Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved. 0-13-191835-4 IEEE 802.11 Wireless LAN.

Slides:



Advertisements
Similar presentations
William Stallings Data and Computer Communications 7th Edition
Advertisements

Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
LOCAL AREA NETWORKS. LOGICAL LINK CONTROL LLC is concerned with the transmission of a link- level PDU (Protocol Data Unit)between two stations Addressing.
LAN Protocol Architecture
Wireless LAN (not assessed) Dr Sandra I. Woolley.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
Network Technology CSE Network Technology CSE3020 Week 9.
Wireless Local Area Network (LAN)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
P. Bhagwat Specification overview. P. Bhagwat Specifications PLCP Sublayer PHY layer Management PMD Sublayer MAC sublayer MAC Layer Management.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
Wireless Networking So we talked about wired networks. What about wireless?
Part 3: Examples of Data Link Layer protocols
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
WLAN b a Johan Montelius
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
LectA..ppt - 04/06/05 CDA 6505 Network Architecture and Client/Server Computing Wireless LANs by Zornitza Genova Prodanoff.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Lecture 13 and 14: WLAN Anders Västberg Slides are a selection from the slides from chapter 12,13, and 14 from:
Chapter 5 outline 5.1 Introduction and services
Wireless Personal Communications Systems – CSE5807
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
1 Kyung Hee University Chapter 15 Wireless LANs. 2 Kyung Hee University IEEE 802 Standards Working Groups WiMAX, an acronym that stands for Worldwide.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
CWNA Guide to Wireless LANs, Second Edition
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSE 6590 Wireless LANs and IEEE MAC 15 October 2015.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Data and Computer Communications Eighth Edition by William Stallings Chapter 17 – Wireless LANs.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Introduction to Mobile Communications TCOM 552, Lecture #9 Hung Nguyen, Ph.D. 06 November, 2006.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
IEEE Wireless LAN Standard
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Chapter 15 Wireless LANs 15.# 1
WLAN.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
ECEN 489, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 11.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless LAN By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal
Chapter 15 Wireless LANs.
Wireless MAC.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless NETWORKS NET 434 Topic No 6 Wireless LANS
Wireless NETWORKS NET 434 Topic No 6 Wireless LANS
Chapter 2 Wireless LAN Technology and the IEEE 802
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Wireless LAN Standard Chapter 14

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Protocol Architecture Functions of medium access control (MAC) layer: On transmission, assemble data into a frame with address and error detection fields On reception, disassemble frame and perform address recognition and error detection Govern access to the LAN transmission medium Functions of logical link control (LLC) Layer: Provide an interface to higher layers and perform flow and error control

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Separation of LLC and MAC The logic required to manage access to a shared-access medium not found in traditional layer 2 data link control For the same LLC, several MAC options may be provided

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved

MAC Frame Format MAC control Contains Mac protocol information Destination MAC address Destination physical attachment point Source MAC address Source physical attachment point CRC Cyclic redundancy check

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Logical Link Control Characteristics of LLC not shared by other control protocols: Must support multiaccess, shared-medium nature of the link Relieved of some details of link access by MAC layer

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Services Unacknowledged connectionless service No flow- and error-control mechanisms Data delivery not guaranteed Connection-mode service Logical connection set up between two users Flow- and error-control provided Acknowledged connectionless service Cross between previous two Datagrams acknowledged No prior logical setup

