chu02_2

131
Home Network Technologies

Upload: demeke-robi

Post on 03-Nov-2014

107 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: chu02_2

Home Network Technologies

Page 2: chu02_2

家庭網路相關網路技術

Computer

TV

Broadband Access Technology

Internet

ISP

Home Networking Technology

Home Network

Page 3: chu02_2

Broadband Access Technologies

• Digital Subscriber Line (DSL)

• Cable Modem

• Broadband Over Power Line (BOPL)

• Fiber-to-the-Home (FTTH)

• IEEE 802.16 (WiMax)

• GPRS; 3.5G

Page 4: chu02_2

Outlines

• Broadband Over Power Line

• Digital Subscriber Line (DSL) Technology

• Cable Modem

Page 5: chu02_2

Broadband Over Power Line (BOPL)

• Use existing electrical lines to provide the medium for a high speed communications network

• Superimposing voice or data signals onto the line carrier signal using OFDM

• Two categories– In-house– access

Page 6: chu02_2

In-House BPL

• connecting machines within a building

• HomePlug: an alliance for in-house BPL

Page 7: chu02_2

Access BPL

• Delivers the last mile of broadband to the home

Page 8: chu02_2

Access BPL Architecture

InternetVoIP

Medium-voltage lines

Low-voltage lines

Backhaul

Coupler

Bridge

Backhaul Point

Wireless link

Coupler

Page 9: chu02_2

Bridge

Coupler

Backhaul Point

Coupler

Page 10: chu02_2

Advantages of BPL

• Power lines are our most ubiquitous infrastructure

• Lower cost of deployment– Existing wires

Page 11: chu02_2

Main Concerns

• Radio Frequency Interference (RFI) to licensed service

• power lines are inherently a very noisy environment

– Every time a device turns on or off, it introduces a pop or click into the line.

– Energy-saving devices often introduce noisy harmonics into the line

Page 12: chu02_2

Digital Subscriber Line (DSL) Technology

• The key in DSL technology is modulation, a process in which one signal modifies a properties of another.

• Hardware: DSL requires modems and splitters for end-users; carriers use DSLAMs (digital subscriber line access multiplexers)

• Differences between xDSL technologies: speed, operating distance, applications, ratio between up and downstream

• Different approaches: ATM-based ADSL, ISDN DSL.

• The important thing is what is running over xDSL...

Page 13: chu02_2

xDSL - Digital Subscriber Line Technology

Page 14: chu02_2

ADSL: Asymmetric Digital Subscriber Line

• twisted pair copper (single loop)

• asymmetric: most commonly:

– downlink: 256 Kbps - 8 Mbps

– uplink : 64 Kbps - 2 Mbps

• limited distance (18000 feet over 26-gauge copper)

Page 15: chu02_2

RADSL: Rate-Adaptive Digital Subscriber Line

• varying speeds depending upon line quality; asymmetric

– downlink: 1.5 Mbps - 8 Mbps

– uplink : 176 Kbps - 1 Mbps

• limited distance (18000 feet over 26-gauge copper)

Page 16: chu02_2

HDSL: High-speed Digital Subscriber Line

• full-duplex, symmetric

– 1.544 Mbps or 2.048 Mbps in each direction

• two twisted pairs (for T1) and 3 pairs (for E1)

• max distance 12,000 feet

Page 17: chu02_2

VDSL: Very-high-bit-rate Digital Subscriber Line (known as

BDSL)• asymmetric

– downlink: 12.96-51.84 Mbps

– uplink : 1.6 - 2.3 Mbps

• max 4,500 - 1,000 feet

• applications: High definition TV, multimedia

Page 18: chu02_2

Cable Modem

• primarily used to deliver broadband Internet access on Hybrid Fibre-Coaxial (HFC)

Computer

TV

Cable Modem

Cable

TelevisionCompany

Cable

Internet

CMTS

Page 19: chu02_2

Cable Modem Standards

• DOCSIS (Data Over Cable Service Interface Specification)

– 1.0 (1997): typical 2 Mbps upstream

– 1.1 (1999): 10 Mbps upstream

– 2.0 (2002) : 30 Mbps upstream

Page 20: chu02_2

Hybrid Fibre-Coaxial (HFC)

• combines optical fiber and coaxial cable

Page 21: chu02_2

The Downstream & Upstream Path• The downstream data path of the cable modem uses a SINGLE

6mhz TV channel, which is typically in the higher frequencies range (550 MHz and above) because higher frequencies can carry information faster.

• The lower end of the radio frequency spectrum (5MHz – 42 MHz) is used for the upstream or the return path.

• In terms of data bandwidth, the typical upstream channel usually has a capacity of around 5 Mbps.

• The total downstream bandwidth for a single channel is around 30 Mbps.

5-42MHz

Upstreamsignaling

50 MHz - 550 MHz 550 MHz - 750 and up MHz

. . .

