doc.: IEEE /xxxr0 Mike Moreton

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Advertisements

Doc.: IEEE /1191r4 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Submission doc.: IEEE 11-13/ ak July 2013 Finn and Hart, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date:
Submission doc.: IEEE 11-13/0938r1 August 2013 Norman Finn, Cisco SystemsSlide 1 Service mapping between the ISS and Date: Authors:
“Internetworking” Bridges –Transparent bridges –Source Routing - Transparent Bridges Routers (Network Layer) Brouters
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
CS335 Networking & Network Administration Tuesday, April 13, 2010.
IEEE Wireless LAN Standard
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Basic Layer 2 Switching and Bridging Functions.
Chapter 4: Managing LAN Traffic
IEEE 802.1q - VLANs Nick Poorman.
Submission doc.: IEEE 11-12/0589r2 July 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Submission doc.: IEEE 11-13/ ak May 2013 Norman Finn, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date: Authors:
Submission doc.: IEEE 11/ ak Jan 2013 Norman Finn, Cisco SystemsSlide Qbz–802.11ak Solutions: Architecture Issue Date: Authors:
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 Ch 9 Hardware Addressing and Frame Type Identification.
Submission doc.: IEEE 11-13/ ak May 2013 Finn and Hart, Cisco SystemsSlide 1 P802.1Qbz + P802.11ak Proposed Division of Work Date:
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
Doc.: IEEE /392r0 Submission June 2002 Mike Moreton, Synad Technologies Ltd.Slide 1 IBSS TPC Issues Mike Moreton, Synad Technologies, Ltd.
1 Hardware Addressing and Frame Type Identification.
Submission doc.: IEEE 11-13/0526r1 May 2013 Donald Eastlake, HuaweiSlide 1 Sub-Setting Date: Authors:
Computer Network Architecture Lecture 3: Network Connectivity Devices.
Submission doc.: IEEE 11/ ak Jan 2013 Norman Finn, Cisco SystemsSlide Qbz–802.11ak Solutions: Station Subsetting Issue Date:
Doc.: IEEE /1436r0 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 L2 Domain Indication Mike Moreton, STMicroelectronics 15 th.
Switches – Continued. Switches If a switch has N ports with multiple computers per port, then how many simultaneous transmissions can you have? Explain.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Doc.: IEEE 11-14/0562r7 November 2015 SubmissionSlide 1Norman Finn, Cisco Systems, Mark Hamilton, Spectralink ak and 802.1AC Convergence Function.
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Doc.: IEEE /2952r2 Submission Dec 2007 L.Chu Etc.Slide 1 Simplified DLS Action Frame Transmission in 11Z Date: Authors:
Ethernet switches and IP routers
William Stallings Data and Computer Communications 7th Edition
AP Architecture Changes Mike Moreton, STMicroelectronics
Some LB 62 Motions January 13, 2003 January 2004
COMPUTER NETWORKS CS610 Lecture-9 Hammad Khalid Khan.
Underlying Technology
Relay Flow Control Date: Authors: May 2013 Month Year
Considerations on WDS Addressing Tricci So 7 May 2004 Prepared by
LAN Risanuri Hidayat.
VLANs: Virtual Local Area Networks
Connecting Networks Repeater: physical layer Bridge: data link layer
Virtual LANs.
Ethernet : Framing and Addressing
William Stallings Data and Computer Communications 7th Edition
Martin Lefkowitz Trapeze Networks
TSN Architecture Mike Moreton, STMicroelectronics
William Stallings Data and Computer Communications 7th Edition
Reason Why L2 Per Frame Authentication Is Required
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
802.1X/ Issues Nancy Cam-Winget, Cisco Systems
Security for Measurement Requests and Information
AP Architecture Thoughts
Security for Measurement Requests and Information
Directed Multicast Service (DMS)
DLP & Security March 2003 Month 2002 doc.: IEEE /xxxr0
MAC Partial Proposal for TGn
CID#89-Directed Multicast Service (DMS)
Use of BSSID in WAVE Date: Authors: November 2007
Fast Roaming Using Multiple Concurrent Associations
Use of BSSID in WAVE Date: Authors: November 2007
Simplified DLS Action Frame Transmission in 11Z
Use of EAPOL-Key messages
Directed Multicast Service (DMS)
Multiple Networks Date: Authors: July 2005 July 2005
WPA Coordination Changes
Encrypting Management Frames
Comment Resolution Motions
Presentation transcript:

doc.: IEEE 802.11-02/xxxr0 Mike Moreton Month 2002 doc.: IEEE 802.11-02/xxxr0 November 2003 802/802.1X/802.11 Architecture Mike Moreton Mike Moreton, Synad Technologies John Doe, His Company

