1. Trang chủ
  2. » Công Nghệ Thông Tin

Scalable voip mobility intedration and deployment- P17 pdf

10 386 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Cấu trúc

  • NewNes Publishing - Scalable VoIP Mobility (2009) (ATTiCA)

  • Dedication

  • Introduction to Voice Mobility

    • Introduction to Voice Mobility

      • Why Voice Mobility?

      • Audience and Expected Background

      • How to Read This Book (Chapter Layout)

  • Voice Mobility Technologies

    • Voice Mobility Technologies

      • Introduction

      • The Anatomy of a Voice Call

        • The People and Their Devices: Phones

        • The Separate Channels: Signaling and Bearer

        • Dialing Plans and Digits: The Difference Between Five- and Ten-Digit Dialing

        • Why PBXs: PBX Features

      • Signaling Protocols in Detail

        • The Session Initiation Protocol (SIP)

          • SIP Architecture

          • SIP Registration

          • Placing a SIP Call

          • A Rejected SIP Call

          • Hanging Up

          • SIP Response Codes

            • In-Progress Codes

            • Success Code

            • Redirection Codes

            • Request Failure Codes

            • Server Failure Codes

            • Global Failure Codes

          • Authentication

          • Secure SIP

        • H.323

          • H.323 Architecture

        • Cisco SCCP: “Skinny”

        • Skype

        • Polycom SpectraLink Voice Priority (SVP)

        • ISDN and Q.931

        • SS7

      • Bearer Protocols in Detail

        • Codecs

          • G.711 and Logarithmic Compression

          • G.729 and Perceptual Compression

          • Other Codecs

        • RTP

          • Secure RTP

        • SDP and Codec Negotiations

  • Elements of Voice Quality

    • Elements of Voice Quality

      • Introduction

      • What Voice Quality Really Means

        • Mean Opinion Score and How It Sounds

        • PESQ: How to Predict MOS Using Mathematics

        • Voice Over IP: The E-Model

          • Noise Impairment

          • Simultaneous Impairment

          • Delay Impairment

          • Loss and Codec Impairment

      • What Makes Voice Over IP Quality Suffer

        • Loss

        • Handoff Breaks

        • Delay

        • Jitter

        • Non-IP Effects that Should Be Kept in Mind

      • How to Measure Voice Quality Yourself

        • The Expensive, Accurate Approach: End-to-End Voice Quality Testers

        • Network Specific: Packet Capture Tests

        • The Device Itself

  • Voice Over Ethernet

    • Voice Over Ethernet

      • Introduction

      • The IP-Based Voice Network

        • Wireline Networking Technologies and Packetization

          • Ethernet

          • The Internet Protocol (IP)

            • IPv4

            • IPv6

          • UDP

          • TCP

      • Quality of Service on Wired Networks

        • Integrated Services

        • Differentiated Services

        • Quality-of-Service Mechanisms and Provisioning

          • FIFO

          • Classification

          • Round-Robin

          • Strict Prioritization

          • Weighted Fair Queuing

          • Traffic Shaping

          • Policing

          • Random Early Detection

          • Explicit Congestion Notification

  • Introduction to Wi-Fi

    • Introduction to Wi-Fi

      • Introduction

      • The Advantages of Wi-Fi

        • Unlicensed Spectrum

        • The Nearly Universal Presence

        • Devices

      • The Basics of Wi-Fi

        • Access Points

        • Clients

        • The IEEE 802.11 Protocol

          • Frame Formats

          • The Shared Medium

          • Connections and How Data Flows

        • Infrastructure Architectures

          • Wireline: Standalone or “Fat”

          • Wireline: Controller-Based or “Thin”

