IEEE 802.11 WLAN By Orly Meir & Ilan Bar IEEE 802.11 overview.

Slides:



Advertisements
Similar presentations
Introduction to IEEE Wireless LAN Standard Huafeng Lü Sep 10, 2002.
Advertisements

Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
Wireless LAN (not assessed) Dr Sandra I. Woolley.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Wireless Networking So we talked about wired networks. What about wireless?
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Network Architecture and Design Wireless & Mobile Systems IEEE WLAN.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Wireless Local Area Networks (WLAN)
WLAN b a Johan Montelius
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
Wireless Ethernet IEEE Standard Overview Dirk Grunwald Assoc. Professor Dept. of Computer Science University of Colorado, Boulder.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
An Introduction to Wireless LANs
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Universität Karlsruhe Institut für Telematik ECE 591
IEEE Wireless LAN Standard
Introduction to IEEE
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless MAC.
Wireless MAC.
EA C451 (Internetworking Technologies)
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Ad Hoc/Sensor Networks: From IEEE 802
Wireless Mesh Networks
CS 457 – Lecture 7 Wireless Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
Presentation transcript:

IEEE 802.11 WLAN By Orly Meir & Ilan Bar IEEE 802.11 overview

Agenda The wireless revolution IEEE 802.11 vs. 802.3 Architecture (introduction) WLAN 802.11 requirements Wireless Network Overview IEEE 802.11 services MAC Layer Reliability of data delivery service Control of shared WL network Frame Types Management Frame Types Privacy service Open Issues The IEEE task groups for 802.11 802.11 documentation IEEE 802.11 overview

The wireless revolution NO WIRES Goals One Wireless standard for at Home, in the Office, and on the Move. Interoperability with wired networks Security, QOS, Roaming users. Usage: Entertainment (films, shows, gaming, music,..) Information (Internet, ..) E-commerce (secure home shopping,..) Social contacts (email, voice, interest groups,..) PC (documents, data, printing, scanner, server, ...) Control (A/V devices, security, ..) IEEE 802.11 overview

IEEE 802.11 vs. 802.3 Similarity Differences Same LLC (Logical Link Control). There in no differences for upper layer protocol Differences WLAN is not private (not protected) WLAN is exposed to more distractions (environment problems) Reflectors Changes in strength on the Rx signal in small position change Moving object can change the wave signal Other infrared devices overlap the Tx path. Etc… Mobility The WLAN user can move from one place to another – big advantage. But it cause internal complexity. Roaming between access points and between different IP networks (Mobile IP or DHCP). Servers and services need to be changed (Printer, Proxy server, file server, etc…) IEEE 802.11 PHY has NO collision detection IEEE 802.3 use collision detection algorithm. IEEE 802.11 use collision avoidance algorithm. Translation of 802.11  802.3 is not on the scope of the IEEE 802.11 spec’ IEEE 802.11 overview

Architecture IEEE 802.11 overview

WLAN 802.11 requirements Mobility Tolerant to faults Support: Small and transient (temporary) Networks Large [semi-]permanent Networks Power saving without losing network connectivity. Allow all network protocols to run over WLAN without any considerations. IEEE 802.11 overview

Wireless Network Overview APs (access points) and stations BSS (Basic service set) DS (Distribution system) and ESS (Extended Service Set) Ad-hoc networks IEEE 802.11 overview

WLAN 802.11 network DS (usually Ethernet) AP AP STA STA BSS BSS ESS Wireless connection DS (usually Ethernet) ESS BSS AP STA AP STA BSS

APs & stations Each node in the IEEE 802.11 network may be station (STA) or and access point In definition AP contains a station. IEEE 802.11 overview

BSS Set of arbitrary stations, and one AP Station have to be associated with the AP in order to be part of the BSS Local relay function through the AP. Advantage : When station is in power saving mode the AP will buffer traffic for the (sleeping) mobile station. Disadvantage: Consume twice bandwidth IEEE 802.11 overview

DS Logical communication between the APs The DS is the backbone of the WLAN and may be constructed over wired or wireless connection. The communication between the APs over the DS, is in the scope of TGf (IAPP – inter access point protocol). The connection of the several BSS networks  forms Extended Service Set (ESS) IEEE 802.11 overview

ESS Group more than one BSS networks The APs communicate among themselves to form relay between the BSS domains, through abstract distribution system (DS) IEEE 802.11 overview

