SlideShare a Scribd company logo
802.11 Wireless LANs


       Abhishek Karnik,
        Dr. Ratan Guha

  University Of Central Florida
OVERVIEW


• Introduction
• 802.11 Basics
• 802.11e for QoS
• WEP
INTRODUCTION
• In 1997 the IEEE adopted IEEE Std. 802.11-1997

• Defines MAC and PHY layers for LAN and wireless connectivity.

• Facilitate ubiquitous communication and location independent
  computing

• 802.11b operates at 11Mbps in the 2.4 GHz ISM Band (‘99)

• 802.11a operates at 54Mbps in the 5 GHz Band (’99)

• 802.11g operates at 54Mbps in the 2.4 GHz Band (’02)

• Increased deployment and popularity lead to introduction of QoS

• 802.11e for QoS – Draft Supplement – Nov 2002
802.11 BASICS

• Wireless LAN Station
          The station (STA) is any device that contains the functionality of the 802.11
  protocol, that being MAC, PHY, and a connection to the wireless media. Typically the
  802.11 functions are implemented in the hardware and software of a network interface
  card (NIC).
 Ex : PC , Handheld , AP (Access Point)


• Basic Service Set (BSS)
        802.11 defines the Basic Service Set (BSS) as the basic building block of an
 802.11 wireless LAN. The BSS consists of a group of any number of stations.
IBSS (Independent Basic Service Set – Ad-hoc Mode)




                    STA                          STA


                   peer-peer connections




           STA
                                           STA
Infrastructure Basic Service Set


                                   Wired Backbone



                  AP
ESS (Extended Service Set)



                  Wired Backbone




        AP                         AP




     BSS1                          BSS2
Beacon                                                      TBTT

            PCF                                  DCF


                         Super Frame

   DCF    - Distributed Coordinated Function
                                (Contention Period - Ad-hoc Mode)

   PCF    - Point Coordinated Function
           (Contention Free Period – Infrastructure BSS)

   Beacon - Management Frame
           Synchronization of Local timers
           Delivers protocol related parameters
   TBTT   - Target Beacon Transition Time
Distributed Coordinated Function (DCF)



• Also known as the Contention Period
• STAs form peer-peer connections. No central authority
• First listen and then speak
• Uses CSMA/CA (Carrier Sense Multiple Access with
                     Collision Avoidance)
• ACK indicates successful delivery
• Each node has one output buffer
Inter-Frame Spacing :
DIFS -     34 µsec
PIFS -     25 µsec ( Used in PCF )
SIFS -     16 µsec
Slot Time - 9 µsec


             DIFS = SIFS + (2 * Slot Time)


SIFS required for turn around of Tx to Rx and vice versa
Data Transmission from Node A to B

                  CWA
                                                        DIFS

   ACK                         DATAA             ACKB

         DIFS                             SIFS




  • CW – Contention Window. Starts only after DIFS.
  • Random number ‘r’ picked form range ( 0-CW )
  • CWmin minimum value of CW
  • CWmax maximum value the CW can grow to after collisions
  • ‘r’ can be decremented only in CW
  • CW doubles after every collision
CWA
                                                       DIFS

 ACK                         DATAA              ACKB

        DIFS                             SIFS




• What if some node C wanted to send data while A was transmitting
  data to B ?
• What about during SIFS ?
• What if after ACK, more than one say B,C,D,E nodes are waiting
  to transmit data ?
Example :
rA = 4 and rC = 6

                                                       DIFS

ACK                         DATAA               ACKB             DATAC

      DIFS                               SIFS




• What if rA and rC had both been picked as 4 ?
• What if rA and rC has collided and DATAA length was 10 while
  DATAC length were 15 ?
A Collision between nodes A and C



                               DATAC
 ACK                       DATAA

       DIFS                            SIFS
                                          DIFS


  • Length (DATAA) = 10 Slot times
  • Length (DATAC) = 15 Slot times
  • CW after Collision 1  0 – 7
  • CW after Collision 2  0 – 15
  • CW after Collision 3  0 – 31
  • CW after Collision 4  0 – 63
NAV – Network Allocation Vector




STAA                      DATA




STAB                                           ACK




STAC   ACK

             DIFS                       SIFS
                                                     DIFS

                           NAVB and C
Hidden Node Problem and Exposed Node Problem




                                     STAC



                         STAB



         STAA
RTS/CTS :


