2. What is WLAN???
A wireless local area network(LAN) is a
flexible data communications system
implemented as an extension to, or as an
alternative for, a wired LAN.
Using radio frequency (RF) technology, wireless
LANs transmit and receive data over the air,
minimizing the need for wired connections.
Thus, combining data connectivity with user mobility.
3. Advantages of WLAN
Productivity, convenience, and cost
advantages
Installation speed and simplicity.
Installation flexibility.
Reduced cost-of-ownership.
Mobility.
Scalability.
4. Disadvantages of WLAN
Cost
Wireless network cards cost 4 times more than wired network
cards.
The access points are more expensive than hubs and wires.
Signal Bleed Over
Access points pick up the signals of adjacent access points or
overpower their signal.
Environmental Conditions
Susceptible to weather and solar activity.
Constrained by buildings, trees, terrain.
Less Capacity
Slower bandwidth.
Limit to how much data a carrier wave can transmit without
lost packets impacting performance.
7. In response to lacking standards, IEEE developed the
first internationally recognized wireless LAN
standard – IEEE 802.11
IEEE published 802.11 in 1997, after seven years of
work
Most prominent specification for WLANs
Scope of IEEE 802.11 is limited to Physical and Data
Link Layers.
IEEE 802.11 Wireless LAN
Standard
8. IEEE 802 LAN Standards
Family
IEEE 802.3
Carrier
Sense
IEEE 802.4
Token
Bus
IEEE 802.5
Token
Ring
IEEE 802.11
Wireless
IEEE 802.2
Logical Link Control (LLC)
PHY
OSI Layer 1
(Physical)
Mac
OSI Layer 2
(Data Link)
9.
10. 802.11 Infrastructure
802.11 networks can be used in two modes: Infrastructure
and Ad hoc Mode
Infrastructure mode requires a central access point that all devices
connect to.
Ad-hoc mode is also known as “peer-to-peer” mode. Ad-hoc networks
don't require a centralized access point. Instead, devices on the wireless
network connect directly to each other
11. Access point (AP): A station that provides access to the
DS.
Basic service set (BSS): A set of stations controlled by a
single AP.
Distribution system (DS): A system used to interconnect
a set of BSSs to create an ESS.
DS is implementation-independent. It can be a wired 802.3
Ethernet LAN, 802.4 token bus, 802.5 token ring or another
802.11 medium.
Extended service set (ESS):Two or more BSS
interconnected by DS
Portal: Logical entity where 802.11 network integrates
with a non 802.11 network.
IEEE 802.11 Terminology
14. In each station computer (STA for short)
connects to an access point via a wireless link. The set-up formed by the
access point and the stations located within its coverage area are called the
or for short. They form one cell.
Each BSS is identified by a a 6-byte (48-bite) identifier. In
infrastructure mode, the BSSID corresponds to the access point's MAC
address.
Several access points can be linked together (or more precisely several
BSS's) using a connection called a for short)
in order to form an or . The distribution
system can also be a wired network, a cable between two access points or
even a wireless network.
An ESS is identified with an
a 32-character identifier (in ASCII format) which acts as its
name on the network. The ESSID, often shortened to , shows the
network's name, and in a way acts a first-level security measure, since it is
necessary for a station to know the SSID in order to connect to the
extended network.
19. 802.11 MAC sublayer protocol
In 802.11 wireless LANs, “seizing the channel” does
not exist as in 802.3 wired Ethernet.
Two additional problems:
Hidden Terminal Problem
Exposed Station Problem
To deal with these two problems 802.11 supports two
modes of operation:
DCF (Distributed Coordination Function)
PCF (Point Coordination Function).
All implementations must support DCF, but PCF
is optional.
20. DCF
DCF sub-layer uses CSMA/CA
if station has frame to send it listens to medium
if medium idle, station may transmit
else waits until current transmission completes
No collision detection since on wireless network, so use
collision avoidance (backoff and RTS/CTS)
DCF includes delays that act as a priority scheme
DIFS: DCF inter-frame space
SIFS: short inter-frame space (SIFS < DIFS)
21. DCF
1. A station with a frame to transmit senses the medium. If the medium is
idle, it waits to see if the medium remains idle for a time equal to IFS. If so,
the station may transmit immediately.
