802.11 Protocol Details John Bellardo UCSD.

Slides:



Advertisements
Similar presentations
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Advertisements

Wireless LAN (not assessed) Dr Sandra I. Woolley.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
Wireless Networking So we talked about wired networks. What about wireless?
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CS, NCTU.
.11 Architect. 1 Module contents  IEEE Terminology  IEEE MAC Frames  Basic processes in IEEE networks  Configuration parameters.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless Ethernet IEEE Standard Overview Dirk Grunwald Assoc. Professor Dept. of Computer Science University of Colorado, Boulder.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CSIE, NCTU.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
1 MAC Management. 2 Outline Introduction - Authentication, Association - Address filtering, Privacy - Power Management, Synchronization MAC Management.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
1 Chapter 8 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3.
Wireless LANs Prof. F. Tobagi MAC Management 1.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
IEEE Wireless LAN Standard
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Introduction to IEEE
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
1/49 Power Management in IEEE Yu-Chee Tseng.
1/23 Power Management in IEEE Yu-Chee Tseng.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC for WLAN Doug Young Suh Last update : Aug 1, 2009 WLAN DCF PCF.
ECEN 489, Prof. Xi Zhang Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 11.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Chapter 15 Wireless LANs.
IEEE Wireless Local Area Network (WLAN)
Wireless MAC.
Wireless MAC.
EA C451 (Internetworking Technologies)
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Ad Hoc/Sensor Networks: From IEEE 802
Wireless Mesh Networks
Chapter 2 Wireless LANS and PANS
Using Dynamic PCF to improve the capacity of VoIP traffic in IEEE 802
Power Management in IEEE
Specification overview
Chapter 6 Medium Access Control Protocols and Local Area Networks
Basic processes in IEEE networks Configuration parameters
Chapter 15 Wireless LANs.
Specification overview
Enhanced MAC proposal for high throughput.
Wireless LAN Technologies and Products
Specification overview
Specification overview
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
Is for “Wireless Fidelity” Or IEEE Standard By Greg Goldman
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
Specification overview
Specification overview
MITP 413: Wireless Technologies Week 8
Specification overview
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

802.11 Protocol Details John Bellardo UCSD

Introduction 802.11 specifies: 802.11b specifies: Physical Connection (Layer 1): 2.4 GHz 1 & 2 mbit DSSS 2.4 GHz 1 & 2 mbit FH 850 nm to 950 nm IR Common Data Link (Layer 2) 802.11b specifies: Extends 802.11 radio PHY up to 11 mbits

Outline Network Components Higher Level Services Medium Access Authentication, Association, Encryption Medium Access Frame Format, CSMA/CA, Ad Hoc, Managed Power Management

Network Components ESS BSS BSS AP DS AP IBSS

Outline Network Components Higher Level Services Medium Access Authentication, Association, Encryption Medium Access Frame Format, CSMA/CA, Ad Hoc, Managed Power Management

Authentication Each node must authenticate with an AP; authentication optional with non-AP nodes Two authentication algorithms: Open System Shared Key Open System accepts all nodes (null authentication)

Shared Key Authentication Node sends authenticate message to AP AP generates challenge string and sends it back in response Node sends challenge back to AP in a WEP encrypted packet using the shared key AP validates WEP packet, and if valid node is authenticated. Otherwise the node is not authenticated.

Associations (Infrastructure Mode) Every node must associate with an AP Association happens after authentication Node sends association request to AP AP responds with yes/no and an association ID AP registers the node with the DS Authenticated nodes may reassociate at any time APs may disassociate nodes

Wired Equivalent Privacy (WEP) Designed to provide the same level of security as traditional wired networks Prepends a random 3 octet string (IV) to the shared key to form a seed value Uses the seed value to generate a random bit string the length of the message + 4 octets using RC4 from RSA Data Security, Inc. Appends the 4 octet payload CRC to the payload

WEP Cont’d XOR’s the bit string with the payload + CRC Appends the IV in clear text to he payload Sets a WEP bit in the MAC frame header Sends the packet with clear text headers and encrypted payload Only data and authentication frames may be encrypted

Outline Network Components Higher Level Services Medium Access Authentication, Association, Encryption Medium Access Frame Format, CSMA/CA, Ad Hoc, Managed Power Management

General Frame Format Frame Control Sequence Control Octets: 2 2 6 6 6 2 6 0-2312 4 Frame Control Duration/ ID Sequence Control Frame Body Address 1 Address 2 Address 3 Address 4 FCS MAC Header Frame Control Bits: 2 2 4 1 1 1 1 1 1 1 1 Protocol Version To DS From DS More Frag Pwr Mgt More Data Type Subtype Retry WEP Order Sequence Control Bits: 4 12 Fragment Number Sequence Number

CSMA/CA Operation Immediate access when medium is free >= DIFS DIFS Contention Window PIFS Busy Medium DIFS SIFS Backoff-Window Next Frame Slot Time Defer Access Select Slot and Decrement Backoff as long As medium is idle Inter-frame Spacing (short, point, distributed) values (usec): 802.11 DSSS: 10, 30, 50 (20 slot)

RTS/CTS/ACK Operation DIFS Source RTS Data SIFS SIFS SIFS Destination CTS ACK DIFS Other NAV (RTS) Contention Window NAV (CTS) Defer Access Backoff After Defer • Broadcast doesn’t use RTS/CTS/ACK

CFP/CP Medium Allocation • Requires coordination node in BSS Delay (due to busy medium) CFP repetition interval Foreshortened CFP CF Period Contention Period CF Period Contention Period DCF Busy Medium DCF B PCF B PCF Variable Length B = Beacon Frame NAV

CFP Operation Dx = Frames sent by Point Coordinator Contention-Free Repetition Interval Contention-Free Period SIFS SIFS SIFS PIFS SIFS CP Beacon D1+poll D2+a+p D3+a+p D4+p CF-end U1+ack U2+a U4+a PIFS SIFS SIFS No response to CF-Poll SIFS Dx = Frames sent by Point Coordinator Ux = Frames sent by pooled stations Reset NAV NAV CF_Max_Duration

Outline Network Components Higher Level Services Medium Access Authentication, Association, Encryption Medium Access Frame Format, CSMA/CA, Ad Hoc, Managed Power Management

Power Management Requires timer synchronization Infrastructure Mode IBSS

Timer Synchronization Infrastructure AP has master timer Periodically broadcast (in beacons) to BSS IBSS All nodes responsible for beaconing at an interval set by node that started IBSS Nodes adopt greatest timer value Provides 4 usec accuracy

Infrastructure Power Management Node inform AP of power settings; get beacon time intervals Traffic indication maps (TIM’s) included in AP beacons and also sent at known intervals Node polls AP when ready to receive, and for each additional packet as needed Buffered broadcast / multicast packets delivered after delivery TIM (DTIM) in some beacons

IBSS Power Management Packets for power save nodes buffered Ad hoc traffic information message (ATIM) window established after beacon ATIMs sent in this window for buffered data ATIMs require an ACK Data for all ACK’ed ATIMs sent during data period All undeliverable data gets re-ATIM’ed during next window