CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
Wireless Networks
Wireless Components
Devices
Wireless
Access
point
Wireless
Bridge
Wireless
Client
Infastructure
Broadcast span
Defined
by
broadcast
domain
IEEE 802.11b networks
IEEE 802.11 - Wireless
• IEEE 802.11a. 802.11a deals with communications available in the 5GHz frequency, and
has a maximum data rate of 54 Mbps.
• IEEE 802.11b. 802.11b, or Wi-Fi, is the standard that is most commonly used in wireless
LAN communications. It has a maximum bandwidth of 11Mbps, at a frequency of
2.4GHz.
• IEEE 802.11g. 802.11g is a proposed standard that hopes to provide 54Mbps maximum
bandwidth over a 2.4GHz connection, the same frequency as the popular 802.11b
standard.
• IEEE 802.11c. 802.11c is a group set up to deal with bridging operations when
developing access points.
• IEEE 802.11f. 802.11f is concerned with standardising access point roaming which is
involved in making sure that interoperability between access points is guaranteed
IEEE 802.11b
Operating Channels:
11 for N. America, 14 Japan, 13 Europe (ETSI), 2 Spain, 4 France
Operating Frequency:
2.412-2.462 GHz (North America), 2.412-2.484 GHz (Japan), 2.412-2.472 GHz (Europe ETSI), 2.457-2.462
GHz (Spain), 2.457-2.472 GHz (France)
Data Rate:
1, 2, 5.5 or 11Mbps
Media Access Protocol:
CSMA/CA, 802.11 Compliant
Range:
11Mbps: 140m (460 feet)
5.5Mbps: 200m (656 feet)
2Mbps: 270m (885 feet)
1Mbps: 400m (1311 feet)
RF Technology:
Direct Sequence Spread Spectrum
Modulation:
CCK (11Mps, 5.5Mbps), DQPSK (2Mbps), DBPSK (1Mbps)
Maximum bandwidth (IEEE 802.11b)
11Mbps
5.5Mbps
2Mbps
1Mbps
400m300m200m100m
Max bandwidth
CCK
DQPSK
DBPSK
Available
bandwidth
Distance
CCK
CCK - Complementary Code Keying
DQPSK - differential quadrature phase
shift keying
BPSK - biphase shift keying
Maximum bandwidth (IEEE 802.11b)
11Mbps
5.5Mbps
2Mbps
1Mbps
400m300m200m100m
Max bandwidth
Actual maximum
bandwidth
Maximum bandwidth (IEEE 802.11b)
10Mbps8Mbps4Mbps2Mbps
Available
throughput
Required
data throughput
2Mbps
6Mbps
8Mbps
Linear increase in
actual throughput
against required
throughput
More collisions
and errors are
occurring, thus
data frames are
being deleted, causing
wasted bandwidth.
Too many errors
causes the
TCP window
to close, and reduce
throughput.
IEEE 802.11g networks
54Mbps
24Mbps
2Mbps
1Mbps
400m300m200m100m
64-QAM
QPSK
DBPSK
Available
bandwidth
Distance
16-QAM
QAM – Quadrature Amplitude Modulation
CCK - Complementary Code Keying
DQPSK - differential quadrature phase
shift keying
BPSK - biphase shift keying
802.11g
Mbps Modulation
6 BPSK
9 BPSK
12 QPSK
18 QPSK
24 16-QAM
36 16-QAM
48 64-QAM
54 64-QAM
Netperf on a 11g link
Windows IP Configuration
Ethernet adapter Wireless Network Connection 3:
Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : 192.168.1.100
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
C:>netperf -H 192.168.1.101 -p 1001
TCP STREAM TEST to 192.168.1.101
Recv Send Send
Socket Socket Message Elapsed
Size Size Size Time Throughput
bytes bytes bytes secs. 10^6bits/sec
8192 8192 8192 10.00 9.60
C:>netperf -H 192.168.1.101 -p 1001
TCP STREAM TEST to 192.168.1.101
Recv Send Send
Socket Socket Message Elapsed
Size Size Size Time Throughput
bytes bytes bytes secs. 10^6bits/sec
8192 8192 8192 10.00 7.60
c:>netperf -H 192.168.1.101 -p 1001
TCP STREAM TEST to 192.168.1.101
Recv Send Send
Socket Socket Message Elapsed
Size Size Size Time Throughput
bytes bytes bytes secs. 10^6bits/sec
8192 8192 8192 10.00 7.60
IEEE 802.11g example
IEEE 802.11g example
IEEE 802.11n
802.11n
802.11n
Frequency: 2.4 GHz or 5 GHz
Max: 540 Mbit/s
Range: Same as 11b
MIMO (Multiple-in, multiple-out)
Sends information on two or more antennas. These signals
then reflect off objects, creating multiple paths creating multiple
paths. Normally these cause interference and fading, but with
MIMO they carry different information, which are recombined
on the receiving side.
