Data-carrying frames

Data Data + CF-Ack Data + CF-Poll Data + CF-Ack + CF-Poll


Null Function CF-Ack CF-Poll CF-Ack + CF-Poll

Other subtypes (dont carry user data)

Management Frame Subtypes


Association request Association response Reassociation request Reassociation response Probe request Probe response Beacon

Management Frame Subtypes


Announcement traffic indication message Dissociation Authentication Deauthentication

Wired Equivalent Privacy

Authentication
Open system authentication
Exchange of identities, no security benefits

Shared Key authentication


Shared Key assures authentication

Physical Media Defined by Original 802.11 Standard


Direct-sequence spread spectrum
Operating in 2.4 GHz ISM band Data rates of 1 and 2 Mbps

Frequency-hopping spread spectrum


Operating in 2.4 GHz ISM band Data rates of 1 and 2 Mbps

Infrared
1 and 2 Mbps Wavelength between 850 and 950 nm

IEEE 802.11a and IEEE 802.11b


IEEE 802.11a
Makes use of 5-GHz band Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54 Mbps Uses orthogonal frequency division multiplexing (OFDM) Subcarrier modulated using BPSK, QPSK, 16-QAM or 64QAM

IEEE 802.11b
Provides data rates of 5.5 and 11 Mbps Complementary code keying (CCK) modulation scheme

IEEE 802.11g and IEEE 802.11n


IEEE 802.11g: Provides data rates up to 108 Mbps and is compatible with 802.11b IEEE 802.11n: Even higher data rates.

You might also like