1. Trang chủ
  2. » Công Nghệ Thông Tin

Wireless ATM and Ad Hoc Routing

26 462 2
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Wireless ATM and Ad Hoc Routing
Trường học Unknown University
Chuyên ngành Wireless Networks and Telecommunications
Thể loại Research Paper
Năm xuất bản Unknown Year
Thành phố Unknown City
Định dạng
Số trang 26
Dung lượng 273,61 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

In the second, the BS relays ATM cells from the BS towards both the wiredsegment of the network and the mobile terminals.ATM implementation over the wireless medium poses several design

Trang 1

10.1.1 ATM

In this section, a brief introduction to ATM is made in order prior to discussing WirelessATM ATM, also known as cell-relay for reasons that will be described later, is a technologycapable of carrying any kind of traffic, ranging from circuit-switched voice to bursty data, atvery high speeds ATM possesses the ability to offer negotiable QoS Thus, ATM is thetechnology of choice for multimedia networking applications that demand both large band-widths and QoS guarantees since these properties cannot typically be offered by conventionalnetworks such as Ethernet LANs

ATM is a packet-switching technology that somewhat resembles frame relay However,the main difference is the fact that ATM has minimal error and flow control capabilities inorder to reduce control overhead and also that ATM utilizes fixed-size (53 bytes) packetsknown as cells instead of variable-sized packets as in frame relay Fixed size packets enablefast speeds for ATM switches and together with the reduced overhead give rise to the veryhigh data rates offered by ATM

Trang 2

The ATM protocol architecture is shown in Figure 10.1 Its main parts are:

† Physical layer It involves the specification of the transmission medium and the signalencoding to be used The two alternative speeds offered by the physical layer are 155 and

622 Mbps

† ATM layer This defines the transmission of ATM cells and the use of connections eitherbetween users, users and network entities or between network entities These connectionsare referred to as Virtual Channel Connections (VCCs) and are analogous to the data linkconnections in frame relay VCCs can carry both user traffic and signaling information Acollection of VCCs that share the same endpoints is known as a Virtual Path Connection(VPP)

† The ATM Adaptation Layer (AAL) This layer maps the cell format used by the ATM layer

to the data format used by higher layers Thus, at the transmitting side, AAL maps framescoming from higher layers to ATM cells and hands them over to the ATM layer fortransmission On the receiving side, ATM reassembles cells into the respective framesand passes frames to upper layers A number of AALs exist, each of which corresponds to

a specific traffic category AAL0 is virtually empty and just provides direct access to thecell relay service AAL1 supports services that demand a constant bit rate, which is agreedduring connection establishment and must remain the same for the duration of the connec-tion This category of service is known as Constant Bit Rate (CBR) service with typicalexamples being voice and video traffic AAL2 supports services that can tolerate a variablebit rate but pose limitations regarding cell delay This category of service is known asVariable Bit Rate (VBR) service with typical examples being transmission of compressed(e.g MPEG) video where bit rate can vary, however, delay guarantees are needed to avoidjerky motion AAL3/4 and AAL5 support variable-rate traffic with no delay requirements.Such categories are VBR traffic with no delay bounds, Available Bit Rate (ABR), which is

a best effort service that guarantees neither rate nor delay but only minimum and mum rate and Unspecified Bit Rate (UBR) which is essentially ABR without a minimumrate guarantee

maxi-The protocol architecture shown in Figure 10.1 also defines three separate planes maxi-These are:(a) the user plane, which provides for transfer of user information and associated controlinformation (e.g FEC, ARQ); (b) the control plane, which performs call control and connec-tion control; and (c) the management plane, which includes plane management for manage-ment of the whole system and coordination of the planes and layer management formanagement of functions relating to the operation of the various protocol entities

Figure 10.1 ATM protocol architecture

Trang 3

There are proposals for two different scenarios [5] regarding the functionality of the BS inthe above architecture The first scenario calls for termination of the ATM Adaptation Layer(AAL) at the BS In this case, the traffic transmitted over the wireless medium is not in theformat of ATM cells Rather a custom wireless MAC is used that encapsulates one or moreATM cell into a single packet Using this grouping procedure, the overhead due to the headerneeded for wireless transmission is less than it would be for wireless transmission of singleATM cells In the second, the BS relays ATM cells from the BS towards both the wiredsegment of the network and the mobile terminals.

