Professional Documents
Culture Documents
14th lecture
Communication Systems
Please hand in the exercise sheet #6, next will be handed out in
the next practical exercise
Sheet #7 is due for the 15th July (next lecture)
Next two dates:
8th, 11th July starting at 1:30pm (to catch up with the time of
emitted courses in the beginning of the lecture)
please grab your older exercise sheets there to have a reference for
exam preparation (we got quite a pile of papers by now :))
2 | 49
Communication Systems
3 | 49
Communication Systems
4 | 49
Communication Systems
Last lecture
Thus many components and interfaces taken from GPRS, like the
different GPRS support nodes (GSN)
5 | 49
Communication Systems
Communication Systems
UMTS the physical layer
ChipsinsteadofcombinedTDM,FDM
...
7 | 53
Communication Systems
UMTS - WCDMA
Alternating
8 | 49
Communication Systems
UMTS - WCDMA
9 | 49
Communication Systems
UMTS - WCDMA
10 | 49
Communication Systems
UMTS - WCDMA
WCDMA:
Codemultiplex vs.
Frequency / time multiplex
Multiple signale on just
one frequency
Demultiplexing
independent of channel
bundling
Per participant a binary
channalization code is
used
11 | 49
Communication Systems
UMTS - WCDMA
12 | 49
Communication Systems
13 | 49
Communication Systems
14 | 49
Communication Systems
15 | 49
Communication Systems
16 | 49
Communication Systems
UMTS WCDMA
17 | 49
Communication Systems
The VLR or SGSN which should authenticate the user requests from
the HLR/AuC 1..n AV(Auth Vectors)
18 | 53
Communication Systems
19 | 53
Communication Systems
20 | 53
Communication Systems
XOR, || concatenation
21 | 53
Communication Systems
XRES=f2 (RAND)
CK=f3 (RAND)
IK=f4 (RAND)
22 | 53
Communication Systems
AK=f5 (RAND)
SQN=(SQN AK) AK
RES=f2 (RAND)
23 | 53
Communication Systems
CK=f3 (RAND
IK=f4 (RAND)
24 | 53
Communication Systems
Topic switch:
stay in the mobile network domain but switch from mobile telephony
part
Communication Systems
Wireless LAN technology - introduction
26 | 49
Communication Systems
wireless technology - introduction
Problems to be solved
which differences exist in comparison to wired LAN
27 | 49
Communication Systems
wireless technology - introduction
28 | 49
Communication Systems
wireless LAN - history
Communication Systems
wireless LAN basics
30 | 49
Communication Systems
31 | 49
Communication Systems
32 | 49
Communication Systems
33 | 49
Communication Systems
wireless LAN media acess
34 | 49
Communication Systems
wireless LAN media access
WEP encryption
auto roaming
with the latter a unified network over more than one station
becomes possible
other layer is physical layer convergence protocol
e.g. defines modulation: FHSS, DSSS, HR-DSSS,
OFDM, IrDA
35 | 49
Communication Systems
1 talks to 2
36 | 49
Communication Systems
37 | 49
Communication Systems
38 | 49
Communication Systems
39 | 49
Communication Systems
Communication Systems
41 | 49
Communication Systems
42 | 49
Communication Systems
Communication Systems
44 | 49
Communication Systems
more than one access point in a given area possible if channels are at
least by a number three away from each other
WLAN of 802.11 offer several operation modes
Access Point (flow control between base station and switch or more than
one base station for roaming etc.)
45 | 49
Communication Systems
46 | 49
Communication Systems
47 | 49
Communication Systems
You can define up to four keys on a device, but you can use
only one at a time for encrypting outbound frames.
48 | 49
Communication Systems
problems
WLANs are very open
49 | 49
Communication Systems
802.1X - Network Port Authentication
50 | 49
Communication Systems
802.1X - Architecture and component
51 | 49
Communication Systems
802.1X - Architecture and component
52 | 49
Communication Systems
802.1X - EAPOL Encapsulation
53 | 49
Communication Systems
802.1X - Typical 802.1X exchange on 802.11
54 | 49
Communication Systems
802.1X - Typical 802.1X exchange on 802.11
1. The supplicant associates with the 802.11 network.
2. The supplicant starts the 802.1X exchange with an EAPOL-Start
message (step is optional)
3. The authenticator (access point) issues an EAP-Request/Identity
frame
4. The supplicant replies with an EAP-Response/Identity frame, which
is passed on to the RADIUS server as a Radius-Access-Request
packet
5. The RADIUS server determines the type of authentication that is
required, and sends an EAP-Request for the method type. The EAPRequest is encapsulated in a Radius-Access-Challenge packet to
the AP. When it reaches the AP, the EAP-Request is passed on to
the supplicant.
55 | 49
Communication Systems
802.1X - Typical 802.1X exchange on 802.11
1. The supplicant gathers the reply from the user and sends an EAPResponse in return. The response is translated by the authenticator
into a Radius-Access-Request with the response to the challenge as
a data field. Steps 5 and 6 repeat as many times as is necessary to
complete the authentication
2. The RADIUS server grants access with a Radius-Access-Accept
packet, so the authenticator issues an EAP-Success frame and
authorizes the port
3. Immediately following receipt of the Access-Accept packet, the
access point distributes keys to the supplicant using EAPOL-Key
messages
4. Once keys are installed in the supplicant, it can begin sending data
frames to access the network
5. When the supplicant is done accessing the network, it sends an
EAPOL-Logoff message to put the port back into an unauthorized
state
56 | 49
Communication Systems
57 | 49
Communication Systems
End/Literature
UMTS
802.11 WLAN
http://dienst.isti.cnr.it/Dienst/Repository/2.0/Body/ercim.cnr.isti/2004TR-27/pdf?tiposearch=cnr&langver
Security: