Wildpacket'S Guide To Wireless Lan Analysis: All Rights Reserved
Wildpacket'S Guide To Wireless Lan Analysis: All Rights Reserved
Table of Contents
Introduction to wireless networking........................................................... 1
The increasing need for wireless LAN analysis ........................................................ 1 Development of the IEEE 802.11b standard ............................................................. 2 Radio frequencies and channels ................................................................................. 2 Collision avoidance and media access ....................................................................... 3 Wireless LAN topologies ............................................................................................ 4 Authentication and privacy ......................................................................................... 6
Conclusion.................................................................................................. 14
AiroPeek protocol analyzer .......................................................................................15 About WildPackets, Inc. ............................................................................................16
IEEE 802.11b
Physical
Figure 1 802.11 and the 0SI Model
Radio waves broadcast on a given frequency can be picked up by any receiver within range tuned to that same frequency. Effective or usable range depends on signal power, distance and interference from intervening objects or other signals. Information is carried by modulating the radio waves. In spread spectrum technologies, additional information is packed into a relatively small range of frequencies (a section of bandwidth called a channel) by having both sender and receiver use a pre-determined set of codes, such that each small modulation of the radio wave carries the greatest possible information. The term Direct Sequence Spread Spectrum in DSSS refers to one particular approach to packing more data into a given piece of RF spectrum -- more data in the channel. The FCC in the United States and other bodies internationally control the use of RF spectrum and limit the output power of devices. The 802.11b WLAN standard attempts to deliver maximum performance within the limits set by these bodies, current radio technology and the laws of physics. Low output power, for example, limits 802.11b WLAN transmissions to fairly short effective ranges, measured in hundreds of yards. In addition, the nature of radio waves and of spectrum spreading technology means that signal quality, and hence network throughput, diminishes with distance and interference. The higher data rates rely on more complex spectrum spreading techniques. These in turn require an ability to distinguish very subtle modulations in the RF signal. To overcome signal degradation problems, 802.11b WLANs can gracefully step down to a slower but more robust transmission method when conditions are poor, then step back up again when conditions improve. The full set of data rates in 802.11b WLANs is 11 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps. The 2.4 GHz band (2.40 GHz to 2.45 GHz) in US implementations is divided into 11 usable channels. To limit interference, any particular 802.11b WLAN network will use less than half of these in operation. All network hardware is built to be able to listen or transmit on any one of these channels, but both sender and receiver must be on the same channel in order to communicate directly.
Figure 2
Ethernet uses CSMA/CD (carrier sense multiple access with collision detection). This is possible because an Ethernet device can send and listen to the wire at the same time, detecting the pattern that shows a collision is taking place. When a radio attempts to transmit and listen on the same channel at the same time, its own transmission drowns out all other signals. Collision detection is impossible. The carrier sense capability of Ethernet and WLANs is also different. On an Ethernet segment, all stations are within range of one another at all times, by definition. When the medium seems clear, it is clear. Only a simultaneous start of transmissions results in a collision. As shown in Figure 2, nodes on a WLAN cannot always tell by listening alone whether or not the medium is in fact clear. In a wireless network a device can be in range of two others, neither of which can hear the other, but both of which can hear the first device. The access point in Figure 2 can hear both node A and node B, but neither A nor B can hear each other. This creates a situation where the access point could be receiving a transmission from node B without node A sensing that node B is transmitting. Node A, sensing no activity on the channel, might then begin transmitting, jamming the access points reception of node Bs transmission already under way. This is known as the hidden node problem. To solve the hidden node problem and overcome the impossibility of collision detection, 802.11b WLANs use CSMA/CA (carrier sense multiple access with collision avoidance). Under CSMA/CA devices use a four-way handshake (Figure 3) to gain access to the airwaves to ensure collision avoidance. To send a direct transmission to another node, the source node puts a short Request To Send (RTS) packet on the air, addressed to the intended destination. If that destination hears the transmission and is able to receive, it replies with a short Clear to Send (CTS) packet. The initiating node then sends the data, and the recipient acknowledges all transmitted packets by returning a short ACK (Acknowledgement) packet for every transmitted packet received.
Source Destination
RTS
CTS
Data
ACK
Figure 3
Timing is critical to mediating access to the airwaves in WLANs. To ensure synchronization, access points or their functional equivalents periodically send beacons and timing information.