          • Wireline: Controllerless

          • Wireline: Directly Connected

          • Over-the-Air: Static Microcell

          • Over-the-Air: Dynamic or Adaptive Microcell

          • Over-the-Air: Layered

          • Over-the-Air: Virtualized

      • RF Primer

        • Channels

        • Radio Basics

          • Power and Multipath

          • Noise and Interference

        • RF Planning

      • Wi-Fi’s Approach to Wireless

        • Data Rates

        • Preambles

        • Clear Channel Assessment and Details on Carrier Sense

        • Capture

        • Desensitization and Noise Immunity

        • Hidden Nodes

        • Exposed Nodes

        • Collisions, Backoffs, and Retries

        • Challenges to Voice Mobility

      • The Wi-Fi Radio Types

        • 802.11b

          • 1Mbps

          • 2Mbps

          • 5.5Mbps and 11Mbps

          • Short and Long Preambles

        • 802.11a and 802.11g

          • Preambles, Slots, and Optimizatoins

          • 802.11b Protection

        • 802.11n

          • MIMO

          • Legacy Support

          • Aggregation

          • Double-Wide Channels (40MHz)

          • Coming Down the Road

      • Security for 802.11

        • Wi-Fi Security Technologies

          • WEP

            • Keying

            • Encryption

            • Integrity

            • Overall

          • RSNA with 802.11i

          • WPA and TKIP

          • WPA2 and AES

          • Wi-Fi Link Security: Summary

        • 802.1X, EAP, and Centralized Authentication

          • What Is Authentication in 802.1X?

          • 802.1X

          • Key Caching

        • Putting It All Together: An Example

      • Wi-Fi

        • Introduction

        • What Do Modulations Look Like?

        • What Does the Channel Look Like?

        • How Can MIMO Work?