2. If the medium is busy (either because the station initially finds the
medium busy or because the medium becomes busy during the IFS idle
time), the station defers transmission and continues to monitor the medium
until the current transmission is over.
3. Once the current transmission is over, the station delays another IFS. If
the medium remains idle for this period, then the station backs off a random
amount of time and again senses the medium. If the medium is still idle, the
station may transmit. During the backoff time, if the medium becomes busy,
the backoff timer is halted and resumes when the medium becomes idle.
4.If the transmission is unsuccessful, which is determined by the absence of
an acknowledgement, then it is assumed that a collision has occurred.
23. Virtual Carrier Sensing
To reduce ambiguities about which station is sending, 802.11 defines
channel sensing to consist of both physical sensing and virtual sensing.
Physical sensing simply checks the medium to see if there is a valid
signal. With virtual sensing, each station keeps a logical record of
when the channel is in use by tracking the NAV (Network Allocation
Vector).
Each frame carries a NAV field that says how long the sequence of
which this frame is part will take to complete. Stations that overhear
this frame know that the channel will be busy for the period indicated
by the NAV, regardless of whether they can sense a physical signal.
For example, the NAV of a data frame includes the time needed to
send an acknowledgement.
All stations that hear the data frame will defer during the
acknowledgement period, whether or not they can hear the
acknowledgement.
24. Virtual Channel Sensing in CSMA/CA
The use of virtual channel sensing using CSMA/CA.
C (in range of A) receives the RTS and based on
information in RTS creates a virtual channel busy
NAV(Network Allocation Vector).
D (in range of B) receives the CTS and creates a shorter
NAV.
25. RTS-CTS-DATA-ACK
DIFS: Distributed IFS
RTS: Request To Send
SIFS: Short IFS
CTS: Clear To Send
ACK: Acknowledgement
NAV: Network Allocation Vector
DCF: Distributed Coordination Function
26. Power Saving in WLAN’s
Battery Life is always an issue with mobile wireless devices. Care has to be
taken so that the clients don’t waste power when they have neither
information to send nor receive.
The basic mechanism is Beacon Frame. These are the periodic broadcasts
by the AP and advertise the presence of AP to the clients and carry system
parameters such as identity of AP, time, security settings etc
Clients can set a power-management bit in frames that they send to the
AP to tell it that they are entering power-save mode. In this mode, the
client can doze and the AP will buffer traffic intended for it. To check for
incoming traffic, the client wakes up for every beacon, and checks a traffic
map that is sent as part of the beacon.
Another power-saving mechanism, called APSD (Automatic Power Save
Delivery), was also added to 802.11 in 2005. With this new mechanism,
the AP buffers frames and sends them to a client just after the client
sends frames to the AP.
27. Fragmentation in 802.11
High wireless error rates long packets have
less probability of being successfully
transmitted.
Solution: MAC layer fragmentation with stop-
and-wait protocol on the fragments.
28. DCF Interframe Spacing in 802.11
The preceding scheme is refined for DCF to provide priority-based access
by the simple expedient of using three values for IFS:
• SIFS (short IFS): The shortest IFS, used for all immediate response
actions, as explained in the following discussion
• PIFS (point coordination function IFS): A midlength IFS, used by the
centralized controller in the PCF scheme when issuing polls
• DIFS (distributed coordination function IFS): The longest IFS, used as a
minimum delay for asynchronous frames contending for access
31. Protocol Version: zero for 802.11 standard
Type= frame type: data, management, control
Subtype = frame sub-type:
ToDS: When bit is set indicate that destination frame is for
DS
FromDS:When bit is set indicate frame coming from DS
Retry: Set in case of retransmission frame
More fragments: Set when frame is followed by other
fragment
Power Management: bit set when station go Power Save mode
(PS)
More Data: When set means that AP have more buffered data
for a station in Power Save mode
WEP: When set indicate that in the Frame Body field there are
data need to processed by WEP algorithm.