The more complex topologies, referred to as infrastructure topologies, include at least one access point or base station. Access points provide synchronization and coordination, forwarding of broadcast packets and, perhaps most significantly, a bridge to the wired network. The standard refers to a topology with a single access point as a Basic Service Set (BSS) as shown in Figure 2. A single access point can manage and bridge wireless communications for all the devices within range and operating on the same channel.
Figure 4
To cover a larger area, multiple access points are deployed. This arrangement (shown in Figure 5) is called an Extended Service Set (ESS). It is defined as two or more Basic Service Sets connecting to the same wired network. Each access point is assigned a different channel wherever possible to minimize interference. If a channel must be reused, it is best to assign the reused channel to the access points that are the least likely to interfere with one another.
Figure 5
Extended Service Set (ESS) supports roaming from one cell to another.
When users roam between cells or BSSs, their mobile device will find and attempt to connect with the access point with the clearest signal and the least amount of network traffic. In this way, a roaming unit can transition seamlessly from one access point in the system to another, without losing network connectivity.
An ESS introduces the possibility of forwarding traffic from one radio cell (the range covered by a single access point) to another over the wired network. This combination of access points and the wired network connecting them is referred to as the Distribution System (DS). Messages sent from a wireless device in one BSS to a device in a different BSS by way of the wired network are said to be sent by way of the distribution system or DS. Note: To meet the needs of mobile radio communications, the 802.11b WLAN standard must be tolerant of connections being dropped and reestablished. The standard attempts to ensure minimum disruption to data delivery, and provides some features for caching and forwarding messages between BSSs. Particular implementations of some higher layer protocols such as TCP/IP may be less tolerant. For example, in a network where DHCP is used to assign IP addresses, a roaming node may lose its connection when it moves across cell boundaries and have to reestablish it when it enters the next BSS or cell. Software solutions are available to address this particular problem. In addition, IEEE may revise the standard in ways that mitigate this problem in future versions. Whether they have one base station or many, most corporate WLANs will operate in infrastructure mode to access servers, printers, Internet connections and other resources already established on wired networks. Even users seeking an all wireless solution may find that an access point does a better job of mediating communications with an Internet connection, for example, and is worth the additional expense.
key lengths, WEP is still the door to an office, not a bank vault. Any of these levels of encryption serves the primary purpose of WEP quite well. Because WEP encrypts all the data above the 802.11b WLAN layers, it can prevent network analysis tools from decoding higher level network protocols, and so prevent accurate troubleshooting of problems with TCP/IP, IPX, NetBEUI and so forth. To overcome this limitation, network analysis tools should allow users to specify the WEP shared key set for their network so they can decode the network data contained in 802.11b WLAN packets in the same way that every other station on the users network does. Note: Although it is possible to implement WEP with open authentication, this is strongly discouraged as it leaves the door open for intruders to collect enough information to compromise the security of WEP.
MAC Header
LLC (opt)
Network Data
FCS
Figure 6
Because 802.11b WLANs must be able to form and re-form their membership constantly, and because radio transmission conditions themselves can change, coordination becomes a large issue in WLANs. Management and control packets are dedicated to these coordination functions. In addition, the headers of ordinary data packets contain a great deal more information about network conditions and topology than, for example, the headers of Ethernet data packets would contain.
802.11 MAC header (WLAN)
Duration ID 2 Bytes
Address 1 6 Bytes
Address 2 6 Bytes
Figure 7
End Delimiter
Packet structure
All the functionality of the protocol is reflected in the packet headers. RF technology and station mobility impose some complex requirements on 802.11b WLAN networks. This added complexity is reflected in the long physical layer convergence protocol (PLCP) headers as well as the data-rich MAC header.
