Ch. 2 – 802.11 and NICs Part 2 – 802.11 MAC This presentation was originally developed by Prof. Rick Graziani, and modified by Prof Yousif.

Slides:



Advertisements
Similar presentations
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CCNA 4 version 3.0.
Advertisements

© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Studying st lecture ~Overview of IEEE ~ Tadashi YASUMOTO.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
1 CSCD 439/539 Wireless Networks and Security Lecture 3 Wireless LAN Components and Characteristics Fall 2007 Some Material in these slides from J.F Kurose.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
MAC Architecture Module-7 Jerry Bernardini Community College of Rhode Island 6/18/2015Wireless Networking J. Bernardini1.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
CSE331: Introduction to Networks and Security Lecture 6 Fall 2002.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Wireless Networking WAN Design Module-06
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CS, NCTU.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Networks Olga Agnew Bryant Likes Daewon Seo.
IEEE Wireless LAN Standard
CCENT Review. Put the following descriptions in order from Layer 7 to Layer 1 and give the name of each layer.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Ch. 5 – Access Points. Overview Access Point Connection.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
1 Welcome to CS 334/ “Fig 1.5” – An internet 4 Ethernet LANs linked by a WAN BHM NOATL CHL Network of networks.
Ch. 2 – and NICs Part 1 – MAC and Cisco Client Adapters Cisco Fundamentals of Wireless LANs version 1.2.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
1 IEEE Management Frames Gast ’ s Book (Chapter 4) Prof. Yu-Chee Tseng CSIE, NCTU.
CWNA Guide to Wireless LANs, Second Edition
Mod 8.1 – Security Cisco Fundamentals of Wireless LANs version 1.2.
IEEE Wireless LAN Part II Access Point, Power Management, Polling, and Frame Format 14-1.
802.11b Frame Details Last Update Copyright Kenneth M. Chipps Ph.D. 1.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
IEEE Wireless LAN Standard
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter MAC Architecture.
Wireless II. Frames Frames – Notes 3 Frame type ▫Management  Beacons  Probes  Request  Response  Associations  Request  Response  Disassociate.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Chapter 05 Wireless Design Models, Topologies, Infrastructure, and Wireless LAN Devices CSE-HUI.
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
HY436: Mobile Computing and Wireless Networks IEEE Lecture 5: October 18, 2004 Prof. Maria Papadopouli Assistant Professor Department of Computer.
Wi-Fi Wi-Fi (short for “Wireless Fidelity") is the popular term for a high- frequency wireless local area network (WLAN) –Promoted by the Wi-Fi Alliance.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Ch. 2 – and NICs Part 1 – MAC and Cisco Client Adapters This Power Point Presentation was originally created by Prof. Rick Graziani, and.
IEEE Wireless LAN Standard
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
11 Chapter 4. Wireless Local Area Networks Departamento de Tecnología Electrónica Some of these slides are copyrighted by: Computer Networking: A Top Down.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
CWNA Guide to Wireless LANs, Third Edition Chapter 6: Medium Access Control Layer Standards.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN Standard
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Ch. 2 – and NICs Part 2 – MAC Cisco Fundamentals of Wireless LANs version 1.1 Rick Graziani Cabrillo College Spring 2005.
Understand Wireless Security LESSON Security Fundamentals.
Instructor Materials Chapter 6 Building a Home Network
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
Wireless Network Security
Wireless Mesh Networks
Basic processes in IEEE networks Configuration parameters
Protocol Details John Bellardo UCSD.
Is for “Wireless Fidelity” Or IEEE Standard By Greg Goldman
Presentation transcript:

Ch. 2 – and NICs Part 2 – MAC This presentation was originally developed by Prof. Rick Graziani, and modified by Prof Yousif

Overview and MAC Layer Part 1 – MAC and Cisco Client Adapters (Separate Presentation) 2.1 Online Curriculum – Standards Overview of WLAN Topologies –IBSS –BSS –ESS –Access Points Medium Access Mechanisms –DCF Operations –Hidden Node Problem –RTS/CTS –Frame Fragmentation 2.4 – 2.6 Online Curriculum –Client Adapters –Aironet Client Utility (ACU) –ACU Monitoring and Troubleshooting Tools Part 2 – MAC Data Frames and Addressing MAC Layer Operations –Station Connectivity –Power Save Operations – Frame Formats Non-standard devices (Brief)

Recommended Reading and Sources for this Presentation To understand WLANs it is important to understand the protocols and their operations. These two books do an excellent job in presenting this information and is used throughout this and other presentations. Matthew S. Gast ISBN: Pejman Roshan Jonathan Leary ISBN:

Acknowledgements Thanks to Pejman Roshan and Jonathan Leary at Cisco Systems, authors of Wireless LAN Fundamentals for allowing me to use their graphics and examples for this presentation. Also thanks to Matthew Gast for author of Wireless Networks, The Definitive Guide for allowing me to use their graphics and examples for this presentation.