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Services Unacknowledged connectionless service requires minimum logic and is useful in two contexts. First, it will often be the case that higher layers of software will provide the necessary reliability and flow-control mechanism, and it is efficient to avoid duplicating them. Second, there are instances in which the overhead of connection establishment and maintenance is unjustified e.g. data collection activities, monitoring applications.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Services Connection-mode service very simple devices, such as remote sensors, that have little software operating above this level. In these cases, it would provide the flow control and reliability mechanisms normally implemented at higher layers of the communications software.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Services Acknowledged connectionless service With the connection-mode service, the logical link control software must maintain some sort of table for each active connection, to keep track of the status of that connection. If the user needs guaranteed delivery but there is a large number of destinations for data, then the connection-mode service may be impractical because of the large number of tables required.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Services An example is a process control or automated factory environment where a central site may need to communicate with a large number of processors and programmable controllers. Another use of this is the handling of important and time critical alarm or emergency control signals in a factory.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Differences between LLC and HDLC LLC uses asynchronous balanced mode of operation of HDLC (type 2 operation) LLC supports unacknowledged connectionless service (type 1 operation) LLC supports acknowledged connectionless service (type 3 operation) LLC permits multiplexing by the use of LLC service access points (LSAPs)

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Protocol type 1 operation, which supports the unacknowledged connectionless service, The unnumbered information (UI) PDU is used to transfer user data. There is no acknowledgment, flow control, or error control. There is error detection and discard at the MAC level.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Protocol type 2 operation, a data link connection is established between two LLC SAPs prior to data exchange. Connection establishment is attempted by the type 2 protocol in response to a request from a user. Once the connection is established, data are exchanged using information PDUs, as in HDLC. Information PDUs include send and receive sequence numbers, for sequencing and flow control. Either LLC entity can terminate a logical LLC connection by issuing a disconnect (DISC) PDU.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved LLC Protocol type 3 operation, each transmitted PDU is acknowledged. A new (not found in HDLC) unnumbered PDU, the acknowledged connectionless (AC) information PDU, is defined. User data are sent in AC command PDUs and must be acknowledged using an AC response PDU. To guard against lost PDUs, a 1-bit sequence number is used. The sender alternates the use of 0 and 1 in its AC command PDU, and the receiver responds with an AC PDU with the opposite number of the corresponding command. Only one PDU in each direction may be outstanding at any time.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Architecture Distribution system (DS) Access point (AP) Basic service set (BSS) Stations competing for access to shared wireless medium Isolated or connected to backbone DS through AP Extended service set (ESS) Two or more basic service sets interconnected by DS

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Architecture

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Terminology

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Services IEEE defines nine services that need to be provided by the wireless LAN to provide functionality equivalent to that which is inherent to wired LANs. Two ways of categorizing them. The service provider can be either the station or the distribution system (DS). Station services are implemented in every station, including access point (AP) stations. Distribution services are provided between basic service sets (BSSs); these services may be implemented in an AP or in another special purpose device attached to the distribution system.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Services Three of the services are used to control IEEE LAN access and confidentiality. Six of the services are used to support delivery ofMAC service data units (MSDUs) between stations. The MSDU is the block of data passed down from the MAC user to the MAC layer; typically this is a LLC PDU If the MSDU is too large to be transmitted in a single MAC frame, it may be fragmented and transmitted in a series ofMAC frames.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Services

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Distribution of Messages Within a DS Distribution service Used to exchange MAC frames from station in one BSS to station in another BSS Integration service Transfer of data between station on IEEE LAN and station on integrated IEEE 802.x LAN

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Association-Related Services Before the distribution service can deliver data to or accept data from a station, that station must be associated. Before looking at the concept of association, we need to describe the concept of mobility.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Transition Types Based On Mobility No transition Stationary or moves only within BSS BSS transition Station moving from one BSS to another BSS in same ESS ESS transition Station moving from BSS in one ESS to BSS within another ESS

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Association-Related Services Association Establishes initial association between station and AP Reassociation Enables transfer of association from one AP to another, allowing station to move from one BSS to another Disassociation Association termination notice from station or AP

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Access and Privacy Services There are two characteristics of a wired LAN that are not inherent in a wireless LAN. In order to transmit over a wired LAN, a station must be physically connected to the LAN. On the other hand, with a wireless LAN, any station within radio range of the other devices on the LAN can transmit. In order to receive a· transmission from a station that is part of a wired LAN, the receiving station must also be attached to the wired LAN. On the other hand, with a wireless LAN, any station within radio range can receive.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Access and Privacy Services Authentication Establishes identity of stations to each other Deathentication Invoked when existing authentication is terminated Privacy Prevents message contents from being read by unintended recipient

