Wireless Networking IEEE 802.11 In Depth Module-05 Jerry Bernardini Community College of Rhode Island 6/26/20151Wireless Networking J. Bernardini.

Slides:



Advertisements
Similar presentations
Contents IEEE MAC layer operation Basic CSMA/CA operation
Advertisements

Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Introduction to Wireless Networking Medium Access Module-06 Jerry Bernardini Community College of Rhode Island 5/8/2015Wireless Networking J. Bernardini1.
Wireless LAN (not assessed) Dr Sandra I. Woolley.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Module C- Part 1 WLAN Performance Aspects
Wireless# Guide to Wireless Communications
University of Calgary – CPSC 441
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
1 CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Wireless Networking So we talked about wired networks. What about wireless?
MAC Architecture Module-7 Jerry Bernardini Community College of Rhode Island 6/18/2015Wireless Networking J. Bernardini1.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Lecture #2 Chapter 14 Wireless LANs.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Chapter 04 IEEE Media Access Control
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter MAC Architecture.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING Chapter 05. MAC and Physical Layers.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
Planning and Analyzing Wireless LAN
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Chapter 15 Wireless LANs 15.# 1
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Wireless MAC.
EA C451 (Internetworking Technologies)
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
WiFi Networks: IEEE b Wireless LANs
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
WiFi Networks: IEEE b Wireless LANs
Presentation transcript:

Wireless Networking IEEE In Depth Module-05 Jerry Bernardini Community College of Rhode Island 6/26/20151Wireless Networking J. Bernardini

Presentation Reference Material CWNA Certified Wireless Network Administration Official Study Guide, Fourth Edition, Tom Carpenter, Joel Barrett – Chapter-4 Pages The California Regional Consortium for Engineering Advances in Technological Education (CREATE) project 6/26/2015Wireless Networking J. Bernardini2

Bits, Bytes, Octets, Frames, Packets Bits =1 or 0 Bytes = 8 bits Octets = 8 bits = Byte – Octet is used by telecommunication people – Byte is used by IT people Frames = grouping of bits at layer-2 Packets = grouping of bits at layer-3 Datagrams = another term for packets 6/26/2015Wireless Networking J. Bernardini3

Coding – ASCII Table 6/26/2015Wireless Networking J. Bernardini4

CWNA Guide to Wireless LANs, Second EditionCCRI J. Bernardini 5 OSI data flow

CWNA Guide to Wireless LANs, Second EditionCCRI J. Bernardini 6 IEEE Physical Layer Standards IEEE wireless standards follow OSI model, with some modifications Data Link layer divided into two sublayers: – Logical Link Control (LLC) sublayer: Provides common interface, reliability, and flow control – Media Access Control (MAC) sublayer: Appends physical addresses to frames Physical layer divided into two sublayers: – Physical Medium Dependent (PMD) sublayer: Makes up standards for characteristics of wireless medium (such as DSSS or FHSS) and defines method for transmitting and receiving data – Physical Layer Convergence Procedure (PLCP) sublayer: Performs two basic functions Reformats data received from MAC layer into frame that PMD sublayer can transmit “Listens” to determine when data can be sent

Data Link Layer - Physical Layer- Data Units Data Link Layer (Layer-2) Physical Layer (Layer-1) Logical Link Control Media Access Control PHY Layer Convergence Protocol Physical Medium Dependent LLC MAC PLCP PMD PHY = Physical Layer MSDU (MAC Service Data Unit) MPDU (MAC Protocol Data Unit) PSDU (PLCP Service Data Unit) PPDU (PLCP Protocol Data Unit) Modulated Radio Signal ( MPDU = PSDU name change to indicated service needed) (From upper layers 2304 bytes max)

8 Where the IEEE Standard Fits

IEEE CSMA/CD vs. IEEE CSMA/CA CSMA/CD is for wired collision handling CSMA/CA is for wireless collision handling CSMA = Carrier Sense Multiple Access CD = Collision Detection CA = Collision Avoidance Why do collisions occur? – Answer = Two or more stations transmit at the same time Why is it important to detect or avoid collisions? – Answer = Because there is data loss and retransmission is necessary Wired networks are designed for the transmitting station to detect most collisions Many collisions will not be detected by Wireless networks – therefore avoid collisions

IEEE Collision Handling CSMA/CA In CSMA/CA a Wireless node that wants to transmit performs the following sequence: 1.Listen on the desired channel. 2.If channel is idle (no active transmitters) it sends a packet. 3.If channel is busy the node waits random time until transmission stops and then waits an additional time period. 4.If the channel is still idle at the end of the time period the node transmits its packet otherwise it repeats the process defined in 3 above until it gets a free channel. Additional support mechanisms such as ACK, RTS/CTS can be used but increase overhead noticeably.

