* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Network tap wikipedia , lookup
Wireless USB wikipedia , lookup
Airborne Networking wikipedia , lookup
Code-division multiple access wikipedia , lookup
Cellular network wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Department of Computer Science Southern Illinois University Carbondale Wireless & Network Security Lecture 3: Radio Basics & Wireless Networks Dr. Kemal Akkaya E-mail: kemal@cs.siu.edu © Kemal Akkaya Wireless & Network Security 1 Radio Basics (RF)  Already seen how a radio signal looks like      Sinusoids Carrier wave Information Signal Signal is modulated onto carrier wave Carrier has more bandwidth than the info itself  Radio Waves        Frequency Range :3 KHz to 300 GHz Easy to generate Can travel long distances Can penetrate buildings They are both used for indoor and outdoor communication They are omni-directional: can travel in all directions They can be narrowly focused at high frequencies (greater than 100MHz) using parabolic antennas (like satellite dishes)  All signals converted to analog  Unguided media allows analog transmission only  Analog Signal usage: TV, Radio  Digital Signal usage: Cell Phone, Wireless Network  Can be transmitted through antennas © Kemal Akkaya Wireless & Network Security 2  Electrical conductor Antennas  Transmits (radiates) electromagnetic waves into space  Receives electromagnetic waves from space  Same antenna can be used as both transmitter and receiver  Radiation Pattern of an Antenna  The graphical representation of radiation in all directions in the space  What is the ideal radiation pattern?  Radiate equally in all directions in the space  Sun is the best example  Omni directional radiation pattern  Real antennas are not isotropic  Dipoles  Half-wave dipoles (Hertz)  Quarter-wave dipoles (Marconi)  Reflective parabolic λ/2 Isotropic Radiator Half-wave dipole  In satellite applications © Kemal Akkaya Wireless & Network Security 3 Directional Antennas  Directional antennas are very common  Radiation pattern in a certain direction  Often used for base stations in a cellular system Antenna Omni-directional  Beam width (half-power beam width)  Measure of directivity of antenna  Angle within which power radiated is at least half of what it is in the most preferred direction Directional  Antenna gain  Power output, in a particular direction, compared to that produced in any direction by a perfect omni-directional antenna (isotropic antenna)  Measured in dBi :decibels relative to an isotropic radiator  A gain of 3dB means: Beam Width  Antennas improves the signal upon the isotropic antenna in that direction by 3dB y y x side view (xy-plane) z z side view (yz-plane) x directed antenna top view (xz-plane) Courtesy www.superpass.com © Kemal Akkaya Wireless & Network Security 4 Radio Propagation  Signal Propagation Ranges  Transmission range Courtesy Dr. Y. Richard Yang  Communication possible  Low error rate  Detection range  Detection of the signal possible  No communication possible  Interference range sender transmission distance  Signal may not be detected  Signal adds to the background noise detection interference  Wireless Propagation Modes  How a signal radiated from an antenna travels? There are three different routes:  Ground-wave propagation  Sky-wave propagation  Line-of-sight propagation (LOS) © Kemal Akkaya Wireless & Network Security 5 Propagation Modes  Radio signal behaves like light in free space  Ground Wave  Frequencies up to 2 MHz  Follows contour of the earth  Example: AM Radio  Sky Wave  Signal reflected from ionosphere and earth’s surface  Can travel thousands of kilometers  Frequency: 2-30MHz  Amateur Radio, Military Comm.  Line of Sight  Transmitting and receiving antennas must be within line of sight  Frequency: More then 30MHz  TV, satellite, optical comm. © Kemal Akkaya Wireless & Network Security 6 Impairments in LOS Transmission  In any system the signal received is different than the signal transmitted  Impairments that degrade analog signal quality  Errors in digital signal  Most common impairments in general (wired, wireless)          Attenuation and Attenuation distortion Free Space Loss Noise Thermal noise Atmospheric absorption Multi-path propagation Fading Refraction Reflection, Scattering, Shadowing, Diffraction  Receiving power of the signal depends on these factors  A signal may arrive at a receiver  Multi-path and fading!!  many different times  many different directions  due to vector addition  Reinforce  Cancel  signal strength differs from place to place © Kemal Akkaya Wireless & Network Security 7 What is Fading?  The main problem in wireless transmission  Definition:  Time variation of received signal power caused by changes in the transmission medium or path (s).  