1 / 54

Chapter 04 IEEE 802.11 Media Access Control

Chapter 04 IEEE 802.11 Media Access Control. Faculty of Computer Sciense and Engineering. Objectives. Describe and apply the following concepts surrounding WLAN frames - Terminology Review: Frames, Packets, and Datagrams - Terminology Review: Bits, Bytes, and Octets

job
Download Presentation

Chapter 04 IEEE 802.11 Media Access Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 04IEEE 802.11 Media Access Control Faculty of Computer Sciense and Engineering

  2. Objectives Describe and apply the following concepts surrounding WLAN frames - Terminology Review: Frames, Packets, and Datagrams - Terminology Review: Bits, Bytes, and Octets - Terminology: MAC and PHY Understand IEEE 802.11 CSMA/CA Understand and compare frame types and formats Identify, explain, and apply the frame and frame exchange sequences - Active (Probes) and Passive (Beacons) Scanning - Dynamic Rate Switching

  3. Objectives Summarize the processes involved in authentication and association - The IEEE 802.11 State Machine - Open System Authentication, Shared Key Authentication, and Deauthentication - Association, Reassociation, and Disassociation Define, describe, and apply IEEE 802.11 coordination functions and channel access methods and features available for optimizing data flow across the RF medium - DCF and PCF Coordination Functions - RTS/CTS - Fragmentation

  4. Terminology Review Whatever data is communicated, Layer 4 - Transport layer - usually breaks the data into TCP segments. These segments are sent to Layer 3 and become the packets. When these packets are passed on to Layer 2, they become frames. And now it is ready to be placed on the wire or RF medium using the Layer 1 technologies implemented.

  5. Terminology Review TermPacketis usually used for connection-oriented communications (TCP). Term Datagramis usually used for connectionless communications (UDP). Framesare collections of data and management information needed to carry the data from one place to another on the network. Different networking technologies use different frame formats Bits, Bytes, and Octets The smallest element that can be transmitted on any network is a bit. A bit is a single value equal to 1 or 0. When we group 8 bits together, they form a byte. It is called an octetin most standards.

  6. Terminology Review MAC and PHY MACis an acronym for medium access control. Within the Data Link layer (Layer 2) of the OSI model, there are two sublayers known as the Logical Link Control (LLC) and the MAC sublayer PHYis an abbreviation for the Physical layer of the OSI model. In order to provide for different physical technologies (Infrared, DSSS, FHSS, etc.) in IEEE 802.11, the PHY is divided into two sublayers called the Physical Medium Dependant (PMD) and the Physical Layer Convergence Protocol (PLCP).

  7. Terminology Review The Physical Medium Dependent (PMD) is responsible for actually transmitting the information using some form of modulation such as GPSK, DBPSK, or DQPSK. The Physical Layer Convergence Protocol (PLCP) is responsible for abstracting the PMD from the Data Link layer protocols and abstracting the Data Link layer protocols from the PMD. It acts as a translator or coordinator between the real physical medium and the MAC processes.

  8. Terminology Review Data Link Layer and Logical Link Control (LLC) Sublayer The Data Link layer of the OSI model is divided into two sublayers. These sublayers, in IEEE 802.11 systems, are the IEEE 802.2 Logical Link Control (LLC) sublayer, and the Media Access Control (MAC) sublayer.

  9. Terminology Review The data units that are passed down through the layers have specific names. These names are used to distinguish the frame at one layer from the frame at another layer and to distinguish the preserviced frame from the serviced frame at each layer. These names are MSDU, MPDU, PSDU, and PPDU. MSDU, stands for MAC service data unit. The MSDU is what is received from the upper layers (OSI layers 7–3 via the LLC sublayer) to be managed and transmitted by the lower layers (OSI layers 2–1). It is the data accepted by the MAC layer to be transmitted to the MAC layer of another station on the network. MSDUs are included in all wireless frames that carry upper-layer data; however, IEEE 802.11 management frames do not contain MSDUs, since there is no upper-layer data to transfer.

