ABHELSINKI UNIVERSITY OF TECHNOLOGY

Similar documents
MAC in /20/06

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Optional Point Coordination Function (PCF)

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless Protocols. Training materials for wireless trainers

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society

Table of Contents 1 WLAN Service Configuration 1-1

outline background & overview mac & phy wlan management security

Introduction to IEEE

Investigation of IEEE standard Medium Access Control (MAC) layer in ad-hoc networks and comparison with IEEE distributed mesh networks

Wireless Networked Systems

Mobile & Wireless Networking. Lecture 7: Wireless LAN

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

IEEE Draft MAC PICS Proforma

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Basic processes in IEEE networks

Guide to Wireless Communications, Third Edition. Objectives

Wireless# Guide to Wireless Communications. Objectives

Computer Communication III

Engineering Swarm- Services CS

Functions of physical layer:

Wireless Communication Session 4 Wi-Fi IEEE standard

IEEE Wireless LANs

Introduction. Giuseppe Bianchi, Ilenia Tinnirello

Introduction to Wireless LAN

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard

CSCD 433/533 Advanced Networking

Chapter III THE IEEE ARCHITECTURE. Estelar. 3.1 Components of the IEEE Architecture

Complexity. An introduction to protocol chaos. Andrés Blanco. CC License - Swtiruty Rgbytw

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Internet Protocol Stack

Wireless and Mobile Networks

Mobile Communications Chapter 7: Wireless LANs

Chapter 6 Medium Access Control Protocols and Local Area Networks

Selective Channel Scanning for Fast Handoff in Wireless LAN using Neighbor Graph

IEEE Technical Tutorial. Introduction. IEEE Architecture

WLAN The Wireless Local Area Network Consortium

IEEE P Wireless Local Area Networks

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Lecture (08) Wireless Traffic Flow and AP Discovery

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

HOW WI-FI WORKS AND WHY IT BREAKS WI-FI MECHANICS

Wireless LANs. ITS 413 Internet Technologies and Applications

ECE442 Communications Lecture 3. Wireless Local Area Networks

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs

Topic 4. Wireless LAN IEEE

Status of P Sub-Specification

In the preceding chapter, you discovered the basics of modulation and coding at the Physical layer.

Lecture 16: QoS and "

3.1. Introduction to WLAN IEEE

Wireless LAN -Architecture

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

WiFi Overview. 2/14/2005 Pietrosemoli 1

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Computer Networks. Wireless LANs

WL-5420AP. User s Guide

Wireless Communication and Networking CMPT 371

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

March 1996 doc.: IEEE P /49C Tutorial MAC Entity: MAC Basic Access Mechanism Privacy and Access Control. MAC Layer Management

Mobile Communications Chapter 7: Wireless LANs

IEEE Notes. 1 Local Area Networks. 2 Protocols. 3 Network Model

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

ECE 435 Network Engineering Lecture 8

4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions

I N D E X Numerics 100 Mbps WLANs, WLANs, 88

Multiple Access Links and Protocols

Nomadic Communications WLAN MAC Fundamentals

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Communication and Networking CMPT 371

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Wireless Network Security

Wireless Communication. IEEE Wireless LAN (wlan)

Wireless technology Principles of Security

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

Mobile Communications Chapter 7: Wireless LANs

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Advanced Computer Networks WLAN

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

QualNet 4.0 Model Library: Wireless

Content. Chapter 1 Product Introduction Package Contents Product Features Product Usage... 2

Wireless and Mobile Networks 7-2

Local Area Networks NETW 901

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Enabling Technologies

Attacks on WLAN Alessandro Redondi

Table of Contents. NEC Unified Solutions, Inc. August 3, 2009 Page 1 of 6

QualNet Wireless Model Library

Mobile devices for wireless

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

OSBRiDGE 24XL(i) Configuration Manual. Firmware 2.05b9

Enterprise Data Communication Products. Feature Description - WLAN. Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

ICE 1332/0715 Mobile Computing (Summer, 2008)

FastScan - A handoff scheme for Voice over IEEE WLANs

Troubleshooting WLANs

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.

Transcription:

cm. Management Operations of the IEEE 802.11 Mei Yen Cheong meiyen.cheong@hut.fi S-72.333 Postgraduate Seminar on Radio Communications Helsinki University of Technology April 13, 2004 Management Operations p.1/33

Contents Introduction Management Architecture of 802.11 Management Operations Procedure for MS to gain access to 802.11 network: Scan Join Association Reassociation. Power management Timer synchronization Management Operations p.2/33

Introduction Disadvantages of wireless connection are:- Unreliable medium lack of physical boundaries (security problems) power limitation of mobile terminals Management operations of 802.11 address these problems. Scanning Joining Association Reassociation Power Management Timer Synchronization Authentication & Preauthentication Management Operations p.3/33

Management Architecture (1/2) System management entity (SME) not normally specify by 802.11 method which users and device drivers interact with the 802.11 network interface and status enquiry. can alter the MAC and PHY Management Information bases (MIBs). MAC PHY MLME MAC MIB PLME PHY MIB SME Management Operations p.4/33