        • Why So Many Hs? Some Information Theory

  • Voice Mobility over Wi-Fi

    • Voice Mobility over Wi-Fi

      • Introduction

        • Quality of Service with WMM—How Voice and Data Are Kept Separate

          • How WMM Works

        • Battery Life and Power Saving

          • Legacy Power Save

          • WMM Power Save

      • Technologies that Address Voice Mobility with Wi-Fi

        • Admission Control: The Network Busy Tone

          • SIP-Based Admission Control

          • WMM Admission Control

          • How the Capacity Is Determined

        • Load Balancing

          • Mechanics of Load Balancing

          • Understanding the Balance

        • Power Control

        • Voice-Aware Radio Resource Management

        • Spectrum Management

        • Active Voice Quality Monitoring

      • Inter-Access Point Handoffs

        • The Difference Between Network Assistance and Network Control

        • The Scanning Process

          • The Scanning Table

          • The Scanning Process

          • When Scanning Happens

          • The Decision

        • The Wi-Fi Break-Before-Make Handoff

        • Reducing Security Handoff Overhead with Opportunistic Key Caching

        • An Alternative Handoff Optimization: 802.11r

          • 802.11r Key Caching

          • 802.11r Transitions

          • Preauthentication Resource Allocation

          • 802.11r in Wireless Architectures

        • Network Assistance with 802.11k

          • The Capabilities of 802.11k

          • Requests and Reports

          • Beacon Reports

          • Neighbor Reports

          • Link Measurement and Power Reporting

          • Traffic Stream Metrics

          • Other Features of 802.11k

          • What 802.11k Is Not

        • Network Control with Channel Layering and Virtualization

          • The Mechanics of Channel Layering Handoffs

          • The Role of 802.11k and 802.11r

      • Wi-Fi Alliance Certifications for Voice Mobility

        • WMM Certifications

        • Voice Certifications

      • Real Concepts from High-Density Networks

        • RF Modifications for Voice Mobility

          • Less Voice than Data

          • Mostly Voice

        • Site Survey

        • Continuous Monitoring and Proactive Diagnostics

        • When All Else Fails

  • Voice over Cellular and Licensed Spectrum

    • Voice over Cellular and Licensed Spectrum

      • Introduction

      • Anatomy of a Cellular Phone Call

        • Mobility in Cellular

        • Mobile Call Setup

          • Handoff

      • Cellular Technologies

        • 2G Technologies

          • GSM

          • GSM Radio

          • GSM Data

          • CDMA

        • 3G Technologies

          • 3GSM: UMTS and HSPA

          • CDMA2000: EV-DO

        • 4G: WiMAX

          • Basics of WiMAX

          • Uses of WiMAX

        • 4G: LTE

      • Fixed-Mobile Convergence

        • Enterprise-Centric FMC

          • Enterprise FMC Features and Benefits

        • Cellular-Centric FMC

        • Cellular-Centric FMC Features and Benefits

      • Handoff Between Different Networks: Handing In and Handing Out

        • The Handoff Problem

      • Cellular-Centric Technology with UMA

      • Potential Alternatives to FMC: Cellular-Only Technology

  • Securing Voice

    • Securing Voice

      • Introduction

      • Principles of Security

      • Authentication, Authorization, and Accounting Services with RADIUS

        • The Basic RADIUS Protocol

        • EAP

        • Certificate-Based Authentication

          • Public-Key Cryptography

          • Certificates

          • TLS and SSL

            • EAP-TLS

        • Secure Password-Based Authentication

        • Cardkey Authentication

        • SIM and AKA: Cellular Authentication over IP

      • Protecting Your Network End-to-End

        • Generic IP Encryption: IPsec

          • IPsec Key Negotiation

        • Application-Specific Encryption: SIPS and SRTP

        • Consequences of End-to-End Security

      • Protecting the Pipe

      • Physically Securing the Handset

        • Preventing Theft

      • Physically Protecting the Network

  • The Future: Video Mobility and Beyond

    • The Future: Video Mobility and Beyond

      • Introduction

      • Packetized Video

        • Video Encoding Concepts

        • Video Compression

          • Still Image Compression

          • Motion Compression

        • Video Signaling and Bearer Technologies

          • Video Bearer

          • Video Signaling

        • Video Networking

      • Beyond Voice and Video

  • References

    • References

      • Chapter 2

      • Chapter 3

      • Chapter 4

      • Chapter 5

      • Chapter 6

      • Chapter 7

      • Chapter 8

      • Chapter 9

  • Index

    • Index

      • A

      • B

      • C

      • D

      • E

      • F

      • G

      • H

      • I

      • J

      • K

      • L

      • M

      • N

      • O

      • P

      • Q

      • R

      • S

      • T

      • U

      • V

      • W

      • X

      • Y