Frames – This isn’t Ethernet! Frames Data Frames (most are PCF) –Data –Null data –Data+CF+Ack –Data+CF+Poll –Data+CF+Ac+CF+Poll –CF-Ack –CF-Poll –CF-Cak+CF-Poll Control Frames –RTS –CTS –ACK –CF-End –CF-End+CF-Ack Management Frames –Beacon –Probe Request –Probe Response –Authentication –Deauthentication –Association Request –Association Response –Reassociation Request –Reassociation Response –Disassociation –Announcement Traffic Indication

Data Frames and Addressing

MAC Addressing Let’s look at these options: –Host A to Host B –Host A to Host X –Host X to Host A Frames to and from a BSS must go via the access point. The access point is a layer 2 bridge (translation bridge) between the network and the network. Distribution System (DS) A B C D Access Point 1Access Point 2 X Y aaabbb111 Pseudo MAC address of hosts and AP1 aaa bbb xxx 111

MAC Addressing Each BSS is assigned a BSSID. –Not to be confused with SSID or ESSID. BSSID – 48 bit identifier which distinguishes it from other BSSs in the network. Some BSSs may overlap and the APs need to know which AP the frame is for. In a BSS, the BSSID is the MAC address of the wireless interface, I.e. the MAC address of the AP - wireless (translating) bridge. Remember, normal switches (bridges) may have MAC addresses, but these addresses are only used for management purposes and not for layer 2 frame forwarding (addressing). Distribution System (DS) AB C D Access Point 1Access Point 2 X Y General Frame aaa bbb xxx The BSSID 111

MAC Addressing Address 1 – Receiver address Address 2 – Transmitter address Address 3 – Ethernet SA, Ethernet DA, or BSSID Transmitter: Sends a frame on to the wireless medium, but doesn’t necessarily create the frame. Receiver: Receives a frame on the wireless medium, but may not be the destination, i.e. may be the access point. Distribution System (DS) AB C D Access Point 1Access Point 2 X Y General Frame Host A to Host B aaa bbb xxx 111

MAC Addressing Address 1 – Receiver address Address 2 – Transmitter address Address 3 – Ethernet SA, Ethernet DA, or BSSID Distribution System (DS) AB C D Access Point 1Access Point 2 X Y Host A to Host B aaa bbb aaa111bbb Host A to AP 1 AP1 to Host B 111bbb aaa xxx Trans.Rec. Trans. DA SA

MAC Addressing Distribution System (DS) AB C D Access Point 1Access Point 2 X Y Host A to Host X aaa bbb aaa111xxx Host A to AP 1 aaaxxx Frame The Ethernet DA and SA are the source and destination addresses just like on traditional Ethernet networks. –Destination Address – Host X –Source Address – Host A xxx Rec.Trans.DA copied

MAC Addressing Distribution System (DS) AB C D Access Point 1Access Point 2 X Y Host A to Host X aaa bbb The AP (bridge) knows which MAC address on on its wireless interface and maintains a table with those MAC addresses. (from the Association process – later) When the AP receives an frame, it examines the Address 3 address. If Address 3 is not in its table of wireless MACs it knows it needs to translate the frame to an Ethernet frame. The AP copies the Address 3 address to the Ethernet Destination Address, and Address 2 (Transmitter address) is copied to the Ethernet Source Address. xxx aaa111xxx Host A to AP Frame Rec.Trans.DA Host A to AP 1 aaaxxx copied

MAC Addressing Distribution System (DS) AB C D Access Point 1Access Point 2 X Y Host X to Host A aaa bbb xxx 111

MAC Addressing Distribution System (DS) AB C D Access Point 1Access Point 2 X Y Host X to Host A aaa bbb aaa111 xxx AP 1 to Host A Frame Destination Address – Host X Source Address – Host A xxx Host X to AP 1 aaaxxx SARec.Trans. copied

