WiFi, Bluetooth & Layers Emmanuel Baccelli. Last week Wifi, Bluetooth: wireless LANs Medium Access Control Basic example : Aloha.

Slides:



Advertisements
Similar presentations
Quiz Sketch the time domain waveform and spectrum, labeling all important features, of a rectangular pulse of 2.4 Ghz having 1 uS duration.
Advertisements

McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
Networks: Wireless LANs1 Wireless Local Area Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Network Technology CSE Network Technology CSE3020 Week 9.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Wireless Networking So we talked about wired networks. What about wireless?
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Networks: Wireless LANs1 Wireless Local Area Networks.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
WLAN b a Johan Montelius
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Wireless networks Philippe Jacquet. Link layer: protocols in local area networks MAC/link address: –6 octets Starts with 1: unicast Starts with 0: multicast.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
2/12/20021 IEEE Wireless Local Area Networks The future is wireless Presented by Tamer Khattab and George Wong Prepared for EECE571N - Advanced.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
1 Kyung Hee University Chapter 15 Wireless LANs. 2 Kyung Hee University IEEE 802 Standards Working Groups WiMAX, an acronym that stands for Worldwide.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Ch 14. Wireless LANs IEEE Specification for a wireless LAN – Cover physical and data link layers Basic service sets (BSS) and extended service.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Universität Karlsruhe Institut für Telematik ECE 591
Chapter 15 Wireless LANs 15.# 1
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Ch 5. Link layer and Local Area Networks Myungchul Kim
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Corso di Reti mobili Wi-Fi and Bluetooth Francesco Potortì
SSN College of Engineering
Chapter 15 Wireless LANs.
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
A Wireless LAN technologies IEEE
CS 457 – Lecture 7 Wireless Networks
Wireless LAN 第一組 電機四 林長寬 B /11/24.
Specification overview
Chapter 6 Medium Access Control Protocols and Local Area Networks
Specification overview
basics Richard Dunn CSE July 2, 2003.
Protocol Details John Bellardo UCSD.
Specification overview
Specification overview
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
Specification overview
Specification overview
Specification overview
Presentation transcript:

WiFi, Bluetooth & Layers Emmanuel Baccelli

Last week Wifi, Bluetooth: wireless LANs Medium Access Control Basic example : Aloha

Wifi, Bluetooth, Ethernet Couche 5 Couche 4 Couche 3 Couche 2: Lien Couche 1: Physique Protocol layers 1 et 2 Transfer packets over a link Standardization body: IEEE Standards: , 803.2, …

= la norme IEEE Norme = règles, techniques, formats communs à respecter Protocole = norme de communication entre machines IEEE = Institute of Electrical and Electronics Engineering IEEE IEEE 1394 IEEE

IEEE standard Communication between terminals and access point Direct communication between terminals

Infrastructure mode in urban situation

Emission power 100 mW (1/10 of GSM) Bursty packet emissions Mbits/s Range: 100 m outdoor several ten meters European ETS IEEE basic

Frequencies –52 MHz bandwidth around 2.4 GHz –11 channels with partial overlaps

Spread of 11MHz (11 bits Barker sequence) 1 Msymbols/s –1 Mbps: modulation PSK 1, 1 bit/ symbol (DSSS IEEE ) –2 Mbps: mod QPSK, 2 bits/ symbol Spread of 11 MHz (séquence 8 bits CCK), 1,375 Msymbol/s –5,5 Mbps: 4 bits/symbole –11 Mbps: 8 bits/symbole coding IEEE b Spread spectrum

IEEE b (1-2-5,5-11 Mbps) –Bandwidth 2,4 GHz –Modulation Direct Sequence Spread Spectrum (DSSS) –No Forward Error Control (FEC) IEEE a (6-54 Mbps) –Bande 5,2 GHz –Mod. Orthogonal Frequency Division Multiplexing (OFDM) –FEC rate ½, 2/3, 3/4 (convolutive code) IEEE g (ERP-OFDM), IEEE n (MIMO) IEEE b,a,g,n

Carrier Sense Multiple Access

Basic CSMA: listen before talk node withdraws over signal detection forbidden zone emitter destination packet ack forbidden period DIFS

Hidden nodes collisions avoidance Node withdraws over hidden nodes detection emitter destination packet ack forbidden period RTS CTS

Collision management CSMA/CA Carrier Sense Multiple Access with Collision Avoidance