ATM implementation over the wireless medium poses several design and implementationchallenges that are summarized below:

† ATM was originally designed for a transmission medium whose BERs are very low (about

10210) However, wireless channels are characterized of low bandwidth and high BERvalues It is questioned whether ATM will function properly over such noisy transmissionchannels

† ATM calls for a high resource environment, in terms of transmission bandwidth However,

Figure 10.2 WATM network architecture

Trang 4

as we have seen, the wireless medium is a scarce resource that calls for efficient use ofmedium However, an ATM cell carries a header, which alone poses an overhead of about10% Such an overhead is undesirable in wireless data networks since it reduces overallperformance This problem can be alleviated by performing header compression ATMwas designed for stationary hosts In the wireless case, users may roam from one cell toanother thus causing frequent setup and release of virtual channels Thus, fast and efficientmechanisms for switching of active VCs from the old wireless link to the new one areneeded When the handover occurs, the current QoS may not be supported by the new datapath In this case, a negotiation is required to set up new QoS Handover algorithms shouldtake those facts into consideration.

10.1.3 Scope of the Chapter

The remainder of this chapter discusses a number of issues relating to wireless ATM It isassumed that the reader possesses basic knowledge on ATM In Section 10.2, wireless ATMarchitecture is discussed covering issues related to the protocol stack of wireless ATM Thissection also discusses location management and handoff in wireless ATM networks Section10.3 discusses HIPERLAN 2, an ATM-compatible WLAN developed by the European Tele-communications Standards Institute (ETSI) Contrary to WLAN protocols, HIPERLAN 2 isconnection oriented and ATM-compatible Slightly deviating from the contents of this chap-ter, Section 10.4 presents a number of routing protocols for multihop ad hoc wirelessnetworks Finally, the chapter ends with a brief summary of its contents in Section 10.5

10.2 Wireless ATM Architecture

The protocol architecture currently proposed by the ATM Forum is shown in Figure 10.3.The WATM items are divided into two parts: mobile ATM, which consists of a subpart ofthe control plane, and radio access layer (shaded items in the figure) Mobile ATM deals withthe higher-layer control/signaling functions that support mobility The radio access layer isresponsible for the radio link protocols for wireless ATM access Radio access layers consists

of the physical layer, the media access layer, the data link layer, and the radio resourcecontrol Up to now, only PHY and MAC are under consideration The protocols andapproaches for DLC and RRC have not been proposed yet The physical, MAC and DLClayers for the radio access layer are briefly discussed below, while mobile ATM issues arediscussed in later sections

Figure 10.3 WATM protocol architecture

Trang 5

10.2.1 The Radio Access Layer

10.2.1.1 Physical Layer (PHY)

Fixed ATM stations can typically achieve rates ranging from 25 to 155 Mbps at the PHYlayer However, due to the use of the wireless medium, such speeds are difficult to achieve inWATM Thus, typical bit rates for WATM PHY are in the region of 25 Mbps, corresponding

to the 25 Mbps UTP PHY option for wired ATM Note that 25 Mbps is the speed at thephysical layer WATM VCs will typically enjoy bit rates ranging from 2 to 5 Mbps sustainedand from 5 to 10 Mbps peak Nevertheless, higher PHY speeds are possible and WATMprojects under development such as the MEDIAN project succeeded in achieving data rates

of 155 Mbps by employing OFDM transmission at 60 GHz As far as hardware is concerned,WATM modems should be able to support burst operation with relatively small preambles inorder to support transmission of small control packets and ATM cells and cope with delayspreads ranging from 100 to 500 ns

