Upload
sarvani-videla
View
187
Download
2
Tags:
Embed Size (px)
Citation preview
Wireless LAN
================================================================
1. History of Wireless LAN[1]
Norman Abramson, a professor at the University of Hawaii,
developed the world’s first wireless computer communication network,
ALOHAnet (operational in 1971), using low-cost ham-like radios. The
system included seven computers deployed over four islands to
communicate with the central computer on the Oahu Island without using
phone lines.
In 1979, F.R. Gfeller and U. Bapst published a paper in the IEEE Proceedings reporting an
experimental wireless local area network using diffused infrared communications.
In 1980, P. Ferrert reported on an experimental application of a single code spread spectrum
radio for wireless terminal communications in the IEEE National Telecommunications
Conference.
Later on, M. Kavehrad reported on an experimental wireless PBX system using code division
multiple access. These efforts prompted significant industrial activities in the development of
a new generation of wireless local area networks and it updated several old discussions in the
portable and mobile radio industry.
European Telecommunications Standards Institute, ETSI, ratified in1996 with High
Performance Radio LAN (HiperLAN 1) standard. Later, ETSI, rolled out in June 2000, an
flexible Radio LAN standard called HiperLAN 2, designed to provide high speed access
54Mbps than HiperLAN 1(20 Mbps)
The IEEE finalized the initial standard for wireless LANs, IEEE 802.11 in June 1997. This
initial standard specifies a 2.4 GHz operating frequency with data rates of 1 and 2 Mbps.
With this standard, one could choose to use either FHSS or DSSS (two non compatible forms
of spread spectrum modulation).
Because of relatively low data rates (as compared to Ethernet), products based on the initial
standard did not flourish as many had hoped. In late 1999, the IEEE published two supplements to the initial 802.11 standard: 802.11a and 802.11b (Wi-Fi).
The unlicensed PCS Unlicensed Personal Communications Services and the proposed SUPERNet, later on renamed as U-NII, bands also presented new opportunities.
A HomeRF group formed in 1997 to promote a technology aimed for residential use, but it disbanded at the end of 2002
Bluetooth is an industry specification for short-range RF-based connectivity for portable personal devices with its functional specification released out in 1999 by Bluetooth Special Interest Group. Bluetooth communicates on a frequency of 2.45 gigahertz.
In 2009 802.11n was added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a maximum data transfer rate of 300 Mbit/s. Most newer routers are able to utilise both wireless bands, known as dualband. This allows data communications to avoid the crowded
2.4 GHz band, which is also shared with Bluetooth devices and microwave ovens. The 5 GHz band is also wider than the 2.4 GHz band, with more channels.
2. Types of Wireless LANs:
Local area networks can be constructed in wireless fashion mainly so that wireless users
moving within a certain organization, such as a university campus, can access a backbone network.
Wireless LANs are generally categorized according to the transmission technique that is used. All current wireless LAN products fall into one of the following categories:
a) Infrared (IR) LANs
b) Spread spectrum LANs c) Narrowband microwave LANs
a) Infrared LANs[2] :
Infrared communication technology is used in several home devices, such as television
remote controls. Advantages of Infrared LANs[2]
The bandwidth for infrared communication is large and can therefore can achieve high data rates.
IR light is diffusely reflected by light-coloured objects; thus it is possible to use ceiling reflections to achieve coverage of an entire room.
IR light does not penetrate walls or other opaque objects. This has two advantages: - IR communications can be more easily secured against eavesdropping than
microwave - A separate IR installation can be operated in every room in buildings without interference, enabling the construction of very large IR LANs
Equipment for infrared communication is relatively inexpensive and simple.
The one major disadvantage of infrared technology is that background radiation from sunlight and indoor lighting can cause interference at the infrared receivers.
