Documente Academic
Documente Profesional
Documente Cultură
Presentation by:
Dr. AV RAMANA
A cos(2f1t ) binary1
s(t )
A cos(2f 2 t ) binary 0
Phase Shift Keying (BPSK)
Phase of the carrier is varied to represent digital data (binary 0 or 1)
Amplitude and frequency remains constant.
If phase 0 deg to represent 0, 180 deg to represent 1. (2-PSK)
PSK is not susceptible to noise degradation that affects ASK or
bandwidth limitations of FSK
4-PSK (QPSK)
QPSK Modulator
Two bits (a dibit) are clocked into the bit
splitter. After both bits have been serially
inputted, they are simultaneously
parallel outputted.
The I bit modulates a carrier that is in
phase with the reference oscillator (hence
the name "I" for "in phase" channel), and
the Q bit modulate, a carrier that is 90°
out of phase
For a logic 1 = + 1 V and a logic 0= - 1
V, two phases are possible at the output
of the I balanced modulator (+sin ωct and
- sin ωct), and two phases are possible at
the output of the Q balanced modulator
(+cos ωct), and (-cos ωct)
When the linear summer combines the
two quadrature (90° out of phase)
signals, there are four possible resultant
phasors given by these expressions:
+ sin ωct + cos ωct, + sinωct - cos ωct,
-sin ωct + cos ωct, and -sin ωct - cos ωct
(for 11, 10, 01, 00 combinations)
QPSK Modulator
Example:
Bit
Modulation Units Bits/Baud Baud rate
Rate
ASK, FSK, 2-PSK Bit 1 N N
4-PSK, 4-QAM Dibit 2 N 2N
8-PSK, 8-QAM Tribit 3 N 3N
16-QAM Quadbit 4 N 4N
32-QAM Pentabit 5 N 5N
64-QAM Hexabit 6 N 6N
128-QAM Septabit 7 N 7N
256-QAM Octabit 8 N 8N
I/Q Offset Modulation
Take, for example, a QPSK signal where
the normalized value changes from 1, 1 to
–1, –1.
When changing simultaneously from I and Q
values of +1 to I and Q values of –1, the
signal trajectory goes through the origin (the
I/Q value of 0,0).
The origin represents 0 carrier magnitude.
A value of 0 magnitude indicates that the
carrier amplitude is 0 for a moment.
If I changes value but Q does not (or vice-
versa) the carrier amplitude changes a
little, but it does not go through zero.
Simplified Recipe
Split signal into multiple channels
Modulate each channel by data
Re-multiplex to form a single carrier
OFDM
OFDM is a special case of FDM.
As an analogy, a FDM channel is like water flow out of facet, in
contrast the OFDM signal is like a shower.
In a faucet all water comes in one big stream and cannot be
sub-divided. OFDM shower is made up of a lot little streams.
Both methods carry the exact amount of data, but in case of
loss, only few streams of data is lost in OFDM!
• Three different
physical layers in
the 2.4 GHz band:
•FHSS, DSSS and IR
application application
TCP TCP
IP IP
LLC LLC LLC
802.11 MAC 802.11 MAC 802.3 MAC 802.3 MAC
802.11 PHY 802.11 PHY 802.3 PHY 802.3 PHY
5-GHz Channel Overview
5-GHz Channel Overview
IEEE 802.11
802.11i LLC
security
WEP MAC
802.11f MAC Mgmt
Inter Access Point Protocol
802.11e MIB
PHY
QoS enhancements
DSSS FH IR
OFDM
802.11b
5,11 Mbps
802.11a
6,9,12,18,24
802.11g 36,48,54 Mbps
20+ Mbps
WLAN Standards Family
IEEE 802.11a
Release Date: 1997
Frequency = 5 GHz
Channel BW = 20 MHz
Encoding Scheme = OFDM
Spatial Streams = 1
Modulation Techniques
BPSK: 6, 9 Mbps
QPSK: 12, 18 Mbps
16-QAM: 24, 36 Mbps
64-QAM: 48, 54 Mbps
Maximum Speed = 54 Mbps
Range = about 30 meters
The limited range that 802.11a provides relative to alternative 802.11-standard
technologies means more access points are needed to provide coverage.
802.11a is best suited for environments where high throughput is needed for a
relatively small coverage area.
Fewer devices use 5 GHz, resulting in a less crowded frequency band (when compared
to 2.4 GHz band) with fewer potential sources of interference
IEEE 802.11b
Release Date: 1997
Frequency = 2.4 GHz (ISM band)
Channel BW = 20 MHz
Encoding Scheme = DSSS / CCK (Complementary Code Keying)
Spatial Streams = 1
Modulation Technique
DBPSK with DSSS (1 Mbps),
DQPSK with DSSS (2 Mbps),
DQPSK with CCK (11Mbps)
Maximum Speed =11 Mbps
Range = about 100 meters
802.11b is the dominant protocol used in factories and distribution centres and is fully
capable of handling applications other than data collection, including voice
communication by VoIP.
802.11b also supports unified communications, where phone calls, pages, text and e-mail
messages are delivered to mobile computers, PDAs and smart phones used in industrial
and office environments.
