SlideShare a Scribd company logo
1 of 49
Wireless LAN
Mukesh Chinta
Asst Professor, CSE
What is WLAN???
 A wireless local area network(LAN) is a
flexible data communications system
implemented as an extension to, or as an
alternative for, a wired LAN.
 Using radio frequency (RF) technology, wireless
LANs transmit and receive data over the air,
minimizing the need for wired connections.
 Thus, combining data connectivity with user mobility.
Advantages of WLAN
 Productivity, convenience, and cost
advantages
 Installation speed and simplicity.
 Installation flexibility.
 Reduced cost-of-ownership.
 Mobility.
 Scalability.
Disadvantages of WLAN
 Cost
 Wireless network cards cost 4 times more than wired network
cards.
 The access points are more expensive than hubs and wires.
 Signal Bleed Over
 Access points pick up the signals of adjacent access points or
overpower their signal.
 Environmental Conditions
 Susceptible to weather and solar activity.
 Constrained by buildings, trees, terrain.
 Less Capacity
 Slower bandwidth.
 Limit to how much data a carrier wave can transmit without
lost packets impacting performance.
 Medical Professionals
 Corporate
 Education
 Temporary Situations
 Airlines
 Security Staff
 Emergency Centers
Wireless LAN Applications
 In response to lacking standards, IEEE developed the
first internationally recognized wireless LAN
standard – IEEE 802.11
 IEEE published 802.11 in 1997, after seven years of
work
 Most prominent specification for WLANs
 Scope of IEEE 802.11 is limited to Physical and Data
Link Layers.
IEEE 802.11 Wireless LAN
Standard
IEEE 802 LAN Standards
Family
IEEE 802.3
Carrier
Sense
IEEE 802.4
Token
Bus
IEEE 802.5
Token
Ring
IEEE 802.11
Wireless
IEEE 802.2
Logical Link Control (LLC)
PHY
OSI Layer 1
(Physical)
Mac
OSI Layer 2
(Data Link)
802.11 Infrastructure
 802.11 networks can be used in two modes: Infrastructure
and Ad hoc Mode
 Infrastructure mode requires a central access point that all devices
connect to.
 Ad-hoc mode is also known as “peer-to-peer” mode. Ad-hoc networks
don't require a centralized access point. Instead, devices on the wireless
network connect directly to each other
Access point (AP): A station that provides access to the
DS.
Basic service set (BSS): A set of stations controlled by a
single AP.
Distribution system (DS): A system used to interconnect
a set of BSSs to create an ESS.
DS is implementation-independent. It can be a wired 802.3
Ethernet LAN, 802.4 token bus, 802.5 token ring or another
802.11 medium.
Extended service set (ESS):Two or more BSS
interconnected by DS
Portal: Logical entity where 802.11 network integrates
with a non 802.11 network.
IEEE 802.11 Terminology
WLAN Topology
Ad-Hoc Network
WLAN Topology
Infrastructure
 In each station computer (STA for short)
connects to an access point via a wireless link. The set-up formed by the
access point and the stations located within its coverage area are called the
or for short. They form one cell.
 Each BSS is identified by a a 6-byte (48-bite) identifier. In
infrastructure mode, the BSSID corresponds to the access point's MAC
address.
 Several access points can be linked together (or more precisely several
BSS's) using a connection called a for short)
in order to form an or . The distribution
system can also be a wired network, a cable between two access points or
even a wireless network.
 An ESS is identified with an
a 32-character identifier (in ASCII format) which acts as its
name on the network. The ESSID, often shortened to , shows the
network's name, and in a way acts a first-level security measure, since it is
necessary for a station to know the SSID in order to connect to the
extended network.
802.11 Protocol Stack
802.11 MAC Sublayer Protocol
MAC layer
covers three
functional
areas:
reliable
data
delivery
access
control
security
Medium Access Control
802.11 MAC sublayer protocol
 In 802.11 wireless LANs, “seizing the channel” does
not exist as in 802.3 wired Ethernet.
 Two additional problems:
 Hidden Terminal Problem
 Exposed Station Problem
 To deal with these two problems 802.11 supports two
modes of operation:
 DCF (Distributed Coordination Function)
 PCF (Point Coordination Function).
 All implementations must support DCF, but PCF
is optional.
DCF
 DCF sub-layer uses CSMA/CA
 if station has frame to send it listens to medium
 if medium idle, station may transmit
 else waits until current transmission completes
 No collision detection since on wireless network, so use
collision avoidance (backoff and RTS/CTS)
