Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Internet
Computer
Home Network
TV
Outlines
Broadband Over Power Line Digital Subscriber Line (DSL) Technology Cable Modem
In-House BPL
connecting machines within a building HomePlug: an alliance for in-house BPL
Access BPL
Delivers the last mile of broadband to the home
Wireless link
Bridge
Coupler
Coupler
Bridge
Backhaul Point
Advantages of BPL
Power lines are our most ubiquitous infrastructure Lower cost of deployment
Existing wires
Main Concerns
Radio Frequency Interference (RFI) to licensed service power lines are inherently a very noisy environment
Every time a device turns on or off, it introduces a pop or click into the line.
Differences between xDSL technologies: speed, operating distance, applications, ratio between up and downstream
Different approaches: ATM-based ADSL, ISDN DSL. The important thing is what is running over xDSL...
two twisted pairs (for T1) and 3 pairs (for E1) max distance 12,000 feet
Cable Modem
primarily used to deliver broadband Internet access on Hybrid Fibre-Coaxial (HFC)
Internet
Cable Modem
Computer
Cable
TV Television Company
CMTS
...
50 MHz - 550 MHz 550 MHz - 750 and up MHz
5-42 MHz
Cable TV Spectrum
Modulation Phase: The cable modem receives data on its Ethernet or USB interface and modulates the data onto the upstream carrier frequency, negotiates channel access with the CMTS and sends the data.
DOCSIS Security Overview -- BPI+ -Internet CM Authentication (X.509 Certificates) Key Management (RSA, Tri-DES)
abcdef
Mfg Certificate ......
Digitally Signed by: DOCSCSIS Root
CM Certificate ......
Digitally Signed by: Mfg CA
CMTS
PC
abcdef
TFTP Server Secure Software Download CM New CM Code ...... (X.509 Certificate)
CM Code File
Manufacturer
The Device
The cable modem bridges Ethernet frames between a customer LAN and the coax cable network It does, however, also support functionalities at other layers
Ethernet PHY and DOCSIS PHY IP address UDP, port-based packet filtering DHCP, SNMP, TFTP
Fiber-to-the-Home (FTTH)
CO/HE CO/HE //
//
Copper Fiber
CO/HE //
19 Mbps - 1 Gbps +
FTTH Characteristics
FTTH is an optical access network in which the optical network unit is on or within the customers premise. Although the first installed capacity of a FTTH network varies, the upgrade capacity of a FTTH network exceeds all other transmission media.
Optical Access Network
CO/HE //
Why FTTH?
Enormous information carrying capacity Easily upgradeable Ease of installation Allows fully symmetric services Reduced operations and maintenance costs Benefits of optical fiber:
Very long distances Strong, flexible, and reliable Allows small diameter and light weight cables Secure Immune to electromagnetic interference (EMI)
Copper
Uses electricity Opaque Electrically conductive material
Susceptible to EMI
High thermal expansion Ductile material Subject to corrosion and galvanic reactions Fortunately, its recyclable
CO/HE //
FTTH Architectures
Passive Optical Networks (PONs)
Shares fiber optic strands for a portion of the networks distribution Uses optical splitters to separate and aggregate the signal Power required only at the ends
Active Node
Subscribers have a dedicated fiber optic strand Many use active (powered) nodes to manage signal distribution
Hybrid PONs
Literal combination of an Active and a PON architecture
T
// // //
H //
//
T
//
Tom
Dick
Box on side of home separates out only the data bound for that subscriber. But the fear is that someone will fool his box into giving data intended for another subscriber. Solution is to encrypt the data.
Harry
T
// // //
H //
//
Tom
Dick
//
Due to the physics of the network, Harrys data flows upstream but does not come to Toms box, so Tom cannot see Harrys data
Harry
T
// // //
H //
//
T
//
Tom
Dick
Harry
Interesting hybrid model awaits hybrid STTs, but can give the best of both worlds
Router D (NID)
In-home routing
Program stream
Program request
Subscriber's TV
Fast Ethernet
1000 Mbps
Gigabit Ethernet
1 Gbps
10 G Ethernet
10 Gbps
1000BaseT
100BaseT
1000BaseT
1000 Mbps
100 Mbps
1000 Mbps
SMF
MMF
MMF 62.5 um
3 km
550m 550m
300m
25m
100m
A
maximum hub distance B round trip propagation delay space
time
10 Mbps Ethernet
For the original 10 Mbps Ethernet, a compromise was struck. Minimum frame = 512 bits (64 bytes), not including the preamble and Physical Layer overhead. Minimum data field = 46 bytes rarely imposes a significant padding overhead (IP header + TCP header = 40 bytes). At 10 Mbps, 512 bit-times is 51.2us. Depends on the type of cable used and the network configuration, the extent of a 10 Mbps Ethernet can be on the order of from 2-3 Km.
