802.11 WLAN 1. IEEE 802.11 Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers – IR – FHSS – DSSS.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
IEEE Overview Onno W. Purbo
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Wireless# Guide to Wireless Communications
University of Calgary – CPSC 441
IEEE b Wireless LANs Carey Williamson Department of Computer Science University of Calgary.
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
MAC Architecture Module-7 Jerry Bernardini Community College of Rhode Island 6/18/2015Wireless Networking J. Bernardini1.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
110/15/2003CS211 IEEE Standard Why we study this standard: overall architecture physical layer spec. –direct sequence –frequency hopping MAC layer.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CS, NCTU.
Wireless Local Area Networks (WLAN)
WLAN b a Johan Montelius
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Computer Networking Lecture 4 – and more.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
UNDER THE GUIDANCE OF MR. S.K. DANI (SDE) SUBMITTED BY:
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CSIE, NCTU.
Wireless Personal Communications Systems – CSE5807
CWNA Guide to Wireless LANs, Second Edition
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
IEEE Wireless LAN Standard
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
CSC 581 Communication Networks II Chapter 6c: Local Area Network (Wireless LAN – ) Dr. Cheer-Sun Yang.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u.. To get to know about more.
Mozafar Bag-Mohammadi University of Ilam
Universität Karlsruhe Institut für Telematik ECE 591
IEEE Wireless LAN Standard
Introduction to IEEE
WLAN.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN Standard
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless Local Area Network
Wireless Technologies
Wireless LANs Wireless proliferating rapidly.
Wireless Ad Hoc/Sensor Networks: From IEEE 802
Wireless Mesh Networks
CS 457 – Lecture 7 Wireless Networks
WiFi Networks: IEEE b Wireless LANs
Chapter 6 Medium Access Control Protocols and Local Area Networks
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
WiFi Networks: IEEE b Wireless LANs
Presentation transcript:

WLAN 1

IEEE Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers – IR – FHSS – DSSS Lecture 4: and more2

3 Wifi and WLAN Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE communications standard for Wireless Local Area Networks (WLANs). Wi-Fi Network connect computers to each other, to the internet and to the wired network. Maximum radiated power 1 W in US and 100 mW in EU countries (India commonly follows EU regulations but exact figures are not known to me right now)

particulars b (WiFi) – Frequency: Ghz DSSS – Modulation: DBPSK (1Mbps) / DQPSK (11 Mbps) – Orthogonal channels: 3 There are others, but they interfere. (!) – Rates: 1, 2, 5.5, 11 Mbps a: Faster, 5Ghz OFDM. Up to 54Mbps g: Faster, 2.4Ghz, up to 54Mbps

IEEE b Appeared in late 1999 Operates at 2.4GHz radio spectrum 11 Mbps (theoretical speed) - within 30 m Range 4-6 Mbps (actual speed) feet range Most popular, Least Expensive Interference from mobile phones and Bluetooth devices which can reduce the transmission speed.

IEEE a Introduced in 2001 (less popular) Operates at 5 GHz 54 Mbps (theoretical speed) Mbps (Actual speed) feet range More expensive Not compatible with b

7 IEEE g Introduced in 2003 Combine the feature of both standards (a and b) feet range 54 Mbps Speed 2.4 GHz radio frequencies Compatible with IEEE b

Physical Layer There are three sublayers in physical layer: Direct Sequence Spread Spectrum (DSSS) Frequency Hoping Spread Spectrum (FHSS) Diffused Infrared (DFIR) - Wide angle

Lecture 4: and more DSSS Direct sequence signaling technique divides the 2.4 GHz band into MHz channels. Adjacent channels overlap one another partially, with three of the 11 being completely non-overlapping. Data is sent across one of these 22 MHz channels without hopping to other channels.

details Three types of frames (see the WLAN tutorial manual for details): – data frame – control frame – management frame Fragmentation – can fragment large packets (this is separate from IP fragmentation). Preamble (check this carefully) – 72 1Mbps, 48 2Mbps – Note the relatively high per-packet overhead. Control frames – RTS/CTS/ACK/etc. Management frames – Association request, beacons, authentication, etc.