Multiple TV Channels Downstream Channel

Page 22: chu02_2

Cable TV Spectrum

Page 23: chu02_2

Cable Modem: Modulation & Demodulation Phase

• Demodulation Phase: – tunes to the appropriate 6 MHz downstream channel (42 MHz –

850 MHz).

– demodulates the signal and extracts the downstream data that is destined for it

– converts the data into an Ethernet or USB signal to be fed into the user’s computer.

• Modulation Phase: The cable modem receives data on its Ethernet or USB interface and modulates the data onto the upstream carrier frequency, negotiates channel access with the CMTS and sends the data.

Page 24: chu02_2

Protecting the Downstream Channel (and the upstream as well)

• A component of the DOCSIS 1.1 standard called Baseline Privacy Initiative+ (BPI+) is bi-directional encryption between cable modem and the CMTS

• Each DOCSIS 1.1 compliant cable modem has a digital certificate stored in its firmware. This allows for the cable modem to be authenticated onto the network.

• The authentication takes place when the CMTS verifies the certificate presented by the modem. (The certificate is signed by the manufacturer’s private key).

• Encryption is based on 56-bit Triple-DES

• This scheme effectively renders any sniffing attempts useless, unless cracking of the Triple-DES scheme is possible

Page 25: chu02_2

DOCSIS Security OverviewDOCSIS Security Overview-- BPI+ ---- BPI+ --

CMTS

CM

PC

Internet

Data Encryption(DES)

Key Management(RSA, Tri-DES)

CM Authentication(X.509 Certificates)

Secure Software Download

(X.509 Certificate)

TFTP Server New CM Code

......

Digitally Signed by: Manufacturer

Mfg Certificate......

Digitally Signed by: DOCSCSIS Root CM Certificate......

Digitally Signed by: Mfg CA

CM Code File

x$a9E!

abcdef

abcdef

Page 26: chu02_2

The Device

• The cable modem bridges Ethernet frames between a customer LAN and the coax cable network

• It does, however, also support functionalities at other layers– Ethernet PHY and DOCSIS PHY– IP address– UDP, port-based packet filtering– DHCP, SNMP, TFTP

Page 27: chu02_2

Fiber-to-the-Home(FTTH)

CopperFiber

24 kbps - 1.5 MbpsOld networks, optimized for voice

CO/HE

19 Mbps - 1 Gbps +Optical networks, optimized for voice, video and data

CO/HE//

CO/HE//

//

Note: network may be aerial or underground

Page 28: chu02_2

FTTH Characteristics

• FTTH is an optical access network in which the optical network unit is on or within the customer’s premise.

• Although the first installed capacity of a FTTH network varies, the upgrade capacity of a FTTH network exceeds all other transmission media.

CO/HE//

Optical Network

Unit

Optical Line Termination

Source: www.ftthcouncil.org

Optical Access Network

Page 29: chu02_2

Why FTTH?

• Enormous information carrying capacity• Easily upgradeable• Ease of installation• Allows fully symmetric services• Reduced operations and maintenance costs • Benefits of optical fiber:

– Very long distances– Strong, flexible, and reliable– Allows small diameter and light weight cables– Secure – Immune to electromagnetic interference (EMI)

Page 30: chu02_2

Fiber versus Copper

Glass• Uses light• Transparent• Dielectric material-

nonconductive– EMI immune

• Low thermal expansion• Brittle, rigid material• Chemically stable

Copper• Uses electricity• Opaque• Electrically conductive

material– Susceptible to EMI

• High thermal expansion• Ductile material• Subject to corrosion and

galvanic reactions• Fortunately, it’s

recyclable

Page 31: chu02_2

Architecture and Transport

CO/HE

Architecture (Electronics)• PON• Active node• Hybrid

Transport:ATM orEthernet

//

Page 32: chu02_2

FTTH Architectures

• Passive Optical Networks (PONs)– Shares fiber optic strands for a portion of the networks

distribution

– Uses optical splitters to separate and aggregate the signal

– Power required only at the ends

• Active Node– Subscribers have a dedicated fiber optic strand

– Many use active (powered) nodes to manage signal distribution

• Hybrid PONs– Literal combination of an Active and a PON architecture

Page 33: chu02_2

FTTH Technical Considerations

• Data– How much per home?– How well can you share the channel?– Security – how do you protect the subscriber’s data?– What kind of QoS parameters do you specify?– Compatible business services?

• SLAs• T1

• Support for voice?• Support for video?

– Broadcast– IPTV

Page 34: chu02_2

FTTH Technical Considerations

• Data– How much per home?– How well can you share the channel?– Security – how do you protect the subscriber’s

data?– What kind of QoS parameters do you specify?

