SlideShare a Scribd company logo
1 of 54
Ch. 2 – 802.11 and NICs
Part 1 – 802.11 MAC and Cisco Client
Adapters
This Power Point Presentation was originally created by
Prof. Rick Graziani, and modified by Prof. Yousif
Overview
• Sections 2.2 and 2.3
– We will not use most of the online curriculum in these
sections.
– This presentation will add additional material.
– However, still please read the online curriculum.
Will not use curriculum.
Additional information provided.
MAC – Two presentations. This is Part I
PHY – Separate presentation.
802.11 Overview and MAC Layer
Part 1 – 802.11 MAC and Cisco
Client Adapters
• 2.1 Online Curriculum
– 802.11 Standards
• Overview of WLAN Topologies
– IBSS
– BSS
– ESS
– Access Points
• 802.11 Medium Access
Mechanisms
– DCF Operations
– Hidden Node Problem
– RTS/CTS
– Frame Fragmentation
• 2.4 – 2.6 Online Curriculum
– Client Adapters
– Aironet Client Utility (ACU)
– ACU Monitoring and
Troubleshooting Tools
– Covered through the labs
Part 2 – 802.11 MAC
• (Separate Presentation)
• 802.11 Data Frames and
Addressing
• 802.11 MAC Layer Operations
– Station Connectivity
– Power Save Operations
– 802.11 Frame Formats
• Non-standard devices
Recommended Reading and Sources for
this Presentation
• To understand WLANs it is important to understand the 802.11
protocols and their operations.
• These two books do an excellent job in presenting this information and
is used throughout this and other presentations.
Matthew S. Gast
ISBN:
0596001835
Pejman Roshan
Jonathan Leary
ISBN:
1587050773
802.11 Standards
Overview of
Standardization
• Standardization of networking functions has done much to further the
development of affordable, interoperable networking products.
• This is true for wireless products as well.
• Prior to the development of standards, wireless systems were plagued
with low data rates, incompatibility, and high costs.
• Standardization provides all of the following benefits:
– Interoperability among the products of multiple vendors
– Faster product development
– Stability
– Ability to upgrade
– Cost reductions
IEEE and 802.11
• IEEE, founded in 1884, is a nonprofit professional organization
• Plays a critical role in developing standards, publishing technical
works, sponsoring conferences, and providing accreditation in the area
of electrical and electronics technology.
• In the area of networking, the IEEE has produced many widely used
standards such as the 802.x group of local area network (LAN) and
metropolitan area network (MAN) standards,
IEEE 802.11 Architecture
• 802.11 is a family of protocols, including the original specification,
802.11, 802.11b, 802.11a, 802.11g and others.
• Officially called the IEEE Standard for WLAN MAC and PHY
specifications.
• 802.11 “is just another link layer for 802.2”
• 802.11 is sometimes called wireless Ethernet, because of its shared
lineage with Ethernet, 802.3.
• The wired network side of the network could be Ethernet
• Access Points and Bridges act as “translation bridges” between
802.11 and 802.3
Overview of WLAN Topologies
IBSS
BSS
ESS
Overview of WLAN Topologies
• Three types of WLAN Topologies:
– Independent Basic Service Sets (IBSS)
– Basic Service Set (BSS)
– Extended Service Set (ESS)
• Service Set – A logical grouping of devices.
• WLANs provide network access by broadcasting a signal across a wireless
radio frequency (Beaconning)
• Transmitter prefaces its transmissions with a Service Set Identifier (SSID)
• A station may receive transmissions from transmitters with the same or
different SSIDs.
Independent Basic Service Sets (IBSS)
• IBSS consists of a group of 802.11 stations directly communicating with
each other.
• No Access Point used
• Also known as an ad-hoc network.
• Usage: Few stations setup up for a specific purpose for a short period
of time. (ex. file transfers.)
• We will have a an IBSS lab, but our main focus will be BSSs and
ESSs.
Basic Service Set (BSS)
• BSS, also known as an Infrastructure BSS.
• Requires an Access Point (AP)
– Converts 802.11 frames to Ethernet and visa versa
– Known as a translation bridge
• Stations do not communicate directly, but via the AP
• APs typically have an uplink port that connects the BSS to a wired
network (usually Ethernet), known as the Distribution System (DS).
Extended Service Set (ESS)
• Multiple BSSs can be connected together with a layer 2 “backbone
network” to form an Extended Service Set (ESS).
• 802.11 does not specify the backbone network
• The backbone network is also known as the Distribution System (DS)
and could be wired or wireless.
• Stations are “associated” with only one AP at a time.
• The SSID is the same for all BSS areas in the ESS (unless creating
multiple BSSs, i.e. one for Marketing and another for Sales).
• What if you want to be able to move between access points without the
latency of re-association and re-authentication (these will be explained)?
• Roaming gives stations true mobility allowing them to move seamlessly
between BSSs. (More later)
• APs need to be able to communicate between themselves since stations
can only associate with one AP at a time.
• Currently, inter-access point communication can only be achieved with
proprietary, non-standard technologies.
• IEEE 802.11 working group (Task Group F) is working on standardizing
IAPP (Inter-Access Point Protocol)
Extended Service Set (ESS)
Access Points
• Access Point (AP)
– Translates (converts) 802.11 frames to Ethernet and visa versa
– Known as a translation bridge
– Typically provides wireless-to-wired bridging function
– All BSS communications must go through the AP, even between
two wireless statsions
Quick Preview: Station/AP Connectivity
SSID (Service Set Identity)
• At a minimum a client station and
the access point must be
configured to be using the same
SSID.
• An SSID is:
– Between 2 and 32
alphanumeric characters
– Spaces okay
– Must match EXACTLY,
including upper and lower
case
– Sometimes called the ESSID
– Not the same as BSSID (MAC
address of the AP)
Quick Preview: Station/AP Connectivity
• SSIDs are sent by the APs in beacons (and other frames)
• Beacons can be seen by many applications (NetStumbler, iStumbler,
MacStumbler, Kismet, KisMAC) and Windows.
– We will take a look at these applications later.
Can use windows to configure wireless
NIC, but we will use the Cisco client
utility, Aironet
SSID 2 and 3 are used for roaming
where different SSIDs are used (later)
Quick Preview: Station/AP Connectivity
• The Access Point has the same SSID.
• The Cisco AP shows the default SSID tsunami, which would need to be
changed to GuidoNet or the client to to change their SSID to tsunami
(which is usually the case).
SSID
If the frimware has been
upgraded, the SSID will be under
Security SSID Manager
Quick Preview: Station/AP Connectivity
• Your operating system (Windows) or wireless NIC client (Aironet) will
tell you whether or not you have successfully connected (associated).
Windows Toolbar Icon
Aironet Toolbar Icon
Windows
Network
Properties
Quick Preview: Station/AP Connectivity
• This only associates your client with the AP.
• If you want to communicate with other devices on the network (wireless
and wired), make sure your IP address and subnet mask are correct
(or if using DHCP choose that setting).