Overview, Architecture STA AP ESS BSS Existing Wired LAN Infrastructure Network Ad Hoc Network BSS: Basic Service Set ESS: Extended Service Set

Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point Architecture of infrastructure network Station (STA) – terminal with access mechanisms to the wireless medium and radio contact to the access point Basic Service Set (BSS) – group of stations using the same radio frequency Access Point – station integrated into the wireless LAN and the distribution system Portal – bridge to other (wired) networks Distribution System – interconnection network to form one logical network (EES: Extended Service Set) based on several BSS STA 1 STA 2 STA 3 ESS

Architecture of an ad- hoc network Direct communication within a limited range – Station (STA): terminal with access mechanisms to the wireless medium – Basic Service Set (BSS): group of stations using the same radio frequency LAN BSS LAN BSS 1 STA 1 STA 4 STA 5 STA 2 STA 3

modes Infrastructure mode – All packets go through a base station – Cards associate with a BSS (basic service set) – Multiple BSSs can be linked into an Extended Service Set (ESS) Handoff to new BSS in ESS is pretty quick – Wandering around CMU Moving to new ESS is slower, may require re-addressing – Wandering from CMU to Pitt Ad Hoc mode – Cards (network interface card or NIC) communicate directly – Perform some, but not all, of the AP functions

Services: Station services ( activity within a single cell) : – authentication, – de-authentication, – privacy, – delivery of data Distribution services (manage cell membership and interact with stations outside the cell): – association – disassociation – Re-association – distribution – Integration A station maintain two variables: authentication state (≥ 1) i.e., can authenticate with more than one AP-s association state (≤ 1) i.e., can associate with one or zero APs

IEEE standard mobile terminal access point server fixed terminal application TCP PHY MAC IP MAC PHY application TCP PHY MAC IP MAC PHY LLC infrastructure network LLC

Layers and functions PLCP Physical Layer Convergence Protocol – clear channel assessment signal (carrier sense) PMD Physical Medium Dependent – modulation, coding PHY Management – channel selection, MIB Station Management – coordination of all management functions PMD PLCP MAC LLC MAC Management PHY Management MAC – access mechanisms, fragmentation, encryption MAC Management – synchronization, roaming, MIB, power management PHY DLC Station Management MIB: management information base

MAC Management Functions The MAC Management is responsible for the following: – maintaining time synchronization between stations transmitting beacons – channel scanning – forming, joining or leaving a BSS or IBSS – power management – association and re-association The last four functions above are carried out in response to requests from the Station Management Entity (SME)

19 MAC Management Structure

20 Time Synchronization and Beacons

Time Synchronization All stations maintain a Time Synchronization Function (TSF) The TSF is a timer, counting in microseconds with a modulus (i.e. length) of 2 64 (2 10 ) 6 = Stations within a BSS or IBSS synchronize their TSF by transmitting or receiving Beacons. Each beacon contains the value of the TSF of the transmitting station All TSF values are adjusted to take account of propagation and processing delays

Beacon: Beacons are management frames and contain all network information Beacons are transmitted periodically to announce the presence of a BSS (or IBSS) In an infrastructure network, only the AP transmits the beacon In an IBSS beacon generation is distributed amongst the participating STA-s The Beacon frame consists of MAC header (to be discussed later), frame body and FCS