Page 35: chu02_2

FTTH Technical Considerations: Speed

• Data requirements– Competition: ADSL, cable modem ~0.5 to ~1.5

Mb/s shared, asymmetrical– FTTH ~10 to 30 Mb/s non-shared or several 100

Mb/s shared, symmetrical– SDTV video takes 2-4 Mb/s today at IP level– HDTV takes maybe 5 times STDV requirement– Pictures can run 1 MB compressed– 5.1 channel streaming audio would run ~380

kb/s

Page 36: chu02_2

• Security– Data is shared in the downstream direction in most

systems– Your Gateway filters out all packets not intended for you– But there is fear that someone will snoop on your data– FSAN has a low-complexity, low-security encryption

scheme– 802.3ah has formed a committee to study security– Manufacturers have taken their own tacks on security,

from none to robust

FTTH Technical considerations: Security

Page 37: chu02_2

FTTH Data Flow and Security: Downstream

//

//

//

//

////

//

Tom Dick

Harry

T D H

T D

HBox on side of home separates out only the data bound for that subscriber. But the fear is that someone will fool his box into giving data intended for another subscriber. Solution is to encrypt the data.

Time division multiplex (TDM) – each subscriber’s data gets its turn.

Page 38: chu02_2

FTTH Data Flow and Security: Upstream

//

//

//

//

////

//

Tom Dick

Harry

T D H

HDue to the physics of the network, Harry’s data flows upstream but does not come to Tom’s box, so Tom cannot see Harry’s data

Time division multiple access (TDMA) – similar to downstream, with gap for

laser start/stop

Page 39: chu02_2

FTTH Data Flow and QoS

//

//

//

//

////

//

Tom Dick

Harry

T D H

T D

H

If Dick has paid for more bandwidth, he gets more

If Tom’s packets need higher priority (e.g., telephone), they go first

Page 40: chu02_2

• several different ways

– Broadcast (cable TV standards)

• Analog or Digital

• Benefit from high volume and rich applications of cable boxes

– IPTV – TV transmitted over Internet Protocol

• Feasible, and some people are doing it in place of broadcast

• Bandwidth hog, but statistics can work for you

– Interesting hybrid model awaits hybrid STTs, but can give the best of both worlds

Video Delivery with FTTH

Page 41: chu02_2

IPTV Unicast (VOD)

Router A(headend)

Router B

Router C(network)

Router D(NID)

Router E

Program request

Program stream

In-home routing

In-home routing

In-home routing

Subscriber's TVSet top terminal

In-home routing

VOD server

Page 42: chu02_2

Home Networking Technologies

• IEEE 802.3/Ethernet

• IEEE 802.11 a/b/g/n (WiFi)

• Bluetooth

• In-House BPL (HomePlug)

Page 43: chu02_2

IEEE 802.3 Family

• Original IEEE 802.3 (Ethernet)– 10 Mbps

• Fast Ethernet– 1000 Mbps

• Gigabit Ethernet – 1 Gbps

• 10 G Ethernet– 10 Gbps

Page 44: chu02_2

Gigabit Ethernet Networks

• 1000 Mbps transmission rate

• IEEE 802.3 CSMA/CD frame format

• Medium: Twisted pair (UTP, STP) or Fiber

• Hub- or switch-based topology

• Do not support priority scheme

• Bandwidth utilization is not guaranteed to be fair

• Do not support guaranteed delay service

• Low bandwidth utilization under heavy loads

• Suitable for multimedia communications

Page 45: chu02_2

Gigabit Ethernet Architecture

1000 Mbps

10 Mbps 100 Mbps 1000 Mbps

Gigabit Ethernet Full-duplex Switch

100 Mbps 1000 Mbps

1000 Mbps

1000BaseT 100BaseT 1000BaseT

Page 46: chu02_2

Gigabit Ethernet Communication Structure

1000BASE-LX1270-1355 nm 光傳送接收器

1000BASE-SX 770-860 nm 光傳送接收器

1000BASE-CX STP 傳送接收器

1000BASE-T 4-Pair 傳送接收器

SMF MMF MMF 50 um

MMF 62.5 um

Balance Shielded Copper

Cat-5 UTP

3 km 550m 550m 300m 25m 100m

8B/10B Coding/Decoding 1000BASE-T Codec

Gigabit Media Independent Interface (GMII)

Media Access Control (MAC)

Logical Link Control (LLC)

Ethernet Upper Layers

Page 47: chu02_2

Gigabit Ethernet Physical Layer

• 1000BASE-T (UTP, IEEE 802.3ab)

• 1000BASE-CX (Short copper jumpers, IEEE 802.3z)

• 1000BASE-SX (Shortwave fiber, IEEE 802.3z)

• 1000BASE-LX (Longwave fiber, IEEE 802.3z)

Page 48: chu02_2

Gigabit Ethernet Characteristics

• Good fault tolerance

– Hub/Repeater architecture

• Carrier Extension for short frames.

• Frame Bursting to increase performance (optional).

Page 49: chu02_2

Half-Duplex vs. Full-Duplex

• Gigabit Ethernet can operate in either half-duplex or full-duplex mode.

