IE 419/519 Wireless Networks Lecture Notes #4 IEEE 802.11 Wireless LAN Standard Part #2.

Slides:



Advertisements
Similar presentations
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Advertisements

Wireless Networks.
McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
CS 350 Chapter-12 Wireless Technologies. Wireless Agencies & Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE)
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless LAN Presented By : Pooja Maheshwari Guided By : Dr Jerry Gao.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless LAN (WLAN) Networks
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
WLAN b a Johan Montelius
Networks Olga Agnew Bryant Likes Daewon Seo.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Data and Computer Communications
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 14 “Wireless LANs”.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Chapter 11: Wireless LANs Business Data Communications, 6e.
Lecture #2 Chapter 14 Wireless LANs.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
1 Kyung Hee University Chapter 15 Wireless LANs. 2 Kyung Hee University IEEE 802 Standards Working Groups WiMAX, an acronym that stands for Worldwide.
Wireless# Guide to Wireless Communications
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 Wi-Fi Jason Orgill John Bodily Scott Rowberry. 2 Background Purpose Develop MAC and PHY layer for wireless connectivity of fixed, portable and moving.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Data and Computer Communications Eighth Edition by William Stallings Chapter 17 – Wireless LANs.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards Modified.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Lecture 24 Wireless Network Security
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
IEEE Wireless LAN Standard
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
WLAN.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
CSCI 465 D ata Communications and Networks Lecture 23 Martin van Bommel CSCI 465 Data Communications & Networks 1.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
CWNA Guide to Wireless LANs, Third Edition Chapter 5: Physical Layer Standards.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Chapter 15 Wireless LANs.
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless NETWORKS NET 434 Topic No 6 Wireless LANS
Wireless LAN Security 4.3 Wireless LAN Security.
Wireless Mesh Networks
Presentation transcript:

IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2

2 IEEE MAC Layer Key to the specification It “rides” on every PHY layer and controls the transmission of user data into the air Provides core framing operations Provides interaction with a wired network backbone Covers three functional areas Reliable data delivery Medium access control Security

3 MAC – Reliable Data Delivery WLAN using the IEEE PHY and MAC layers is subject to considerable unreliability Even with error-correction codes, a number of MAC frames may not be received successfully More efficient to deal with errors at the MAC level than higher layer (e.g., TCP)

4 MAC – Reliable Data Delivery (cont.) incorporates positive acknowledgement Frame exchange protocol Source station transmits data Destination responds with acknowledgment (ACK) If source does not receive ACK, it retransmits frame Four frame exchange Source issues request-to-send (RTS) Destination responds with clear-to-send (CTS) Source transmits data Destination responds with ACK

5 MAC – Reliable Data Delivery (cont.) Atomic Operation allows stations to lock out contention during atomic operations so that atomic sequences are not interrupted by other stations attempting to use the transmission medium

MAC – Medium Access Control The working group considered two types of proposals for a MAC algorithm Distributed (like Ethernet), or Centralized The end result is a MAC algorithm called Distributed Foundation Wireless MAC (DFWMAC) The DFWMAC architecture provides a distributed access control mechanism with an optional centralized control built on top of that 6

MAC – Medium Access Control (cont.) DFWMAC architecture 7

MAC Frame Format

9 MAC Frame – Address Fields FunctionToDSFromDSAddress 1Address 2Address 3Address 4 IBSS FunctionToDSFromDSAddress 1Address 2Address 3Address 4 To AP (infra.) AP Client Server DS

10 MAC Frame – Address Fields (cont.) FunctionToDSFromDSAddress 1Address 2Address 3Address 4 From AP (infra.) WDS (bridge) AP Client Server DS Server AP Client

11 MAC – Security In wireless networks, the word “broadcast” takes on an entirely new meaning Original standard Privacy Wired Equivalent Privacy (WEP) algorithm RC4 algorithm using a 40-bit key (  104-bit key later) Authentication Shared-key authentication For more information, go to

12 MAC – Security (cont.) WEP only addressed protection for the radio link Nothing beyond the AP Did not include a framework for authentication & authorization Employed a pre-shared key for encryption Suffered from severe weaknesses Key had to be manually entered/changed on the APs and all the stations Used CRC for data integrity