•   RTS (Request To Send) - (Approx 20 bytes)
•   CTS (Clear To Send)     - (Approx 16 bytes)
•   Use of RTS/CTS is optional
•   Solves two problems :
        1.   Hidden Node Problem
        2.   Wastage of time due to collisions
•   Maximum MSDU is 2304 bytes
Preventing a collision at STAB



               RTS                CTS


                           B            C
       A

               CTS
                                 CTS



                           D
DIFS   CW         SIFS     SIFS            SIFS         DIFS


STAA                     RTS                   DATA




STAB                                  CTS                      ACK




STAC   ACK                                     NAV



STAD                                           NAV



New                                                   NAV
Node
Point Coordinated Function (PCF)


• Also known as the CFP (Contention Free Period)
• Operation in an Infrastructure BSS
• STAs communicate using central authority known as PC
  (Point Coordinator) or AP (Access Point)
• No Collisions take place
• AP takes over medium after waiting a period of PIFS
• Starts with issue of a Beacon
Beacon
    • Management Frame
    • Synchronization of Local timers
    • Delivers protocol related parameters
    • TBTT - Target Beacon Transition Time



Beacon                                       TBTT

            PCF                     DCF


                     Super Frame
AP taking over the Wireless medium using PIFS



                                   PIFS
                    DATA       A          B


          DIFS             SIFS    DIFS



   DIFS -     34 µsec
   PIFS -      25 µsec
   SIFS -      16 µsec
   Slot Time - 9 µsec
   B      -    Beacon
Operation in CFP



                                 CFP                                 CP



B    D1 + Poll                 D2 + ACK + Poll              CF_End
                    U1 + ACK                     U1 + ACK




                 SIFS
• Admission Control
• Purpose of having separate DCF and PCF
• Different 802.11 Working groups
    • 802.11a (54Mpbs in 5GHz Band)
    • 802.11b (11 Mbps in 2.4 GHz Band)
    • 802.11c Wireless AP Bridge Operations
    • 802.11d Internationalization
    • 802.11e (QoS)
    • 802.11f Inter-vendor AP hand-offs
    • 802.11h Power control for 5Ghz region
    • 802.11g (54Mbps in 2.4 GHz Band)
    • 802.11i (Security)
802.11e for QoS

• QoS (Quality of Service)

• 802.11e for QoS – Draft Supplement – Nov 2002

• Introduction of new QoS mechanism for WLANs
HC
              PC



                                   ( Enhanced Station )


BSS                         QBSS
(Basic Service Set)         (Basic Service Set
                            for QoS)

      PCF             DCF   HCCA          EDCA
QoS Support Mechanisms of 802.11e :
EDCA :
• Introduction of 4 Access Categories ( AC ) with 8 Traffic
   Classes ( TC )
• MSDU are delivered through multiple back offs
   within one station using AC specific parameters.
• Each AC independently starts a back off after
   detecting the channel being idle for AIFS
• After waiting AIFS , each back off sets counter from
   number drawn from interval [1,CW+1]
• newCW [AC] >= ((oldCW[TC] + 1 ) * PF ) - 1
AC_VO [0]   AC_VI [1]   AC_BE [2]   AC_BK [3]


 AIFSN          2           2           3              7

 CWmin          3           7          15              15

 CWmax          7          15         1023            1023




Prioritized Channel Access is realized with the QoS
parameters per TC, which include :
• AIFS[AC]
• CWmin[AC]
• PF[AC]
EDCA


TC          AC1    AC2       AC3      AC4




                  Virtual Collision
Access Category based Back-offs


              AIFS[AC3]


         AIFS[AC2]


        AIFS[AC1]


      AIFS[AC0]



                                  BackOff[AC3] + Frame
                               BackOff[AC2] + Frame
                            BackOff[AC1] + Frame
ACK                       BackOff[AC0] + Frame
QoS Parameter Set Element Format




                         CWmin[AC]              CWmax[AC]
Element ID
                      CWmin[0]….CWmin[3]     CWmax[0]….CWmax[3]



     AIFSN[AC]             TxOPLimit[AC]
 AIFSN[0]….AIFSN[3]       TxOP[0]….TxOP[3]




             AIFS [AC] = AIFSN [AC] * aSlotTime + SIFS
HCCA ( Hybrid Coordination Function
Controlled Channel Access )


Extends the EDCA access rules.
CP : TxOP
• After AIFS + Back off
• QoS Poll ; After PIFS
CFP : TxOP
• Starting and duration specified by HC using
  QoS Poll .
Hybrid Coordinator


