IEEE 802.11 Wireless LAN Standard - PowerPoint PPT Presentation

1 / 38
About This Presentation
Title:

IEEE 802.11 Wireless LAN Standard

Description:

Enables transfer of association from one AP to another, allowing station to move ... Poll response. PIFS. Used by centralized controller in issuing polls ... – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 39
Provided by: Thomas883
Category:
Tags: ieee | lan | standard | wireless

less

Transcript and Presenter's Notes

Title: IEEE 802.11 Wireless LAN Standard


1
IEEE 802.11 Wireless LAN Standard
  • Chapter 14

2
IEEE 802 Protocol Layers
3
Protocol Architecture
  • Functions of physical layer
  • Encoding/decoding of signals
  • Preamble generation/removal (for synchronization)
  • Bit transmission/reception
  • Includes specification of the transmission medium

4
Protocol Architecture
  • Functions of medium access control (MAC) layer
  • On transmission, assemble data into a frame with
    address and error detection fields
  • On reception, disassemble frame and perform
    address recognition and error detection
  • Govern access to the LAN transmission medium
  • Functions of logical link control (LLC) Layer
  • Provide an interface to higher layers and perform
    flow and error control

5
Separation of LLC and MAC
  • The logic required to manage access to a
    shared-access medium not found in traditional
    layer 2 data link control
  • For the same LLC, several MAC options may be
    provided

6
MAC Frame Format
  • MAC control
  • Contains Mac protocol information
  • Destination MAC address
  • Destination physical attachment point
  • Source MAC address
  • Source physical attachment point
  • CRC
  • Cyclic redundancy check

7
Logical Link Control
  • Characteristics of LLC not shared by other
    control protocols
  • Must support multiaccess, shared-medium nature of
    the link
  • Relieved of some details of link access by MAC
    layer

8
LLC Services
  • Unacknowledged connectionless service
  • No flow- and error-control mechanisms
  • Data delivery not guaranteed
  • Connection-mode service
  • Logical connection set up between two users
  • Flow- and error-control provided
  • Acknowledged connectionless service
  • Cross between previous two
  • Datagrams acknowledged
  • No prior logical setup

9
IEEE 802.11 Architecture
  • Distribution system (DS)
  • Access point (AP)
  • Basic service set (BSS)
  • Stations competing for access to shared wireless
    medium
  • Isolated or connected to backbone DS through AP
  • Extended service set (ESS)
  • Two or more basic service sets interconnected by
    DS

10
IEEE 802.11 Services
11
Distribution of Messages Within a DS
  • Distribution service
  • Used to exchange MAC frames from station in one
    BSS to station in another BSS
  • Integration service
  • Transfer of data between station on IEEE 802.11
    LAN and station on integrated IEEE 802.x LAN

12
Transition Types Based On Mobility
  • No transition
  • Stationary or moves only within BSS
  • BSS transition
  • Station moving from one BSS to another BSS in
    same ESS
  • ESS transition
  • Station moving from BSS in one ESS to BSS within
    another ESS

13
Association-Related Services
  • Association
  • Establishes initial association between station
    and AP
  • Reassociation
  • Enables transfer of association from one AP to
    another, allowing station to move from one BSS to
    another
  • Disassociation
  • Association termination notice from station or AP

14
Access and Privacy Services
  • Authentication
  • Establishes identity of stations to each other
  • Deathentication
  • Invoked when existing authentication is
    terminated
  • Privacy
  • Prevents message contents from being read by
    unintended recipient

15
IEEE 802.11 Medium Access Control
  • MAC layer covers three functional areas
  • Reliable data delivery
  • Access control
  • Security

16
Reliable Data Delivery
  • More efficient to deal with errors at the MAC
    level than higher layer (such as TCP)
  • Frame exchange protocol
  • Source station transmits data
  • Destination responds with acknowledgment (ACK)
  • If source doesnt receive ACK, it retransmits
    frame
  • Four frame exchange
  • Source issues request to send (RTS)
  • Destination responds with clear to send (CTS)
  • Source transmits data
  • Destination responds with ACK

17
Access Control
18
Medium Access Control Logic
19
Interframe Space (IFS) Values
  • Short IFS (SIFS)
  • Shortest IFS
  • Used for immediate response actions
  • Point coordination function IFS (PIFS)
  • Midlength IFS
  • Used by centralized controller in PCF scheme when
    using polls
  • Distributed coordination function IFS (DIFS)
  • Longest IFS
  • Used as minimum delay of asynchronous frames
    contending for access

20
IFS Usage
  • SIFS
  • Acknowledgment (ACK)
  • Clear to send (CTS)
  • Poll response
  • PIFS
  • Used by centralized controller in issuing polls
  • Takes precedence over normal contention traffic
  • DIFS
  • Used for all ordinary asynchronous traffic