 DCF includes delays that act as a priority scheme
 DIFS: DCF inter-frame space
 SIFS: short inter-frame space (SIFS < DIFS)
DCF
 1. A station with a frame to transmit senses the medium. If the medium is
idle, it waits to see if the medium remains idle for a time equal to IFS. If so,
the station may transmit immediately.
 2. If the medium is busy (either because the station initially finds the
medium busy or because the medium becomes busy during the IFS idle
time), the station defers transmission and continues to monitor the medium
until the current transmission is over.
 3. Once the current transmission is over, the station delays another IFS. If
the medium remains idle for this period, then the station backs off a random
amount of time and again senses the medium. If the medium is still idle, the
station may transmit. During the backoff time, if the medium becomes busy,
the backoff timer is halted and resumes when the medium becomes idle.
 4.If the transmission is unsuccessful, which is determined by the absence of
an acknowledgement, then it is assumed that a collision has occurred.
Simple CSMA in action
Virtual Carrier Sensing
 To reduce ambiguities about which station is sending, 802.11 defines
channel sensing to consist of both physical sensing and virtual sensing.
 Physical sensing simply checks the medium to see if there is a valid
signal. With virtual sensing, each station keeps a logical record of
when the channel is in use by tracking the NAV (Network Allocation
Vector).
 Each frame carries a NAV field that says how long the sequence of
which this frame is part will take to complete. Stations that overhear
this frame know that the channel will be busy for the period indicated
by the NAV, regardless of whether they can sense a physical signal.
 For example, the NAV of a data frame includes the time needed to
send an acknowledgement.
 All stations that hear the data frame will defer during the
acknowledgement period, whether or not they can hear the
acknowledgement.
Virtual Channel Sensing in CSMA/CA
The use of virtual channel sensing using CSMA/CA.
 C (in range of A) receives the RTS and based on
information in RTS creates a virtual channel busy
NAV(Network Allocation Vector).
 D (in range of B) receives the CTS and creates a shorter
NAV.
RTS-CTS-DATA-ACK
DIFS: Distributed IFS
RTS: Request To Send
SIFS: Short IFS
CTS: Clear To Send
ACK: Acknowledgement
NAV: Network Allocation Vector
DCF: Distributed Coordination Function
Power Saving in WLAN’s
 Battery Life is always an issue with mobile wireless devices. Care has to be
taken so that the clients don’t waste power when they have neither
information to send nor receive.
 The basic mechanism is Beacon Frame. These are the periodic broadcasts
by the AP and advertise the presence of AP to the clients and carry system
parameters such as identity of AP, time, security settings etc
 Clients can set a power-management bit in frames that they send to the
AP to tell it that they are entering power-save mode. In this mode, the
client can doze and the AP will buffer traffic intended for it. To check for
incoming traffic, the client wakes up for every beacon, and checks a traffic
map that is sent as part of the beacon.
 Another power-saving mechanism, called APSD (Automatic Power Save
Delivery), was also added to 802.11 in 2005. With this new mechanism,
the AP buffers frames and sends them to a client just after the client
sends frames to the AP.
Fragmentation in 802.11
 High wireless error rates  long packets have
less probability of being successfully
transmitted.
 Solution: MAC layer fragmentation with stop-
and-wait protocol on the fragments.
DCF Interframe Spacing in 802.11
The preceding scheme is refined for DCF to provide priority-based access
by the simple expedient of using three values for IFS:
• SIFS (short IFS): The shortest IFS, used for all immediate response
actions, as explained in the following discussion
• PIFS (point coordination function IFS): A midlength IFS, used by the
centralized controller in the PCF scheme when issuing polls
• DIFS (distributed coordination function IFS): The longest IFS, used as a
minimum delay for asynchronous frames contending for access
Frame Format of 802.11 Frame
 Protocol Version: zero for 802.11 standard
 Type= frame type: data, management, control
 Subtype = frame sub-type:
 ToDS: When bit is set indicate that destination frame is for
DS
 FromDS:When bit is set indicate frame coming from DS
 Retry: Set in case of retransmission frame
 More fragments: Set when frame is followed by other