In fixed environment is caused by atmospheric conditions  In mobile environments creates more complex effects LOS pulses Multipath pulses Courtesy Dr. Y. Richard Yang signal at sender  Causes of fading: signal at receiver  Free space loss  Multi-path propagation  Interference with other transmitters  Atmospheric absorption  Reflection, scattering, diffraction,  Mobility refraction © Kemal Akkaya  Fast fading, small fading Wireless & Network Security 8 Free Space Loss  Main source of attenuation in Wireless Transmission  Any type of signal disperses with distance as signal is being spread over larger and larger area  Can be expressed in terms of decibels Pr 2 c2 1 L   K* 2 2 2 2 Pt (4d ) (4fd ) f d  Here Pr is the mean received signal power  Pt is the transmitted signal power  f is the frequency of the signal  d is the distance between transmitter and receiver  It is inversely proportional to d2 for free space  Can be up to environments © Kemal Akkaya d4 Environment Free space Urban area cellular radio Shadowed urban cellular radio Path Loss Exponent, n 2 2.7 to 3.5 3 to 5 In building line-of-sight 1.6 to 1.8 Obstructed in building 4 to 6 Obstructed in factories 2 to 3 for different Wireless & Network Security 9 Multi-path Propagation  Reflection:  When signal encounters a surface that is large relative to the wavelength of the signal  Scattering:  Occurs when incoming signal hits an object whose size in the order of the wavelength of the signal or less  Diffraction:  Occurs at the edge of an impenetrable body that is large compared to wavelength of radio wave Reflection, scattering, diffraction Courtesy Dr. Y. Richard Yang  Refraction: reflection refraction © Kemal Akkaya scattering diffraction Wireless & Network Security  Bending of radio waves as they propagate through the atmosphere 10 Mobility effects  As the user moves, signal paths may change  Distance to sender will change  Obstacles will further away  Fast Fading  As the mobile moves over small distances, the instantaneous received signal will fluctuate rapidly giving rise to small-scale fading  The reason is that the signal is the sum of many contributors coming from different directions and since the phases of these signals are random, the sum behave like a noise  Occurs when receiver moves only about one half of the wavelength  Slow Fading  As the mobile moves away from the transmitter over larger distances, the local average received signal will gradually decrease. This is called large-scale fading  As the receiver covers distances larger than the wavelength © Kemal Akkaya Wireless & Network Security 11 Slow and Fast Fading in an Urban Mobile Environment Received Power (dBm) Slow Fading -30 -40 -50 -60 Fast Fading -70 14 16 18 20 22 24 26 28 Distance between transmitter and receiver (m) © Kemal Akkaya Wireless & Network Security 12  Motivation: Spread Spectrum  In radio transmission, sometimes narrow band signals can be wiped out  Reasons:  Fading due to multi path propagation  Interference from other devices  To solve this problem:  We can transmit at many different frequencies during transmission  Spread transmission over a wider bandwidth  Initial motivation:  To prevent jamming and interference in military applications  What is jamming?  To send noise like signals to distort information signals  Need to know the frequency of the information signal  Used in every wireless networks today  Eliminates interference and multi-path effects  Multiple transmitters can transmit at same frequency range  Actually FCC requires it for signals in ISM band having a certain transmission power © Kemal Akkaya Wireless & Network Security 13 Frequency Hopping Spread Spectrum  Simplest approach: FHSS      Discrete changes of carrier frequency There are multiple base frequencies (or channels) Transmitter randomly hops to one of those frequencies Receiver should to the same thing There is a shared spreading code between transmitter and receiver  Spreading code = Hopping Sequence © Kemal Akkaya Wireless & Network Security 14 Types of FHSS  Two versions of FHSS  Fast Hopping: several frequencies per user bit  Slow Hopping: several user bits per frequency tb user data 0 1 f 0 1 1 t td f3 slow hopping (3 bits/hop) f2 f1 t td f f3 fast hopping (3 hops/bit) f2 f1 t tb: bit period © Kemal Akkaya td: dwell time Wireless & Network Security 15 Spread Code  How to share the spread code?  Use predefined sequences  Sequence 1 <1, 12, 23, 3, 5…>  Receiver listens a fixed frequency channel specifically for the sequence  IEEE 802.11 uses 96 1 MHz Channels  Dwell time is around 390ms  History of Spread Spectrum  First invented by Hollywood Actress, Heidy Lamarr and George Antheil, an avant gard composer in 1940s  Advantages  Frequency selective fading and interference limited to short period  Say you have 80 channels and 1 is knocked by interference  The other 79 are still free and ready to be used  Jammer must jumped each frequency  Simple implementation  Uses only small portion of spectrum at any time © Kemal Akkaya Wireless & Network Security 16 Direct Sequence Spread Spectrum (DSSS)  Each bit in original signal is represented by multiple bits in the transmitted signal  Transmitted signal is code CHIP  Spreading code spreads signal across a wider frequency band  Spread is in direct proportion to number of bits used  Uses a pseudorandom bit sequence  One technique combines digital information stream with the spreading code bit stream using exclusive-OR (XOR)  802.11 DS PHY uses Barker Sequence  11-to-1 Spreading Ratio: 1 bit  11 bits  DSSS is very resilient to interference  Many chips can be corrupted before the bits are lost  Multiple users can share the bandwidth  By using different chipping sequences  No need to allocate different frequencies © Kemal Akkaya Wireless & Network Security 17 Example for DSSS © Kemal Akkaya Wireless & Network Security 18 Mobile and Wireless Data Networks  Experiencing a tremendous growth over the last decade  Wide deployment of access infrastructure  In-door, out-door, MAN, WAN  Growth of Wireless Data     Miniaturization of computing machinery : laptop  PDA  embedded sensors Increasing mobile work force Luxury of tether less computing Information on demand anywhere/anyplace  Some Facts:  In 2005, more than 1/3rd of internet users had internet connectivity through a wireless enabled device (750 million users)!!! (Source: Intermarket group)  In the year 2004 revenue from wireless data was $34B, and by the year 2010 the number of wireless data subscribers will hit 1B!!  