Introduction to Wireless LAN

Similar documents
Mobile & Wireless Networking. Lecture 7: Wireless LAN

Data Communications. Data Link Layer Protocols Wireless LANs

Chapter 6 Medium Access Control Protocols and Local Area Networks

Optional Point Coordination Function (PCF)

ICE 1332/0715 Mobile Computing (Summer, 2008)

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Introduction to IEEE

Computer Networks. Wireless LANs

IEEE Technical Tutorial. Introduction. IEEE Architecture

MAC in /20/06

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Wireless LANs. ITS 413 Internet Technologies and Applications

Data and Computer Communications. Chapter 13 Wireless LANs

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Local Area Networks NETW 901

Wireless Communication Session 4 Wi-Fi IEEE standard

Chapter 7: Wireless LANs

Wireless Protocols. Training materials for wireless trainers

IEEE Wireless LANs

Chapter 7: Wireless LANs

Lecture 16: QoS and "

Mobile Communications Chapter 7: Wireless LANs

Guide to Wireless Communications, Third Edition. Objectives

Mobile Communications Chapter 7: Wireless LANs

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Wireless and Mobile Networks

IEEE MAC Sublayer (Based on IEEE )

Introduction. Giuseppe Bianchi, Ilenia Tinnirello

MSIT 413: Wireless Technologies Week 8

Computer Communication III

Internet Protocol Stack

Enabling Technologies

Wireless# Guide to Wireless Communications. Objectives

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Local Area Networks. Networks: Wireless LANs 1

Mohamed Khedr.

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard

Multiple Access Links and Protocols

Advanced Computer Networks WLAN

Mobile Communications Chapter 7: Wireless LANs

3.1. Introduction to WLAN IEEE

Mohammad Hossein Manshaei 1393

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

IEEE Draft MAC PICS Proforma

Mobile Communications Chapter 7: Wireless LANs

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

MAC. Fall Data Communications II 1

IEEE Wireless LANs Part I: Basics

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Data and Computer Communications

Functions of physical layer:

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Page 1. Outline : Wireless Networks Lecture 11: MAC. Standardization of Wireless Networks. History. Frequency Bands

Basic processes in IEEE networks

Lesson 2-3: The IEEE x MAC Layer

IEEE WLAN (802.11) Copyright. Nomadic Communications

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Nomadic Communications WLAN MAC Fundamentals

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

Multiple Access in Cellular and Systems

Overview. Wireless networks basics IEEE (Wi-Fi) a/b/g/n ad Hoc MAC protocols ad Hoc routing DSR AODV

Topic 4. Wireless LAN IEEE

Lecture (08) Wireless Traffic Flow and AP Discovery

Wireless Local Area Networks (WLANs) Part I

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Investigation of WLAN

Chapter 6 Wireless and Mobile Networks

Hands-On Exercises: IEEE Standard

Wireless and Mobile Networks 7-2

ECE442 Communications Lecture 3. Wireless Local Area Networks

Wireless Networked Systems

Wireless Local Area Network (IEEE )

Unit 7 Media Access Control (MAC)

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society

March 1996 doc.: IEEE P /49C Tutorial MAC Entity: MAC Basic Access Mechanism Privacy and Access Control. MAC Layer Management

CSC 4900 Computer Networks: Wireless Networks

Chapter 4 WIRELESS LAN

Wireless Communication and Networking CMPT 371

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Wireless Communication and Networking CMPT 371

Wireless Networking & Mobile Computing

Wireless LAN -Architecture

Laboratory of Nomadic Communication. Quick introduction to IEEE

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

ABHELSINKI UNIVERSITY OF TECHNOLOGY

HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS

ECE 435 Network Engineering Lecture 8

Master thesis 60 credits

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Transcription:

Introduction to Wireless LAN Po-Ning Chen, Professor Depart. Of Communications Engineering National Chiao-Tung University 1 Topologies of Wireless o Infrastructure versus ad hoc Infrastructure Portable-to-fixed network Fixed-wire replacement Server computer 50-100 m Ad hoc Portable-to-portable network 10-20m 2