fragment
 Power Management: bit set when station go Power Save mode
(PS)
 More Data: When set means that AP have more buffered data
for a station in Power Save mode
 WEP: When set indicate that in the Frame Body field there are
data need to processed by WEP algorithm.
 Order: When set indicate restrictions for transmission
Frame Control
Frame Format
RTS Frame
CTS Frame
ACK Frame
 Duration/Connection ID: If used as a duration field, indicates the time
(in microseconds) the channel will be allocated for successful
transmission of a MAC frame. In some control frames, this field contains
an association, or connection, identifier.
 Addresses: The number and meaning of the 48-bit address fields depend
on context. The transmitter address and receiver address are the MAC
addresses of stations joined to the BSS that are transmitting and receiving
frames over the wireless LAN. The service set ID (SSID) identifies the
wireless LAN over which a frame is transmitted.
 Sequence Control: Contains a 4-bit fragment number subfield, used for
fragmentation and reassembly, and a 12-bit sequence number used to
number frames sent between a given transmitter and receiver.
 • Frame Body: Contains an MSDU or a fragment of an MSDU. The
MSDU is a LLC protocol data unit or MAC control information.
 • Frame Check Sequence: A 32-bit cyclic redundancy check.
Distribution service (DS)
Used to exchange MAC frames from
station in one BSS to station in another
BSS
Integration service
Transfer of data between station on
IEEE 802.11 LAN and station on
integrated IEEE 802.x LAN
IEEE 802.11 Services:
Distribution of Messages
802.11 Services
 Association
 Reassociation/Disassociation
 Authentication – WPA2/WEP
 Distribution
 Integration
 Data Delivery
 Privacy – WPA2/AES
 QOS Traffic Scheduling
 Transmit Power Control
 Dynamic Frequency Selection
Association
Establishes initial association between
station and AP
Re-association
Enables transfer of association from one
AP to another, allowing station to move
from one BSS to another
Disassociation
Association termination notice from
station or AP
Association Related Services
Re-Association
Authentication
Establishes identity of stations to each
other
De-authentication
Invoked when existing authentication is
terminated
Privacy
Prevents message contents from being
read by unintended recipient
Access and Privacy Services
IEEE 802.11 Medium
Access Control
 MAC layer covers three functional
areas:
Reliable data delivery
Access control
Security
Reliable Data Delivery
Loss of frames due to noise, interference,
and propagation effects
Frame exchange protocol
Source station transmits data
Destination responds with acknowledgment (ACK)
If source doesn’t receive ACK, it retransmits
frame
Four frame exchange for enhanced reliability
Source issues request to send (RTS)
Destination responds with clear to send (CTS)
Source transmits data
Destination responds with ACK
Distributed Coordination Function (DCF)
Distributed access protocol
Contention-Based
Makes use of CSMA/CA rather than CSMA/CD
Suited for ad hoc network and ordinary
asynchronous traffic
Point Coordination Function (PCF)
Alternative access method on top of DCF
Centralized access protocol
Contention-Free
Works like polling
Suited for time bound services like voice or
multimedia
Access Control
Interframe Space (IFS)
Defined length of time for control
SIFS - Short Inter Frame Spacing
Used for immediate response actions e.g ACK, CTS
PIFS - Point Inter Frame Spacing
Used by centralized controller in PCF scheme
DIFS - Distributed Inter Frame Spacing
Used for all ordinary asynchronous traffic
DIFS (MAX) > PIFS > SIFS (MIN)
MAC Layer Frames
Data Frames
Control Frames
RTS,CTS,ACK and PS-POLL
Management Frames
Authentication and De-Authentication
Association, Re-Association, and
Disassociation
Beacon and Probe frames
IEEE 802.11 Security
 Authentication provided by
open system or shared key
authentication
(Authentication is used
instead of wired media
physical connection)
 Privacy provided by WEP
(Privacy is used to provide the
confidential aspects of closed
wired media)
 An Integrity check is
performed using a 32-bit CRC
Authentication
Is WLAN Secure ?
 The Parking
Lot attack
 Man in the
middle attack
 Freely
available tools
like Air Snort,
WEP crack to
snoop into a
WLAN
Future of WLAN
WLANs move to maturity
Higher Speeds
Improved Security
Seamless end-to-end protocols
Better Error control
Long distances
New vendors
Better interoperability
Global networking
Anywhere, anytime,any-form connectivity…