802.11n
MIMO
IEEE 802.11 networks
CSMA/CA and PCF
IEEE 802.11 can use two mechanisms for shared access:
• CSMA/CA. CSMA/CA is, like standard Ethernet (IEEE 802.3) a contention-based protocol,
but uses collision avoidance rather than collision detection. It would be impossible to use
collision detection as a radio wave is always either sending or receiving and can never do
both at the same time. The nodes will thus not be able to listen on the channel while they
are transmitting.
• Point Coordination Function (PCF). This is an optional priority-based protocol, which
provides contention-free frame transfer for transmission of time-critical data, such as real-
time video or audio. With this, the point coordinator (PC) operates in the wireless access
point and identifies the devices which are allowed to transmit at any given time. Each PC
then, with the contention-free (CF) period, the PC polls each of the enabled PCF to
determine if they wish to transmit data frames. No other device is allowed to transmit
while a another node is being polled. Thus, PCF will be contention-free and enables devices
to transmit data frames synchronously, with defined time delays between data frame
transmissions.
CSMA/CD
1
Listen for no activity
ACK
2
2
ACK
time-out
• Node has gone.
• Data frame has collided
with another
• Data frame corrupted
with noise.
IEEE 802.11 data frameFrame
control
Duration/
ID
Address
1
Address
2
Address
3
Sequence
control
Address
4
Frame
body
FCS
2 Bytes 2 6 6 6 2 6 0-2312 4
Frame control. This contains control information.
Duration/ID. This contains information on how long the data frame will
last.
Address fields. This contains different types of address, such as an
individual address of group addresses. The two main types of group
addresses are broadcast and multicast.
Sequence control. This identifies the sequence number of the data
frames, and allows the recipient to check for missing or duplicate data
frames.
Frame body. This part contains the actual data. The maximum
amount is 2312 bytes, but most implementations use up to 1500
bytes.
FCS (Frame Check Sequence). This is a strong error detection code.
Frame
control
Duration/
ID
Address
1
Address
2
Address
3
Sequence
control
Address
4
Frame
body
FCS
2 Bytes 2 6 6 6 2 6 0-2312 4
IEEE 802.11 networks
e0 (or fa0)
dot11radio0
(or d0)
bvi 1 port is used
to configure both ports
with the same address
# config t
(config)# int bvi1
(config-if)# ip address 192.168.0.1 255.255.255.0
(config-if)# exit
Antenna
connector
con
Root
Repeater
# config t
(config)# int dot11radio0
(config-if)# station role root
(config-if)# station role repeater
(config-if)# end
Fixed network
Root
Repeater
# config t
(config)# ip default-gateway 192.168.1.254
(config)# exit
Fixed network
Channel Frequency
Channel. If an ad-hoc network is used, then the nodes which
communicate must use the same channel.
channel 1—2412
channel 2—2417
channel 3—2422
channel 4—2427
channel 5—2432
channel 6—2437
channel 7—2442
channel 8—2447
channel 9—2452
channel 10—2457
channel 11—2462
channel 12—2467
channel 13—2472
channel 14—2484
1 6
11
1
11
6
Channel FrequencyChannel. If an ad-hoc network is used, then the nodes which
communicate must use the same channel.
1 6
11
1
11
6
channel 1—2412
channel 2—2417
channel 3—2422
channel 4—2427
channel 5—2432
channel 6—2437
channel 7—2442
channel 8—2447
channel 9—2452
channel 10—2457
channel 11—2462
channel 12—2467
channel 13—2472
channel 14—2484
(config)# int dot11radio0
(config-if)# channel 7
(config-if)# no shutdown
(config)# int fa0
(config-if)# no shutdown
Fragmentation threshold
Fragmentation threshold. This can be used to split large data frames into
smaller fragments. The value can range from 64 to 1500 bytes. This is
used to improve the efficiency when there is a high amount of traffic on
the wireless network, as smaller frames make more efficient usage of the
network.
Data packets are split into 1500 byte data frames (MTU)
The large data frames may
allow nodes to ‘hog’ the airwave
Fragmentation threshold
Fragmentation threshold. This can be used to split large data frames into
smaller fragments. The value can range from 64 to 1500 bytes. This is
used to improve the efficiency when there is a high amount of traffic on
the wireless network, as smaller frames make more efficient usage of the
network.
Data frames are fragmented into smaller frames
Possibly allows for a smoother and fairer
transmission.
Network settings
Fragmentation threshold. This can be used to split large data frames into
smaller fragments. The value can range from 64 to 1500 bytes. This is
used to improve the efficiency when there is a high amount of traffic on
the wireless network, as smaller frames make more efficient usage of the
network.
Data frames are fragmented into smaller frames
Possibly allows for a smoother and fairer
transmission.
