CHAPTER 11 WIRELESS LAN TECHNOLOGY AND THE IEEE WIRELESS LAN STANDARD

Size: px
Start display at page:

Download "CHAPTER 11 WIRELESS LAN TECHNOLOGY AND THE IEEE WIRELESS LAN STANDARD"

Transcription

1 CHAPTER 11 WIRELESS LAN TECHNOLOGY AND THE IEEE WIRELESS LAN STANDARD These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work on the part of the authors; therefore, we request the following. If these slides are used in a class setting or posted on an internal or external www site, please mention the source textbook and note our copyright of this material. All material copyright 2016 Cory Beard and William Stallings, All Rights Reserved Wireless Communication Networks and Systems 1 st edition Cory Beard, William Stallings 2016 Pearson Higher Education, Inc. Wireless LAN Technology and the IEEE Wireless LAN Standard 11-1

2 INTRODUCTION Wireless LANs (WLANs) Indispensible adjunct to wired LANs Wireless devices use WLANs As their only source of connectivity Or to replace cellular coverage Simple WLAN configuration There is a backbone wired LAN User modules include workstations, servers, devices Control module (CM) interfaces to WLAN Providing bridge or router functionality May have control logic to regulate access May provide wireless connectivity to other wired networks Wireless LAN Technology and the IEEE Wireless LAN Standard 11-2

3 11.1 EXAMPLE SINGLE-CELL WIRELESS LAN CONFIGURATION Wireless LAN Technology and the IEEE Wireless LAN Standard 11-3

4 INTRODUCTION Multiple-cell wireless LAN Multiple CMs connected by a wired LAN Creates many issues for balancing cell loading and providing best connections for Ums Wireless LAN Technology and the IEEE Wireless LAN Standard 11-4

5 11.2 EXAMPLE MULTIPLE-CELL WIRELESS LAN CONFIGURATION Wireless LAN Technology and the IEEE Wireless LAN Standard 11-5

6 AD HOC NETWORKING Temporary peer-to-peer network set up to meet immediate need Peer-to-peer, no centralized server Maybe a temporary network Wireless connectivity provided by WLAN or Bluetooth, ZigBee, etc. Example: Group of employees with laptops convene for a meeting; employees link computers in a temporary network for duration of meeting Wireless LAN Technology and the IEEE Wireless LAN Standard 11-6

7 11.3 AD HOC WIRELESS LAN CONFIGURATION Wireless LAN Technology and the IEEE Wireless LAN Standard 11-7

8 WIRELESS LAN MOTIVATIONS Cellular data offloading WLANs may provide higher data rates and more available capacity Cellular providers may encourage this to offload demand on their networks Sync/file transfer Avoid use of cables Internet access Multimedia streaming Wireless LAN Technology and the IEEE Wireless LAN Standard 11-8

9 WIRELESS LAN REQUIREMENTS Throughput Number of nodes Connection to backbone LAN Service area Battery power consumption Transmission robustness and security Collocated network operation License-free operation Handoff/roaming Dynamic configuration Comparisons between WLANs, wired LANs, and mobile data networks can be visualized with Kiviat graphs. Wireless LAN Technology and the IEEE Wireless LAN Standard 11-9

10 11.4 KIVIAT GRAPHS FOR DATA NETWORKS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-10

11 WIRELESS LAN TECHNOLOGIES Local wireless networks WLAN WiFi a h i/e/ /n/ /z/aq b g Personal wireless nw WPAN ZigBee Bluetooth a/b/c/d/e/f/g ,.6 (WBAN) b/c Wireless LAN Technology and the IEEE Wireless LAN Standard 11-11

12 WIRELESS LAN PHYSICAL LAYER Multi-cell arrangement Transmission Issues No licensing needed Four microwave bands MHz GHz GHz GHz (60-GHz mmwave bands) Higher capacity Less competition More expensive equipment Spread spectrum DSSS CDMA or OFDM Over 1 Gbps possible with OFDM, channel bonding, and MIMO Wireless LAN Technology and the IEEE Wireless LAN Standard 11-12

13 PROTOCOL ARCHITECTURE Developed by the IEEE working group Uses layering of protocols LAN protocols focus on the lower layers of the OSI model Figure 11.5 relates OSI with Called the IEEE 802 reference model Wireless LAN Technology and the IEEE Wireless LAN Standard 11-13

14 11.5 IEEE 802 PROTOCOL LAYERS COMPARED TO OSI MODEL Wireless LAN Technology and the IEEE Wireless LAN Standard 11-14

