版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1、IEEE 802.11 Overview,Rong-Hong Jan Dept of Computer and Information Science National Chiao Tung University,802.11 Technologies:Past, Present and Future,Approved and near-term 802.11 Letter Standards,Faster: Standards-based Wi-Fi now delivers data rates up to 54 Mbps to Wi-Fi clients. (11a,11g) Bette
2、r-performing: The need for a better-performing MAC has been driven by demanding application such as voice and video. Quality of Service enhancements have modified the MAC to provide admission control and prioritized channel access. (11e),More secure: Security enhancements have been developed to addr
3、ess access control and authentication and data privacy and integrity, driven by the market requirement for enterprise-level security in wireless LANs. (11i) Broader applicability: Regulatory enhancements that broaden the applicability of 802.11 to other frequencies such as 4.9 GHz in Japan and other
4、 regulatory domains. (11j),Physical Layer enhancements 11a,11b,11g Quality of Service (QoS) enhancements 11e Security enhancements 11i WPA Regulatory enhancements 11d 11h,Future 802.11 Standards,802.11j The 802.11j Task Group is working on Japanese regulatory extensions to allow for operation in the
5、 4.9 GHz and 5GHz bands in Japan. This is expected to be approved in 2005. 802.11k 802.11k is focused on standardizing the radio measurements that will allow uniform measurement of radio information across different manufacturer platforms.,By having standardized, repeatable measurements, system desi
6、gners can utilize radio environment information to make better decisions as to frequency use, transmit power levels, etc. 802.11n The 802.11n Task Group is focusing on creating a standard to further increase the net throughput of wireless networks. The goal is to achieve greater than 150 Mbps usable
7、 throughput over an 802.11.,Both physical and MAC layer changes are being considered, but backward compatibility is required. 802.11r The 802.11r Task Group is working on reducing the handoff latency when client devices transition between access points or cells in an ESS. This standard will facilita
8、te the deployment of SIP-based Voice over Wi-Fi (VoWi-Fi) portable phones.,802.11s The 802.11s Task Group is working on an infrastructure mesh standard to allow 802.11 access points or cells from multiple manufacturers to self-configure into multi-hop wireless topologies. Example usage scenarios for
9、 mesh networks include interconnectivity for devices in the digital home, unwired campuses, and community area networks or hotzones.,Standards Evolution of 802.11,Standards Evolution of 802.11,無線區(qū)域網(wǎng)路課程內(nèi)容安排 -大綱(I),課程大綱 無線網(wǎng)路的概觀與802.11無線區(qū)域網(wǎng)路(Overview) 802.11的媒體擷取控制(MAC)與訊框格式 802.11e : QoS of 802.11 802
10、.11的安全 : WEP與 802.11i 802.11的管理機制 競爭與非競爭的媒體控制機制,無線區(qū)域網(wǎng)路課程內(nèi)容安排 -大綱(II),實體層的簡介 802.11f IAPP (Inter Access Points Protocol) 802.11 網(wǎng)路佈建與管理 網(wǎng)路分析與效能調(diào)整 802.11隨意無線區(qū)域網(wǎng)路路由方法,無線網(wǎng)路的概觀與802.11無線區(qū)域網(wǎng)路(Overview),Wireless vs wired Bluetooth, 802.11, GSM, GPRS, UTML Wireless Mobility - Security 802.11 serials Infrastr
11、ucture Ad hoc,Types of Networks,Independent networks (indep. basic service set, IBSS), also known as ad hoc networks. Infrastructure networks,Two advantages for infrastructure networks The mobile stations need not to maintain neighbor relationships. Access points assist with stations attempting to s
12、ave power. In an infrastructure network, stations must associate with an AP to obtain network services. (equivalent to plug in the network cable) An extended service set (ESS) is created by chaining BSSs together with a backbone network.,802.11的媒體擷取控制(MAC)與訊框格式,MAC accessing modes CSMA/CA & NAV Inte
13、r-frame spaces DCF operation/ Backoff Fragmentation & De-fragmentation Frame Format RTS/CTS & Power Saving sequence,802.11 adapts Ethernet-style networking to radio links. Ethernet CSMA/CD 802.11 CSMA/CA Challenges for the MAC RF link quality: 802.11b uses unlicensed ISM bands as its radio link. It
14、must assume that interference will exist and work around it.,ACK is required.,MAC Access Modes,Distributed coordination function (DCF): Ethernet-like. CSMA/CA. DCF may use CTS/RTS to reduce the possibility of collisions. Point coordination function (PCF): Contention-free services. Special stations c
15、alled point coordinators are used to ensure contention-free. The coordinators reside in AP. PCF is only for infrastructure mode and not widely implemented.,Contention-based access using the DCF,Contention-based access using the DCF,Contention-based access using the DCF,Carrier-Sensing Functions and
16、the Network Allocation Vector,Two types of carrier-sensing functions: the physical carrier-sensing and virtual carrier-sensing functions. The virtual carrier-sensing is provided by the Network Allocation Vector (NAV) The NAV is carried in the frame headers on the MAC frames (e.g., RTS, CTS, Beacon,