# config t
(config)# int dot11radio0
(config-if)# fragment-threshold ?
<256-2346>
(config-if)# fragment-threshold 700
(config-if)# end
Infrastructure or ad-hocNetwork type. This can either be set to an infrastructure network (which
use access points, or wireless hubs) or Ad-hoc, which allows nodes to
interconnect without the need for an access point.
Infrastructure
Ad-hoc
Infrastructure or ad-hoc
Infrastructure
Ad-hoc
SSID
defines the
connected nodes
SSID
defines the
connected nodes
Infrastructure or ad-hoc
Infrastructure
Ad-hoc
SSID
defines the
connected nodes
SSID
defines the
connected nodes
# config t
(config-if)# dot11 ssid fred
(config-ssid)# guest-mode
(config-ssid)# exit
(config)# int dot11radio0
(config-if)# ssid fred
(config-if-ssid)# end
Span of network
LL
L
Network settings
Authentication algorithm. This sets whether the adapter to use an open
system (where other nodes can listen to the communications), or uses
encryption (using either a WEP key, or a shared key).
# config t
(config)# dot11 ssid fred
(config-ssid)# authentication ?
client LEAP client information
key-management key management
network-eap leap method
open open method
shared shared method
(config-ssid)# authentication open
(config-ssid)# exit
(config)# exit
Authentication is
a key issue, and
will be covered later
in the module. At
present the authentication
is open, so that any user
and device can connect
without authenticating itself.
Other Factors
Network settingsPreamble mode. This can either be set to Long (which is the default) or
short. A long preamble allows for interoperatively with 1Mbps and 2Mbps
DSSS specifications. The shorter allows for faster operations (as the
preamble is kept to a minimum) and can be used where the transmission
parameters must be maximized, and that there are no interoperatablity
problems.
Preamble – this is sent
before the start of the data
transmission so that nodes
can detect that it is about to transmit.
Network settingsPreamble mode. This can either be set to Long (which is the default) or
short. A long preamble allows for interoperatively with 1Mbps and 2Mbps
DSSS specifications. The shorter allows for faster operations (as the
preamble is kept to a minimum) and can be used where the transmission
parameters must be maximized, and that there are no interoperatablity
problems.
Preamble – this is sent
before the start of the data
transmission so that nodes
can detect that it is about to transmit.
# config t
(config)# int dot11radio0
(config-if)# preamble-short
(config-if)# end
Hidden node problem
The hidden node problem
occurs when two nodes transmit
to an access point, but they are not
in communication range, thus their
signals can collide, and cause errors.
These nodes cannot
hear each other.
Network settings (cont.)
RTS/CTS threshold. The RTS Threshold prevents the Hidden Node
problem, where two wireless nodes are within range of the same access
point, but are not within range of each other. As they do not know that
they both exist on the network, they may try to communicate with the
access point at the same time. When they do, their data frames may
collide when arriving simultaneously at the Access Point, which causes a
loss of data frames from the nodes. The RTS threshold tries to overcome
this by enabling the handshaking signals of Ready To Send (RTS) and Clear
To Send (CTS). When a node wishes to communicate with the access
point it sends a RTS signal to the access point. Once the access point
defines that it can then communicate, the access point sends a CTS
message. The node can then send its data.
Hidden node problem
RTS (Ready To
Send)
RTS (Ready To
Send)
CTS (Clear To
Send)
Data transmitted
RTS
CTS
Data
CTS
Data
RTS
Hidden node problem
RTS (Ready To
Send)
RTS (Ready To
Send)
CTS (Clear To
Send)
Data transmitted
RTS threshold
RTS threshold determines the data frame size that is required, in order for it
send an RTS to the WAP. The default value is 4000.
# config t
(config)# int dot11radio0
(config-if)# rts threshold 8000
(config-if)# end
Hidden node problem
RTS (Ready To
Send)
RTS (Ready To
Send)
CTS (Clear To
Send)
Data transmitted
RTS retries
RTS Retries defines the number of times that an access point will transmit
an RTS before it stops sending the data frame. Values range from 1 to 128.
# config t
(config)# int dot11radio0
(config-if)# rts retries 10
(config-if)# end
Power management
The power of the access point and also
of the client are important as they will
define the coverage of the signal, and must
also be within the required safety limits.
The higher the
transmitting power,
the wider the coverage.
Power management
The power of the access point and also
of the client are important as they will
define the coverage of the signal, and must
also be within the required safety limits.
The higher the
transmitting power,
the wider the coverage.
# config t
(config)# int dot11radio0
(config-if)# power ?
(config-if)# power local ?
(config-if)# power local 30
(config-if)# power client 10
(config-if)# speed ?
(config-if)# speed 1.0
(config-if)# exit
(config)# exit
[1.0]
[11.0]
[2.0] [5.5]
[basic-1.0]
[basic-11.0]
[basic-2.0]
[basic-5.5]
| range |
throughput
Power managementPower saving modes:
CAM (Constant awake mode). Used when power
usage is not a problem.
