05 WirelessNetworking
05 WirelessNetworking
• Introduction
• The IEEE 802.11 Wireless LAN
Standard
• Wireless Networking
• Bluetooth, WiMAX, RFID, and Mobile
Communications
• Wireless LAN Security
DRAFT
Introduction
• So far, we have been looking at OSI Layers #1 and #2 --
the physical link and data link (MAC) layers
• We have already examined two types of wired links
o Ethernet over twisted-pair
o Fiber-optic networking
• For sheer bandwidth and speed, nothing can really beat
a wired connection.
• However, wired connections also have some
downsides...
Introduction
• Those include:
o The necessity of having a cable and being near a wall plate
This, of course, limits the user's mobility, even if the device itself is
mobile!
o Costs of installing cable and wall plates
o Practical limits on the number of physical connections to the
network
• Furthermore, if you ever want to upgrade the network –
speed, hardware, etc. – it will be a lot of work!
Introduction
• When users do not need the full speed possible with a
wired connection, you can have a trade-off and gain
greater mobility and flexibility by connecting to the
network wirelessly.
• Over this part of the course, we will examine wireless
technologies, along with issues related to setup,
maintenance, and security.
The IEEE 802.11 Wireless LAN
Standard
• Just as the IEEE 802.3 standard defines the physical and
datalink aspects of wired Ethernet, the 802.11 standard
defines the same aspects of a wireless LAN (WLAN).
• Wireless networking offers a number of advantages,
most notably:
o Making networking easier and less costly in areas that would
be challenging or impossible to wire
o Increasing user mobility
The IEEE 802.11 Wireless LAN
Standard
• At the same time, the network administrator must be prepared
for the unique issues and challenges posed by WLAN setup and
maintenance -- understanding the technologies involved.
• 802.11 defines three main areas of wireless networking
o The Physical layer, which concerns the lower-level data transmission
technologies. This usually uses either of two EMR types: Radio (usually)
or Infrared (rarely)
o The MAC (media access control) layer, which handles data reliability,
access, and security
o The actual protocols and services for managing the previous
Wireless Network Topology
• We can identify two primary WLAN topologies:
o Basic Service Set (BSS)
o Extended Service Set (ESS)
• In BSS, all clients communicate directly, having recognized and
linked wirelessly with one another (Figure 4-1)
o This is also known as ad hoc networking
o A BSS topology can be improved upon by adding an access point
An access point is a transceiver (transmitter/receiver) that connects a WLAN to a
wired LAN (Figure 4-2)
Here, communication between a wireless client and any other client will pass
through the access point
Wireless Network Topology
• An ESS topology enhances user mobility by incorporating
multiple access points (Figure 4-3)
o When a user passes from one access point's range into another, we call
this a hand-off
o Assuming the access points are arranged such that their signals overlap
sufficiently, the roaming user's hand-offs will appear relatively seamless.
• In the 802.11 standard, network access is handled using carrier
sense multiple access/collision avoidance (CSMA/CA).
o When the channel (i.e., the frequency) is quiet, a client may transmit.
o Otherwise, any other clients must wait.
Physical Layer Technologies
• We can begin discussion with some relevant terms...
• Frequency: How many wave cycles occur within a
given amount of time.
o Frequency is usually measured in hertz (Hz), such that 1 Hz
equals 1 cycle per second.
o Many of the terms that follow are defined in terms of
frequencies.
• As mentioned earlier, most wireless data transmission
takes place over the radio frequency (RF) portion of
the electromagnetic spectrum.
Physical Layer Technologies
• The RF spectrum is divided into bands, with definite
beginning and ending points.
o These may be very wide ranges, even in the hundreds or
thousands of MHz!
o A wireless communications system will be said to "operate
within" one or more bands.
o Frequency bands are often designated or reserved for specific
purposes. For example...