More Related Content

What's hot (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Cellular network
Cellular networkCellular network
Cellular network
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Data link layer
Data link layer Data link layer
Data link layer
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Ethernet
EthernetEthernet
Ethernet
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 

Viewers also liked (20)

Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Redes wlan
Redes wlanRedes wlan
Redes wlan
 
Wifi wimax
Wifi wimaxWifi wimax
Wifi wimax
 
5 sharing-app
5 sharing-app5 sharing-app
5 sharing-app
 
FMA246_datasheet
FMA246_datasheetFMA246_datasheet
FMA246_datasheet
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Computer networks
Computer networksComputer networks
Computer networks
 
Wlan
WlanWlan
Wlan
 
WLAN (Wireless Local Area Network)
WLAN (Wireless Local Area Network)WLAN (Wireless Local Area Network)
WLAN (Wireless Local Area Network)
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
IEEE Presentation
IEEE PresentationIEEE Presentation
IEEE Presentation
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
 
Research project ppt
Research project pptResearch project ppt
Research project ppt
 
csma ca
 csma ca csma ca
csma ca
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Network ppt
Network pptNetwork ppt
Network ppt
 

Similar to WLAN

Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetoothDeepak John
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.pptHODElex
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11Rahul Hada
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 
3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.pptKp Sharma
 
3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.pptKp Sharma
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfarihantmobileselepun
 
802 tutorial
802 tutorial802 tutorial
802 tutorialtrimba
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Laniamtheone90
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Wlan 1 intro
Wlan 1 introWlan 1 intro
Wlan 1 introtrimba
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdfarkurkuri
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
The osi model layers
The osi model layersThe osi model layers
The osi model layersINFitunes
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 

Similar to WLAN (20)

Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt3. Wireless Local Area Networks WLAN.ppt
3. Wireless Local Area Networks WLAN.ppt
 
3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt3. Introduction Wireless Local Area Networks.ppt
3. Introduction Wireless Local Area Networks.ppt
 
Provide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdfProvide a full explanation to the below question.1. Summarize the .pdf
Provide a full explanation to the below question.1. Summarize the .pdf
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
802 tutorial
802 tutorial802 tutorial
802 tutorial
 
Frame relay
Frame relayFrame relay
Frame relay
 
C:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless LanC:\Fakepath\802 11b Wireless Lan
C:\Fakepath\802 11b Wireless Lan
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wlan 1 intro
Wlan 1 introWlan 1 intro
Wlan 1 intro
 
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
IEEE 802.11 general questions  Summarize and describe the basic funct.pdfIEEE 802.11 general questions  Summarize and describe the basic funct.pdf
IEEE 802.11 general questions Summarize and describe the basic funct.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 

More from Mukesh Chinta

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsMukesh Chinta
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationMukesh Chinta
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingMukesh Chinta
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsMukesh Chinta
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Mukesh Chinta
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Mukesh Chinta
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Mukesh Chinta
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1Mukesh Chinta
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Mukesh Chinta
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1Mukesh Chinta
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2Mukesh Chinta
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Mukesh Chinta
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Mukesh Chinta
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process ConceptsMukesh Chinta
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structuresMukesh Chinta
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 

More from Mukesh Chinta (20)

CCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security ConceptsCCNA-2 SRWE Mod-10 LAN Security Concepts
CCNA-2 SRWE Mod-10 LAN Security Concepts
 
CCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security ConfigurationCCNA-2 SRWE Mod-11 Switch Security Configuration
CCNA-2 SRWE Mod-11 Switch Security Configuration
 
CCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN ConceptsCCNA-2 SRWE Mod-12 WLAN Concepts
CCNA-2 SRWE Mod-12 WLAN Concepts
 
CCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN ConfigurationCCNA-2 SRWE Mod-13 WLAN Configuration
CCNA-2 SRWE Mod-13 WLAN Configuration
 
CCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP RoutingCCNA-2 SRWE Mod-15 Static IP Routing
CCNA-2 SRWE Mod-15 Static IP Routing
 
CCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing ConceptsCCNA-2 SRWE Mod-14 Routing Concepts
CCNA-2 SRWE Mod-14 Routing Concepts
 
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
Protecting the Organization - Cisco: Intro to Cybersecurity Chap-4
 
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
Protecting Your Data and Privacy- Cisco: Intro to Cybersecurity chap-3
 
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
Attacks, Concepts and Techniques - Cisco: Intro to Cybersecurity Chap-2
 
