Siemens IEEE802.11 manual IP based network architecture, $*6

Page 9

IP based network architecture

193.175.26.92

 

 

 

131.34.3.35

 

 

 

 

 

 

 

 

 

 

 

www

 

 

 

 

 

www

 

 

http

 

 

 

 

 

 

http

 

N-DATA.request

N-DATA

N-DATA

N-DATA

N-

DATA.indication

 

tcp

 

 

 

tcp

 

 

 

 

 

 

 

 

 

ip

ip

ip

ip

ip

 

 

 

ip

ip

ip

link

link

link

link

link

 

 

link

link

link

phy

phy

phy

phy

phy

 

 

phy

phy

phy

ip =

connectionless,

 

1

 

2

 

3

4

 

Version Length Type of Service

 

Total Length

TOS (pre-diffserv)

 

non-reliable,

 

Identification

)/$*6

Fragment offset

D T R 0 0

 

Time-to-live

Protocol

 

Header checksum

 

 

end-to-end,

 

 

Source IP Address (32bit)

 

D: Delay

 

 

 

Destination IP Address (32 bit)

 

 

packet-oriented

 

 

 

Options (if any)

 

T: Throughput

 

 

 

 

 

R: Reliability

 

 

 

 

Data

 

 

 

 

data delivery service

 

 

 

 

 

 

“1”= precedent

 

 

 

 

 

 

 

 

WLAN-IEEE802.11 Tutorial (Maximilian Riegel), 021018-wlan-tutorial.ppt

Page 9

© Siemens, 2002

 

 

 

Image 9
Contents Maximilian Riegel Prolog Ubiquitous Wlan Prolog Wlan has taken off Outline Part Wireless Internet system architecture Peer Generic Internet network architectureHtml Layering means encapsulationIEEE802.11 seamless integration into the Internet $*6 IP based network architectureWireless LAN IEEE802.11 basic architecture What is unique about wireless? Part 2 IEEE802.11 Overview With 11 Mbps using existing MAC layer Wireless IEEE802.11 StandardIEEE802.11 Configurations IndependentInfrastructure IEEE802.11 Architecture Overview Isochronous ServiceMAC MIB IEEE802.11 Protocol ArchitectureWIG Wireless LAN StandardizationPart 3 Physical layer GHz Direct Sequence Spread Spectrum IEEE802.11 GHz & 5 GHz Physical LayersFrequency Hopping Spread Spectrum RF Energy is Spread by XOR of Data with PRN Sequence Direct Sequence Spread SpectrumDsss Transmit Spectrum and Channels Specifications IEEE802.11a 5GHz PHY LayerKey milestones CCK-OFDM proposal for up to 54 Mbit/s from Intersil IEEE802.11g Further Speed Extension for the 2.4GHz BandSpectrum Designation in the 5 GHz range IEEE802.11h Spectrum Transmit Power Management TPC Transmission Power ControlDFS Dynamic Frequency Selection Issues of 5 GHz systems … when will 5 GHz WLANs come?PHY Terminology Physical Layer Convergence Protocol Plcp Part 4 Medium Access Control Robust for interference Basic Access Protocol FeaturesBackoff-Window CSMA/CA ExplainedCSMA/CA + ACK protocol Defer access based on Carrier SenseStation Distributed Coordination Function DCFSTA a STA B Hidden Node ProvisionsEdcf Enhanced Distributed Coordination Function IEEE802.11e MAC Enhancements for Quality of Service EdcfPoint Coordination Function PCF HCF Hybrid coordination function IEEE802.11e MAC Enhancements for Quality of Service HCFMAC Header format differs per Type Frame FormatsAddress Field Description Summary MAC Protocol Features Part 5 MAC layer management Infrastructure Beacon Generation Timestamp contains timer value at transmit timeTiming Synchronization Function TSF All stations maintain a local timerTiming Synchronization Function TSF Timing conveyed by periodic Beacon transmissionsScanning required for many functions ScanningMAC uses a common mechanism for all PHY Passive ScanningActive Scanning Example Initial connection to an Access PointMobile devices are battery powered Power Management ConsiderationsPower Management Approach Power Management Procedure If TIM indicates frame bufferedBroadcast frames are also buffered in AP Beacon MAC Management FramesPart 6 Wlan Mobility Independent networking IEEE802.11 Ad Hoc ModeIEEE802.11 Infrastructure Mode If AP accepts Reassociation Request Mobility inside a Wlan ‘hotspot’ By link layer functionsIapp defines procedures for IEEE802.11f Inter-Access Point Protocol IappPart 7 Wlan security IEEE802.11 Privacy and Access Control Provides for an authentication mechanismShared key authentication is based on WEP privacy mechanism WEP bit in Frame Control Field indicates WEP used WEP privacy mechanismStation Shared key authenticationShortcomings of plain WEP security Security association management IEEE802.11i Robust Security Network RSNEven IEEE802.11i may not be sufficient for public hot-spots Last word about Wlan securitySummary MAC Functionality Part 8 Public hotspot operation 〈 Rqrwwrxfk Fxvwrphuhtxlsphqw Serving customers in public hot spotsOne solution for every place hotspot Cost issues Becoming a Wlan operator is easyLegal aspects in Germany How does your favorite storefront look like? Using a web page for initial user interaction Auth How does it work Web based access controlPage Real-time accounting based on service, duration and volume Functions of an integrated access gateway User managementDhcp server for assigning IP addresses to Wlan clients Functions of an integrated access gateway Network servicesPolicy engine IP router with NAT enginePart 9 Wlan Umts Interworking GSM/GPRS/UMTS Wlan IEEE802.11 Umts and Wireless LAN are differentWlan Umts Interworking Ancient approach ‘tight coupling’ Wlan as just another radio access technology of UmtsTight coupling Wlan as an extension of a mobile networkOrjdulwkplfvfdoh Wlan is much cheaper than 2G/3GConclusions for Mobile Network Operators Revenues without competing against aggressive Wlan operators Wlan Umts Interworking Now widely accepted ‘loose coupling’Each hotspot is SS7 endpoint Wlan loosely coupled to a Mobile NetworkWeb based authentication and mobile network security Standards for WLAN/UMTS interworking End Thank you for your attention Questions and comments?Literature