Topologies of Wireless o BSS (Basic Service Set) versus IBSS (Independent BSS) BSS Portable-to-fixed network Fixed-wire replacement Server computer 50-100 m IBSS Portable-to-portable network 10-20m 3 Topologies of Wireless o In an infrastructure BSS, all mobile stations communicate with the AP If one mobile station in a BSS must communicate with another mobile station in the same BSS, the communication is sent first to the AP and then from the AP to the other mobile station. 4

Topologies of Wireless 5 Transmission Scheme of Wireless LAN o Transmission Schemes Spread Spectrum» Direct Sequence Spread Spectrum» Frequency Hopping Spread Spectrum Direct Modulation» On-Off Keying» Pulse-Position Modulation Carrier Modulation» Single-Carrier modulation» Multi-subcarrier modulation 6

Direct Sequence Spread Spectrum o DSSS to wireless LAN Frequency band : ISM ( Industrial Scientific Medical ) band Pseudo-random sequence advantage ( PN sequence)» Balanced property» Run-length property» Add-and-Delay property 7 Direct Sequence Spread Spectrum PRBS output + Clock A B C PRBS = Pseudorandom binary sequence Clock A B C 0 1 1 1 1 0 1 1 2 0 0 1 3 1 0 0 4 0 1 0 5 1 0 1 6 1 1 0 PRBS Data bits, A Code sequence B 1 0 1 1 1 1 1 0 0 1 0 0 0 0 1 1 0 1 Output sequence A + B 8

Direct Sequence Spread Spectrum Source data Transmitted signal = Preamble Start-of-frame delimiter Frame contents 1 1 1 0 1 10 01010 010... 10 010... 10 01010 010... Time Transmitted (spread) signal amplitude Bandwidth determined by spreading factor f c Bandwidth of source data (determined by bit rate) Transmitted (spread) signal Background noise Frequency f c = (radio) carrier frequency Received signal Preamble Start-of-frame delimiter Frame contents 1 1 1 0 1 10 01010 010... 10 010... 10 01010 010... Time Receiver starts to search for binary 1 pattern Receiver detects and synchronizes to source data bit boundaries Start-of-frame detected 9 Direct Sequence Spread Spectrum Data source Exclusive-OR circuits Modulator + mixer Demodulator + mixer Exclusive-OR circuits Received data Data clock Spreading code RF carrier RF carrier Synchronization module Spreading code Receiver clock Transmitter Transmitter and receiver schematic Receiver Demodulated received bit stream Analysis window... Autocorrelation detector Synchronization signal... Synchronization symbol Synchronization module schematic 10

Direct Sequence Spread Spectrum Received chip stream at time (t 1) Received chip stream at time t Received chip stream at time (t+1) 0 1 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 1 1 1 0 0 1 0 1 1 0 1 1 1 0 0 0 D D D A D D A A D A A A D = 1 1 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 1 1 1 0 0 0 A A A A A A A A A A A A D = + 11 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 1 1 1 0 0 0 1 0 1 1 0 1 1 1 0 0 0 1 1 0 1 1 0 1 1 1 0 0 0 D D A D D A A D A A D A D = 1 11-chip Barker sequence 10 8 6 Autocorrelation 4 2 0-2 1 6 11 16 21 Chip stream at time t 11 Frequency Hopping Spread Spectrum Channel 7 6 5 4 3 2 1 0 Time Fast frequency-hopping Channel 7 6 5 4 3 2 1 0 Time Slow frequency-hopping Channel 7 6 5 4 3 2 1 0 Time 12

Direct Modulation o Applications Infrared Phy o Modulation Schemes OOKPPM» Reducing the optical power Optical channel Source data Encoder Modulator LED driver Photodiode detector Demodulator Decoder Received data Transmit clock Optical bandpass filter Synchronization unit Receive clock Transmitter Receiver Data Manchester 4-PPM 1 0 1 1 0 0 0 1 2 3 0 1 2 3 0 1 2 3 Data 00 = 0 01 = 1 10 = 2 11 = 3 Pulse position 13 CSMA/CA o Typical CSMA/CA LBT (listen before talk) scheme Node A Node B IEEE 802.11 CSMA/CA is slightly modified. A completes the transmission of its frame B and C sense medium is now free and both generate a random time interval Node C (typical) B resenses the medium and, since it is quiet, starts to transmit its frame C resenses the medium but, since it now occupied, defers to B C resenses the medium and, since it is quiet, starts to transmit its frame SIFS/PIFS/DIFS Node C (IEEE 802.11) Virtual Carrier Sense Virtual Carrier Sense 14

