0% found this document useful (0 votes)
53 views50 pages

03 Wlans 140707011420 Phpapp02 PDF

Uploaded by

SANTOSH KUMAR S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views50 pages

03 Wlans 140707011420 Phpapp02 PDF

Uploaded by

SANTOSH KUMAR S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Wireless Local Area

Networks
CS5440 Wireless Access Networks

Dilum Bandara
[email protected]

Some slides extracted from Dr. Muid Mufti, ID Technologies


Outlines
 Motivation
 IEEE 802.11
 Practical issues
 Security

2
Wireless Technology Landscape

3
Wireless Local Area Network (WLAN)
 As a cable replacement
 Motivating factors
 Mobility
 Old buildings
 Rapid deployment
 Rapid reconfiguration
 Small devices
 Applications

4
Why Not Wireless Ethernet?
 Ethernet is simple, widely used, & cheap
 But
 Collision detection
 Not possible in wireless
 Would require a full duplex radio
 Receiver sensitivity
 Carrier sense
 Hidden stations
 Mobility
 Power saving

5
Elements of a WLAN
 Client
 Access point – base station
 Modes
 Ad-hoc
 infrastructure

6
Source: www.technologyuk.net
WLAN Topologies
 Peer-to-peer
 Access point based
 Point-to-multipoint bridge

Source: www.cisco.com 7
IEEE 802.11 Standard
 Standard for MAC & Physical Layer for WLANs

8
IEEE 802.11 Standards

DSSS – Direct Sequence Spread Spectrum


OFDM – Orthogonal Frequency-Division Multiplexing
MIMO – Multiple Input Multiple Output
9
IEEE 802.11 Versions
 802.11 – 1997
 2 Mbps max
 2.4 GHz band
 20 m – Indoor
 100 m – outdoor
 Wide range of Physical layers
 IR, UHF Narrowband, spread spectrum
 802.11a – 1999
 54 Mbps max
 5.1 - 5.8GHz band
 35 m – indoor
10
 120 m – outdoor
IEEE 802.11 Versions (Cont.)
 802.11b – 1999
 11 Mbps max
 2.4 GHz band
 35 m – indoor
 140 m – outdoor
 802.11g – 2003
 Most current deployments
 54 Mbps max
 2.4 GHz band
 38 m – indoor
 140 m – outdoor
11
IEEE 802.11 Versions (Cont.)
 802.11n – 2009
 Current industry adopted specification
 320 Mbps
 2.4/5 GHz band
 MIMO
 Enhanced security
 70 m – indoor
 250 m – outdoor
 802.11ac – 2012 (approved in Jan 2014)
 0.5+ Gbps (per links)
 5 GHz band
 MIMO, 256 - QAM 12
Comparison

Source: http://electronicdesign.com/communications/understanding-ieee-80211ac-vht-wireless 13
Comparison

14
15
Source: http://www.os2warp.be/index2.php?name=wifi1
IEEE 802.11 Topologies
 Independent Basic Service Set (IBSS) – ad-hoc
 Basic Service Set (BSS)
 Extended Service Set (ESS)
SSID – Service Set ID

BSSID – MAC of AP

ESSID – 32-byte String


16
Services
 Station services
 Authentication
 De-authentication
 Privacy
 Delivery of data
 Distribution services
 Association
 Disassociation
 Reassociation
 Distribution
 Integration
17
Association in 802.11

1: Association request

2: Association response

3: Data traffic
Client AP

18
Reassociation in 802.11 – Roaming
1: Reassociation request

3: Reassociation response

5: Send buffered frames New AP


Client 2: verify
6: Data traffic previous
association

• 802.11 – Roaming algorithm not defined


• 802.11f – Inter Access Point Protocol (IAPP) Old AP
4: send
• 802.11r – Fast roaming buffered
• Still no solution for roaming across different domains frames
19
Roaming Among Wi-Fi Hotspots
 Hotspots may be operated by different providers
 WISP – Wireless Internet Service Provider
 WISPr – best practices for WISPs
 Authentication through web browser

Source: www.truconnect.com/blog/how-to-create-a-wi-fi-hotspot-with-a-mifi-device/ 20
Issues – Hidden Terminal
 B doesn’t know C exist

21
Issues – Exposed Terminal
 A can’t communicate with D while B & C are
communicating

22
Handshake Protocol
 Address hidden & exposed terminal problems
 RTS – Request To Send frame
 CTS – Clear To Send frame