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
The need for Cybersecurity - Cisco Intro to Cybersec Chap-1
 
Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7Cisco Cybersecurity Essentials Chapter- 7
Cisco Cybersecurity Essentials Chapter- 7
 
Protocols and Reference models CCNAv7-1
Protocols and Reference models  CCNAv7-1Protocols and Reference models  CCNAv7-1
Protocols and Reference models CCNAv7-1
 
Basic Switch and End Device configuration CCNA7 Module 2
Basic Switch and End Device configuration   CCNA7 Module 2Basic Switch and End Device configuration   CCNA7 Module 2
Basic Switch and End Device configuration CCNA7 Module 2
 
Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1Introduction to networks CCNAv7 Module-1
Introduction to networks CCNAv7 Module-1
 
Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)Process scheduling (CPU Scheduling)
Process scheduling (CPU Scheduling)
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

WLAN

  • 2. What is WLAN???  A wireless local area network(LAN) is a flexible data communications system implemented as an extension to, or as an alternative for, a wired LAN.  Using radio frequency (RF) technology, wireless LANs transmit and receive data over the air, minimizing the need for wired connections.  Thus, combining data connectivity with user mobility.
  • 3. Advantages of WLAN  Productivity, convenience, and cost advantages  Installation speed and simplicity.  Installation flexibility.  Reduced cost-of-ownership.  Mobility.  Scalability.
  • 4. Disadvantages of WLAN  Cost  Wireless network cards cost 4 times more than wired network cards.  The access points are more expensive than hubs and wires.  Signal Bleed Over  Access points pick up the signals of adjacent access points or overpower their signal.  Environmental Conditions  Susceptible to weather and solar activity.  Constrained by buildings, trees, terrain.  Less Capacity  Slower bandwidth.  Limit to how much data a carrier wave can transmit without lost packets impacting performance.
  • 5.  Medical Professionals  Corporate  Education  Temporary Situations  Airlines  Security Staff  Emergency Centers Wireless LAN Applications
  • 6.
  • 7.  In response to lacking standards, IEEE developed the first internationally recognized wireless LAN standard – IEEE 802.11  IEEE published 802.11 in 1997, after seven years of work  Most prominent specification for WLANs  Scope of IEEE 802.11 is limited to Physical and Data Link Layers. IEEE 802.11 Wireless LAN Standard
  • 8. IEEE 802 LAN Standards Family IEEE 802.3 Carrier Sense IEEE 802.4 Token Bus IEEE 802.5 Token Ring IEEE 802.11 Wireless IEEE 802.2 Logical Link Control (LLC) PHY OSI Layer 1 (Physical) Mac OSI Layer 2 (Data Link)
  • 9.
  • 10. 802.11 Infrastructure  802.11 networks can be used in two modes: Infrastructure and Ad hoc Mode  Infrastructure mode requires a central access point that all devices connect to.  Ad-hoc mode is also known as “peer-to-peer” mode. Ad-hoc networks don't require a centralized access point. Instead, devices on the wireless network connect directly to each other
  • 11. Access point (AP): A station that provides access to the DS. Basic service set (BSS): A set of stations controlled by a single AP. Distribution system (DS): A system used to interconnect a set of BSSs to create an ESS. DS is implementation-independent. It can be a wired 802.3 Ethernet LAN, 802.4 token bus, 802.5 token ring or another 802.11 medium. Extended service set (ESS):Two or more BSS interconnected by DS Portal: Logical entity where 802.11 network integrates with a non 802.11 network. IEEE 802.11 Terminology
  • 14.  In each station computer (STA for short) connects to an access point via a wireless link. The set-up formed by the access point and the stations located within its coverage area are called the or for short. They form one cell.  Each BSS is identified by a a 6-byte (48-bite) identifier. In infrastructure mode, the BSSID corresponds to the access point's MAC address.  Several access points can be linked together (or more precisely several BSS's) using a connection called a for short) in order to form an or . The distribution system can also be a wired network, a cable between two access points or even a wireless network.  An ESS is identified with an a 32-character identifier (in ASCII format) which acts as its name on the network. The ESSID, often shortened to , shows the network's name, and in a way acts a first-level security measure, since it is necessary for a station to know the SSID in order to connect to the extended network.
  • 15.
  • 17. 802.11 MAC Sublayer Protocol MAC layer covers three functional areas: reliable data delivery access control security