• This is configured for your wireless NIC, not the wired NIC.
802.11 Medium Access
Mechanisms
Distributed Coordination
Function (DCF) Operations
Hidden Node Problem
RTS/CTS
Frame Fragmentation
Why the detail?
• Why are we going to look so closely at the 802.11 protocol framing and
its operations?
• To understand the settings and features of various client adapters and
access points, we need to understand what is actually happening.
• For example, if someone tells you that you may need to implement
RTS/CTS because of a hidden node problem, it helps to understand
what that really means and what impact it will have upon your network.
802.11 Frames – This isn’t Ethernet!
• 802.11 has some similarities with Ethernet but it is a different protocol.
• Access Points are translation bridges.
• From 802.11 to Ethernet, and from Ethernet to 802.11
• The “data/frame body” is re-encapsulated with the proper layer 2 frame.
• Certain addresses are copied between the two types of frames.
Distribution System (DS)
General 802.11 Frame
IP Packet
IP Packet
L
L
C
802.11 Frames
802.11 Frames
• Data Frames (most are PCF)
– Data
– Null data
– Data+CF+Ack
– Data+CF+Poll
– Data+CF+Ac+CF+Poll
– CF-Ack
– CF-Poll
– CF-Cak+CF-Poll
• Control Frames
– RTS
– CTS
– ACK
– CF-End
– CF-End+CF-Ack
• Management Frames
– Beacon
– Probe Request
– Probe Response
– Authentication
– Deauthentication
– Association Request
– Association Response
– Reassociation Request
– Reassociation Response
– Disassociation
– Announcement Traffic
Indication
Medium Access – CSMA/CA
• Both CSMA/CD and CSMA/CA are half-duplex architectures
• Ethernet uses CSMA/CD – Collision Detection
– Ethernet devices detect a collision as when the data is transmitted
• 802.11 uses CSMA/CA – Collision Avoidance
– 802.11 devices only detect a collision when the transmitter has not
received an Acknowledgement (coming).
– Stations also use CS/CCA – coming
– Stations also use a virtual carrier-sense function, NAV (coming)
CSMA/CD CSMA/CA
ACK
All stations detect the
collision
Medium Access – CSMA/CA
• The 802.11 standard makes it mandatory that all stations implement the DCF
(Distributed Coordination Function), a form of carrier sense multiple access
with collision avoidance (CSMA/CA). Coming!
• CSMA is a contention-based protocol making sure that all stations first sense
the medium before transmitting (physically and virtually). Coming!
• The main goal of CSMA/CA is to avoid having stations transmit at the same
time, which will then result in collisions and eventual retransmissions. Coming!
• However, collisions may still occur and when they do stations may or may not
be able to detect them (hidden node problem). Coming!
CSMA/CD CSMA/CA
ACK
All stations detect the
collision
DCF and PCF
• IEEE mandated access mechanism for 802.11 is DCF (Distributed
Coordination Function)
– Basis for CSMA/CA
– Discussed in detail next
• There is also the PCF (Point Coordination Function)
– Point Coordinators (PC), ie.Access Points, provide point
coordination for contention-free services.
– Restricted to Infrastructure BSSs
– Stations can only transmit when allowed to do so by PC (AP).
– PCF is not widely implemented and will not be discussed
DCF Operation
• In DCF operation, a station wanting to transmit :
– Checks to see if radio link is clear, CS/CCA – Carrier Sense,
Clear Channel Assessment (Later in PHY presentation)
– Checks its Network Allocation Vector (NAV) timer to see if
someone else is using the medium.
– If medium is available DCF uses a random backoff timer to avoid
collisions and sends the frame.
• Transmitting station only knows the 802.11 frame got there if it receives
an ACK.
• May also use RTS/CTS to reduce collisions (coming)
Duration Field
• Duration/ID field – The number of microseconds (millionth of a
second) that the medium is expected to remain busy for transmission
currently in progress.
– Transmitting device sets the Duration time in microseconds.
– Includes time to:
• Transmit this frame to the AP (or to the client if from an AP)
• The returning ACK
• The time in-between frames, IFS (Interframe Spacing)
• All stations monitor this field!
• All stations update their NAV (Network Allocation Vector) timer.
General 802.11 Frame (more on this later)
NAV Timer
• All stations have a NAV (Network Allocation Vector) timer.
• Virtual carrier-sensing function
• Protects the sequence of frames from interruption.
• Martha sends a frame to George.
• Since wireless medium is a “broadcast-based” (not broadcast frame) shared
medium, all stations including Vivian receive the frame.
• Vivian updates her NAV timer with the duration value.
• Vivian will not attempt to transmit until her NAV is decremented to 0.
• Stations will only update their NAV when the duration field value received is
greater than their current NAV.
General 802.11 Frame (more on this later)
Broadcast-based shared medium
• Host A is sending
802.11 frames to
another host via the AP.
• All other 802.11 devices
in BSS (on this channel)
and within range of the
signal will see the
frame.
• 802.11 framing provides
addressing, so only the
AP knows it is the next-
hop receiver.
• Other 802.11 devices
within this BSS can
sense that the medium
is in use and will update
their NAV values. What if a station is in range of the AP but not
the Host A? (Hidden node problem – later)
Interframe Spacing (IFS)
• 802.11 uses four different interframe spaces used to determine medium access
(note: microsecond = millionth of a second):
– DIFS – DCF Interface Space (50 microseconds in DSSS)
• Minimum amount of medium idle time until contention-based services
begin.
– PIFS – PCF Interframe Space (30 microseconds in DSSS)
• Used by PCF
– SIFS – Short Interframe Space (10 microseconds in DSSS)
• Used for highest priority transmission, ACKs, RTS, CTS
Wanting to transmit (1/3)
• Station wanting to transmit.
• Carrier Sensing:
– Physical: Physically senses medium is idle (CS/CCA – coming).
– Virtual: NAV timer is 0
• Waits DIFS (DCF Interface Space) period of 50 microseconds
– Minimum amount of medium idle time until contention-based services
begin.
– Once DCF is over, stations can contend for access.
• Contention window begins.
– Uses random backoff algorithm to determine when it can attempt to
access the medium. (next)
Random backoff slots
Wanting to transmit (2/3)
• (Detail of random backoff algorthim has been left out, but this will be sufficient.)
• The random backoff algorithm randomly selects a value from 0 to 255
(maximum value varies by vendor and stored in the NIC).
• The random value is the number of 802.11 slot times the station must wait
after the DIFS, during the contention window before it may transmit.
• Stations pick a random slot and wait for that slot before attempting to access
the medium.
• With several stations attempting to transmit, the station that picks the lowest
slot, lowest random number, wins.
Contention Window Begins
Example
Scenario:
• Both Vivian and George want to transmit frames.
• Both stations have same NAV values and physically sense when the
medium is idle.
• Both are waiting for Martha’s transmission to end and the medium to
become available.
• The medium now becomes available.
I’m
waiting
I’m
waiting
Example
• George and Vivian are both wanting to transmit.
• Both perform the following:
• Both sense that medium is available using Physical and Virtual
Carriers Sensing:
– Physical: Physically senses medium is idle (CS/CCA – coming).
– Virtual: NAV timer is 0
• Both waits DIFS (DCF Interface Space) period of 10 microseconds
• Contention window begins.
– Uses random backoff algorithm to determine when it can attempt
to access the medium. (next)
Random backoff slots
Example
• Both Vivian and George calculate their random backoff algorithm to
randomly selects a value from 0 to 255.
• Vivian has a slot time of 7, George a slot time of 31.
• Vivian wins.
• The destination of her frame is George
Vivian (7), George (31)
Example
• Vivian transmits, setting the Duration ID to the time needed to
transmit, ACK and IFSs.
• George with a higher slot will see the 802.11 frame from Vivian and
wait to transmit.
• Assuming their was not a collision from another station, Martha and
George update their NAVs.
General 802.11 Frame (more on this later)
Others
update NAV
Martha and George
receive “broadcast-
based” 802.11 frame.
( ( ( ) ) )
802.11 Medium Access
Mechanisms
DCF Operations
Hidden Node Problem
RTS/CTS
Frame Fragmentation
Hidden Node Problem
• What if a station is in range of the AP but not other hosts, like the
transmitting host?
• Wireless networks have fuzzy boundaries, sometimes where may not
be able to communicate/see every other node.
• Hidden nodes can be caused by:
– Hosts are in range of the AP but not each other.
– An obstacle is blocking the signal between the hosts.
Hidden Node Problem
• The problem is collisions.
– Collisions occur at the AP (or another station in an IBSS).
– Both stations assume the medium is clear and transmit near the
same time, resulting in a collision.
– The AP cannot properly receive either signal and will not ACK either
one.
– Both stations retransmit, resulting in more collisions.
• Throughput is significantly reduced, up to 40%.
Hidden Node Problem
• Solutions:
– Move the node
– Remove the obstacle
– Use RTS/CTS (Request to Send / Clear to Send)
802.11 Medium Access
Mechanisms
DCF Operations
Hidden Node Problem
RTS/CTS
Frame Fragmentation
RTS/CTS Solution
• The hidden node stations cannot see the RTS.
• The AP replies to Vivian with a CTS, which all nodes, including the
hidden node can see.
• Vivian transmits the frame.
• The AP returns an ACK to Vivian.
• The AP sends the message to George who returns an ACK to the AP.
• Vivian attempts to reserve the medium using
an RTS control frame to the AP.
• The RTS frame indicates to the AP and all
stations within range, that Vivian wants to
reserve the medium for a certain duration
of time, message, ACK, and SIFS.
RTS/CTS Solution
• The RTS/CTS procedure can be enabled/controlled by setting the RTS
threshold on the 802.11 client NIC.
• RTS/CTS is also used during frame fragmentation (coming).
• RTS/CTS consumes a fair amount of
capacity and overhead, resulting in
additional latency.
• Normally used in high capacity
environments.
Setting the RTS Threshold on a Cisco Client
• Specifies the data packet size beyond which the low-level RF protocol invokes RTS/CTS
flow control. A small value causes RTS packets to be sent more often, which consumes
more of the available bandwidth and reduces the throughput of other network packets.
However, small values help the system recover from interference or collisions, which can
occur in environments with obstructions or metallic surfaces that create complex
multipath signals.
RTS
Threshold
Improving WLAN Performance with RTS/CTS by
Jim Geier (wi-fiplanet.com)
• If you enable RTS/CTS on a particular station (just the hidden
node station), it will refrain from sending a data frame until
the station completes a RTS/CTS handshake with another
station, such as an access point.
• Keep in mind, though, that an increase in performance using
RTS/CTS is the net result of introducing overhead (i.e.,
RTS/CTS frames) and reducing overhead (i.e., fewer
retransmissions). If you don't have any hidden nodes, then
the use of RTS/CTS will only increase the amount of
overhead, which reduces throughput. A slight hidden node
problem may also result in performance degradation if you
implement RTS/CTS. In this case, the additional RTS/CTS
frames cost more in terms of overhead than what you gain by
reducing retransmissions. Thus, be careful when
implementing RTS/CTS.
Improving WLAN Performance with RTS/CTS by
Jim Geier (wi-fiplanet.com)
• One of the best ways to determine if you should activate
RTS/CTS is to monitor the wireless LAN for collisions. If you
find a large number of collisions and the users are relatively
far apart and likely out of range, then try enabling RTS/CTS
on the applicable user wireless NICs. You can activate the
function by clicking "enable RTS/CTS" somewhere in the user
setup screens. You don't need to enable RTS/CTS at the
access point in this case. After receiving a RTS frame from a
user's radio NIC, the access point will always respond with a
CTS frame.
• Of course, keep in mind that user mobility can change the
results. A highly mobile user may be hidden for a short period
of time, perhaps when you perform the testing, then be closer
to other stations most of the time. If collisions are occurring
between users within range of each other, the problem may
be the result of high network utilization or possibly RF
interference.
802.11 Medium Access
Mechanisms
DCF Operations
Hidden Node Problem
RTS/CTS
Frame Fragmentation
Frame Fragmentation
• Since we have already discussed RTS/CTS, let’s also discuss frame
fragmentation.
• Later, we will see that RTS/CTS and fragmentation are typically
combined.
• Frame fragmentation is a MAC layer function that is designed to
increase the reliability of transmitting frames across a wireless
medium.
Frame Fragmentation
• In a “hostile wireless medium” (interference, noise) larger frames may
have more of a problem reaching the receiver without any errors.
• By decreasing the size of the frame, the probability of interference
during transmission can be reduced.
• Breaking up a large frame into smaller frames, allows a larger
percentage of frames to arrive undamaged (without errors).
Frame Fragmentation
• Frame fragmentation can increase the reliability of frame transmissions
but there is additional overhead:
– Each frame fragment includes the 802.11 MAC protocol header.
– Each frame fragment requires a corresponding acknowledgement.
• If a frame fragment encounters errors or a collision, only that fragment
needs to be retransmitted, not the entire frame.
• The frame control field includes information that this is a fragmented
frame.
Frame
Fragmentation
• The “network administrator” (user) can define the fragment size.
• Fragment size – The largest packet that the client adapter sends
without fragmenting the packet.
• Only unicast packets will be fragmented, not broadcasts or multicasts.
Fragment Threshold:
Defines the largest RF packet that the client
adapter sends without splitting the packet
into two or more smaller fragments. If a
single fragment experiences interference
during transmission, only that fragment must
be resent. Fragmentation generally reduces
throughput because the packet overhead for
each fragment consumes a higher portion of
the RF bandwidth.
Client Adapters
and ACU
Done during labs