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE Medium Access Control MAC layer covers three functional areas: Reliable data delivery Access control Security

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Reliable Data Delivery More efficient to deal with errors at the MAC level than higher layer (such as TCP) Frame exchange protocol Source station transmits data Destination responds with acknowledgment (ACK) If source doesn’t receive ACK, it retransmits frame Four frame exchange Source issues request to send (RTS) Destination responds with clear to send (CTS) Source transmits data Destination responds with ACK

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved The MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Medium Access Control Point Coordinated Function Distributed Coordinated Funnction

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Access Control

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Distributed Coordination Function The DCF sublayer makes use of a simple CSMA (carrier sense multiple access) algorithm, which functions as follows. If a station has a MAC frame to transmit, it listens to the medium. If the medium is idle, the station may transmit; Otherwise the station must wait until the current transmission is complete before transmitting.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Distributed Coordination Function To ensure the smooth and fair functioning of this algorithm, DCF includes a set of delays that amounts to a priority scheme. Let us start by considering a single delay known as an interframe space (IFS).

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Medium Access Control Logic

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Distributed Coordination Function A station with a frame to transmit senses the medium. If the medium is idle, it waits to see if the medium remains idle for a time equal to IFS. If so, the station may transmit immediately. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Distributed Coordination Function Once the current transmission is over, the station delays another IFS. If the· medium remains idle for this period, then the station backs off a random amount of time and again senses the medium. If the medium is still idle, the station may transmit. During the backoff time, if the medium becomes busy, the backoff timer is halted and resumes when the medium becomes idle. If the transmission is unsuccessful, which is determined by the absence of an acknowledgement, then it is assumed that a collision has occurred.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved BINARY EXPONENTIAL BACKOFF ALGORITHM Randomization when a collision occurs After collision, time is divided up into discrete slots whose length is the worst case round-trip propagation time (2 tau) Assuming 2.5km and 4 repeaters the slot time is 51.2 microsec After i collisions (between one or more stations) each station picks a random number between [0 2^(i-1)] and that number of slots is skipped (work out for 1, 2, 3 collisions)

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved BINARY EXPONENTIAL BACKOFF ALGORITHM –After 10 collisions the max randomization interval is 1023 slots –After 16 collisions controller gives up and reports a failure. –Note CSMA/CD provides no acknowledgements. There are modifications to deal with this but you are not responsible in this course.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Interframe Space (IFS) Values Short IFS (SIFS) Shortest IFS Used for immediate response actions Point coordination function IFS (PIFS) Midlength IFS Used by centralized controller in PCF scheme when using polls Distributed coordination function IFS (DIFS) Longest IFS Used as minimum delay of asynchronous frames contending for access

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IFS Usage SIFS Acknowledgment (ACK) Clear to send (CTS) Poll response PIFS Used by centralized controller in issuing polls Takes precedence over normal contention traffic DIFS Used for all ordinary asynchronous traffic

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Point Coordination Function an alternative access method implemented on top of the Dep. The operation consists of polling by the centralized polling master (point coordinator). The point coordinator makes use of PIFS when issuing polls. Because PIFS is smaller than DIFS, the point coordinator can seize the medium and lock out all asynchronous traffic while it issues polls and receives responses.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved MAC Frame Format

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved MAC Frame Fields Frame Control – frame type, control information Duration/connection ID – channel allocation time for successful transmission of a MAC frame. In some control frames, this field contains an association, or connection, identifier.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved MAC Frame Fields Addresses – context dependant, types include source and destination transmitting station and receiving station Sequence control – Contains a 4-bit fragment number subfield used for fragmentation and reassembly, and a 12-bit sequence number used to number frames sent between a given transmitter and receiver. Frame body – MSDU or fragment of MSDU Frame check sequence – 32-bit CRC