• Half-duplex poses some difficult problems that can result in restrictions on the allowable topologies and/or changes to the Ethernet MAC algorithm.

• Full-duplex is simpler to implement than a half-duplex MAC.

Page 50: chu02_2

Limitations of Half-duplex Operation

• CSMA/CD implies an intimate relationship between the minimum length of a frame (L, measured in bit-times, not absolute time) and the maximum round-trip propagation delay (2a) of the network: L > 2a

round trippropagation delay

transmission timerateontransmissi

sizeframe_

_

maximumdistance

time

space

A

B

hub

Page 51: chu02_2

10 Mbps Ethernet

• For the original 10 Mbps Ethernet, a compromise was struck.

• Minimum frame = 512 bits (64 bytes), not including the preamble and Physical Layer overhead.

• Minimum data field = 46 bytes rarely imposes a significant padding overhead (IP header + TCP header = 40 bytes).

• At 10 Mbps, 512 bit-times is 51.2us. Depends on the type of cable used and the network configuration, the extent of a 10 Mbps Ethernet can be on the order of from 2-3 Km.

Preamble SFD DA SA LEN Data FCS

7 1 6 6 2 46 4 bytes

Minimum Frame Length (512 bits)

Page 52: chu02_2

Network Extent

• For a given minimum-length frame, the extent of a network scales inversely with data rate.

10Mbps 100 Mbps 1000 Mbps

10,000 m

1,000 m

100 m

10m

~ 2800m

~ 205m

~ 20m

Page 53: chu02_2

100 Mbps Fast Ethernet

• For 100 Mbps Fast Ethernet, a conscious choice had to be made to do one or more of the following:Increase the minimum frame length so that large

networks (with multiple repeaters) could be supported.

Change the CSMA/CD algorithm to avoid the conflict.

Leave the minimum frame as is, and decrease the extent of the network accordingly.

Page 54: chu02_2

Limitations of Half-duplex Operation

• For Hub-based configuration (1995 ~), the only truly important distance was from the user to the wiring closet (<100m, 200m diameter).

• A change to the minimum frame length would have required changes to higher-layer software, including device driver and protocol suite implementation. Also difficult to seamlessly bridge between 10 Mbps and 100 Mbps network with different minimum frame lengths.

• A change to the CSMA/CD algorithm would have significantly delayed the release of the Fast Ethernet standard.

Page 55: chu02_2

Limitations of Half-duplex Operation

• Fast Ethernet uses The same 512-bit minimum frame.Decrease the network extent to the order of

200m, using twisted-pair cabling.No change to the CSMA/CD algorithm.

• For Gigabit Ethernet, network extent is only about 20m!!, if the same approach is used.

Page 56: chu02_2

Carrier Extension

• For Ethernet/Fast Ethernet, the minimum frame length = slotTime = 512 bits.

• Gigabit Ethernet keeps the 512-bit minimum frame length but sets slotTime to 512 bytes

• In Gigabit Ethernet, frames that shorter than slotTime are extended by appending a carrier-extension field so that they are exactly one slotTime long.

• Frames longer than slotTime are untouched

Page 57: chu02_2

Carrier Extended Frame Format

Preamble/SFD DA SA LEN Data FCS Extension

8 6 6 2 46 - 493 4 448 - 1 bytes

Minimum Nonextended Frame Length (64 bytes)

512-byte Short Frame

Carrier-Extended Frame (64-511 Bytes)

Preamble/SFD DA SA LEN Data FCS

8 6 6 2 494 - 1500 4 bytes

Non-Carrier-Extended Frame ( 512 Bytes)

Page 58: chu02_2

Channel Efficiency

• The use of carrier extension for short frames imposes a significant performance degradation.

• In the worst-case (a stream of minimum length frames of 512 bits with a 64-bit preamble/SFD and a 96-bit interframe gap), the channel efficiency is

• For Ethernet (Fast Ethernet),

5124096 + 64 + 96

= 12%

512512 + 64 + 96

= 76%

length ofslot time

Page 59: chu02_2

Frame Bursting

• The solution is to allow a station to send multiple frames, while extending only the first one with carrier extension (Frame Bursting).

• No additional frames are sent if a collision occurs before the slotTime expires.

• After that time, the station can begin sending additional frames without contending again.

• The interframe gap is filled with non-data symbols.• The bursting station may continue to start new frames for

up to one burstLength, which limits the maximum time that a station is allowed to dominate the channel.

Page 60: chu02_2

Frame Bursting

Maximum Time to start of Last frame in Burst (8192 Bytes)

SlotTime(512 Bytes)

傳送訊框 frame 1 frame 2 frame 3 frame 4

Inter-Frame Spacing (96 bit time)

Preamble SFD DA SA LEN LLC PAD FCS

Carrier extension

Carrier detection

Page 61: chu02_2

Frame Bursting

• Transmitters are not required to implement frame bursting.