There are three alternative transmission techniques commonly used for IR data transmissions:
Direct beam Configuration
Omni directional Configuration
Diffused Configuration
Direct beam Configuration:[2]
This configuration involves point-to-point connections. The range of communications is limited by the transmitted power and the direction of focus. With proper focusing, ranges up
to a kilometre can be achieved. This technology can be used in token-ring LANs and interconnections between buildings as shown below
Omni directional configuration[2] This configuration consists of a single base station that is normally used on ceilings. The base
station sends an omnidirectional signal, which is picked up by all transceivers. The transceivers in turn use a directional beam focused directly at the base-station unit.
Diffused-Configuration In this the infrared transmitters direct the transmitted signal to a diffused reflected ceiling.
The signal is reflected in all directions from this ceiling. The receivers can then pick up the transmitted signal.
b) Spread-Spectrum LANs[2]
The spread-spectrum techniques use three different frequency bands: 902-928 MHz, 2.4
GHz-2.4835 GHz and 5.725 GHz-5.825GHz. Higher-frequency ranges offer greater
bandwidth capability. However, the higher-frequency equipment is more expensive. The
spread-spectrum LANs makes use of multiple adjacent cells arrangement. Adjacent cells
make use of different centre frequencies within the same band to avoid interference. Within
each of these cells, a star or peer-to-peer topology can be deployed.
If a star topology is used, a hub as a network center is mounted on the ceiling. This hub acts
as an interface between wired and wireless LANs, can be connected to other wired LANs. All
users in the wireless LAN transmit and receive signals from the hub.
A peer to peer topology is one in which there is no hub. A MAC algorithm such as CSMA is
used to control access. This topology is appropriate for ad hoc LANs.
c) Narrowband RF LANs[2]
Narrowband radio frequency LANs use a very narrow bandwidth. These LANs can be either
licensed or unlicensed. In licensed narrowband RF, a licensed authority assigns the radio
frequency band. Most geographic areas are limited to a few licenses. Adjacent cells use
different frequency bands. The transmissions are encrypted to prevent attacks. The licensed
narrowband LANs guarantee communication without interference. The unlicensed
narrowband RF LANs use the unlicensed spectrum and peer-to-peer LAN topology.
3. Wireless LAN Standards
a) IEEE 802.11 Wireless Standard:
802.11 networks use free frequency bands (ISM: Industrial, Science, Medical). Thus everybody can run 802.11 devices without licensing a frequency band.
802.11 Pros and Cons:
Mobility
Flexible configuration
Relatively cheap
Weak security (WEP Wired Equivalent Protection, but fixed with WPA Wired Protection Access)
Relatively low bandwidth for data (compared to wired networks)
Electromagnetic interference with other devices (Bluetooth)
Simple installation, but high skills needed for exploitation of full potential of technology
Different 802.11standards:
802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band) uses OFDM
802.11b: Up to 11Mbps, simple (cheap) technology uses DSSS.
802.11g: Up to 54Mbps and uses OFDM,DSSS
802.11n: <600Mbps (MIMO=Multiple In Multiple Out antenna technology, uses
multi-path transmission for better signal recovery at the receiver) uses OFDM
802.11ac: Forthcoming standard for higher throughput (802.11n enhancements).
802.11ad: Standard in progress, even higher throughput (<7Gpbs).
Operation modes of 802.11: Below picture taken from copyrighted content of Peter. R.
Egli[4]
Each wireless LAN user has a wireless LAN adapter for communication over the wireless
medium. This adapter is responsible for authentication, confidentiality and data delivery. To send data to a user in the wired LAN, a user in the wireless LAN first sends the data packet to the access point. The access point recognizes the wireless user through a unique ID called the
SSID. SSID is like a password protection system that enables any wireless client to join the wireless LAN. Once the wireless user is authenticated, the access point forwards data packets
to the desired wired user through the switch or hub. Access points build a table of association that contains the MAC addresses of all users in the wireless network.
b) HiperLAN 1/2: HiperLAN 1 standard provides highspeed communications (20Mbps)
between portable devices in the 5GHz range. Similar to IEEE802.11, HiperLAN/1 adopts CSMA to connect end user devices together. On top of that, HiperLAN/1 supports isochronous traffic for different type of data such as video, voice, text, etc.