802.11 packet structure
OSI Physical (PHY) layer OSI Data Link layer higher OSI layers packet trailer
A complete breakout of all the fields in the packet headers and the values they may take is beyond the scope of this white paper. Instead, Table 1 below presents a list of the types of information 802.11b WLAN data packet headers convey. The table also shows the types of information carried in management and control packets. Table 1 Protocol functions in 802.11b WLANs
Info Type
Authentication / Privacy
Usage
The first step for a device in joining a BSS or IBSS is authentication. This can be an open or a shared key system. If WEP encryption of packet data is enabled, shared key authentication should be used. Authentication is handled by a request/response exchange of management packets. This is the name under which the current station authenticated itself on joining the network. If this field is true, then the payload of the packet (but not the WLAN headers) will be encrypted using Wired Equivalent Privacy. The second step for a device joining a BSS or IBSS is to associate itself with the group, or with the access point. When roaming, a unit also needs to disassociate and reassociate. These functions are handled by an exchange of management packets. The current status is shown in packet headers. Packets can show the current association of the sender. Association and Reassociation are handled by request/response management packets. Disassociation is a simple declaration from either an access point or a device. The ID of the group or its access point. A device can only be associated with one access point (shown by the ESSID) or IBSS at a time. These are request/response management packets used by roaming devices in search of a particular BSS or access point. They support a roaming units ability to move between cells while remaining connected. The 802.11b WLAN protocol supports rapid adjustment to changing conditions, always seeking the best throughput. the channel used for this transmission. the data rate used to transmit this packet.
association
IBSSID or ESSID
probe
Table 1
Info Type
fragmentation
Usage
802.11b WLANs impose their own fragmentation on packets, completely independent of any fragmentation imposed by higher level protocols such as TCP/IP. A series of short transmissions is less vulnerable to interference in noisy environments. This fragmentation is dynamically set by the protocol in an effort to reduce the number, or at least the cost, of retransmissions. Several kinds of synchronization are important in WLANs. Network management packets called beacon packets keep members of a BSS synchronized. In addition, devices report the state of their own internal synchronization. Finally, all transmissions contain a timestamp. Laptops in particular need to conserve power. To facilitate this, the protocol uses a number of fields in data packets plus the PS-Poll (power save-poll) control packet to let devices remain connected to the network while in power save mode. While the protocol as a whole actually controls the transmission of data, certain header fields and control packets have this as their particular job: These are control packets used in the four way handshake in support of collision avoidance. The version of the 802.11 protocol used in constructing the packet. The type of packet (data, management, or control), with a sub-type specifying its exact function. In support of synchronization and orderly access to the airwaves, packets contain a precise value for the time that should be allotted for the remainder of the transaction of which this packet is a part. Packet length Retransmissions are common. It is important to declare which packets are retransmissions. Sequence information in packets helps reduce retransmissions and other potential errors. Some data, such as voice communications, must be handled in strict order at the receiving end.
synchronization
power save
Transmission control
Table 1
Info Type
Routing
addresses
Usage
Again, many fields are related to routing traffic, but the following are most directly related: There are four address fields in 802.11b WLAN data packets, instead of the two found in Ethernet or IP headers. This is to accommodate the possibility of forwarding to, from, or through the distribution system (DS). In addition to the normal Destination and Source addresses, these fields may show the Transmitter, the Receiver, or the BSS ID. Which of the address fields shows what address depends on whether (and how) the packet is routed by way of the DS. Control and management packets need only three address fields because they can never be routed both to and from (that is, through) the DS. In an ESS, traffic can be routed from a device using one access point to a device using a different access point somewhere along the wired network. These fields describe routing through the distribution system (DS) and tell the receiving device how to interpret the address fields. Access points can cache data for other devices. This serves both roaming across BSS or cell boundaries and the power save features. When a device receives a message from an access point, it may be told the access point has more data waiting for it as well.
to/from DS
more data
10
Figure 8
For example, where interference is high, 802.11b WLAN nodes will continue to increase fragmentation, simplify spectrum spreading techniques and decrease transmission rates. Another symptom of high interference is increased retransmissions, especially when they occur despite high fragmentation. While some network applications may show no ill effects from this condition, others may begin to lag with too many retransmissions of packets already reduced well below their most efficient transmission size. Remember that 802.11b WLAN packet headers are quite large. This means high overhead and a low usable data rate when packet fragmentation and retransmissions are both high. If only one
11
or two network applications seem to be affected, it may not be immediately obvious that there is a more general problem. Using a wireless packet analyzer in such a case can quickly determine the state of the network. Possible sources of interference can be examined and the results tested in near real time. 802.11b WLAN BSSs and ESSs also have the ability to dynamically configure themselves, associating and reassociating roaming nodes, first with one access point and then with another. The physical location and RF channel used by each access point must be chosen by humans, however. These choices can lead to smooth network functioning or to unexpected problems. To help evaluate network topologies, a packet analyzer must be able to display signal strength and transmission rate for each packet found on a given channel. Further, the user must have control over what channel -- better still, which base station -- the packet analyzer will scan. With these tools, a packet analyzer can be used to build a picture of conditions at the boundaries between cells in an ESS. Such a survey may find dead spots in a particular configuration or identify places where interference seems to be unusually high. Solving the problem may require changing the channel of one or more access points, or perhaps moving one or more to a new location. The effects of each change can quickly be monitored with a packet analyzer.