Nội dung

160 Chapter 5 www.newnespress.com 0°180° 90° -90° 16-QAM quadrature axis (Q) x x x xx x x x xx x x x x x x 0°180° 90° -90° 64-QAM quadrature axis (Q) x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x xx xx x x x x x x x x x x x x x x x x x x x x x xxx x x x x in-phase axis (I) in-phase axis (I) Figure 5.21: 16-QAM and 64-QAM Introduction to Wi-Fi 161 www.newnespress.com source bits and record whether that sum is even or odd as one additional bit. If one bit is lost, the sum of the surviving bits can be compared in evenness to the sum bit, therefore recovering the original data. This is called a parity check code, and conceptually introduces the concept of using arithmetic on some or all of the source bits to produce the extra bits. 802.11ag uses a convolutional encoder to expand the source bits, in this case producing twice the number of bits but, unlike the doubler, doing so more intelligently to avoid some loss patterns of equal bit losses being worse than others. This expansion still produces only one data rate, at a 1 2 -coding rate per modulation. To produce the other coding rates, 802.11ag just uses the property that the error-correcting code can tolerate loss, and goes ahead and starts tossing bits to get to a higher coding rate. This process, called puncturing, sounds inefficient by reducing redundancy that was just added (why not just not add as many extra bits in the first place?), but ends up saving on the complexity of the coding hardware, the radio. The overall picture, then, for 802.11ag encoding is for the data bits to be scrambled (as with 802.11b), then expanded with the error-correcting code, then split among the subcarriers, and then modulated. Because of the larger number of things going on in the signal, there is more risk of losing data if the receiver’s timing goes off a bit from the sender’s. To compensate, timing is maintained by the addition of four pilot subcarriers. These carry a known signal pattern— like the preamble—but do so for the length of the transmission. If the receiver’s clock speeds up or slows down relative to the sender’s, then the constellation would essentially rotate, and as the constellation points are now closer together than with 802.11b, the rotation would cause the receiver’s bits to jumble. The pilot subcarriers’ known pattern lets the receiver adjust as needed. 5.5.2.1 Preambles, Slots, and Optimizatoins The preambles of 802.11ag are at 6Mbps, the lowest 802.11ag data rate. They are also significantly shorter than the short 802.11b preambles: 40 microseconds for 802.11ag. Improvements in signal processing technology since 802.11b came along allowed the designers to not need to provide as much synchronization time. Furthermore, the radios can stop receiving and start transmitting more quickly for 802.11ag than they were expected to be able to do for 802.11b. This allows 802.11ag to use shorter slots than 802.11b, allowing for less wasted time. For 802.11g, short slots are an option, and are determined based on the presence of 802.11b clients, to prevent 802.11g clients from using a different contention scheme. 802.11a always assumes the faster slots. 5.5.2.2 802.11b Protection 802.11a has no legacy clients to deal with. However, 802.11g is in the 2.4GHz band, and has to avoid destroying 802.11b performance when the two devices are present together. 162 Chapter 5 www.newnespress.com This destruction would occur because 802.11b radios use carrier detection (see Section 5.4.3) to determine whether the channel is clear before transmitting, and that means that the 802.11b devices are looking for 802.11b transmissions. 802.11g transmissions, however, look nothing like 802.11b, and so 802.11b radios would end up only seeing 802.11g as some sort of foreign interference. To prevent this from disrupting any 802.11b device’s traffic, 802.11g introduces the notion of CTS-to-self protection. Because 802.11b clients can only see 802.11b traffic, a way to stop them from transmitting when an 802.11g transmission will start is for the 802.11g device to send an 802.11b (legacy) CTS message first. This CTS message, sent not as a part of an RTS/CTS transaction (see Section 5.4.6) but from the 802.11g sender to, nominally, itself, sets the virtual carrier sense for all devices that can hear it. The CTS frame has a Duration field—or the length of time to quiet the other stations—long enough to let it finish the 802.11g transmission that will follow. CTS-to-self protection is automatically turned on for any AP that has 802.11b legacy clients associated to it, or for access points who overhear neighboring access points that have 802.11b clients assigned to them. This CTS-to-self message can be incredibly inefficient, and has the potential to disrupt voice mobility networks, as will be mentioned later in this chapter. 