7 1 6
DA
6
SA
2
LEN
46
Data
4
FCS
bytes
Preamble SFD
Network Extent
For a given minimum-length frame, the extent of a network scales inversely with data rate.
10,000 m ~ 2800m 1,000 m ~ 205m 100 m ~ 20m 10m 10Mbps 100 Mbps 1000 Mbps
For Gigabit Ethernet, network extent is only about 20m!!, if the same approach is used.
Carrier Extension
For Ethernet/Fast Ethernet, the minimum frame length = slotTime = 512 bits. Gigabit Ethernet keeps the 512-bit minimum frame length but sets slotTime to 512 bytes In Gigabit Ethernet, frames that shorter than slotTime are extended by appending a carrierextension field so that they are exactly one slotTime long. Frames longer than slotTime are untouched
6
DA
6
SA
2
LEN
46 - 493
Data
4
FCS
6
DA
6
SA
2
LEN
494 - 1500
Data
4 bytes
FCS
Channel Efficiency
The use of carrier extension for short frames imposes a significant performance degradation. In the worst-case (a stream of minimum length frames of 512 bits with a 64-bit preamble/SFD and a 96-bit interframe gap), the channel efficiency is 512 length of = 12%
slot time
4096 + 64 + 96
512
512 + 64 + 96
= 76%
Frame Bursting
The solution is to allow a station to send multiple frames, while extending only the first one with carrier extension (Frame Bursting). No additional frames are sent if a collision occurs before the slotTime expires. After that time, the station can begin sending additional frames without contending again. The interframe gap is filled with non-data symbols. The bursting station may continue to start new frames for up to one burstLength, which limits the maximum time that a station is allowed to dominate the channel.
Frame Bursting
Maximum Time to start of Last frame in Burst (8192 Bytes)
frame 3
frame 4
Preamble
Frame Bursting
Transmitters are not required to implement frame bursting.
Ethernet Type
10Mbps
512 9.6 16 10 32 1518 64 0 -
1 Mbps
512 96 16 10 32 1518 64 0 -
100 Mbps
512 0.96 16 10 32 1518 64 0 -
1000 Mbps
4096 0.096 16 10 32 1518 64 448 65,536
Full-Duplex MAC
When an Ethernet operates in full-duplex mode, all of the complexity of carrier sense, collision detection, carrier extension, frame bursting, backoff algorithm, and so on, has no bearing !! Only shared medium needs these. The full-duplex MAC is not really a MAC at all. With a dedicated channel, a station may transmit at will.
IEEE 802.11a
5.8 GHz / 54 Mbps (70 m)
IEEE 802.11g
2.4 GHz / 54 Mbps (100 m)
IEEE 802.11n
2.4/5 GHz / 100+ (max. 600) Mbps (100+ m)
IEEE 802.11
IEEE 802.11a
consists of a radio, a wired network interface (e.g., 802.3), and bridging software conforming to the 802.1d bridging standard Number of clients supported
device dependent
AP as a Wireless Bridge
fixed terminal
mobile terminal
server infrastructure network access point application Application
TCP
IP LLC 802.11 MAC 802.11 PHY LLC 802.11 MAC 802.3 MAC 802.11 PHY 802.3 PHY
TCP
IP LLC 802.3 MAC 802.3 PHY
Coordinated function
BSS
IBSS
Ad hoc mode
Three types:
Integrated: A single AP in a standalone network Wired: Using cable to interconnect APs
ESS:
BSS
BSS
BSS
BSS
BSS
ESSID in an ESS
ESSID differentiates one WLAN from another Client must be configured with the right ESSID to be able to associate itself with a specific AP ESSID is not designed to be part of security mechanism, and it is unfitted to be one
AP broadcast the SSID(s) they support Client association requests contain the ESSID
Transmitted in the clear
ESSID
Access Point
Probe Response
Authentication Request Authentication Response Association Request Association Response
Probing
Probing Phase
Find an available AP APs may operate at different channels (11 channels in total in case of 802.11a) Should scan a channel at least MinChannelTime If an AP is found, should last MaxChannelTime
Active Scanning
MN
probe request with SSID
AP
probe response
If SSID matches
Passive Scanning
MN
beacon with SSID
AP
Full Scanning
MN AP 1 AP 2 AP 3 MinChannelTime
MaxChannelTime
Scan channel 3
Scan channel 11
Authentication request
Open Authentication
The authentication request contain a NULL authentication protocol. It must have the AP SSID. The access point will grant any request for authentication
Client
Authentication Request
Access Point
Authentication response
Access Point
Authentication response(Success/Failure)
RADIUS Server
Open Authentication
WEP Encapsulation
1. 2. 3. 4.
Initialization Vector (IV)
{p=plaintext}
{k=shared-key}
{c=ciphertext} {IV=init-vector}
IV
Key Stream
WEP Key
Plaintext CRC-32
C
Ciphertext
||
WEP Decapsulation
1. 2. 3.