Standards o IEEE 802.11 Finalized in June of 1997 and revised in 1999 (1997 version) one MAC (DFW CSMA/CA) supports multiple PHYs (DSSS, FHSS, Direct-modulated Infrared, Carriermodulated Infrared and Multi-subcarrier-modulated Infrared)» 1&2 Mbps using either DSSS or FHSS» 1&2 Mbps using Direct-modulated Infrared» 4 Mbps using Carrier-modulated Infrared» 10 Mbps using Multi-subcarrier-modulated Infrared (In-building) Operation Range = 50~150 m Quality of Service» (optional) Point Coordination Function 15 Standards o IEEE 802.11 IEEE Std 802.11a» Approved on September 16, 1999» Orthogonal frequency domain multiplexing (OFDM) radio in the UNII bands, delivering up to 54 Mbps data rates IEEE Std 802.11b» Approved on September 16, 1999» Extension to the DSSS PHY in the 2.4 GHz band, delivering up to 11 Mbps data rates 16

Main Requirements and Basic Features o Single MAC to support multiple PHYs. MAC = DFW CSMA/CA PHY = DSSS, FHSS, Direct-modulated Infrared, Carriermodulated Infrared and Multi-subcarrier-modulated Infrared o Robust for Interference. Interference from Microwave interferers/other unlicensed spectrum users/co-channel interference CSMA/CA + ACK for unicast frames, with MAC level recovery. CSMA/CA for Broadcast frames (if within a BSS or IBSS) Transmit Power Level 17 Main Requirements and Basic Features o General Channel Assignment Adjacent cells using different channels can operate simultaneously without interference if the distance between the center frequencies is at least 25 MHz. * IC (Canada) 18

Main Requirements and Basic Features o Mechanisms to deal with Hidden Nodes. DFW CSMA/CA STA RTS AP CTS Data RTS-Range CTS-Range Ack AP STA STA Stations do not hear each other But they hear the AP. 19 Main Requirements and Basic Features STA RTS AP CTS Data RTS-Range CTS-Range Ack AP STA STA Stations do not hear each other But they hear the AP. Z ZZ STA STA Z Z Z STA Z ZZ STA AP STA Z ZZ STA Z ZZ 20

Main Requirements and Basic Features o Mechanisms to deal with Hidden Nodes. Parameterized use of RTS/CTS to provide a Virtual Carrier Sense function to protect against Hidden Nodes. Node A A completes the transmission of its frame Node B B and C sense medium is now free and both generate a random time interval Node C (typical) B resenses the medium and, since it is quiet, starts to transmit its frame C resenses the medium but, since it now occupied, defers to B C resenses the medium and, since it is quiet, starts to transmit its frame Node C (IEEE 802.11) SIFS/PIFS/DIFS Virtual Carrier Sense Virtual Carrier Sense 21 IEEE 802.11 Distributed Coordination Function o To summarize, DFW CSMA/CA (RTS/CTS) to prevent hidden node ACK to DATA frame to provide reliable transmission Virtual Carrier Sense to save power» duration information provided by RTS frame and CTS frame SIFS/PIFS/DIFS to give priority to more urgent frames, such as the ACK frame following a DATA frame or the CTS frame followed an RTS frame.» SIFS = Short inter-frame space» PIFS = Point-coordination function interframe space» DIFS = Distributed coordination function interframe space Exponential Back-off Windows to prevent heavy load congestion. 22