HIPERLAN/2 has a very high transmission rate (up to 54 Mbps at PHY layer) to a variety of networks including 3G mobile core networks, ATM networks and IP based networks, and
also for private use as a wireless LAN system. This is achieved by making use of a modularization method called Orthogonal Frequency Digital Multiplexing (OFDM).
c) Bluetooth: One of the ways Bluetooth devices avoid interfering with other systems is by sending out very weak signals of 1 milliwatt. The low power limits the range of a Bluetooth
device to about 10 meters, cutting the chances of interference between a computer system and a portable telephone or television. Bluetooth operates at 2.4 GHz frequency band and supports data rates of 1 Mbps, with next generation products allowing anywhere from 2 to 12
Mbps, to be determined at a later date.
d) HomeRF: HomeRF is an open industry specification developed by Home Radio Frequency Working Group that defines how electronic devices such as PCs, cordless phones and other peripherals share and communicate voice, data and streaming media in and around
the home. HomeRF-compliant products operate in the license-free 2.4GHz frequency band and utilize frequency-hopping spread spectrum RF technology for secure and robust wireless
communications with data rates of up to 1 Mbps (HomeRF1). Unlike Wi-Fi, HomeRF already has quality-of-service support for streaming media and is the only wireless LAN to integrate voice.
3. Challenges[3] :
The key challenges in wireless networks are:
a) Data Rate Enhancements.
b) Low power networking. c) Security.
d) Radio Signal Interference. e) System Interoperability.
a) Enhancing Data Rate: Improving the current data rates to support future high speed applications is essential, especially, if multimedia service are to be provided. Data rate is a
function of various factors such as the data compression algorithm, interference mitigation through error-resilient coding, power control, and the data transfer protocol. Therefore, it is imperative that manufacturers implement a well thought out design that considers these
factors in order to achieve higher data rates.
b) Low Power Design: The size and battery power limitation of wireless mobile devices place a limit on the range and throughput that can be supported by a wireless LAN. The complexity and hence the power consumption of wireless devices vary significantly
depending on the kind of spread spectrum technology being used to implement the wireless LAN. Normally, direct sequence spread spectrum (DSSS) based implementations require
large and power-hungry hardware compared to frequency hopped spread spectrum (FHSS). They tend to consume about two to three times the power of an equivalent FHSS system. But, the complex circuitry provides better error recovery capability to DSSS systems compared to
FHSS. The right time has come for researchers and developers to approach these issues in wireless LAN technologies together and from a global perspective.
c) Security: Security is a big concern in wireless networking, especially in e-commerce applications. Mobility of users increases the security concerns in a wireless network. Current
wireless networks employ authentication and data encryption techniques on the air interface to provide security to its users. The IEEE 802.11 standard describes wired equivalent privacy
(WEP) that defines a method to authenticate users and encrypt data between the PC card and the wireless LAN access point. In large enterprises, an IP network level security solution
could ensure that the corporate network and proprietary data are safe. Virtual private network (VPN) is an option to make access to fixed access networks reliable. Since hackers are
getting smarter, it is imperative that wireless security features must be updated constantly. d) Radio Signal Interference: Interference can take on an inward or outward direction. A
radio-based LAN, for example, can experience inward interference either from the harmonics of transmitting systems or from other products using similar radio frequencies in the local
area. Microwave ovens operate in the S band (2.4GHz) that many wireless LANs use to transmit and receive. These signals result in delays to the user by either blocking transmissions from stations on the LAN or causing bit errors to occur in data being sent.
Newer products that utilize Bluetooth radio technology also operate in the 2.4GHz band and can cause interference with wireless LANs, especially in fringe areas not well covered by a
particular wireless LAN access point. The other issue, outward interference, occurs when a wireless network’s signal disrupts other systems, such as adjacent wireless LANs and navigation equipment on aircraft.
e) System Interoperability: With wireless LANs, interoperability is taken as a serious issue.