CSMA/CA Collision Handling standard employs half-duplex radios-radios capable of transmission or reception-but not both simultaneously Wireless Client Access Points Wired LAN Transmitting Data Frames 1 2 AP-1 Listening Transmitting

Two Kinds of Carrier Sensing Mechanisms Physical Carrier Sense – Uses Clear Channel Assessment (CCA) – Is the RF energy on the channel above a threshold? – If CCA>threshold --->wait for CCA< threshold before trasmitting – Checks received signal strength using RSSI – RF energy from a hidden node could be missed Virtual Carrier Sense – Uses the Network Allocation Vector (NAV) in each station – NAV is a timer that determines if station can contend for RF medium – NAV >0 --->wait for count down to NAV=0 – NAV=0 --->use CCA to check for RF energy on medium – IF NAV=0 and CCA > threshold --->station resets NAV>0 and waits

CSMA/CA and ACK 13 CSMA/CA also reduces collisions via explicit frame acknowledgment Acknowledgment frame (ACK): Sent by receiving device to sending device to confirm data frame arrived intact If ACK not returned, transmission error assumed CSMA/CA does not eliminate collisions and does not solve hidden node problem

CSMA/CA Request to Send/Clear to Send 14 Request to Send/Clear to Send (RTS/CTS) protocol: Option used to solve hidden node problem –Significant overhead upon the WLAN with transmission of RTS and CTS frames Especially with short data packets –RTS threshold: Only packets that longer than RTS threshold transmitted using RTS/CTS

Interframe Spacing ensures no frame overlap and proper frame processing sequence 15 Interframe spaces (IFS): Intervals between transmissions of data frames Short IFS (SIFS): For immediate response actions such as ACK, CTS, RTS, fragmented frames SIFS times vary based upon PHY modulation FHSS-28us, DHSS-10us, OFDM-16us, HR/DSS-10us, ERP-10us Point Coordination Function IFS (PIFS): Time used by a device to access medium after it has been asked and then given approval to transmit PIFS times = SIFS time + PHY slot time Distributed Coordination Function IFS (DIFS): Standard interval between transmission of data frames DIFS times = SIFS time + 2x PHY slot time Extended IFS (EIFS): used when frame reception is incomplete or corrupted EIFS longest time EIFS time = SIFS + 8x ACK + Preamble + PLCP header length + DIFS

Contention Window and Backoff Time Contention Window is a range of integers which is chosen at random to become the backoff time Backoff time is a random time used to establish a frame-to-transmit – Random Backoff Time = Random Integer x Slot Time – Slot time varies for PHY modulation – FHSS-50us, DHSS-20us, OFDM-9us, HR/DSS-20us, ERP Long Slot-20us, ERP Short Slot-9us, 802.1n-9us 6/26/2015Wireless Networking J. Bernardini16

Ethernet and Frames Ethernet Frame Wireless Frame Preamble SourceDestinationDataFCS Start Of Frame Type or Length Field Frame Cntrl SourceDestinationData FCS 2 Rec. Adr Sequence Cntrl 66 Trans. Adr Duration ID Sync 10 or 18 Start Of Frame 2 4 or 6 PLCP Header MAC Packet DATA Unit, (MPDU) 1518

Frame Categories / Types Management Frames oBeacon Frame oProbe Frames oAssociation Frames… more Control Frames oRTS and CTS Frames oACK – Acknowledgement Frames… more Data Frames oData Payload Frames

Twelve Management Frame Types 6/26/2015Wireless Networking J. Bernardini19

Eight Control Frames Used to assist with the delivery of data frames 6/26/2015Wireless Networking J. Bernardini20

Fifteen Data Frames The frames that actually carry application data 6/26/2015Wireless Networking J. Bernardini21

IEEE Frame Formats CWNA Guide to Wireless LANs, Second Edition22 Management Frame Control (2) Duration (2) Des. Address (6) Source Address (6) BSSID (6) Seq. Control (2) Frame Body ( 1 to 2311) Frame Check Seq. (6) Control Frame Control (2) Duration (2) Receiver Address (6) Transmit Address ( 6) Frame Check Seq. (6) Data Frame Control (2) Duration (2) Address 1 (6) Address 2 (6) Address 3 (6) Seq. Control (2) Address 4 (6) Data ( 1 to 2311) Frame Check Seq. (6) (Bytes per field)

Frame Types and Sizes Protocol Data Unit (PDU) Frame Type and Vendor SupportMTU (Bytes) MTU + Overhead (Bytes) TCPTransport maximum segment size1460 IPLayer-3 default size1500 MACIEEE Ethernet default MPDUIEEE default1534 MPDUIEEE maximum2304 MACJumbo Frame>1500 MACCisco Baby giant MACCisco Catalyst MACCisco Catalyst /26/2015Wireless Networking J. Bernardini23

