2. may find Table 1 on page 36 of the standard particularly useful
when looking through the
wireless trace.
In all of the Wireshark labs thus far, we’ve captured frames on a
wired Ethernet
connection. Here, since 802.11 is a wireless link-layer protocol,
we’ll be capturing frames
“in the air.” Unfortunately, many device drivers for wireless
802.11 NICs don’t provide
the hooks to capture/copy received 802.11 frames for use in
Wireshark (see Figure 1 in
Lab 1 for an overview of packet capture). Thus, in this lab,
we’ll provide a trace of
captured 802.11 frames for you to analyze and assume in the
questions below that you are
using this trace. If you’re able to capture 802.11 frames using
your version of Wireshark,
you’re welcome to do so. Additionally, if you’re really into
frame capture, you can buy a
small USB device, AirPcap, http://www.cacetech.com, that
captures 802.11 frames and
provides integrated support for Wireshark.
1. Getting Started
Download the zip file http://gaia.cs.umass.edu/wireshark-
labs/wireshark-traces.zip and
extract the file Wireshark_802_11.pcap. This trace was
collected using AirPcap and
Wireshark running on a computer in the home network of one of
the authors, consisting
1 References to figures and sections are for the 7th edition of
our text, Computer Networks, A Top-down
3. Approach, 7th ed., J.F. Kurose and K.W. Ross, Addison-
Wesley/Pearson, 2016.
of a Linksys 802.11g combined access point/router, with two
wired PCs and one wireless
host PC attached to the access point/router. The author is
fortunate to have other access
points in neighboring houses available as well. In this trace
file, we’ll see frames
captured on channel 6. Since the host and AP that we are
interested in are not the only
devices using channel 6, we’ll see a lot of frames that we’re not
interested in for this lab,
such as beacon frames advertised by a neighbor’s AP also
operating on channel 6. The
wireless host activities taken in the trace file are:
• The host is already associated with the 30 Munroe St AP when
the trace begins.
• At t = 24.82, the host makes an HTTP request to
http://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address
of
gaia.cs.umass.edu is 128.119.245.12.
• At t=32.82, the host makes an HTTP request to
http://www.cs.umass.edu, whose
IP address is 128.119.240.19.
• At t = 49.58, the host disconnects from the 30 Munroe St AP
and attempts to
connect to the linksys_ses_24086. This is not an open access
point, and so the
host is eventually unable to connect to this AP.
4. • At t=63.0 the host gives up trying to associate with the
linksys_ses_24086 AP,
and associates again with the 30 Munroe St access point.
Once you have downloaded the trace, you can load it into
Wireshark and view the trace
using the File pull down menu, choosing Open, and then
selecting the
Wireshark_802_11.pcap trace file. The resulting display should
look just like Figure 1.
Figure 1: Wireshark window, after opening the
Wireshark_802_11.pcap file
2. Beacon Frames
Recall that beacon frames are used by an 802.11 AP to advertise
its existence. To answer
some of the questions below, you’ll want to look at the details
of the “IEEE 802.11”
frame and subfields in the middle Wireshark window.
Whenever possible, when
answering a question below, you should hand in a printout of
the packet(s) within the
trace that you used to answer the question asked. Annotate the
printout2 to explain your
5. answer. To print a packet, use File->Print, choose Selected
packet only, choose Packet
summary line, and select the minimum amount of packet detail
that you need to answer
the question.
1. What are the SSIDs of the two access points that are issuing
most of the beacon
frames in this trace?
2. What are the intervals of time between the transmissions of
the beacon frames the
linksys_ses_24086 access point? From the 30 Munroe St. access
point? (Hint: this
interval of time is contained in the beacon frame itself).
3. What (in hexadecimal notation) is the source MAC address
on the beacon frame
from 30 Munroe St? Recall from Figure 7.13 in the text that the
source,
destination, and BSS are three addresses used in an 802.11
frame. For a detailed
discussion of the 802.11 frame structure, see section 7 in the
IEEE 802.11
standards document (cited above).
4. What (in hexadecimal notation) is the destination MAC
address on the beacon
frame from 30 Munroe St??
5. What (in hexadecimal notation) is the MAC BSS id on the
beacon frame from 30
Munroe St?
6. The beacon frames from the 30 Munroe St access point
6. advertise that the access
point can support four data rates and eight additional “extended
supported rates.”
What are these rates?
3. Data Transfer
Since the trace starts with the host already associated with the
AP, let first look at data
transfer over an 802.11 association before looking at AP
association/disassociation.