There are still pre-802.11 (proprietary) wireless LANs, both frequency-hopping and direct sequence 802.11 versions, and vendor-specific enhancements to 802.11-compliant products that make interoperability questionable. To ensure interoperability with wireless LANs, it is
best to implement radio cards and access points from the same vendor, if possible. Handoff: Handoff is the mechanism by which an ongoing connection between a Mobi lehost (MH) and a corresponding Access point (AP) is transferred from one access point to the
other. Handoff occurs during cell boundary crossing, weak signal reception and while a QoS deterioration occurs in the current cell. Present handoff mechanisms are based only on signal
strength and do not take into account the load of the new cell. There is no negotiation of QoS characteristics with the new AP to ensure smooth carryover from the old AP to new AP. Now, several methods are proposed by researchers to have a seamless handoff between
access points.
4. Future Research areas:
FutureWLANs must have to mature in the following areas
Higher Speeds
Improved Security
Seamless end-to-end protocols
Better Error control
Long distance Coverage
Better interoperability
Global networking
Anywhere, anytime, any-form connectivity
Mobile Networks
================================================================
1. History of Mobile Networks
You can get very nice information at http://www.indigoo.com/dox/itdp/12_MobileWireless/
2. MANET[5]:
The concept of mobile ad hoc networking is not a new one and its origins can be traced back
to the DARPA Packet Radio Network project in 1972. Infrastructured wireless networks require a fixed network infrastructure with centralised administration is required for their operation, potentially consuming a lot of time and money for set-up and maintenance.
Furthermore, an increasing number of devices such as laptops, personal digital assistants (PDAs), pocket PCs, tablet PCs, smart phones, MP3 players, digital cameras, etc. are
provided with short-range wireless interfaces. In addition, these devices are getting smaller, cheaper, more user friendly and more powerful. This evolution is driving a new alternative way for mobile communication, in which mobile devices form a self creating, self-organising
and self-administering wireless network, called a mobile ad hoc network.
Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other. In order to enable communication between nodes
that are not directly within each other’s send range, intermediate nodes act as routers that relay packets generated by other nodes to their destination. These nodes are often energy constrained— that is, battery-powered— devices with a great diversity in their capabilities.
Furthermore, devices are free to join or leave the network and they may move randomly, possibly resulting in rapid and unpredictable topology changes.
3. Challenges:
MANETs impose challenges in all layers of protocol stack. The physical layer must deal
with rapid changes in link characteristics. The media access control (MAC) layer needs to
allow fair channel access, minimise packet collisions and deal with hidden and exposed
terminals. At the network layer, nodes need to cooperate to calculate paths. The transport
layer must be capable of handling packet loss and delay characteristics that are very different
from wired networks. Applications should be able to handle possible disconnections and
reconnections.
The Key Challenges are:
a) Routing
b) Service or resource discovery
c) Addressing or internet connectivity
d) Security and node co-operation
a) Routing: As mobile ad hoc networks are characterised by a multi-hop network topology
that can change frequently due to mobility, efficient routing protocols are needed to establish
communication paths between nodes, without causing excessive control traffic overhead or
computational burden on the power constrained devices.
A number of proposed solutions attempt to have an up-to-date route to all other nodes at all
times. To this end, these protocols exchange routing control information periodically and on
topological changes. These protocols, which are called proactive routing protocols, are
typically modified versions of traditional link state or distance vector routing protocols
encountered in wired networks, adapted to the specific requirements of the dynamic mobile
ad hoc network environment.
Most of the time, it is not necessary to have an up-to-date route to all other nodes. Therefore,
reactive routing protocols only set up routes to nodes they communicate with and these routes
are kept alive as long as they are needed.
Combinations of proactive and reactive protocols, where nearby routes (for example,
maximum two hops) are kept up-to-date proactively, while far-away routes are set up
reactively, are also possible and fall in the category of hybrid routing protocols.