IEEE 802.11 CSMA/CA Explained Free access when medium is free longer than DIFS DIFS Busy Medium DIFS PIFS SIFS Contention Window Backoff-Window Slot time Next Frame Defer Access Select Slot and Decrement Backoff as long as medium is idle. o Reduce collision probability where mostly needed. Stations are waiting for medium to become free. Select Random Backoff after a Defer, resolving contention to avoid collisions. o Efficient Backoff algorithm stable at high loads. Binary exponential Backoff window increases for retransmissions. * Backoff timer elapses only when medium is idle. o Implement different fixed priority levels (S/P/DIFS) To allow immediate responses and PCF coexistence. 23 Timing Intervals - SIFS/PIFS/DIFS o Five time intervals are specified, where two are determined by the PHY, and three are built from the previous two. PIFS DIFS SIFS Slot time First backoff slot Medium Busy PHYRXEND.indicate MAC Slot Boundaries D1 M1 TxSIFS Slot Boundary Rx/Tx D2 CCAdel M2 D2 CCAdel M2 Slot time Rx/Tx Slot time Rx/Tx Slot time TxSIFS Slot Boundary TxSIFS Slot Boundary D2 CCAdel M2 First backoff slot Boundary Rx/Tx D1 = arxrfdelay + arxplcpdelay (referenced from the end of the last symbol of a frame on the medium) D2 = D1 + Air Propagation time Rx/Tx = arxtxturnaroundtime (begins with a PHYTXSTART.request) M1 = M2 = amacprcdelay CCAdel = accatime D1 24

Suggested values of Timing Intervals o FHSS aslottime = 50us and asifstime = 28us o DSSS aslottime = 20us and asifstime = 10us o IR aslottime = 8us and asifstime = 7us (IEEE Std 802.11-1997) aslottime = 8us and asifstime = 10us (IEEE P802.11/D10, 14 Jan. 1999: Table 75) 25 CSMA/CA + ACK protocol o (Transmitter) Recovery Procedure and Retransmit Limits Error Recovery shall be attempted by retrying transmissions. Retry shall continue until successful or retry limit is reached. Retry attempts for failed transmission shall continue until the Short Retry Count (default 7, < RTSThreshold) for MPDU is equal to Short Retry Limit or Long Retry Count is equal to Long Retry Limit (default 4, >= RTSThreshold). o (Receiver) Duplicate Detection and Recovery Duplicate frame filtering is facilitated the inclusion of a Sequence Control Field associated with the transmitted frames. A Destination STA shall cache <Source MAC Address, sequence number, fragment number >, and it shall discard a duplicate frame which matches the cache and whose Retry bit = 1. 26

CSMA/CA + ACK protocol o Binary exponential backoff window 15~1023 for FHSS PHY Source: IEEE Std 802.11-1997 14.8.2 FH PHY attributes: Table 49 31~1023 for DSSS PHY Source: IEEE Std 802.11-1997 15.3.2 DSSS PHY MIB: Table 58 63~1023 for IR PHY Source: IEEE Std 802.11-1997 16.4 PHY attributes: Table 74 27 "Hidden Node" Provisions o NAV(Net Allocation Vector) Set and Reset All STAs receiving a valid frame shall update their NAV in the Duration Field. All of the RTS/CTS/DATA frames contains NAV field. Src RTS Data Dest CTS Ack CW Other NAV (RTS) NAV (CTS) Next MPDU Defer Access NAV (Data) Backoff after Defer 28

Fragmentation DIFS PIFS Other NAV (RTS) NAV (CTS) NAV (Fragment 0) NAV (ACK 0) SIFS Backoff-Window Src RTS SIFS Fragment 0 Fragment 1 Dest CTS ACK 0 ACK 1 o Fragment Bursts which are individually acknowledged. For Unicast frames only. o Duration information in data fragments and Ack frames causes NAV to be set, for medium reservation mechanism. 29 Frame Formats Bytes: Frame Control 2 2 6 6 6 2 6 0-2312 4 Duration ID Sequence Addr 1 Addr 2 Addr 3 Addr 4 Control 802.11 MAC Header Frame Body Bits: 2 2 4 1 1 1 1 1 1 1 1 CRC Protocol Version Type SubType To DS From DS More Frag Retry Pwr Mgt More Data WEP Order Frame Control Field o MAC Header format differs per Type: Control Frames (several fields are omitted) Management Frames Data Frames o Includes Sequence Control Field for filtering of duplicate caused by ACK mechanism. 30