The suggested physical layer requirements for WATM [6] are shown in Figure 10.4 Apartfrom the modulation techniques shown in the figure, a number of others have beenproposed[3], such as equalized QPSK/GMSK, equalized QAM and multicarrier techniquessuch as OFDM Of these, the most promising seem to be equalized QPSK/GMSK, which issimple to implement and can cope with moderate delay spreads (,250 ns) and OFDM which

is more robust to interference and larger delay spreads CDMA transmission, although cient for frequency reuse and multiple access is not a potential candidate for WATM, because

effi-of the low DLC data rates it will effi-offer due to spreading

10.2.1.2 MAC Layer

A number of MAC protocols have been proposed for WATM [5,7] Most of the proposalsdescribe a form of a centralized TDMA system in which the frames are divided into two parts:one contention part, which is used by the mobiles to reserve bandwidth for transmission andone part in which information is transmitted

Some general requirements for an efficient WATM MAC protocol are the following [5]:

† Allow for decreased complexity and energy consumption at the mobile nodes

† Provide a means of supporting negotiated QoS under any load condition

† Support the standard ATM services, such as UBR, ABR, VBR and CBR traffic classes

† Provide adequate support for QoS-demanding traffic classes

† Provide a low delay mechanism of channel assignment to connections

Figure 10.4 Physical layer requirements for WATM

Trang 6

† Support Peak Cell Rate (PCR), Sustainable Cell Rate (SCR), and Maximum Burst Size(MBS) requests.

† Support multiple physical layers For example, the same MAC functionality should beable to operate over the 5 GHz and 60 GHz physical layer options

† Efficiently manage and reroute ATM connections as users move while maintaining tiated QoS levels

nego-† Provide efficient location management techniques in order to track mobiles and locatethem prior to connection setup

WATM, being a member of the ATM family, provides support for applications, like media, which are characterized by stringent requirements, such as increased data rates,constant end-to-end delay and reduced jitter Traditional WLANs cannot support thoserequirements, and have limited support for QoS applications, as we mentioned before As

multi-a result, considermulti-able resemulti-arch projects tmulti-arget the multi-aremulti-a of WLANs using ATM technology(WATM LANs) Such a project is HIPERLAN 2, a standard being developed by ETSI Thestandard is described in later sections

10.2.1.3 DLC Layer

The DLC layer interfaces the ATM layer to lower layers Thus, in order to hide the cies of the wireless medium from the ATM layer, DLC should implement error detection,retransmission and FEC Different levels of coding redundancy might be used in order tosupport each ATM service class

deficien-The DLC layer exchanges 53-byte ATM cells with the ATM layer above it A DLC PDU is

a packet that may consist of one or more cells This packet is handed down to the physicallayer for transmission as a single unit The use of a multicell DLC packet reduces overheadbut requires functionality to convert between the ATM cell format and the DLC packetformat

10.2.2 Mobile ATM

10.2.2.1 Location Management/Connection Establishment

Existing protocols for connection setup in ATM assume that the location of a terminal isfixed Thus, the terminal’s address can be used to identify its location, which is needed inprocesses such as call establishment However, when terminals become mobile, this is nolonger true and additional addressing schemes and protocols are needed to track the mobileATM terminal

Location management in a wireless ATM network can be either external to the connectionprocedure or integrated[3,8] Here we describe the latter option Each mobile terminal served

by the network is associated with a ‘home’ BS or switch which provides it with a home ATMaddress When the terminal moves to another cell, it is assigned a foreign address via thiscell’s BS The home switch maintains a pointer from the permanent home address to thecurrent foreign address of the mobile This pointer maintenance is achieved by terminaltransmission of address updates as they move to new cells Connections to a mobile terminalare then established with a simple extension to the standard Q.2931 signaling procedurespecified in existing ATM specifications When a connection needs to be established to a

Trang 7

specific terminal, a SETUP message is issued with the home address of the mobile as thedestination If the mobile is under coverage of its ‘home’ BS the connection is established Ifthe mobile has roamed to another cell, a RELEASE message is returned towards the sourcethat requested the connection The RELEASE message carries the foreign address of theterminal Upon reception of the RELEASE message, the source can then issue a SETUPmessage with the terminal’s foreign address as the destination Thus, the connection with theroamed terminal will be set up.