802.11g data rates, even though they are identical to 802.11a data rates, may go by the additional term ERP in product literature. The term, short for Extended Rate PHY, is typical of the language used in the 802.11 standard (worse abuses will come up in the next section), but is good to know for when it occasionally slips into product documents for users. When you see ERP, think 802.11g, and when you see non-ERP, think 802.11b-only legacy devices. Neither term is correct for 802.11a devices, which are just known as 802.11a. 5.5.3 802.11n 54Mbps seemed like a lot at the time, but enterprise wireline networks operate at 100Mbps or more. To allow for even higher data rates, IEEE has embarked upon the 802.11n standard. 802.11n revolutionizes Wi-Fi by adding another radio breakthrough, as well as a long list of additional enhancements and optimizations. The most important addition 802.11n brings is the use of a technology called multiple-in, multiple-out (MIMO). MIMO does something that seems counterintuitive—almost magical—to those used to thinking about how two radios transmitting at once cause collisions and destroy wireless networks. MIMO transmits multiple signals at once, on the same channel, at the same time, and at the same power levels. However, MIMO is not magic, just math, and is able to greatly increase the speed of the network. Introduction to Wi-Fi 163 www.newnespress.com MIMO works by requiring each device to have multiple antennas. These antennas are not terribly far apart—a few inches at the most—but they need to be present. MIMO then splits the data across those antennas, sending out multiple spatial streams. These streams go over the air at the same time, and the receiver uses multiple antennas to pick up this transmission, applies some math to separate back out the streams, and then recombines the data. We will go through how this multiple simultaneous transmissions work in a moment. However, because MIMO has some general rules that the products using them need to follow, let us start with those rules, and the state of the technology. 802.11n is a very new standard, and, for 2008 and most of 2009, was not yet finished. However, every major Wi-Fi vendor was selling 802.11n-based products. How can this happen? As it turns out, major parts of 802.11n were complete enough for vendors to build products to from 802.11n Draft 2.0. The features that were complete enough, and were also interesting enough to encourage users to purchase products based on them, were written down by the Wi-Fi Alliance into an industry certification program, also known as 802.11n Draft 2.0. This program specifies a rigorous set of interoperability tests, to ensure that vendors that pass it have built their devices to the same specification (as in, they didn’t make major errors). The existence of the certification program should bring you comfort in knowing that 802.11n devices will work together. For 802.11n Draft 2.0 products, the Wi-Fi Alliance, which uses its role to ensure that devices interoperate, happened to do their work a bit earlier than IEEE. As it has turned out, however, the Draft 2.0 feature set and program are essentially the same as those for the final standard. This makes sense, because the vendors that figure prominently in IEEE and the Wi-Fi Alliance had a tremendous incentive to ensure that the final standard was only minimally changed from the draft. What features do 802.11n devices commonly provide? Table 5.13 lists them. The main feature is the ability to provide 300Mbps data rates for clients. This is achieved by using two spatial streams and double-wide 40MHz channels. (The standard defines up to four spatial streams, and some—but not most—devices can accommodate three streams, yet the overwhelming majority to date can use only two.) Furthermore, the WMM and aggregation optimizations go a long way towards closing the gap between the data rate and the actual highest application throughput. Ignoring the MIMO aspect, 802.11n is similar to 802.11ag. It too is OFDM, with exactly the same subcarrier setup as 802.11ag, except for increasing the number of data subcarriers by four to 52 (and thus slightly increasing the frequency width). Additionally, the symbol is usually still 4 microseconds; however, there is an optional mode known as short guard interval that shaves 400 nanoseconds off the symbol’s length, getting a slightly higher kick in throughput. There are still eight modulation and coding rates that establish the data rates, 164 Chapter 5 www.newnespress.com except that one BPSK mode is removed and another 64-QAM mode, with an even higher coding rate, is added. These eight rates, however, are multiplied into a much higher number of rates, based on the channel width, the number of spatial streams, and the guard interval. All together, the notion of data rates being signaled in the products by Mbps has been abandoned, and replacing it is the concept of the modulation and coding scheme (MCS), based on a small number representing what the actual parameters are in a table. This is similar to how simple channel numbers represent much more complicated frequencies. Table 5.14 contains the common two-stream set for 802.11n devices and encompasses 60 different data rate options, each with its own slightly different SNR requirement, channel width, or robustness. There are additional features that 802.11n has as options, which are not commonly implemented but could be of great benefit for voice mobility. Among these features are space-time block codes (STBC), transmit beamforming, and extended power save capabilities. However, because these features have not yet become commonplace, their use is rather limited. 