March 1996 doc.: IEEE P /49C Tutorial MAC Entity: MAC Basic Access Mechanism Privacy and Access Control

Similar documents
Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Basic processes in IEEE networks

IEEE Technical Tutorial. Introduction. IEEE Architecture

A Technical Tutorial on the IEEE Protocol

Wiereless LAN

CSMA/CA. Information Networks p. 1

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

IEEE Wireless LAN

IEEE frame format

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Chapter 7 Low-Speed Wireless Local Area Networks

IEEE Wireless LAN Standard. Updated: 5/10/2011

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

Mustafa Ergen June 2002 Department of Electrical Engineering and Computer Science University of California Berkeley

The Wireless Network Road Trip

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Philippe Klein. avb-phkl qos-overview

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

... neither PCF nor CA used in practice

WiFi. Is for Wireless Fidelity Or IEEE Standard By Greg Goldman. WiFi 1

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Lecture 17: Wireless Networking"

IEEE WIRELESS LAN STANDARD

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Introduction to IEEE Wireless LAN

IEEE WLAN (802.11) ...Copyright. Renato Lo Cigno

Lecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello

EETS 8316 Wireless Networks Fall 2013

Security in IEEE WLANs

Adaptive DCF of MAC for VoIP services using IEEE networks

Medium Access Control (MAC) and Wireless LANs

Wireless Local Area Networks and the Standard

IEEE e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.

How To Analyze The Security On An Ipa Wireless Sensor Network

ECE 428 Computer Networks and Security

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

IEEE Wireless Local Area Networks

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

The IEEE standard

Video Transmission over Wireless LAN. Hang Liu

TCP in Wireless Networks

COMP 3331/9331: Computer Networks and Applications

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Overview of Networks and Standards

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

How To Make A Multi-User Communication Efficient

An Overview of Wireless LAN Standards IEEE and IEEE e

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Wireless LAN Pen-Testing. Part I

MAC Algorithms in Wireless Networks

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Multiple WiFi Clients on a Single Wireless Card

WI-FI TECHNOLOGY: SECURITY ISSUES

How To Determine The Capacity Of An B Network

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

10. Wireless Networks

Lecture 7 Multiple Access Protocols and Wireless

Arbitration. White Paper. September 2009 Version Author: Marcus Burton, CWNE #78 CWNP, Inc.

Department of Computer Science Columbia University

Wireless LAN Concepts

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Improving Throughput Performance of the IEEE MAC Layer Using Congestion Control Methods

Wireless LAN Services for Hot-Spot

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Supporting VoIP in IEEE Distributed WLANs

CS263: Wireless Communications and Sensor Networks

Virtual PCF: Improving VoIP over WLAN performance with legacy clients

Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,

Ajay Gummalla-July 2001

Ph.D. Thesis. Resources optimization in multimedia communications. Luca Sanna Randaccio. Advisor: Prof. Luigi Atzori

Mobile Communications Exercise: Satellite Systems and Wireless LANs. Georg von Zengen, IBR, TU Braunschweig,

Real-Time (Paradigms) (51)

Performance Analysis of the IEEE Wireless LAN Standard 1

CSE 123A Computer Networks

;l ~~! I!July 1993 Doc: IEEE P /94a. Power Management. The importance of Power Management provisions in the MAC. By: Wim Diepstraten NCR.

Communication Networks 629. IEEE Standards and Developments

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS

Measuring the service level in the 2.4 GHz ISM band

PERFORMANCE ANALYSIS OF THE IEEE BASED ECG MONITORING NETWORK

Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90):

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Can I add a VoIP call?