HC

                             PIFS




HCCA                      EDCA



                                            PIFS
                          DATA          A
                                                   DATA




                  AIFS           SIFS       AIFS
802.11e Operation in the CFP


• Guaranteed channel access on successful registration
• Each node will receive a TxOP by means of polls granted
  to them by the HC
• TxOP based on negotiated Traffic specification (TSPEC) and
   observed node activity
• TxOP is at least the size of one Maximum sized MSDU at the
   PHY rate.
• Access Point advertises polling list
Traffic Specification (TSPEC)


                                                      Maximum
Element ID     Length        TS info     Nominal size
                                                      MSDU size
    (1)          (1)           (2)        MSDU (2)
                                                         (2)


Minimum Maximum             Inactivity
                                          Minimum      Mean Data
  Service      Service       Interval
                                         Data Rate (4) Rate (4)
Interval (4) Interval (4)       (4)


Maximum       Minimum                              Surplus
                            Peak Data Delay Bound
Burst Size    PHY Rate                            Bandwidth
                             Rate (2)     (2)
   (4)          (4)                               Allowed (2)
Example :


                 AC[0]   AC[1]   AC[2]

        AIFSN      2       4       7

        CWmin      7      10      15

        CWmax      7      31      255

            PF     1       2       2
AIFS[AC] = AIFSN[AC] * aSlotTime + SIFS



PIFS -      25 µsec ( Used in HCCA)
SIFS -      16 µsec
Slot Time - 9 µsec


AIFS[0] = (2 * 9) + 16 = 34 µsec = DIFS
AIFS[1] = (4 * 9) + 16 = 52 µsec  (52 – 34) / 9 = 18/9 = 2 Slots
AIFS[2] = (7 * 9) + 16 = 79 µsec  (79 – 34) / 9 = 45/9 = 5 Slots
Back-off Algorithm :


802.11 :     CWRANGE = [ 0 , 2 2+i – 1 ]



802.11e :   newCW[AC] = [(oldCW[AC] + 1) * PF] - 1

                   Collision1              Collision2       Collision3

  AC[0]         [(7+1)*1]-1 = 7             ( 0-7 )           ( 0-7 )
                    (0-7)
  AC[1]       [(10+1)*2]-1 = 21       [(21+1)*2]-1 = 43     ( 0 – 31 )
                  ( 0 - 21 )              ( 0 – 31 )
  AC[2]       [(15+1)*2]-1 = 31       [(31+1)*2]-1 = 63   [(63+1)*2]-1 =
                  ( 0 – 31 )              ( 0 – 63 )             127
                                                             ( 0 – 127 )
WEP (Wired Equivalent Privacy)

• Optional in WLANS
• Uses the RC4 (Rivest Cipher 4) Stream Cipher generated with a
    64bit/128 bit Key
•   Key composed of 24 bit IV (Initialization Vector)
•   Key = (24 Bit IV, 40 Bit WEP Key) = 64 Bits
•   Key = (24 Bit IV, 104 Bit WEP Key) = 128 Bits
•   Goal to provide authentication, confidentiality and data integrity
•   Secret Key is shared between communicators
•   The encrypted packet is generated with a bitwise exclusive OR
    (XOR) of the original packet and the RC4 stream.
•   4-byte Integrity Check Value (ICV) is computed on the original
    packet and appended to the end which is also encrypted with the
    RC4 cipher stream.
•   Encryption done only between 802.11 stations.
Encrypted WEP Frame

http://www-106.ibm.com/developerworks/security/library/s-wep/
Encryption / Decryption :


• M – Original Data Frame
• CRC-32 (c) applied to M to obtain c (M)
• c (M) and M are concatenated to get Plain Text P = (M, c (M))
• WEP produces a Key-stream as a function 24 bit IV and 40-bit WEP Key
 using RC4; equal to the length of P.
• Key Stream and the Plaintext are XORed to produce the Cipher Text
• The IV is transmitted in the clear (unencrypted)
• The receiver uses the IV and the shared key to decrypt the message
Draw Backs of WEP:
• A number of attacks can be used against WEP
   • Passive Attacks based on statistical analysis
   • Active Attacks based on known plain text


• WEP relies on a Shared Key to ensure that packets are not
 modified in transit.
• There is no discussion on how these keys are distributed and
 hence usually a single key is used which is shared amongst
 all STA’s and the AP
All in a days work :