15 PROTOCOL ARCHITECTURE Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Sublayers Physical medium dependent sublayer (PMD) Transmitting and receiving user data through a wireless medium Physical layer convergence procedure (PLCP) Mapping MAC layer protocol data units (MPDUs) into a framing format Sending and receiving between stations using same PMD sublayer Wireless LAN Technology and the IEEE Wireless LAN Standard 11-15

16 11.6 IEEE 802 PROTOCOLS IN CONTEXT Wireless LAN Technology and the IEEE Wireless LAN Standard 11-16

17 PROTOCOL ARCHITECTURE Functions of medium access control (MAC) layer: On transmission, assemble data into a frame with address and error detection fields On reception, disassemble frame and perform address recognition and error detection Govern access to the LAN transmission medium Functions of logical link control (LLC) Layer: Provide an interface to higher layers and perform flow and error control Wireless LAN Technology and the IEEE Wireless LAN Standard 11-17

18 SEPARATION OF LLC AND MAC The logic required to manage access to a shared-access medium not found in traditional layer 2 data link control For the same LLC, several MAC options may be provided Wireless LAN Technology and the IEEE Wireless LAN Standard 11-18

19 MAC FRAME FORMAT MAC control Contains Mac protocol information Destination MAC address Destination physical attachment point Source MAC address Source physical attachment point CRC Cyclic redundancy check Wireless LAN Technology and the IEEE Wireless LAN Standard 11-19

20 11.7 LLC PDU IN A GENERIC MAC FRAME FORMAT Wireless LAN Technology and the IEEE Wireless LAN Standard 11-20

21 LOGICAL LINK CONTROL Characteristics of LLC not shared by other control protocols: Must support multi-access, shared-medium nature of the link Relieved of some details of link access by MAC layer Wireless LAN Technology and the IEEE Wireless LAN Standard 11-21

22 LLC SERVICES Unacknowledged connectionless service No flow- and error-control mechanisms Data delivery not guaranteed Connection-mode service Logical connection set up between two users Flow- and error-control provided Acknowledged connectionless service Cross between previous two Datagrams acknowledged No prior logical setup Wireless LAN Technology and the IEEE Wireless LAN Standard 11-22

23 DIFFERENCES BETWEEN LLC AND HDLC LLC uses asynchronous balanced mode of operation of HDLC (type 2 operation) LLC supports unacknowledged connectionless service (type 1 operation) LLC supports acknowledged connectionless service (type 3 operation) LLC permits multiplexing by the use of LLC service access points (LSAPs) Wireless LAN Technology and the IEEE Wireless LAN Standard 11-23

24 IEEE Started in 1990 MAC and physical medium specifications Wi-Fi Alliance Industry consortium Creates test suites to certify interoperability of products May identify a subset of the standard for certification Concerned with a range of market areas for WLANs IEEE has an ever expanding list of standards Wireless LAN Technology and the IEEE Wireless LAN Standard 11-24

25 IEEE STANDARDS TABLE 11.1 IEEE STANDARDS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-25

26 IEEE STANDARDS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-26

27 IEEE ARCHITECTURE Distribution system (DS) Access point (AP) Basic service set (BSS) Stations competing for access to shared wireless medium Isolated or connected to backbone DS through AP Extended service set (ESS) Two or more basic service sets interconnected by DS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-27

28 11.8 IEEE ARCHITECTURE Wireless LAN Technology and the IEEE Wireless LAN Standard 11-28

29 DISTRIBUTION OF MESSAGES Distribution service WITHIN A DS Used to exchange MAC frames from station in one BSS to station in another BSS Integration service Transfer of data between station on IEEE LAN and station on integrated IEEE 802.x LAN Wireless LAN Technology and the IEEE Wireless LAN Standard 11-29

30 TRANSITION TYPES BASED ON MOBILITY No transition Stationary or moves only within BSS BSS transition Station moving from one BSS to another BSS in same ESS ESS transition Station moving from BSS in one ESS to BSS within another ESS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-30

31 ASSOCIATION-RELATED SERVICES Association Establishes initial association between station and AP Reassociation Enables transfer of association from one AP to another, allowing station to move from one BSS to another Disassociation Association termination notice from station or AP Wireless LAN Technology and the IEEE Wireless LAN Standard 11-31

32 IEEE MEDIUM ACCESS CONTROL MAC layer covers three functional areas: Reliable data delivery Access control Security Wireless LAN Technology and the IEEE Wireless LAN Standard 11-32

33 RELIABLE DATA DELIVERY More efficient to deal with errors at the MAC level than higher layer (such as TCP) Frame exchange protocol Source station transmits data Destination responds with acknowledgment (ACK) If source doesn t receive ACK, it retransmits frame Four frame exchange Source issues request to send (RTS) Destination responds with clear to send (CTS) Source transmits data Destination responds with ACK Wireless LAN Technology and the IEEE Wireless LAN Standard 11-33