More Related Content

What's hot

Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksCisco Mobility
 
Design, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLANDesign, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLANCisco Canada
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesCisco Canada
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesCisco Mobility
 
IP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public TransportIP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public TransportJuriMartinevski
 
[Mar./2014] WiFi : Filling the Big Pipe
[Mar./2014] WiFi : Filling the Big Pipe[Mar./2014] WiFi : Filling the Big Pipe
[Mar./2014] WiFi : Filling the Big PipeHayoung Yoon
 
MPLS in Mobile Backhaul
MPLS in Mobile BackhaulMPLS in Mobile Backhaul
MPLS in Mobile BackhaulScott Foster
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
LANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone Link
LANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone LinkLANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone Link
LANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone LinkRonald Bartels
 
Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS Cisco Canada
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
 

What's hot (20)

Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss Networks
 
Design, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLANDesign, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLAN
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
 
Wi-Fi Behavior of Popular Mobile Devices #AirheadsConf Italy
Wi-Fi Behavior of Popular Mobile Devices #AirheadsConf ItalyWi-Fi Behavior of Popular Mobile Devices #AirheadsConf Italy
Wi-Fi Behavior of Popular Mobile Devices #AirheadsConf Italy
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
 
Campus Redundancy Models
Campus Redundancy ModelsCampus Redundancy Models
Campus Redundancy Models
 
IP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public TransportIP-Networks for Buses and Trams in Public Transport
IP-Networks for Buses and Trams in Public Transport
 
[Mar./2014] WiFi : Filling the Big Pipe
[Mar./2014] WiFi : Filling the Big Pipe[Mar./2014] WiFi : Filling the Big Pipe
[Mar./2014] WiFi : Filling the Big Pipe
 
Roaming behavior and Client Troubleshooting
Roaming behavior and Client TroubleshootingRoaming behavior and Client Troubleshooting
Roaming behavior and Client Troubleshooting
 
MPLS in Mobile Backhaul
MPLS in Mobile BackhaulMPLS in Mobile Backhaul
MPLS in Mobile Backhaul
 
ig550-sep21
ig550-sep21ig550-sep21
ig550-sep21
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Wireless wp
Wireless wpWireless wp
Wireless wp
 
LANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone Link
LANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone LinkLANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone Link
LANNET LANswitch Plus LEB-299/S Fast Ethernet Backbone Link
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS Advanced Topics and Future Directions in MPLS
Advanced Topics and Future Directions in MPLS
 
Subnets
SubnetsSubnets
Subnets
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 