 • Shared Key is long lived – May last a week, month,
    even a year or more
 • Consider a busy AP which constantly sends packets
    of length 1500 bytes at 11Mbps
 • Since IV on 24 bits in length and Shared key is
    unchanged, IV gets exhausted after
            2^24 * (1500 * 8) / (11 * 10^6)
           = 18000 secs = 5 hours
 • Lucent wireless cards
PT  Key  CT                  CT  Key  PT



XOR :
     0   0            0
     0   1            1
     1   0            1
     1   1            0


•    XORing a Bit with itself gives 0
PASSIVE ATTACK


         Sender                 Receiver
PT   K            CT   CT   K              PT
0    0           0    0    0             0
0    1           1    1    1             0
1    0           1    1    0             1
1    1           0    0    1             1
• IV repeats generating K
• Identical K used to encrypt MSG1 and MSG2

     MSG1  K  C ( MSG1 )

     MSG2  K  C ( MSG2 )

• Obtain C( MSG1) and C( MSG2) and XOR them
• XORing causes Key Stream to cancel which yields
 the XOR of MSG1 and MSG2 i.e. XOR of Plain Text packets
• This XOR can now be used to apply Statistical Analysis
Example :
MSG1  0 0 1 1
MSG2  1 0 1 1

            MSG1                   MSG2
PT1    K           CT1   PT2   K          CT2
0      0          0     1     0         1
0      1          1     0     1         1
1      0          1     1     0         1
1      1          0     1     1         0
CT1 XOR CT2                     MSG1 XOR MSG2
CT1    CT2                        MSG1 MSG2
0      1             1           0      1              1
1      1             0           0      0              0
1      1             0           1      1              0
0      0             0           1      1              0




Apply Statistical analysis on last three bits and educated
guess on the rest
AP         Wired Network




xx
               Hi



 Attacker
Active Attack :
• Attacker knows exact plain text for one encrypted packet
• Use this knowledge to construct correct encrypted packet
• Construct a new message , calculate CRC-32 and perform
  bit flips on original encrypted packet to change the plaintext
  to the new message.

More Related Content

What's hot

#4 gps introduction & gps messages
#4 gps introduction & gps messages#4 gps introduction & gps messages
#4 gps introduction & gps messagesMohammedHusain20
 
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014  Segment Routing TI-LFA Fast ReRouteMPLS WC 2014  Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014 Segment Routing TI-LFA Fast ReRouteBruno Decraene
 
DIY OFDM Session
DIY OFDM SessionDIY OFDM Session
DIY OFDM SessionNutaq
 
MPLS SDN 2014 - Topology independant LFA
MPLS SDN 2014 - Topology independant LFAMPLS SDN 2014 - Topology independant LFA
MPLS SDN 2014 - Topology independant LFAStephane Litkowski
 
DIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMDIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMJohn Loughney
 
Segment Routing & Application Engeering Routing
Segment Routing & Application Engeering RoutingSegment Routing & Application Engeering Routing
Segment Routing & Application Engeering RoutingBertrand Duvivier
 
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664EMERSON EDUARDO RODRIGUES
 
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 track
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 trackEmerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 track
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 trackEMERSON EDUARDO RODRIGUES
 
LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017Shawn Zandi
 
First hop redundancy
First hop redundancyFirst hop redundancy
First hop redundancyMohamed Gamel
 
Cluster DT sample report
Cluster DT sample reportCluster DT sample report
Cluster DT sample reportanil parmar
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)Netwax Lab
 
Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)NYversity
 

What's hot (19)

#4 gps introduction & gps messages
#4 gps introduction & gps messages#4 gps introduction & gps messages
#4 gps introduction & gps messages
 
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014  Segment Routing TI-LFA Fast ReRouteMPLS WC 2014  Segment Routing TI-LFA Fast ReRoute
MPLS WC 2014 Segment Routing TI-LFA Fast ReRoute
 
DIY OFDM Session
DIY OFDM SessionDIY OFDM Session
DIY OFDM Session
 
Vrrp Alp
Vrrp AlpVrrp Alp
Vrrp Alp
 
MPLS SDN 2014 - Topology independant LFA
MPLS SDN 2014 - Topology independant LFAMPLS SDN 2014 - Topology independant LFA
MPLS SDN 2014 - Topology independant LFA
 
DIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMDIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATM
 
San 2
San 2San 2
San 2
 
Segment Routing & Application Engeering Routing
Segment Routing & Application Engeering RoutingSegment Routing & Application Engeering Routing
Segment Routing & Application Engeering Routing
 
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160664
 
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 track
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 trackEmerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 track
Emerson Eduardo Rodrigues - ENGINEERING STUDIES1 Rp 160665 track
 
