Computer Networking 007: Wireless and Mobile Networks

  • Wireless Hosts: End-system devices that run applications. A mobile host doesn't have to be portable/stationary. e.g. laptop, tablet, smartphone, or desktop computer
  • Wireless Link: the link between hosts OR betwen a host and a base station. Links have 2 key characteristics -- coverage area and link rate.
  • Base Stations: Wired into the bigger network. Sending and receiving data (e.g., packets) to and from a wireless host that is associated with that base station. e.g. Cell tower, Access points.
    • "Association" with a base station: Host is within the wireless communication distance of a base station + Data is relayed from host to the base station into the larger network.
    • Handoff: The change of base station when a mobile host move beyond a base station into another.
  • Network infrastructure: the larger network with which a wireless host may wish to communicate.

  • Infrastructure mode: hosts associated with a base station

  • Ad hoc network: hosts that are not associated with a base station and thus do their own routing, address assignment, DNS-like name translation, and more. Not connected to the outside, bigger network, but interconnected within the ad hoc network

Network Classification

  • Single Hop, infrastructure-based: all communication is between this base station and a wireless host over a single wireless hop. (public wifi, 4G LTE)
  • Single-hop, infrastructure-less: No base station, one of the nodes in this single-hop network may coordinate the transmissions of the other nodes. Not connected to outside. (Bluetooth)

  • Multi-hop, infrastructure-based: Some wireless nodes may have to relay their communication through other wireless nodes in order to communicate via the base station. (Wireless mesh networks, 360 wifi)

  • Multi-hop, infrastructure-less: No base station, nodes may have to relay messages among several other nodes in order to reach a destination. (mobile ad hoc networks, vehicular ad hoc network)

Links and Network Characteristics

  •  Differences between a wired link and a wireless link:
    • Path loss: Wireless signals (Electromagnetic radiation) attenuates propagating through matter.

    • Interference: electromagnetic noisesame-frequency signals will interfere with one another

    • Multipath propagation: Bounce off objects and the ground, taking paths of different lengths between a sender and receiver. Cause signal blurring at receiver.

Wireless networks are more prone to bit errors.

  • Signal-to-Noise Ratio (SNR): Strength of the received signal (i.e., the information being transmitted) vs. Strength of the noise. A larger SNR makes it easier for the receiver to extract the transmitted signal from the background noise.

  • Bit Error Rate (BER): Probability that a transmitted bit is received in error at the receiver.

  • With a given physical layer: Boost signal --> Higher SNR --> Lower BER

  • With a given SNR: pick a physcial layer that provide a wide throughput with low BER.

  • Hidden Terminal Problem: Some physical obstruction prevent 2 hosts from hearing one another, but the signals are interferring at another destination where the signals are not blocked.

  • Signal Attenuation Problem: signals from two hosts attenuates so cannot be detected by one another, but a middleware destination can.

CDMA

Code division multiple access, a channel partitioning protocol

  • Chipping code: a dynamic code to encode data
  • All users broadcast over the same frequency channel
  • Each receiver has the code to decode its own message among the big mess of message transmitted through the channel

WiFi

IEEE 802.11 wireless LAN

  • Different 802.11 standards share the same medium access protocol, CSMA/CA, the same link-layer frame structure, all can reduce their transmission rate in order to reach out over greater distances, all backward compatible
  • Frequency range
    • 2.4 GHz range: unlicensed, compete with microwaves

    • 5 GHz range: shorter transmission distance, more multipath propagation

  • Antennas

    • “smart” antennas: 802.11ac, adaptively beamform, decreases interference and increases distance

    • (MIMO) antennas: two or more antennas on the sending side and two or more antennas on the receiving side that are transmitting/receiving different signals

CSMA/CA senses the wire and if no-one is using it, they it will broadcast onto the frame.

Architecture

  • Basic Service Set (BSS): many wireless stations + 1 AP (access point, base station)

  • Many BSS connect to a switch/router and go to a larger network

  • Each wireless station has a MAC address, each AP has a MAC address, globally unique.