PSP (Power save mode). Power is conserved
as much as possible. The card will typically go
to sleep, and will only be awoken by the access
point, or if there is activity.
FastPSP (Fast power save mode). This uses
both CAM and PSP, and is a compromise between
the two.
Maximum bandwidth (IEEE 802.11b)11Mbps
5.5Mbps
2Mbps
1Mbps
400m300m200m100m
Max bandwidth
CCK
DQPSK
DBPSK
(config)# int dot11radio0
(config-if)# speed 1.0
(config-if)# exit
(config)# exit
Maximum associations
A particular problem in wireless networks
is that the access point may become
overburdened with connected clients...
... this could be due to an attack, such as
DoS (Denial of Service), or due to poor
planning.
Maximum associations
For example:
Max bandwidth = 25Mbps
Av rate = 0.5Mbps
Max. associations = 50
Maximum associations
A particular problem in wireless networks
is that the access point may become
overburdened with connected clients...
... this could be due to an attack, such as
DoS (Denial of Service), or due to poor
planning.
# config t
(config)# dot11 ssid fred
(config-ssid)# max ?
<1-255> association limit
(config-ssid)# max 100
(config-ssid)# exit
(config)# int dot11radio0
(config-if)# ssid fred
(config)# exit
# show dot11 association
# show dot11 statistics client-traffic
# show dot11 adjacent-ap
CSN08704
Data, Audio, Video and Images
http://asecuritysite.com/comms
Telecommunications
Prof Bill Buchanan
Wireless Networks

More Related Content

PPTX
Telecommunications: Introduction to Wireless Networks
PDF
Gigabit wifi 802.11 ac in depth_peter thornycroft
PPTX
Introduction To Cellular And Wireless Networks
PDF
Evaluating the Effect of Channel Bonding on Throughput in 802.11n
PPT
Evolution Of Telecommunication
PPT
Spread spectrum modulation
PPT
Module 2-lte architecture and protocol
Telecommunications: Introduction to Wireless Networks
Gigabit wifi 802.11 ac in depth_peter thornycroft
Introduction To Cellular And Wireless Networks
Evaluating the Effect of Channel Bonding on Throughput in 802.11n
Evolution Of Telecommunication
Spread spectrum modulation
Module 2-lte architecture and protocol

What's hot (20)

PPTX
PPT
Public Switched Telephone Network (PSTN)
PDF
Introduction to networking
PPTX
Transmission Media
PPTX
Lecture 3 spread spectrum
PDF
ZigBee module
PDF
Ccna Wireless Study Guide
PPTX
802.11n Technology - Presented by Meru Networks and DTC
DOCX
Mobile communication - GSM/CDMA/WIMAX Technologies
PPTX
A pragmatic approach to Extended Spectrum DOCSIS: November 2020
PDF
Ccna Wireless Study Guide
PPT
How PSTN phone works?
PPT
TDMA, FDMA, CDMA
PPT
Bb manual
PDF
Wireless LAN and bluetooth technology
PPTX
PPTX
IS-95 Cdma
PPT
Umts(3g)
PPT
PPT of Communications Systems
Public Switched Telephone Network (PSTN)
Introduction to networking
Transmission Media
Lecture 3 spread spectrum
ZigBee module
Ccna Wireless Study Guide
802.11n Technology - Presented by Meru Networks and DTC
Mobile communication - GSM/CDMA/WIMAX Technologies
A pragmatic approach to Extended Spectrum DOCSIS: November 2020
Ccna Wireless Study Guide
How PSTN phone works?
TDMA, FDMA, CDMA
Bb manual
Wireless LAN and bluetooth technology
IS-95 Cdma
Umts(3g)
PPT of Communications Systems
Ad

Viewers also liked (8)

PDF
E pmp article epmp configuration in a frequency reuse deployment
PDF
Tutorial mikrotik step by step anung muhandanu
PDF
(Mikrotik)MTCNA presentation Material-IDN
PPTX
MikroTik MTCNA
PDF
MikroTik Firewall : Securing your Router with Port Knocking
PDF
Mikrotik Network Simulator (MUM Presentation Material 2013)
PPT
CCNA TCP/IP
PPT
CCNA IP Addressing
E pmp article epmp configuration in a frequency reuse deployment
Tutorial mikrotik step by step anung muhandanu
(Mikrotik)MTCNA presentation Material-IDN
MikroTik MTCNA
MikroTik Firewall : Securing your Router with Port Knocking
Mikrotik Network Simulator (MUM Presentation Material 2013)
CCNA TCP/IP
CCNA IP Addressing
Ad

Similar to Telecommunications: Wireless Networks (20)

PDF
WiFi Networks.pdf
PPTX
Introduction to wireless LANs ASU FE.pptx
PPT
wireless lan presentation.ppt
PPTX
UNIT - IV - MAC SUB LAYER AND NETWORK LAYER (2).pptx
PDF
ieee.pdf
PPT
3. Introduction Wireless Local Area Networks.ppt
PPT
3. Wireless Local Area Networks WLAN.ppt
PDF
IT8602 Mobile Communication - Unit III
PPT
Wireless & Mobile Networks Mobility Management Principles
PPTX
Wireless LANs(IEEE802.11) Architecture
PDF
Tutorial on IEEE 802.11 - MAC Protocols and Frames
PDF
80211
PPT
wifi network
PPT
Wi fi copy
PPTX
iMinds' course: preceding exercises
PPT
Wireless Networking and telecom technolo
PPT
Wireless Networks types and its structure.ppt
PPT
Wireless presentation-1
PDF
WiFi - IEEE 802.11
PPTX
computer network wifi...................