Figure 9
Packet analyzers cannot detect eavesdroppers. They can detect failed authentication attempts, however. If a packet analyzer has a filtered or triggered start capture system, such an analyzer can be set to scan continuously for failed authentication attempts, capturing all the traffic exchanged in these attempts and making it possible to identify the potential attacker. In a similar way, packet analyzers with sophisticated filtering can be set to watch for WEP encrypted traffic to or from any MAC address which is NOT a known user of the system.
12
Figure 10
In an all-wireless environment, the only way to troubleshoot higher level protocols like IPX and TCP/IP protocols is to capture the packets off the air. In smaller satellite offices in particular, this all-wireless solution is increasingly common. It offers quick set up and can cover areas that would be awkward to serve with wiring, such as non-contiguous office spaces on the same floor. The only wired part of such networks may be the connection from the DSL modem, through the router to the access point. The actual troubleshooting of these higher level protocols is no different on a wired or a wireless LAN, provided the network analysis software can read the packets fully. If WEP is enabled, the protocol analyzer must be able to act like any other node on the wireless network and decode the packet payloads using the shared keys. Theoretically, of course, WEP is only an option and could be temporarily disabled. In practice, it is both unlikely and inadvisable that any WLAN should operate without WEP. Nor is it particularly simple to turn this function on and off at will. The ability to use WEP in the same way as all other nodes on the network must be built into the analyzer.
13
Conclusion
The competitive advantage of wireless networks is evident in the flexibility, mobility, and interoperability of WLANs standing alone or in conjunction with existing conventional networks. As corporate operations increasingly rely on wireless networks for effective and real-time communication, the ability to analyze and troubleshoot network problems in the wireless environment becomes critical to the management of network resources. WildPackets AiroPeek Protocol Analyzer is specifically designed to meet the challenges of network management in the wireless environment.
Figure 11
14
WIRELESS TERMS
Access Point Provides connectivity between wireless and wired networks. Ad Hoc Network Peer-to-Peer network of roaming units not connected to a wired network. Base Station Access Point. BSS Basic Service Set. Wireless network utilizing only one access point to connect to a wired network. Cell The area within range of and serviced by a particular base station or access point. CSMA/CA Carrier Sense Multiple Access with Collision Avoidance. CSMA/CD Carrier Sense Multiple Access with Collision Detection. CTS Clear To Send. DHCP Dynamic Host Configuration Protocol, used to dynamically assign IP addresses to devices as they come online. DS Distribution System. Multiple access points and the wired network connecting them. DSSS Direct Sequence Spread Spectrum. ESS Extended Service Set. A wireless network utilizing more than one access point. Frame A packet of network data, framed by the header and end delimiter. FHSS Frequency Hopping Spread Spectrum. IBSS Independent Basic Service Set or Ad Hoc Network. IEEE The Institute of Electrical and Electronics Engineers Infrastructure Wireless network topology utilizing access points to connect to a wired network. LLC Logical Link Control. MAC Media Access Control. NIC Network Interface Card. Roaming Traveling from the range of one access point to another, the ability to do so. RF Radio Frequency RTS Request To Send. WEP Wired Equivalent Privacy. WLAN Wireless Local Area Network.
15
AiroPeek v1.0 currently supports Cisco Systems' Aironet 340 series wireless LAN products. Support for additional wireless NICs will be added in future releases. System Requirements: AiroPeek is a Windows-based tool that operates under Win95/98/ NT/2000 and ME. AiroPeek v1.0 requires the installation of a special NDIS driver for the Cisco 340 series 11Mbps DSSS PC Card. This driver ships with AiroPeek. Enterprise customers who have standardized on WildPackets network management solutions and training include Motorola, Lucent Technologies and Cisco Systems.
WildPackets, Inc. 2540 Camino Diablo Walnut Creek, CA 94596 (925) 937-7900 http://www.wildpackets.com
16