13 MAC – Security (cont.) Types of Attacks Unauthorized association with the AP Man-in-the-middle Rogue AP Eavesdropping MAC Spoofing Denial of Service

14 MAC – Security (cont.) The i task group developed a set of security mechanisms that eliminates most security issues i addresses several security areas Access Control Authentication Authorization Confidentiality Data Integrity Key management Protection against known attacks

15 MAC – Security (cont.) Security for WLANs focuses on Access Control (i.e., authentication) To prevent unauthorized users from communicating with APs To ensure that legitimate client units associate only with trusted APs (not rogue or unauthorized APs) Privacy Only intended audience understands transmitted data Encryption is key

16 MAC – Security (cont.) Four distinct WLAN security solutions exist Open Access Basic Security Enhanced Security Requires a Remote Authentication Dial-In User Service (RADIUS) server Also known as an Authentication, Authorization and Accounting (AAA) server Remote Access Security Uses a VPN to allow access to corporate network and access business applications

17 MAC – Security (cont.) Basic Security SSID “Sniffing” is a problem Open or Shared-Key Static WEP keys 40 or 128 bits Very time consuming process, especially if they change Stolen devices are a problem MAC Authentication Optional APs have access to a list MACs can be forged

18 MAC – Security (cont.) Basic Security II WPA or WPA2 Pre-Shared Key (PSK) Uses a password or identification code Passphrase Network TypeWPAWPA2 Enterprise mode (business, government, education) Authentication: IEEE 802.1x/EAP Encryption: TKIP/MIC Authentication: IEEE 802.1x/EAP Encryption: AES-CCMP Personal mode (SOHO, home/personal) Authentication: PSK Encryption: TKIP/MIC Authentication: PSK Encryption: AES-CCMP

19 IEEE PHY Layer PHY media defined by original standard Direct-sequence spread spectrum Operating in 2.4 GHz ISM band Data rates of 1 and 2 Mbps 11 channels in the US, 13 in Europe, 1 in Japan Frequency-hopping spread spectrum Operating in 2.4 GHz ISM band Data rates of 1 and 2 Mbps 70 channels in the US, 23 in Japan Infrared 1 and 2 Mbps Wavelength between 850 and 950 nm

20 IEEE PHY Layer (cont.)

21 IEEE PHY Layer (cont.)

22 IEEE a Channel structure Makes use of the U-NII frequency bands Standard specifies a transmit spectrum mask Purpose is to constrain the spectral properties of the transmitted signal such that signals in adjacent channels do not interfere with one another

23 IEEE a (cont.) Channel structure Available channels

24 IEEE a (cont.) Channel structure A f f f FDM OFDM

25 IEEE a (cont.) Coding and Modulation Uses Orthogonal Frequency Division Multiplexing (OFDM) Also called multicarrier modulation Uses multiple carrier signals at different frequencies, sending some of the bits in each channel Subcarrier modulated using BPSK, QPSK, 16-QAM or 64- QAM

26 IEEE a (cont.) Coding and Modulation

27 IEEE b Extension of the DSSS scheme Provides data rates of 5.5 and 11 Mbps in the ISM band Uses chipping rate of 11 MHz thus occupying the same bandwidth as original DSSS scheme Higher data rate is achieved by using complementary code keying (CCK) as modulation scheme

28 IEEE b (cont.) Channel structure

29 IEEE g Extension of b Achieves data rates above 20 Mbps up to 54 Mbps Operates in the 2.45 GHz range Compatible with b

30 Other IEEE Standards f Multi-vendor AP interoperability (IAPP) i Security and authentication mechanisms at the MAC layer n Range of enhancements to both PHY and MAC layers to improve throughput Multiple antennas Smart antennas Changes to MAC access protocols

31 References The following references were used to complement the material presented in this module: Gast, M.S., Wireless Networks: The Definitive Guide, 1 st Edition, O’Reilly, 2002 Rivero, J., Porter, J.D., Puthpongsiriporn, T., Lemhachheche, R., Layton, W.T., Campus Wireless Environment Deployment Guide, 2005.