KeyStream = RC4 (IV || k) P = XOR (C, KeyStream) = M || checksum(M) If checksum(M) = (checksum(M)) Then P is accepted
M
Seed
RC4 PRNG Key stream
WEP Key IV
||
Plaintext
CRC 32 ICV
Ciphertext
Message
802.1X
based on EAP (extensible authentication protocol, RFC 2284)
still one-way authentication initially, MN is in an unauthorized port
802.1X ties it to the physical medium, be it Ethernet, Token Ring or wireless LAN.
The answer is 47
Contention Window
data frame random 1 The winner
busy DIFS
contention window
random 2
All stations must wait DIFS after medium is free random 3 time
data frame
busy Destination
DIFS
SIFS Others
SIFS
Defer access
DIFS
SIFS
Destination
SIFS ACK SIFS ACK
Contention Window
data frame
can resend
busy Destination
EIFS
DIFS No ACK
SIFS
DIFS
SIFS
Others
Defer access contension
data frame
busy
Destination CTS DIFS SIFS Others NAV (RTS) NAV (CTS)
SIFS ACK
contention window
RTS/CTS is Optional
system parameter RTSThread
RTS/CTS is used only when frame size RTSThread
Throughput Issues
When a source node sends a frame, the receiving node returns a positive acknowledgment (ACK).
This can consume 50% of the available bandwidth.
This overhead, combined with the collision avoidance protocol (CSMA/CA) reduces the actual data throughput to a maximum of 5.0 to 5.5 Mbps on an 802.11b wireless LAN rated at 11 Mbps.
What is Bluetooth?
Major joint computing and telecomm industry initiative Plan to deliver a revolutionary radio-based solution
Cable replacement, no line of sight restrictions Prefect for mobile devices - small, low power, low cost Open specification (license free)
Bluetooth Characteristics
Data/voice access Cable replacement technology 1 Mbps symbol rate Range 10+ meters Low cost Low power
Automatic Synchronization
In the Office
At Home
Bluetooth World
Application of Bluetooth
Integrated in
mobile phones PDA/handhelds Computers Wireless peripherals
Handsets cameras
Piconet
Two or more units sharing the same hopping sequence form a piconet (similar to a LAN). Each piconet can have
only one master. up to seven slaves. Each piconet has max capacity (1 Mbps).
m
Piconet Structure
Master Active Slave Parked Slave Standby
Scatternet
Multiple piconets form a scatternet. Same device can be shard by two different piconets
s
m s s
s s m s s s
Slot k+1
Slot k+2
slave 625s
Multi-Slot Packets
Bluetooth defines data packets which are 1, 3, or 5 slots long
1-slot packet
3-slot packet 5-slot packet
f(k)
f(k+1)
f(k+2)
f(k+3)
f(k+4)
f(k+5)
f(k+6)
2
TX RX
2
TX RX
1
TX RX
Slave 1
RX
TX
RX
TX
Slave 2
RX
TX
RX
TX
Putting It Altogether
channel
78 77 76 75
Master
Slave 1
5 4 3 2 1 0
Slave 2
time
SCO Traffics
Master reserves slots for SCO links
Slot no master
0
SCO TX
1
SCO RX
2
TX
3
RX
4
TX
5
RX
0
SCO TX
1
SCO RX
Slave 1
SCO RX SCO TX
RX
TX SCO RX SCO TX
Slave 2
RX
TX
MASTER
SLAVE 1
SLAVE 2
SLAVE 3
RFID
What is RFID?
RFID is an ADC (Automatic Data Capture) technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track
RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item
An RFID System
Antenna RF Module Tag Reader Host Computer
Interrogation Unit
Micro Computer Tx/Rx Antenna
Computer Network
One or more RF tags Two or more antennas One or more interrogators One or more host computers Appropriate software
RF Tag
Variations of RF Tags
Basic types: active vs. passive Memory
Size (16 bits - 512 kBytes +) Read-Only, Read/Write or WORM
Arbitration (Anti-collision) Ability to read/write one or more tags at a time Frequency : 125KHz - 5.8 GHz Physical Dimensions
Thumbnail to Brick sizes Incorporated within packaging or the item
RFID Frequencies
Regulating Authority : ITU and Geo Organizations
Frequency 125-150 kHz Regulation Basically unregulated ISM band, differing power levels and duty cycle Non-specific Short Range Devices (SRD), Location Systems ISM band (Increasing use in other regions, differing power levels and duty cycle ISM band, differing power levels and duty cycle Range ? 10 cm Data Speed Low Low to moderate Comments Animal identification and factory data collection systems Popular frequency for I.C. Cards (Smart Cards) DoD Active
13.56 MHz
<1m
433 MHz
1 100 m
Moderate
860-960 MHz
25m
Moderate to high
EAN.UCC GTAG, MH10.8.4 (RTI), AIAG B-11 (Tires), EPC (18000-6) IEEE 802.11b, Bluetooth, CT, AIAG B-11
2450 MHz
12m
High