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Frame Control Fields Protocol version – version Type – control, management, or data Subtype – identifies function of frame To DS – 1 if destined for DS From DS – 1 if leaving DS More fragments – 1 if fragments follow Retry – 1 if retransmission of previous frame

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Frame Control Fields Power management – 1 if transmitting station is in sleep mode More data – Indicates that station has more data to send WEP – 1 if wired equivalent protocol is implemented Order – 1 if any data frame is sent using the Strictly Ordered service

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Control Frame Subtypes Power save – poll (PS-Poll) Request to send (RTS) Clear to send (CTS) Acknowledgment Contention-free (CF)-end CF-end + CF-ack

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Control Frame Subtypes Power save – poll (PS-Poll) : This frame is sent by any station to the station that includes the AP (access point). Its purpose is to request that the AP transmit a frame that has been buffered for this station while the station was in powersaving mode.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Control Frame Subtypes Request to send (RTS) : This is the first frame in the four-way frame exchange discussed under the subsection on reliable data delivery at the beginning of Section The station sending this message is alerting a potential destination, and all other stations within reception range, that it intends to send a data frame to that destination.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Control Frame Subtypes Clear to send (CTS): This is the second frame in the four-way exchange. It is sent by the destination station to the source station to grant permission to send a data frame. Acknowledgment: Provides an acknowledgment from the destination to the source that the immediately preceding data, management, or PS- Poll frame was received correctly.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Control Frame Subtypes Contention-free (CF)-end: Announces the end of a contention-free period that is part of the point coordination function. CF-end + CF-ack: Acknowledges the CF-end.This frame ends the contention free period and releases stations from the restrictions associated with that period.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Data Frame Subtypes Data-carrying frames Data Data + CF-Ack Data + CF-Poll Data + CF-Ack + CF-Poll Other subtypes (don’t carry user data) Null Function CF-Ack CF-Poll CF-Ack + CF-Poll

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Data Frame Subtypes Data: This is the simplest data frame. It may be used in both a contention period and a contention-free period. Data + CF-Ack: May only be sent during a contention-free period. In addition to carrying data, this frame acknowledges previously received data.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Data Frame Subtypes Data + CF-Poll: Used by a point coordinator to deliver data to a mobile station and also to request that the mobile station send a data frame that it may have buffered. Data + CF-Ack + CF-Poll: Combines the functions of the Data + CF-Ack and Data + CF-Poll into a single frame.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Data Frame Subtypes The Null Function data frame carries no data, polls, or acknowledgments. It is used only to carry the power management bit in the frame control field to the AP, to indicate that the station is changing to a low-power operating state. The remaining three frames (CF-Ack, CF-Poll, CF-Ack + CF-Poll) have the same functionality as the corresponding data frame subtypes in the preceding list (Data + CF-Ack, Data + CF-Poll, Data + CF-Ack + CF-Poll) but without the data.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Management Frame Subtypes Association request Association response Reassociation request Reassociation response Probe request Probe response Beacon

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Management Frame Subtypes Announcement traffic indication message Dissociation Authentication Deauthentication

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Management Frame Subtypes Association Request: Sent by a station to an AP to request an association with this BSS. This frame includes capability information, such as whether encryption is to be used and whether this station is pollable. Association Response: Returned by the AP to the station to indicate whether it is accepting this association request.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Management Frame Subtypes Reassociation Request: Sent by a station when it moves from one BSS to another and needs to make an association with the AP in the new BSS. The station uses reassociation rather than simply association so that the new AP knows to negotiate with the old AP for the forwarding of data frames. Reassociation Response: Returned by the AP to the station to indicate whether it is accepting this reassociation request.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Management Frame Subtypes Probe Request: Used by a station to obtain information from another station or AP. This frame is used to locate an IEEE BSS. Probe Response: Response to a probe request. Beacon: Transmitted periodically to allow mobile stations to locate and identify a BSS.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Management Frame Subtypes Announcement Traffic Indication Message: Sent by a mobile station to alert other mobile stations that may have been in low power mode that this station has frames buffered and waiting to be delivered to the station addressed in this frame. Dissociation: Used by a station to terminate an association.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Management Frame Subtypes Authentication: Multiple authentication frames are used in an exchange to authenticate one station to another. Deauthentication: Sent by a station to another station or AP to indicate that it is terminating secure communications.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Wired Equivalent Privacy

