Seade_8_2

advertisement
Sideseadmed (IRT0040)
2.5 AP
Avo
LOENG 2
Raadiressursi jaotus
Operator A
Operator B
Operator N
Joint
radio
access
system
Joint
frequency
range
Infrastructure based networks
Uses fixed base stations (infrastructure) which
are responsible for coordinating
communication between the mobile hosts
(nodes)
Hidden Nodes - a QoS Issue
• If you can’t see a frame you
can’t avoid colliding
• RF characteristics make it
hard to see all frames
• Hidden nodes usurp priority
and break service
commitments
• Only the AP can see and be
seen by all nodesHidden
• The Light Weight Access Point Protocol is used
between APsand a WLAN Controller
• LWAPP carries control and data traffic between the
two
• It facilitates centralized management and
automated configuration
• Open, standards-based protocol
––Submitted to IETF CAPWAP WG
Lightweight AP WLAN Concept
Autonomous Deployments
•Each AP had its own view of the network – like
standalone cell towers
•No hierarchical view of the RF – or the network
Centralization – not a new idea
• Original cellular
networks were nodal.
• Lots of call drops
• Lots of administration
• Roaming wasn’t very
good
• Not capable of
providing advanced
services
Enter the Base Station Controller
Management/Control
• Complete view
of the network
• Improved
roaming
• One point of
administration
• Enabled
provisioning of
advanced
call
services
Base stations are used to handle
setup, handovers, and other functions
across an entire cellular network.
Enter The Wireless Controller
DHCP
LWAPP
DNS
RADIUS
ACS
HPOV
Control and Management
System Layers
Basic LWAPP Architecture
AC
LWAPP
(C=0)
802.11
AssocReq
LWAPP
(C=0)
802.11
AssocResp
LWAPP
(C=0)
802.11
Data Frame
WTP
802.11
AssocReq
802.11
AssocResp
802.11
Data Frame
STA
Unified Wireless Network
Unified Advanced Services
Si
Si
–Unified cellular and Wi-Fi VoIP. Advanced
threat detection, identity networking,
location-based security, asset tracking and
guest access.
World-Class Network Management
–Same level of security, scalability,
reliability, ease of deployment, and
management for wireless LANs as wired
LANs.
Network Unification
•Integration into all major switching and
routing platforms. Secure innovative
WLAN controllers.
Mobility Platform
•Ubiquitous network access in all
environments. Enhanced productivity.
Proven platform with large install base and
Client
Devices
61% market share.
Plug
and play.
•90% of Wi-Fi silicon is Certified. “Out-ofthe-Box” wireless security.
Centralized Wireless LAN Architecture
• Controller
– 802.11 MAC Mgmt – (re)association
requests & action frames
– 802.11 data – encapsulate and sent to AP
– 802.11e Resource Reservation – control
protocol carried to AP in 802.11 mgmt
frames – signaling done in the controller.
– 802.11i Authentication & Key exchange
• AP
– 802.11 – beacons, probe response, auth
(if open)
– 802.11 control – packet ack &
retransmission (latency)
– 802.11e – frame queuing & packet
prioritization (real-time access)
– 802.11i – Layer 2 encryption
WLAN Controller
LWAPP
Lightweight
Access Points
LWAPP
•LWAPP - Light Weight Access Point Protocol is used
between
APs and WLAN Controller
•LWAPP carries control and data traffic between the two
– Control plane is AES-CCM encrypted
– Data plane is not encrypted
•It facilitates centralized management and automated
configuration
Business Application
•Open, standards-based protocol (Submitted
to IETF
Data Plane
Point
CAPWAPAccess
WG)
LWAPP
Controller
WiFi Client
Control Plane
Protocol for Centralization
• LWAPP = LightWeight Access
Point Protocol
• Standardized Interface between
an access point and a centralized
controller
• Defines:
– Association of APs
Authentication of APs
Control of APs
Controllers
•
•
•
•
•
•
Security Policies
Wireless IDS
QoS Policies
RF Management
Mobility Management
IPSec Encryption
• Works across L2 / L3 boundaries
• Design goals:
–
–
–
Zero-config deployment
Secure deployment
Centralization
Access Points
•
•
•
Remote RF interface
Timing critical
functions
L2 Encryption
LWAPP Modes Layer 2
• Layer 2 LWAPP is in an
Ethernet frame (Ethertype
0xBBBB)
• Cisco WLAN Controller and
AP must be connected to the
same VLAN/subnet
LWAPP-L2 : Data Message
MAC Header
LWAPP Header (C=0)
LWAPP Header (C=1)
Data …
Control Msg
LWAPP-L2
Lightweight