WiFi Networks.pdf
Introduction to wireless LANs ASU FE.pptx
wireless lan presentation.ppt
UNIT - IV - MAC SUB LAYER AND NETWORK LAYER (2).pptx
ieee.pdf
3. Introduction Wireless Local Area Networks.ppt
3. Wireless Local Area Networks WLAN.ppt
IT8602 Mobile Communication - Unit III
Wireless & Mobile Networks Mobility Management Principles
Wireless LANs(IEEE802.11) Architecture
Tutorial on IEEE 802.11 - MAC Protocols and Frames
80211
wifi network
Wi fi copy
iMinds' course: preceding exercises
Wireless Networking and telecom technolo
Wireless Networks types and its structure.ppt
Wireless presentation-1
WiFi - IEEE 802.11
computer network wifi...................

More from Napier University (20)

PDF
Intrusion Detection Systems
PPTX
PPTX
Memory, Big Data and SIEM
PPTX
What is Cyber Data?
PPTX
Open Source Intelligence
PDF
10. Data to Information: NumPy and Pandas
PDF
2. Defence Systems
PDF
1. Cyber and Intelligence
PPTX
The Road Ahead for Ripple, Marjan Delatinne
PDF
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
PPTX
ARTiFACTS, Emma Boswood
PPTX
RMIT Blockchain Innovation Hub, Chris Berg
PPTX
Keynote, Naseem Naqvi
PPT
Browser-based Crypto M, C. F Mondschein
PPTX
Should we transform or adapt to blockchain - a public sector perspective?, Al...
PPTX
IoT device attestation system using blockchain, Alistair Duke
PPTX
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
PDF
Using Blockchain for Evidence Purpose, Rafael Prabucki
PPTX
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
PPTX
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra
Intrusion Detection Systems
Memory, Big Data and SIEM
What is Cyber Data?
Open Source Intelligence
10. Data to Information: NumPy and Pandas
2. Defence Systems
1. Cyber and Intelligence
The Road Ahead for Ripple, Marjan Delatinne
Delivering The Tel Aviv Stock Exchange Securities, Duncan Johnston-Watt
ARTiFACTS, Emma Boswood
RMIT Blockchain Innovation Hub, Chris Berg
Keynote, Naseem Naqvi
Browser-based Crypto M, C. F Mondschein
Should we transform or adapt to blockchain - a public sector perspective?, Al...
IoT device attestation system using blockchain, Alistair Duke
Robust Programming of Smart Contracts in Solidity+, RK Shyamasundar
Using Blockchain for Evidence Purpose, Rafael Prabucki
Cryptocurrencies and cyberlaundering- the need for regulation, Gian Marco Bov...