34 ACCESS CONTROL Centralized and decentralized mechanisms together Distributed foundation wireless MAC (DFWMAC) Distributed coordination function (DCF) Decentralized Point coordination function (PCF) Centralized Both are available to the LLC layer Wireless LAN Technology and the IEEE Wireless LAN Standard 11-34

35 11.9 IEEE PROTOCOL ARCHITECTURE Wireless LAN Technology and the IEEE Wireless LAN Standard 11-35

36 DISTRIBUTED COORDINATION FUNCTION Decentralized Carrier sense multiple access (CSMA) Listen to the medium If idle, then transmit If not, wait a random time If busy again, expand the mean waiting time, randomly wait, and try again. Binary exponential backoff describes this procedure The backoff is the waiting process Mean random waiting times get exponentially larger By a factor of 2 each time, hence the term binary. This process responds to heavy loads Since nodes do not know the loads of other nodes trying to send. Wireless LAN Technology and the IEEE Wireless LAN Standard 11-36

37 11.10 IEEE MEDIUM ACCESS CONTROL LOGIC Wireless LAN Technology and the IEEE Wireless LAN Standard 11-37

38 INTERFRAME SPACE (IFS) VALUES Short IFS (SIFS) Shortest IFS Used for immediate response actions Point coordination function IFS (PIFS) Midlength IFS Used by centralized controller in PCF scheme when using polls Distributed coordination function IFS (DIFS) Longest IFS Used as minimum delay of asynchronous frames contending for access Wireless LAN Technology and the IEEE Wireless LAN Standard 11-38

39 IFS USAGE SIFS Acknowledgment (ACK) Clear to send (CTS) Poll response PIFS Used by centralized controller in issuing polls Takes precedence over normal contention traffic DIFS Used for all ordinary asynchronous traffic Wireless LAN Technology and the IEEE Wireless LAN Standard 11-39

40 11.11 IEEE MAC TIMING Wireless LAN Technology and the IEEE Wireless LAN Standard 11-40

41 DCF CONTENTION AND BACKOFF DIFS DIFS bo e bo r DIFS bo e bo r DIFS bo e busy station 1 bo e busy station 2 station 3 busy bo e busy bo e bo r station 4 bo e bo r bo e busy bo e bo r station 5 t busy medium not idle (frame, ack etc.) bo e elapsed backoff time packet arrival at MAC bo r residual backoff time

42 DCF FRAME DETAILED TIMING (1) Sending unicast packets station has to wait for DIFS before sending data receivers acknowledge at once (after waiting for SIFS) if the packet was received correctly (CRC) automatic retransmission of data packets in case of transmission errors sender DIFS data receiver SIFS ACK other stations waiting time DIFS contention data t

43 DCF FRAME DETAILED TIMING (2) Sending unicast packets station can send RTS with reservation parameter after waiting for DIFS (reservation determines amount of time the data packet needs the medium) acknowledgement via CTS after SIFS by receiver (if ready to receive) sender can now send data at once, acknowledgement via ACK other stations store medium reservations distributed via RTS and CTS sender DIFS RTS data receiver SIFS CTS SIFS SIFS ACK other stations NAV (RTS) NAV (CTS) defer access DIFS contention data t

44 DCF FRAGMENTATION sender receiver DIFS RTS SIFS CTS SIFS frag 1 SIFS ACK SIFS 1 frag 2 SIFS ACK2 other stations NAV (RTS) NAV (CTS) NAV (frag 1 ) NAV (ACK 1 ) DIFS contention data t

45 POINT COORDINATION FUNCTION Centralized control Point coordinator polls devices To give them permission to send On a schedule the point coordinator determines The superframe allows time to be shared between DCF and PCF PCF starts the superframe and can only use a certain part of the superframe time Wireless LAN Technology and the IEEE Wireless LAN Standard 11-45

46 POINT COORDINATION FUNCTION (1) t 0 t 1 SuperFrame medium busy point coordinator PIFS D 1 SIFS SIFS D2 SIFS SIFS wireless stations U 1 U 2 stations NAV NAV

47 POINT COORDINATION FUNCTION (2) t 2 t 3 t 4 PIFS D4 SIFS CFend point coordinator D 3 SIFS wireless stations U 4 stations NAV NAV contention free period contention period t

48 SYNCHRONIZATION USING BEACONS (INFRASTRUCTURE) beacon interval (20ms 1s) access point medium B B B B busy busy busy busy value of the timestamp B beacon frame t

49 11.12 IEEE MAC FRAME FORMAT Wireless LAN Technology and the IEEE Wireless LAN Standard 11-49