Random backoff of transmission over forbidden periods –Evite les collisions répétées –The node selects a random backoff: a number of mini-slots between 0 and C max -1 (8) –Mini-slots are not decremented during forbidden periods –C max double at each collision (lack of CTS or ACK) –Retry number limited to max_retry (7-16). –Slot<DIFS (Distributed Inter Frame Space) Forbidden periodslot Forbid. period Example: time for a backoff of 3 slots Retransmissions packet ack Forbidden Period RTS CTS packet ack forbidden period DIF S

Infrastructure mode AP terminal Distribution system BSS ESS AP: Access Point BSS: Basic Set Service ESS: Extended Set Service IBSS: Independent Basic Set Service Terminology IBSS ad hoc mode

IEEE packet Packet emission preambleMAC headerData part (IP packet)Check sum packet ACK SISF Emitter node Intended Receiver node Formats (packets)

Format (Preamble)

–Four addresses in infrastructure mode –Only two in ad hoc mode –Control field contains length and mode –Sequence field for fragmentation Address 1Address 2Address 3Address 4controlsequence Formats (MAC header)

Authentification and encryption (secret key K, symmetric) –The terminal requires the access point authentification –The access point sends a challenge of 128 random bits –The terminal returns the 128 bits xored by K –The access point confirms authentification –Default: James Bond overhear the key K via direct comparison between challenge and terminal reply! WEP security Packet encryption (algorithm RC4) –pseudo random sequence seed=K*IV (Initialisation Vector in packet header) –Integrity check via an internal check sum –RC4 is linear (RC4(x  y)=RC4(x)  RC4(y))! WEP is very weak and only address unvolontary earsdropping.

WEP improvement with IEEE i –Introduction of IEEE 802.1x to manage the secret keys K (Extensible Authentification Protocol- Transport Layer Security, EAP-TLS). –Authentification made indépendant of encryption –Introduction of more sophisticated function : (K,IV)  RC4 seed. IEEE IEEE 802.1x Authentification agent improved security

= IEEE Communication between personnal devices Architecture piconet master slave: –7 slaves max per piconet –Exclusive links slave-master –Slotted time master slaves piconet

esclaves Wide area architecture : scatternet –Several tiled piconets –Frequency hopings differ –certains nodes switch status master-slave IEEE

Limited emission power –Class 1: 100 mW –class 2: 2,5 mW –class 3: 1 mW (1/1000 GSM) Minimal signal processing –Periodic TDMA –Throughput 1 Mbps max –Few meters range. Profiles –Standadized applications IEEE

From master Slotted system managed by the master node over a single frequence Adaptative FEC, rate: 1 (no correction), 2/3, 1/3 Frequency hopping (1600/sec) –One hop per slot over 79 channels (2,4 GHz) –Throughput 1 Mbps, extensions for10 Mbps. From slave IEEE

Bluetooh + WiFi

Format du paquet –Access Code (AC): synchro, pagination (slot #). Channel AC, Device AC, Inquiry AC. –Header: address, sequence number, flow control, acquittement Formats

frequency hoping Periodic change of frequencies. Predetermined sequence fixed in standard. Goal: use uncongested frequencies.

Connection establishment –Inquiry for destination terminal identification (source, destination) –paging for synchronization of emissions (source, master, destination) –polling, the master prompts each slave emission. –Out of connection, the slave can be in wake mode or in sleed mode, otherwise it looses its MAC address. Connection

Authentification (E1 algorithm) –Secret shared key (link key) (128 bits) Encryption (algorithms KG, E0) –Secret key Kc (deduced from link key par KG) from 8 to 128 bits (negociated) –Use of slot number in E0 (indicated in paging) –E1 and E0 differ. Sécurity Default of Bluetooth security –Keys are too short –link key and Kc are both function of device PIN (4 bits).

Authentification of B byA –B sends its address (48 bits) –A returns rand(A) to B (challenge 128 bits) –E1(addr B, link key, rand(A))=(SRES,ACO) (32 bits, 96 bits) –B returns SRES. Authentification

encryption –Kc depends on link key, ACO and EN_RAND –The pseudo random word Kstr depends on slot number and the addess of the master –In packet crypted code=data  Kstr Encryption mode 2 –Packets are encrypted via individual keys Kc(B)=KG(…,ACO(B)) –Broadcast packets are not encrypted mode 3 –All packets are encrypted via the key of the master Kc=KG(…,ACO(A))