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved WEP WEP is used to provide privacy as well as data integrity. The integrity algorithm is simply the 32-bit CRC that is appended to the end of the MAC Frame. A 40-bit secret key is shared by the two participants in the exchange. An initialization vector (IV) is concatenated to the secret key.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved WEP The resulting block forms the seed that is input to the pseudorandom number generator (PRNG). The PRNG generates a bit sequence of the same length as the MAC frame plus its CRC. A bit-by-bit exclusive OR between the MAC frame and the PRNG sequence produces the ciphertext. The IV is attached to the ciphertext and the resulting block is transmitted.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved WEP The IV is changed periodically (as often as every transmission). Every time the IV is changed, the PRNG sequence is changed which complicates the task of an eavesdropper.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved WEP At the receiving end, the receiver retrieves the IV from the data block. Concatenates IV with the shared secret key to generate the same key sequence used by the sender. The key sequence is then XORed with the incoming block to recover the plain text.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Authentication Open system authentication Exchange of identities, no security benefits Shared Key authentication Shared Key assures authentication

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Authentication Open system authentication simply provides a way for twp parties to agree to exchange data and provides no security benefits. One party sends a MAC control frame known as authentication frame to the other party. The frame indicates that this is an open system authentication type. The other party responds with its own authentication frame and the process is complete. Thus open system authentication consists simply of the exchange of the identities between the two parties.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Authentication Shared Key authentication requires the two parties share a secret key not shared by any other party. This key is used to assure that both sides are authenticated to each other. The procedure for authentication between two parties A and B is as follows

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Authentication A sends a MAC authentication frame with an authentication algorithm identification of shared key with a station identifier that identifies the sending station. B responds with an authentication frame that includes a challenge text. The challenge text is generated using WEP PRNG.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Authentication A transmits an authentication frame that includes the challenge text just received from B. The entire frame is encrypted using WEP. B receives the encrypted frame and decrypts it using WEP and the secret key shared with A. If decryption is successful ( Matching CRC’s) then B compares the incoming challenge text with the challenge text it sent. B then sends an authentication message to A with a status code indication success or failure.

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Physical Media Defined by Original Standard Direct-sequence spread spectrum Operating in 2.4 GHz ISM band Data rates of 1 and 2 Mbps Frequency-hopping spread spectrum Operating in 2.4 GHz ISM band Data rates of 1 and 2 Mbps Infrared 1 and 2 Mbps Wavelength between 850 and 950 nm

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE a and IEEE b IEEE a Makes use of 5-GHz band Provides rates of 6, 9, 12, 18, 24, 36, 48, 54 Mbps Uses orthogonal frequency division multiplexing (OFDM) Subcarrier modulated using BPSK, QPSK, 16-QAM or 64-QAM IEEE b Provides data rates of 5.5 and 11 Mbps Complementary code keying (CCK) modulation scheme Extension of IEEE DS-SS

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE g This works in the 2.4 GHz band (like b) uses the same OFDM based transmission scheme as aOFDM It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput g hardware is fully backward compatible with b hardware

Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved IEEE n n is an amendment which improves upon the previous standards by adding multiple-input multiple-output antennas (MIMO).multiple-input multiple-output n operates on both the 2.4 GHz and the lesser used 5 GHz bands. It operates at a maximum net data rate from 54 Mbit/s to 600 Mbit/s.