Recall that in this trace, at t = 24.82, the host makes an HTTP
request to
http://gaia.cs.umass.edu/wireshark-labs/alice.txt. The IP address
of gaia.cs.umass.edu is
128.119.245.12. Then, at t=32.82, the host makes an HTTP
request to
http://www.cs.umass.edu.
2 What do we mean by “annotate”? If you hand in a paper
copy, please highlight where in the printout
you’ve found the answer and add some text (preferably with a
colored pen) noting what you found in what
you ‘ve highlight. If you hand in an electronic copy, it would
be great if you could also highlight and
annotate.
7. Find the 802.11 frame containing the SYN TCP segment for
this first TCP session
(that downloads alice.txt). What are three MAC address fields
7. in the 802.11
frame? Which MAC address in this frame corresponds to the
wireless host (give
the hexadecimal representation of the MAC address for the
host)? To the access
point? To the first-hop router? What is the IP address of the
wireless host
sending this TCP segment? What is the destination IP address?
Does this
destination IP address correspond to the host, access point,
first-hop router, or
some other network-attached device? Explain.
8. Find the 802.11 frame containing the SYNACK segment for
this TCP session.
What are three MAC address fields in the 802.11 frame? Which
MAC address in
this frame corresponds to the host? To the access point? To the
first-hop router?
Does the sender MAC address in the frame correspond to the IP
address of the
device that sent the TCP segment encapsulated within this
datagram? (Hint:
review Figure 6.19 in the text if you are unsure of how to
answer this question, or
the corresponding part of the previous question. It’s
particularly important that
you understand this).
3. Association/Disassociation
Recall from Section 7.3.1 in the text that a host must first
associate with an access point
before sending data. Association in 802.11 is performed using
8. the ASSOCIATE
REQUEST frame (sent from host to AP, with a frame type 0 and
subtype 0, see Section
7.3.3 in the text) and the ASSOCIATE RESPONSE frame (sent
by the AP to a host with
a frame type 0 and subtype of 1, in response to a received
ASSOCIATE REQUEST).
For a detailed explanation of each field in the 802.11 frame, see
page 34 (Section 7) of
the 802.11 spec at http://gaia.cs.umass.edu/wireshark-
labs/802.11-1999.pdf.
9. What two actions are taken (i.e., frames are sent) by the host
in the trace just after
t=49, to end the association with the 30 Munroe St AP that was
initially in place
when trace collection began? (Hint: one is an IP-layer action,
and one is an
802.11-layer action). Looking at the 802.11 specification, is
there another frame
that you might have expected to see, but don’t see here?
10. Examine the trace file and look for AUTHENICATION
frames sent from the host
to an AP and vice versa. How many AUTHENTICATION
messages are sent
from the wireless host to the linksys_ses_24086 AP (which has
a MAC address of
Cisco_Li_f5:ba:bb) starting at around t=49? .
11. Does the host want the authentication to require a key or be
open?
12. Do you see a reply AUTHENTICATION from the
linksys_ses_24086 AP in the
9. trace?
13. Now let’s consider what happens as the host gives up trying
to associate with the
linksys_ses_24086 AP and now tries to associate with the 30
Munroe St AP. Look
for AUTHENICATION frames sent from the host to and AP and
vice versa. At
what times are there an AUTHENTICATION frame from the
host to the 30
Munroe St. AP, and when is there a reply AUTHENTICATION
sent from that AP
to the host in reply? (Note that you can use the filter expression
“wlan.fc.subtype
== 11and wlan.fc.type == 0 and wlan.addr ==
IntelCor_d1:b6:4f” to display only
the AUTHENTICATION frames in this trace for this wireless
host.)
14. An ASSOCIATE REQUEST from host to AP, and a
corresponding ASSOCIATE
RESPONSE frame from AP to host are used for the host to
associated with an AP.
At what time is there an ASSOCIATE REQUEST from host to
the 30 Munroe St
AP? When is the corresponding ASSOCIATE REPLY sent?
(Note that you can
use the filter expression “wlan.fc.subtype < 2 and wlan.fc.type
== 0 and
wlan.addr == IntelCor_d1:b6:4f” to display only the
ASSOCIATE REQUEST
and ASSOCIATE RESPONSE frames for this trace.)
12. 11g legacy devices in 11n BSS. He
wants to find out if 11n users will see any degradation in the
network performance and the extent of
degradation if any.
Objective
Determine impact of legacy 11g nodes on an 11n WLAN
network.
Methodology
1. Create an 802.11n-based wireless LAN network using the
Wireless Deployment Wizard.
2. Configure traffic on the stations.
3. Introduce legacy nodes in the network and determine if there
is degradation in throughput.
Instructions
Open Project
1. Start Riverbed Modeler Academic Edition 17.5, if it is not
already open.