Channels and Association

  • Admin assigns a one- or two-word Service Set Identifier (SSID) to the AP

  • 802.11 defines 11 partially overlapping channels.

  • Admin assigns 1 channel to the AP (a channel number).

  • Each mobile device is associated with an AP, which means the wireless device creates a virtual wire between itself and the AP.

  • Once associated with an AP, the device will want to join the subnet by sending a DHCP discovery message into the subnet via the AP in order to obtain an IP address on the subnet

Passive scanning

  • AP periodically send beacon frames, each of which includes the AP’s SSID and MAC address

  • Wireless device scans the 11 channels, and selects one of the available APs for association

Active scanning

Wireless device broadcasts a probe frame that will be received by all APs, and chooses one that is available.

Multiple Access Protocol

Avoid instead of detection (It is hard to do collision detection in a wireless environment.)

CSMA/CA = “carrier sense multiple access,” meaning that each station senses the channel before transmitting, and refrains from transmitting when the channel is sensed busy.

SENDER

  1. Sender check if channel idle
  2. Channel is idle, send the frame after DIFS (a short time)
  3. Channel is not idle, chooses a random backoff value using binary exponential backoff, keep sensing for channel idle
    1. When the channel idle, count down random backoff value + DIFS, then send the packet
    2. When the channel is not idle, wait
  4. ACK received, if wants to send another frame, go to step 3; ACK not received, pick a larger backoff value, go to step 3

RECEIVER

Packet OK, wait SIFS then send ACK

Collision avoidance

A mechanism for a sender to reserve for a space in the channel and CA.

  • RTS frame: indicating the total time required to transmit the DATA frame and the acknowledgment (ACK) frame

  • CTS frame: gives the sender explicit permission to send and also instructs the other stations not to send for the reserved duration.

Addressing

Mobility

H1 moves with-in the same subnet (BSS1 --> BSS2): IP stays the same, TCP connection maintained

  • H1 moves away from AP1, signal from AP1 reduces
  • H1 moves toward AP2, signal from AP2 increases
  • H1 dis-associates with AP1, and associates with AP2
  • AP2 sends a broadcast Ethernet frame with H1’s source address to the switch just after the new association
  • Switch (self-learning) updates the forwarding table to redirect packets to AP2

Advanced Features

Rate Adaptation

A node can change the transmission rate dynamically according to the network situation. This is a mechanism for ensure frames will be delivered successfully.

  • High BER (lots of unACKed frames), reduce transmission rate
  • Low BER (frames delivered), increase transmission rate

Power Management

A node can set its power-management bit in the header of an 802.11 frame to 1 to indicate sleep.

  • AP knows that the node will sleep, stop transmitting frames, wakes up the node before next beacon frame
  • Node wake up when beacon frame is sent, fall back to sleep when no more frame comes in

Bluetooth

  • Short-range, low-power, low-cost
  • 2.4 GHz unlicensed radio band

  • TDM (time slots of 625 microseconds) + FDM (each time slot has 79 channels)

  • Ad hoc: No network infrastructure

  • Piconet: 1 master device and and many client devices. master can transmit to any active device in the network, client can only respond.

  • Parked device are sleeping devices and can be waken up by the master.

4G

  • Solution for wide-area mobile internet
  • Widespread use
  • Rate up to 100's Mbps (usually up to 60,  70)
  • All-IP: ONLY IP datagrams are used to carry data from user to the larger internet. (no telephone technologies are used)
  • Separates control & data planes

Architecture

  • Radio Access Network: Mobile devices connected to base stations
    • Mobile devices (User Equipment) have 64-bit IMSI stored on the SIM card
    • Base Station (eNode-B)
      • Coverage areas known as "Cell"
      • Control Plane responsibility: Similar to WIFI AP, BUT coordinate with near-by stations to handle mobility better, handles registeration
      • Data Plane responsibility: Forward datagrams between UE (over the LTE radio access ­network) and the P-GW. UE datagrams are encapsulated at eNode-B, and tunneled to the P-GW through EPC.