FM radio uses a band ranging roughly from 88 to 108 MHz
The AM radio band ranges from 535 to 1605 kHz
Source: http://hyperphysics.phy-astr.gsu.edu/hbase/audio/radio.html
Physical Layer Technologies
•These are some bands +========+===============+===================+
defined by the | Band | | Frequency ranges |
| number | Abbreviations | (lower exclusive, |
International | | (key below) | upper inclusive) |
Telecommunications +========+===============+===================+
Union, a body of the | 3 | ULF | 300-3000 Hz |
+--------+---------------+-------------------+
United Nations that | 4 | VLF | 3-30 kHz |
+--------+---------------+-------------------+
| 5 | LF | 30-300 kHz |
deals with issues related +--------+---------------+-------------------+
| 6 | MF | 300-3000 kHz |
to communication and +--------+---------------+-------------------+
| 7 | HF | 3-30 MHz |
information +--------+---------------+-------------------+
| 8 | VHF | 30-300 MHz |
technologies +--------+---------------+-------------------+
| 9 | UHF | 300-3000 MHz |
+--------+---------------+-------------------+
Key: | 10 | SHF | 3-30 GHz |
+--------+---------------+-------------------+
| 11 | EHF | 30-300 GHz |
F = "frequency" +--------+---------------+-------------------+
L = "low", M = "medium", H = "high"
V = "very", U = "ultra", S = "super", E = "extremely"
Source: https://www.itu.int/dms_pubrec/itu-r/rec/v/R-REC-V.431-8-201508-I!!PDF-E.pdf
Physical Layer Technologies
• There is a group of bands called the "ISM" bands -- short
for "industrial, scientific, and medical". Wi-Fi technology
uses two of those bands:
o 2.4 GHz (2.4-2.5 GHz)
o 5 GHz (~5.15-5.815 GHz)
• Not all frequencies in those bands are necessarily
available for wireless networking, though
• There are various regulatory bodies and agencies that
make these determinations.
Physical Layer Technologies
• In terms of networking, a channel can be generally
defined as a conduit for signal transmission.
o For a wired networks, the channels would be tangible objects --
i.e., the cables.
o On WLANs, however, EMR is the transmission medium, so
"channels" are defined in terms of frequency ranges.
o Specifically, a frequency band is divided into channels.
o Ifa channel has many devices trying to broadcast at once, there
can be issues of co-channel congestion -- where everyone has
to "wait their turn".
Physical Layer Technologies
• Example: The FM radio band -- ranging 88 to 108 MHz
-- has 100 channels
o Each channel is a 200 kHz (0.2 MHz) range within the whole:
o The first channel starts at the beginning of the band, and the
last channel ends at the end of the band.
oA channel is identified by its center frequency -- a.k.a., carrier
frequency -- so...
The first FM channel is 88.1 (88.0-88.2) MHz
The following frequencies proceed by increments of 0.2: 88.3, 88.5, ...
...until the last FM channel, which is 107.9 (107.8-108.0) MHz
Physical Layer Technologies
• The bandwidth surrounding the carrier frequency is used
for modulation, as well as providing a buffer before the
next channel.
o What is modulation?
o For example, how do AM and FM radio differ?
• Another variable of importance is signal power or received
signal strength of a transmission
o This is typically measured in units of decibel-milliwatts (dBm).
o You need not understand the mathematics behind this unit.
Physical Layer Technologies
• The received signal strength value will usually be between
-10 and -100 dBm
o The
closer the value is to zero, the better your signal. For
example, a signal of -20 dBm is much better than -95 dBm
o Many factors -- both hardware-related and environmental --
can affect the value.
o Asa general rule, the value will worsen with increasing distance
from the signal origin.
• Source: https://www.accuware.com/support/knowledge-base/
what-is-the-signal-strength-rss/
Physical Layer Technologies
• If you recall, the original IEEE 802.11 standard was
released in 1997.
• Since then, there have been new standards, in the form of
regular amendments.
o Theseamendments are usually indicated by appending
alphabetical suffixes ("a", "b", "ac", etc.) to the more general
"802.11" designation -- leading to names like "802.11b" and
"802.11ac".
o Collectively, we may call them the 802.11x standards.