5.5.3.1 MIMO As mentioned before, MIMO lets the devices transmit at, three times, or four times by using as many spatial streams. The general rule for MIMO, as a theory, is that the number of spatial streams usable is the lesser of the number of antennas that can be used simultaneously on the transmitter and the receiver. In theory, a 100-antenna transmitter and a 50-antenna receiver could allow for a 50 (< 100) spatial stream radio. In practice, there are limits. 802.11n defines only four spatial streams maximum. The Wi-Fi Alliance Draft 2.0 certification tested for only two spatial streams, and most devices today remain only capable of two streams. The reasons are rather simple. More antennas require more room for antennas, and it is hard to find room to place them. Also, more antennas Table 5.13: 802.11n Common features 802.11n Features Meaning Two spatial streams Doubles performance over non-MIMO Aggregation Allows for very high efficiency WMM Quality-of-service is mandatory (see Section 6.0.1) WPA2 High-grade encryption support is mandatory (see Section 5.6.1.1) 40MHz wide channels Doubles performance over 20MHz 300Mbps Top data rate MRC/Receive Beamforming Longer range in some cases Introduction to Wi-Fi 165 www.newnespress.com require more radio chains—an 802.11n radio is actually made of multiple copies of the parts needed to make an 802.11ag radio work—and those are expensive and draw power. Finally, practical considerations prevent higher numbers of simultaneous streams from working well. Now, for the description of why MIMO works. For this example, assume that the sender and receiver each have three antennas, but follow the industry norm of using only two spatial streams. The sender divides its signal into two spatial streams, then spreads its two streams across the three antennas. Those two streams from three signals bounce around the environment, and end up as three different signals at the receiver, one for each of the receiver’s antennas. Each of those three signals is some different combination of the three signals from the sender, and thus is some different combination of the two spatial streams. This is where the math sets in. The different combinations are usually very different. If you Table 5.14: The 802.11n data rates MCS Modulation Bits per Symbol per Subcarrier Coding Rate Spatial Streams Speed 20MHz Long GI 20MHz Short GI 40MHz Long GI 40MHz Short GI 0 BPSK 1 1 2 1 6.5 7.2 13.5 15 1 QPSK 2 1 2 13 14.4 27 30 2 QPSK 2 3 4 19.5 21.7 40.5 45 3 16-QAM 4 1 2 26 28.9 54 60 4 16-QAM 4 3 4 39 43.3 81 90 5 64-QAM 6 2 3 52 57.8 108 120 6 64-QAM 6 3 4 58.5 65 121.6 135 7 64-QAM 6 5 6 65 72.2 135 150 8 BPSK 1 1 2 2 13 14.4 27 30 9 QPSK 2 1 2 26 28.9 54 60 10 QPSK 2 3 4 39 43.3 81 90 11 16-QAM 4 1 2 52 57.8 108 120 12 16-QAM 4 3 4 78 86.7 162 180 13 64-QAM 6 2 3 104 115.6 216 240 14 64-QAM 6 3 4 117 130 243 270 15 64-QAM 6 5 6 130 144.4 270 300 166 Chapter 5 www.newnespress.com write out the two spatial streams, the effects of the sender’s spreading and the channel’s bouncing, and the receiver’s receiving, you can produce a matrix equation, from linear algebra. Because the combinations are different for each antenna—linearly independent, in fact—the receiver can undo the effects of the channel using linear algebra and produce the original streams. For further explanation, see the appendix at the end of this chapter. Basically, the MIMO receiver uses the preamble of the frame that is sent to discover what the effects of the channel are on the streams, and then uses that to undo those effects. The effect of having multiple antennas when only one spatial stream is used (and a main effect as a part of MIMO) is for beamforming. There are two parts to beamforming: receive beamforming, and transmit beamforming. The term beamforming arose from RADAR, where stationary equipment used electronics and a large number of antennas to set up interference patterns just right to concentrate a signal in a direction or to a point, as if the antennas were mounted on a swivel and were pointed, although they are not. Receive beamforming isn’t necessarily thought of the same way as transmit beamforming, but is the major reason why 802.11n has higher range than 802.11abg. There are a number of techniques for doing what could be called receive beamforming. One term used surprisingly often by vendors in describing their products in data sheets is maximum ratio combining (MRC). To understand it at a high level, the receiver is twiddling with how it combines the signals received on each of its antennas to maximize the power of the final signal it received. Because of the way interference patterns and combinations work, it turns out that the twiddling it does is a unique pattern (H, the channel matrix, if you read the math briefing) based on the client’s location. But because receive beamforming learns that pattern when it sees the preamble (same as MIMO), this is not a problem, and the end result is an apparent amplification of the signal, thus increasing range for reception. 