  • Enhanced Packet Core (EPC): all traffics are IP based (all IP datagrams)
    • Home Subscriber Service (HSS): where info of mobile devices is stored, work with MME in device authentication
    • PDN Gateway (P-GW): gateway to the larget internet, provides NAT service. 
      • Allocates IP addresses to the UEs

      • Performs QoS (quality of service) enforcemant

      • Performs datagram encapsulation/decapsulation

    • Serving Gateway (S-GW): gateways on the path from mobile to internet
      • All UE traffic will pass through the S-GW

      • Performs charging/billing functions

      • Performs lawful traffic interception

    • MME: co-ordinate with HSS to do authentication, track device location, handle cell switching (mobility)
      • Performs connection and mobility management

      • Receives UE subscription information from the HHS

LTE link layer protocols

 (Access Network)

 (EPC)

LTE Radio Access Network

Association with a Base Station

Sleep Modes

5G

  • Frequency
    • FR1 (450 MHz - 6 GHz) & FR2 (24GHz - 52GHz): millimeter wave frequencies
    • Higer data rates, shorter coverage distance (pico-cells: 10-100m)
    • Needs lots of new stations
  • NO backward compatibility with 4G
  • Use MIMO (multiple directional antennae), better throughput

Mobility

  • Network perspective mobility spectrum
    • No-mobility (关掉电脑,从一个地方拿到另一个地方)
    • Low-mobility (在一个AP的辖区内移动)
    • Med-mobility (在同一个provider内的多个AP间移动)
    • High-mobility (在多个provider辖区之间移动)
  • Router approach (不可用)
    • A device associate with a new network
    • New network router broadcast the change
    • Other network routers receive broadcast and remove the device from their routing tables
    • Problem: not scalable, too many entries in the routing table

Current Approach

  • Home agent in the mobile node’s home network can track the foreign network in which the mobile node resides

  • Foreign agent update the mobile node’s location to the home agent.

  • COA (care-of address)

    • Created by foreign agent

    • Used as foreign address of the mobile device

    • Network portion of the COA matching that of the foreign network

      • eg. Foreign network address: 79.129.13/24, COA: 79.129.13.2

Indirect Routing

  • Mobile node registers with the foreign agent when attaching to the foreign network

  • Foreign agent will register the mobile node’s COA with the home agent

  • Correspondent wants to send a datagram to a mobile node
  • Correspondent forwards datagram to mobile node's home agent, using the mobile node’s COA
  • Home agent encapsulates the correspondent’s original complete datagram within a new (larger) datagram
  • Foreign agent receives and decapsulates the datagram, and forwards the original datagram to the mobile node.

  • Respond message can either go through home agent or go directly to correspondent

Direct Routing

Indirect routing 绕路,不划算

  • Mobile node registers with the foreign agent when attaching to the foreign network

  • Foreign agent will register the mobile node’s COA with the home agent

  • Correspondent wants to send a datagram to a mobile node
  • Correspondent agent in the correspondent’s network ask home agent for the COA of the mobile node (the home agent is queried for the COA by the correspondent agent only once, at the beginning of the session)
  • Foreign agent in that foreign network where the mobile node was first found as the anchor ­foreign agent

  • Correspondent agent then tunnels datagrams directly to the mobile node’s COA

  • Foreign agent receives and decapsulates the datagram, and forwards the original datagram to the mobile node.