A completely different approach is taken by the location-based routing protocols, where
packet forwarding is based on the location of a node’s communication partner. Location
information services provide nodes with the location of the others, so that packets can be
forwarded.
b) Service and resource discovery: MANET nodes may have little or no knowledge at all
about the capabilities or services offered by each other. Therefore, service and resource
discovery mechanisms, which allow devices to automatically locate network services and to
advertise their own capabilities to the rest of the network are an important aspect of self-
configurable networks. Possible services or resources include storage, access to databases or
files, printer, computing power, Internet access, etc.
Directory-less service and resource discovery mechanisms, in which nodes reactively request
services when needed and/or nodes proactively announce their services to others, seem an
attractive approach for infrastructureless networks.
The alternative scheme is directory-based and involves directory agents where services are
registered and service requests are handled. This implies that this functionality should be
statically or dynamically assigned to a subset of the nodes and kept up-to-date. Existing
directory-based service and resource discovery mechanisms such as UPnP or Salutation are
unable to deal with the dynamics in ad hoc networks.
Currently, no mature solution exists, but it is clear that the design of these protocols should be
done in close cooperation with the routing protocols and should include context-awareness
(location, neighbourhood, user profile, etc.) to improve performance.
Also, when ad hoc networks are connected to fixed infrastructure (for example, Internet,
cellular network, etc.), protocols and methods are needed to inject the available external
services offered by service and content providers into the ad hoc network.
c) Addressing and Internet connectivity: In order to enable communication between nodes
within the ad hoc network, each node needs an address. In stand-alone ad hoc networks, a
unique MAC addresses could be used to address nodes. However, all current applications are
based on TCP/IP or UDP/IP. In addition, as future mobile ad hoc networks will interact with
IP-based networks and will run applications that use existing Internet protocols such as
transmission control protocol (TCP) and user datagram protocol (UDP), the use of IP
addresses is inevitable.
Unfortunately, an internal address organisation with prefixes and ranges like in the fixed
Internet is hard to maintain in mobile ad hoc networks due to node mobility and overhead
reasons and other solutions for address assignment are thus needed.
One solution is based on the assumption (and restriction) that all MANET nodes already have
a static, globally unique and pre-assigned IPv4 or IPv6 address. This solves the whole issue
of assigning addresses, but introduces new problems when interworking with fixed networks.
Connections coming from and going to the fixed network can be handled using mobile IP,
where the pre-assigned IP address serves as the mobile node’s home address (HoA). All
traffic sent to this IP address will arrive at the node’s home agent (HA) . When the node in
the ad hoc network advertises to its home agent the IP address of the Internet gateway as its
careof- address (CoA), the home agent can tunnel all traffic to the ad hoc network , on which
it is delivered to the mobile node using an ad hoc routing protocol . For outgoing connections,
the mobile node has to route traffic to an Internet gateway, and for internal traffic an ad hoc
routing protocol can be used.
The main problem with this approach is that a MANET node needs an efficient way to figure
out if a certain address is present in the MANET or if it is necessary to use an Internet
gateway, without flooding the entire network.
Another solution is the assignment of random, internally unique addresses. This can be
realised by having each node picking a more or less random address from a very address
detection (DAD) techniques in order to impose address uniqueness within the MANET.
Strong DAD techniques will always detect duplicates, but are difficult to scale in large
networks. Weak DAD approaches can tolerate duplicates as long as they do not interfere with
each other; that is, if packets always arrive at the intended destination. If interconnection to
the Internet is desirable, outgoing connections could be realised using network address
translation (NAT), but incoming connections still remain a problem if random, not globally
routable, addresses are used. Also, the use of NAT remains problematic when multiple
Internet gateways are present. If a MANET node switches to another gateway, a new IP
address is used and ongoing TCP connections will break.
Another possible approach is the assignment of unique addresses that all lie within one subnet
(comparable to the addresses assigned by a dynamic host configuration protocol (DHCP)
server). When attached to the Internet, the ad hoc network can be seen as a separate routable
subnet. This simplifies the decision if a node is inside or outside the ad hoc network.
