Unit II
Unit II
Unit II
Wireless Networks
Unit II - WIRELESS LOCAL
AND PERSONAL AREA
NETWORKS
Dr.S.Kavi Priya
[email protected]
9842295563
Wireless LAN Technology
Wireless LAN
Use of a wireless transmission medium for a local area network
Backbone wired LAN, such as Ethernet, that supports servers,
workstations, and one or more bridges or routers to link with
other networks
Control Module (CM) – interface (bridge or router) to a
wireless LAN and uses access control logic, like polling or
token-passing
Hubs or other user modules (UMs) - control a number of
stations off a wired LAN, a part of wireless LAN configuration
Single-cell Wireless LAN
Multiple-cell Wireless LAN
Wireless LAN Applications
LAN Extension
Cross-building interconnect
Nomadic Access
Ad hoc networking
LAN Extension
Wireless LAN linked into a wired LAN on
same premises
Wired LAN
Backbone
Support servers and stationary workstations
Wireless LAN
Stations in large open areas
Manufacturing plants, stock exchange trading
floors, and warehouses
Cross-Building Interconnect
Connect LANs in nearby buildings
Wired or wireless LANs
Point-to-point wireless link is used
Devices connected are typically bridges or
routers
Nomadic Access
Wireless link between LAN hub and mobile
data terminal equipped with antenna
Laptop computer or notepad computer
Uses:
Transfer data from portable computer to office
server
Extended environment such as campus
Ad Hoc Networking
Temporary peer-to-peer network set up to meet immediate need
peer collection of stations within the range of each other may
dynamically configure themselves into a temporary network using
Bluetooth, ZigBee etc.
Example: Group of employees with laptops convene for a meeting; employees
link computers in a temporary network for duration of meeting
WLAN Capabilities
Cellular data offloading: Spectrum available in mobile cellular networks is limited and
costly to consumers. Mobile devices such as smartphones, laptops, and tablets can use
higher capacity WLANs in high density locations such as shopping malls, enterprises,
universities, and even sporting venues.
Sync/file transfer: Multi-gigabit Wi-Fi (Wireless Fidelity) allows synchronization between
devices 10 times faster than previous Wi-Fi that eliminates the need to use cables to
synchronize mobile devices
Internet Access: Multi-gigabit Wi-Fi enables faster Internet access, eliminating any
significant bottlenecks from the WLAN.
Multimedia Streaming: Streaming uncompressed video can require 3 Gbps, and streaming
of compressed video has issues of quality and latency. Wi-Fi can be more suitable than
other proposed wireless approaches because of its larger deployment, user awareness,
support for IP networking, ease of connection, and standardized security mechanism.
Wireless LAN Requirements
Throughput
Number of nodes
Connection to backbone LAN
Service area
Battery power consumption
Transmission robustness and security
Collocated network operation
License-free operation
Handoff/roaming
Dynamic configuration
Wireless LAN Physical Layer
Use unlicensed spread spectrum and OFDM techniques shared by many users
Except for quite small offices, a wireless LAN makes use of a multiple-cell arrangement
Adjacent cells make use of different center frequencies within the same band to avoid
interference
Within a given cell, the topology can be either hub or peer to peer
In a hub topology, the hub is typically mounted on the ceiling and connected to a
backbone wired LAN to provide connectivity to stations
The hub may also control access, as in the IEEE 802.11 point coordination by acting as a multiport repeater
In this case, all stations in the cell transmit only to the hub and receive only from the hub
Alternatively, and regardless of access control mechanism, each station may broadcast using an
omnidirectional antenna so that all other stations in the cell may receive; this corresponds to a logical bus
configuration.
One other potential function of a hub is automatic handoff of mobile stations
A peer-to-peer topology is one in which there is no hub. A MAC algorithm such as
carrier sense multiple access (CSMA) is used to control access. This topology is
appropriate for ad hoc LANs.
Wireless LAN Physical Layer
Necessary characteristic of a wireless LAN is
licensing regulations that differ from one country
to another, which complicates
Spread spectrum wireless LANs operate using
either direct sequence spread spectrum (DSSS) or
OFDM
Recent advances using OFDM, along with
channel bonding and multiuser multiple-input-
multiple-output (MIMO), have increased channel
rates to well over 1 Gbps.
IEEE 802 Architecture
working group developed for prominent specifications of WLANs
Protocol Architecture
Functions of physical layer:
Encoding/decoding of signals (e.g., PSK, QAM, etc.)