2. Select File/Open.
3. Select 1504_Lab1 and click Open.
a. The project will open with the scenario named all_11n.
4. Maximize the project by clicking on the Maximize button on
19. model for the Access Points and the
Mobile Nodes. For the purposes of our lab, we will leave the
“Mobile Node” node model to the
default value.
20. Select wlan_eth_bridge_adv node model for the access point
nder Access
Point and click on Edit.
OK.
21. Users are given the option of choosing the number of the
mobile nodes per cell. Set the Mobile
Node Count (per-cell) to 8.
22. The wireless wizard provides the ability to connect the
access points using a backbone network.
For this lab, we do not require this functionality, so uncheck the
Connect all Access Points (via
serial interfaces) using a backbone network checkbox
23. Make sure that the stage looks as below:
CONFIDENTIAL – RESTRICTED ACCESS: This information
may not be disclosed, copied, or transmitted in any format
23. configured to 0. Note that the
Mobile_1_3 has the BSS Identifier configured to 0 as well.
Functionality it set to Enabled.
Physical Characteristics is set to
HT PHY 2.4GHz (802.11n) as per our specification in the
wireless wizard. This attribute has
been set to the same value on all nodes in the network
Data Rate is set to 26 Mbps (base)
/ 240 Mbps (max) as per our specification in the wireless
wizard. This attribute has been set to
the same value on all nodes in the network
29. Click Cancel to close the two attribute dialog boxes.
Configuring High Throughput Parameters (802.11n
configuration):
The actual physical data rate used for data frame transmissions
of the STAs using 802.11n physical
layer depends on the configurations of Wireless LAN/Wireless
LAN Parameters/ High
Throughput Parameters attribute.
25. (400ns)
i. Configuring short guard interval results in a higher physical
data rate
rate at 57.8 Mbps as per Table
20-30 in IEEE 802.11n-2009
nabled,
thereby the wireless nodes will
be able to use a shorter physical layer header HT –Greenfield
format which will increase
the wireless LAN throughput.
31. Configure High Throughput Parameters on the
Access_Point_1 such that the number of spatial
streams is 2 and Greenfield operation is enabled.
Throughput Parameters
attribute.
mber of Spatial Streams to 2
29. The traffic generator is basically an ON-OFF traffic
generator. The Traffic Generation
Parameters were set using the Model Assistant file. The time at
which the node will start
sending traffic (Start Time) is set at 1 second. The ON State
Time is configured to be 5 seconds
and the OFF State Time is set to 0 seconds.
40. Click on the Value of Packet Generation Arguments.
exponential with a mean of 0.0005 and
the packet size is set at 500 bytes.
network can be computed as follows:
Load = ((Mean ON Time) / (Mean ON Time + Mean OFF Time))
* (Packet size in bits) *
(Number of nodes Generating traffic) / (Mean Inter-arrival
Time)
This implies that the Load = (5/5) * (500 * 8) * 8 / (0.0005)
=64.0 Mbps
The load is configured in such a way that the WLAN queues are
never empty.
Mobile_1_8. A simple way to configure this
32. 1504 Planning Wireless LAN Network Deployments
47. This is the exactly the same scenario as before but a
legacy_11g is introduced into the BSS. The
legacy node is configured with Extended Rate PHY (802.11g)
physical characteristics and data
rate set to 18 Mbps.
Run simulation
48. Click on the Configure/Run Discrete Event Simulation
(DES) button .
49. Verify that the Simulation Duration is set to 30 seconds and
then click the Run button.
50. When the simulation completes click on the Close button.
View Results
51. Click on the Hide/Show Graph Panels icon to open up Saved
Template.
CONFIDENTIAL – RESTRICTED ACCESS: This information
may not be disclosed, copied, or transmitted in any format
34. Page 20
1504 Planning Wireless LAN Network Deployments
Results Analysis
degradation in the presence of legacy
802.11g but to his astonishment he finds the opposite in WLAN
Throughput statistics.
(bits/sec) is almost the same in both
scenarios the loss of packets due contention conditions is the
same across both scenarios.
on-empty buffers, WLAN
transmissions experience a large
number of collisions.
packets are sent at a much faster
rate which is inferred from lesser Data Dropped (Buffer
Overflow) (bits/sec) and lesser
Media Access Delay (sec).
settings which has Aggregated
MSDU enabled for Interactive Voice (6) traffic category.
Aggregated MSDU (A-MSDU) is a
huge frame packed with multiple MSDUs. The default maximum
36. EXTRA CREDIT:
Can you suggest the network administrator another way to
improve throughput without having
legacy 11g nodes in the BSS and using CTS-to-self protection?