• A trade-off between complexity and performance.

• Receiver must be prepared to receive bursted frames.

• Even if the first frame in a burst is longer than a slotTime (no carrier-extension), a station may still continue to burst frames up to the burstLength time.

• Normally, no collision should occur after the first slotTime during a burst of frames.

Page 62: chu02_2

Half-Duplex Operational Parameters

Parameters

SlotTime 512 512 512 4096(Bit times)

interFrameGap 9.6 96 0.96 0.096 (us)

attempLimit 16 16 16 16

backoffLimit 10 10 10 10

jamSize 32 32 32 32

maxFrameSize 1518 1518 1518 1518

minFrameSize 64 64 64 64

extendSize 0 0 0 448

burstLength - - - 65,536 (bits)

Ethernet Type 10Mbps 1 Mbps 100 Mbps 1000 Mbps

Page 63: chu02_2

Full-Duplex MAC

• When an Ethernet operates in full-duplex mode, all of the complexity of carrier sense, collision detection, carrier extension, frame bursting, backoff algorithm, and so on, has no bearing !!

• Only shared medium needs these.

• The full-duplex MAC is not really a MAC at all.

• With a dedicated channel, a station may transmit at will.

Page 64: chu02_2

Limitations of Full-duplex Operation

• The underlying physical channel must be capable of supporting simultaneous, bi-directional communications without interference (1000BASE-X and 1000BASE-T families).

• Exactly two devices on the LAN segment.

• The interfaces in both devices must be capable of and configured to use full-duplex mode.

• If all of these conditions are met, then full-duplex mode not only can be used, it should be used.

Page 65: chu02_2

Operation of Full-Duplex MAC

• A station can send a frame any time there is a frame in its transmit queue and it is not currently sending a frame.

• Stations should similarly receive frames at any time, subject to interframe spacing.

• Do not defer transmissions to received traffic.• No need for carrier-extension in full-duplex mode !!• No explicit need for frame bursting !!• Full-duplex MAC can “burst” at any time (not just after an

extended carrier) and for any length of time (not just for a burstLength period) !!

Page 66: chu02_2

Gigabit Ethernet Protocol Stack• CS: Convergence Sublayer• MDI: Medium Dependent Interface• MII: Medium Independent Interface• GMII: Gigabit Medium Independent Interface

Physical

LLC

MAC

CS

PCSPMAPMD

Medium

CS

PCSPMAPMD

Medium

CS

PLS

PMA

Medium

PLS

PMD

Medium

MII MII GMII

AUIAUI

MDI MDI MDIMDI

Data link

Higher Layers&

Netrotk

1 Mbps, 10 Mbps 10 Mbps 100 Mbps 1000 Mbps

PHY

Page 67: chu02_2

10 Gigabit Ethernet Protocol Stack

Physical

LLC

MAC

Data link

Higher Layers&

Netrotk

Reconciliation Sublayer (RS)

64B/66B PCS

64B/66B PCS

8B/10B PCS

PMA

PMD

Medium

PMA

PMD

Medium

WIS

XGMIIXGMII

PMA

PMD

Medium

XGMII

Proposed IEEE 802.3ae Layers

10GBase-R 10GBase-W 10GBase-X

OSI Ref.

Page 68: chu02_2

IEEE 802.11 Family

• Differs in Physical Layer• IEEE 802.11b

– 2.45 GHz / 11 Mbps (100 m)

• IEEE 802.11a– 5.8 GHz / 54 Mbps (70 m)

• IEEE 802.11g– 2.4 GHz / 54 Mbps (100 m)

• IEEE 802.11n– 2.4/5 GHz / 100+ (max. 600) Mbps (100+ m)

Page 69: chu02_2

IEEE 802.11Standard for WLAN operations at data rates up to 2 Mbps in the 2.4 GHz ISM band. DSSS modulation.

IEEE 802.11a

Standard for WLAN operations at data rates up to 54 Mbps in the 5 GHz band. Proprietary “rate doubling" has achieved 108 Mbps. Realistic rating is 20-26 Mbps.

IEEE 802.11bWi-Fi™ or “high-speed wireless” 1, 2, 5.5 and 11 Mbps in the 2.4 GHz band. All 802.11b systems are backward compliant. Realistic rating is 2 to 4 Mbps.

IEEE 802.11g802.11a backward compatible to the 802.11b 2.4 GHz band using OFDM.

Direct Sequence Spread Spectrum

Orthogonal Frequency Division Multiplexing

2.4 GHz Radio Licenses NOT required in these bands 5 GHz

Page 70: chu02_2

Adaptive Rate Selection

• Performance of the network will also be affected by signal strength and degradation in signal quality due to distance or interference.

• As the signal becomes weaker, Adaptive Rate Selection (ARS) may be invoked.