Management Architecture (2/2) MAC layer management entity (MLME) & Physical-layer management entity (PLME) have access to Management Information Base (MIB) to gain status information & to invoke certain actions MAC can make corresponding changes to the PHY MIB Capabilities of device drivers vary depending on the product. However, possible capabilities are defined within the management features of the 802.11 protocols. Management Operations p.5/33

Scanning Parameters involve in scanning procedure BSSType - Independent - Infrastructure - All networks (both) ScanType - Active (probe request) - Passive (listen to beacon) ChannelList - List of channels (for direct sequence product) - Hop pattern (for frequency hopping product) BSSID - Individual - Broadcast What networks are available??? Mobile station SSID (network name) - String of bits to extended service set - Usually humanreadable string of network name ProbeDelay - Delay in s for probe procedure to begin in active scanning - To control scan being blocked in lightly loaded channel MinChannelTime & MaxChannelTime - Specified in time units (TUs) the max. and min. amount of time the scan work with a particular channel Management Operations p.6/33

Passive scanning Station sweeps thro the channels, listens and records information from received Beacons. Beacons contains information of parameters in the basic service set (BSS). AP 1 Beacon AP 4 Client Found BSSs: AP1 AP2 AP3 AP 2 AP 3 Management Operations p.7/33

Active scanning (1/2) Station detects for channel in use. Station sends Probe Request to seek response from the network. Network with the requested extended service set sends a Probe Response upon hearing the Probe Request. Individual SSID triggers single Probe Response. Broadcast SSID triggers Probe Response form all networks in the area. Management Operations p.8/33

Active scanning (2/2) In infrastructure network, the APs are responsible for sending Probe Response. For BSS the station that transmitted the last Beacon is responsible for Probe Response. Probe request Probe responses AP 1 Mobile station AP 2 Management Operations p.9/33

Scan Report Lists all scan discovered BSSs and their parameters. Complete parameter list enables station to join network. Extra parameters in the report are:- Beacon interval DTIM period - for power-saving mechanism Timing parameter - for synchronization of station and BSS s timer. PHY, CF and IBSS parameters BSSBasicRateSet - list the data rates the station must support to join the network. Management Operations p.10/33

Joining (1/2) Precursor to association which does not enable network access. Choosing BSS to join is an implementation-specific decision, may involve user intervention. BSSs of the same ESS are allow to make decision, common criteria are power level and signal strength. Management Operations p.11/33

Joining (2/2) Joining a selected BSS requires Matching local parameters required by BSS Matching PHY parameters. Synchronizing timing inofrmation of station and rest of network. Matching WEP & high-rate capabilities. Adopt the Beacon interval and DTIM period of BSS. Management Operations p.12/33

Authentication Security procedure before station is allow to access the network. Two approaches specified by 802.11. open system authentication shared-key authentication Any station can authenticate with another station. Currently, for infrastructure network, only station needs to authenticate to network and not vice-versa. Note: This makes man-in-the-middle attack possible. Management Operations p.13/33

Open-System Authentication (1/2) Access point (AP) accepts the mobile station without verifying its identity. The AP records the MAC address of the station as its identity. Client 1. From- source (identity) Authentication algorithm - 0 (open system) Sequence number - 1 2. Authentication algorithm - 0 Sequence number - 2 Status code AP Management Operations p.14/33

Open-System Authentication (2/2) Address Filtering is a method to provide some security in open-system authentication. Some products provide an "authorized MAC address list". Network administrator can enter a list of authorized client addresses. Trivial file transfer protocol (TFTP) servers can be implemented to push authorized addresses to multiple access points (minimize need for separate distribution). Management Operations p.15/33

Shared-Key Authentication (1/2) Only possible on products that implement Wired Equivalent Privacy (WEP) since this authentication method makes use of WEP. A shared-key is distributed to all stations before authentication is attempted. This method requires verification of station s identity using the Challenge Text before allowing admission to the network. The Challenge Text (128 bytes) is generated using the WEP keystream generator with a random key and initialization vector. Management Operations p.16/33

Shared-Key Authentication (2/2) 1. From- source (identity) Authentication algorithm - 1 (shared key) Sequence number - 1 Client 2. Authentication algorithm - 1 Sequence number - 2 Status code -0 (successful) Challenge text (clear) 3. Authentication algorithm - 1 Sequence number - 3 Challenge text 4. Authentication algorithm - 1 Sequence number - 4 Status code AP The Challenge Text in the 3 rd sequence is processed with WEP, therefore is hidden. Management Operations p.17/33

Preauthentication Authentication does not have to take place immediately before association. Preauthentication is authentication done during the scanning process. Preauthetication allows a station to:- associate with an AP quickly. reassociate with the APs immediately upon moving into their coverage area. Management Operations p.18/33