Tcp 6[1]
Tcp 6[1]Tcp 6[1]
Tcp 6[1]
 
LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017LinkedIn OpenFabric Project - Interop 2017
LinkedIn OpenFabric Project - Interop 2017
 
L3 f10 2
L3 f10 2L3 f10 2
L3 f10 2
 
Fhrp notes
Fhrp notesFhrp notes
Fhrp notes
 
First hop redundancy
First hop redundancyFirst hop redundancy
First hop redundancy
 
Dx33746752
Dx33746752Dx33746752
Dx33746752
 
Cluster DT sample report
Cluster DT sample reportCluster DT sample report
Cluster DT sample report
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)
 
Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)
 

Viewers also liked (16)

Zig Bee
Zig BeeZig Bee
Zig Bee
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using Arduino
 
Biosensor
BiosensorBiosensor
Biosensor
 
Detection of environmental pollutant using biosensors zen mergal
Detection of environmental pollutant using biosensors   zen mergalDetection of environmental pollutant using biosensors   zen mergal
Detection of environmental pollutant using biosensors zen mergal
 
Biosensor
BiosensorBiosensor
Biosensor
 
Uses of biosensors
Uses of biosensorsUses of biosensors
Uses of biosensors
 
Gsm based home automation
Gsm based home automationGsm based home automation
Gsm based home automation
 
Biosensor
BiosensorBiosensor
Biosensor
 
Gsm based home(ppt)
Gsm based home(ppt)Gsm based home(ppt)
Gsm based home(ppt)
 
Biosensors
BiosensorsBiosensors
Biosensors
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Biosensors
BiosensorsBiosensors
Biosensors
 
Lifi ppt
Lifi pptLifi ppt
Lifi ppt
 
home appliance control using gsm
home appliance control using gsmhome appliance control using gsm
home appliance control using gsm
 
Ppt
PptPpt
Ppt
 
ppt on LIFI TECHNOLOGY
ppt on LIFI TECHNOLOGYppt on LIFI TECHNOLOGY
ppt on LIFI TECHNOLOGY
 

Similar to 80211

Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerMahdi Ahmed Jama
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdfwaqas232871
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesDheryta Jaisinghani
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client AdaptersYaser Rahmati
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)Jeff Green
 
Serval: Software Defined Service-­Centric Networking
Serval: Software Defined Service-­Centric NetworkingServal: Software Defined Service-­Centric Networking
Serval: Software Defined Service-­Centric NetworkingOpen Networking Summits
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction東原 李
 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Olivier Bonaventure
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aqMotty Ben Atia
 

Similar to 80211 (20)

Presentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC LayerPresentation of the IEEE 802.11a MAC Layer
Presentation of the IEEE 802.11a MAC Layer
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
QoS
QoSQoS
QoS
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)9.) audio video ethernet (avb cobra net dante)
9.) audio video ethernet (avb cobra net dante)
 
voip_wireless_wipro.ppt
voip_wireless_wipro.pptvoip_wireless_wipro.ppt
voip_wireless_wipro.ppt
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 
Serval: Software Defined Service-­Centric Networking
Serval: Software Defined Service-­Centric NetworkingServal: Software Defined Service-­Centric Networking
Serval: Software Defined Service-­Centric Networking
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6Part 9 : Congestion control and IPv6
Part 9 : Congestion control and IPv6
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aq
 
Ieee 802.11 wlan
Ieee 802.11 wlanIeee 802.11 wlan
Ieee 802.11 wlan
 
WirelessB06.ppt
WirelessB06.pptWirelessB06.ppt
WirelessB06.ppt
 
Frame Relayprint
Frame RelayprintFrame Relayprint
Frame Relayprint
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