Order: When set indicate restrictions for transmission
Frame Control
35. Duration/Connection ID: If used as a duration field, indicates the time
(in microseconds) the channel will be allocated for successful
transmission of a MAC frame. In some control frames, this field contains
an association, or connection, identifier.
Addresses: The number and meaning of the 48-bit address fields depend
on context. The transmitter address and receiver address are the MAC
addresses of stations joined to the BSS that are transmitting and receiving
frames over the wireless LAN. The service set ID (SSID) identifies the
wireless LAN over which a frame is transmitted.
Sequence Control: Contains a 4-bit fragment number subfield, used for
fragmentation and reassembly, and a 12-bit sequence number used to
number frames sent between a given transmitter and receiver.
• Frame Body: Contains an MSDU or a fragment of an MSDU. The
MSDU is a LLC protocol data unit or MAC control information.
• Frame Check Sequence: A 32-bit cyclic redundancy check.
36. Distribution service (DS)
Used to exchange MAC frames from
station in one BSS to station in another
BSS
Integration service
Transfer of data between station on
IEEE 802.11 LAN and station on
integrated IEEE 802.x LAN
IEEE 802.11 Services:
Distribution of Messages
37. 802.11 Services
Association
Reassociation/Disassociation
Authentication – WPA2/WEP
Distribution
Integration
Data Delivery
Privacy – WPA2/AES
QOS Traffic Scheduling
Transmit Power Control
Dynamic Frequency Selection
38. Association
Establishes initial association between
station and AP
Re-association
Enables transfer of association from one
AP to another, allowing station to move
from one BSS to another
Disassociation
Association termination notice from
station or AP
Association Related Services
40. Authentication
Establishes identity of stations to each
other
De-authentication
Invoked when existing authentication is
terminated
Privacy
Prevents message contents from being
read by unintended recipient
Access and Privacy Services
41. IEEE 802.11 Medium
Access Control
MAC layer covers three functional
areas:
Reliable data delivery
Access control
Security
42. Reliable Data Delivery
Loss of frames due to noise, interference,
and propagation effects
Frame exchange protocol
Source station transmits data
Destination responds with acknowledgment (ACK)
If source doesn’t receive ACK, it retransmits
frame
Four frame exchange for enhanced reliability
Source issues request to send (RTS)
Destination responds with clear to send (CTS)
Source transmits data
Destination responds with ACK
43. Distributed Coordination Function (DCF)
Distributed access protocol
Contention-Based
Makes use of CSMA/CA rather than CSMA/CD
Suited for ad hoc network and ordinary
asynchronous traffic
Point Coordination Function (PCF)
Alternative access method on top of DCF
Centralized access protocol
Contention-Free
Works like polling
Suited for time bound services like voice or
multimedia
Access Control
44. Interframe Space (IFS)
Defined length of time for control
SIFS - Short Inter Frame Spacing
Used for immediate response actions e.g ACK, CTS
PIFS - Point Inter Frame Spacing
Used by centralized controller in PCF scheme
DIFS - Distributed Inter Frame Spacing
Used for all ordinary asynchronous traffic
DIFS (MAX) > PIFS > SIFS (MIN)
45. MAC Layer Frames
Data Frames
Control Frames
RTS,CTS,ACK and PS-POLL
Management Frames
Authentication and De-Authentication
Association, Re-Association, and
Disassociation
Beacon and Probe frames
46. IEEE 802.11 Security
Authentication provided by
open system or shared key
authentication
(Authentication is used
instead of wired media
physical connection)
Privacy provided by WEP
(Privacy is used to provide the
confidential aspects of closed
wired media)
An Integrity check is
performed using a 32-bit CRC
48. Is WLAN Secure ?
The Parking
Lot attack
Man in the
middle attack
Freely
available tools
like Air Snort,
WEP crack to
snoop into a
WLAN
49. Future of WLAN
WLANs move to maturity
Higher Speeds
Improved Security
Seamless end-to-end protocols
Better Error control
Long distances
New vendors
Better interoperability
Global networking
Anywhere, anytime,any-form connectivity…