Similar to Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters

WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdfwaqas232871
 
Week 10 (2).pptx
Week 10 (2).pptxWeek 10 (2).pptx
Week 10 (2).pptxIrsaAamir1
 
the-ieee-8021-standards.pptx
the-ieee-8021-standards.pptxthe-ieee-8021-standards.pptx
the-ieee-8021-standards.pptxCMWason
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...AssocaKazama
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALASaikiran Panjala
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aqMotty Ben Atia
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPROIDEA
 

Similar to Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters (20)

Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
Week 10 (2).pptx
Week 10 (2).pptxWeek 10 (2).pptx
Week 10 (2).pptx
 
the-ieee-8021-standards.pptx
the-ieee-8021-standards.pptxthe-ieee-8021-standards.pptx
the-ieee-8021-standards.pptx
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
Very nice Wireless-lan-wlan-selected-topics-selected-topics-introduction-wlan...
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aq
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
 

More from Yaser Rahmati

Cisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasCisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasYaser Rahmati
 
Cisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyCisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyYaser Rahmati
 
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN -  Chapter. 02 : Part 3 – 802.11 phyCisco WLAN -  Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phyYaser Rahmati
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2Yaser Rahmati
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyYaser Rahmati
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Yaser Rahmati
 
Chapter 09 - Access Control Lists
Chapter 09 - Access Control ListsChapter 09 - Access Control Lists
Chapter 09 - Access Control ListsYaser Rahmati
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFYaser Rahmati
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static RoutingYaser Rahmati
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingYaser Rahmati
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksYaser Rahmati
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksYaser Rahmati
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a NetworkYaser Rahmati
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
Chapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP NetworksChapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP NetworksYaser Rahmati
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP AddressingYaser Rahmati
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport LayerYaser Rahmati
 

More from Yaser Rahmati (20)

Cisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : AntennasCisco WLAN - Chapter. 07 : Antennas
Cisco WLAN - Chapter. 07 : Antennas
 
Cisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technologyCisco WLAN - Chapter. 03 : wireless radio technology
Cisco WLAN - Chapter. 03 : wireless radio technology
 
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN -  Chapter. 02 : Part 3 – 802.11 phyCisco WLAN -  Chapter. 02 : Part 3 – 802.11 phy
Cisco WLAN - Chapter. 02 : Part 3 – 802.11 phy
 
MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2MTCNA - MikroTik Certified Network Associate - v2
MTCNA - MikroTik Certified Network Associate - v2
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing Dynamically
 
Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4Chapter 11 - Network Address Translation for IPv4
Chapter 11 - Network Address Translation for IPv4
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
Chapter 09 - Access Control Lists
Chapter 09 - Access Control ListsChapter 09 - Access Control Lists
Chapter 09 - Access Control Lists
 
Chapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPFChapter 08 - Single-Area OSPF
Chapter 08 - Single-Area OSPF
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN RoutingChapter 05 - Inter-VLAN Routing
Chapter 05 - Inter-VLAN Routing
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
Chapter 03 - VLANs
Chapter 03 - VLANsChapter 03 - VLANs
Chapter 03 - VLANs
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
Chapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP NetworksChapter 09 - Subnetting IP Networks
Chapter 09 - Subnetting IP Networks
 
Chapter 08 - IP Addressing
Chapter 08 - IP AddressingChapter 08 - IP Addressing
Chapter 08 - IP Addressing
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport Layer
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters