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Enhanced TXOP scheme for efficiency improvement of WLAN IEEE e

Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks

Burglarproof WEP Protocol on Wireless Infrastructure

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Introduction VOIP in an Network VOIP 3

CS698T Wireless Networks: Principles and Practice

Rolf Leutert. Network Expert & Trainer Leutert NetServices Switzerland. Analyzing WLAN Roaming Problems Leutert NetServices

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

WildPackets Guide to Wireless LAN Analysis

II. IEEE802.11e EDCA OVERVIEW

Your Wireless Network has No Clothes

Transcription:

802.11 MAC Entity: MAC Basic Access Mechanism Privacy and Access Control 1 802.11 Protocol Entities LLC MAC MAC Sublayer MAC Layer Management Station Management PHY PLCP Sublayer PHY Layer Management PMD Sublayer 2 1 1

Main Requirements Single MAC to support multiple PHYs. Support single and multiple channel PHYs. and PHYs with different Medium Sense characteristics Should allow overlap of multiple networks in the same area and channel space. Need to be able to share the medium. Allow re-use of the same medium. Need to be Robust for Interference. Microwave interferers Other un-licensed spectrum users Co-channel interference Need mechanisms to deal with Hidden Nodes. Need provisions for Time Bounded Services. Need provisions for Privacy and Access Control. 3 Basic Access Protocol Features Use Distributed Coordination Function (DCF) for efficient medium sharing without overlap restrictions. Use CSMA with Collision Avoidance derivative. Based on Carrier Sense function in PHY called Clear Channel Assessment (CCA). Robust for interference. CSMA/CA + ACK for unicast frames, with MAC level recovery. CSMA/CA for Broadcast frames. Parameterized use of RTS / CTS to provide a Virtual Carrier Sense function to protect against Hidden Nodes. Duration information is distributed by both transmitter and receiver through separate RTS and CTS Control Frames. Includes fragmentation to cope with different PHY characteristics. Frame formats to support the access scheme For Infrastructure and Ad-Hoc Network support and Wireless Distribution System. 4 2 2

CSMA/CA Explained Free access when medium is free longer than DIFS DIFS Busy Medium DIFS PIFS SIFS Contention Window Backoff-Window Next Frame Slot time Defer Access Select Slot and Decrement Backoff as long as medium is idle. Reduce collision probability where mostly needed. Stations are waiting for medium to become free. Select Random Backoff after a Defer, resolving contention to avoid collisions. Efficient Backoff algorithm stable at high loads. Exponential Backoff window increases for retransmissions. Backoff timer elapses only when medium is idle. Implement different fixed priority levels. To allow immediate responses and PCF coexistence. 5 CSMA/CA + ACK protocol DIFS Src Data SIFS Dest Other Defer Access Ack DIFS Contention Window Next MPDU Backoff after Defer Defer access based on Carrier Sense. CCA from PHY and Virtual Carrier Sense state. Direct access when medium is sensed free longer then DIFS, otherwise defer and backoff. Receiver of directed frames to return an ACK immediately when CRC correct. When no ACK received then retransmit frame after a random backoff (up to maximum limit). 6 3 3

Throughput Efficiency 200 180 160 140 120 100 80 60 40 20 0 0.05 0.25 Throughput as function of Load 23 usec Slot time 576 Byte frames 60% Short, 40% Long frames 64 Byte Frames 0.45 0.65 0.85 1.05 1.25 1.45 1.65 1.85 2.05 2.25 2.45 2.65 2.85 3.05 Load as function of channel speed Efficient and stable throughput. Stable throughput at overload conditions. To support Bursty Traffic characteristics. 7 Hidden Node Problem Transmitters contending for the medium may not Hear each other as shown below. STA RTS AP CTS Data RTS-Range CTS-Range Ack STA AP Stations do not hear each other But they hear the AP. STA Separate Control frame exchange (RTS / CTS) between transmitter and receiver will Reserve the Medium for subsequent data access. Duration is distributed around both Tx and Rx station. 8 4 4

