CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Similar documents
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Based on Computer Networking, 4 th Edition by Kurose and Ross

CSE 123A Computer Networks

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

The Wireless Network Road Trip

Lecture 17: Wireless Networking"

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Random Access Protocols

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CSMA/CA. Information Networks p. 1

RTT 60.5 msec receiver window size: 32 KB

Wiereless LAN

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

10. Wireless Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

How To Make A Multi-User Communication Efficient

Data Link Layer. Page 1. Ethernet


IEEE Technical Tutorial. Introduction. IEEE Architecture

CS263: Wireless Communications and Sensor Networks

Ethernet, VLAN, Ethernet Carrier Grade

ECE 428 Computer Networks and Security

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

COMPUTER NETWORKS HANDOUTS LECTURERS # PREPARED BY: HAMMAD KHALID KHAN. Copyright Virtual University of Pakistan

Controlled Random Access Methods

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

Lecture 7 Multiple Access Protocols and Wireless

MAC Algorithms in Wireless Networks

Chapter 7 Low-Speed Wireless Local Area Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

A Technical Tutorial on the IEEE Protocol

RETI DI TELECOMUNICAZIONI

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Center Networks, Link Layer Wireless (802.11)

EPL 657 Wireless Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Ethernet. Ethernet. Network Devices

Basic processes in IEEE networks

COMP 3331/9331: Computer Networks and Applications

11/22/

IT4405 Computer Networks (Compulsory)

Network Security TCP/IP Refresher

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

Post-Class Quiz: Telecommunication & Network Security Domain

IEEE Ad Hoc Networks: Performance Measurements

TCP in Wireless Networks

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised COURSES.

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

... neither PCF nor CA used in practice

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Introduction to Ethernet

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Data Link Protocols. TCP/IP Suite and OSI Reference Model

ECE/CS 372 introduction to computer networks. Lecture 13

CSCI 362 Computer and Network Security

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Performance Evaluation of Wired and Wireless Local Area Networks

IEEE Wireless LAN

The Basics of Wireless Local Area Networks

EETS 8316 Wireless Networks Fall 2013

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Adaptive DCF of MAC for VoIP services using IEEE networks

Industrial Networks & Databases

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

Medium Access Control (MAC) and Wireless LANs

Lab VI Capturing and monitoring the network traffic

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Computer Networks Vs. Distributed Systems

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Network Categories. Network Types for the Local Range. Ethernet

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

Computer Networks CS321

Introduction Chapter 1. Uses of Computer Networks

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Overview of Computer Networks

Measuring the service level in the 2.4 GHz ISM band

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Wireless LAN Pen-Testing. Part I

Transcription:

CSE331: Introduction to Networks and Security Lecture 6 Fall 2006

Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP) Presentation Session Transport Network Data Link Physical Data format issues (e.g. big- vs. little-endian) Manages multiple streams of data Process to process protocols Routes packets among nodes in network Packages bit streams into frames Transmits raw bits over link CSE331 Fall 2006 2

IEEE 802 network standards The IEEE 802 committee produces standards & specifications for Local Area Networks (LAN): 802.3 CSMA/CD Networks (Ethernet) 802.4 Token Bus Networks 802.5 Token Ring Networks 802.6 Metropolitan Area Networks 802.11 Wireless LAN CSE331 Fall 2006 3

Ethernet (802.3) A standard for local area networks (LAN) Developed in mid-70 s at Xerox PARC Descendent of Aloha, a U. of Hawaii radio packet network DEC, Intel, and Xerox standard: 1978 for 10Mbps IEEE 802.3 standard grew out of that Physical implementations: 10Base5, 10BaseT, 100BaseT, 1000BaseT Speed: 10Mbps,100Mbps, 1000Mbps, CSE331 Fall 2006 4

Ethernet Physical links Originally used Thick-net 10Base5 10 = 10Mbps 5 = maximum of 500 meters segments Up to 4 repeaters between two hosts=2500m max More common: 10BaseT 10 = 10Mbps T = Twisted pair (typically Category 5), Maximum of 100 meter segments Connected via hubs (still 2500m max) Today s standards: 100BaseT, 1000BaseT CSE331 Fall 2006 5

Ethernet topologies 10Base5 topology Host Repeater 10BaseT topology Hub Hub CSE331 Fall 2006 6

How the ethernet works The Ethernet link is shared A signal transmitted by one host reaches all hosts Method of operation: CSMA/CD Carrier Sense, Multiple Access, with Collision Detection Hosts competing for the same link are said to be in the same collision domain Good news: easy to exchange data Bad news: have to regulate link access Procotol: Media Access Control (MAC) CSE331 Fall 2006 7

Ethernet Addresses Every adapter manufactured has a unique address 6 bytes (48 bits) usually written in Hex. Examples: 00-40-50-B1-39-69 and 8:0:2b:e4:b1:2 Each manufacturer is assigned 24bit prefix Manufacturer ensures unique suffixes CSE331 Fall 2006 8