  • 19. 802.11 MAC sublayer protocol  In 802.11 wireless LANs, “seizing the channel” does not exist as in 802.3 wired Ethernet.  Two additional problems:  Hidden Terminal Problem  Exposed Station Problem  To deal with these two problems 802.11 supports two modes of operation:  DCF (Distributed Coordination Function)  PCF (Point Coordination Function).  All implementations must support DCF, but PCF is optional.
  • 20. DCF  DCF sub-layer uses CSMA/CA  if station has frame to send it listens to medium  if medium idle, station may transmit  else waits until current transmission completes  No collision detection since on wireless network, so use collision avoidance (backoff and RTS/CTS)  DCF includes delays that act as a priority scheme  DIFS: DCF inter-frame space  SIFS: short inter-frame space (SIFS < DIFS)
  • 21. DCF  1. A station with a frame to transmit senses the medium. If the medium is idle, it waits to see if the medium remains idle for a time equal to IFS. If so, the station may transmit immediately.  2. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.  3. Once the current transmission is over, the station delays another IFS. If the medium remains idle for this period, then the station backs off a random amount of time and again senses the medium. If the medium is still idle, the station may transmit. During the backoff time, if the medium becomes busy, the backoff timer is halted and resumes when the medium becomes idle.  4.If the transmission is unsuccessful, which is determined by the absence of an acknowledgement, then it is assumed that a collision has occurred.
  • 22. Simple CSMA in action
  • 23. Virtual Carrier Sensing  To reduce ambiguities about which station is sending, 802.11 defines channel sensing to consist of both physical sensing and virtual sensing.  Physical sensing simply checks the medium to see if there is a valid signal. With virtual sensing, each station keeps a logical record of when the channel is in use by tracking the NAV (Network Allocation Vector).  Each frame carries a NAV field that says how long the sequence of which this frame is part will take to complete. Stations that overhear this frame know that the channel will be busy for the period indicated by the NAV, regardless of whether they can sense a physical signal.  For example, the NAV of a data frame includes the time needed to send an acknowledgement.  All stations that hear the data frame will defer during the acknowledgement period, whether or not they can hear the acknowledgement.
  • 24. Virtual Channel Sensing in CSMA/CA The use of virtual channel sensing using CSMA/CA.  C (in range of A) receives the RTS and based on information in RTS creates a virtual channel busy NAV(Network Allocation Vector).  D (in range of B) receives the CTS and creates a shorter NAV.
  • 25. RTS-CTS-DATA-ACK DIFS: Distributed IFS RTS: Request To Send SIFS: Short IFS CTS: Clear To Send ACK: Acknowledgement NAV: Network Allocation Vector DCF: Distributed Coordination Function
  • 26. Power Saving in WLAN’s  Battery Life is always an issue with mobile wireless devices. Care has to be taken so that the clients don’t waste power when they have neither information to send nor receive.  The basic mechanism is Beacon Frame. These are the periodic broadcasts by the AP and advertise the presence of AP to the clients and carry system parameters such as identity of AP, time, security settings etc  Clients can set a power-management bit in frames that they send to the AP to tell it that they are entering power-save mode. In this mode, the client can doze and the AP will buffer traffic intended for it. To check for incoming traffic, the client wakes up for every beacon, and checks a traffic map that is sent as part of the beacon.  Another power-saving mechanism, called APSD (Automatic Power Save Delivery), was also added to 802.11 in 2005. With this new mechanism, the AP buffers frames and sends them to a client just after the client sends frames to the AP.
  • 27. Fragmentation in 802.11  High wireless error rates  long packets have less probability of being successfully transmitted.  Solution: MAC layer fragmentation with stop- and-wait protocol on the fragments.
  • 28. DCF Interframe Spacing in 802.11 The preceding scheme is refined for DCF to provide priority-based access by the simple expedient of using three values for IFS: • SIFS (short IFS): The shortest IFS, used for all immediate response actions, as explained in the following discussion • PIFS (point coordination function IFS): A midlength IFS, used by the centralized controller in the PCF scheme when issuing polls • DIFS (distributed coordination function IFS): The longest IFS, used as a minimum delay for asynchronous frames contending for access
  • 29. Frame Format of 802.11 Frame
  • 30.