Answer: Set RTS Threshold such that huge frames are protected
by RTS/CTS frame exchange.
When transmitting large packets it is always recommended to
precede it with an RTS/CTS frame
exchange to improve the overall network throughput.
Conclusion
It is general notion that legacy STAs in the BSS will be
detrimental to network performance. Here
we see a situation where it actually improves the 11n
throughput when CTS-to-self protection is
enabled. You can take a look at the WLAN example network
scenarios 11b_11g_coexistenece and
11n_11g_11b_roaming, which study the impact of legacy nodes
in other situations. Simulations of
WLANs using Modeler reveal such interesting situations and
help us plan our network better.
38. together with HTTP application in an 11n
infrastructure Wireless LAN BSS operating at 7.2 Mbps
Improve the performance of the network further by adjusting
802.11e parameters based on
application load and topology conditions in the network.
Methodology
Create the baseline infrastructure BSS operating at 7.2 Mbps
with WLAN workstations running
voice and HTTP application, and measure the performance
observed at application layer with default
11e settings.
In the second scenario, adjust the related EDCA parameters
based on network and traffic conditions
and change the acknowledgement policies for the traffic
categories corresponding to application
traffic, and then compare the performance observed at the
application layer against the performance
measured with default parameters.
Observe baseline network running 802.11n
Open the scenario
1. Start Riverbed Modeler Academic Edition 17.5, if it is not
already started.
40. b. All voice source and destination nodes belong to the same
BSS and hence all voice traffic
has to flow through AP.
c. The voice application is configured to generate G.711
encoded voice traffic at 64kbps.
d. There are 4 workstations running HTTP web browsing
application (the stations whose
names start with prefix “voice_http” are running both voice and
HTTP browsing
applications).
e. HTTP clients connect their server node “server” through the
access point.
Wireless LAN workstation settings
1. All the nodes are configured with HT PHY 2.4GHz (802.11n)
with data rate “6.5 Mbps (base) /
60 Mbps (max)”.
a. Number of Spatial Streams is set to 1, 40MHz Operation
Parameters is set to Disabled
and Guard interval is set to Short (400ns). Therefore the
physical data rate that will be used
is 7.2Mbps.
CONFIDENTIAL – RESTRICTED ACCESS: This information
may not be disclosed, copied, or transmitted in any format
without OPNET’s prior written consent.
45. retransmissions indicating tough
contention conditions and possibly a “too-small” contention
window used by contending
stations.
voice application has a better
throughput than the HTTP but still has some losses and longer
delays while secondary
application, HTTP, is still not networkable.
mber of WLAN layer retransmissions implies the
main bottleneck at layer-2 needs to
be tackled for further improvement.
beneficial and has potential to
address the requirements but realizes that he would have to fine
tune parameters to satisfy
performance constraints before deployment.
Performance tuning for 11e network
protocol behavior related to the attribute
configurations we will perform in this part of the lab.
Adjust contention window for Voice access category
47. product names are trademarks of OPNET.
All other trademarks are the property of their respective owners.
Page 28
1504 Planning Wireless LAN Network Deployments
b. Since EDCA parameters used by the WLAN nodes in the BSS
are advertised by the access
point (because EDCA Parameter Set Distribution is “Enabled”)
this change is sufficient to
make all the WLAN workstations use the new CWmax value for
their Voice access categories.
c. Do not close the window. Continue reading.
Switch to “No Acknowledgement” policy for voice traffic
To help with the reduction of end-to-end delays for voice traffic
and to improve the WLAN layer
performance for both applications by lowering its overhead, we
will turn off layer-2
acknowledgements for Voice Access Category traffic.
After this configuration change, WLAN protocol will start
performing RTS/CTS frame exchange
before the first frame of Voice AC TXOPs (transmission
opportunities) in order to provide
protection for the unacknowledged voice traffic at layer-2 by
49. c. Since priority (ToS) of voice application traffic is set to “6”
in application configuration, the
voice traffic is mapped to TID “6 (Interactive Voice)” at WLAN
layer.
d. Click on the OK buttons twice to complete AP’s
configuration.
6. Make the same configuration for all WLAN workstations.
a. Right click on one of the workstations and choose Select
Similar Nodes.
b. Right click on one of the selected nodes and choose Edit
Attributes.
c. Check the Apply changes to selected objects box.
d. Expand the attribute Wireless LAN/Wireless LAN
Parameters/HCF Parameters.
e. Edit the attribute Traffic Category Parameters by left clicking
on its value and selecting
Edit….
f. Set Service Class for TID (Traffic Identifier) “6 (Interactive
Voice)” to “No
Acknowledgement”
g. Click on the OK buttons twice to complete the attribute
configuration.