10.2.2.2 Handover in Wireless ATM

The mobility nature of terminals in WATM networks means that the network must be able todynamically switch ongoing connections of users that roam between cells Handovers takeplace when mobiles move out of the coverage of a BS towards the coverage of a new one Insuch a case the signal measurement at the mobile of the new BS gets stronger while that of theprevious one weakens Handoff can be network-controlled, mobile-assisted or mobile-controlled In the first case, the mobile terminal is completely passive and all signal measure-ments and handoff initiations are a responsibility of the BS In the second case, both the BSand the mobile terminal perform signal measurements, however, the handoff initiation is aresponsibility of the BS Finally, in the third case both the BS and the mobile terminalperform signal measurements and the handoff initiation is a responsibility of the mobileterminal

A handover should be done in an efficient way such that the user does not notice mance degradation Of course, there is a chance of the handoff being blocked This means thatthe new BS is not able to serve the connections of the roaming user, either for reasons ofbandwidth availability or due to the fact that it cannot guarantee the QoS of the user’sconnection In the latter case, however, a renegotiation towards a lower level of QoSmight be carried out in order for the connection to be kept alive

perfor-A handoff generally involves switching the VCs of the roaming terminal from the former

BS to the current one while maintaining route optimality and QoS to the maximum possibleextent A typical handoff in a wireless ATM network consists of the following phases[3]:

† The terminal initiates the handoff This is done by sending a message to its current BS inorder to initiate the procedure of moving the connection from the current BS to the newone

† The network switches and BSs collectively determine the switch from which to rerouteeach VC This switch is known as a ‘crossover switch’ (COS) When the handover occurs,the current QoS may not be supported by the new data path In this case, a negotiation isrequired to set up new QoS Handover algorithms should take those facts into considera-tion Related to this fact is the identification of the optimal COS to be used in order toswitch the connection COs may be initiated either at the old or the new BS

† Upon determination of the COS, the network routes a subpath from the COS to the newBS

† Over the above path, the cell stream is switched to the new BS

† The unused subpath from the COS to the old BS is released

† Finally, the terminal drops its radio connection with the old BS, connects to the new oneand confirms end-to-end handoff

Trang 8

To minimize QoS disruption during the handoff, the network can perform a ‘lossless handoff’[8]in order to maintain cell delivery in sequence without loss to the mobile terminal Thisinvolves buffering of traffic in transit during the handoff process Specifically, the COS sends

a ‘marker’ ATM cell to the current BS before switching the terminal’s connections to the newone From that point onwards, when ATM cells are received at the new BS from the COS,these are buffered until the handoff is confirmed by the mobile terminal Furthermore, thecurrent BS buffers traffic received between the arrival of the marker cell and the arrivalhandoff confirmation Upon this confirmation, the current BS forwards buffered traffic tothe new BS Finally, the new BS relays to the terminal the buffered cells from the current BSfollowed by the buffered cells from the new one Thus, lossless, in-sequence delivery isachieved

In order to support WATM handoff, a number of extensions to ATM signaling protocolshave been proposed [3,8]

10.3 HIPERLAN 2: An ATM Compatible WLAN

HIPERLAN 2 [9–11] aims to provide high speed access (up to 54 Mbps at the physical layer)

to a variety of networks including 3G networks, ATM and IP based networks and for privateuse as a wireless LAN system Supported applications include data, voice and video, withspecific QoS parameters taken into account In contrast to the WLAN systems described inChapter 9, HIPERLAN 2 is a connection-oriented system which uses fixed size packets.HIPERLAN 2 is compatible with ATM Its connection-oriented nature makes support forQoS applications easy to implement In the following subsections, we describe the mainaspects of HIPERLAN 2

Figure 10.5 HIPERLAN 2 network architecture

Trang 9

and the mobile terminal After the association takes place, mobile terminals can freely movewithin the coverage area of the HIPERLAN 2 network while maintaining their logicalconnections Moving to another cell is made possible through a handover procedure TheAPs automatically configure the network by taking into account changes in topology due tomobility Association and handover are revisited later in this section.