Beacon (contd): Important parameters in a beacon are: – Time interval: beacons are transmitted periodically. This field provides the period of beacon transmission – Time stamp: Timestamp is the time at which an event is recorded by the computer- and not necessarily the time when the event occurred. The beacon timestamp enables the receiving STA to update its local clock and synchronise with the transmitting STA – Service set identifier (SSID): the SSID identifies a specific ESS. An AP transmits the SSID in the beacon frame and an STA is usually required to configure itself with the same SSID. Noted afterwards that it poses security problems and it is possible to disable this field – Supported rate: a beacon may inform that only 1 and 5.5 Mbps rates are supported, or 11 Mbps is not supported etc (for example) – Parameter sets: includes information about modulation, hopping parameters (for frequency hopped system) etc

Beacons: – Capability set: the requirements that the STA-s in the BSS should adhere to; for example, if they must use wired equivalent privacy (WEP) – Traffic indication map (TIM): is sent by an AP to indicate if an STA in a power saving mode would have data to receive (from the AP) An probe –response frames are quite close to beacon frames except that they do not contain the TIM field A beacon interval is a configurable parameter and expressed in time unit (TU). A time unit is 1024 micro-sec (note the difference from a mili-sec). The beacon interval is commonly set to 100 TU. In an IBSS, an initiating STA sends a beacon; if an STA does not hear a beacon within a random time interval it may send its own beacon frame to instantiate an IBSS

Beacon Frame

26 Synchronization in a BSS In a BSS, the AP is the only station to transmit beacons. Beacons indicate – that it is an Access Point – the TSF value of the AP – the beacon period (i.e. time between beacons) All other stations shall update their TSF to the value in the beacons sent by the AP

27 Beacon Transmission in a BSS Beacons are supposed to be transmitted at regular intervals However, If a beacon transmission is delayed due to the medium being busy, subsequent beacons shall be transmitted according to the original schedule

Authentication Process IEEE defines two different MAC layer authentications: - Open System Authentication - Shared Key Authentication These authentication mechanisms are defined with respect to infrastructure network only. Pre-authentication: Pre-authentication is typically done by a STA while it is already associated with an AP. If the authentication is left until re- association time, this may impact the speed with which a STA can reassociate between APs, limiting BSS-transition mobility performance. Authentication will be discussed afterwards

Synchronization in an IBSS The station that instantiates the IBSS sets the beacon period All other stations shall wait until they have received a beacon before sending any beacons A station shall update its TSF to the value in the received beacon if the received value is greater than the station’s TSF Given the time the beacon was received, and the beacon period, stations can calculate Target Beacon Transmission Time (TBTT) for all following beacons

Management Operations Scanning Association/Reassociation Time synchronization (using Time synchronization function (TSF)) Power management

Scanning & Joining Goal: find networks in the area Passive scanning – No require transmission  saves power – Move to each channel, and listen for Beacon frames Active scanning – Requires transmission  saves time – Move to each channel, and send Probe Request frames to solicit Probe Responses from a network Joining a BSS: listen to the beacon and get the following done: – Synchronize in TSF and frequency (using beacon time stamp): Adopt PHY parameters : authenticate

I wish to discuss authentication separately A glimpse of the authentication process Data protection 802.1X authentication 802.1X key management RADIUS-based key distribution Security capabilities discovery Authentication Server Access Point Station

Association in AP 1: Association request 2: Association response 3: Data traffic Client

Reassociation in New AP 1: Reassociation request 3: Reassociation response 5: Send buffered frames Old AP 2: verify previous association Client 6: Data traffic

Time Synchronization in Timing synchronization function (TSF) – AP controls timing in infrastructure networks – All stations maintain a local timer – TSF keeps timer from all stations in sync Periodic Beacons convey timing – Beacons are sent at well known intervals – Timestamp from Beacons used to calibrate local clocks – Local TSF timer mitigates loss of Beacons

Power Management in A station is in one of the three states – Transmitter on – Receiver on – Both transmitter and receiver off (dozing) AP buffers packets for dozing stations AP announces which stations have frames buffered in its Beacon frames Dozing stations wake up to listen to the beacons If there is data buffered for it, it sends a poll frame to get the buffered data Lecture 4: and more36

Lecture 4: and more37