Page 71: chu02_2

Access Point (AP)

• Usually connects wireless and wired networks– if not wired

• acts as an extension point (wireless bridge)

• consists of a radio, a wired network interface (e.g., 802.3), and bridging software conforming to the 802.1d bridging standard

• Number of clients supported– device dependent

Page 72: chu02_2

AP as a Wireless Bridge

mobile terminal

access point

server

fixed terminal

application

TCP

802.11 PHY

802.11 MAC

IP

802.3 MAC

802.3 PHY

Application

TCP

802.3 PHY

802.3 MAC

IP

802.11 MAC

802.11 PHY

LLC

infrastructure network

LLC LLC

Page 73: chu02_2

Basic Service Set (BSS)

BSS

Coordinatedfunction

Page 74: chu02_2

Independent Basic Service Set (IBSS)

IBSS

A BSS withoutAccess Point

Ad hoc mode

Page 75: chu02_2

Extended Service Set (ESS)

• ESS: one or more BSSs interconnected by a Distribution System (DS)

• Traffic always flows via Access Point• allows clients to seamlessly roam

between APs

Page 76: chu02_2

Distributed System (DS)

• A thin layer in each AP

– embodied as part of the bridge function

– keeps track of AP-MN associations

– delivers frames between APs

• Three types:

– Integrated: A single AP in a standalone network

– Wired: Using cable to interconnect APs

– Wireless: Using wireless to interconnect APs

Page 77: chu02_2

ESS: Single BSS (with integrated DS)

BSS

AccessPoint

A cell

91.44 to 152.4 meters

Page 78: chu02_2

ESS: BSS’s with Wired Distribution System (DS)

BSS

BSS

Distribution

System

20-30% overlap

Page 79: chu02_2

ESS: BSS’s with Wireless Distribution System (DS)

BSS

BSS

Distribution

System

Page 80: chu02_2

ESSID in an ESS

• ESSID differentiates one WLAN from another

• Client must be configured with the right ESSID to be able to associate itself with a specific AP

• ESSID is not designed to be part of security mechanism, and it is unfitted to be one

• AP broadcast the SSID(s) they support

• Client association requests contain the ESSID

• Transmitted in the clear

Page 81: chu02_2

ESSID

Page 82: chu02_2

Connecting to the Network

Client Access Point

Probe Request

Probe Response

Authentication Response

Authentication Request

Association Response

Association Request

Probing

802.11Authentication

Association

Page 83: chu02_2

Probing Phase

• Find an available AP

• APs may operate at different channels (11 channels in total in case of 802.11a)

• Should scan a channel at least MinChannelTime

• If an AP is found, should last MaxChannelTime

Page 84: chu02_2

Active Scanning

probe request with SSID

probe responseIf SSID matches

Service Set Identifier (SSID)

APMN

Page 85: chu02_2

Passive Scanning

beacon with SSID

Service Set Identifier (SSID)

APMN

Page 86: chu02_2

Full Scanning

MN AP 1

Scan channel 1

AP 2 AP 3

Scan channel 2

Beacon or Probe Resp

MinChannelTime

MaxChannelTime

Scan channel 3

Scan channel 11

Page 87: chu02_2

WLAN authentication occurs at Layer 2. It is the process of authenticating the device not the user.

Authentication and Association Types

Authentication request

Authentication response(Accept or Reject)

Page 88: chu02_2

802.11 Authentication Methods

• Open Authentication (standard)

• Shared key authentication (standard)

• MAC Address authentication (commonly

used)

Page 89: chu02_2

Open Authentication

• The authentication request contain a NULL authentication protocol. It must have the AP SSID.

• The access point will grant any request for authentication

Client Access Point

Authentication Request

Authentication response

Page 90: chu02_2

Shared Key Authentication• Requires that the client configures a static WEP key

Client Access Point

Authentication Request

Authentication response (challenge)

Authentication response(Success/Failure)

Authentication Request(encrypted challenge)

Page 91: chu02_2

MAC Address Authentication

• Not specified in the 802.11 standard, but supported by many vendors (e.g. Cisco)

• Can be added to open and shared key authentication

Access-Request(MAC sent as RADIUS req.)

Auth. Request

Auth. Response (Success/Reject) Access-Success/Reject

ClientRADIUS ServerAccess Point

Page 92: chu02_2

實際驗證

Open Authentication

Page 93: chu02_2

WEP Encapsulation

1. P = M || checksum(M) {p=plaintext}

2. KeyStream = RC4 (IV || k( {k=shared-key}

3. C = XOR (P, KeyStream) {c=ciphertext}

4. Transmit (IV, C) {IV=init-vector}

WEP Key

Initialization Vector (IV)

Plaintext

Ciphertext

IV

seed

Message

Key Stream

CRC-32 Integrity Check Value (ICV)

RC4 PRNG

P

C

Page 94: chu02_2

WEP Decapsulation1. KeyStream = RC4 (IV || k(2. P’ = XOR (C, KeyStream) = M’ || checksum(M)3. If checksum(M’) = (checksum(M))’

Then P’ is accepted

WEP Key

Plaintext Key stream

Message

Ciphertext

IV

ICV' = ICV?

