WLAN. Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network).

Similar documents
Computer Networks. Wireless LANs

Local Area Networks NETW 901

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless Communication Session 4 Wi-Fi IEEE standard

Mobile & Wireless Networking. Lecture 7: Wireless LAN

MAC in /20/06

Mobile Communications Chapter 7: Wireless LANs

Guide to Wireless Communications, Third Edition. Objectives

Mobile Communications Chapter 7: Wireless LANs

Mohammad Hossein Manshaei 1393

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless# Guide to Wireless Communications. Objectives

ICE 1332/0715 Mobile Computing (Summer, 2008)

Introduction to IEEE

Chapter 7: Wireless LANs

Chapter 7: Wireless LANs

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Protocols. Training materials for wireless trainers

3.1. Introduction to WLAN IEEE

Mobile Communications Chapter 7: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs

WIRELESS LANS. By: M. Habibullah Pagarkar Mandar Gori Rajesh Jaiswal

Wireless Communication and Networking CMPT 371

Advanced Computer Networks WLAN

CHAPTER 8: LAN Standards

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

IEEE Technical Tutorial. Introduction. IEEE Architecture

Wireless technology Principles of Security

Wireless Local Area Networks (WLANs) Part I

Lecture 16: QoS and "

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Chapter 3.1 Acknowledgment:

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Internet Protocol Stack

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

4.4 IEEE MAC Layer Introduction Medium Access Control MAC Management Extensions

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Chapter 6 Medium Access Control Protocols and Local Area Networks

ECE 435 Network Engineering Lecture 8

Wireless Communication and Networking CMPT 371

Wireless LAN -Architecture

Wireless Local Area Network (IEEE )

Chapter 4 WIRELESS LAN

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel

Wireless LANs. ITS 413 Internet Technologies and Applications

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

WIRELESS LAN (WLAN) Efthyvoulos C. Kyriacou (PhD) Assoc. Prof. Computer Science and Engineering Department

Wireless LANs. Characteristics Bluetooth. PHY MAC Roaming Standards

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless# Guide to Wireless Communications. Objectives

Investigation of WLAN

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Optional Point Coordination Function (PCF)

Computer Communication III

MAC. Fall Data Communications II 1

Unit 7 Media Access Control (MAC)

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Page 1. Wireless LANs: Design Requirements. Evolution. EEC173B/ECS152C, Winter Wireless LANs

CSE 6811 Ashikur Rahman

Nomadic Communications WLAN MAC Fundamentals

Module 6: Wireless Mobile Networks

Logical Link Control (LLC) Medium Access Control (MAC)

Wireless LANs. Outline. Outline II. Benefits Applications Technologies Issues Configurations Overview of Standard

Internet Structure. network edge:

Mohamed Khedr.

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

Wireless LAN USB Super G 108 Mbit. Manual

Wireless Networked Systems

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Enabling Technologies

CSE 461: Wireless Networks

Functions of physical layer:

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Multiple Access Links and Protocols

Transmission Control Protocol over Wireless LAN

Mohammad Hossein Manshaei

Author: Bill Buchanan. Wireless LAN. Unit 2: Wireless Fundamentals

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

outline background & overview mac & phy wlan management security

Wireless and Mobile Networks

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

IEEE Wireless LANs

Lesson 2-3: The IEEE x MAC Layer

Rahman 1. Application

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Transcription:

WLAN Right, Gentlemen. The aim of our presentation is to give you detailed information on the topic WLAN (Wireless Local Area Network). Our presentation is split into the following key areas. First I will give you a short introduction. Secondly we want to cover the IEEE 802.11 Standard and its features. For Example we want to discuss the topics Topology, then the layer model of the IEEE 802.11 Standard, of course the Security of a WLAN and in addition to this we want to show you an example for a WLAN and the adjustments, which are necessary. So let s turn to the first point Features. Features Let s focus on the advantages and disadvantages of a WLAN. First I want to consider the Advantages. The biggest advantage compared to a normal LAN is the comfortable flexibility within the range. The next advantage of a WLAN is that no cabling has to be done. Everytime a system has advantages also disadvantages appear. So let s consider the Disandvantages: An important fact is the low bitrate of this Network. Moreover the lack of security doesn t improve the use. Another disprofit is the limited frequency range because every country has its own frequency range the WLAN is used in. International agreements will be defined in future. The last disadvantage is the limited range. The range of a WLAN is about 30 to 60 meters. The next point is the Aim of an perfect WLAN: A WLAN should be designed transparent because it must be posssible that the Layers of a WLAN can work with the Layers of a normal LAN for example. Another need is that a WLAN should be applicable worldwide. As I said earlier before this depends on the international agreements for example for the frequency. This was a short introduction and I rather suggest moving on to the next point The IEEE 802.11 Standard. IEEE 802.11 Standard There are many different standards for example the IEEE 802.3 for CSMA/CD- based networks, therefore there is also a standard for WLANs so called IEEE 802.11. The Standard defines the Layer 2, the MAC- Layer, and the Layer 1, the Physical- Layer. For a better understanding I would like you to look at the slide show. Here you can see the main parts of the IEEE 802.11 standard. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (1 von 9)04.03.2006 11:43:21