Preamble generation/removal (for synchronization)
Bit transmission/reception
Includes specification of the transmission medium and the topology
Physical layer subdivided into sublayers in IEEE 802.11:
Physical layer convergence procedure (PLCP): Defines a method of mapping
802.11 MAC layer protocol data units (MPDUs) into a framing format suitable for
sending and receiving user data and management information between two or more
stations using the associated PMD sublayer.
Physical medium dependent (PMD) sublayer: Defines the characteristics of, and
method of transmitting and receiving, user data through a wireless medium between
two or more stations.
Protocol Architecture
Functions of Medium Access Control (MAC) Layer:
On transmission, assemble data into a frame with address and error detection fields
On reception, disassemble frame and perform address recognition and error detection
Govern access to the LAN transmission medium
Functions of Logical Link Control (LLC) Layer:
Provide an interface to higher layers and perform flow and error control
Note: Separation of MAC & LLC is done for the following reasons:
The logic required to manage access to a shared-access medium is not found
intraditional layer 2 data link control
For the same LLC, several MAC options may be provided
Protocol Architecture
MAC Frame Format
MAC control
Contains Mac protocol information E.g. Priority level
Destination MAC address
Destination physical attachment point on LAN for this frame
Source MAC address
Source physical attachment point
CRC
Cyclic Redundancy Check (Also called Frame Check Sequence
(FCS) error-detecting code to detect errors and discarding any
frames that are in error
Logical Link Control
Keeps track of which frames have been successfully received and
retransmits unsuccessful frames
Concerned with the transmission of a link-level PDU between two
stations, without the necessity of an intermediate switching node
Specifies the mechanisms for addressing stations across the
medium and for controlling the exchange of data between two
users based on HDLC
Characteristics of LLC not shared by other control protocols:
Must support multiaccess, shared-medium nature of the link
Relieved of some details of link access by MAC layer
LLC Services
Unacknowledged connectionless service
datagram-style service that requires minimum logic
No flow and error control mechanisms
Data delivery not guaranteed
Useful since allow higher layers of software like TCP to provide the necessary
reliability and flow control mechanism and avoids duplicating them
Useful since it avoids overhead of connection establishment and maintenance
Connection-mode service
Similar to HDLC
Logical connection set up between two users
Flow and error control provided
Implemented in very simple devices
LLC Services
Acknowledged connectionless service
Cross between previous two
Datagrams acknowledged
No prior logical connection is setup
LLC maintain table for each active connection, to keep track of the
status of that connection
Example: automated factory environment where a central site
communicate with a large number of processors and programmable
controllers and handling of important time-critical alarm or emergency
control signals in which user might not want to take the time to
establish a logical connection and then send the data.
Vendor provide these services as options that customer can select when purchasing the equipment
Differences between LLC and HDLC
LLC uses asynchronous balanced mode of operation of
HDLC (type 2 operation) to support connection-mode
LLC service
LLC supports unacknowledged connectionless service
(type 1 operation) using unnumbered information PDU
with error detection and discard at the MAC level
LLC supports acknowledged connectionless service (type
3 operation) using two new unnumbered PDUs
LLC permits multiplexing using LLC Service Access
Points (LSAPs)
LLC PDU
LLC
Destination Service Access Point (DSAP) - 7-bit destination address and source -
One bit of DSAP indicates whether DSAP is an individual or group address
Service Access Point (SSAP) - 7-bit source address - One bit of the SSAP indicates
whether the PDU is a command or response PDU
Two other PDU types, XID and TEST, are used to support management functions
associated with all three types of operation:
An LLC entity may issue a command (C/R bit = 0) XID or TEST
Receiving LLC entity issues a corresponding XID or TEST in response
XID PDU is used to exchange two types of information: types of operation supported
and window size
TEST PDU is used to conduct a loopback test of the transmission path between two
LLC entities
Upon receipt of a TEST command PDU, the addressed LLC entity issues a TEST
response PDU as soon as possible.
IEEE 802.11 Standards
IEEE 802.11 Standards
IEEE 802.11 Standards
IEEE 802.11 Architecture
IEEE 802.11 Architecture
Basic Service Set (BSS) (also referred cell)
Smallest building block of WLAN
Consists of number of stations executing the same MAC protocol and competing for access to same
shared wireless medium
Isolated or connected to backbone DS through AP
Client stations do not communicate directly with one another
Association between station and BSS is dynamic since stations may turn off, come within range and
go out of range.
