Wireless Network
Wireless Network
Wireless Network
by
Ananth Ravindran
Assistant Professor
UNIT I
TW
EC
20 43
W IR
EL
OR
KS
Ananth.R
EC
20 43
W IR
ALTERNATIVES
EL
ES S
NE
TW
OR
Ananth.R
KS
c.
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
communication is limited.
TW
OR
KS
Ananth.R
Major Types
TW
Frequency division multiple access (FDMA)
EC
20 43
W IR
EL
ES S
NE
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
A guardband is a narrow frequency band between adjacent frequency channels to avoid interference from the adjacent channels
KS
Ananth.R
EC
20 43
W IR
BT ->
total spectrum allocation, BGUARD -> the guard band BC -> the channel bandwidth
EL
ES S
NE
TW
OR
Ananth.R
KS
The number of channels that can be simultaneously supported in a FDMA system is given by
Key Features
EC
20 43
W IR
EL
kHz)
ES S
NE
TW
OR
KS
Ananth.R
De Merits
It need to use costly bandpass filters to eliminate spurious radiation at the base station.
EC
20 43
The FDMA mobile unit uses duplexers since both the transmitter and receiver operate at the same time. This results in an increase in the cost of FDMA subscriber units and base stations.
W IR
EL
ES S
NE
TW
OR
FDMA systems are costlier because of the single channel per carrier design,
KS
EC
20 43
W IR
EL
OR
KS
Ananth.R
W IR
EL
ES S
NE
OR
Ananth.R
KS
TDMA vs FDMA
TW EC 20 43
Visit www.agniece.blog.com for further details
W IR
EL
ES S
NE
OR
TDMA
KS
FDMA
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
TDMA shares a single carrier frequency with several overlapping time slots
Adaptive equalization is usually necessary in TDMA systems, since the transmission rates are generally very high as compared to FDMA channels
Visit www.agniece.blog.com for further details Ananth.R
EC
20 43
W IR
EL
reception
ES S
NE
TW
OR
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
Frame Structure
TW EC 20 43
Visit www.agniece.blog.com for further details
W IR
EL
ES S
NE
OR
Ananth.R
KS
The preamble contains the address and base station and the subscribers use to Trial bits specify the start of a data. about the data transfer. Guard Bits are used for data isolation.
Visit www.agniece.blog.com for further details Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Efficiency of TDMA
TW
The efficiency of a TDMA system is a measure of the percentage of transmitted data that overhead for the access scheme contains information as opposed to providing
EC
20 43
W IR
EL
ES S
NE
OR
KS
Ananth.R
EC
20 43
where b0H no over head bits per frame br - no of overhead bits per bp - no overhead bits per preamble in each slot bg - no equivalent bits in each guard time interval Nr - reference bursts per frame, Nt- traffic bursts per frame
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
EC
20 43
W IR
EL
ES S
NE
TW
bT = T f R
OR
Ananth.R
KS
EC
20 43
channel
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
EC
carrier frequencies
Visit www.agniece.blog.com for further details Ananth.R
20 43
W IR
EL
ES S
NE
OR
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
The chip rate of the pseudo-noise code is much more than message signal.
EL
ES S
NE
TW
OR
KS
Ananth.R
Message
EC
20 43
W IR
EL
PN sequence
ES S
NE
TW
OR
Ananth.R
KS
EC
20 43
W IR
EL
ES S
NE
others.
TW
OR
KS
All the users use the same carrier frequency and may
Ananth.R
Multipath fading may be substantially reduced Channel data rates are very high in CDMA systems
EC
20 43
W IR
EL
ES S
NE
CDMA
supports
Soft
handoff
TW
OR
KS
Ananth.R
In CDMA, the power of multiple users at a receiver In CDMA, stronger received signal levels raise the
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
EC
20 43
W IR
EL
ES S
TW
OR
Ananth.R
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
ALOHA protocol
Visit www.agniece.blog.com for further details Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Basic Concept
arrives from the upper layers of the protocol stack.
The BS checks the parity of the received packet. If the parity checks properly, the BS sends a short acknowledgment packet to the MS.
Visit www.agniece.blog.com for further details Ananth.R
EC
20 43
W IR
EL
ES S
transmitted.
NE
TW
OR
KS
Collision
a possibility of collisions between packets.
After sending a packet the user waits a length of time more than the round-trip delay for an acknowledgment from the receiver.
collision, and it is transmitted again with a randomly selected delay to avoid repeated collisions.