The MAC- Layer includes the medium access and the function of encoding data, which is very important when the air-interface is used. Another function of the MAC- Layer is the fragmentation (Fragmentierung) of oversized data packets. The procedure of fragmentation is used for the adaption of the packet size on the current error rate without affecting (beeinflussen) higher layers. The Physical- Layer is split into the PLCP, the Physical Layer Convergence Protocol, and the PMD, the Physical Medium Dependent. The function of the PLCP is the check of the channel condition (Kanalzustand) and it offers an interface which is independent from the medium. The PMD controls the actual coding of the data. Parallel to these layers there are management- layers. The MAC- Management controls the roaming, which is the change of different access points (Zugangspunkten), the synchronization of the system and moreover it controls the actual transfer state. The Physical- Management chooses the transfer channel. There is another management- layer the station management, which operates parallel to the other layers. The function of the Station Management is the coordination of all the layers. I think you have already got an impression about the IEEE 802.11 Standard so let me recommend turning to the next topic the Topology. Network Topology There a two possible types of a WLAN the Ad-hoc- and the Infrastructure- Network. Ad-Hoc-Network: The mobile users communicate together directly. The Topology of such an Ad-hoc- Network is called Independent Basic Service Set (IBSS). Each Station is an own communication cell. Only within their range they can communicate. Basically Infrared or Bluetooth is used for the Ad-hoc Network because the use of IEEE 802.11 in this content is more difficult than with the other two systems. Infrastructure-Network: The Infrastructure- Network provides the communication between a remote station (Endgerät) and an Access Point (Basisstation). The Topology of such an Infrastructure- Network with an Access Point is called Basic Service Set (BSS). If the range is too short, a second Access Point can extend the range. Ranges of 100 to 300 meters can be achieved. This Topology is called Extended Service Set (ESS). The Access Point also allows the communication with the wired LAN. If the Access Point is used in this way, it works like a bridge. The result is that the Access Point can filter protocolls which are not used. The next point is giving you a summary of the networks. I want to cover an example of a network, which includes everything I have mentioned before. Therefore, ma I draw your file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (2 von 9)04.03.2006 11:43:21

attention to the slideshow. Example: The Example shows a network with two Access Points, three remote stations and a connection to the wired network. A station (STA) is a terminal equipment with access functions to the WLAN and with a radio contact to the Access Point. An Access Point (AP) is a device which is integrated in the WLAN and in the Distribution System (DS). A DS connects the Access Points with each other and offers a connection to the wired LAN via a portal. The APs, the DS and the Portal have a bridge function as I said earlier before. A group of STAs which communicates over the same AP is called Basic Service Set (BSS). With the help of the DS a Extended Service Set (ESS) can be designed. Within this ESS dates can be transmitted transparent because the DS is working like a bridge and so the DS forwards the dates to the right receiver. In this content the receiver can be the Portal or one of these Access Points. Before becoming too specific with the Network topology let s turn to the next point The Physical Layer. Physical Layer Originally there are three alternatives in the IEEE 802.11 Standard. Two radio based (funkbasiert) methods the FHSS and the DSSS and one not radio based, the Infrared method. The data rate is about one to two Mbit/s. Spread Spectrum A big problem concerning the radio transmission is, that frequency-independent Fading or narrowband disturbing signals can delete a certain narrowband part of a signal. Therefore a method is needed to avoid this deletion and this deletion is called spread spectrum (Bandspreizverfahren). The hidden agenda (Hintergedanke) is that a narrowband signal gets spread to a broadband signal and so other narrowband disturbing signal can t delete the signal. In this spread spectrum method the bandwidth R of a signla is getting spread to a bandwidth G. The bandwidth G can be up to 10.000 times wider than the bandwidth R. There are two spread spectrum methods. So let s focus on the first one the FHSS. FHSS Frequency Hopping Spread Spectrum: The process of the FHSS is the continuous frequency hopping. The change of the file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (3 von 9)04.03.2006 11:43:21