Types and Sub-types 31 Types and Sub-types 32

Address Field Description Function To DS From Address 1 Address 2 Address 3 Address 4 DS IBSS 0 0 RA = DA SA BSSID N/A From the AP 0 1 RA = DA BSSID SA N/A To the AP 1 0 RA = BSSID SA DA N/A Wireless DS 1 1 RA TA DA SA o SA = The source that originates the frame o DA = The (final) destination of the frame o RA = The next immediate intended recipient o TA = The transmitter of the current transmission o BSSID = The MAC address of the associated AP of the current frame transmitter (or a random number generated by the station that starts the IBSS) * Where the content of a field is shown as N/A, the field is omitted. 33 More Data Subfield Bytes: Frame Control 2 2 6 6 6 2 6 0-2312 4 Duration ID Sequence Addr 1 Addr 2 Addr 3 Addr 4 Control 802.11 MAC Header Frame Body Bits: 2 2 4 1 1 1 1 1 1 1 1 CRC Protocol Version Type SubType To DS From DS More Frag Retry Pwr Mgt More Data WEP Order o More Data Frame Control Field For AP: More frames are buffered at the AP for the mobile station. 34

Privacy and Access Control o Goal of 802.11 is to provide "Wired Equivalent Privacy" (WEP) Seed[63 24] = key[39 0] and Seed[23 0] = IV [23 0] Secret Key IV Secret Key Plaintext seed Integrity Alg WEP PRNG + IV Ciphertext ICV TX IV Ciphertext ICV WEP PRNG Plaintext + Integrity Alg ICV'=ICV? Preamble PLCP Header MAC Header Payload > 0 CRC Encrypted IV (4) Cyphertext ICV (4) Init. Vector (3 bytes) Pad (6 bits) Key ID (2 bits) o WEP bit in Frame Control Field indicates WEP used. Each frame can have a new IV, or IV can be reused for a limited time. 35 Order Subfield Bytes: Frame Control 2 2 6 6 6 2 6 0-2312 4 Duration ID Sequence Addr 1 Addr 2 Addr 3 Addr 4 Control 802.11 MAC Header Frame Body Bits: 2 2 4 1 1 1 1 1 1 1 1 CRC Protocol Version Type SubType To DS From DS More Frag Retry Pwr Mgt More Data WEP Order o Order = 1 Frame Control Field Strictly ordering must be maintained. 36

Duration/ID Field Bytes: Frame Control 2 2 6 6 6 2 6 0-2312 4 Duration ID Sequence Addr 1 Addr 2 Addr 3 Addr 4 Control Frame Body CRC o Bit15 = 0 802.11 MAC Header Bits 14-0 = remaining duration in microseconds of a frame exchange (NAV); ceiling function value will be taken if a non-integer is rendered. o Bit 15 = 1 and Bit 14-0 = 0 This is a CFP frame. o Bits 15-14 = 11 Bits 13-0 = AID (from 0 to 2007), specifically in a PS- POLL frame. 37 Sequence Control Field Bytes: Frame Control 2 2 6 6 6 2 6 0-2312 4 Duration ID Sequence Addr 1 Addr 2 Addr 3 Addr 4 Control Frame Body CRC 802.11 MAC Header o Sequence Control = 12 bit Sequence Number + 4 bit Fragment Number Sequence Number : A unique wrap-back number for each MSDU; remain constant for re-transmission Fragment Number : A unique wrap-back number for each MPDU; remain constant for re-transmission 38

Control Frames o The subfield within the frame control field of control frames are set as above. 39 Control Frames RTS CTS ACK 40

Control Frames PS-POLL 41 Data Frames o Data and Null (a special subtype of data frames) The sole purpose for the null data frame is to carry the power management bit in the frame control field to the AP, when a station changes its power management state. 42