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Pure ALOHA
TW EC 20 43
Visit www.agniece.blog.com for further details
W IR
EL
ES S
NE
OR
Ananth.R
KS
Merits :
Its has low throughput under heavy load conditions. The maximum throughput of the pure ALOHA is 18 percent.
EC
20 43
W IR
EL
De-Merits:
ES S
NE
TW
OR
KS
Ananth.R
Slotted ALOHA
The subscribers have synchronized clocks and each user will be synchronized with the BS clock. The user message packet is buffered and transmitted only at the beginning of a new time slot. This prevents partial collisions.
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
Application;
voice communication is carried out by slotted ALOHA.
Even though the throughput is higher than pure ALOHA it is still low for communication needs.
Visit www.agniece.blog.com for further details Ananth.R
20 43
W IR
EL
De-Merit;
ES S
present day wireless
EC
NE
TW
OR
KS
Reservation ALOHA
Reservation ALOHA is the combination of slotted ALOHA and time division multiplexing.
packets.
EC
better throughput.
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
This allows each time slot to carry either voice or data, where voice is given priority.
NE
TW
PRMA is a method for transmitting a variable mixture of voice packets and data packets.
OR
KS
Ananth.R
EC
20 43
Terminals can send two types of information, referred to as periodic and random.
W IR
EL
ES S
NE
Only the user terminal that reserved the slot can use a reserved slot.
TW
OR
KS
The transmission format in PRMA is organized into frames, each containing a fixed number of time slots.
Reservation ;
EC
The reservation status is reverted when the terminal sends nothing in that frame
Visit www.agniece.blog.com for further details Ananth.R
20 43
W IR
EL
After completion of transmission the base station grants the sending terminal a reservation for exclusive use of the same time slot in the next frame.
ES S
NE
TW
OR
A terminal having periodic information to send starts transmitting in contention for the next available time slot.
KS
EC
20 43
W IR
EL
Techniques
ES S
NE
TW
OR
KS
Ananth.R
De-Merits of ALOHA
EC
20 43
retransmission process.
W IR
2. Efficiency
is
reduced
EL
ES S
NE
TW
the
OR
KS
collision
and
Ananth.R
If there is another user transmitting on the channel, it is obvious that a terminal should delay the transmission of the packet.
packet without any restrictions. The CSMA protocol reduces the packet collision significantly
EC
20 43
W IR
OR
In this each terminal will monitor the status of the channel before
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
EC
a mobile terminal.
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
two packets.
W IR
EL
poised to send, the latter user will sense an idle channel and
ES S
NE
TW
OR
KS
Ananth.R
EC
where tp -> propagation time in seconds, Rb -> channel bit rate m -> expected number of bits in a data packet
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
2. 1-PERSISTENT CSMA The terminal senses the channel and waits for transmission until it finds the channel idle. As soon as the channel is idle, the terminal transmits its message with probability one. 3. p-PERSISTENT CSMA When a channel is found to be idle, the packet is transmitted with probability p . It may or may not be immediate.
EC
20 43
W IR
EL
ES S
NE
KS
Ananth.R
EC
20 43
area. So it may not know when the channel is idle. For this the BS
W IR
EL
ES S
NE
5.
TW
OR
KS
EC
20 43
6. Busy tone multiple access (BTMA)- this is a special type of technique where the system bandwidth is divided into message channel and busy channel. Whenever a terminal sends data through message channel it will also transmits a busy-tone in busy channel. If another terminal senses the busy channel it will understand that the message channel is busy and it will also turns its busy tone. This acts as an alarm for other terminals.
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
Handoff
TW
Process of transferring a moving active user from one base station to another without disrupting the call.
EC
20 43
W IR
EL
ES S
NE
OR
KS
Ananth.R
Handoff Strategies
1. 2. 3. 4. 5. 6. 7. 8. Ist generation handoff MAHO (Mobile Assisted HandOff) Inter system handoff Guard channel concept Queuing Umbrella approach Soft and hard handoff Cell dragging.
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
Ist generation handoff In this almost all the work were carried out by MSC with the help of Base Station.
EC
20 43
W IR
EL
ES S
Using the Locator Receiver the MSC will measure the signal strength of the moving mobile.
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Queuing If more number of users request handoff the they will be placed in queue before allotting channels
EC
20 43
W IR
EL
ES S
NE
while roaming
TW
OR
KS
Ananth.R
Umbrella approach
In urban areas the cell size will be very small and high
EC
20 43
W IR
EL
ES S
NE
successful handoff.