802.11n clients with MIMO have longer range on legacy access points than legacy clients do, for that reason. Therefore, if you need to extend the range of a couple of clients, your best bet is to upgrade the clients to 802.11n. (Upgrading the access points without upgrading the clients may not increase range at all in many cases.) Transmit beamforming is also possible. 802.11n defines two types of beamforming, known as explicit and implicit beamforming. Explicit beamforming uses the cooperation of the receiver to determine the best way of combining signals across the transmitter’s antennas for forming the signal to the receiver. This cooperation requires features on the receivers that are not commonly implemented. Implicit beamforming simply requires the transmitter, assuming that the channel it sees from the receiver when that device transmits is the same as what the receiver sees from the transmitter. By assuming this reciprocity, the transmitter does not need to involve the receiver. However, it is forced into its guess, which may not be correct, and requires that the transmitter always keep tabs on the receiver’s channel conditions by either sending an RTS to it before every packet, thus eliciting a responding Introduction to Wi-Fi 167 www.newnespress.com CTS that will help uncover the channel conditions, or by winging it and hoping the receiver doesn’t move much. For this reason, some vendors are limiting their transmit beamforming support to only legacy, non-802.11n clients. Transmit beamforming is an interesting concept for voice mobility networks based on the microcell approach of reducing transmit power levels to begin with. 5.5.3.2 Legacy Support Legacy, in the context of 802.11n, means 802.11ag as well as 802.11b. To avoid the same problem of 802.11g possibly being interfered with by 802.11b here, with 802.11ag stepping on 802.11n, 802.11n uses a different form of protection. Instead of the wasteful CTS frames, and the protocol necessary to decide whether a CTS frame is needed, 802.11n uses a special preamble. The preamble first starts off as an 802.11ag preamble, not only at 6Mbps but signaling a 6Mbps data rate for the following data, and including a length that will encompass the entire 802.11n frame. However, as soon as the preamble is over, the 802.11n radio stops transmitting in 802.11ag, and switches over to 802.11n, where it continues with more preamble fields, including the real data rate. 802.11n devices see the entire frame. 802.11ag devices see the preamble only, but defer just as if the frame were all 802.11ag but out of range. Thus, the technologies do not interfere. For 802.11b clients, 802.11n still uses an 802.11b CTS frame. 5.5.3.3 Aggregation 802.11 frames have to have the preamble, but there was no particular reason that one preamble couldn’t cover multiple frames. 802.11n introduces this concept with frame aggregation, or A-MPDUs. A-MPDUs are a special type of jumbo frame that contains multiple 802.11 data frames sent from and to the same wireless device. Up to four milliseconds or roughly 64,000 bytes can be packed into one of these aggregates. In almost every sense, an A-MPDU can just be thought of as a concatenation of data: every byte is sent at the same data rate that the preamble calls out, and the A-MPDU is retransmitted in full if the expected acknowledgment does not come back immediately from the receiver. However, unlike a simply larger data frame, if some of the data frames within the aggregate are received and others are not, the receiver can indicate this by using a special Block Acknowledgment. This block acknowledgment specifies precisely which of the senders’ frames were received and which had errors in them. For those frames that were not received, the sender can choose to add those to later aggregates, thus not wasting time resending frames that already arrived. The main benefit of aggregation is to reduce the overhead of the preamble and backoff for 802.11n. 168 Chapter 5 www.newnespress.com 5.5.3.4 Double-Wide Channels (40MHz) Double-wide channels work by bonding together two adjacent 20MHz channels into one larger 40MHz channel. This 40MHz channel acts just like a wider 20MHz channel, but offering data rates slightly higher than twice that of the 20MHz channel. (The slight increase over twice comes from using up the gap between channels as usable bandwidth.) There is some inconsistency in the naming of this feature in the industry. Some devices call it “double-wide,” others call it “channel bonding,” and others call it just “40MHz.” We’ll use “double-wide” and “40MHz” for this description. Double-wide channels are named by the 20MHz channels that they occupy. There are a few nomenclatures in active use, but all are just slight variations of the basic concept. There is a primary channel and an extended channel