Being compatible with ATM, HIPERLAN 2 is a connection-oriented network using fixedsize packets Signaling functions are used to establish connections between the mobile nodesand the AP in a cell and data is transmitted over these connections as soon as they areestablished, using a time division multiplexing technique The standard supports two types

of connections: bi-directional point-to-point connections between a mobile node and an AP,and unidirectional point-to-multipoint connections carrying traffic to the mobile nodes.Finally, there is a dedicated broadcast channel used by the AP to transmit data to all mobileswithin its coverage

The connection-oriented nature of HIPERLAN 2 makes support for QoS applications easy

to implement Each connection can be created so as to be characterized by certain qualityrequirements, like bounded delay, jitter and error rate This support enables the HIPERLAN 2network to support multimedia applications in a way similar to the ATM network

HIPERLAN 2 also provides support for issues like encryption and security, power saving,dynamic channel allocation, radio cell handover, power control, etc However, most of theseissues are either not standardized yet or left to the vendors to implement

10.3.2 The HIPERLAN 2 Protocol Stack

The protocol stack for the HIPERLAN 2 standard is shown in Figure 10.6 It comprises acontrol plane part and a user plane part following the semantics of ISDN functional partition-ing The user plane includes functionality for transmission of traffic over established connec-tions, and the control plane provides procedures to control established connections Theprotocol has three basic layers: the Physical Layer (PHY), the Data Link Control (DLC)layer, and the Convergence Layer (CL) At the moment, only the DLC includes control planefunctionality The various layers are discussed below

Figure 10.6 The HIPERLAN 2 protocol stack

Trang 10

10.3.2.1 HIPERLAN 2 Physical Layer

HIPERLAN 2 is characterized by high transmission rates at the physical layer, up to 54 Mbps.The use of OFDM in the physical layer effectively combats the increased fading occurrenceexperienced in indoor radio environments, such as offices, etc., where the transmitted radiosignals are subject to reflection from a number of objects, thus leading to multipath propaga-tion and consequently ISI The channel spacing is 20 MHz with 52 subcarriers used for eachchannel Of these, 48 subcarriers carry actual data and the remaining four are used as pilots inorder to perform coherent demodulation

HIPERLAN 2 is able to adapt to changing radio link quality through a Link Adaptation(LA) mechanism Based on received signal quality which depends both on the AP-mobileterminal relative position and interference from nearby cells, LA dynamically selects themethod of modulation and the Forward Error Correction (FEC) code to use in an effort toprovide a robust physical layer The alternative modulation methods are BPSK, QPSK, 16QAM and 64 QAM FEC is performed by a convolutional code with rate 1/2 and constraintlength 7 The physical layer alternatives offered by LA are shown in Figure 10.7

10.3.2.2 HIPERLAN 2 Data Link Control (DLC) Layer

The DLC layer is used to establish the logical links between APs and the MTs The DLC layercomprises a number of sublayers providing medium access and connection handling services

to upper layers The DLC layer consists of three sublayers: the Medium Access Control(MAC) sublayer, the Error Control (EC) sublayer and the Radio Link Control (RLC)sublayer