Management Frames Bytes: Frame Control 2 2 6 6 6 2 0-2312 4 Duration Addr 1 = DA Addr 2 = SA 802.11 MAC Header Addr 3 = BSSID Sequence Control Frame Body CRC o Frame Body Fixed fields Variable-length information elements» Must be in the order of increasing identifiers 43 MAC Management Frames o Beacon Fixed fields : 64-bit timestamp (TSF timer value), 16-bit beacon Interval (in the unit of 1024us = one TU), 16-bit capability Information element : ESSID, supported rates, one or more PHY parameter sets, optional contention-free parameter set, optional IBSS parameter set, optional Traffic Indication Map (TIM) o Probe Fixed field : capability Information element : ESSID, supported rates o Probe Response Same as Beacon except no TIM 44

MAC Management Frames q Association Request Fixed field : capability, 16-bit listen interval (in units of beacon interval) Information element : ESSID, supported rates o Association Response Fixed field : capability, 16-bit status code, 16-bit AID (same format as Duration) Information element : supported rates o Reassociation Request Reassociation can only be applied to an AP that has the same ESSID with the previous associated AP. Same as Association Request except an additional 6- byte current AP address fixed field o Reassociation Response Same as Association Response 45 Status Codes (with additions made in 802.11b) Association denied due to requesting station not sup-porting the Short Preamble option Association denied due to requesting station not sup-porting the PBCC Modulation option Association denied due to requesting station not sup-porting the Channel Agility option 46

MAC Management Frames o Disassociation Fixed field : 16-bit reason code No Information element o Authentication Fixed field : 16-bit authentication algorithm number (0 for open system and 1 for shared key ), 16-bit authentication transaction sequence number (start from 1), status code Information element : challenge text o Deauthentication Fixed field : reason code No Information element Auth(request, 1) Auth(challenge text, 2) Auth(WEP(challenge text), 3) Auth(result, 4) Access Point Station 47 Reason codes 48

MAC Management Frames o Announcement TIM (ATIM) No fixed field and Information element Use to notify other station in an IBSS that the sender of the ATIM frame has traffic buffered and waiting to be delivered to the station addressed in the ATIM frame 49 Capability Information Fixed Field o ESS and IBSS Only significant in Beacon and Probe Response AP : ESS = 1 and IBSS = 0 Mobile station in an IBSS : ESS =0 and IBSS = 1 o CF Pollable and CF-Poll Request Be discussed in PCF o Privacy, Short Preamble, PBCC, Channel Agility 1 = the function is implemented/supported by the AP 50

Information Elements 51 Service Set Identity (SSID) o SSID Can be up to 32 bytes in length.» When its length equals zero, SSID = broadcast identity that is used in Probe Request frame when the mobile station is attempting to discover all 802.11 WLANs in its vicinity. Can be ASCII characters or multibyte binary values. 52

Supported Rates o Supported Rates Can be 1~8 bytes long, each byte represents a single rate. The most significant bit indicates whether the rate is mandatory or not, while the remaining 7 bits represent the rate value. Before IEEE 802.11b, the rate is measured in unit of 500Kbps, which pose an upper limit of 63.5Mbps. After the standardization of IEEE 802.11b, the rate now indicates by a simple label (hence, no upper limit is imposed.) E.g., X 82 = 1Mbps belongs to the mandatory BSS basic rate set. E.g., X 04 = 2Mbps does not belong to the mandatory BSS basic rate set. 53 DS and Challenge Text Parameter Sets DS parameter set Challenge Text 54

TIM information element o DTIM Count = DTIM Countdown Number o DTIM Period = DTIM Interval in unit of beacon intervals o Bitmap Control MSB bit = more buffered multi/broadcast frames Remaining 7 bits = [N1/2], where bits 1 ~ [N1*8]-1 in Partial Virtual Bitmap are all zero. o Length = (N2-N1)+4, where bits (N2+1)*8 ~ 2007 in Partial Virtual Bitmap are all zero. 55 Synchronization in 802.11 o 64-bit Timing Synchronization Function (TSF) running at 1MHz, used for time-based mechanisms Beacon Interval "Actual time" stamp in Beacon Time Axis X X X X Beacon Busy Medium APs send Beacons in infrastructure networks. Beacons scheduled at Beacon Interval. Transmission may be delayed by CSMA deferral. subsequent transmissions at expected Beacon Interval Timestamp contains timer value at transmit time. 56