23
Virtual Channel Sensing in CSMA/CA

 C (in range of A) receives RTS & based on information in


RTS creates a virtual channel busy NAV
 NAV – Network Allocation Vector
 NAV indicates how long a station must defer from accessing
medium
 Saves power
 D (in range of B) receives CTS & creates a shorter NAV 24
802.11 Overhead
Random
RTS/CTS Data Transmission/ACK
backoff

 Channel contention resolved using backoff


 Nodes choose random backoff interval from [0, CW]
 Count down for this interval before transmission
 Backoff & (optional) RTS/CTS handshake before
transmission of data frame

25
Fragmentation in 802.11

 High wireless error rates  long packets have less


probability of being successfully transmitted
 Solution
 MAC layer fragmentation with stop-and-wait protocol on
fragments 26
Physical Layer
 DSSS

SYNC - Receiver uses to acquire incoming signal & synchronize receiver’s carrier
SFD – Start of Frame Delimiter
Signal – Which modulation scheme

11 channels – North America


13 channels – Europe

27
28
Source: wikipedia.org
802.11 Wireless MAC
 Support broadcast, multicast, & unicast
 Uses ACK & retransmission to achieve reliability for
unicast frames
 No ACK/retransmission for broadcast or multicast
frames
 Distributed & centralized MAC access
 Distributed Coordination Function (DCF)
 Point Coordination Function (PCF)

29
IEEE 802.11 Mobility
 Standard defines following mobility types
 No-transition – no movement or moving within a local BSS
 BSS-transition – station movies from one BSS in one ESS to another
BSS within the same ESS
 ESS-transition – station moves from a BSS in one ESS to a BSS in a
different ESS (continues roaming not supported)

- Address to destination
mapping
- seamless integration ESS 1
of multiple BSS ESS 2

30
Why Security is More of a Concern in
Wireless?
 No inherent physical protection
 Physical connections between devices are replaced by logical
associations
 Broadcast communications
 Eavesdropping – transmissions can be overheard by anyone in
range
 Bogus message – anyone can transmit
 DoS – Jamming/interference
 Replaying previously recorded messages

31
Further Issues
 Access point configuration
 Default community strings, default passwords
 Evil twin access points
 Stronger signal, capture user authentication
 Renegade access points
 Unauthorised wireless LANs

32
Authentication & Privacy
 To prevent unauthorized access & eavesdropping
 Realized by authentication service prior to access
 Open system authentication
 Station wanting to authenticate sends authentication management
frame
 Receiving station sends back frame for successful authentication
 Supported in WEP
 Shared-key authentication
 Secret, shared key received by all stations by a separate, 802.11
independent channel
 Stations authenticate by a shared knowledge of the key properties

33
MAC ACLs & SSID Hiding
 Access points have Access Control Lists (ACL)
 List of allowed MAC addresses
 E.g., allow access to
 00:01:42:0E:12:1F
 00:01:42:F1:72:AE
 00:01:42:4F:E2:01

 But MAC addresses are sniffable & spoofable


 AP beacons without SSID
 A client knowing a SSID may join AP
 A client send PROBE REQUEST with SSID, AP
MUST send a RESPONSE with its SSID
34
802.11b Security Services
 2 security services
1. Authentication
 Shared Key Authentication
2. Encryption
 Wired Equivalence Privacy (WEP)

35
Wired Equivalence Privacy (WEP)
 Shared key between stations & an AP
 Extended Service Set (ESS)
 All APs will have same shared key
 No key management
 Shared key entered manually into
 Stations
 APs
 Key management nightmare in large wireless LANs

36
WEP – Shared Key Authentication
 When station requests association with an AP
 AP sends random no to station
 Station encrypts random no
 Uses RC4, 40-bit shared secret key & 24-bit initialization vector
 RC4 – software stream cipher
 Encrypted random no sent to AP
 AP decrypts received message
 AP compares decrypted random no to transmitted random no
 If numbers match, station has shared secret key
 RC4 subsequently used for data encryption
 Checksum for integrity
 But management traffic still broadcast in clear containing
SSID 37
WEP – Shared Key Authentication

Source: technet.microsoft.com

38
Wi-Fi Protected Access (WPA)
 Works with 802.11b, a, & g
 Works with legacy hardware
 Fixes WEP’s problems
 802.1x user-level authentication
 Temporal Key Integrity Protocol (TKIP)
 RC4 session-based dynamic encryption keys
 Per-packet key derivation
 Unicast & broadcast key management
 48-bit initialization vector with new sequencing method
 Counter replay attacks
 Michael 64-bit Message Integrity Code (MIC)
 Optional AES support to replace RC4
39
WPA & 802.1x
 802.1x is a general purpose network access control
mechanism
 WPA has 2 modes
1. Pre-shared mode, uses pre-shared keys
2. Enterprise mode, uses Extensible Authentication Protocol (EAP)
with a RADIUS server making the authentication decision
 EAP is a transport for authentication, not authentication itself