50 MAC FRAME FIELDS Frame Control frame type, control information Duration/connection ID channel allocation time Addresses context dependent, types include source and destination Sequence control numbering and reassembly Frame body MSDU or fragment of MSDU Frame check sequence 32-bit CRC Wireless LAN Technology and the IEEE Wireless LAN Standard 11-50

51 FRAME CONTROL FIELDS Protocol version version Type control, management, or data Subtype identifies function of frame To DS 1 if destined for DS From DS 1 if leaving DS More fragments 1 if fragments follow Retry 1 if retransmission of previous frame Wireless LAN Technology and the IEEE Wireless LAN Standard 11-51

52 FRAME CONTROL FIELDS Power management 1 if transmitting station is in sleep mode More data Indicates that station has more data to send WEP 1 if Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA) is implemented Order 1 if any data frame is sent using the Strictly Ordered service Wireless LAN Technology and the IEEE Wireless LAN Standard 11-52

53 MAC ADDRESS FORMAT scenario to DS from address 1 address 2 address 3 address 4 DS ad-hoc network 0 0 DA SA BSSID - infrastructure 0 1 DA BSSID SA - network, from AP infrastructure 1 0 BSSID SA DA - network, to AP infrastructure network, within DS 1 1 RA TA DA SA DS: Distribution System AP: Access Point DA: Destination Address SA: Source Address BSSID: Basic Service Set Identifier (AP s MAC address in a BSS or random in IBSS) RA: Receiver Address TA: Transmitter Address

54 CONTROL FRAME SUBTYPES Power save poll (PS-Poll) Request to send (RTS) Clear to send (CTS) Acknowledgment Contention-free (CF)-end CF-end + CF-ack Wireless LAN Technology and the IEEE Wireless LAN Standard 11-54

55 DATA FRAME SUBTYPES Data-carrying frames Data Data + CF-Ack Data + CF-Poll Data + CF-Ack + CF-Poll Other subtypes (don t carry user data) Null Function CF-Ack CF-Poll CF-Ack + CF-Poll Wireless LAN Technology and the IEEE Wireless LAN Standard 11-55

56 MANAGEMENT FRAME SUBTYPES Association request Association response Reassociation request Reassociation response Probe request Probe response Beacon Wireless LAN Technology and the IEEE Wireless LAN Standard 11-56

57 MANAGEMENT FRAME SUBTYPES Announcement traffic indication message Dissociation Authentication Deauthentication Wireless LAN Technology and the IEEE Wireless LAN Standard 11-57

58 AUTHENTICATION Open system authentication Exchange of identities, no security benefits Shared Key authentication Shared Key assures authentication Wireless LAN Technology and the IEEE Wireless LAN Standard 11-58

59 IEEE PHYSICAL LAYER TABLE 11.5 IEEE PHYSICAL LAYER STANDARDS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-59

60 IEEE a AND IEEE b IEEE b DSSS Provides data rates of 5.5 and 11 Mbps Complementary code keying (CCK) and packet binary convolution coding (PBCC) modulation schemes First standard to make Wi-Fi become popular IEEE a Makes use of 5-GHz band Provides rates of 6, 9, 12, 18, 24, 36, 48, 54 Mbps Uses orthogonal frequency division multiplexing (OFDM) Subcarrier modulated using BPSK, QPSK, 16-QAM or 64-QAM Never became popular, but its formats and channel schemes are used for later releases of Wireless LAN Technology and the IEEE Wireless LAN Standard 11-60

61 11.13 IEEE 802 PHYSICAL-LEVEL PROTOCOL DATA UNITS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-61

62 11.14 IEEE a CHANNEL SCHEME Wireless LAN Technology and the IEEE Wireless LAN Standard 11-62

63 IEEE g Extended rates up to 54 Mbps in 2.4-GHz band Continued and extended PBCC from b that used DSSS Rates up to 33 Mbps Also used OFDM for rates up to 54 Mbps Wireless LAN Technology and the IEEE Wireless LAN Standard 11-63

64 IEEE n Operates in both 2.4-GHz and 5-GHz bands MIMO Multiple parallel streams (up to 4 4), beamforming, or diversity Radio transmission schemes Channel bonding to combine two 20 MHz channels From 48 subcarriers per 20 MHz to 108 carriers per 40 MHz (2.25 times increase in available bandwidth) Can only use 20 MHz channels if other nodes are active Shorter 400 ns guard band (11% increase in data rate) Higher coding rate of 5/6 (11% increase) 150 Mbps per 40 MHz, 600 Mbps for 4 parallel streams Wireless LAN Technology and the IEEE Wireless LAN Standard 11-64