Emerging Regulatory Approaches to Blockchain-based Token Economy, Agata Fereirra

Recently uploaded (20)

PDF
Complications of Minimal Access-Surgery.pdf
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Module on health assessment of CHN. pptx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
semiconductor packaging in vlsi design fab
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
Complications of Minimal Access-Surgery.pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
Journal of Dental Science - UDMY (2021).pdf
Literature_Review_methods_ BRACU_MKT426 course material
English Textual Question & Ans (12th Class).pdf
Computer Architecture Input Output Memory.pptx
What’s under the hood: Parsing standardized learning content for AI
Journal of Dental Science - UDMY (2020).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
Module on health assessment of CHN. pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
semiconductor packaging in vlsi design fab
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
B.Sc. DS Unit 2 Software Engineering.pptx

Telecommunications: Wireless Networks

  • 1. CSN08704 Data, Audio, Video and Images http://asecuritysite.com/comms Telecommunications Prof Bill Buchanan Wireless Networks
  • 7. IEEE 802.11 - Wireless • IEEE 802.11a. 802.11a deals with communications available in the 5GHz frequency, and has a maximum data rate of 54 Mbps. • IEEE 802.11b. 802.11b, or Wi-Fi, is the standard that is most commonly used in wireless LAN communications. It has a maximum bandwidth of 11Mbps, at a frequency of 2.4GHz. • IEEE 802.11g. 802.11g is a proposed standard that hopes to provide 54Mbps maximum bandwidth over a 2.4GHz connection, the same frequency as the popular 802.11b standard. • IEEE 802.11c. 802.11c is a group set up to deal with bridging operations when developing access points. • IEEE 802.11f. 802.11f is concerned with standardising access point roaming which is involved in making sure that interoperability between access points is guaranteed
  • 8. IEEE 802.11b Operating Channels: 11 for N. America, 14 Japan, 13 Europe (ETSI), 2 Spain, 4 France Operating Frequency: 2.412-2.462 GHz (North America), 2.412-2.484 GHz (Japan), 2.412-2.472 GHz (Europe ETSI), 2.457-2.462 GHz (Spain), 2.457-2.472 GHz (France) Data Rate: 1, 2, 5.5 or 11Mbps Media Access Protocol: CSMA/CA, 802.11 Compliant Range: 11Mbps: 140m (460 feet) 5.5Mbps: 200m (656 feet) 2Mbps: 270m (885 feet) 1Mbps: 400m (1311 feet) RF Technology: Direct Sequence Spread Spectrum Modulation: CCK (11Mps, 5.5Mbps), DQPSK (2Mbps), DBPSK (1Mbps)
  • 9. Maximum bandwidth (IEEE 802.11b) 11Mbps 5.5Mbps 2Mbps 1Mbps 400m300m200m100m Max bandwidth CCK DQPSK DBPSK Available bandwidth Distance CCK CCK - Complementary Code Keying DQPSK - differential quadrature phase shift keying BPSK - biphase shift keying
  • 10. Maximum bandwidth (IEEE 802.11b) 11Mbps 5.5Mbps 2Mbps 1Mbps 400m300m200m100m Max bandwidth Actual maximum bandwidth
  • 11. Maximum bandwidth (IEEE 802.11b) 10Mbps8Mbps4Mbps2Mbps Available throughput Required data throughput 2Mbps 6Mbps 8Mbps Linear increase in actual throughput against required throughput More collisions and errors are occurring, thus data frames are being deleted, causing wasted bandwidth. Too many errors causes the TCP window to close, and reduce throughput.
  • 13. 54Mbps 24Mbps 2Mbps 1Mbps 400m300m200m100m 64-QAM QPSK DBPSK Available bandwidth Distance 16-QAM QAM – Quadrature Amplitude Modulation CCK - Complementary Code Keying DQPSK - differential quadrature phase shift keying BPSK - biphase shift keying 802.11g Mbps Modulation 6 BPSK 9 BPSK 12 QPSK 18 QPSK 24 16-QAM 36 16-QAM 48 64-QAM 54 64-QAM
  • 14. Netperf on a 11g link
  • 15. Windows IP Configuration Ethernet adapter Wireless Network Connection 3: Connection-specific DNS Suffix . : IP Address. . . . . . . . . . . . : 192.168.1.100 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.1.1 C:>netperf -H 192.168.1.101 -p 1001 TCP STREAM TEST to 192.168.1.101 Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 8192 8192 8192 10.00 9.60 C:>netperf -H 192.168.1.101 -p 1001 TCP STREAM TEST to 192.168.1.101 Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 8192 8192 8192 10.00 7.60 c:>netperf -H 192.168.1.101 -p 1001 TCP STREAM TEST to 192.168.1.101 Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 8192 8192 8192 10.00 7.60
  • 19. 802.11n 802.11n Frequency: 2.4 GHz or 5 GHz Max: 540 Mbit/s Range: Same as 11b MIMO (Multiple-in, multiple-out) Sends information on two or more antennas. These signals then reflect off objects, creating multiple paths creating multiple paths. Normally these cause interference and fading, but with MIMO they carry different information, which are recombined on the receiving side.
  • 21. MIMO
  • 23. CSMA/CA and PCF IEEE 802.11 can use two mechanisms for shared access: • CSMA/CA. CSMA/CA is, like standard Ethernet (IEEE 802.3) a contention-based protocol, but uses collision avoidance rather than collision detection. It would be impossible to use collision detection as a radio wave is always either sending or receiving and can never do both at the same time. The nodes will thus not be able to listen on the channel while they are transmitting. • Point Coordination Function (PCF). This is an optional priority-based protocol, which provides contention-free frame transfer for transmission of time-critical data, such as real- time video or audio. With this, the point coordinator (PC) operates in the wireless access point and identifies the devices which are allowed to transmit at any given time. Each PC then, with the contention-free (CF) period, the PC polls each of the enabled PCF to determine if they wish to transmit data frames. No other device is allowed to transmit while a another node is being polled. Thus, PCF will be contention-free and enables devices to transmit data frames synchronously, with defined time delays between data frame transmissions.