 EAP allows arbitrary authentication methods

 For example, Windows supports

40
802.11i – WPA2
 Full implementation
 Adopted in September 2004
 Replaced WPA with WPA2-AES in 2004
 Backwards compatible with WPA
 Uses AES-CCMP
 Advanced Encryption Standard – Counter Mode with
Cipher Block Chaining Message Authentication Code
Protocol (CCMP)
 Very Strong

41
WPA2 (Cont.)
 Robust Security Network (RSN) protocol for
establishing secure communications
 Based on a mode of AES, with 128-bits keys & 48 bit
IV
 Adds dynamic negotiation of authentication &
encryption algorithms
 Allows for future changes
 Requires new hardware

42
RSN Protocol
 Wireless NIC sends a Probe Request
 Access point sends a Probe Response with an
RSN Information Exchange (IE) frame
 Wireless NIC requests authentication via one of
the approved methods
 Access point provides authentication for the
wireless NIC
 Wireless NIC sends an Association Request with
an RSN Information Exchange (IE) frame
 Access point send an Association Response
43
WLAN Network Planning
 Network planning target
 Maximize system performance with limited resources
 Including
 coverage
 throughput
 capacity
 interference
 roaming
 security
 Planning process
 Requirements for project management personnel
 Site investigation
 Computer-aided planning practice
 Testing & verifying planning 44
Field Measurements
 Basic tools – power levels, throughput, error rate
 Laptop, tablet, & PDA
 Utility come with radio card
 Supports channel scan, station search
 Indicate signal level, SNR, transport rate
 Advanced tools – detailed protocol data flows
 Special designed for field measurement
 Support PHY & MAC protocol analysis
 Integrated with network planning tools
 Examples
 Procycle™ from Softbit, Oulu, Finland
 SitePlaner™ from WirelessValley, American

45
Capacity Planning – Example
 802.11b can have 6.5 Mbps rate throughput due to
 CSMA/CA MAC protocol
 PHY & MAC management overhead
 More users connected, less capacity offered
 Example of supported users in different application cases

Environment Traffic content Traffic Load No of simultaneous users


11Mbps 5.5Mbps 2Mbps
Corporation Web, Email, File 150 kbits/user 40 20 9
Wireless LAN transfer
Branch Office All application via 300 kbits/user 20 10 4
Network WLAN
Public Access Web, Email, VPN 100 kbits/user 60 30 12
tunneling
46
Frequency Planning
 Interference from other WLAN systems or cells
 IEEE 802.11 operates at uncontrolled ISM band
 14 channels of 802.11 are overlapping, only 3 channels are
disjointed, e.g., Ch 1, 6, & 11
 Throughput decreases with less channel spacing
 Example of frequency allocation in multi-cell network
6

11Mb if/frag 512


Mbit/s

3 2Mb if/frag 512


2Mb if/frag 2346
2

0
Offset Offset Offset Offset Offset Offset
25MHz 20MHz 15MHz 10MHz 5MHz 0MHz 47
WLAN Technology Problems
 Data Speed
 Effective throughput is still not enough
 Better with IEEE 802.11g/n
 Interference
 Works in ISM band
 Share same frequency with microwave oven, Bluetooth, & others
 Security
 Current WEP algorithm is weak – usually not ON!
 Roaming
 No industry standard is available & propriety solution aren’t
interoperable
 Inter-operability
 Only few basic functionality are interoperable, other vendor’s
features can’t be used in a mixed network 48
WLAN Implementation Problems
 Lack of wireless networking experience for most IT
engineer
 Lack of well-recognized operation process on network
implementation
 Selecting access points with “best guess” method
 Unaware of interference from/to other networks
 Weak security policy
 As a result, a WLAN may have
 Poor performance (coverage, throughput, capacity, & security)
 Unstable service
 Customer dissatisfaction

49
Summary
 Emerged as a replacement for wired LAN
 IEEE 802.11g is popular
 Many IEEE 802.11n devices are being deployed
 Data rate & security continue to improve
 Only a small subset of the available channels
can be effectively used
 No roaming access across different domains

50

You might also like