65 IEEE n MAC enhancements Reduce header bits, backoffs, and IFS times Block acknowledgements One ACK to cover multiple packets Frame aggregation Three forms MSDUs come down from the LLC layer, MPDUs come from the MAC layer A-MSDU aggregation shared PHY and MAC headers and FCS A-MPDU aggregation shared PHY header Still keep separate MAC headers, to less header reduction But not as much to retransmit if there is an error A-MPDU and A-MSDU aggregation balances the two Wireless LAN Technology and the IEEE Wireless LAN Standard 11-65

66 11.16 FORMS OF AGGREGATION Wireless LAN Technology and the IEEE Wireless LAN Standard 11-66

67 GIGABIT WI-FI ac Up to Gbps 5-GHz only operation Up to 8 8 MIMO Up to 160 MHz (8 20 MHz channels) Special RTS/CTS to check for legacy devices Up to 256 QAM Multiuser MIMO Simultaneous beams to multiple stations Advanced channel measurements Larger frame size A-MDPU is required Wave 1 products up to 1.3 Gbps Wave 2 products use 160 MHz channels and four spatial streams Wireless LAN Technology and the IEEE Wireless LAN Standard 11-67

68 11.17 IEEE PERFORMANCE FACTORS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-68

69 GHz ac CHANNEL ALLOCATIONS Wireless LAN Technology and the IEEE Wireless LAN Standard 11-69

70 11.19 RTS/CTS ENHANCED WITH BANDWIDTH SIGNALING Wireless LAN Technology and the IEEE Wireless LAN Standard 11-70

71 GIGABIT WI-FI ad WiGig Up to 7 Gbps Replacement of wires for video to TVs and projectors Uses 60-GHz bands Called millimeter waves (mmwave) Fewer devices operate in these bands Higher free space loss Poor penetration of objects Likely only useful in a single room Adaptive beamforming and high gain directional antennas Can even find reflections when direct path is obstructed Four modulation and coding schemes Personal BSS so devices can talk directly Wireless LAN Technology and the IEEE Wireless LAN Standard 11-71

72 WLAN SECURITY Three points of attack Client Access Point Wireless medium Original Wired Equivalent Privacy (WEP) was much too weak i provided stronger Wi-Fi Protected Access (WPA) Robust Security Network (RSN) is the final i standard i services Authentication through an authentication server Access control Encryption for privacy with message integrity Wireless LAN Technology and the IEEE Wireless LAN Standard 11-72

73 BASIC IEEE MECHANISMS Hidden SSID (Service Set Identifier) by the AP To avoid the periodic broadcast of the Access Point (AP) identity in order to prevent its interception and misuse by an attacker.. Restriction of authorized MAC addresses by the Access Point To specify the MAC addresses that are allowed to use the network and associate with the AP.

74 HIDDEN SSID SuperFrame SuperFrame B B B t (s)... ; SSID;... Beacon w/o SSID AP Beacon w/o SSID Beacon Frame B AP B SSID??? Beacon w/o SSID B

75 HIDDEN SSID AP A user who knows the SSID, sends a Probe Request The attacker waits for the Probe Response Probe Response includes the SSID!

76 MAC ADDRESS RESTRICTIONS BY THE AP Type: SubType: 00 Management Probe 01 Control Beacon 10 Data Association Re/, Des/ 11 Reserved Authentication Des/ RTS, CTS, ACK, CF, CF+ACK Power-Save Poll Protocol Type SubType To From More Retry Pwr. More Version DS DS Frag. Mgmt. Data (2bits) (2bits) (4bits) (1bit) (1bit) (1bit) (1bit) (1bit) (1bit) Distribution System AP AP AP WEP Order (1bit) (1bit) Valid MAC ADDRESS Captured Generic MAC IEEE Frame Format Frame Duration/ Address Address Address Sequence Address Frame FCS Control ID Control 4 Body (2 Octetos) (2 Octetos) (6 Octetos) (6 Octetos) (6 Octetos) (2 Octetos) (6 Octetos) ( Octetos) (4 Octetos) - The MAC addresses are transmitted in plain text and thus can be captured by the attacker. - Most Wi-Fi cards allow the user to dynamically re-configure the MAC address.