  10. Terminology Review The MPDU, MAC protocol data unit, is what is delivered to the PLCP so that it can ultimately be converted into a PPDU and transmitted. The MSDU is what is received by the Data Link layer, and the MPDU is what comes out of the Data Link layer and is delivered to the Physical layer. It is delivered to the PLCP. The PSDU is the PLCP service data unit. The PSDU is what the PLCP receives from the MAC sublayer. While the MAC sublayer calls it the MPDU, the Physical layer references the exact same objects as the PSDU. The PLCP adds information to the PSDU and provides the result to the PMD as a PPDU.

  11. Terminology Review The PPDU, PLCP protocol data unit, is what is actually transmitted on the RF medium. The PPDU is what the PMD receives from the PLCP. The PPDU is the culmination of all that has happened to the data from the time it left the application starting at Layer 7 of the OSI model to the time it is actually transmitted on the RF medium by the PMD at Layer 1.

  12. IEEE 802.11 CSMA/CA

  13. CSMA/CD versus CSMA/CA Ethernet networks (IEEE 802.3) use a form of collision management known as collision detection (CD). Wireless networks use a different form of collision management known as collision avoidance (CA). The full name of the physical media access management used in wireless networks is carrier sense multiple access/collision avoidance or CSMA/CA. The carrier sensein CSMA means that the devices will attempt to sense whether the physical medium is available before communicating. The multiple accessindicates that multiple devices will be accessing the physical medium.

  14. CSMA/CD versus CSMA/CA In a CD implementation of CSMA, when a collision is detected, both devices go silent for a pseudo-random period of time. Collision avoidance is achieved by signaling to the other devices that one device is about to communicate. CSMA/CA is not perfect due to hidden node problems.

  15. CSMA/CD Before networked device sends a frame, listens to see if another device currently transmitting. If traffic exists, wait; otherwise send. Devices continue listening while sending frame. If collision occurs, stops and broadcasts a “jam” signal.

  16. CSMA/CD CSMA/CD cannot be used on wireless networks: Difficult to detect collisions and Hidden node problem

  17. Hidden node problem

  18. Carrier Sense Carrier senseis the process of checking to see if the medium is in use or busy. There are two kinds of carrier sense: virtual carrier sense and physical carrier sense. Physical carrier senseuses clear channel assessment (CCA) to determine if the physical medium is in use. Virtual carrier sense uses a network allocation vector (NAV). The NAV is a timer in each station that is used to determine if the station can utilize the medium. If the NAV has a value of 0, the station may contend for the medium. If the NAV has a value greater than 0, the station must wait until the timer counts down to 0 to contend for the medium. Stations configure their NAV timers according to Duration fields in other frames using the medium.

  19. Interframe Spacing • After the station has determined that the medium is available, using carrier sensing techniques, it must observe interframe spacing (IFS) policies. IFS is a time interval in which frames cannot be transmitted by stations within a BSS. This space between frames ensures that frames do not overlap each other. The time interval differs, depending on the frame type and the • applicable IFS type for that frame. • These IFS types include the following types: • - SIFS • - PIFS • - DIFS • - EIFS

  20. Interframe Spacing: SIFS, PIFS, DIFS, EIFS Short interframe spacing (SIFS) is the shortest of the available IFS parameters. Frames that are specified to use SIFS will take priority over frames that are specified to use PIFS, DIFS, or extended IFS (EIFS). Distributed (coordination function) interframe spacing (DIFS) is used by standard data frames. Extended interframe spacing (EIFS) is used when a frame reception begins but the received frame is incomplete or is corrupted based on the Frame Check Sequence (FCS) value.

  21. Interframe Spacing: SIFS, PIFS, DIFS, EIFS CSMA/CA with one station transmitting

  22. Interframe Spacing: SIFS, PIFS, DIFS, EIFS CSMA/CA with two stations transmitting

  23. Contention Window After the IFS delay interval has passed, the device must then initiate a random backoff algorithm and then contend for the wireless medium if the Distributed Coordination Function is in effect. This random backoff algorithm is processed and applied using the contention window. Random Backoff Times All stations having a frame to transmit choose a random time period within the range specified as the contention window. Next, the predefined algorithm multiplies the randomly chosen integer by a slot time. The slot time is a fixed-length time interval that is defined for each PHY, such as DSSS, FHSS, or OFDM.