Ad-hoc networks (IBSS) Temporary set of stations Forming as ad-hoc network – an independent BSS (IBSS), means that there is no connection to wired network No AP No relay function (direct connection) Simple setup IEEE 802.11 overview

Ad-hoc networks Direct connection No Relay IEEE 802.11 overview

Hybrids Ethernet IEEE 802.11 overview

IEEE 802.11 services Station services (similar to wired network) Authentication (login) De-authentication (logout) Privacy Data delivery Distribution services Association Make logical connection between the AP to the station – the AP will not receive any data from a station before the association. assist the DS to know where to deliver the mobile data. (sets the AID) Reassociation ( Similar to the association ) Send repeatedly to the AP. Help to AP to know if the station has moved from/to another BSS. After Power Save Disassociation Manually disconnect (PC shutdown or adapter is ejected) Distribution (AP forwarding using the DS) Determine how to deliver Internal in the BSS It’s own station To another BSS or network

Handshake protocol BSS IBSS Authentication in not defined Association before every connection Data delivery state IEEE 802.11 overview

Services example : Roaming 1- Authenticate and associate 2 – Laptop roaming 3 – Authenticate (if needed) and (re)associate 4 – Notify the new location of the laptop (disassociation of AP1) 2 1 3 4 AP3 AP1 AP2 IEEE 802.11 overview

Services example : “Out of service” Old BSS New BSS AP2 is out of service AP3 AP1 AP2 IEEE 802.11 overview

Medium Access Control (MAC) Layer IEEE 802.11 overview

MAC functionalities Reliability of data delivery service Control of shared WL network Frame Types (informational section) Management Privacy service (Wired Equivalent Privacy - WEP) IEEE 802.11 overview

Reliability of data delivery service Problems to solve The air is noisy and unreliable media The Hidden Node problem Solutions : Frame Exchange Protocol Every frame is acknowledged (ACK) CTS & RTS frames Fragment long data frames (see Fragmentation) IEEE 802.11 overview

Acknowledgments (ACK) Note: as said before WL media has no PHY collision detection. Traffic flow: Data is being sent (Source  Destination) If the data was received correctly in the destination, an ACK (Destination  Source) will be sent back. If ACK is returned than go to 6. Else (data was not received or ACK didn’t returned), increment the retry counter. If retry counter < MAX_RETRY_COUNTER go to 1 Else (counter exceeded) transmit failed (frame is lost) Transmition succeeded, continue. IEEE 802.11 overview

The Hidden Node problem C A B Problems A Send data to B C can disturb transmition A  B because C can’t hear A Direct connections: A  B C  B IEEE 802.11 overview

Solving the Hidden Node problem Request To Send (RTS): Source announcing its transmition. Will cause its neighborhood stop transmitting Clear To Send (CTS): Destination received the RTS and announce the source to send the data. Will cause its (the destination) neighborhood stop transmitting. IEEE 802.11 overview

Example B A C Atomic unit RTS CTS Data ACK Area cleared by the RTS by the CTS 2. CTS 2. CTS 1. RTS A C Atomic unit RTS CTS Data ACK IEEE 802.11 overview

Notes RTS and CTS can be avoided by threshold parameter. This is useful in ‘all connected’ topology. The RTS and CTS bandwidth will be saved this way (typical threshold is 128 bytes) RTS and CTS mechanism can be used in BSS and IBSS. AP is never a Hidden node. Retransmit counters are configurable Short frames retry counter Long frames retry counter When data transmition fails (by retransmit counter), the MAC layer will notify it to the MAC user, through the service interface. Short/Long Frame length is also configurable IEEE 802.11 overview

Control of shared WL network MAC access mechanism Distributed Coordination Function Based on the IEEE 802.3 Ethernet access mechanism. Point Coordination Function Token based mechanism (one Point Coordinator in the BSS at the AP, that gives the ‘token’ to speak) Not relevant to WLAN implementations. IEEE 802.11 overview

Distributed Coordination Function Carrier Sense Multiple Access Collision Avoidance (CSMA/CA), uses binary exponential backoff (Same as in IEEE 802.3) IEEE 802.3 use collision detection algorithm. IEEE 802.11 use collision avoidance (CA) algorithm Listen Before Talk – LBT (don’t transmit while others transmit to avoid collision) Network Allocation Vector (NAV) – the time till the network will be cleared from any transmitting. The NAV with the LBT assist to avoid collisions (CA) IEEE 802.11 overview