CRC 32

RC4 PRNG

ICV’

ICV

Seed

P’

M’

Page 95: chu02_2

802.1X

• based on EAP (extensible authentication protocol, RFC 2284)

– still one-way authentication

– initially, MN is in an unauthorized port

– an “authentication server” exists

– after authorized, the MH enters an authorized port

– 802.1X ties it to the physical medium, be it Ethernet, Token Ring or wireless LAN.

Page 96: chu02_2

Three Main Components

• supplicant: usually the client software

• authenticator: usually the access point

• authentication server: usually a Remote Authentication Dial-In User Service (RADIUS) server

Page 97: chu02_2

Extensible Authentication Protocol (EAP)

• the AP does not provide authentication to the client, but passes the duties to a more sophisticated device, possibly a dedicated server, designed for that purpose.

Authenticationrequest

Authenticationresponse

Authenticationrequest

Authenticationresponse

Authenticationserver

Page 98: chu02_2

802.1X – How it works

Auth Server“RADIUS”

APClient

Let me in! (EAP Start)

What’s your ID? (EAP-request identity message)

ID = [email protected] (EAP Response)Is [email protected] OK?

Prove to me that you are [email protected]

The answer is “47”

Let him in. Here is the session key.

Come in. Here is the session key.

http://yyy.local\index.htmnetwork

EAP Challenge/Authentication

Encryptedsession

Page 99: chu02_2

Distributed Coordination Function: CSMA/CA

• CSMA: Carrier Sense Multiple Access– physical carrier sense: physical layer

– virtual carrier sense: MAC layer• network allocation vector (NAV)

• CA: Collision Avoidance– random backoff procedure

• shall be implemented in all stations and APs

Page 100: chu02_2

Contention Window

DIFS

contention windowbusy

All stations must wait DIFSafter medium is free

The winnerdata frame

random 1

random 2

random 3time

Page 101: chu02_2

SIFS: Giving Priority to RTS/CTS/ACK

busy

DIFS

ACK

data frame

SIFSSIFS

DIFS

contention window

Source

Destination

OthersDefer access

Page 102: chu02_2

SIFS: Transmitting Fragments

Source

Destination

Others

ACK ACK

SIFS

DIFS

ContentionWindow

Defer access

SIFS

Fragment 1SIFS

SIFS

Fragment 2

Page 103: chu02_2

EIFS: Low Priority Retransmission

busy

data frame

SIFS

DIFS

SIFS

DIFS

contention window

Source

Destination

OthersDefer access

EIFS

NoACK

canresend

contension

Page 104: chu02_2

CSMA/CA with RTS/CTS

busy

DIFS

ACK

data frame

SIFSSIFS

Source

Destination

Others NAV (RTS)

RTS

CTS

NAV (CTS)

contentionwindow

SIFS SIFS

Page 105: chu02_2

RTS/CTS is Optional

• system parameter RTSThread– RTS/CTS is used only when frame size

RTSThread

Page 106: chu02_2

Throughput Issues

• When a source node sends a frame, the receiving node returns a positive acknowledgment (ACK). – This can consume 50% of the available bandwidth.

• This overhead, combined with the collision avoidance protocol (CSMA/CA) reduces the actual data throughput to a maximum of 5.0 to 5.5 Mbps on an 802.11b wireless LAN rated at 11 Mbps.

Page 107: chu02_2

What is Bluetooth?

• Major joint computing and telecomm industry initiative

• Plan to deliver a revolutionary radio-based solution– Cable replacement, no line of sight restrictions– Prefect for mobile devices - small, low power, low cost– Open specification (license free)

Page 108: chu02_2

Bluetooth Characteristics

• Data/voice access

• Cable replacement technology

• 1 Mbps symbol rate

• Range 10+ meters

• Low cost

• Low power

Page 109: chu02_2

Ultimate Headset(Voice Access)

Page 110: chu02_2

Cordless Computer(Cable Replacement)

Page 111: chu02_2

Automatic Synchronization

In the Office

At Home

Page 112: chu02_2

Bluetooth World

Page 113: chu02_2

Application of Bluetooth

• Integrated in– mobile phones– PDA/handhelds– Computers– Wireless peripherals

• Handsets

• cameras

– Network access devices• universal bridge to other networks or internet

Page 114: chu02_2

Masters and Slaves

• Each Bluetooth device may be either a Master or Slave at any one time, thought not simultaneously.

• Master — the device which initiates an exchange of data.

• Slave — the device which responds to the master.

s m

Page 115: chu02_2

Piconet

• Two or more units sharing the same hopping sequence form a piconet (similar to a LAN).

• Each piconet can have – only one master.