80211

  • 1. 802.11 Wireless LANs Abhishek Karnik, Dr. Ratan Guha University Of Central Florida
  • 2. OVERVIEW • Introduction • 802.11 Basics • 802.11e for QoS • WEP
  • 3. INTRODUCTION • In 1997 the IEEE adopted IEEE Std. 802.11-1997 • Defines MAC and PHY layers for LAN and wireless connectivity. • Facilitate ubiquitous communication and location independent computing • 802.11b operates at 11Mbps in the 2.4 GHz ISM Band (‘99) • 802.11a operates at 54Mbps in the 5 GHz Band (’99) • 802.11g operates at 54Mbps in the 2.4 GHz Band (’02) • Increased deployment and popularity lead to introduction of QoS • 802.11e for QoS – Draft Supplement – Nov 2002
  • 4. 802.11 BASICS • Wireless LAN Station The station (STA) is any device that contains the functionality of the 802.11 protocol, that being MAC, PHY, and a connection to the wireless media. Typically the 802.11 functions are implemented in the hardware and software of a network interface card (NIC). Ex : PC , Handheld , AP (Access Point) • Basic Service Set (BSS) 802.11 defines the Basic Service Set (BSS) as the basic building block of an 802.11 wireless LAN. The BSS consists of a group of any number of stations.
  • 5. IBSS (Independent Basic Service Set – Ad-hoc Mode) STA STA peer-peer connections STA STA
  • 6. Infrastructure Basic Service Set Wired Backbone AP
  • 7. ESS (Extended Service Set) Wired Backbone AP AP BSS1 BSS2
  • 8. Beacon TBTT PCF DCF Super Frame DCF - Distributed Coordinated Function (Contention Period - Ad-hoc Mode) PCF - Point Coordinated Function (Contention Free Period – Infrastructure BSS) Beacon - Management Frame Synchronization of Local timers Delivers protocol related parameters TBTT - Target Beacon Transition Time
  • 9. Distributed Coordinated Function (DCF) • Also known as the Contention Period • STAs form peer-peer connections. No central authority • First listen and then speak • Uses CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) • ACK indicates successful delivery • Each node has one output buffer
  • 10. Inter-Frame Spacing : DIFS - 34 µsec PIFS - 25 µsec ( Used in PCF ) SIFS - 16 µsec Slot Time - 9 µsec DIFS = SIFS + (2 * Slot Time) SIFS required for turn around of Tx to Rx and vice versa
  • 11. Data Transmission from Node A to B CWA DIFS ACK DATAA ACKB DIFS SIFS • CW – Contention Window. Starts only after DIFS. • Random number ‘r’ picked form range ( 0-CW ) • CWmin minimum value of CW • CWmax maximum value the CW can grow to after collisions • ‘r’ can be decremented only in CW • CW doubles after every collision
  • 12. CWA DIFS ACK DATAA ACKB DIFS SIFS • What if some node C wanted to send data while A was transmitting data to B ? • What about during SIFS ? • What if after ACK, more than one say B,C,D,E nodes are waiting to transmit data ?
  • 13. Example : rA = 4 and rC = 6 DIFS ACK DATAA ACKB DATAC DIFS SIFS • What if rA and rC had both been picked as 4 ? • What if rA and rC has collided and DATAA length was 10 while DATAC length were 15 ?
  • 14. A Collision between nodes A and C DATAC ACK DATAA DIFS SIFS DIFS • Length (DATAA) = 10 Slot times • Length (DATAC) = 15 Slot times • CW after Collision 1  0 – 7 • CW after Collision 2  0 – 15 • CW after Collision 3  0 – 31 • CW after Collision 4  0 – 63
  • 15. NAV – Network Allocation Vector STAA DATA STAB ACK STAC ACK DIFS SIFS DIFS NAVB and C
  • 16. Hidden Node Problem and Exposed Node Problem STAC STAB STAA
  • 17. RTS/CTS : • RTS (Request To Send) - (Approx 20 bytes) • CTS (Clear To Send) - (Approx 16 bytes) • Use of RTS/CTS is optional • Solves two problems : 1. Hidden Node Problem 2. Wastage of time due to collisions • Maximum MSDU is 2304 bytes
  • 18. Preventing a collision at STAB RTS CTS B C A CTS CTS D
  • 19. DIFS CW SIFS SIFS SIFS DIFS STAA RTS DATA STAB CTS ACK STAC ACK NAV STAD NAV New NAV Node