Ethernet Frame Format 64 48 48 16 32 Preamble Dest Src Type Body CRC Preamble repeating pattern of 0 s & 1 s Used by receiver to synchronize on signal Dest and Src Ethernet Addresses Type demultiplexing key Identifies higher-level protocol Body payload Minimum 46 Bytes Maximum 1500 Bytes CSE331 Fall 2006 9

Addresses in an ethernet frame All bits = 1 indicates a broadcast address Sent to all adapters First bit = 0 indicates unicast address Sent to only one receiver First bit = 1 indicates multicast address Sent to a group of receivers CSE331 Fall 2006 10

An Ethernet Adapter Receives: Frames addressed to the broadcast address Frames addressed to its own address Frames sent to a multicast address If it has been programmed to listen to that address All frames If the adapter has been put into promiscuous mode CSE331 Fall 2006 11

Ethernet Transmitter Algorithm If the link is idle transmit the frame immediately Upper bound on frame size means adapter can t hog the link If the link is busy Wait for the line to go idle Wait for 9.6µs after end of last frame (sentinel) Transmit the frame Two (or more) frames may collide Simultaneously sent frames interfere CSE331 Fall 2006 12

Collision Detection When an adapter detects a collision Immediately sends 32 bit jamming signal Stops transmitting A 10MBps adapter may need to send 512 bits in order to detect a collision Why? 2500m + 4 repeaters gives RTT of 51.2µs 51.2µs at 10Mbps = 512 bits Fortunately, minimum frame (excluding preamble) is 512 bits = 64 bytes 46 bytes data + 14 bytes header + 4 bytes CRC CSE331 Fall 2006 13

Ethernet Collision (Worst Case) T=0 25.6µs 25.6µs 51.2µs CSE331 Fall 2006 14

Exponential Backoff After it detects 1 st collision Adapter waits either 0 or 51.2µs before retrying Selected randomly After 2 nd failed transmission attempt Adapter randomly waits 0, 51.2, 102.4, or 153.6µs After n th failed transmission attempt Pick k in 0 2 n -1 Wait k x 51.2µs Give up after 16 retries (but cap n at 10) CSE331 Fall 2006 15

Ethernet Security Issues Promiscuous mode Packet sniffer detects all Ethernet frames Less of a problem in switched Ethernet Why? CSE331 Fall 2006 16

Wireless LAN (IEEE 802.11) Spread spectrum radio 2.4GHz frequency band Bandwidth ranges 1, 2, 5.5, 11, 22, 54 Mbps Like Ethernet, 802.11 has shared medium Need MAC (uses exponential backoff) Unlike Ethernet, in 802.11 No support for collision detection Not all senders and receivers are directly connected CSE331 Fall 2006 17

Hidden nodes A B C A and C are hidden with respect to each other Frames sent from A to B and C to B simultaneously may collide, but A and C can t detect the collision. CSE331 Fall 2006 18

Exposed nodes A B C D B is exposed to C Suppose B is sending to A C should still be allowed to transmit to D Even though C B transmission would collide (Note A to B transmission would cause collision) CSE331 Fall 2006 19

How 802.11 works Media is still shared Collision domains are more complex Method of operation: CSMA/CA Carrier sensing multiple access, with collision avoidance Augmented media access control (MAC) procotol: Slot reservation procotol CSE331 Fall 2006 20

Slot reservation protocol Sender transmits Request To Send (RTS) Includes length of data to be transmitted Timeout leads to exponential backoff (like Ethernet) Receiver replies with Clear To Send (CTS) Echoes the length field Sender sends data Receiver sends ACK of frame to sender CSE331 Fall 2006 21

Effects of CTS and RTS messages Suppose A and B are communicating, C is a neighbor node. A sends RTS to B B sends CTS to A If C sees the CTS message: C is in the range of the receiver (B) C cannot transmit for durations specified by length If C sees RTS but not CTS: C is in the range of the sender (A), but not in the range of the receiver (B) C is not close enough to the receiver to interfere, so C is free to transmit CSE331 Fall 2006 22

Wireless Access Points Distribution System A AP1 AP2 AP3 D B C Distribution System wired network infrastructure Access points stationary wireless device Roaming wireless CSE331 Fall 2006 23

Selecting an Access Point Active scanning Node sends a Probe frame All AP s within reach reply with a Probe Response frame Node selects an AP and sends Association Request frame AP replies with Association Response frame Passive scanning AP periodically broadcasts Beacon frame Node sends Association Request CSE331 Fall 2006 24

Node Mobility Distribution System A AP1 B AP2 B C AP3 D B moves from AP1 to AP2 B sends Probes, eventually prefers AP2 to AP1 Sends Association Request CSE331 Fall 2006 25

802.11 Security Issues Packet Sniffing is worse No physical connection needed Long range (6 blocks) Old encryption standards (WEP) not that good Denial of service Association (and Disassociation) Requests are not authenticated We ll talk more about these issues soon CSE331 Fall 2006 26

802.11 Map of Toronto WEP Enabled (Good) WEP Disabled (Bad CSE331 Fall 2006 27

Wireless Network at Penn CSE331 Fall 2006 28