21
MAC Frame Format
22
MAC Frame Fields
  • Frame Control frame type, control information
  • Duration/connection ID channel allocation time
  • Addresses context dependant, types include
    source and destination
  • Sequence control numbering and reassembly
  • Frame body MSDU or fragment of MSDU
  • Frame check sequence 32-bit CRC

23
Frame Control Fields
  • Protocol version 802.11 version
  • Type control, management, or data
  • Subtype identifies function of frame
  • To DS 1 if destined for DS
  • From DS 1 if leaving DS
  • More fragments 1 if fragments follow
  • Retry 1 if retransmission of previous frame

24
Frame Control Fields
  • Power management 1 if transmitting station is
    in sleep mode
  • More data Indicates that station has more data
    to send
  • WEP 1 if wired equivalent protocol is
    implemented
  • Order 1 if any data frame is sent using the
    Strictly Ordered service

25
Control Frame Subtypes
  • Power save poll (PS-Poll)
  • Request to send (RTS)
  • Clear to send (CTS)
  • Acknowledgment
  • Contention-free (CF)-end
  • CF-end CF-ack

26
Data Frame Subtypes
  • Data-carrying frames
  • Data
  • Data CF-Ack
  • Data CF-Poll
  • Data CF-Ack CF-Poll
  • Other subtypes (dont carry user data)
  • Null Function
  • CF-Ack
  • CF-Poll
  • CF-Ack CF-Poll

27
Management Frame Subtypes
  • Association request
  • Association response
  • Reassociation request
  • Reassociation response
  • Probe request
  • Probe response
  • Beacon

28
Management Frame Subtypes
  • Announcement traffic indication message
  • Dissociation
  • Authentication
  • Deauthentication

29
Wired Equivalent Privacy (WEP)
  • For privacy the original 802.11 defined the WEP
    algorithm
  • WEP makes use of RC4 encryption algorithm using
    40-bit or 104-bit key
  • For authentication, 802.11 requires the two
    parties share a secret key

30
WEP weaknesses
  • The 40-bit key is woefully inadequate, even
    104-bit key proved to be vulnerable
  • These vulnerabilities include
  • heavy reuse of keys
  • The ease of data access in a wireless network
  • The lack of any key management within the
    protocol

31
Wired Equivalent Privacy
32
Authentication
  • Open system authentication
  • Exchange of identities, no security benefits
  • Shared Key authentication
  • Shared Key assures authentication

33
Wi-Fi Protected Access (WPA)
  • WPA is set of security mechanism that eliminates
    most 802.11 security issues and was based on
    802.11i standard
  • 802.11i addresses three main security area
  • Authentication
  • Key management
  • Data transfer privacy

34
802.11i consists of three main ingredients
  • Authentication A protocol is used to define an
    exchange between a user and an AS (authentication
    server) that provides mutual authentication and
    generates temporary keys to be used between the
    client and the AP over a wireless link.
  • Authentication operates at level above the LLC
    and MAC protocols and is considered beyond the
    scope of 802.11.
  • Extensible Authentication Protocol (EAP) and
    Remote Authentication Dial-In User Service
    (RADIUS) are popular authentication protocol in
    use.

35
802.11i consists of three main ingredients
  • Access control This function enforces the use of
    the authentication function, routes the messages
    properly, and facilitates key exchange.
  • IEEE 802.1X, Port-Based Network Access Control
  • 802.1X framework, with an upper-layer
    authentication protocol, fits nicely with a BSS
    that includes a number of stations and an AP.

36
802.11i consists of three main ingredients
  • Privacy with message integrity MAC-level data
    are encrypted, along with a message integrity
    code that ensures that the data have not been
    altered.
  • Temporal Key Integrity Protocol (TKIP) or WPA-1.
    Uses the same RC4 encryption algorithm as WEP.
  • Counter Mode-CBC MAC Protocol (CCMP) or WPA-2.
    Makes use of Advanced Encryption Standard (AES)
    encryption protocol.

37
Physical Media Defined by Original 802.11 Standard
  • Direct-sequence spread spectrum
  • Operating in 2.4 GHz ISM band
  • Data rates of 1 and 2 Mbps
  • Frequency-hopping spread spectrum
  • Operating in 2.4 GHz ISM band
  • Data rates of 1 and 2 Mbps
  • Infrared
  • 1 and 2 Mbps
  • Wavelength between 850 and 950 nm

38
IEEE 802.11a and IEEE 802.11b
  • IEEE 802.11a
  • Makes use of 5 GHz band
  • Provides rates of 6, 9 , 12, 18, 24, 36, 48, 54
    Mbps
  • Uses orthogonal frequency division multiplexing
    (OFDM)
  • IEEE 802.11b
  • Makes use of 2.4 GHz band
  • Provides data rates of 5.5 and 11 Mbps
  • Uses DSSS
  • IEEE 802.11g
  • Makes use of 2.4 GHz band
  • Provides data rates up to 54Mbps
  • Uses DSSS, OFDM
Write a Comment
User Comments (0)
About PowerShow.com