77 11.20 ELEMENTS OF IEEE i Wireless LAN Technology and the IEEE Wireless LAN Standard 11-77

78 11.21 IEEE i PHASES OF OPERATION Wireless LAN Technology and the IEEE Wireless LAN Standard 11-78

79 5. IEEE 802.1X Logical level solution for all IEEE 802 networks (both cabled and wireless). Based on the access control to logical entities (ports). The AP opens the network port if the Authentication Server (AS) validates the supplicants s authentication data. In the beginning, the AP only opens the AS communication port. Supplicant EAP over LAN Authenticator EAP over RADIUS Authentication Server (RADIUS) EAP - Extensible Authentication Protocol

80 5. IEEE 802.1X (2) Remaining resources Supplicant AP Authenticator (1) LAN/ VLAN Authentication Server (RADIUS)

81 5. IEEE 802.1X Extensible Authentication Protocol (EAP) EAP is an IETF standard (RFC 2284) and adopted by IEEE as the basis for 802.1X. It is called the port based network access control. (also known as post-based authentication protocol) EAP supports both wired and wireless authentication. MD5 TLS TTLS LEAP EAP PEAP PPP TLS: Transport Layer Security TTLS: Tunnel TLS LEAP: Lightweight EAP PEAP: Protected EAP

82 5. IEEE 802.1X EAP Authentication Methods: MD5 (Message Digest 5) - Username/Password. This is similar to MS_CHAP. TLS (Transport Layer Security) - PKI (certificates), strong authentication TTLS (Tunnel TLS) - Username/Password LEAP - Cisco proprietary lightweight EAP. It is to be phased out in favor of PEAP. PEAP Protected EAP. Supported on Windows XP.

83 5. IEEE 802.1X EAP over LAN EAP over RADIUS Supplicant AP Authenticator Authentication Server (RADIUS) EAP Start Identity request Identity response EAP Request EAP Response Access request Access challenge Access response EAP Start Ask client for identity Provide identity Pass request to RADIUS Perform sequence defined by authentication method e.g. EAP-TLS, LEAP, etc EAP success EAPoW key Access success Pass session key to AP Deliver broadcast key encrypted with session key Note: Applicable to TKIP or any other system that uses session keys 83

84 5. IEEE 802.1X New Product: Wireless Switch: It is not cost effective to implement 802.1X on all Access points. It is also a management issue. Authenticator (Wireless Switch) RADIUS Supplicant

85 7. Complementary Security Solutions 7.1 Layer3: Virtual Private Network (VPN) 7.2 Layer4: IP Address Control and Firewall 7.3 Layer 7: Proxy

86 7.1 - LAYER3: VPN What is a VPN Secure (encrypted) communication channel between two points (called tunnel) What is Tunneling Putting a packet inside another packet Advantages of VPN Provides secure channel: authentication, privacy and integrity Easy to setup because it uses the same infrastructure Easy to deploy

87 7.1 - Layer3: VPN VPN: Creation of a Tunnel between the wireless users and the organization s VPN. VPN Gateway LAN Layer 2/3 tunnel over a layer 3 protocol IP (encrypted) VPN Tunnel IP IP Wireless LAN LAN RADIUS server

88 7.1 - LAYER3: VPN Local VPN (company, campus) Public location VPN

89 7.1 - LAYER3: VPN Disadvantages of VPN Overhead: encryption, encapsulation Single failure (Gateway) in the path disconnects the entire network Hard to troubleshoot because headers are encrypted IDS (Intrusion Detection System) is less effective because traffic is encrypted Integration difficulties with NAT (Ipsec Authentication Header only) Not scalable (Gateway must encrypt/decrypt all packets from all users )

90 7.1 - LAYER3: VPN Types of VPNs Layer 2: PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) Layer 3: IPSec

91 7.2 Layer4: Router / Firewall LAN temporary IP authentication official IP Security Server Internet 1. Standard WLAN and DHCP procedure for a temporary IP to the wireless station. 2. The temporary IP address is used for authentication only. All other traffic is blocked by the router. 3. After user authentication, the station is given an official IP address which can go through the router. 4. May also register the MAC address to reduce the risk of hacker attack.

92 7.3 Layer7: Proxy Gateway Security Server LAN Proxy Gateway 1. Standard WLAN and DHCP procedure for an IP address to the wireless station. 2. User types any URL and the request is routed to the security server web page. All other traffic is blocked. Internet 3. After entering account info or credit card, the user is authenticated. 4. The gateway authorizes the traffic from the authenticated station.