frequency is done in a certain sequence. This sequence assures (sichern) that each transmitter has another frequency. This alternative is used in the older gadgets. The minimum of frequency hops is 2,5 hops per second. DSSS Direct Sequence Spread Spectrum: The other spread spectrum method is the DSSS. This alternative is used in the latest devices. The spreading is achieved with the logical connection of the signal with a casual numeric order (Zufallszahlenfolge). Moreover the code of the casual numeric order must have some special features. This code is the barker code. Now I will explain the procedure of the DSSS. 1.) In the first part you can see the normal signal which should be transmitted. 2.) The Signal gets spread by the use of the logical connection with this barker code. 3.) The next step is the transmission of the spread signal. During the transmission narrowband and broadband faults disturb the signal. 4.) The next picture shows the reversion of the spreading. With the help of the identic casual numeric order the spread signal becomes narrowband again and the faults become broadband. 5.) The last step is the filtering of the original narrowband signal. The next point is the MAC- Layer. My colleague Martin Schwarzbauer will continue with this very interesting topic. Please stay tuned. Good afternoon gentlemen. As Mister Eder has mentioned I am going to give you information about the MAC-Layer. So let s start: MAC-Layer The MAC-Layer provides us with two services and 3 media access methods, which can be used together. The services are: asynchronous data service: This service is standard. It allows us to send data packets on best-effort base. This means that you can compare it with the fixed network (Festnetz) and it supports multicast and broadcast. time limited data service: This service can be used optional and it gives us a time guarantee for de transmission of data. As an obligatory version of media access the CSMA/CA was defined. The media access is named DFWMAC (Distributed Foundation Wireless MAC) The three types of media access are: DFWMAC DCF with CSMA/CA: file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (4 von 9)04.03.2006 11:43:21

This type of media access is standard. To avoid collisions this version uses parallel to CDMS/CD a back-off mechanism and acknowledge-bits. I ll give you an exact description of this type later in my presentation. DFWMAC DCF with RTS/CTS:(request to send and clear to send) This type of media access avoids problems with hidden end devices. DFWMAC PCF: (Point Coordination Function) The access point asks every station if they want to send data, this is called polling. With this method can t appear collisions and the time limits could be kept. Only the access point differ about the order of the scan und he is the only which can send whenever he wants. Now let s focus on my next point the Prioritisation: How and when the communications are set to the medium says the priority. There is no guarantee that the prioritisation was accomplished. (soft priorities). There are 3 different waiting times and they say when you can access the free medium. These three types are: SIFS: Short Inter Frame Spacing This is the shortest waiting time and has consequently the highest priority. High priorities have acknowledge Bits and answers to a send request. PIFS: Point Coordination Function Inter Frame Spacing This is the middle priority. Middle priorities have questions to an access point in the PCFaccess mode. DIFS: Distributed Coordination Function Inter Frame Spacing DIFS have the longest waiting times and the lowest priority. Low priority data is an access request in the asynchronous data service. Now I want to tell you in detail how DFWMAC-DCF with CSMA/CA works: CSMA/CA can in contrast to CSMA/CD avoid collisions but it can t find or correct them. How does it work?: The station which wants to send data listens to the medium. When the medium is free for the period of a DIFS the station can send his data. But when the medium is busy the station has to wait a DIFS period and after this period the station delays the time with a random time and start the Back-off Timer. This random time is called back-off time. When another station accesses the medium during the back-off time the back-off timer is stopped. The back-off timer starts again when the medium is free again. When the back-off timer executes the station can put his data to the medium. Originaldokument enthält an dieser Stelle eine Grafik! Original document contains a graphic at this position! The receiver of the packets has to approve the reception with an acknowledge bit. When the file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (5 von 9)04.03.2006 11:43:21

sending station doesn t receive this acknowledge it start to transmit the packet again and again till he got the acknowledge or the maximum of the repeat-counter was reached. Originaldokument enthält an dieser Stelle eine Grafik! Original document contains a graphic at this position! Now let s focus on the frame format: In this slide you can see the general frame body of a MAC frame. The frame control contains the version, type detection and so on. The duration ID contains the sending time for this packet. The sequence control holds a consecutive number to detect multiple transmitted packets. After the data array follows a 32 bit long checksum in the CRC method. MAC packets can be sent between mobile stations and inside the DS (Distribution System) so you need up to four addresses in one packet. Address one is read from every station in the reception area. With this address the station can decide if the packet is for it or another station. The second address describes the physical transmitter, this is important to send an acknowledge back to the transmitter. Address three and four are for the logical assignment of packets. Now let me demonstrate you 4 examples. You can see them here on this slide: Example 1: the packet is sent between two mobile stations without DS. Transmitter and receiver addresses and the BSS identifier are required. (Ad-Hoc network) Example 2: a packet is sent from a transmitter over the DS to the receiver. The BSSID stands on the second place and the logic receiver address on the third place. Example 3: A mobile station sends the packet to the DS and the DS sends this packet to the receiver. On the first place stands the physical receiver address and the logical receiver address on the third place Example 4: Is packet is sent inside two DS. The first and the second address represent receiver and transmitter inside the DS an address 3 and 4 are the logical receiver and transmitter addresses. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (6 von 9)04.03.2006 11:43:21