However, no efficient solutions exist for choosing dynamically an appropriate, externally
routable and unique network prefix (for example, special MANET prefixes assigned to
Internet gateways), handling the merging or splitting of ad hoc networks, handling multiple
points of attachment to the Internet, etc.
The above discussion makes clear that, although many solutions are being investigated, no
common adopted solution for addressing and Internet connectivity is available yet. New
approaches using host identities, where the role of IP is limited to routing and not addressing,
combined with dynamic name spaces, could offer a potential solution.
d) Security and node cooperation: The wireless mobile ad hoc nature of MANETs brings
new security challenges to the network design. As the wireless medium is vulnerable to
eavesdropping and ad hoc network functionality is established through node cooperation,
mobile ad hoc networks are intrinsically exposed to control packets or data packets. Securing
ad hoc networks against malicious attacks is difficult to achieve.
Preventive mechanisms include among others authentication of message sources, data
integrity and protection of message sequencing, and are typically based on key-based
cryptography. Incorporating cryptographic mechanisms is challenging, as there is no
centralised key distribution centre or trusted certification authority. These preventative
mechanisms need to be sustained by detection techniques that can discover attempts to
penetrate or attack the network.
The previous problems were all related to malicious nodes that intentionally damage or
compromise network functionality. However, selfish nodes, which use the network but do not
cooperate to routing or packet forwarding for others in order not to spill battery life or
network bandwidth, constitute an important problem as network functioning entirely relies on
the cooperation between nodes and their contribution to basic network functions.
To deal with these problems, the self-organising network concept must be based on an
incentive for users to collaborate, thereby avoiding selfish behaviour. Existing solutions aim
at detecting and isolating selfish nodes based on watchdog mechanisms, which identify
misbehaving nodes, and reputation systems, which allow nodes to isolate selfish nodes.
Another promising approach is the introduction of a billing system into the network based on
economical models to enforce cooperation. Using virtual currencies or micro-payments,
nodes pay for using other nodes forwarding capabilities or services and are remunerated for
making theirs available. This approach certainly has potential in scenarios in which part of
the ad hoc network and services is deployed by companies or service providers.
Also, when ad hoc networks are interconnected to fixed infrastructures by gateway nodes,
which are billed by a telecom operator (for example, UMTS, hot-spot access, etc.), billing mechanisms are needed to remunerate these nodes for making these services available.
Questions such as who is billing, to whom and for what, need to be answered and will lead to complex business models.
We may conclude that in some ad hoc network scenarios, the network organisation can completely or partially rely on a trust relationship between participating nodes (for example,
PANs). In many others security mechanisms, mechanisms to enforce cooperation between nodes or billing methods are needed and will certainly be an important subject of future research.
[1]en.wikipedia.org/wiki/Wireless_LAN
[2]Wireless Communications and Standards, Second Edition, William Stallings [3]Chandramouli, Vijay. "A detailed study on wireless LAN technologies." URL: h
ttp://crystal. uta. edu/~ kumar/cse6392/termpapers/Vijay_paper. pdf# search='A% 20Detailed% 20St udy% 20on% 20Wireless% 20LAN% 20Technologies (2002).
[4]http://www.indigoo.com/dox/itdp/12_MobileWireless/ [5]Hoebeke, Jeroen, et al. "An overview of mobile ad hoc networks: Applications and
challenges." Journal-Communications Network 3.3 (2004): 60-66.
Keywords Cellular networks versus mobile adhoc networks, mobile adhoc network enabling
technologies, Challenges in MANET, MANET, History of Mobile Networks, Mobile Networks, Future Research areas in WLANs, challenges in wireless networks, HomeRF, Bluetooth, HiperLAN ½, Operation modes of 802.11, Different
802.11standards, IEEE 802.11 Wireless Standard:, Wireless LAN Standards, Diffused Configuration, Omni directional Configuration, Direct beam Configuration,
Narrowband microwave LANs, Spread spectrum LANs, Infrared (IR) LANs , Types of Wireless LANs, History of Wireless LAN.