Hidden Node Provisions DIFS Src RTS Data Dest CTS Ack CW Other NAV(RTS) NAV(CTS) Defer Access Next MPDU Backoff after Defer Duration field in RTS and CTS frames distribute Medium Reservation information which is stored in a Net Allocation Vector (NAV). Defer on either NAV or "CCA" indicating Medium Busy. Use of RTS / CTS is optional but must be implemented. Use is controlled by a RTS_Threshold parameter per station. To limit overhead for short frames. 9 RTS/CTS Overhead Impact 200 200 180 180 160 160 140 140 120 120 100 100 80 80 60 60 40 40 20 20 0 0 0.05 0.05 0.25 0.25 0.45 0.45 0.65 0.65 RTS/CTS RTS/CTS Throughput Throughput 60% Short, 40% Long Frames Plain Plain CSMA/CA CSMA/CA 0.85 0.85 1.05 1.05 1.25 1.25 1.45 1.45 1.65 1.65 1.85 1.85 2.05 2.05 2.25 2.25 Load Load As As factor factor of of channel channel speed speed RTS/CTS RTS/CTS 2.45 2.45 2.65 2.65 Mixed Mixed Good mixed Throughput (long inbound frames) efficiency. 2.85 2.85 3.05 3.05 10 5 5

Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function (PCF) on a DCF Foundation. PCF can provide lower transfer delay variations to support Time Bounded Services. Async Data, Voice or mixed implementations possible. Point Coordinator resides in AP. Coexistence between Contention and optional Contention Free does not burden the implementation. 11 Contention Free operation CFP repetition interval PCF Defers for Busy Medium CFP repetition interval Contention Free Period PCF (Optional) Contention Period DCF Busy medium CF-Burst Variable Length "Reset NAV" PCF Defer Async traffic Defer NAV Alternating Contention Free and Contention operation under PCF control. NAV prevents Contention traffic until reset by the last PCF transfer. So variable length Contention Free period per interval. Both PCF and DCF defer to each other causing PCF Burst start variations. 12 6 6

PCF Burst CFP repetition interval Contention Free Burst Busy Medium PIFS D1 SIFS U1 D2 D3 D4 U2 No Up U4 Contention Period CF_End Dx = AP-Frame Ux = Station-Frame Reset NAV NAV Min Contention Period CF-Burst by Polling bit in CF-Down frame. Immediate response by Station on a CF_Poll. Stations to maintain NAV to protect CF-traffic. Responses can be variable length. Reset NAV by last (CF_End) frame from AP. "ACK Previous Frame" bit in Header. 13 Fragmentation DIFS PIFS Other NAV (RTS) NAV (Fragment 0) SIFS Backoff-Window NAV (CTS) NAV (ACK 0) Src RTS SIFS Fragment 0 Fragment 1 Dest CTS ACK 0 ACK 1 Burst of Fragments which are individually acknowledged. For Unicast frames only. Random backoff and retransmission of failing fragment when no ACK is returned. Duration information in data fragments and Ack frames causes NAV to be set, for medium reservation mechanism. 14 7 7

Frame Formats Bytes: Frame Control 2 2 6 6 6 2 6 0-2312 4 Duration ID Sequence Addr 1 Addr 2 Addr 3 Addr 4 Control 802.11 MAC Header Frame Body Bits: 2 2 4 1 1 1 1 1 1 1 1 CRC Protocol Version Type SubType To DS From DS More Frag Retry Pwr Mgt More Data WEP Rsvd Frame Control Field MAC Header format differs per Type: Control Frames (several fields are omitted) Management Frames Data Frames Includes Sequence Control Field for filtering of duplicate caused by ACK mechanism. 15 Address Field Description To DS From DS Address 1 Address 2 Address 3 Address 4 0 0 DA SA BSSID N/A 0 1 DA BSSID SA N/A 1 0 BSSID SA DA N/A 1 1 RA TA DA SA Addr 1 = All stations filter on this address. Addr 2 = Transmitter Address (TA) Identifies transmitter to address the ACK frame to. Addr 3 = Dependent on To and From DS bits. Addr 4 = Only needed to identify the original source of WDS (Wireless Distribution System) frames. 16 8 8