  • 1. Ch. 2 – 802.11 and NICs Part 1 – 802.11 MAC and Cisco Client Adapters This Power Point Presentation was originally created by Prof. Rick Graziani, and modified by Prof. Yousif
  • 2. Overview • Sections 2.2 and 2.3 – We will not use most of the online curriculum in these sections. – This presentation will add additional material. – However, still please read the online curriculum. Will not use curriculum. Additional information provided. MAC – Two presentations. This is Part I PHY – Separate presentation.
  • 3. 802.11 Overview and MAC Layer Part 1 – 802.11 MAC and Cisco Client Adapters • 2.1 Online Curriculum – 802.11 Standards • Overview of WLAN Topologies – IBSS – BSS – ESS – Access Points • 802.11 Medium Access Mechanisms – DCF Operations – Hidden Node Problem – RTS/CTS – Frame Fragmentation • 2.4 – 2.6 Online Curriculum – Client Adapters – Aironet Client Utility (ACU) – ACU Monitoring and Troubleshooting Tools – Covered through the labs Part 2 – 802.11 MAC • (Separate Presentation) • 802.11 Data Frames and Addressing • 802.11 MAC Layer Operations – Station Connectivity – Power Save Operations – 802.11 Frame Formats • Non-standard devices
  • 4. Recommended Reading and Sources for this Presentation • To understand WLANs it is important to understand the 802.11 protocols and their operations. • These two books do an excellent job in presenting this information and is used throughout this and other presentations. Matthew S. Gast ISBN: 0596001835 Pejman Roshan Jonathan Leary ISBN: 1587050773
  • 6. Overview of Standardization • Standardization of networking functions has done much to further the development of affordable, interoperable networking products. • This is true for wireless products as well. • Prior to the development of standards, wireless systems were plagued with low data rates, incompatibility, and high costs. • Standardization provides all of the following benefits: – Interoperability among the products of multiple vendors – Faster product development – Stability – Ability to upgrade – Cost reductions
  • 7. IEEE and 802.11 • IEEE, founded in 1884, is a nonprofit professional organization • Plays a critical role in developing standards, publishing technical works, sponsoring conferences, and providing accreditation in the area of electrical and electronics technology. • In the area of networking, the IEEE has produced many widely used standards such as the 802.x group of local area network (LAN) and metropolitan area network (MAN) standards,
  • 8. IEEE 802.11 Architecture • 802.11 is a family of protocols, including the original specification, 802.11, 802.11b, 802.11a, 802.11g and others. • Officially called the IEEE Standard for WLAN MAC and PHY specifications. • 802.11 “is just another link layer for 802.2” • 802.11 is sometimes called wireless Ethernet, because of its shared lineage with Ethernet, 802.3. • The wired network side of the network could be Ethernet • Access Points and Bridges act as “translation bridges” between 802.11 and 802.3
  • 9. Overview of WLAN Topologies IBSS BSS ESS
  • 10. Overview of WLAN Topologies • Three types of WLAN Topologies: – Independent Basic Service Sets (IBSS) – Basic Service Set (BSS) – Extended Service Set (ESS) • Service Set – A logical grouping of devices. • WLANs provide network access by broadcasting a signal across a wireless radio frequency (Beaconning) • Transmitter prefaces its transmissions with a Service Set Identifier (SSID) • A station may receive transmissions from transmitters with the same or different SSIDs.
  • 11. Independent Basic Service Sets (IBSS) • IBSS consists of a group of 802.11 stations directly communicating with each other. • No Access Point used • Also known as an ad-hoc network. • Usage: Few stations setup up for a specific purpose for a short period of time. (ex. file transfers.) • We will have a an IBSS lab, but our main focus will be BSSs and ESSs.
  • 12. Basic Service Set (BSS) • BSS, also known as an Infrastructure BSS. • Requires an Access Point (AP) – Converts 802.11 frames to Ethernet and visa versa – Known as a translation bridge • Stations do not communicate directly, but via the AP • APs typically have an uplink port that connects the BSS to a wired network (usually Ethernet), known as the Distribution System (DS).
  • 13. Extended Service Set (ESS) • Multiple BSSs can be connected together with a layer 2 “backbone network” to form an Extended Service Set (ESS). • 802.11 does not specify the backbone network • The backbone network is also known as the Distribution System (DS) and could be wired or wireless. • Stations are “associated” with only one AP at a time. • The SSID is the same for all BSS areas in the ESS (unless creating multiple BSSs, i.e. one for Marketing and another for Sales).
  • 14. • What if you want to be able to move between access points without the latency of re-association and re-authentication (these will be explained)? • Roaming gives stations true mobility allowing them to move seamlessly between BSSs. (More later) • APs need to be able to communicate between themselves since stations can only associate with one AP at a time. • Currently, inter-access point communication can only be achieved with proprietary, non-standard technologies. • IEEE 802.11 working group (Task Group F) is working on standardizing IAPP (Inter-Access Point Protocol) Extended Service Set (ESS)
  • 15. Access Points • Access Point (AP) – Translates (converts) 802.11 frames to Ethernet and visa versa – Known as a translation bridge – Typically provides wireless-to-wired bridging function – All BSS communications must go through the AP, even between two wireless statsions
  • 16. Quick Preview: Station/AP Connectivity SSID (Service Set Identity) • At a minimum a client station and the access point must be configured to be using the same SSID. • An SSID is: – Between 2 and 32 alphanumeric characters – Spaces okay – Must match EXACTLY, including upper and lower case – Sometimes called the ESSID – Not the same as BSSID (MAC address of the AP)
  • 17. Quick Preview: Station/AP Connectivity • SSIDs are sent by the APs in beacons (and other frames) • Beacons can be seen by many applications (NetStumbler, iStumbler, MacStumbler, Kismet, KisMAC) and Windows. – We will take a look at these applications later. Can use windows to configure wireless NIC, but we will use the Cisco client utility, Aironet SSID 2 and 3 are used for roaming where different SSIDs are used (later)
  • 18. Quick Preview: Station/AP Connectivity • The Access Point has the same SSID. • The Cisco AP shows the default SSID tsunami, which would need to be changed to GuidoNet or the client to to change their SSID to tsunami (which is usually the case). SSID If the frimware has been upgraded, the SSID will be under Security SSID Manager
  • 19. Quick Preview: Station/AP Connectivity • Your operating system (Windows) or wireless NIC client (Aironet) will tell you whether or not you have successfully connected (associated). Windows Toolbar Icon Aironet Toolbar Icon Windows Network Properties
  • 20. Quick Preview: Station/AP Connectivity • This only associates your client with the AP. • If you want to communicate with other devices on the network (wireless and wired), make sure your IP address and subnet mask are correct (or if using DHCP choose that setting). • This is configured for your wireless NIC, not the wired NIC.