MAC-Management The following function groups have been standardised: synchronisation: The job is to find networks, for standing there or to synchronize the internal clocks. The access point sends for this reason the so called beacon signal to every mobile station. This signal contains further management information. power management: The power management contains function which can influence the readiness of the receiver or the transmission power. When a mobile station is used in the battery mode it is important keep the stations only ready to receive when data would be sent. For this reason exists defined sleep-models when a station has to receive data. association / reassociation: After the connection of a mobile station with the access point a association is build. When you use roaming ( later in my presentation I will explain it to you what this means) the association has to be rebuild and this is called reassociation. management infortmation base (MIB) Every parameter about the actual state of the mobile station is managed in the MIB. As I have mentioned before I will tell you what Roaming is: Roaming: When a mobile station recognizes that the transmission quality is getting bad it tries to find another access point with a better quality. This is called roaming. In addition the mobile station scans the neighbourhood for a compatible access point. The access point could be identified by the beacon signal. Every mobile station can send an active proof und wait for answers, because every access point in the neighbourhood is able to answer. Now let s turn to one of the most important points the SECURITY: Security: Wired Equivalent Privacy, shortly named WEP, is part of the wireless LAN standard IEEE 802.11 and it is a safety standard. It contains FHSS, DSSS and RC4 algorithm for encryption. The encryption is only 40 bit or 104 bit long so that the code is easy to decode, because the RC4 and the CRC are mathematically seen as unsafe. For this reason they developed WEPplus, WPA and Fast Packet Keying. The follower of the WEP is the new safety standard 802.11i. He has a higher security level und is now not to decrypt. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (7 von 9)04.03.2006 11:43:21

Another way to encrypt data is on the IP-Layer. For example by usage the IPsec or a VPN tunnel. Shortly I want to tell you a few things about WPA: WPA stands for Wi-Fi Protected Access an is an encryption method. WPA gives further safety because it uses dynamic keys which are based on a Temporal Key Integrity Protocol, called TKIP. WPA uses the key only for initialisation und after the initialisation a session key is used. There are two methods of the key management: Managed Key: The access identifier is managed on a central server Pre-Shared Keys When you use Pre-Shared Keys every user of the network uses the same password. When this password is to short or to easy to guess this is a point where WPA could be hacked. Finally I want you to tell shortly a few thing about SSID: SSID stands for service set identifier. SSID is nothing other than the network name of a wireless LAN based on the standard IEEE 802.11. Every WLAN holds this SSID and it is free configurable and it is used to identify clearly the WLAN. The SSID is up to 32 Bits long and ii is set in the access point. The 32 Bits are added unencrypted in front of every packet. On every mobile station you can select SSID ANY and this means that every reachable access point should send an SSID broadcast so that the mobile station can choose which access should be used. Thank you Martin. My next point is the Extension of IEEE 802.11 Standard. Extension of IEEE 802.11 Standard As a result of the success of the IEEE 802.11 Standard, new Standards were realised. Basically the aim was the improvement of the bitrate. I would like to give you a short overview of the extensions (Erweiterungen). On the slide show you can see a really short overview. You see the improvement of the bitrate. The bitrate of the IEEE 802.11 Standard is about 2 Mbit/s. The first improvement realised a bitrate of 11 Mbit/s. And so on the bitrate climbed up to 54 Mbit/s at the IEEE 802.11a and g Standard. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (8 von 9)04.03.2006 11:43:21

Of course, there are many more extensions but covering of all the extension would blow up (sprengen) the presention. You will be able to read it in the summary which you get. Before coming to the last point of our presentation I will give you a short Confrontation between WLAN and other radio technologies. The Confrontation On this slide you can see different LAN- radio access techniques. The confrontation contains of course the WLAN, the Hiperlan, Bluetooth and many more. Particularly I want to cover the differences of WLAN and Bluetooth. In the first place it must be said, that WLAN has a higher bitrate as opposed to that of Bluetooth. Also the WLAN has a higher range. The only advantage of Bluetooth is the simpleness. Ad- hoc networks can be achieved easier than with WLAN. In my opinion WLAN is the better solution realising an ad-hoc network. In this content the 3G- mobile radio must be mentioned. With regard to WLAN the 3Gmobile radio system doesn t only contain the telephone part, with the help of this system also a communication between two or more computers can be achieved. But 3Gtechnology has a lower bitrate than the WLAN technology. So, to conclude, WLAN is really the best solution realising a wireless connection between two terminal equipments. An exact listing of the features of the WLAN and the UMTS is printed on the summary you will get. file:///d /Refs/_To%20Do/13_01_06/Tag%202/WLANEnglisch(1).html (9 von 9)04.03.2006 11:43:21