Infrastructure Power Management Time-axis TIM-Interval DTIM interval TIM AP activity Busy Medium TIM DTIM TIM TIM DTIM Broadcast Broadcast o Broadcast frames are also buffered in AP. all broadcasts/multicasts are buffered broadcasts/multicasts are only sent after DTIM DTIM interval is a multiple of TIM interval 57 Infrastructure Power Management Time-axis TIM-Interval DTIM interval TIM AP activity Busy Medium TIM DTIM TIM TIM DTIM Broadcast Broadcast PS Station o Stations wake up prior to an expected (D)TIM. 58

Infrastructure Power Management Time-axis TIM-Interval DTIM interval TIM AP activity Busy Medium TIM DTIM TIM TIM DTIM Broadcast Broadcast PS Station PS-Poll Tx operation o If TIM indicates frame buffered station sends PS-Poll and stays awake to receive data else station sleeps again 59 Wireless LAN Infrastructure Network Access Point B Station 1 Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Each Station is Associated with a particular AP Stations 1, 2, and 3 are associated with Access Point A Stations 4 and 5 are associated with Access Point B Stations 6 and 7 are associated with Access Point C 60

Roaming Access Point B Station 1 Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Mobile stations may move* 61 Roaming Access Point B Station 2 Station 5 Station 6 Access Point A Access Point C Station 1 Station 3 Station 4 Station 7 Mobile stations may move* beyond the coverage area of their Access Point 62

Roaming Access Point B Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Mobile stations may move* Station 1 beyond the coverage area of their Access Point but within range of another Access Point 63 Roaming Access Point B Station 2 Station 5 Station 6 Access Point A Access Point C Station 3 Station 4 Station 7 Mobile stations may move* Station 1 beyond the coverage area of their Access Point but within range of another Access Point Reassociation allows station to continue operation 64

Roaming Approach o Station decides that link to its current AP is poor using the information of Carrier Sense and Energy Detection RSSI (Receiver Signal Strength Indicator) o Station uses scanning function to find another AP o Station sends Reassociation Request to new AP o If Reassociation Response is successful then station has roamed to the new AP else station scans for another AP o If AP accepts Reassociation Request AP indicates Reassociation to the Distribution System Distribution System information is updated normally old AP is notified through Distribution System 65 Scanning o Passive Scanning Find networks simply by listening for Beacons o Active Scanning On each channel» Send a Probe,» Wait for a Probe Response 66

Active Scanning Example Steps to Association: Station sends Probe. Access Point A Access Point C Initial connection to an Access Point 67 Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Initial connection to an Access Point 68

Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Initial connection to an Access Point 69 Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Station sends Association Request to selected AP. Initial connection to an Access Point 70

Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Station sends Association Request to selected AP. AP sends Association Response. Initial connection to an Access Point 71 Active Scanning Example Steps to Association: Access Point A Access Point C Station sends Probe. APs send Probe Response. Station selects best AP. Station sends Association Request to selected AP. AP sends Association Response. Initial connection to an Access Point - ReAssociation follows a similar process 72

Inter-Access Point Protocol (IAPP) o Historical events of IAPP Interoperability among APs is only least defined in the original IEEE 802.11 standard. To resolve the issue, H. Moelard and M. Trompower proposed an Inter-Access Point Protocol (IAPP) in the form of an Internet draft standard to facilitate interoperability between IEEE802.11 compliant APs in 1998. Noting the significance of such issue, the IEEE Standards Committee has established the Task Group F to standardize the implementation of IEEE 802.11 compliant Aps (jointly developed by Aironet, Lucent Technologies, and Digital Ocean). On January 19, 2001, they proposed the first draft of the IAPP Recommended Practice. Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE802.11 Operation, IEEE802.11f pre-draft, January 2001. 73