Access Points
LWAPP-L2 : Control Message
MAC Header
Cisco WLAN Controller
Control Elts …
LWAPP Modes Layer 3
•Layer 3 LWAPP is in a UDP / IP frame
– Data traffic uses source port 1024 and destination
12222
– Control traffic uses source port 1024 and
destination port 12223
Cisco WLAN Controller
•Cisco Controller and AP can be
connected to the same VLAN/subnet or
connected to a different VLAN/subnet
•Requires IP addressing of Cisco
Lightweight AP
LWAPP-L3 : Data Message
MAC Header
IP
UDP=12222
LWAPP Header (C=0)
Data …
LWAPP-L3
LWAPP-L3
Lightweight
Access Points
LWAPP-L3 : Control Message
MAC Header
IP
UDP=12223
LWAPP Header (C=1)
Control Msg
Control Elts …
The need for Client Mobility
• Wireless LAN is not only
about wire-less
• Need for mobility, and not
only “hotspot” connectivity
• Mobility is when a client
move from one Access Point
to an other
• Access points can be on a
single Controller or on
different Controller
• Client need to keep IP
connectivity (same IP
address)
• Client Mobility is mandatory
for some applications (Voice,
Video, Business Applications,
…)
Controller 1
Controller 2
Subnet A
AP A
AP B
Subnet B
AP C
AP D
Client Mobility
• Different Client Mobility levels
L2 Mobility
L3 Mobility : Conceptually similar to Proxy
Mobile IP
– Foreign and Anchor Controllers
– Asymmetric traffic flow
• What about Security ?
PKC – Proactive Key Caching
WPA2 / 802.11i Fast Roaming
Mobility Groups
• Mobility Group is a “Cluster of
Controllers” that share information
between them (e.g. client context
and state, controller “load”, etc.)
Controller-B
MAC: AA:AA:AA:AA:AA:02
• Up to 24 Controllers per
Mobility Group
• Mobility Group facilitates
seamless roaming at both L2 & L3
IP connectivity between all
devices
Same Mobility Group Name
(IS case sensitive)
Same Virtual Interface
IP address
Each device is configured with
the MAC and IP of every other
device in the group
Mobility Group Neighbors:
Controller-A, AA:AA:AA:AA:AA:01
Controller-C, AA:AA:AA:AA:AA:03
Controller-A
MAC: AA:AA:AA:AA:AA:01
Mobility Group Name: MyMobilityGroup
Mobility Group Neighbors:
Controller-B, AA:AA:AA:AA:AA:02
Controller-C, AA:AA:AA:AA:AA:03
et
ern
Eth
Ov
Eth
ern
et
IP
er
Ov
e
el
nn
Tu
r IP
Tu
nn
el
Ethernet Over IP Tunnel
• Configuring a Mobility Group:
Mobility Group Name: MyMobilityGroup
Controller-C
MAC: AA:AA:AA:AA:AA:03
Mobility Group Name: MyMobilityGroup
Mobility Group Neighbors:
Controller-A, AA:AA:AA:AA:AA:01
Controller-B, AA:AA:AA:AA:AA:02
Layer 2 Mobility
move
•All controllers in same Mobility Group
•Client connects to AP A on Controller 1
– Client database entry created
•Client roams to AP B on Controller 1
Client Database
MAC, WLAN, AP, QoS, IP, Sec,…
– Proactive Key Caching (PKC) provides fast
roam times for WPA2/802.11i clients. No
need to re-authenticate to Radius server.
Controller 1
Mobility
Announcement
Controller 2
•Client roams from AP B (Controller 1) to
AP C (Controller 2)
– Controller 2 makes a Mobility
Announcement to peers in Mobility Group
looking for Controller with client MAC
– Controller 1 responds, handshakes, ACKs
– Client database entry moved to Controller 2
AP A
AP B
AP C
AP D
• PMK data included (master key data from Radius
server)
– Proactive Key Caching provides fast roam
times for WPA2/802.11i clients . No need
to re-authenticate to Radius server.
• Roam is transparent to client
• Same DHCP address maintained
• Proactive Key Caching with WPA2/802.11i
(Funk or MS client)
Layer 3 Mobility
•
•
•
All controllers in same Mobility Group
Ethernet in IP Tunnels automatically
created between controllers
Client connects to AP B on Controller 1
–
•
Client Database
copy
MAC, WLAN, IP, Sec, ANCHOR…
MAC, WLAN, IP, Sec, FOREIGN…
Ethernet in IP Tunnel
Client database entry created as ANCHOR
Client roams to AP C on Controller 2
–
–
–
–
Controller 1
Controller 2 makes a Mobility
Announcement to peers in Mobility Group
looking for Controller with client MAC
Controller 1 responds, handshakes, ACKs
Client database entry copied to Controller 2
•
•
•
Client Database
Controller 2
Mobility
Announcement
Subnet A
Subnet B
Marked as FOREIGN
PMK data included (master key data from
Radius server)
AP A
Proactive Key Caching provides fast roam
times for WPA2/802.11i clients. No need to
re-authenticate to Radius server.