  24. Collision Avoidance The carrier sense, IFS, and random backoff times are used in order to decrease the likelihood that any two stations will try to transmit at the same time on the WM. The IFS parameters are also used in order to provide priority to the more time-sensitive frames such as ACK frames and CTS frames. The CCA (PHY and MAC), IFS, variable contention window, and random backoff times, together, form the core of the Distributed Coordination Function. Even with all of these efforts, a collision can still occur. In order to deal with these scenarios, acknowledgment, or ACK, frames are used. An ACK frame is a short frame that uses the SIFS to let the sending device know that the receiving device has indeed received the frame. If the sending device does not receive an ACK frame, it will attempt to retransmit the frame.

  25. Frame Types and Formats Compared

  26. IEEE 802.11 Frame Format Versus IEEE 802.3 Frame Format • A frame originating from a wired client and destined for a wireless client will first be transmitted on the wire as an 802.3 frame, and then the access point will strip off the 802.3 headers and reframe the data unit as an 802.11 frame for transmission to the wireless client. • IEEE 802.3 frames support a maximum MSDU payload size of 1500 bytes. IEEE 802.11 frames support a maximum MSDU payload size of 2304 bytes • 802.3 frames have only two MAC address fields, whereas 802.11 frames have one, two, three, or four. These four MAC address fields can contain four of the following five MAC address types, and the contents will be dependent on the frame subtype: • - Basic Service Set Identifier (BSSID) • - Destination Address (DA) • - Source Address (SA) • - Receiver Address (RA) • - Transmitter Address (TA)

  27. Frame Types Three frame types: management frames, control frames, and data frames. The Typesubfield in the Frame Control (FC) field of a general IEEE 802.11 frame may be 00 (management), 01 (control), or 10 (data). The Subtype subfield determines the subtype of frame, within the frame types specified, that is being transmitted. For example, a Type subfield value of 00 with a Subtype value of 0000 is an association request frame; however, a Type value of 10 with a Subtype value of 0000 is a standard data frame.

  28. Management Frames Management frames are used to manage access to wireless networks and to move associations from one access point to another within an extended service set (ESS).

  29. Management Frames • Acknowledgment frame (ACK): Sent by receiving device to sending device to confirm data frame arrived intact. • If ACK not returned, transmission error assumed.

  30. Control Frames, Data Frames Control frames are used to assist with the delivery of data frames and must be able to be interpreted by all stations participating in a BSS. This means that they must be transmitted using a modulation technique and at a data rate compatible with all hardware participating in the BSS. Data frames are the actual carriers of application-level data.

  31. IEEE 802.11 Frames and Frame Exchange Sequences

  32. MAC Functions Scanning Before a station can participate in a BSS, it must be able to find the access points that provide access to that service set Synchronization Some IEEE 802.11 features require all stations to have the same time. Stations can update their clocks based on the time stamp value in beacon frames. Frame Transmission Stations must abide by the frame transmission rules of the BSS to which they are associated. Authentication Authentication is performed before a station can be associated with a BSS.

  33. MAC Functions Association Once authentication is complete, the station can become associated with the BSS. Reassociation When a user roams throughout a service area, that user may reach a point where one AP within an ESS will provide a stronger signal than the currently associated AP. When this occurs, the station will reassociate with the new AP. Data Protection Data encryption may be employed to assist in preventing crackers from accessing the data that is transmitted on the WM. Power Management Since the transmitters/receivers in wireless client devices consume a noteworthy amount of power, this feature are provided that assist in extending battery life by causing the transceiver to sleep for specified intervals. Fragmentation It is beneficial to fragment frames before they are transmitted onto the WM. This occurs as a result of intermittent interference. RTS/CTS Request to Send/Clear to Send is a feature of IEEE 802.11 that will help prevent hidden node problems.

  34. Beacon Management Frame In an ad hoc wireless network (IBSS), all the stations take turns broadcasting the beacon frame. This is because there is no access point in an independent basic service set (IBSS). Beacon frames can be used by client stations seeking wireless network to join, or these client stations may use other frames known as probe request and probe response frames.