Physical Layer Technologies
• Here are some of the more relevant ones:
+========+===============+===============+==================+
| Suffix | Data Rates | Range | Frequencies |
+========+===============+===============+==================+
| a | Up to 54 Mbps | Up to 75 ft. | 5 GHz |
+--------+---------------+---------------+------------------+
| b | Up to 11 Mbps | 100-150 ft. | 2.4 GHz |
+--------+---------------+---------------+------------------+
| g | Up to 54 Mbps | Up to 150 ft. | 2.4 GHz |
+--------+---------------+---------------+------------------+
| n | 200+ Mbps | Up to 150 ft. | 2.4 GHz or 5 GHz |
+--------+---------------+---------------+------------------+
| ac | Up to 1 Gbps | 115 ft.* | 5 GHz |
+--------+---------------+---------------+------------------+
* http://litepoint.com/whitepaper/80211ac_Whitepaper.pdf
1 6 11
Physical Layer Technologies
• Because the channel widths exceed the distance
between two adjacent carrier frequencies, some of the
channels overlap.
o Thiscan create an issue called adjacent channel
interference, which is analogous to crosstalk in wired
channels.
o Thiscan actually be more problematic than co-channel
interference.
o Oneway to avoid this is for devices restrict themselves to
non-overlapping channels: 1, 6, and 11
Physical Layer Technologies
• Finally, OFDM (orthogonal frequency division
multiplexing) divides a channel into sub-channels.
o Data can be sent over those sub-channels in parallel.
o Although the sub-channels may be overlapping, they will not
interfere with one another – which is what the term
"orthogonal" indicates.
o This allows for potentially higher data rates.
o At the same time, it consumes more power.
Physical Layer Technologies
• Different 802.11x standards use different signal
modulation technologies
o 802.11a uses OFDM technology, in the 5-GHz band
o 802.11b, operating in the 2.4-GHz band, uses DSSS.
o 802.11g uses both DSSS and OFDM.
Because g operates in the same frequency band as b, devices
for both standards are mutually interoperable.
This simplifies upgrading a 802.11b network to g
Physical Layer Technologies
o 802.11n also uses both DSSS and OFDM, while operating in
both wireless bands: 2.4 GHz and 5 GHz
It incorporates a technique called MIMO (multiple input, multiple
output), which splits data streams into multiple parts .
This increases the data rate, but it also consumes more power.
o 802.11ac uses OFDM, operating in the 5GHz band. It features
a number of improvements over predecessors and allows for
higher data rates:
MUMIMO (multiuser MIMO) -- a variation on MIMO that splits the data
stream 8 ways and has wider (80 MHz!) channels
Beamforming -- The ability to direct signal to a specific device
Physical Layer Technologies
o There are two other amendments of note:
802.11i: Improved data encryption on 802.11a/b/g
802.11r: Speedier hand-offs -- crucial in the event
voice traffic becomes more common.
Wireless (WiFi) Networking
• A wireless-capable device will have a wireless adapter
that allows it to connect to an RF channel.
o An example is the wireless NIC in your laptop or smartphone
o This adapter will provide three services:
Data delivery
Authentication -- ensuring you are a valid and allowed user
Privacy
o WiMAX
o RFID
o Mobile
o Headphones
Verification of key is the basis for establishing that the client is allowed on the network
WLAN Security
• Shared-key encryption is particularly vulnerable to malicious
cracking attempts, but it is better than no security at all.
o WEP was retired by the 802.11 standard
o However, it is still widely in use
• A better option is Wi-Fi Protected Access (WPA):
o WPA (c. 2003) made substantial improvements over WEP in terms of
encryption and authentication.
o WPA2 (c. 2004) improved upon this with more sophisticated encryption
methods.
• There are many options for wireless security, requiring substantial
decision-making by the network admin.