in a 40MHz channel name. 40MHz channels can operate with 20MHz devices, but only on one 20MHz half of the double-wide channel. This one half is the primary channel. The other half is used only for the rest of the 40MHz transmissions, and is thus the extended channel. For example, a 40MHz channel selection that has a primary channel of 36 and an extended channel of 40 can be written as 36+1, (36, +1), 36U, 36H, and so on. The same 40MHz channel, but with the primary being on the other half, can be written as 40−1, (40, −1), or 40L. It is useful to keep in mind, however, that a 40MHz frame only sees one 40MHz channel, and is not split itself into two separate 20MHz frames for each half, unlike what the terminology suggests. There are a few considerations for double-wide channels. The first is that both 20MHz channels that are within the 40MHz should be empty. This is especially true for the extension channel, which should not have any other access points using that channel, unless a layered or virtualized over-the-air architecture is used that can support that. Certainly, no access point should be deployed such that its primary (or only) channel is 40 if 36+1 is being used anywhere around that access point. The second consideration is that some devices cannot support 40MHz, and so will use only the primary half of the channel. This is obviously true for legacy (non-802.11n) devices, but is also true for some 802.11n devices. Some 802.11n devices are not designed to take advantage of double-wide channels, and a few early 802.11n devices had support for double-wide channels in the 2.4GHz band turned off, though newer devices from those manufacturers have solved that problem. The third consideration is that there are only half as many 40MHz channels as there are 20MHz channels, and the direction a 40MHz channel may extend is limited. This is to avoid the overlap mentioned earlier, but ends up leading to channel waste unless channels Introduction to Wi-Fi 169 www.newnespress.com are carefully planned. For example, channels 36 and 40 can be bonded, but channels 40 and 44 can never be, by rule. If channel 36 is being used by an existing 20MHz network, then channel 40 can never be used with a 40MHz channel in that case. The 2.4GHz band does not have the limitation of which direction a 40MHz channel can extend, but because the bandwidth is so limited, only one 40MHz channel can be created successfully. The network or administrator can usually choose which. Keep in mind that dynamic architecture vendors recommend against using double-wide channels in the 2.4GHz band, because using it on that architecture eliminates a channel that is necessary for the alternating channel plan to work with. Layered and virtualized architectures do not have this limitation. 5.5.3.5 Coming Down the Road 802.11 is still growing. As of this writing, there is a push to expand the technology to increasing bands—such as the spectrum opened up by the end of analog television broadcasts in 2009. These technologies will not show up for a few years, however, and should not affect voice mobility networks that are being considered for deployment in the near future. 5.6 Security for 802.11 Security is a broad subject, and there is an entire chapter dedicated to the unique challenges with security for voice mobility later. But any component of voice mobility over Wi-Fi will require some use of 802.11’s built-in encryption. Keep in mind that securing the wireless link is not only critical, but may be the only encryption used to prevent eavesdroppers from listening in on sensitive voice calls for many networks. 802.11 security has both a rich and somewhat checkered past. Because of the initial application of 802.11 to the home, and some critical mistakes by some of the original designers, 802.11 started out with inadequate protection for traffic. But thankfully, all Wi-Fi- certified devices today are required to support strong security mechanisms. Nevertheless, administrators today do still need to keep in mind some of the older, less secure technologies—often because the mobile handset might not correctly support the latest security, and it may fall to you to figure out how to make an old handset work without compromising the security of the rest of the network. A secure wireless network provides at least the following (borrowed from Chapter 8): • Confidentiality: No wireless device other than the intended recipient can decrypt the message. . using them need to follow, let us start with those rules, and the state of the technology. 802.11n is a very new standard, and, for 2008 and most of 2009, was not yet finished. However, every major. streams, and the guard interval. All together, the notion of data rates being signaled in the products by Mbps has been abandoned, and replacing it is the concept of the modulation and coding. the Draft 2.0 feature set and program are essentially the same as those for the final standard. This makes sense, because the vendors that figure prominently in IEEE and the Wi-Fi Alliance had

Ngày đăng: 03/07/2014, 19:20

TỪ KHÓA LIÊN QUAN