Transmitting on the WLAN: Fragmentation Fragmentation: Divide data to be transmitted from one large frame into several smaller ones – Reduces probability of collisions – Reduces amount of time medium is in use If data frame length exceeds specific value, MAC layer fragments it – Receiving station reassembles fragments Alternative to RTS/CTS – High overhead ACKs and additional SIFS time gaps 24

IEEE MAC Functions Scanning- discover AP or BSS Synchronization- all stations have the same clock Frame Transmission- rules for frame transfer Authentication- allow device in network Association- after authentication associate with AP Reassociation- roaming and association with new AP Data Protection- data encryption protects data Power Management- save power by sleeping transceiver Fragmentation- breakup frame for efficiency and interfer. RTS/CTS - solution to hidden node problem 6/26/2015Wireless Networking J. Bernardini25

Beacon Management Frame A special management frame that is used by a client stations seeking a wireless network to join. Instead of beacon frames a station could use probe request and probe response frames In an ad hoc (IBSS ) wireless network all stations take turns broadcasting the beacon frame 6/26/2015Wireless Networking J. Bernardini 26 S1 S2 AP Control Point Beacon

Active Scanning (Probes) A station could use probe request and probe response frames Instead of beacon frames 1.Station is configured with SSID and switched to a channel 2.Probe request sent by requesting station 3.All stations that have the same SSID and have normal configurations respond with a Probe Response frame The process also involves waiting for ProbeDelay and MinChannel Timers 6/26/2015Wireless Networking J. Bernardini 27 S1 S2 AP Control Point Probe Request Probe Response

Passive Scanning (Beacons) 1.Client stations listens for a beacon from an access point (AP) 2.If multiple beacons are received the strongest one is selected 3.The listening station then requests authentication and association 6/26/2015Wireless Networking J. Bernardini 28 S1 S2 AP Control Point Beacons

Authentication and Association Using the IEEE State Machine Stations are in one of three states 1.Unauthenticated / Unassociated 2.Authenticated / Unassociated 3.Authenticated / Associated You cannot transmit data frames for processing until you are associated You cannot transmit associated frames for processing until you are Authenticated 6/26/2015Wireless Networking J. Bernardini29

IEEE State Machine 6/26/2015Wireless Networking J. Bernardini30

Slot Times The amount of time a device waits after a collision before retransmitting a packet. Radio defined time interval or clock tick. – FHSS Slot Time = 50  S – DSSS Slot Time = 20  S – Infrared Slot Time = 8  S – For DSSS: SIFS = 10  S PIFS = SIFS + 1 Slot Time = 10  S + 20  S = 30  S DIFS = PIFS + 1 Slot Time = 30  S + 20  S = 50  S – Time Unit = TU = 1,024  S  1 mS Beacon interval = 100 TU or 100 mS.

Slot Time Notes Short Slot Times - The amount of time a device waits after a collision before retransmitting a packet. You can increase throughput on g, 2.4-GHz radios by enabling short slot time (most.11g radios enable this by default). Reducing the slot time from the standard 20 microseconds to the 9-microsecond short slot time decreases the overall backoff, which increases throughput. Backoff, which is a multiple of the slot time, is the random length of time a station waits before sending a packet on the LAN. Many g radios support short slot time, but some do not. When short slot time is enabled, the wireless device uses the short slot time only when all clients associated to the g, 2.4-GHz radio support short slot time. Short slot time is an g-only feature and does not apply to a radios. 6/26/2015Wireless Networking J. Bernardini32

Communications Process MAC Access Modes – DCF – CSMA/CA – DCF/PCF – Point Coordinators and Polling Contention Free Delivery Normal Delivery PCF DCF

Communications Options MAC Layer – Access Methods DCF – RTS/CTS (optional) Distributed function Wireless MAC Avoids hidden node problem DCF – PCF (optional) AP polls stations Superframes to allow station to eventually get access Superframe = Beacon + CFP + CP CFP = Contention-Free Period CP = Contention Period

RTS/CTS Sending unicast packets – Station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) – Acknowledgement via CTS after SIFS by receiver (if ready to receive) – Sender can now send data at once, acknowledgement via ACK – Other stations store medium reservations distributed via RTS and CTS

RTS/CTS RTS CTS data sender receiver others DIFS SIFS Access to medium deferred contention SIFS ACK NAV (RTS) NAV (CTS) There are generally three setting in APs for RTS/CTS Off, On, and On with Threshold   NAV – Network Allocation Vector

Fragmentation Every network has an MTU (Maximum Transmission Unit) size. Packets larger than the allowable MTU size must be broken down into multiple smaller packets, or fragments, to enable them to traverse the network with lower bit error rates, (BER). Fragment size can typically be set by the user using a threshold setting between 256 and 2,048 bytes. HeaderDataCRC HeaderData -1CRC HeaderData -2CRC Threshold Drawing not to scale.

