1 802.11 Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Advertisements

Doc.: IEEE frfh Submission July 2004 Jon Edney, NokiaSlide 1 What is an ESS? Jon Edney, Nokia.
IEEE Overview Mustafa Ergen UC Berkeley
Medium Access Control Onno W. Purbo
IEEE Overview Onno W. Purbo
IEEE – Wi-Fi Dr. Sanjay P. Ahuja, Ph.D.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Wireless Network Security
Inter-Subnet Mobile IP Handoffs in b Wireless LANs Albert Hasson.
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
1 CSCD 439/539 Wireless Networks and Security Lecture 3 Wireless LAN Components and Characteristics Fall 2007 Some Material in these slides from J.F Kurose.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Networks.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
1 Network Architecture and Design Wireless & Mobile Systems IEEE WLAN.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CS, NCTU.
Wireless Local Area Networks (WLAN)
IE 419/519 Wireless Networks Lecture Notes #3 IEEE Wireless LAN Standard Part #1.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN, part 1 S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents IEEE WLAN architecture Basic routing example IAPP.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CSIE, NCTU.
Doc.: IEEE /0981r1 TGs Reference Architecture Considerations September 6, 2004 Tricci So & W. Steven Conner.Slide 1 TGs ESS Mesh System Reference.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
CWNA Guide to Wireless LANs, Second Edition
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 MAC Management. 2 Outline Introduction - Authentication, Association - Address filtering, Privacy - Power Management, Synchronization MAC Management.
Ch. 2 – and NICs Part 2 – MAC This presentation was originally developed by Prof. Rick Graziani, and modified by Prof Yousif.
IEEE Wireless LAN Standard
Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Lecture 24 Wireless Network Security
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
IEEE Wireless LAN Standard
September 2004Rudolf, Carlton and TGr Marian Rudolf, Alan Carlton - InterDigital doc: IEEE /1052r0.
WLAN 1. IEEE Overview Adopted in 1997 Defines: MAC sublayer MAC management protocols and services Physical (PHY) layers – IR – FHSS – DSSS.
Wireless Network Security CSIS 5857: Encoding and Encryption.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
The Medium Access Control Sublayer
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless LAN -Architecture Basic Service Set (BSS) Access Point (AP) Distribution System (DS) Extended Service Set (ESS) Portal IEEE has defined the specifications.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless LAN Protocols This talk is based on the course: CPSC Networks and Distributed Processing Spring2006/
Wireless II.
doc.: IEEE /xxx Jon Edney, Nokia
Wireless Mesh Networks
The Medium Access Control Sublayer
Chapter 6 Medium Access Control Protocols and Local Area Networks
Protocol Details John Bellardo UCSD.
2/17/2019 Interpretations of the Distribution System Service Based on the Specification W. Steven Conner, Intel Corp. Tricci So, Nortel Networks.
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Suggested Clarification of s ESS Mesh Terminology
Naval Research Laboratory Dynamic Backbone Subnets
Presentation transcript:

Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change its preferred base station – Disassociation – the station or base station breaks the association Distribution – determines how to route frames sent to the base station – Integration – handles the translation from the format to the format of the destination network Intracell Services (for STAs and APs) – Authentication – a station must authenticate itself before permitted to send data. – Deauthentication – a authenticated station wanting to leave the network is deauthenticated. – Privacy – manages the encryption and decryption. The algorithm specified is RC4 by Ronald Rivest of MIT. – Data Delivery – not reliable.

Services Station services: – authentication, – de-authentication, – privacy, – delivery of data Distribution Services ( A thin layer between MAC and LLC sublayer) – association – disassociation – reassociation – distribution – Integration A station maintain two variables: authentication state (=> 1) association state (<= 1)

Authentication – Prove identity to another station. – Open system authentication – Shared key authentication A sends B responds with a text A encrypt and send back B decrypts and returns an authentication management frame. – May authenticate any number of station. Security Problem A rogue AP SSID of ESS Announce its presence with beaconing A active rogue reach higher layer data if unencrypted.

Association – Transparent mobility – After authentication – Association request to an AP – After established, forward data – To BSS, if DA is in the BSS. – To DS, if DA is outside the BSS. – To AP, if DA is in another BSS. – To “portal”, if DC is outside the ESS. – Portal : transfer point : track mobility. (AP, bridge, or router) transfer 802.1h – New AP after reassociation, communicates with the old AP.