  • 20. Point Coordinated Function (PCF) • Also known as the CFP (Contention Free Period) • Operation in an Infrastructure BSS • STAs communicate using central authority known as PC (Point Coordinator) or AP (Access Point) • No Collisions take place • AP takes over medium after waiting a period of PIFS • Starts with issue of a Beacon
  • 21. Beacon • Management Frame • Synchronization of Local timers • Delivers protocol related parameters • TBTT - Target Beacon Transition Time Beacon TBTT PCF DCF Super Frame
  • 22. AP taking over the Wireless medium using PIFS PIFS DATA A B DIFS SIFS DIFS DIFS - 34 µsec PIFS - 25 µsec SIFS - 16 µsec Slot Time - 9 µsec B - Beacon
  • 23. Operation in CFP CFP CP B D1 + Poll D2 + ACK + Poll CF_End U1 + ACK U1 + ACK SIFS
  • 24. • Admission Control • Purpose of having separate DCF and PCF • Different 802.11 Working groups • 802.11a (54Mpbs in 5GHz Band) • 802.11b (11 Mbps in 2.4 GHz Band) • 802.11c Wireless AP Bridge Operations • 802.11d Internationalization • 802.11e (QoS) • 802.11f Inter-vendor AP hand-offs • 802.11h Power control for 5Ghz region • 802.11g (54Mbps in 2.4 GHz Band) • 802.11i (Security)
  • 25. 802.11e for QoS • QoS (Quality of Service) • 802.11e for QoS – Draft Supplement – Nov 2002 • Introduction of new QoS mechanism for WLANs
  • 26. HC PC ( Enhanced Station ) BSS QBSS (Basic Service Set) (Basic Service Set for QoS) PCF DCF HCCA EDCA
  • 27. QoS Support Mechanisms of 802.11e : EDCA : • Introduction of 4 Access Categories ( AC ) with 8 Traffic Classes ( TC ) • MSDU are delivered through multiple back offs within one station using AC specific parameters. • Each AC independently starts a back off after detecting the channel being idle for AIFS • After waiting AIFS , each back off sets counter from number drawn from interval [1,CW+1] • newCW [AC] >= ((oldCW[TC] + 1 ) * PF ) - 1
  • 28. AC_VO [0] AC_VI [1] AC_BE [2] AC_BK [3] AIFSN 2 2 3 7 CWmin 3 7 15 15 CWmax 7 15 1023 1023 Prioritized Channel Access is realized with the QoS parameters per TC, which include : • AIFS[AC] • CWmin[AC] • PF[AC]
  • 29. EDCA TC AC1 AC2 AC3 AC4 Virtual Collision
  • 30. Access Category based Back-offs AIFS[AC3] AIFS[AC2] AIFS[AC1] AIFS[AC0] BackOff[AC3] + Frame BackOff[AC2] + Frame BackOff[AC1] + Frame ACK BackOff[AC0] + Frame
  • 31. QoS Parameter Set Element Format CWmin[AC] CWmax[AC] Element ID CWmin[0]….CWmin[3] CWmax[0]….CWmax[3] AIFSN[AC] TxOPLimit[AC] AIFSN[0]….AIFSN[3] TxOP[0]….TxOP[3] AIFS [AC] = AIFSN [AC] * aSlotTime + SIFS
  • 32. HCCA ( Hybrid Coordination Function Controlled Channel Access ) Extends the EDCA access rules. CP : TxOP • After AIFS + Back off • QoS Poll ; After PIFS CFP : TxOP • Starting and duration specified by HC using QoS Poll .
  • 33. Hybrid Coordinator HC PIFS HCCA EDCA PIFS DATA A DATA AIFS SIFS AIFS
  • 34. 802.11e Operation in the CFP • Guaranteed channel access on successful registration • Each node will receive a TxOP by means of polls granted to them by the HC • TxOP based on negotiated Traffic specification (TSPEC) and observed node activity • TxOP is at least the size of one Maximum sized MSDU at the PHY rate. • Access Point advertises polling list
  • 35. Traffic Specification (TSPEC) Maximum Element ID Length TS info Nominal size MSDU size (1) (1) (2) MSDU (2) (2) Minimum Maximum Inactivity Minimum Mean Data Service Service Interval Data Rate (4) Rate (4) Interval (4) Interval (4) (4) Maximum Minimum Surplus Peak Data Delay Bound Burst Size PHY Rate Bandwidth Rate (2) (2) (4) (4) Allowed (2)
  • 36. Example : AC[0] AC[1] AC[2] AIFSN 2 4 7 CWmin 7 10 15 CWmax 7 31 255 PF 1 2 2
  • 37. AIFS[AC] = AIFSN[AC] * aSlotTime + SIFS PIFS - 25 µsec ( Used in HCCA) SIFS - 16 µsec Slot Time - 9 µsec AIFS[0] = (2 * 9) + 16 = 34 µsec = DIFS AIFS[1] = (4 * 9) + 16 = 52 µsec  (52 – 34) / 9 = 18/9 = 2 Slots AIFS[2] = (7 * 9) + 16 = 79 µsec  (79 – 34) / 9 = 45/9 = 5 Slots