– up to seven slaves.• Each piconet has max

capacity (1 Mbps).s s s

m

Page 116: chu02_2

Piconet Structure

Master

Active Slave

Parked Slave

Standby

Page 117: chu02_2

Scatternet

• Multiple piconets form a scatternet.

• Same device can be shard by two different piconets

s s

sms

mss

ss

s

m

Max 256 piconets

Page 118: chu02_2

Frequency Hop Spread-Spectrum

• Bluetooth channel is represented by a pseudo random hopping sequence through the entire 79 RF frequencies

• Nominal hop rate of 1600 hops per second

• Channel Spacing is 1 MHz

Page 119: chu02_2

Time Division Duplex (TDD)

• Bluetooth is a Time Division Multiplexed system• 625 s/slot

Slot k Slot k+1 Slot k+2

master

slave

625s

Page 120: chu02_2

Multi-Slot Packets

• Bluetooth defines data packets which are 1, 3, or 5 slots long

f(k) f(k+1) f(k+2) f(k+3) f(k+4) f(k+5) f(k+6)1-slotpacket

3-slotpacket

5-slotpacket

Page 121: chu02_2

Time Division Multiplexing

• Slaves must listen to the master• A slave can send only after receiving a poll

Master

Slave 1

Slave 2

RX

RX RX

RXTX

TX TX

TX

RX RX RX RX

1

TX

2

TX

2

TX

1

TX

Page 122: chu02_2

Putting It Altogether

0123

78

757677

45

time

Master

Slave 1

Slave 2

channel

Page 123: chu02_2

Asynchronous Connection-Less (ACL) Links

• One ACL link can exist between any two devices.

• No slots are reserved.

• Every even-slot is Master transmission & every old-slot is Slave response

• Broadcast packets are ACL packets not addressed to any specific slaves.

Page 124: chu02_2

Synchronous Connection Oriented (SCO) Links

• a symmetric link between Master and Slave with reserved channel bandwidth and slots.

• Typically used for voice connection• A Master can support up to three SCO links.• A slave can support

– up to 3 SCO links from the same master– two SCO links if the links are originated from different

masters.

• SCO packets are never retransmitted.

Page 125: chu02_2

SCO Traffics

• Master reserves slots for SCO links

master

Slave 1

Slave 2

Slot no 0

TX

TX

RX

RX

TX

TX RX

RX

0SCOTX

RXSCO

TXSCO

RXSCO

1 2 3 4 5 1SCOTX

RXSCO

TXSCO

RXSCO

2

Page 126: chu02_2

Mixed Link Packets

MASTER

SLAVE 1

SLAVE 2

SLAVE 3

ACLSCO SCO SCO SCOACLACL ACL

Page 127: chu02_2

RFID

• What is RFID?– RFID is an ADC (Automatic Data Capture)

technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track …

– RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item

Page 128: chu02_2

An RFID System

Reader

RF ModuleTag

Antenna

Host ComputerHost Computer

Interrogation UnitTx/RxMicro

Computer

Computer Network

AntennaOne or more RF tagsTwo or more antennasOne or more interrogatorsOne or more host computersAppropriate software

Page 129: chu02_2

RF Tag

Chip

Antenna

Tag

Radio Tx/Rx

RAM ROM

CPU I/O

Pwr Supply

Radio Tx/Rx

RAM ROM

CPU I/O

Pwr Supply

Radio Tx/Rx

RAM ROM

CPU I/O

Pwr Supply

Radio Tx/Rx

RAM ROM

CPU I/O

Pwr Supply

Chip + Antennae + Packaging = Tag

Page 130: chu02_2

Variations of RF Tags

• Basic types: active vs. passive• Memory

– Size (16 bits - 512 kBytes +)– Read-Only, Read/Write or WORM

• Arbitration (Anti-collision)• Ability to read/write one or more tags at a time• Frequency : 125KHz - 5.8 GHz• Physical Dimensions

– Thumbnail to Brick sizes– Incorporated within packaging or the item

• Price ($0.50 to $150)

Page 131: chu02_2

RFID Frequencies

Frequency Regulation Range Data Speed Comments

125-150 kHz Basically unregulated

? 10 cm Low Animal identification and factory data collection systems

13.56 MHz ISM band, differing power levels and duty cycle

< 1 m Low to moderate

Popular frequency for I.C. Cards (Smart Cards)

433 MHz

Non-specific Short Range Devices (SRD), Location Systems

1 – 100 m Moderate DoD Active

860-960 MHz

ISM band (Increasing use in other regions, differing power levels and duty cycle

2 – 5 m Moderate to high

EAN.UCC GTAG, MH10.8.4 (RTI), AIAG B-11 (Tires), EPC (18000-6’)

2450 MHz ISM band, differing power levels and duty cycle

1 – 2 m High IEEE 802.11b, Bluetooth, CT, AIAG B-11

Regulating Authority : ITU and Geo Organizations