NAV setting Next transmition SIFS – Short Interframe Space DIFS - Distributed Interframe Space DIFS Source Destination Other Next transmition RTS Data SIFS SIFS SIFS NAV (RTS) NAV (CTS) CTS ACK DIFS Defer Access Backoff IEEE 802.11 overview

Frame Formats PHY IEEE 802.11 Data 0 - 2312 2 12 4 1 FCS Frame Control Duration / ID Address 1 Address 2 Address 3 Sequence Address 4 Data FCS Protocol version Type Sub Type info 2 12 Sub Type To DS From More Frag Retry Pwr MNG Data WEP Order 4 1 IEEE 802.11 overview

Time in microseconds. Update the NAV time in the neighborhood Control Frame Types RTS CTS ACK Power Save poll Contention Free (CF) End & CF-End+ACK Frame Control Duration RA TA FCS Frame Control Duration RA FCS Frame Control Duration RA FCS Frame Control AID BSS ID TA FCS Frame Control Duration = 0 RA BSS ID FCS IEEE 802.11 overview

Data Frame Types Function To DS From DS Address 1 Address 2 Address 3 Control Duration / ID Address 1 Address 2 Address 3 Sequence Control Address 4 Data FCS Receiver Transmitter Function To DS From DS Address 1 Address 2 Address 3 Address 4 IBSS RA = DA SA BSSID N/A From AP 1 To AP RA = BSSID DA Wireless DS RA TA Note Broadcast and multicast never leave the BSS IEEE 802.11 overview

Data Frame Fields Duration Time in microseconds from end of data frame (including the ACK frame to this data frame). Must be zero for multicast frame. Address 1 Destination address (the receiver address) Address 2 The source address (the transmitter address) Address 3 DS information Address 4 Used only in wireless DS IEEE 802.11 overview

Management Frame Types Same as data frames, but with different type field Restricted to 3 addresses Include beacons, association and authentication messages Management frame are generated and terminated within the MAC layer IEEE 802.11 overview

Beacons Transmitted periodically by the AP to locate and identify its BSS The AP will send a Beacon to notify the station that it has buffered frames to that station. The station don’t have to wakeup every Beacon (in the IBSS the station MUST wakeup in Beacon receive) When the station wakes up it sends power save poll frame to the AP. The AP than will send to the station its buffered frames. In IBSS Beacons are sent also. Every time it sent by another station, see “Synchronization” notes: Timer Synchronization Function (TSF) timer Synchronize the clock. Target Beacon Transmitting Timer control the Beacons periods In IBSS, a station will not power down until it hears Beacon from another station IEEE 802.11 overview

The Probe Frame Transmitted by a mobile station, attempting to quickly locate a WLAN. May be used to locate particular BSS (SSID) or any WLAN Used in active scanning, see “Combining Management Solutions” Probe Response looks like a Beacon frame, sent by AP in the BSS or by last transmitting Beacon station in the IBSS (see “Synchronization”) IEEE 802.11 overview

(De)Authentication Verify identification between station and its AP. A station can be authenticated with many APs simultaneously. De Authentication: the station notify of the termination of an authentication relation. IEEE 802.11 overview

(Re/De)Association Used to make a logical connection between the mobile station and its AP. See the “Handshake protocol” The logical connection useful for the AP to deliver frames to/from the mobile station, and to allocate resources to the mobile station. The output of the Association is the Association ID (AID). This AID+BSSID will be send in the power save poll (see Control Frame Types). Invoked once, when : mobile station is entering the WLAN for the first time After power saving state After being out of touch Re-association is similar to the association but it contains information about the AP. This will assist the mobility function, see “Roaming example” The De-Association will terminate the association relation. IEEE 802.11 overview

Relationship between station state and the services Control Management Data 1 CTS,RTS,ACK, CF+ACK, CF Probe,Beacon,Auth,deAuth,ATIM Only internal in the BSS 2 (Re,Dis)Association 3 PS-Poll DeAuth (goto state 1) All data types are allowed IEEE 802.11 overview

Fragmentation Needed to decrease the probability of the surrounding destruction (microwave ovens, etc…) by splitting frame to smaller parts It is possible to tune the size from which the frame will be fragmented by a MIB (management Information Base) parameter name - dot11FragmentationTreshold By default no fragmentation is being done. IEEE 802.11 overview