Association (1/2) Authenticated stations can associate with an AP to gain full access to network. Association allows the distributed system to track the mobile location. Once association is completed, the AP must register the station on the network so that frames for the station are delivered to the AP. Registration can be done by sending a gratuitous ARP so that the MAC address of the station is associated with the switch port of the AP. Management Operations p.19/33

Association (2/2) 1. Association request Client 2. Association response 3. Traffic AP Successful: Status code 0 and Association ID (AID). Unsuccessful: Status code 0 and end of procedure. Unauthenticated stations will receive Deauthentication frame from the AP. Management Operations p.20/33

Reasociation Mobility management - moves an association from old AP to new AP in the same ESS. On backbone, interactions between APs is invoked (IAPP). The old AP terminates the association after transferring buffered frames to new AP. Old AP Client 1. Reassociation request 2. Reassociation response 5. New AP takes over processing of frames (Old AP disassociates station) 3. IAPP Pls send buffered frames New AP 4. IAPP Send buffered frames Management Operations p.21/33

Power Management Power saving features are important for mobile stations due to scarce resource of battery power. Switching off the transceiver is one of the most effective power savings in wireless network. Power saving (PS) modes:- Sleeping - transceiver is off. Active - transceiver is on. Power conservation in 802.11 is achieved by maximizing the sleeping time without sacrificing connectivity. Management Operations p.22/33

Power Management in Infrastructure Networks (1/2) Access points play a key role in power management for infrastructure networks due to:- AP knows the location of mobile stations and a mobile station can communicate its PS mode AP. APs remain active all the time due to continuous power supply and easier implementation of buffer system. Power management tasks of APs:- Buffer frames for sleeping mobile stations. Announce periodically of buffer status. Management Operations p.23/33

Power Management in Infrastructure Networks (2/2) Mobile station only power up the receiver to listen to buffer status instead of periodically transmitting polling frames. Mobile station can sleep as long as the number of Beacon periods defined in the Listen Interval parameter during association. The Listen Interval therefore defines the maximum buffer space reserved for the associated station. Buffered frames may be discarded without after each listen interval. Management Operations p.24/33

Unicast buffering & delivery (1/2) APs periodically transmit a Traffic Indication Map (TIM) in its Beacon frames. TIM composed of 2008 bits which each bit corresponds to a particular AID. During the station listening time, TIM in the Beacon frame is examine whether frames are buffered for it. PS-Poll Control frames is used to retrieve buffered frames. Management Operations p.25/33

Unicast buffering & delivery (2/2) Mobile station 11 12 1 10 2 9 3 8 4 7 6 5 Frame 1, more data ACK Frame 1, more data Frame 2 AP PS-Poll PS-Poll ACK PS-Poll ACK - Each PS-Poll frame retrieves only one buffered frame. - Positive acknowledgement need to be signaled for one second before the next PS-Poll. - AP sends a frame in response and if more frames are still in buffer, the More Data bit in the Control field is set to 1. Management Operations p.26/33

Delivering multicast & broadcast frames Multicast & broadcast frames are indicated using AID "0"; Setting bit 1 of TIM to "0". At fixed number of Beacon intervals, special TIM called Delivery TIM (DTIM) is sent. Multiple buffered frames are sent after each DTIM. Beacon interval DTIM interval TIM DTIM TIM TIM DTIM TIM AP BC MC BC PS-P oll MC Station 1 BC MC BC MC Management Operations p.27/33

Power Management in IBBS (1/3) In an Independent Basic Service Set (IBSS), the station that has buffered data is responsible to ensure receiver(s) is(are) active. Announcement Traffic Indication Message (ATIM) is sent to keep receiving station(s) awake. Station A send a unicast ATIM to station C Station A send a multicast ATIM to all station A C A D B B C Management Operations p.28/33

Power Management in IBBS (2/3) All stations in an IBSS listen for ATIM frames during a period after the Beacon called ATIM window. ATIM window is an IBSS specific parameter. ATIM window remains constant, staring at the target Beacon interval and extending a fixed amount of time. Beacon interval Busy ATIM window ATIM window ATIM window Management Operations p.29/33

Power Management in IBBS (3/3) Stations that neither transmit nor receive ATIM is permitted to sleep. A station that transmits and/or receives ATIM it must stay active until the conclusion of the next ATIM window. Only Beacons, RTS, CTS, ACK and ATIM can be sent in the ATIM window. Listen to ATIM Sleep ATIM traffic interval ATIM window ATIM window ATIM window Management Operations p.30/33

Timer Synchronization Timing information is important in wireless network for:- Coordination of transmission time/pattern. Medium reservation In 802.11, Timing Syncronization Function (TSF) is used to synchronize all stations in the network. TSF are periodically announced in the Beacon frames. In infrastructure network, APs are responsible maintaining the TSF while for IBSS, the process is distributed. Management Operations p.31/33

Exercise What are the management operations involved in gaining access to a 802.11 networks? Draw sequence diagram to show the procedures. What is the difference between JOINING a network and ASSOCIATING to a network? Describe the Power Management in Infrastructure network and independent BSS. Management Operations p.32/33