  • 24. CSMA/CD 1 Listen for no activity ACK 2 2 ACK time-out • Node has gone. • Data frame has collided with another • Data frame corrupted with noise.
  • 25. IEEE 802.11 data frameFrame control Duration/ ID Address 1 Address 2 Address 3 Sequence control Address 4 Frame body FCS 2 Bytes 2 6 6 6 2 6 0-2312 4 Frame control. This contains control information. Duration/ID. This contains information on how long the data frame will last. Address fields. This contains different types of address, such as an individual address of group addresses. The two main types of group addresses are broadcast and multicast. Sequence control. This identifies the sequence number of the data frames, and allows the recipient to check for missing or duplicate data frames. Frame body. This part contains the actual data. The maximum amount is 2312 bytes, but most implementations use up to 1500 bytes. FCS (Frame Check Sequence). This is a strong error detection code.
  • 28. e0 (or fa0) dot11radio0 (or d0) bvi 1 port is used to configure both ports with the same address # config t (config)# int bvi1 (config-if)# ip address 192.168.0.1 255.255.255.0 (config-if)# exit Antenna connector con
  • 29. Root Repeater # config t (config)# int dot11radio0 (config-if)# station role root (config-if)# station role repeater (config-if)# end Fixed network
  • 30. Root Repeater # config t (config)# ip default-gateway 192.168.1.254 (config)# exit Fixed network
  • 31. Channel Frequency Channel. If an ad-hoc network is used, then the nodes which communicate must use the same channel. channel 1—2412 channel 2—2417 channel 3—2422 channel 4—2427 channel 5—2432 channel 6—2437 channel 7—2442 channel 8—2447 channel 9—2452 channel 10—2457 channel 11—2462 channel 12—2467 channel 13—2472 channel 14—2484 1 6 11 1 11 6
  • 32. Channel FrequencyChannel. If an ad-hoc network is used, then the nodes which communicate must use the same channel. 1 6 11 1 11 6 channel 1—2412 channel 2—2417 channel 3—2422 channel 4—2427 channel 5—2432 channel 6—2437 channel 7—2442 channel 8—2447 channel 9—2452 channel 10—2457 channel 11—2462 channel 12—2467 channel 13—2472 channel 14—2484 (config)# int dot11radio0 (config-if)# channel 7 (config-if)# no shutdown (config)# int fa0 (config-if)# no shutdown
  • 33. Fragmentation threshold Fragmentation threshold. This can be used to split large data frames into smaller fragments. The value can range from 64 to 1500 bytes. This is used to improve the efficiency when there is a high amount of traffic on the wireless network, as smaller frames make more efficient usage of the network. Data packets are split into 1500 byte data frames (MTU) The large data frames may allow nodes to ‘hog’ the airwave
  • 34. Fragmentation threshold Fragmentation threshold. This can be used to split large data frames into smaller fragments. The value can range from 64 to 1500 bytes. This is used to improve the efficiency when there is a high amount of traffic on the wireless network, as smaller frames make more efficient usage of the network. Data frames are fragmented into smaller frames Possibly allows for a smoother and fairer transmission.
  • 35. Network settings Fragmentation threshold. This can be used to split large data frames into smaller fragments. The value can range from 64 to 1500 bytes. This is used to improve the efficiency when there is a high amount of traffic on the wireless network, as smaller frames make more efficient usage of the network. Data frames are fragmented into smaller frames Possibly allows for a smoother and fairer transmission. # config t (config)# int dot11radio0 (config-if)# fragment-threshold ? <256-2346> (config-if)# fragment-threshold 700 (config-if)# end
  • 36. Infrastructure or ad-hocNetwork type. This can either be set to an infrastructure network (which use access points, or wireless hubs) or Ad-hoc, which allows nodes to interconnect without the need for an access point. Infrastructure Ad-hoc
  • 37. Infrastructure or ad-hoc Infrastructure Ad-hoc SSID defines the connected nodes SSID defines the connected nodes
  • 38. Infrastructure or ad-hoc Infrastructure Ad-hoc SSID defines the connected nodes SSID defines the connected nodes # config t (config-if)# dot11 ssid fred (config-ssid)# guest-mode (config-ssid)# exit (config)# int dot11radio0 (config-if)# ssid fred (config-if-ssid)# end
  • 40. Network settings Authentication algorithm. This sets whether the adapter to use an open system (where other nodes can listen to the communications), or uses encryption (using either a WEP key, or a shared key). # config t (config)# dot11 ssid fred (config-ssid)# authentication ? client LEAP client information key-management key management network-eap leap method open open method shared shared method (config-ssid)# authentication open (config-ssid)# exit (config)# exit Authentication is a key issue, and will be covered later in the module. At present the authentication is open, so that any user and device can connect without authenticating itself.