17、Probe, Association, and so on),Frame Format,Fields are transmitted from left to right, and the most significant bits appear last.,802.11e : QoS of 802.11,Traffic differentiation Hybrid coordination function (HCF) Contention-based channel access EDCF Controlled channel access Direct link protocol (DL
18、P) Burst ACK,802.11的安全 : WEP,802.1X 與 802.11i,WEP operation RC4 encryption algorithm EAP (Extensible Authentication Protocol) 802.1x: Network port authentication 802.1x on wireless LANs,Supplicant,Authenticator,3:EAPOL-Start,Radius,4:Request/Identity,5:Response/Identity,5:Radius-Access-Request,6:Rad
19、ius-Access-Challenge,7:Radius-Access-Request,8:Radius-Access-Accept,9:EAPOL-Key(WEP),8:EAP-Success,7:EAP-Response,6:EAP-Request,EAPOL,RADIUS,1:Association request,2:Association response,802.11,802.11的管理機制,Infrastructure management Scanning:Passive & Active Authentication:Open system & Share-key Asso
20、ciation Re-association IBSS management Time synchronization,Passive Scanning,Passive scanning saves battery power. In passive scanning, a station moves to each channel on the channel list and waits for Beacon frames.,Active Scanning,For each channel in the channel list: Wait for either an indication
21、 of an incoming frame or ProbeDelay Timer to expire. If a frame is detected, the channel can be probed. Send Probe Request. Wait for min or max channel time. (Channel busy or not) Idle min channel time no network Busy max channel time Probe responses are unicast frames subject to ACK.,Choosing which
22、 BSS to join is an implementation-specific decision and may even involve user intervention. Power level, signal strength. Matching parameters Timer synchronization is an important task in the joining process.,Association,Association is recordkeeping procedure that allows the distribution system to t
23、rack the location of each mobile station. After association, an AP must register the MS on the network so frames for the MS are delivered to the AP. How ? (AP may send a gratuitous ARP.) 802.11 forbids associating with more than one AP.,Associated procedure,Association req & rep are unicast frames.
24、(ACK is required),Reassociated procedure,競爭與非競爭的媒體控制機制,PCF vs DCF PCF operation PCF frame format Power saving mode in DCF Power saving mode in PCF,The PCF allows an 802.11 network to provide an enforced “fair” access to the medium. (Likes AP holding the token in a token-based MAC schemes) PCF is an
25、optional part of 802.11 Periods of contention-free service arbitrated by the point coordinator alternate with the DCF-based services.,A cycle Contention free +contention period At the beginning of the contention-free period, the AP transmits a Beacon frame and announces CFPMaxDuration. All stations
26、set NAV to CFP-MD to lock out DCF-based access,實體層的簡介,Physical layer overview Frequency hopping GFSK Direct sequence spectrum Chipping DPSK & QPSK OFDM,802.11f IAPP (Inter Access Points Protocol),IAPP security risks IAPP protocol overview ADD MOVE CACHE-Notify RADIUS protocol usage IAPP frame format
27、,IAPP,IAPP( Inter Access-Point Protocol ) is designed for the enforcement of unique association throughout a ESS ( Extended Service Set ) and for secure exchange of stations security context between current access point(AP) and new AP during handoff period. Based on security level, communication ses
28、sion keys between APs are distributed by a RADIUS server.,Proactive caching,Proactive caching is suggested to avoid long handoff delay caused by IAPP communication between two APs as well as AP and RADIUS server. With proactive caching, current access point distributes the security context of the mo
29、bile station to neighboring access points BEFORE the station actually handoffs.,802.11 網(wǎng)路佈建與管理,The topology archetype Roaming & Mobility Spanning multiple locations Security Project planning The site survey Installation and the final rollout,網(wǎng)路分析與效能調(diào)整,Network analysis Tuning radio management Tuning power management Timing operations,Tuning radio management,Beacon interval Decreasing passive scanning more reliable & faster Increasing Power-saving capability (listen, DTIM intervals) Throughput,802.11隨意無線區(qū)域網(wǎng)路路由方法,MANET Routing in MANET Table-Driven Routing Pr
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 化工產(chǎn)品買賣協(xié)議
- 辦公設備租賃協(xié)議大綱
- 商標買賣合同
- 6S管理規(guī)范方案
- 學校突發(fā)新冠肺炎疫情應急處置預案
- 項目借款合同
- 社會服務崗位雇員合同范本
- 2024至2030年中國煤氣用量自動報表熱線系統(tǒng)行業(yè)投資前景及策略咨詢研究報告
- 施工方案-預制擋板安裝施工方案
- 2024至2030年中國折疊式黑色測徑儀數(shù)據(jù)監(jiān)測研究報告
- 無人機查違技術方案
- 黑臭水體治理技術課件
- 道口開設施工方案
- 護理給藥制度課件
- 學校辦學方向
- 2024年電池行業(yè)培訓資料
- 優(yōu)撫年審標題
- 民辦小學招生方案
- 中班班本課程《你好-小鳥》
- 神經(jīng)外科標準護理的計劃范文
- 2022-2023學年北京市大興區(qū)八年級(上)期中數(shù)學試卷-普通用卷
評論
0/150
提交評論