Functions of physical layer:

Functions of physical layer: Chapter 14 Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception Includes specification of the transmission medium Functions

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks 802.11 Wireless LAN CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Wireless Data Communications Wireless communications compelling

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Security in IEEE Networks

Security in IEEE Networks Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set

More information

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984 CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline IEEE 82 Architecture IEEE 82. Wireless LANs Based on Chapter 4 in Wireless Communications and Networks, William

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) IEEE 802.11 Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Contents Overview of IEEE 802.11 Frame formats MAC frame PHY frame IEEE 802.11 IEEE 802.11b IEEE

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (11 th Week) Wireless LANs 11.Outline Overview IEEE 802.11 Architecture and Services IEEE 802.11 Medium Access Control

More information

WLAN Technology: LAN: a review WLAN: applications & key parameters. protocol architectures

WLAN Technology: LAN: a review WLAN: applications & key parameters. protocol architectures WLAN Technology: LAN: a review WLAN: applications & key parameters IEEE 802.11 protocol architectures LOCAL AREA NETWORKS LAN ROUTER INTERNET WEB SERVER RAM Ethernet Processor RAM ROM A C NIC with unique

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Overview of Wireless LANs

Overview of Wireless LANs Wireless LANs Chapter 17 CS420/520 Axel Krings Page 1 Overview of Wireless LANs use wireless transmission medium issues of high prices, low data rates, occupational safety concerns, & licensing requirements

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment

More information

IEEE MAC Sublayer (Based on IEEE )

IEEE MAC Sublayer (Based on IEEE ) IEEE 802.11 MAC Sublayer (Based on IEEE 802.11-1999) Wireless Networking Sunghyun Choi, Associate Professor Multimedia & Wireless Networking Lab. (MWNL) School of Electrical Engineering Seoul National

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer IEEE 802.11 WLANs (WiFi) Part II/III System Overview and MAC Layer Design goals for wireless LANs (WLANs) Global, seamless operation Low power for battery use No special permissions or licenses needed

More information

IEEE Wireless LANs

IEEE Wireless LANs Unit 11 IEEE 802.11 Wireless LANs Shyam Parekh IEEE 802.11 Wireless LANs References Standards Basics Physical Layer 802.11b 802.11a MAC Framing Details Management PCF QoS (802.11e) Security Take Away Points

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 17 Wireless LANs Eighth Edition by William Stallings Overview of Wireless LANs use wireless transmission medium Wireless LAN were little used issues of high prices,

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi Overview 15-441 15-441: Computer Networking 15-641 Lecture 21: Wireless Justine Sherry Peter Steenkiste Fall 2017 www.cs.cmu.edu/~prs/15-441-f17 Link layer challenges and WiFi WiFi Basic WiFi design Some

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Local Area Networks. Lecture 17 Fall Token Ring and FDDI Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

3.1. Introduction to WLAN IEEE

3.1. Introduction to WLAN IEEE 3.1. Introduction to WLAN IEEE 802.11 WCOM, WLAN, 1 References [1] J. Schiller, Mobile Communications, 2nd Ed., Pearson, 2003. [2] Martin Sauter, "From GSM to LTE", chapter 6, Wiley, 2011. [3] wiki to

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Wireless Communication Session 4 Wi-Fi IEEE standard

Wireless Communication Session 4 Wi-Fi IEEE standard Wireless Communication Session 4 Wi-Fi IEEE802.11 standard M. Daneshvar Farzanegan Soourosh.blogfa.com smdanesh@yahoo.com 1 Reminder on frequencies and wavelenghts twisted pair coax cable optical transmission

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.  Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : PW0-205 Title : Certified wireless analusis professional(cwap) Vendors : CWNP Version : DEMO Get Latest

More information

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 (PHY, MAC, Roaming,.11a, b, g, h, i, n z) Bluetooth / IEEE 802.15.x IEEE 802.16/.20/.21/.22 RFID Comparison Prof. Jó Ueyama courtesy

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

outline background & overview mac & phy wlan management security

outline background & overview mac & phy wlan management security IEEE 802.11a/g WLAN outline background & overview mac & phy wlan management security WLAN benefits flexibility & mobility installation scalability disadvantages distance security performance IEEE 802.11a

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 802.11 History and Standardization 802.11 Architectures and Layers 802.11 Frame Format and Addressing 802.11 Mac Layer (CSMA/CA) 2 Wifi 3 twisted pair

More information

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect

Overview Computer Networks. Single Cell Wireless LAN Configuration. Applications - LAN Extension. Applications Cross-Building Interconnect 168 430 Computer Networks Chapter 17 Wireless LANs Overview A wireless LAN uses wireless transmission medium Used to have high prices, low data rates, occupational safety concerns, and licensing requirements

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du Chapter 6 Wireless and Mobile Networks Csci 4211 David H.C. Du Wireless LAN IEEE 802.11 a, b, g IEEE 802.15 Buletooth Hidden Terminal Effect Hidden Terminal Problem Hidden terminals A, C cannot hear each

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction to IEEE 802.11 Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master

More information

Investigation of WLAN

Investigation of WLAN Investigation of WLAN Table of Contents Table of Contents...1 ABBREVIATIONS...II 1 Introduction...3 2 IEEE 802.11...3 2.1 Architecture...3 2.2 MAC layer...4 2.3 PHY layer...9 2.4 Mobility in IEEE 802.11...12