Access point (AP)
Functions as a bridge and a relay point
if one station in BSS wants to communicate with another station in the same BSS, the MAC frame
is first sent from the originating station to the AP, and then from the AP to the destination station
MAC frame from a station in the BSS to a remote station is sent from the local station to the AP and
then relayed by the AP over the DS on its way to the destination station
IEEE 802.11 Architecture
Distribution System (DS)
Can be a switch, a wired network (wired backbone LAN), or a wireless network
Independent BSS (IBSS)
Ad hoc network, When all the stations in the BSS are mobile stations, with no connection to
other BSSs
All stations communicate directly, and no AP is involved
Extended Service Set (ESS)
Two or more basic service sets interconnected by DS
Appears as a single logical LAN to the LLC level
Portal
Integrate the IEEE 802.11 architecture with a traditional wired LAN
Implemented in a device, such as a bridge or router, that is part of the wired LAN and attached to
the DS
IEEE 802.11 Services
Two ways of categorizing services
1. Service provider can be either the station or the DS. Station services are
implemented in every 802.11 station, including AP stations. Distribution
services are provided between BSSs; these services may be implemented
in an AP or in another special-purpose device attached to the distribution
system
2. Three of the services are used to control IEEE 802.11 LAN access and
confidentiality. Six of the services are used to support delivery of MAC
service data units (MSDUs) between stations. The MSDU is the block of
data passed down from the MAC user to the MAC layer; typically this is
an LLC PDU. If the MSDU is too large to be transmitted in a single MAC
frame, it may be fragmented and transmitted in a series of MAC frames
IEEE 802.11 Services
Distribution of Messages Within a DS
Distribution service
Used by stations to exchange MAC frames from station in one BSS to station in another
BSS through DS. Example: To send frames from STA 2 to STA 7; Frame sent from
STA 2 to STA 1(AP for this BSS), AP gives frame to DS, DS directs frame to AP
associated with STA 5 in the target BSS, STA 5 receives frame and forwards it to STA
7
If communicating two stations are within the same BSS, then distribution service goes
single AP of that BSS.
Integration service
Transfer of data between station on wired IEEE 802.11 LAN (physical connection) and
station on integrated IEEE 802.x LAN (logical connection)
Takes care of any address translation and media conversion logic required for exchange
of data
Association-Related Services
Primary purpose of MAC layer is to transfer MSDUs between MAC entities by distribution service
that requires information about stations within the ESS, which is provided by the association-
related services.
Before distribution service can deliver data to or accept data from a station, that station must be
associated.
Transition Types Based On Mobility
No transition
Stationary or moves only within BSS (direct communication range)
BSS transition
Station moving from one BSS to another BSS within same ESS
Delivery of data to the station requires addressing capability to recognize new location of station
ESS transition
Station moving from BSS in one ESS to BSS within another ESS
disruption of service likely to occur
Association-Related Services
To deliver message within DS, the distribution service needs to know where destination
station is located i.e DS needs to know the identity of the AP to which the message should be
delivered to reach the destination station. To meet this requirement, a station must maintain
an association with the AP within its current BSS. Three services relate to this requirement:
Association
Establishes initial association between station and AP within BSS
AP communicate with other APs within ESS to facilitate routing and delivery of addressed frames
Reassociation
Enables transfer of association from one AP to another, allowing station to move from one BSS to
another
Disassociation
Association termination notice from AP or station before leaving an ESS or shutting down. MAC
management facility protects itself against stations that disappear without notification
IEEE 802.11 Medium Access Control
MAC layer covers three functional areas:
Reliable data delivery
Access control
Security
Reliable Data Delivery
Noise, interference, and other propagation effects result in the loss of a significant number
of frames. Even with error-correction codes
More efficient to deal with errors at the MAC level than higher layer(like TCP)
Frame exchange protocol
Source station transmits data
Destination responds with acknowledgment (ACK)
If source doesn’t receive ACK within short time, it retransmits frame
Exchange treated as atomic unit, not interrupted other station transmission
Four frame exchange
Source issues Request To Send (RTS)
Destination responds with Clear To Send (CTS)
Source transmits data
Destination responds with ACK
RTS/CTS alerts all other stations within range to avoid transmission in order to avoid