Privacy and Access Control Goal of 802.11 is to provide Wired Equivalent Privacy (WEP) Usable worldwide 802.11 provides for an Authentication mechanism To aid in access control. Has provisions for OPEN, Shared Key or proprietary authentication extensions. Optional (WEP) Privacy mechanism defined by 802.11. Limited for Station-to-Station traffic, so not end to end.» Embedded in the MAC entity. Only implements Confidentiality function. Uses RC4 PRNG algorithm based on:» a 40 bit secret key (No Key distribution standardized)» and a 24 bit IV that is send with the data.» includes an ICV to allow integrity check. Only payload of Data frames are encrypted.» Encryption on per MPDU basis. 17 Privacy Mechanism Secret Key IV Secret Key Plaintext Integrity Alg WEP PRNG + IV Ciphertext ICV TX IV Ciphertext ICV WEP PRNG Plaintext + Integrity Alg ICV'=ICV? Preamble PLCP Header MAC Header Payload CRC Encrypted IV (4) K-ID Cyphertext ICV (4) WEP bit in Frame Control Field indicates WEP used. Each frame can have a new IV, or IV can be reused for a limited time. If integrity check fails then frame is ACKed but discarded. 18 9 9

Support for Mobility LLC MAC PHY MAC Sublayer PLCP Sublayer PMD Sublayer MAC Layer Management PHY Layer Management Station Management 19 MAC Management Layer Synchronization finding and staying with a WLAN Synchronization functions» TSF Timer, Beacon Generation Power Management sleeping without missing any messages Power Management functions» periodic sleep, frame buffering, Traffic Indication Map Association and Reassociation Joining a network Roaming, moving from one AP to another Scanning Management Information Base 20 10 10

Synchronization in 802.11 Timing Synchronization Function (TSF) Used for Power Management Beacons sent at well known intervals All station timers in BSS are synchronized Used for Point Coordination Timing TSF Timer used to predict start of Contention Free burst Used for Hop Timing for FH PHY TSF Timer used to time Dwell Interval All Stations are synchronized, so they hop at same time. 21 Synchronization Approach All stations maintain a local timer. Timing Synchronization Function keeps timers from all stations in synch AP controls timing in infrastructure networks distributed function for Independent BSS Timing conveyed by periodic Beacon transmissions Beacons contain Timestamp for the entire BSS Timestamp from Beacons used to calibrate local clocks not required to hear every Beacon to stay in synch Beacons contain other management information» also used for Power Management, Roaming 22 11 11

Infrastructure Beacon Generation Beacon Interval "Actual time" stamp in Beacon Time Axis X X X X Beacon Busy Medium APs send Beacons in infrastructure networks. Beacons scheduled at Beacon Interval. Transmission may be delayed by CSMA deferral. subsequent transmissions at expected Beacon Interval not relative to last Beacon transmission next Beacon sent at Target Beacon Transmission Time Timestamp contains timer value at transmit time. 23 Power Management Mobile devices are battery powered. Power Management is important for mobility. Current LAN protocols assume stations are always ready to receive. Idle receive state dominates LAN adapter power consumption over time. How can we power off during idle periods, yet maintain an active session? 802.11 Power Management Protocol: allows transceiver to be off as much as possible is transparent to existing protocols is flexible to support different applications» possible to trade off throughput for battery life 24 12 12

Power Management Approach Allow idle stations to go to sleep station s power save mode stored in AP APs buffer packets for sleeping stations. AP announces which stations have frames buffered Traffic Indication Map (TIM) sent with every Beacon Power Saving stations wake up periodically listen for Beacons TSF assures AP and Power Save stations are synchronized stations will wake up to hear a Beacon TSF timer keeps running when stations are sleeping synchronization allows extreme low power operation Independent BSS also have Power Management similar in concept, distributed approach 25 Infrastructure Power Management TIM Time-axis AP activity TIM-Interval DTIM interval Busy Medium TIM DTIM TIM TIM DTIM Broadcast Broadcast Broadcast frames are also buffered in AP. all broadcasts/multicasts are buffered broadcasts/multicasts are only sent after DTIM DTIM interval is a multiple of TIM interval 26 13 13