  • 42. Network settingsPreamble mode. This can either be set to Long (which is the default) or short. A long preamble allows for interoperatively with 1Mbps and 2Mbps DSSS specifications. The shorter allows for faster operations (as the preamble is kept to a minimum) and can be used where the transmission parameters must be maximized, and that there are no interoperatablity problems. Preamble – this is sent before the start of the data transmission so that nodes can detect that it is about to transmit.
  • 43. Network settingsPreamble mode. This can either be set to Long (which is the default) or short. A long preamble allows for interoperatively with 1Mbps and 2Mbps DSSS specifications. The shorter allows for faster operations (as the preamble is kept to a minimum) and can be used where the transmission parameters must be maximized, and that there are no interoperatablity problems. Preamble – this is sent before the start of the data transmission so that nodes can detect that it is about to transmit. # config t (config)# int dot11radio0 (config-if)# preamble-short (config-if)# end
  • 44. Hidden node problem The hidden node problem occurs when two nodes transmit to an access point, but they are not in communication range, thus their signals can collide, and cause errors. These nodes cannot hear each other.
  • 45. Network settings (cont.) RTS/CTS threshold. The RTS Threshold prevents the Hidden Node problem, where two wireless nodes are within range of the same access point, but are not within range of each other. As they do not know that they both exist on the network, they may try to communicate with the access point at the same time. When they do, their data frames may collide when arriving simultaneously at the Access Point, which causes a loss of data frames from the nodes. The RTS threshold tries to overcome this by enabling the handshaking signals of Ready To Send (RTS) and Clear To Send (CTS). When a node wishes to communicate with the access point it sends a RTS signal to the access point. Once the access point defines that it can then communicate, the access point sends a CTS message. The node can then send its data.
  • 46. Hidden node problem RTS (Ready To Send) RTS (Ready To Send) CTS (Clear To Send) Data transmitted
  • 48. Hidden node problem RTS (Ready To Send) RTS (Ready To Send) CTS (Clear To Send) Data transmitted RTS threshold RTS threshold determines the data frame size that is required, in order for it send an RTS to the WAP. The default value is 4000. # config t (config)# int dot11radio0 (config-if)# rts threshold 8000 (config-if)# end
  • 49. Hidden node problem RTS (Ready To Send) RTS (Ready To Send) CTS (Clear To Send) Data transmitted RTS retries RTS Retries defines the number of times that an access point will transmit an RTS before it stops sending the data frame. Values range from 1 to 128. # config t (config)# int dot11radio0 (config-if)# rts retries 10 (config-if)# end
  • 50. Power management The power of the access point and also of the client are important as they will define the coverage of the signal, and must also be within the required safety limits. The higher the transmitting power, the wider the coverage.
  • 51. Power management The power of the access point and also of the client are important as they will define the coverage of the signal, and must also be within the required safety limits. The higher the transmitting power, the wider the coverage. # config t (config)# int dot11radio0 (config-if)# power ? (config-if)# power local ? (config-if)# power local 30 (config-if)# power client 10 (config-if)# speed ? (config-if)# speed 1.0 (config-if)# exit (config)# exit [1.0] [11.0] [2.0] [5.5] [basic-1.0] [basic-11.0] [basic-2.0] [basic-5.5] | range | throughput
  • 52. Power managementPower saving modes: CAM (Constant awake mode). Used when power usage is not a problem. PSP (Power save mode). Power is conserved as much as possible. The card will typically go to sleep, and will only be awoken by the access point, or if there is activity. FastPSP (Fast power save mode). This uses both CAM and PSP, and is a compromise between the two.
  • 53. Maximum bandwidth (IEEE 802.11b)11Mbps 5.5Mbps 2Mbps 1Mbps 400m300m200m100m Max bandwidth CCK DQPSK DBPSK (config)# int dot11radio0 (config-if)# speed 1.0 (config-if)# exit (config)# exit
  • 54. Maximum associations A particular problem in wireless networks is that the access point may become overburdened with connected clients... ... this could be due to an attack, such as DoS (Denial of Service), or due to poor planning.
  • 55. Maximum associations For example: Max bandwidth = 25Mbps Av rate = 0.5Mbps Max. associations = 50
  • 56. Maximum associations A particular problem in wireless networks is that the access point may become overburdened with connected clients... ... this could be due to an attack, such as DoS (Denial of Service), or due to poor planning. # config t (config)# dot11 ssid fred (config-ssid)# max ? <1-255> association limit (config-ssid)# max 100 (config-ssid)# exit (config)# int dot11radio0 (config-if)# ssid fred (config)# exit # show dot11 association # show dot11 statistics client-traffic # show dot11 adjacent-ap
  • 57. CSN08704 Data, Audio, Video and Images http://asecuritysite.com/comms Telecommunications Prof Bill Buchanan Wireless Networks