What is Mobile and Wireless Computing?  Distributed systems with portable computers and wireless communications  User can access data anytime, anywhere © Kemal Akkaya Wireless & Network Security 19 Buzzwords  Mobile Computing  Distributed systems with mobile users  In-door/Out-door  Vehicle/human speed  Nomadic Computing  Similar to Mobile computing  Focuses more on in-door communications  Pervasive Computing : Ubiquitous Computing  May add some user interface integration  Some says : AI + Mobile Computing stuff  Applications:  Military  Border control, target tracking, intrusion detection etc.  Civil  Habitat monitoring, search and rescue, meeting rooms etc. © Kemal Akkaya Wireless & Network Security 20 Wireless Network Types  Satellite networks  Iridium (66 satellites)  Qualcomm’s Globalstar (48 satellites)  Wireless WANs/MANs  CDPD (Cellular Digital Packet Data )  GPRS (General Packet Radio Service) Wireless WAN Generations:  1G (Past)  AMPS, TACS: No data  2G (Past/Present)  IS-136, GSM: <10Kbps circuit switched data  2.5G (Past/Present)  Wireless LANs  GSM-GPRS, GPRS-136: <100Kbps packet switched  IEEE 802.11 : SIU’s LAWN,  Wireless PANs  e.g. Infrared: Bluetooth  Mobile Ad-hoc networks  3G (Present/Immediate Future)  IMT-2000: <2Mbps packet switched  e.g. Emergency relief, military  Sensor networks  4G (Future)  e.g. Environmental sensing-MICA motes © Kemal Akkaya Wireless & Network Security  20-40 Mbps!! 21 Examples 802.11 / WiFi Wireless LAN PicoNet Bluetooth © Kemal Akkaya Wireless & Network Security 22 Applications: Home Networking Courtesy Dr. Richard Yang, Yale © Kemal Akkaya Wireless & Network Security 23 Applications: Outdoor Networking UMTS, WLAN, DAB, GSM, cdma2000, TETRA, ... Personal Travel Assistant, PDA, laptop, GSM, UMTS, WLAN, Bluetooth, ... Courtesy Dr. Richard Yang, Yale © Kemal Akkaya Wireless & Network Security 24 Application: Environmental Monitoring Wireless Sensor Nodes monitor an area of interest © Kemal Akkaya Wireless & Network Security 25 Challenges of Wireless Computing  1) Wireless Communication Implications of using wireless communication for mobile computing The differences between wireless and wired media  2) Mobility Consequences of mobility on mobile application and system design  3) Poor Resources due to Portability Pressures that portability places in the design of mobile end-systems © Kemal Akkaya Wireless & Network Security 26 1) Wireless Communication  Limited Transmission Range  10m-500m  Limited Bandwidth  Wireless networks deliver lower bandwidth than wired networks  1 Mbps Infrared communication  11 Mbps wireless local radio communications (shared), IEEE 802.11b  9.6 Kbps for wide-area wireless communication 10-100 Mbps for Ethernet 100 Mbps for FDDI 155 Mbps for ATM 1 Gbps for Gigabit Ethernet © Kemal Akkaya  Network partitions  Stall all applications  Uncertainty of Performance  Variance of bit errors  Variance of delays  Variance of bandwidth  Security  Easy to intrude in the wireless network  Heterogeneous devices and network connections  Wired links  Wired networks      Disconnections  Same characteristics  Outdoor: Radio  Indoor: Infrared  Rural Areas: Satellite Wireless & Network Security 27 Heterogeneous Devices Mobile phones • voice, data • simple graphical displays • GSM Sensors, embedded controllers Laptop • fully functional • standard applications • battery; 802.11 PDA • data • simpler graphical displays • 802.11 Desktop • fully functional • standard applications • unlimited power supp • Gbps Ethernet Performance/Weight/Power Consumption © Kemal Akkaya Wireless & Network Security 28 2) Mobility  Ability to change locations while connected to the network  A mobile computer can change its server  DNS server, print server, etc.  Dynamic Environment  Network Access Point Changes  Address changes: IP address  Network Performance Changes  Bandwidth, delay, error rate etc.  Available resources change  Depends on the network it connected to  Data consistency changes  Writing/Reading to/from mobile databases  Security changes  Endpoint authentication harder © Kemal Akkaya Wireless & Network Security 29 3) Poor Resources  Mobile devices are fundamentally different from stationary machines such as desktop computers  Must be designed with variety of constraints in mind, such as size and power consumption – properties much like a wristwatch  They should also be portable  Portability Constraints Include  Low power consumption  You would not want to carry a battery that is bigger than your computer!  Increased risk of data loss  Physical damage  Unauthorized access  Loss and Theft  Small user-interfaces  Requires a different windowing scheme  Buttons versus Recognition  Limited on-board storage, memory, CPU etc  Physical restrictions, power constraints © Kemal Akkaya Wireless & Network Security 30