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert

SharkFest 18 Europe. Troubleshooting WLANs (Part 2) Troubleshooting WLANs using Management & Control Frames. Rolf Leutert SharkFest 18 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames Rolf Leutert Leutert NetServices Switzerland www.netsniffing.ch Introduction 2 Rolf Leutert,

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands Outline 18-759 : Wireless s Lecture 11: 80.11 Peter Steenkiste Dina Papagiannaki Spring Semester 009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste, CMU 1 80 protocol overview Wireless LANs

More information

Internet Protocol Stack

Internet Protocol Stack Internet Protocol Stack Application: supporting network applications FTP, SMTP, HTTP Transport: data transfer between processes TCP, UDP Network: routing of datagrams from source to destination IP, routing

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal WIRELESS LANS By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal Introduction Why wireless? World will become fully mobile Increase in wireless devices usage Wireless will succeed; integrates into many

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/

More information

Chapter 3.1 Acknowledgment:

Chapter 3.1 Acknowledgment: Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard Wireless LANs Outline Benefits Applications Technologies Issues Configurations Overview of 802.11 Standard Dr. Michael S. Boykin Spring 02-2 Local Area Networks 2 Outline II MAC layer protocols PHY layer

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

IEEE Wireless LANs Part I: Basics

IEEE Wireless LANs Part I: Basics IEEE 802.11 Wireless LANs Part I: Basics Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this

More information

Basic processes in IEEE networks

Basic processes in IEEE networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Optional Point Coordination Function (PCF)

Optional Point Coordination Function (PCF) Optional Point Coordination Function (PCF) Time Bounded / Async Contention Free Service PCF Optional DCF (CSMA/CA ) Async Contention Service MAC PHY Contention Free Service uses Point Coordination Function

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 5: Wireless LANs and IEEE 802.11 Part III This lecture completes the study of wireless LANs, looking at the developing and security

More information

Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Introduction. Giuseppe Bianchi, Ilenia Tinnirello IEEE 802.11 Wireless LANs Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim) Abandoned by major

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Characteristics of Wireless LANs

More information

CHAPTER 8: LAN Standards

CHAPTER 8: LAN Standards CHAPTER 8: LAN Standards DR. BHARGAVI GOSWAMI, ASSOCIATE PROFESSOR HEAD, DEPARTMENT OF COMPUTER SCIENCE, GARDEN CITY COLLEGE BANGALORE. LAN STRUCTURE NETWORK INTERFACE CARD MEDIUM ACCESS CONTROL SUB LAYER

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

IEEE WLAN (802.11) Copyright. Nomadic Communications

IEEE WLAN (802.11) Copyright. Nomadic Communications Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

Welcome! SharkFest 16 Europe. Troubleshooting WLANs (Part 2) Rolf Leutert

Welcome! SharkFest 16 Europe. Troubleshooting WLANs (Part 2) Rolf Leutert SharkFest 16 Europe Troubleshooting WLANs (Part 2) Troubleshooting WLANs using 802.11 Management & Control Frames 19. October 2016 Welcome! #sf16eu Rolf Leutert Leutert NetServices Switzerland www.netsniffing.ch

More information

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto WLAN 1 IEEE 802.11 Basic Connectivity Manuel Ricardo Faculdade de Engenharia da Universidade do Porto WLAN 2 Acknowledgements Based on Jochen Schiller slides Supporting text» Jochen Schiller, Mobile Comunications,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Laboratory of Nomadic Communication. Quick introduction to IEEE

Laboratory of Nomadic Communication. Quick introduction to IEEE Laboratory of Nomadic Communication Quick introduction to IEEE 802.11 Let s play 802.11 game Wireless LAN Standard A quick introduction to the IEEE 802.11 standard IEEE 802.11 standard! Definition of wireless

More information

Nomadic Communications WLAN MAC Fundamentals

Nomadic Communications WLAN MAC Fundamentals Nomadic Communications WLAN 802.11 MAC Fundamentals Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications Copyright Quest opera è

More information

CS4/MSc Computer Networking. Lecture 12: Wireless Local Area Networks

CS4/MSc Computer Networking. Lecture 12: Wireless Local Area Networks CS4/MSc Computer Networking Lecture 12: Wireless Local Area Networks Wireless Networking Motivation Mobility Connect from anywhere, anytime, on the move Wi-fihotspots beginning to proliferate» coffee shops,

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione Nomadic Communications WLAN (802.11) Renato Lo Cigno LoCigno@disi.unitn.it - Tel: 2026 Dipartimento di Ingegneria e Scienza dell Informazione Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech

More information