If the mobile node moves to another network

  • Mobile node registers with the new foreign agent

  • New foreign agent provides the anchor foreign agent with the mobile node’s new COA

  • Correspondent agent tunnels the datagram to anchor ­foreign agent

  • Anchor foreign agent re-encapsulate the datagram and forward it to the mobile node using the new COA

  • Repeat Step 1&2 if moves agagin

HandOver

As the signal from the mobile device degrades,

Impact

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Preface In today’s world, where computer viruses and security threats are common themes in anything from Hollywood movies and TV advertisements to political discussions, it seems unthinkable to ignore security considerations in the design and implementation of any network. However, it is only in the past 4–5 years that talkative security experts have been invited to the design table from the start. The common thinking only 5 years ago was either: this is somebody else’s problem or let us design the major functionalities first, then bring in a cryptographer to secure it! This treatment of security as an add-on feature typically led either to design delays, overheads and extra costs when the “feature” had to be included, or to ignored security provisioning when the “feature” was not a must. The problem, of course, stemmed from the fact that security “features” have rarely been revenue-makers. As we all know, many political, social and economic events in the last half decade have forced the designers, regulators and businessmen to adjust their attitudes towards security consider- ations. People realized that although security measures are not revenue-makers, their lack is indeed a deal breaker, to say the least, or has catastrophic aftermaths, at worst. The Internet Engineering Task Force (IETF) has also played an important role in estab- lishing the aforementioned trend by making a few bold moves. The rejection of some very high profile specifications due to the lack of proper security considerations was a message to the industry that security is not to be taken lightly. This was done in a dot.com era where the Internet and its applications seemed to have no boundaries and security provisioning seemed to be only a barrier rather than an enabler. As a result of this trend, the field of network security gained a lot of attention. A profession that seemed to belong only to a few mathematically blessed brains opened up to a community of practitioners dealing with a variety of networking and computing applications. Many stan- dards, such as 802.1X, IPsec and TLS, were developed to apply cryptographic concepts and algorithms to networking problems. Many books were written on the topics of security and cryptography, bringing the dark and difficult secrets of fields such as public key crypto- graphy to a public that typically was far less mathematically savvy than the original inventors. Many protocols and procedures were designed to realize infrastructures such as PKIs to bring these difficult concepts to life. Still, cryptographic algorithms or security protocols such as IPsec are not enough alone to operate a network that needs to generate services and revenues or to protect its constituency. Access to the network needs to be controlled. Users and devices need to be authorized for a variety of services and functions and often must pay for their usage. This is where the AAA protocols came in. In its simpler form a AAA protocol such as fpref.fm Page xvii Wednesday, August 3, 2005 8:03 PM xviii Preface a base RADIUS protocol only provides authentication-based access control. A few service types are also included in the authorization signaling. RADIUS was later augmented with accounting procedures. Diameter as a newer protocol was only standardized less than 2 years ago. Both RADIUS and Diameter are still evolving at the time of writing. This evolution is to enable AAA mechanisms and protocols to provide powerful functions to manage many complicated tasks ranging from what is described above to managing resources and mobility functions based on a variety of policies. In the near future the networks need to allow the user through a variety of interfaces, devices and technologies to gain access to the network. The user will require to be mobile and yet connected. The provision of the connection may at times have to be aided by third parties. The interaction between AAA and security proce- dures with entities providing mobility and roaming capabilities is a very complicated one and is still not completely understood. Despite this complexity, there seem to be very few books on the market that discuss more than a single topic (either security, or mobility or wireless technology). The topic of AAA is largely untouched. Very little text in the way of published literature is available on AAA protocols, let alone describing the interaction of these protocols with security, mobility and key management protocols. The idea for writing this book started from an innocent joke by the IETF operation and management area director during an IETF lunch break a few years ago. When we asked about the relations between the use of EAP for authentication and Mobile IP-AAA signaling, the answer was “Maybe you should write a