IEEE 802.11g
Frequency= 2.4 GHz
Channel BW = 20 MHz
Encoding Scheme = DSSS / CCK / OFDM
Spatial Streams = 1
Modulation Techniques
DBPSK with DSSS: (1 Mbps),
DQPSK with DSSS: (2 Mbps),
DQPSK with CCK: (11Mbps)
802.11n can be implemented as either 2.4 GHz or 5 GHz technology, and will provide
backwards compatibility with 802.11b/g and 802.11a systems, respectively.
The signature characteristic of 802.11n technology is its data transmission speed of up
to 600 mbps, which is more than 10 times faster than 802.11a / g and about 55 times
faster than 802.11b.
IEEE 802.11ac
Frequency = 5 GHz only
Wider channel BW: 20, 40, 80, 160 and 80+80 MHz
802.11ac introduces both 80 MHz and 160 MHz—contiguous 160 MHz or non-
contiguous 80+80 MHz—channel bandwidths, providing 4.5x and 9x higher data
rates, respectively.
80 MHz support is mandatory for 802.11ac, while 160 MHz is optional, according to
the IEEE.
Encoding Scheme = OFDM with multiple user MIMO (MU-
MIMO)
More spatial streams: up to 8
More efficient modulation schemes: BPSK, QPSK, 16QAM,
64QAM and 256-QAM
Coding Rates = 1/2, 2/3, 3/4, 5/6
Simplified transmit beam forming
Larger aggregated data frames
IEEE 802.11ac
Higher Data Rates:
First Generation
64QAM, 5/6 code rate, 80 MHz BW, 1 spatial stream: 293 Mbps
256QAM, 5/6 code rate, 80 MHz BW, 1 spatial stream: 433 Mbps
256QAM, 5/6 code rate, 80 MHz BW, 2 spatial stream: 867 Mbps
256QAM, 5/6 code rate, 80 MHz BW, 3 spatial stream: 1300 Mbps
256QAM, 5/6 code rate, 80 MHz BW, 8 spatial stream: 3470 Mbps
Second Generation
256QAM, 5/6 code rate, 160 MHz BW, 1 spatial stream: 867 Mbps
256QAM, 5/6 code rate, 160 MHz BW, 2 spatial stream: 1730 Mbps
256QAM, 5/6 code rate, 160 MHz BW, 3 spatial stream: 2600 Mbps
256QAM, 5/6 code rate, 160 MHz BW, 8 spatial stream: 6930 Mbps
IEEE 802.11
IEEE 802.11ac: Very High Throughput
5-GHz Frequency
Wider Channels (80 / 160 MHz)
More Spatial streams (up to 8)
256 QAM
Bigger Frames
MU-MIMO
Transmit Beam forming
IEEE 802.11ac
IEEE802.11ac MCS
802.11ac will use the 802.11n modulation, interleaving and coding
architecture.
However, there are a few differences to the 11n specification.
11ac and 11n requires device support for BPSK, QPSK, 16QAM and
64QAM modulation, but 11ac adds an optional 256 QAM.
The second difference is in the number of defined Modulation Coding Set
(MCS) Indices.
10 single user MCS are defined in 11ac.
Note that this is significantly lower than the 77 MCS indices specified in 11n.
11n required 77 because 11n supported "unequal" modulations, e.g. a single
user might get BPSK on one stream and 16QAM on another.
11ac only allow “equal” modulations!
IEEE 802.11ad
New WLAN Usage Model that require higher data throughput to
support today’s “unwired office”.
IEEE 802.11ad
802.11ad providing up to 7 Gbps throughput using approximately
2 GHz of spectrum at 60 GHz over a short range.
(60 GHz transmission suffers from large attenuation through physical barriers.)
Data frames:
Management frames:
MAC addresses are sent in the clear text as required by the 802.11 specification.
As a result, in wireless LANs that use MAC authentication, a network attacker
might be able to subvert the MAC authentication process by “spoofing” a valid
MAC address.
Evolution WLAN Security
WEP – Wired Equivalent Privacy
EAP – Extensible Authentication Protocol
WPA – Wi-Fi Protected Access
WEP Encryption
Wired Equivalent Privacy (WEP) is based on the RC4 algorithm,
which is a symmetric key stream cipher.
The encryption keys must match on both the client and the access
point for frame exchanges to succeed.
Stream Ciphers and Block Ciphers
A stream cipher encrypts data by generating a key stream from the key and
performing the XOR function on the key stream with the plain-text data. The key
stream can be any size necessary to match the size of the plain-text frame to
encrypt.
Block ciphers deal with data in defined blocks, rather than frames of varying
sizes. The block cipher fragments the frame into blocks of predetermined size and
performs the XOR function on each block. Each block must be the predetermined
size, and leftover frame fragments are padded to the appropriate block size
WEP Encryption
IEEE 802.11 standard introduced the WEP protocol in order to
bring the security of the wireless systems closer to that of wired
ones.
Provides encryption
Uses RSA Data Security Inc.'s 40-bit RC4 algorithm for encrypting data (plain
text) contained in the frames
PRNG algorithm & output of the generator (key) is XORed with the data stream
(stream cipher)
Based on 40-bit secret key & has a 24 bit initialization vector (IV) that is sent
with the data (total key size is 64-bit)
128-bit RC4 keys can be used
Using a 40-bit symmetric cipher is not secure because its key space so small that a
brute-force attack is feasible
THANK YOU