Privacy Any one with antenna can here you Wired Equivalent Privacy (WEP) Only the data is encrypted (the MAC layer is not changed after the encryption). WEP doesn’t protect from traffic analysis. RC4 – symmetric stream cipher algorithm with variable key length is used (same key and algorithm for encryption and decryption) IEEE 802.11 overview

WEP details Two methods: Default keys (up to four) will be shared in the BSS or the whole ESS. It is useful to learn some default keys once The keys can be revealed more easily. One-To-One key mapping. IEEE 802.11 overview

MAC Management We need management environment in order to solve those problems: Noisy media Many users on air Destructions from other WLANs Every one can connect to the WLAN Security issues Mobility Power management IEEE 802.11 overview

MAC Management Solution Threshold and retransmit parameters Address filtering. Authentication Simple authentication (Open System Authentication) Authentication with both side verification (WEP) Notes The authentication connection is one-sided. Usually a station is authenticated to AP. If the AP is a “pretender” we can have security problem. Privacy (WEP) Association Synchronization (Beaconing + Scanning ) Power mng mechanism. 1 2 3 4 IEEE 802.11 overview

Synchronization The process of Synchronize a station to its BSS (MAC/PHY) parameters. Includes Beaconing (announce the presents of the BSS :AP  STA) and Scanning (find a BSS: STA  AP) Beaconing In the BSS AP sends periodically Beacons. This will update the Timer Synchronization Function (TSF) . This timer is used to sync’ the station for the CA mechanism. In the IBSS No AP the update the TSF. First station will reset the TSF, and will adjust the Beacon periods. The next Beacon transmitting is chosen like a back off algorithm (each station choose random number for delay. The first to transmit will stop the other stations. However if there is a Beacon collision which will cause several Beacons at once, the IEEE 802.11 support this case).

Synchronization cont’ Scanning Passive scanning: The station will scan all channels It will listen to each channel for a period of time (not defined in the spec’), to find a BSS Saves bandwidth and transmit power Active scanning: It will send a Probe request to get details on the BSS, if exists in the current channel. In the end of the Synchronization process the station will have information on the BSSs and it will decide which BSS to join (not defined in the spec’). IEEE 802.11 overview

Power Management In BSS In IBSS The station that want to enter into power save mode send to the AP a power save bit in the frame control. This means that in the end of the traffic flow, it will enter into power save mode . In IBSS The station will enter into power save mode only after it has finished its current connection with another station (No specification in IEEE 802.11 when to enter into power save mode). A Beacon frame always cause the station to wakeup, because there is no AP to buffer the incoming traffic to the station. After the Beacon was received the station MUST stay awake for Ad-Hoc Traffic Message Window The spec’ defines that every period of time one of the stations in the IBSS will send a Beacon. (see Beacons) IEEE 802.11 overview

Combining Management Solutions Power Saving with Scanning Mobile station notify the AP that it is in power saving mode. Than start to scan for a new BSS. While the AP will buffer frames that destined to the “sleeping” mobile station, the station will associate with a new AP. The buffered frames and the old station configuration will be transferred to new AP from the old AP to the station. Pre-Authentication with scanning The station can Authenticate with the new AP that is scanned. It will save authentication time when it will go to the new BSS. IEEE 802.11 overview

Open Issues Load balancing between APs IP roaming problems (In BSS & In IBSS) “Tower of Babel” ~40 802.11 different vendors No argument on: QOS Roaming Etc… PAN (connect from public area to remote ISP with security) IEEE 802.11 overview

The IEEE task groups for 802.11 and current status Terms Task group: a committee that tasked by the working group as author of the standard Working group: includes all the task groups MAC task group (last published in 1999) PHY task group (last published in 1999) TGa : define the PHY for 802.11a (last published in 1999) TGb : define the higher rate PHY for 802.11 (completed in 1999) TGb – Cor1 : define the MIB parameters for TGb, (status: ongoing) TGc : wireless LAN with bridge operations (completed) TGd: support by region (country) – (status – ongoing) TGe: QOS (status – ongoing) TGf: AP  AP compatibly protocol (ongoing) TGg: improvements in the 802.11b PHY (ongoing) TGh: improvements in the 802.11a PHY (ongoing) TGi: improvements in security (ongoing) IEEE 802.11 overview

802.11 documentation “IEEE 802.11 handbook, a designers companion”, by Bob O'Hara & Al Petrick “IEEE official standard” IEEE 802.11 overview