book about the subject”. Even though this was considered a joke at a time, as we started to work on deploying AAA infrastructure for Mobile IP and EAP support, the need for easy-to-understand overview material was felt so strongly that the joke now sounded like black humor. We had to write a book on AAA as a community service! The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained in the text. Thus, the book is suitable for managers, engineers, researchers and students who are interested in the topic of network security and AAA but do not possess in-depth IP routing and security knowledge. We aimed at providing an overview of IP mobility (Mobile IP) and security (IPsec) to help the reader who is not familiar with these concepts so that the rest of the material in the book can be understood. However, the reader may feel that the material quickly jumps from a simple overview of Mobile IP or IPsec to sophisticated topics such as bootstrapping for IP mobility or key exchange for IP security. Our reasoning here was that we felt that there are a number of excellently written books on the topics of Mobile IP and IPsec, to which the reader may refer, so it would not be fair to fill this book with redundant information. Instead, the book provides just enough material on those topics to quickly guide the reader into the topics that are more relevant to the rest of the material in this book. The book may also serve as a reference or introduction depending on the reader’s need and background, but it is not intended as a complete implementation reference book. The tables listing the protocol attributes are intentionally not exhaustive to avoid distractions. Most of the time, only subsets that pertain to the discussions within the related text are provided to enable the reader to understand the principles behind the design of these attributes. At the same time, references to full standards specifications are provided for readers interested in implementation of the complete feature sets. Chapter 1 of this book provides an overview of what AAA is and stands for. It provides thorough descriptions of both authorization and accounting mechanisms. Unfortunately the field and standardization on authorization mechanisms is in the infancy stage at this point and fpref.fm Page xviii Wednesday, August 3, 2005 8:03 PM Preface xix accounting, compared to authentication, has received far less attention in the research and standards community due to its operator-specific nature. Due to the enormous amount of research done on authentication, we devote Chapter 2 entirely to authentication concepts and mechanisms and also provide a rather unique classification (from IAB) of authentication mechanisms in that chapter. We will come back to the topic of authentication and describe more sophisticated EAP-based authentications in Chapter 10, but after Chapter 2, we go through the concepts of key management in Chapter 3 to lay the groundwork for most of the security and key management discussions in Chapter 4 and the rest of the book. Chapter 4 discusses IPsec and TLS briefly, but provides a thorough discussion on IKE as an important example of a key management and security association negotiation protocol. As mentioned earlier, the aim of that chapter is not to describe IPsec or TLS thoroughly. Both these proto- cols are provided for completeness and to provide the background for the later discussion of security topics. Chapter 5 discusses mobility protocols for IP networks. It describes basic Mobile IP procedures and quickly goes through the latest complementary work in IETF, such as bootstrapping. This chapter also describes two IETF seamless mobility protocols, context transfer and candidate access router discovery, which may be required to achieve seamless handovers. This chapter also describes the security procedures for Mobile IPv4 and lays the groundwork for Mobile IP-AAA discussions in Chapter 8. Chapters 6 and 7 describe the two most important AAA protocols, namely RADIUS and Diameter and their applications for authentication and accounting. Many of the specifications that are considered work in progress in IETF are covered here. Chapter 8 finally covers the topic discussed in the IETF joke we mentioned earlier: Mobile IP-AAA signaling to provide authentication and key management for Mobile IP signaling. Chapter 9 goes on to provide a description of public key infrastructures (PKI) and the issues and concerns with management of PKIs, certificates and their revocation. Chapter 10 describes the EAP authentication framework, EAP signaling transport and the structure for a generic EAP-XXX mechanism. It also provides overviews of a variety of EAP authentication methods, such as EAP-TLS, EAP-TTLS, EAP-SIM, and so on. Finally, Chapter 11 makes a humble attempt at describing the overall problem of AAA and identity management in a multi-operator environment and discusses various architectural models to tackle the problem. This chapter also provides an overview of the Liberty Alliance. We wish the readers a joyful read.