  • 38. Back-off Algorithm : 802.11 : CWRANGE = [ 0 , 2 2+i – 1 ] 802.11e : newCW[AC] = [(oldCW[AC] + 1) * PF] - 1 Collision1 Collision2 Collision3 AC[0] [(7+1)*1]-1 = 7 ( 0-7 ) ( 0-7 ) (0-7) AC[1] [(10+1)*2]-1 = 21 [(21+1)*2]-1 = 43 ( 0 – 31 ) ( 0 - 21 ) ( 0 – 31 ) AC[2] [(15+1)*2]-1 = 31 [(31+1)*2]-1 = 63 [(63+1)*2]-1 = ( 0 – 31 ) ( 0 – 63 ) 127 ( 0 – 127 )
  • 39. WEP (Wired Equivalent Privacy) • Optional in WLANS • Uses the RC4 (Rivest Cipher 4) Stream Cipher generated with a 64bit/128 bit Key • Key composed of 24 bit IV (Initialization Vector) • Key = (24 Bit IV, 40 Bit WEP Key) = 64 Bits • Key = (24 Bit IV, 104 Bit WEP Key) = 128 Bits • Goal to provide authentication, confidentiality and data integrity • Secret Key is shared between communicators • The encrypted packet is generated with a bitwise exclusive OR (XOR) of the original packet and the RC4 stream. • 4-byte Integrity Check Value (ICV) is computed on the original packet and appended to the end which is also encrypted with the RC4 cipher stream. • Encryption done only between 802.11 stations.
  • 41. Encryption / Decryption : • M – Original Data Frame • CRC-32 (c) applied to M to obtain c (M) • c (M) and M are concatenated to get Plain Text P = (M, c (M)) • WEP produces a Key-stream as a function 24 bit IV and 40-bit WEP Key using RC4; equal to the length of P. • Key Stream and the Plaintext are XORed to produce the Cipher Text • The IV is transmitted in the clear (unencrypted) • The receiver uses the IV and the shared key to decrypt the message
  • 42. Draw Backs of WEP: • A number of attacks can be used against WEP • Passive Attacks based on statistical analysis • Active Attacks based on known plain text • WEP relies on a Shared Key to ensure that packets are not modified in transit. • There is no discussion on how these keys are distributed and hence usually a single key is used which is shared amongst all STA’s and the AP
  • 43. All in a days work : • Shared Key is long lived – May last a week, month, even a year or more • Consider a busy AP which constantly sends packets of length 1500 bytes at 11Mbps • Since IV on 24 bits in length and Shared key is unchanged, IV gets exhausted after 2^24 * (1500 * 8) / (11 * 10^6) = 18000 secs = 5 hours • Lucent wireless cards
  • 44. PT  Key  CT CT  Key  PT XOR : 0 0  0 0 1  1 1 0  1 1 1  0 • XORing a Bit with itself gives 0
  • 45. PASSIVE ATTACK Sender Receiver PT K CT CT K PT 0 0  0 0 0  0 0 1  1 1 1  0 1 0  1 1 0  1 1 1  0 0 1  1
  • 46. • IV repeats generating K • Identical K used to encrypt MSG1 and MSG2 MSG1  K  C ( MSG1 ) MSG2  K  C ( MSG2 ) • Obtain C( MSG1) and C( MSG2) and XOR them • XORing causes Key Stream to cancel which yields the XOR of MSG1 and MSG2 i.e. XOR of Plain Text packets • This XOR can now be used to apply Statistical Analysis
  • 47. Example : MSG1  0 0 1 1 MSG2  1 0 1 1 MSG1 MSG2 PT1 K CT1 PT2 K CT2 0 0  0 1 0  1 0 1  1 0 1  1 1 0  1 1 0  1 1 1  0 1 1  0
  • 48. CT1 XOR CT2 MSG1 XOR MSG2 CT1 CT2 MSG1 MSG2 0 1  1 0 1  1 1 1  0 0 0  0 1 1  0 1 1  0 0 0  0 1 1  0 Apply Statistical analysis on last three bits and educated guess on the rest
  • 49. AP Wired Network xx Hi Attacker
  • 50. Active Attack : • Attacker knows exact plain text for one encrypted packet • Use this knowledge to construct correct encrypted packet • Construct a new message , calculate CRC-32 and perform bit flips on original encrypted packet to change the plaintext to the new message.

Editor's Notes

  1. Ad-Hoc Network
  2. Association , Re-association , Disassociation.
  3. Explain nodes sensing medium using common antenna
  4. If A sends to B and C initially senses data but later gets blocked by a wall or something, he may feel that the medium is free and transmit leading to a collision…………….Denial Of Service Attack