TW
OR
KS
Umbrella approach
TW EC 20 43
Visit www.agniece.blog.com for further details
W IR
EL
ES S
NE
OR
Ananth.R
KS
Cell dragging
Cell dragging occurs in an urban environment when there is a line-of-sight (LOS) radio path between the pedestrian subscriber and the base station. Even after the user has traveled well beyond the designed range of the cell, the received signal at the base station does not decay rapidly resulting in Cell Dragging
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
W IR
EL
ES S
PRIVACY
NE
TW
KS
Ananth.R
Analog techniques are extremely easy to tap. Digital systems such as TDMA and CDMA are much Wireless security harder to tap. unauthorized
W IR
20 43
is
EL
ES S
necessary or damage
NE
TW
to prevent to
OR
KS
the
access
computers
EC
Access point (AP)-> is the central point (like a hub) that creates a basic service set to bridge a number of STAs from the wireless network to other existing networks.
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
network:
KS
http://en.wikipedia.org/wiki/Wireless_security
Visit www.agniece.blog.com for further details
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
1. Accidental association
Violation of security perimeter of corporate network unintentionally.
when a cyber criminal runs some software that makes his/her wireless network card look like a legitimate access point. attacks on the wired network, or plant Trojans
Visit www.agniece.blog.com for further details Ananth.R
EC
20 43
W IR
These types of laptops are known as soft APs and are created
EL
ES S
NE
TW
2. Malicious association
OR
KS
3. Ad-hoc networks
between wireless computers that do not have an access point little protection, encryption methods can be used to provide
EC
20 43
W IR
Non-traditional
networks
EL
4. Non-traditional networks
ES S
such
security.
NE
TW
OR
KS
as
personal
Ananth.R
offering a steady flow of traffic through the transparent hacking computer to the real network
Visit www.agniece.blog.com for further details Ananth.R
EC
20 43
W IR
EL
ES S
6. Man-in-the-middle attacks
NE
TW
OR
KS
7. Denial of service
attacker continually bombards a targeted Access
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
8. Network injection
EC
20 43
W IR
intelligent hubs.
EL
commands
that
affect
ES S
NE
network traffic.
TW
OR
KS
EL
ES S
NE
TW
Address Resolution and the message
20 43
key
EC
W IR
authentication
OR
KS
WEP.
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
EC
20 43
W IR
EL
ES S
Defense Mechanisms
NE
TW
OR
Ananth.R
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
EC
20 43
W IR
data protection.
EL
ES S
NE
TW
OR
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS
Authentication
OR W IR EL ES S NE TW
Ananth.R
Access Point.
2. The Access Point replies with a clear-text challenge. 3. The client encrypts the challenge-text using the configured WEP key, and sends it back in another authentication request. 4. The Access Point decrypts the response. If this matches positive reply.
Visit www.agniece.blog.com for further details
EC
20 43
KS
Dis Advantages
The same traffic key must never be used twice. In August 2001, Scott Fluhrer, But a 24-bit IV is not long enough to ensure this on a busy network.
TW
Itsik
OR
KS
Mantin, and
EC
20 43
W IR
Using a passive attack they were able to recover the RC4key after
EL
ES S
NE
Adi
packets.
EC
20 43
W IR
EL
WEP.
ES S
NE
OR
KS
W IR
EL
ES S
NE
OR
Ananth.R
KS
TKIP
TW
encryption key that must be manually entered on
EC
20 43
W IR
EL
ES S
NE
OR
KS
(MIC)
Visit www.agniece.blog.com for further details Ananth.R
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
EC
20 43
Ohigashi-Morii attack Japanese researchers Toshihiro Ohigashi and Masakatu Morii reported a simpler and faster implementation of a similar attack. It utilizes a similar attack method, but uses a man-in-the-middle attack
W IR
EL
ES S
NE
TW
OR
KS
Ananth.R
WPA 2
original WPA technology on all certified Wi-Fi hardware
EC
20 43
W IR
EL
ES S
since 2006.
NE
TW
OR
KS
Ananth.R
1. WPA2-Personal2. WPA2-Enterprisethrough
protects
TW
W IR
EL
network access by utilizing a set-up password verifies network users WPA2 is backward
EC
20 43
server.
ES S
NE
OR
unauthorized
Ananth.R
KS
EC
20 43
W IR
EL
ES S
NE
TW
OR
Ananth.R
KS