  • 21. 802.11 Medium Access Mechanisms Distributed Coordination Function (DCF) Operations Hidden Node Problem RTS/CTS Frame Fragmentation
  • 22. Why the detail? • Why are we going to look so closely at the 802.11 protocol framing and its operations? • To understand the settings and features of various client adapters and access points, we need to understand what is actually happening. • For example, if someone tells you that you may need to implement RTS/CTS because of a hidden node problem, it helps to understand what that really means and what impact it will have upon your network.
  • 23. 802.11 Frames – This isn’t Ethernet! • 802.11 has some similarities with Ethernet but it is a different protocol. • Access Points are translation bridges. • From 802.11 to Ethernet, and from Ethernet to 802.11 • The “data/frame body” is re-encapsulated with the proper layer 2 frame. • Certain addresses are copied between the two types of frames. Distribution System (DS) General 802.11 Frame IP Packet IP Packet L L C
  • 24. 802.11 Frames 802.11 Frames • Data Frames (most are PCF) – Data – Null data – Data+CF+Ack – Data+CF+Poll – Data+CF+Ac+CF+Poll – CF-Ack – CF-Poll – CF-Cak+CF-Poll • Control Frames – RTS – CTS – ACK – CF-End – CF-End+CF-Ack • Management Frames – Beacon – Probe Request – Probe Response – Authentication – Deauthentication – Association Request – Association Response – Reassociation Request – Reassociation Response – Disassociation – Announcement Traffic Indication
  • 25. Medium Access – CSMA/CA • Both CSMA/CD and CSMA/CA are half-duplex architectures • Ethernet uses CSMA/CD – Collision Detection – Ethernet devices detect a collision as when the data is transmitted • 802.11 uses CSMA/CA – Collision Avoidance – 802.11 devices only detect a collision when the transmitter has not received an Acknowledgement (coming). – Stations also use CS/CCA – coming – Stations also use a virtual carrier-sense function, NAV (coming) CSMA/CD CSMA/CA ACK All stations detect the collision
  • 26. Medium Access – CSMA/CA • The 802.11 standard makes it mandatory that all stations implement the DCF (Distributed Coordination Function), a form of carrier sense multiple access with collision avoidance (CSMA/CA). Coming! • CSMA is a contention-based protocol making sure that all stations first sense the medium before transmitting (physically and virtually). Coming! • The main goal of CSMA/CA is to avoid having stations transmit at the same time, which will then result in collisions and eventual retransmissions. Coming! • However, collisions may still occur and when they do stations may or may not be able to detect them (hidden node problem). Coming! CSMA/CD CSMA/CA ACK All stations detect the collision
  • 27. DCF and PCF • IEEE mandated access mechanism for 802.11 is DCF (Distributed Coordination Function) – Basis for CSMA/CA – Discussed in detail next • There is also the PCF (Point Coordination Function) – Point Coordinators (PC), ie.Access Points, provide point coordination for contention-free services. – Restricted to Infrastructure BSSs – Stations can only transmit when allowed to do so by PC (AP). – PCF is not widely implemented and will not be discussed
  • 28. DCF Operation • In DCF operation, a station wanting to transmit : – Checks to see if radio link is clear, CS/CCA – Carrier Sense, Clear Channel Assessment (Later in PHY presentation) – Checks its Network Allocation Vector (NAV) timer to see if someone else is using the medium. – If medium is available DCF uses a random backoff timer to avoid collisions and sends the frame. • Transmitting station only knows the 802.11 frame got there if it receives an ACK. • May also use RTS/CTS to reduce collisions (coming)
  • 29. Duration Field • Duration/ID field – The number of microseconds (millionth of a second) that the medium is expected to remain busy for transmission currently in progress. – Transmitting device sets the Duration time in microseconds. – Includes time to: • Transmit this frame to the AP (or to the client if from an AP) • The returning ACK • The time in-between frames, IFS (Interframe Spacing) • All stations monitor this field! • All stations update their NAV (Network Allocation Vector) timer. General 802.11 Frame (more on this later)
  • 30. NAV Timer • All stations have a NAV (Network Allocation Vector) timer. • Virtual carrier-sensing function • Protects the sequence of frames from interruption. • Martha sends a frame to George. • Since wireless medium is a “broadcast-based” (not broadcast frame) shared medium, all stations including Vivian receive the frame. • Vivian updates her NAV timer with the duration value. • Vivian will not attempt to transmit until her NAV is decremented to 0. • Stations will only update their NAV when the duration field value received is greater than their current NAV. General 802.11 Frame (more on this later)
  • 31. Broadcast-based shared medium • Host A is sending 802.11 frames to another host via the AP. • All other 802.11 devices in BSS (on this channel) and within range of the signal will see the frame. • 802.11 framing provides addressing, so only the AP knows it is the next- hop receiver. • Other 802.11 devices within this BSS can sense that the medium is in use and will update their NAV values. What if a station is in range of the AP but not the Host A? (Hidden node problem – later)
  • 32. Interframe Spacing (IFS) • 802.11 uses four different interframe spaces used to determine medium access (note: microsecond = millionth of a second): – DIFS – DCF Interface Space (50 microseconds in DSSS) • Minimum amount of medium idle time until contention-based services begin. – PIFS – PCF Interframe Space (30 microseconds in DSSS) • Used by PCF – SIFS – Short Interframe Space (10 microseconds in DSSS) • Used for highest priority transmission, ACKs, RTS, CTS
  • 33. Wanting to transmit (1/3) • Station wanting to transmit. • Carrier Sensing: – Physical: Physically senses medium is idle (CS/CCA – coming). – Virtual: NAV timer is 0 • Waits DIFS (DCF Interface Space) period of 50 microseconds – Minimum amount of medium idle time until contention-based services begin. – Once DCF is over, stations can contend for access. • Contention window begins. – Uses random backoff algorithm to determine when it can attempt to access the medium. (next) Random backoff slots
  • 34. Wanting to transmit (2/3) • (Detail of random backoff algorthim has been left out, but this will be sufficient.) • The random backoff algorithm randomly selects a value from 0 to 255 (maximum value varies by vendor and stored in the NIC). • The random value is the number of 802.11 slot times the station must wait after the DIFS, during the contention window before it may transmit. • Stations pick a random slot and wait for that slot before attempting to access the medium. • With several stations attempting to transmit, the station that picks the lowest slot, lowest random number, wins. Contention Window Begins
  • 35. Example Scenario: • Both Vivian and George want to transmit frames. • Both stations have same NAV values and physically sense when the medium is idle. • Both are waiting for Martha’s transmission to end and the medium to become available. • The medium now becomes available. I’m waiting I’m waiting
