530 likes | 883 Views
Wireless LAN Standards. MIS 4700 Dr. Garrett. IEEE. Institute of Electrical and Electronic Engineers (IEEE) Professional organization with members in engineering, science, and education Creates standards for the electronics, computer, and networking industries. IEEE 802 Standards.
E N D
Wireless LAN Standards MIS 4700 Dr. Garrett
IEEE • Institute of Electrical and Electronic Engineers (IEEE) • Professional organization with members in engineering, science, and education • Creates standards for the electronics, computer, and networking industries
IEEE 802 Committees • In February 1980, the IEEE formed a special committee to develop vendor-neutral standards for local area networks • Several subcommittees or task groups were formed to deal with specific networking issues
WLAN Standards • Physical media • Frequency-hopping spread spectrum (FHSS) • Direct-sequence spread spectrum (DSSS) • Infrared (IR) • Media access control (MAC) functions
The Original WLAN Standard • Released in 1997 as 802.11 • 1 or 2 Mbps • Infrared (IR) or radio frequency (RF) signals • 2.4 GHz band
802.11 MAC Layer • Manages and maintains communications between 802.11 transmitters and receivers by coordinating and controlling access to the shared RF channels • Operates on top of the 802.11x PHY layer
The 802.11 MAC layer operates on top of the 802.11x PHY layer.
Distributed Coordination Function • Wireless stations may not be in range of each other, so they cannot merely check to see if the medium is in use • Station calculates the time it will need to transmit the frame – the Navigation Allocation Vector (NAV) – and places it in the header of the frame • A station cannot transmit until they receive a NAV of zero • Also uses acknowledgement frames
Point Coordination Function • Access point polls stations to see if they need to transmit • Stations may not transmit unless AP polls it • PCF remains idle if DCF is in use • Not implemented on many access points yet
Required Scanning for signals Device authentication Network association Optional Data encryption RTS/CTS handshake Frame fragmentation Power conservation IEEE 802.11 MAC Layer Operations
Passive scanning AP periodically broadcasts a beacon Used by wireless NICs to locate an AP and determine its signal strength Default, mandatory standard Active scanning Wireless NICs broadcast a probe frame APs within range respond Scanning for Signals
Device Authentication • Mutual authentication occurs between a device and a network • Open systems authentication requires a wireless device to request authentication by sending an authentication request to an access point. • Shared-key authentication uses public encryption keys between stations
Open System Authentication The exchange of frames in an open systems authentication process.
Proprietary Authentication Methods • Lightweight Extensible Authentication Protocol (LEAP) is a Cisco proprietary authentication method using a centralized and user-based process • Wi-Fi Protected Access (WPA) is a vendor-neutral authentication process
Man-In-The-Middle (MTTM) Attacks A man-in-the-middle (MTTM) attack occurs when an attacker is able to intercept, read, and perhaps modify frames transmitted between two stations, usually undetected.
Network Association • Network association allows the NIC to synchronize with the access point and the bandwidth of the medium • Follows authentication • Once associated with an AP, the NIC can begin transmitting data frames
Data Encryption • Wireless Equivalent Privacy (WEP) • Data of each frame is encrypted using a 40-bit encryption key known by sender and receiver
RTS/CTS Handshake • Ready To Send / Clear To Send (RTS/CTS) handshake allows larger than normal data blocks to be sent • NIC sends a RTS to receiver • Receiver responds with a CTS and the time required to transmit the frame so other nodes know how long to wait before using the medium • Useful for hidden nodes
Hidden Node Nodes A and B are “hidden” from each other and must communicate through node C.
Frame Fragmentation • Fragmentation allows a transmitting node to divide a data frame into smaller frames (fragments) • Useful when RF interference causes bit errors
Power Conservation • Used in portable computers and devices • Allows the NIC to reduce its power requirements during idle periods and notify its access point that the NIC is switching to a sleep state • Access point buffers messages for the sleeping station until it is notified that the station is changing back to active state
Signal Modulation • To use any kind of signal to represent data, the signal must be modulated • Common RF modulation methods are: • Amplitude modulation (AM) • Frequency modulation (FM) • Phase modulation (PM) • Data signal wave is inserted with a displacement relative to the carrier wave
Phase Modulation A waveform has a 360-degree cycle length. An analog signal after a phase modulation of 90-degrees.
IEEE 802.11b WLAN Standard • Data rates of 5.5 Mbps and 11 Mbps • Operates on 2.4 GHz RF band • Infrastructure or ad-hoc mode
802.11b Physical (PHY) Layer • Uses Complementary Code Keying (CCK) with Quadrature Phase Shift Keying (QPSK) modulation • Uses Direct Sequence Spread Spectrum (DSSS) transmission • QAM combines two amplitude modulation (AM) signals onto a single channel • Dynamic rate shifting (DRS) allows the transmission rate to be adjusted to a lower rate when interference is experienced
Physical Layer Convergence Protocol (PLCP) Performs the carrier sense using a Clear Channel Assessment Physical Medium Dependent (PMD) Defines transmit and receive functions such as type of modulation and spread spectrum used 802.11b PHY Sublayers
802.11b Infrastructure Mode • Includes at least one wireless station and one access point connected to a distribution system • Two possible configurations: • Basic Service Set (BSS) • Extended Service Set (ESS)
Basic Service Set (BSS) • Wireless stations communicate with only one access point • The access point frequently serves as a bridge between the wireless stations and a distribution system like a wired network
Extended Service Set (ESS) • Combines two or more BSSs
802.11b ad-hoc Mode • Uses and Independent Basic Service Set (IBSS) • Wireless stations communicate directly with each other • No base station, or AP • Peer-to-peer wireless network
802.11a WLAN Standard • Defines the PHY and MAC layers • Uses orthogonal frequency division multiplexing (OFDM) • Orthogonal describes items that do not overlap, are mutually independent, and expand to fill an entire space • Up to 54 Mbps bandwidth • Uses 5 GHz RF band • Not compatible with 802.11b
Orthogonal Frequency Division Multiplexing (OFDM) • Both a modulation and multiplexing technique • Divides a 20 MHz RF channel into 48 narrowband sub-channels and then splits a data signal into 48 separate carriers • Subchannels overlap and signal bits are sent in parallel using frequency division multiplexing
FDM and OFDM Comparison A comparison of how FDM and OFDM modulate a signal for transmission.
Multi-path Propagation • Multi-path propagation occurs when an RF signal cannot take a clear and direct path between a transmitter and a receiver • Some signals are delayed more than others and may overlap another signal arriving at the receiver, called inter-symbol interference
IEEE 802.11IR Standard • Transmission method that uses optical diffusion • 1 Mbps or 2 Mbps bandwidth • Bounces IR signals off walls and ceilings
Advantages Security: IR signal does not leave the room but may go through a window Not susceptible to RF interference Disadvantages IR light transmissions are limited to a single room, so an access point is required in each room Compatibility is an issue with some products on the market 802.11IR Advantages and Disadvantages
802.11g Standard • Compatible with 802.11b and Wi-Fi standards • Data rates up to 54 Mbps • Transmits over three channels • 802.11a+g products are beginning to come out that provide compatibility with 802.11a also