10.3.2.2.1 MAC Protocol and Channel Types The MAC protocol used by HIPERLAN 2 isbased on time-division duplex (TDD) and dynamic time-division multiple access (TDMA).MAC control is centralized and performed by each cell’s AP The wireless medium is shared

in the time domain through the use of a circulating MAC frame containing slots dedicatedeither to uplink or downlink traffic The length of the MAC frame is fixed at 2 ms andcomprises a number of parts which are not fixed Rather, their lengths are variable innature and are determined by the AP Uplink and downlink slots within a frame areallocated dynamically depending on the need for transmission resources All data fromboth mobile terminals and APs is transmitted in dedicated time slots For mobile terminal

Figure 10.7 HIPERLAN 2 physical layer alternatives

Trang 11

transmission, slots are allocated after bandwidth requests made to the AP The exact form ofthe MAC frame is shown in Figure 10.8, where one can see that apart from the parts dedicated

to uplink and downlink traffic there are also broadcast, direct link and random access phases.The broadcast frame carries the broadcast control channel and the frame control channel(both are described below) The direct link phase enables exchange of user traffic betweenmobile terminals without intervention of the AP As mentioned above, this is optional.Finally, the random access phase carries the random access channel (described below).This phase is used by mobile terminals either for purposes of association with an AP, forcontrol signaling when the terminal has not been allocated uplink slots within the MAC frameand during handover to a new AP for the purpose of switching ongoing connections to thenew AP

The MAC frame consists of several transport channels:

† The Broadcast Channel (BCH) is a downlink channel used to convey to the mobilescontrol information regarding transmission power levels, wake-up indicators for nodes

in power save mode, length of the FCH and the RCH channels (described below) and themeans to identify the HIPERLAN 2 network and the AP to which the mobile belongs

† The Frame Control Channel (FCH) is a downlink channel used to notify the mobile nodesabout resource allocation within the current MAC frame both for uplink and downlinktraffic and for the RCH

† The Random Access Channel (RCH) is used in the uplink both in order to request mission in the downlink and uplink portions of future MAC frames and to transmitsignaling messages The RCH comprises contention slots which are used by the mobiles

trans-to compete for reservations Collisions may occur and the results from RCH access arereported back to the mobiles in the Access Feedback Channel (ACH) When the requestfor transmission resources from the MTs arise, the AP can allocate more resources for theRCH in order to serve the increased demand

† The Access Feedback Channel (ACH) is used on the downlink to notify about previousaccess attempts made in the RCH

The above transport channels are used as a means to support a number of logical HIPERLAN

2 channels The mapping is shown in Figures 10.9 and 10.10 The logical channels are asfollows:

† The Slow Broadcast Channel (SBCH) All nodes within a cell can access the SBCH It is a

Figure 10.8 Structure of the 2 ms MAC frame

Figure 10.9 Mapping from logical to transport channels (downlink)

Trang 12

downlink channel that conveys broadcast control information concerning all the nodeswithin a cell This transmission is initiated upon decision of the AP and may containinformation regarding (a) the seed to be used for encryption, (b) handover acknowledg-ments, (c) MAC address assignments to non-associated mobile terminals, and (d) broad-cast of RLC and CL information.

† The Dedicated Control Channel (DCCH) is of bidirectional nature and is implicitly lished when a terminal associates with the AP within a cell After association with an APhas taken place, a terminal has its dedicated DCCH which is used to convey controlsignaling The DCCH is realized as a DLC connection upon which RLC messages regard-ing association and control of DLC connections are exchanged

estab-† The User Data Channel (UDCH) transports user data cells between a mobile node and an

AP and vice versa A UDCH for a specific mobile node is established through signalingtransmitted over the node’s DCCH The UDCH establishment takes place after negotiation

of certain quality parameters that characterize a connection The DLC guarantees sequence delivery of the transmitted data cells to the convergence layer The use ofARQ techniques is possible in UDCH operation, although there might be connectionswhere ARQ is not used, such as multicasts and broadcasts For uplink traffic, mobilerequests for UDCH bandwidth are conveyed to the AP which then notifies the mobilewhether or not it has been granted bandwidth through the FCH For downlink traffic, the

in-AP can reserve UDCH bandwidth without requests from mobiles

† The Link Control Channel (LCCH) is a bidirectional channel used to exchange tion regarding error control (EC) over a specific UDCH The AP determines the necessarytransmission slots for the LCCH in the uplink and the grant is announced in an upcomingFCH

informa-† The Association Control Channel (ASCH) is used by the mobile nodes either to requestassociation or disassociation from a cell’s AP Such messages are exchanged only (a)when a mobile terminal de-associates with an AP and (b) when a handover takes place