Infrastructure Power Management TIM Time-axis AP activity TIM-Interval DTIM interval Busy Medium TIM DTIM TIM TIM DTIM Broadcast Broadcast PS Station Broadcast frames are also buffered in AP. all broadcasts/multicasts are buffered broadcasts/multicasts are only sent after DTIM DTIM interval is a multiple of TIM interval Stations wake up prior to an expected (D)TIM. 27 Infrastructure Power Management TIM Time-axis AP activity TIM-Interval DTIM interval Busy Medium TIM DTIM TIM TIM DTIM Broadcast Broadcast PS Station PS-Poll Tx operation Broadcast frames are also buffered in AP. all broadcasts/multicasts are buffered broadcasts/multicasts are only sent after DTIM DTIM interval is a multiple of TIM interval Stations wake up prior to an expected (D)TIM. If TIM indicates frame buffered station sends PS-Poll and stays awake to receive data else station sleeps again 28 14 14

Wireless LAN Infrastructure Network Access Point B Station 1 Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Each Station is Associated with a particular AP Stations 1, 2, and 3 are associated with Access Point A Stations 4 and 5 are associated with Access Point B Stations 6 and 7 are associated with Access Point C 29 Roaming Access Point B Station 1 Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Mobile stations may move 30 15 15

Roaming Access Point B Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 1 Station 7 Mobile stations may move beyond the coverage area of their Access Point 31 Roaming Access Point B Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Station 1 Mobile stations may move beyond the coverage area of their Access Point but within range of another Access Point 32 16 16

Roaming Access Point B Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Mobile stations may move Station 1 beyond the coverage area of their Access Point but within range of another Access Point Reassociation allows station to continue operation 33 Roaming Approach Station decides that link to its current AP is poor Station uses scanning function to find another AP or uses information from previous scans Station sends Reassociation Request to new AP If Reassociation Response is successful then station has roamed to the new AP else station scans for another AP If AP accepts Reassociation Request AP indicates Reassociation to the Distribution System Distribution System information is updated normally old AP is notified through Distribution System 34 17 17

Scanning Scanning required for many functions. finding and joining a network finding a new AP while roaming initializing an Independent BSS (ad hoc) network 802.11 MAC uses a common mechanism for all PHY. single or multi channel passive or active scanning Passive Scanning Find networks simply by listening for Beacons Active Scanning On each channel» Send a Probe, Wait for a Probe Response Beacon or Probe Response contains information necessary to join new network. 35 Active Scanning Example Steps to Association: Station sends Probe. Access Point A Access Point C Initial connection to an Access Point 36 18 18

Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Initial connection to an Access Point 37 Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Initial connection to an Access Point 38 19 19

Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Station sends Association Request to selected AP. Initial connection to an Access Point 39 Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Station sends Association Request to selected AP. AP sends Association Response. Initial connection to an Access Point 40 20 20

Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Station sends Association Request to selected AP. AP sends Association Response. Initial connection to an Access Point - ReAssociation follows a similar process 41 MAC Management Frames Beacon Timestamp, Beacon Interval, Capabilities, ESSID, Supported Rates, parameters Traffic Indication Map Probe ESSID, Capabilities, Supported Rates Probe Response Timestamp, Beacon Interval, Capabilities, ESSID, Supported Rates, parameters same for Beacon except for TIM Association Request Capability, Listen Interval, ESSID, Supported Rates Association Response Capability, Status Code, Station ID, Supported Rates 42 21 21

More MAC Management Frames Reassociation Request Capability, Listen Interval, ESSID, Supported Rates, Current AP Address Reassociation Response Capability, Status Code, Station ID, Supported Rates Disassociation Reason code Authentication Algorithm, Sequence, Status, Challenge Text Deauthentication Reason 43 802.11 MAC the end 44 22 22