collision
Medium Access Control
Distributed Access Protocols:
distribute the decision to transmit over all the nodes using a
carrier-sense mechanism
Good for ad hoc network of peer workstations with bursty
traffic
Centralized Access Protocols:
involve regulation of transmission by a centralized decision
maker
good for base station that attaches to a backbone wired LAN
which have time sensitive or high priority data
IEEE 802.11 Protocol Architecture
IEEE 802.11 Protocol Architecture
Distributed Foundation Wireless MAC (DFWMAC)
Distributed Coordination Function (DCF):
Lower sublayer of the MAC layer uses a contention algorithm (like
medium is idle, the station may transmit; otherwise the station must
wait until the current transmission is complete before transmitting
Does not include a collision detection function
Point coordinator makes use of PIFS when issuing polls because PIFS is
smaller than DIFS, the point coordinator can seize the medium and lock
out all asynchronous traffic while it issues polls and receives responses
Point coordinator lock out all asynchronous traffic by repeatedly issuing
Acknowledgment
(AP) for that BSS in which secure communication is assured if each STA
establishes secure communications with AP
2.Two wireless stations (STAs) in the same ad hoc IBSS communicating
directly with each other i.e security is only provided within STA
3.Two wireless stations in different BSSs communicating via their respective
APs across a distribution system which provides security only within each
BSS
4.A wireless station communicating with an end station on a wired network
via its AP and the distribution system i.e security is only provided between
the STA and its AP
IEEE 802.11i Phases of Operation
IEEE 802.11i Phases of Operation
1. Discovery: An AP uses messages called Beacons and Probe Responses to advertise its
IEEE 802.11i security policy; STA uses these to identify an AP for a WLAN with which
it wishes to communicate; Select cipher suite and authentication mechanism when the
Beacons and Probe Responses present a choice; Has three exachanges:
a) Network and security capability discovery - STAs discover the existence of a network with which to
communicate. The AP either periodically broadcasts its security, indicated by RSN IE (Robust Security
Network Information Element), in a specific channel through the Beacon frame, or it responds to a
station’s Probe Request through a Probe Response frame. A wireless station may discover available access
points and corresponding security capabilities by either passively monitoring the Beacon frames or
actively probing every channel
b) Open system authentication - maintain backward compatibility with the IEEE 802.11 state machine, as
implemented in existing IEEE 802.11 hardware. In essence, the two devices (STA and AP) simply
exchange identifiers
c) Association - agree on a set of security capabilities to be used. The STA then sends an Association
Request frame to the AP. In this frame, the STA specifies one set of matching capabilities from among
those advertised by the AP. If there is no match in capabilities between the AP and the STA, the AP
refuses the Association Request. The STA blocks it too, in case it has associated with a rogue AP or
someone is inserting frames illicitly on its channel
IEEE 802.11i Phases of Operation
2. Authentication: STA and AS prove their identities to each other; AP blocks non-
authentication traffic between STA and AS until authentication transaction is successful;
AP does not participate in authentication transaction other than forwarding traffic between
the STA and AS; Has three phases:
a)Connect to AS - STA sends a request to its AP (the one with which it has an association)
for connection to the AS. The AP acknowledges this request and sends an access request to
the AS
b)EAP exchange - authenticates the STA and AS to each other. A number of alternative
exchanges are possible
c)Secure key delivery - Once authentication is established, the AS generates a master
session key (MSK), also known as the Authentication, Authorization, and Accounting
(AAA) key, and sends it to the STA. All the cryptographic keys needed by the STA for
secure communication with its AP are generated from this MSK. Whatever method is used,
it involves the transmission of an MPDU containing an encrypted MSK from the AS, via
the AP, to the STA.
IEEE 802.11i Phases of Operation
3. Key generation and distribution: AP and STA perform operations to generate cryptographic keys
and placed on the AP and STA that only exchanges frames
4. Protected data transfer: Frames are exchanged between the STA and the end station through the
AP; Encryption module icon, secure data transfer occurs between the STA and the AP only; security is
not provided end-to-end. two schemes for protecting data transmitted in 802.11 MPDUs:
Temporal Key Integrity Protocol (TKIP) - require only software changes to devices that are
P
S
SB S
SB
SB M P
SB SB S
SB
SB
SB P
SB
SB SB
payload (30)
DV audio (10) header (1) payload (0-9) 2/3 FEC CRC (2)
(bytes)
SLAVE
f1 f7 f9
1 f13 f19
SLAVE
f5
2 f17 f21