10.3.2.2.2 Error Control Protocol The Error Control (EC) protocol of the HIPERLAN 2protocol stack uses a selective repeat ARQ scheme in order to provide error-free, in-sequencedata delivery to the convergence layer Positive and negative acknowledgments aretransmitted over the LCCH channel In-sequence delivery is guaranteed by assigningproper sequence numbers to all frames of the connection The number of retransmissionattempts per frame is configurable Furthermore, in an effort to support QoS forapplications that are vulnerable to delay, the EC layer includes an out-of-date frame

Figure 10.10 Mapping from logical to transport channels (uplink)

Trang 13

discard mechanism If a data cell becomes obsolete, then the sender EC layer can decide todiscard it together with frames in the same connection with lower sequence number In such acase, the responsibility for dealing with the data loss belongs to upper layers.

10.3.2.2.3 Radio Link Control Protocol The Radio Link Control (RLC) protocol providesservices to the Association Control Function (ACF), Radio Resource Control function (RRC),and the DLC user Connection Control function (DCC) These signaling entities implementthe DLC control plane functionality for exchange of control information between the AP andthe mobile terminals

The ACF is used by mobile nodes for purposes of:

† Association In this case, a mobile node chooses among multiple APs the one with the bestlink quality These measurements are made by listening to the BCH from the various APs,since the BCH provides a beacon signal to be used for this purpose If association takesplace, the AP grants the mobile terminal a unique MAC identity number Then, the ASCH

is used to exchange information with the AP regarding the capabilities of the DLC link to

be established For example, a mobile terminal may request from the AP informationregarding the capabilities and characteristics of the links it can offer, such as the physicallayer used, whether encryption is possible or not, supported authentication and encryptionprocedures and algorithms, supported convergence layers, etc The AP replies with a set ofsupported PHY modes, a single convergence layer and a selected authentication andencryption procedure; an alternative is support for no authentication/encryption.Supported encryption algorithms are DES and 3-DES The two alternatives for authenti-cation are public key-based and pre-shared key authentication If encryption is to beemployed then the mobile terminals start a Diffie–Hellman key exchange procedure inorder to determine the secret session key This is used for encryption of all unicast trafficbetween the AP and the mobile terminal Moreover, broadcast and multicast traffic canalso be encrypted This procedure takes place by using common keys at the mobileterminals and the AP (all mobile terminals under the same AP use the same commonkey) Common keys are distributed encrypted through the use of the unicast encryptionkey Periodic changes of the various encryption keys increases system security After themobile node and the AP have associated, the AP can assign a DCCH to the mobile nodewhich is used by the latter to establish one or more DLC connection, possibly each ofdifferent QoS

† Deassociation This can have either an explicit or an implicit form In both cases the APfrees the resources which were allocated to the deassociated mobile terminal In the firstcase, the AP is notified by the mobile terminal that the latter wants to deassociate (e.g.when the terminal is about to shut down) In the second case, the AP deassociates with aspecific terminal, when the latter remains unreachable from the AP for a specific timeperiod

No user data traffic transmission can take place unless at least one DLC connection has beenestablished between the mobile terminal and the AP Thus, the DCC function is used toestablish DLC user connections by transmitting signaling messages over the DCCH The

AP assigns a unique connection identifier to each DLC connection The signaling scheme isquite straightforward, comprising a request for a specific QoS connection followed by anacknowledgment when the request can be fulfilled There also exist connections that manage

Ngày đăng: 29/09/2013, 21:20

TỪ KHÓA LIÊN QUAN

w