802.1Q Architectural Model November 2003 Mike Moreton, Synad Technologies

802.1Q – Position of LLC November 2003 Mike Moreton, Synad Technologies

SAPs in 802 (Not generally named in the standards) November 2003 SAPs in 802 (Not generally named in the standards) ISS = Internal Sublayer Service Mike Moreton, Synad Technologies

802.1X Controlled and Uncontrolled Ports November 2003 802.1X Controlled and Uncontrolled Ports There are two instances of LLC/SNAP per MAC entity, one for the controlled port, and one for the uncontrolled port. The MAC SAP always forwards a copy of each received frame to the uncontrolled LLC/SNAP entity. If the controlled port is authorised, then a copy is also sent to the controlled LLC/SNAP entity, and a further copy to the ISS SAP. When the controlled port is unauthorised, the MAC SAP will not pass frames for transmission received from the controlled LLC/SNAP entity, and the ISS SAP will not pass any frames for transmission. Mike Moreton, Synad Technologies

November 2003 802.1X Architecture Mike Moreton, Synad Technologies

Alternative 802.1X Port Architecture November 2003 Alternative 802.1X Port Architecture The SNAP SAPs are split into controlled and uncontrolled. When the controlled port is authorised, traffic may pass via all SNAP SAPs and via the ISS SAP. When the controlled port is not authorised, traffic may only pass via the uncontrolled SNAP SAPs. Mike Moreton, Synad Technologies

Alternative 802.1X Controlled/Uncontrolled November 2003 Alternative 802.1X Controlled/Uncontrolled Mike Moreton, Synad Technologies

802.11 in the 802.1 Architecture 802.11 is a shared access LAN November 2003 802.11 in the 802.1 Architecture 802.11 is a shared access LAN Not suitable for Port-Based Access Control. 802.1X suggests 802.11 associations can be used as “pseudo-ports”. But this requires isolation between STAs, which isn’t practical in 802.11 2003 TGi provides STA isolation by using a unique pairwise key for each one. But no isolation for group addresses. Only one copy is sent out, encrypted with a separate group key. TGi can not be modelled in the 802.1 architecture purely as a set of pseudo-ports, one per association. Mike Moreton, Synad Technologies

802.11 in 802.1 – a Possible Solution November 2003 802.11 in 802.1 – a Possible Solution Each 802.11i association is modelled as a pseudo-port. However, the MAC entity for these ports is required to discard group addressed frames for transmission. Received group addressed frames are processed as normal. There is an additional permanent port used for transmitting group addressed frames The MAC entity for this port will only pass group addressed frames for transmission. All other frames (including received frames) are discarded. Is not controlled by 802.1X – always authorised. 802.11i will encrypt these frames, and may not send them if no STAs are associated. Mike Moreton, Synad Technologies

802.11 in 802.1 – The Diagram MAC Relay Entity EAPOL November 2003 802.11 in 802.1 – The Diagram EAPOL MAC Relay Entity Group Addressed Pseudo-Port STA 1 Pseudo-Port STA 2 Pseudo-Port STA 3 Pseudo-Port STA 4 Pseudo-Port STA 5 Pseudo-Port Mike Moreton, Synad Technologies

802.11 in 802.1 – Group Addressed Frame Flow November 2003 802.11 in 802.1 – Group Addressed Frame Flow The originating STA forwards the frame to the AP as a directed unicast frame This is the way 802.11 has always done it It is received on the AP pseudo-port for that association. Assuming the associated controlled port is authorised, the frame is forwarded (with the recovered group address) to the Relay Agent. The Relay Agent distributes the frame to all ports other than the one it was received from. Each association pseudo port that receives the frame will discard it before transmission, as it does not have a unicast destination address. The multicast pseudo port will transmit the frame. All STAs will receive a single copy of the frame. The originating STA will discard the frame based on the source address. Again, this is the way 802.11 has always done it. Mike Moreton, Synad Technologies

November 2003 802.11 Attached Bridges Standard 802.11 APs do not forward frames for unknown addresses Can’t attach an 802.1D bridge via 802.11 Standard defines 4 address format that could be used to carry unknown frames, but doesn’t describe how to use it. Many suppliers use proprietary indications in the association message to indicate an attached bridge, so that unknown frames can be forwarded to it. Mike Moreton, Synad Technologies

802.11 Bridging Some Questions November 2003 802.11 Bridging Some Questions How do you secure who can be a bridge? Can it be anyone? Should an Ethernet 802.1X switch also discard unknown frames? If so, maybe “bridge indication” should be in 802.1X. What happens when multiple bridges are associated? Perhaps use group address? Mike Moreton, Synad Technologies