Networking Essentials: A CompTIA Network+ N10-006 Textbook (4th Edition) By 作者: Jeffrey S. Beasley – Piyasat Nilkaew ISBN-10 书号: 0789758199 ISBN-13 书号: 9780789758194 Edition 版本: 4 出版日期: 2016-01-17 pages 页数: (784 ) Thoroughly updated to reflect the CompTIA Network+ N10-006 exam, Networking Essentials, Fourth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management. Networking Essentials, Fourth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet and TCP/IP networks; routing protocols and router configuration; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This new edition includes expanded coverage of mobile and cellular communications; configuring static routing with RIPv2, OSPF, EIGRP, and IS-IS; physical security, access control, and biometric access control; cloud computing and virtualization; and codes and standards. Clear goals are outlined for each chapter, and every concept is introduced in easy to understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks. Key Pedagogical Features NET-CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives WORKING EXAMPLES IN EVERY CHAPTER to rein
Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, cable and wireless communications, and networking security. It describes the most important state-of-the-art fundamentals and system details in the field, as well as many key aspects concerning the development and understanding of current and emergent services. In this book, the author gathers in a single volume current and emergent cable and wireless network services and technologies. Unlike other books, which cover each one of these topics independently without establishing their natural relationships, this book allows students to quickly learn and improve their mastering of the covered topics with a deeper understanding of their interconnection. It also collects in a single source the latest developments in the area, typically only within reach of an active researcher. Each chapter illustrates the theory of cable and wireless communications with relevant examples, hands-on exercises, and review questions suitable for readers with a BSc degree or an MSc degree in computer science or electrical engineering. This approach makes the book well suited for higher education students in courses such as networking, telecommunications, mobile communications, and network security. This is an excellent reference book for academic, institutional, and industrial professionals with technical responsibilities in planning, design and development of networks, telecommunications and security systems, and mobile communications, as well as for Cisco CCNA and CCNP exam preparation. Table of Contents Chapter 1: Introduction to Data Communications and Networking Chapter 2: Network Protocol Architectures Chapter 3: Channel Impairments Chapter 4: Cable Transmission Mediums Chapter 5: Wireless Transmission Mediums Chapter 6: Source Coding and Transmission Techniques* Chapter 7: Advanced Transmission Techniques to Support Current and Emergent Multimedia Services Chapter 8: Services and Applic
"Mobile Applications Development with Android: Technologies and Algorithms" English | ISBN: 1498761860 | 2017 | 320 pages | PDF | 7 MB Mobile Applications Development with Android: Technologies and Algorithms presents advanced techniques for mobile app development, and addresses recent developments in mobile technologies and wireless networks. The book covers advanced algorithms, embedded systems, novel mobile app architecture, and mobile cloud computing paradigms. Divided into three sections, the book explores three major dimensions in the current mobile app development domain. The first section describes mobile app design and development skills, including a quick start on using Java to run an Android application on a real phone. It also introduces 2D graphics and UI design, as well as multimedia in Android mobile apps. The second part of the book delves into advanced mobile app optimization, including an overview of mobile embedded systems and architecture. Data storage in Android, mobile optimization by dynamic programming, and mobile optimization by loop scheduling are also covered. The last section of the book looks at emerging technologies, including mobile cloud computing, advanced techniques using Big Data, and mobile Big Data storage. About the Authors Meikang Qiu is an Associate Professor of Computer Science at Pace University, and an adjunct professor at Columbia University. He is an IEEE/ACM Senior Member, as well as Chair of the IEEE STC (Special Technical Community) on Smart Computing. He is an Associate Editor of a dozen of journals including IEEE Transactions on Computers and IEEE Transactions on Cloud Computing. He has published 320+ peer-reviewed journal/conference papers and won 10+ Best Paper Awards. Wenyun Dai is pursuing his PhD at Pace University. His research interests include high performance computing, mobile data privacy, resource management optimization, cloud computing, and mobile networking. His paper about mobile app privacy has been published in IEEE Transactions on Computers. Keke Gai is pursuing his PhD at Pace University. He has published over 60 peer-reviewed journal or conference papers, and has received three IEEE Best Paper Awards. His research interests include cloud computing, cyber security, combinatorial optimization, business process modeling, enterprise architecture, and Internet computing.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值