  • 31.  Protocol Version: zero for 802.11 standard  Type= frame type: data, management, control  Subtype = frame sub-type:  ToDS: When bit is set indicate that destination frame is for DS  FromDS:When bit is set indicate frame coming from DS  Retry: Set in case of retransmission frame  More fragments: Set when frame is followed by other fragment  Power Management: bit set when station go Power Save mode (PS)  More Data: When set means that AP have more buffered data for a station in Power Save mode  WEP: When set indicate that in the Frame Body field there are data need to processed by WEP algorithm.  Order: When set indicate restrictions for transmission Frame Control
  • 33.
  • 35.  Duration/Connection ID: If used as a duration field, indicates the time (in microseconds) the channel will be allocated for successful transmission of a MAC frame. In some control frames, this field contains an association, or connection, identifier.  Addresses: The number and meaning of the 48-bit address fields depend on context. The transmitter address and receiver address are the MAC addresses of stations joined to the BSS that are transmitting and receiving frames over the wireless LAN. The service set ID (SSID) identifies the wireless LAN over which a frame is transmitted.  Sequence Control: Contains a 4-bit fragment number subfield, used for fragmentation and reassembly, and a 12-bit sequence number used to number frames sent between a given transmitter and receiver.  • Frame Body: Contains an MSDU or a fragment of an MSDU. The MSDU is a LLC protocol data unit or MAC control information.  • Frame Check Sequence: A 32-bit cyclic redundancy check.
  • 36. Distribution service (DS) Used to exchange MAC frames from station in one BSS to station in another BSS Integration service Transfer of data between station on IEEE 802.11 LAN and station on integrated IEEE 802.x LAN IEEE 802.11 Services: Distribution of Messages
  • 37. 802.11 Services  Association  Reassociation/Disassociation  Authentication – WPA2/WEP  Distribution  Integration  Data Delivery  Privacy – WPA2/AES  QOS Traffic Scheduling  Transmit Power Control  Dynamic Frequency Selection
  • 38. Association Establishes initial association between station and AP Re-association Enables transfer of association from one AP to another, allowing station to move from one BSS to another Disassociation Association termination notice from station or AP Association Related Services
  • 40. Authentication Establishes identity of stations to each other De-authentication Invoked when existing authentication is terminated Privacy Prevents message contents from being read by unintended recipient Access and Privacy Services
  • 41. IEEE 802.11 Medium Access Control  MAC layer covers three functional areas: Reliable data delivery Access control Security
  • 42. Reliable Data Delivery Loss of frames due to noise, interference, and propagation effects Frame exchange protocol Source station transmits data Destination responds with acknowledgment (ACK) If source doesn’t receive ACK, it retransmits frame Four frame exchange for enhanced reliability Source issues request to send (RTS) Destination responds with clear to send (CTS) Source transmits data Destination responds with ACK
  • 43. Distributed Coordination Function (DCF) Distributed access protocol Contention-Based Makes use of CSMA/CA rather than CSMA/CD Suited for ad hoc network and ordinary asynchronous traffic Point Coordination Function (PCF) Alternative access method on top of DCF Centralized access protocol Contention-Free Works like polling Suited for time bound services like voice or multimedia Access Control
  • 44. Interframe Space (IFS) Defined length of time for control SIFS - Short Inter Frame Spacing Used for immediate response actions e.g ACK, CTS PIFS - Point Inter Frame Spacing Used by centralized controller in PCF scheme DIFS - Distributed Inter Frame Spacing Used for all ordinary asynchronous traffic DIFS (MAX) > PIFS > SIFS (MIN)
  • 45. MAC Layer Frames Data Frames Control Frames RTS,CTS,ACK and PS-POLL Management Frames Authentication and De-Authentication Association, Re-Association, and Disassociation Beacon and Probe frames
  • 46. IEEE 802.11 Security  Authentication provided by open system or shared key authentication (Authentication is used instead of wired media physical connection)  Privacy provided by WEP (Privacy is used to provide the confidential aspects of closed wired media)  An Integrity check is performed using a 32-bit CRC
  • 48. Is WLAN Secure ?  The Parking Lot attack  Man in the middle attack  Freely available tools like Air Snort, WEP crack to snoop into a WLAN
  • 49. Future of WLAN WLANs move to maturity Higher Speeds Improved Security Seamless end-to-end protocols Better Error control Long distances New vendors Better interoperability Global networking Anywhere, anytime,any-form connectivity…