  35. Beacon Management Frame

  36. Active Scanning (Probes) Active scanning uses probe request and probe response frames instead of the beacon frame to find a WLAN to join. Freeware tool NetStumbler can be used for active scanning

  37. Active Scanning (Probes) Active scanning involves channel switching and scanning each channel in a station’s channel list. 1. Switch to a channel. 2. Wait for an incoming frame or for the ProbeDelay timer to expire. 3. If the ProbeDelay timer expires, use DCF for access to the WM and send a probe request frame. 4. Wait for the MinChannelTime to pass. a. If the WM was never busy, there is no WLAN on this channel. Move to the next channel. b. If the WM was busy, wait until MaxChannelTime has expired and then process any probe response frames.

  38. Passive Scanning (Beacons) The passive scanning: the client station listens (receives) in order to find the access points. This is done by receiving beacon frames and using them to find the access point for the BSS to be joined. When multiple access points transmit beacon frames that are received by the passive scanning station, the station will determine the access point with the best signal (RSSI) and attempt to authenticate and associate with that access point.

  39. Authentication and Association Processes

  40. The IEEE 802.11 State Machine The state machine of the IEEE 802.11 standard can be in one of three states: - Unauthenticated/Unassociated - Authenticated/Unassociated - Authenticated/Associated

  41. The IEEE 802.11 State Machine State 1: Unauthenticated/Unassociated In the initial state, a client station is completely disconnected from the WLAN. Authentication frames can be sent to the access points. State 2: Authenticated/Unassociated The second state of the state machine is to authenticate an unassociated state. To move from the first state to the second, the client station must perform some kind of valid authentication. This is accomplished with authentication frames. State 3: Authenticated/Associated In order for a station to be in this state, it must have first been authenticated and then associated. The process of moving from state 2 to this state is a simple four-frame transaction. The client station first sends an association request frame to an access point to which it has been authenticated. Second, the access point responds with an acknowledgment frame. Next, the access point sends an association response frame either allowing or disallowing the association. The client sends an acknowledgment frame as the fourth and final step.

  42. The IEEE 802.11 State Machine

  43. Authentication - Deauthentication There are two methods of authentication: - Open System authentication - Shared Key authentication. The first would be used in less secure environments. The second would be used in more secure environments. Deauthentication indicates that the deauthenticating station is either leaving or has left the BSS or ESS. A deauthentication frame will include the address of the station being deauthenticated and the address of the station with which the deauthenticating station is currently authenticated.

  44. Open System Authentication No true authentication (verification of identity) occurs. Be specified as the default authentication mechanism. The four steps do not include any actual authentication of identity. Access points configured to use Open System authentication will always respond with a positive authentication to any authentication request.

  45. Open System Authentication

  46. Shared Key Authentication Shared Key authentication utilizes the wired equivalent privacy (WEP) key for authentication.

  47. Shared Key Authentication

  48. Association, Reassociation, and Disassociation A station can be authenticated with multiple APs, but it can be associated with only one. There are three frames related to association: association frames, reassociation frames, and disassociation frames. Association The process of association: Four frames are transmitted between the client station and the AP station. The first frame is an association request frame, which is followed by an acknowledgment frame from the AP. The third frame is an association response frame, which is followed by an acknowledgment frame from the client station.

  49. Association, Reassociation, and Disassociation • Reassociation • Reassociation occurs when a client station roams from one AP to another within an ESS. • Device drops connection with one AP and establish connection with another. Several reason why reassociation may occur: • roaming, weakened signal. When device determines link to current AP is poor, begins scanning to find another AP • Disassociation • The disassociation service is the component of the MAC layer that is responsible for processing a disassociation.

  50. Data Flow Optimization Across the RF Medium Transmitting on the WLAN: DCF and PCF Distributed Coordination Function (DCF) Mandatory in 802.11 The DCF is the WM access method. DCF is inclusive of the carrier sensing mechanisms, interframe spacing, and backoff timers. DCF is said to be a distributed coordination function because the coordination of access to the WM is distributed among the wireless stations. Using the various methods, all the stations work together to provide cooperative access to the WM without the need for a centralized medium access controller. Point Coordination Function (PCF) An optional access method The PCF centralizes access to the WM. There is one point (station) in the WLAN that is responsible for controlling access to the WM. This point is the access point. (polling mechanism)

More Related