  • 36. Example • George and Vivian are both wanting to transmit. • Both perform the following: • Both sense that medium is available using Physical and Virtual Carriers Sensing: – Physical: Physically senses medium is idle (CS/CCA – coming). – Virtual: NAV timer is 0 • Both waits DIFS (DCF Interface Space) period of 10 microseconds • Contention window begins. – Uses random backoff algorithm to determine when it can attempt to access the medium. (next) Random backoff slots
  • 37. Example • Both Vivian and George calculate their random backoff algorithm to randomly selects a value from 0 to 255. • Vivian has a slot time of 7, George a slot time of 31. • Vivian wins. • The destination of her frame is George Vivian (7), George (31)
  • 38. Example • Vivian transmits, setting the Duration ID to the time needed to transmit, ACK and IFSs. • George with a higher slot will see the 802.11 frame from Vivian and wait to transmit. • Assuming their was not a collision from another station, Martha and George update their NAVs. General 802.11 Frame (more on this later) Others update NAV Martha and George receive “broadcast- based” 802.11 frame. ( ( ( ) ) )
  • 39. 802.11 Medium Access Mechanisms DCF Operations Hidden Node Problem RTS/CTS Frame Fragmentation
  • 40. Hidden Node Problem • What if a station is in range of the AP but not other hosts, like the transmitting host? • Wireless networks have fuzzy boundaries, sometimes where may not be able to communicate/see every other node. • Hidden nodes can be caused by: – Hosts are in range of the AP but not each other. – An obstacle is blocking the signal between the hosts.
  • 41. Hidden Node Problem • The problem is collisions. – Collisions occur at the AP (or another station in an IBSS). – Both stations assume the medium is clear and transmit near the same time, resulting in a collision. – The AP cannot properly receive either signal and will not ACK either one. – Both stations retransmit, resulting in more collisions. • Throughput is significantly reduced, up to 40%.
  • 42. Hidden Node Problem • Solutions: – Move the node – Remove the obstacle – Use RTS/CTS (Request to Send / Clear to Send)
  • 43. 802.11 Medium Access Mechanisms DCF Operations Hidden Node Problem RTS/CTS Frame Fragmentation
  • 44. RTS/CTS Solution • The hidden node stations cannot see the RTS. • The AP replies to Vivian with a CTS, which all nodes, including the hidden node can see. • Vivian transmits the frame. • The AP returns an ACK to Vivian. • The AP sends the message to George who returns an ACK to the AP. • Vivian attempts to reserve the medium using an RTS control frame to the AP. • The RTS frame indicates to the AP and all stations within range, that Vivian wants to reserve the medium for a certain duration of time, message, ACK, and SIFS.
  • 45. RTS/CTS Solution • The RTS/CTS procedure can be enabled/controlled by setting the RTS threshold on the 802.11 client NIC. • RTS/CTS is also used during frame fragmentation (coming). • RTS/CTS consumes a fair amount of capacity and overhead, resulting in additional latency. • Normally used in high capacity environments.
  • 46. Setting the RTS Threshold on a Cisco Client • Specifies the data packet size beyond which the low-level RF protocol invokes RTS/CTS flow control. A small value causes RTS packets to be sent more often, which consumes more of the available bandwidth and reduces the throughput of other network packets. However, small values help the system recover from interference or collisions, which can occur in environments with obstructions or metallic surfaces that create complex multipath signals. RTS Threshold
  • 47. Improving WLAN Performance with RTS/CTS by Jim Geier (wi-fiplanet.com) • If you enable RTS/CTS on a particular station (just the hidden node station), it will refrain from sending a data frame until the station completes a RTS/CTS handshake with another station, such as an access point. • Keep in mind, though, that an increase in performance using RTS/CTS is the net result of introducing overhead (i.e., RTS/CTS frames) and reducing overhead (i.e., fewer retransmissions). If you don't have any hidden nodes, then the use of RTS/CTS will only increase the amount of overhead, which reduces throughput. A slight hidden node problem may also result in performance degradation if you implement RTS/CTS. In this case, the additional RTS/CTS frames cost more in terms of overhead than what you gain by reducing retransmissions. Thus, be careful when implementing RTS/CTS.
  • 48. Improving WLAN Performance with RTS/CTS by Jim Geier (wi-fiplanet.com) • One of the best ways to determine if you should activate RTS/CTS is to monitor the wireless LAN for collisions. If you find a large number of collisions and the users are relatively far apart and likely out of range, then try enabling RTS/CTS on the applicable user wireless NICs. You can activate the function by clicking "enable RTS/CTS" somewhere in the user setup screens. You don't need to enable RTS/CTS at the access point in this case. After receiving a RTS frame from a user's radio NIC, the access point will always respond with a CTS frame. • Of course, keep in mind that user mobility can change the results. A highly mobile user may be hidden for a short period of time, perhaps when you perform the testing, then be closer to other stations most of the time. If collisions are occurring between users within range of each other, the problem may be the result of high network utilization or possibly RF interference.
  • 49. 802.11 Medium Access Mechanisms DCF Operations Hidden Node Problem RTS/CTS Frame Fragmentation
  • 50. Frame Fragmentation • Since we have already discussed RTS/CTS, let’s also discuss frame fragmentation. • Later, we will see that RTS/CTS and fragmentation are typically combined. • Frame fragmentation is a MAC layer function that is designed to increase the reliability of transmitting frames across a wireless medium.
  • 51. Frame Fragmentation • In a “hostile wireless medium” (interference, noise) larger frames may have more of a problem reaching the receiver without any errors. • By decreasing the size of the frame, the probability of interference during transmission can be reduced. • Breaking up a large frame into smaller frames, allows a larger percentage of frames to arrive undamaged (without errors).
  • 52. Frame Fragmentation • Frame fragmentation can increase the reliability of frame transmissions but there is additional overhead: – Each frame fragment includes the 802.11 MAC protocol header. – Each frame fragment requires a corresponding acknowledgement. • If a frame fragment encounters errors or a collision, only that fragment needs to be retransmitted, not the entire frame. • The frame control field includes information that this is a fragmented frame.
  • 53. Frame Fragmentation • The “network administrator” (user) can define the fragment size. • Fragment size – The largest packet that the client adapter sends without fragmenting the packet. • Only unicast packets will be fragmented, not broadcasts or multicasts. Fragment Threshold: Defines the largest RF packet that the client adapter sends without splitting the packet into two or more smaller fragments. If a single fragment experiences interference during transmission, only that fragment must be resent. Fragmentation generally reduces throughput because the packet overhead for each fragment consumes a higher portion of the RF bandwidth.