AP B
AP C
AP D
Client roams to AP on 3rd Controller
–
Same as above except FOREIGN client DB
entry moved from previous Foreign
Controller
•
•
•
•
•
Roam is transparent to client
Traffic from client to network exits at Foreign Controller
Traffic to client tunneled from Anchor to Foreign Controller
Same DHCP address maintained
Proactive Key Caching with WPA/802.11i (Funk or MS client)
Specific Mobility : Guest Access
• The traditional approach to segmenting
guest traffic requires ‘pulling’ the guest
VLAN through the corporate network
Internet
– Many companies
can’t or won’t do
this
Isolated
Guest
Corp
User
Corp
Intranet
802.1Q
WLAN
Controller
(Policy)
LWAPP
AP
Corp
SSID
Guest
SSID
Corp
SSID
LWAPP
AP
Guest
SSID
Internet
Tunnel Guest Traffic
• By tunneling all guest traffic to a DMZ controller,
traffic originates and terminates in the DMZ
• Guest clients logically reside in
the DMZ network
• No changes required to existing
infrastructure except adding FW
rules
• Add additional DMZ controllers
for scalability
• Each DMZ controller can handle
up to 40 tunnels
Internet
Guest
WLAN
Controller
EoIP IP Proto 97
“Guest Tunnel”
Corp
Intranet
WLAN
Controller
WLAN
Controller
LWAPP AP
LWAPP AP
Corp
SSID
Guest
SSID
Corp
SSID
Guest
SSID
Ad-hoc networks
• Consists of mobile nodes which
communicate with each other through
wireless medium without any fixed
infrastructure
Ad-hoc
On iseseadistuv võrk,
kus seadmed käituvad ruuteritena
ning võivad oma asukohta ruumis muuta.
MANET
Difficulties for routing
 limited connectivity due to
transmission range of signal
 Low bandwidth
 Higher error rates
 Vulnerable to interference
 Power consumption
 No specific devices to do
routing
 Dynamic nature - high
mobility and frequent
topological changes
Mobile Ad Hoc Networks
• Meaning of the word “Ad hoc” is “for this”,
means “for this purpose only”, implies it is a
special network for a particular application.
• A mobile ad-hoc network (MANET) is a self
configuring network of mobile routers (and
associated hosts) connected by wireless links—the
union of which form an arbitrary topology.
• The routers are free to move randomly and
organize themselves arbitrarily; thus, the network's
wireless topology may change rapidly and
unpredictably.
Characteristics and tradeoffs
• Characteristics
–
–
–
–
Decentralized
Self-organized
Self-deployed
Dynamic network topology
• Tradeoffs
–
–
–
–
􀂄 Bandwidth limited
􀂄 Multi-hop router needed
􀂄 Energy consumption problem
􀂄 Security problem
Adhoc Routing Protocols
Wireless Routing Protocol (WRP)
Proactive
routing
Destination Sequence Distance Vector (DSDV)
routing protocol
Fisheye State Routing (FSR)
Distance Routing Effect Algo. for Mobility
(DREAM)
Location-based routing
Dynamic Source Routing (DSR) protocol
Uniform
routing
Temporally-Ordered Routing Algorithm (TORA)
Reactive
routing
Zone-based
routing
Adhoc On-demand Distance Vector Routing
(AODV)
Location Aided Routing (LAR)
Location-based routing
Associativity Based Routing (ABR) protocol
Link-stability based routing
protocol
Signal Stability-base adaptive Routing (SSR)
Link-stability based routing
protocol
Zone Routing Protocol (ZRP)
Hybrid routing protocol
Hybrid Adhoc Routing Protocol (HARP)
Hybrid routing protocol
Zone-based Hierarchical Link State routing
(ZHLS)
Hybrid routing protocol
Ad Hoc Routing Protocols
Proactive
(table-driven)
•DSDV
•WARP
•DREAM
Reactive
(on-demand)
•DSR
•AODV
•TORA
Hybrid
•ZRP
•HARP
Residential
Modem
Base
Station
Business
Modem
Portable
Modem
Management System
Network Planning
Rahakulu ja katteala
Lingid
http://www.cs.umd.edu/~clancy/docs/lwappreview.pdf
http://www.ieee802.org/21/
http://www.ieee802.org/11/
http://www.ietf.org/rfc/rfc3990.txt
Lingid
http://en.wikipedia.org/wiki/AODV
http://en.wikipedia.org/wiki/Mobile_adhoc_network
http://moment.cs.ucsb.edu/AODV
http://core.it.uu.se/core/index.php/Main_Page
Download