Dynamic Rate Switching Dynamic Rate Switching =Dynamic Rate Selection =Automatic Rate Shifting----All mean the same thing Process of reducing or increasing the data rate based upon RF signal levels RF signals attenuate over distance or by absorption AP will reduce data rate for weaker signals AP will increase data rate for higher signals 6/26/2015Wireless Networking J. Bernardini38

Dynamic Rate Selection (DRS) Dynamic Rate Selection or Adaptive Rate Selection/shifting. – a, g modes: 54, 48, 36, 24, 18, 12, 9, 6 Mbps – b mode: 11, 5.5, 2, 1 Mbps – Orinoco 2X mode: 108, 96, 72, 48, 36, 24, 18, 12 Mbps

Example of Sensitivity vs. DR Minimum received signals versus data rate for a devices. Data Rate (Mb/sec) Received Signal (dBm) 6–82 9–81 12–79 18–77 24–74 36–70 48–66 54–65

Data Rate Coverage Areas 24 Mbps 18 Mbps 9 Mbps -72 dBm -76 dBm -85 dBm

Chapter-4 Topics. 6/26/2015Wireless Networking J. Bernardini 42 Frames, Packets, and Datagrams. Bits, Bytes, and Octets. MAC & PHY. IEEE CSMA/CA. Carrier Sense. Interframe Spacing. Contention Window. Collision Avoidance.. Frame Types and Formats Compared. IEEE Frame Format Versus IEEE Frame Format. Frame Types. Layer 3 Protocol Support by IEEE Frames. Jumbo Frame Support (Layer 2). MTU Discovery and Functionality (Layer 3) IEEE Frames and Frame Exchange Sequences MAC Functions. Beacon Management Frame. Active Scanning (Probes).. Passive Scanning (Beacons. Authentication and Association Processes.. The IEEE State Machine. Authentication. Association, Reassociation, and Disassociation. Regulatory Domain Requirements. Data Flow Optimization Across the RF Medium. DCF PCF IEEE e and WMM RTS/CTS and CTS-to-Self Protocols Fragmentation Dynamic Rate Switching

6/26/2015Wireless Networking J. Bernardini43

Open Association Process 6/26/2015Wireless Networking J. Bernardini44

6/26/2015Wireless Networking J. Bernardini45

6/26/2015Wireless Networking J. Bernardini46

Association, Reassociation, Disassociation Covered next week 6/26/2015Wireless Networking J. Bernardini47

Regulatory Domain Requirements Covered next week 6/26/2015Wireless Networking J. Bernardini48

Point Coordination Function (PCF) Polling: Channel access method in which each device asked in sequence if it wants to transmit – Effectively prevents collisions Point Coordination Function (PCF): AP serves as polling device or “point coordinator” Point coordinator has to wait only through point coordination function IFS (PIFS) time gap – Shorter than DFIS time gap 49

DIFS and DCF frames 50 If point coordinator hears no traffic after PIFS time gap, sends out beacon frame –Field to indicate length of time that PCF (polling) will be used instead of DCF (contention) Receiving stations must stop transmission for that amount of time –Point coordinator then sends frame to specific station, granting permission to transmit one frame standard allows WLAN to alternate between PCF (polling) and DCF (contention)

Timing Diagrams Timing or Sequence Diagrams - A graph showing events/levels as a function of time. Time Event 2ms4ms6ms8ms10ms sync rstack Time flagen pd tp2 tp1 A data mxc

SIFS SIFS - Shortest and highest priority time space sent before and/or after RTS, CTS, and ACK frames. For DSSS, SIFS is 10 microseconds or 10  S. data ACK data sender receiver others DIFS SIFS waiting time contention DIFS deferring mode DIFS

Point Coordination Function An optional polling function. Provides for limited contention-free service using the access point as a point coordinator. Supports near real-time services. In some ways PCF resembles token-based protocols. AP Control Point S1 S2

PIFS PIFS –Are used only in Point Coordination Mode by the APs. This mode is enabled by the administrator. It has medium priority and therefore always wins over DIFS, so that the AP can take control in polling. For DSSS, PIFS is 30  S.

Distributed Coordination Function The Distributed Coordination Function (DCF) is the fundamental access mechanism in IEEE Medium Access Control (MAC). DCF can be used in all wireless topologies: IBSS, BSS, and ESS.

contention DIFS DIFS – Is used by default on all stations. DIFS is the lowest priority and is used for data and management frames. For DSSS, DIFS is 50  s. medium busy sender DIFS SIFS PIFS Station Backoff Timers frame A look at all three: 10  s, 30  s, 50  s, for DSSS.  DIFS