MAC Layer Operations Station Connectivity Power Save Operations

Station Connectivity Earlier we stated, at a minimum a client station and the access point must be configured to be using the same SSID. How does the client find these APs? Before connecting to any network, you must find it. Ethernet, the cable does that for you, but of course there is no cable with wireless. There are various applications and utilities that will do it, but what is actually happening in the MAC operations? Let’s take a look…

Station Connectivity Station connectivity is an explanation of how stations select and communicate with APs. State 1 Unauthenticated Unassociated State 2 Authenticated Unassociated State 3 Authenticated Associated Successful Authentication Successful Association DeauthenticationDisassociation

Station Connectivity We will look at three processes: –Probe Process (or scanning) –The Authentication Process –The Association Process Only after a station has both authenticated and associated with the access point can it use the Distribution System (DS) services and communicate with devices beyond the access point. State 1 Unauthenticated Unassociated State 2 Authenticated Unassociated State 3 Authenticated Associated Successful Authentication Successful Association DeauthenticationDisassociation Probe process Authentication process Association process

Station Connectivity – Probe Process The Probe Process (Scanning) done by the wireless station –Passive - Beacons –Active – Probe Requests Depends on device drive of wireless adapter or the software utility you are using. Cisco adapters do active scanning when associating, but use passive scanning for some tests. In either case, beacons are still received and used by the wireless stations for other things besides scanning (coming).

Station Connectivity – Passive Scanning Passive Scanning –Saves battery power –Station moves to each channel and waits for Beacon frames from the AP. –Records any beacons received. Beacon frames allow a station to find out every thing it needs to begin communications with the AP including: –SSID –Supported Rates Kismet/KisMAC uses passive scanning

Station Connectivity – Passive Scanning

Note: Most of these beacons are received via normal operations and not through passive scanning.

Station Connectivity – Passive Scanning Passive scans, carried out by listening to Beacons from APs, are not usually displayed by a network analyzer (Ethereal, Airopeek, etc.) but can be. Microsecond – millionth of a second Millisecond – thousandth of a second A common beacon interval is 100 time units. Beacon interval is the number of time units between beacon transmissions. –One unit of time is 1 millisecond. –A beacon interval of 100 is equivalent to 100 milliseconds or 0.1 seconds. –That would be 10 beacons per second.

Station Connectivity – Passive Scanning AP features (options) –The SSID can be “hidden” or “cloaked” in the beacon frame (can be done on Cisco APs) From some mailing lists: –“SSID cloaking and beacon hiding isn't necessarily a bad thing, but too many places use it as the only protection because it leads to a false sense of security.” –“Obscurity != security. Too many companies blindly trust that no beaconing or hiding their SSID means they're automatically safe.”

Station Connectivity – Active Scanning Active Scanning: Probe Request –A Probe Request frame is sent out on every channel (1 – 11) by the client. –APs that receive Probe Requests must reply with a Probe Response frame if: SSID matches or Probe Request had a broadcast SSID (0 byte SSID) NetStumbler uses active scanning From the client

Station Connectivity – Active Scanning Active Scanning: Probe Response –On BSSs the AP is responsible for replying to Probe Requests with Probe Responses. –Probe Responses are unicast frames. –Probe Responses must be ACKnowledged by the receiver (client). Like a beacon, Probe Response frames allow a station to find out every thing it needs to begin communications with the AP including: –SSID –Supported Rates From the AP

Station Connectivity Access Points can be configured whether or not to allow clients with broadcast SSIDs to continue the connectivity process. –If there is no authentication on the AP, then the client will most likely “associate” and be on their network! Cisco APs use a default SSID of tsunami known as the “guest mode” SSID. (coming) Unless this feature is disabled or authentication is enabled, anyone can easily associate with your AP and access your network (or the Internet). Probe Request Broadcast (no) SSID Probe Response SSID = tsunami ACK No SSID Hey, I didn’t do anything and I am on the Internet!

Authentication Process On a wired network, authentication is implicitly provided by the physical cable from the PC to the switch. Authentication is the process to ensure that stations attempting to associate with the network (AP) are allowed to do so specifies two types of authentication: –Open-system –Shared-key (makes use of WEP)

Authentication Process – Open-System Open-system authentication really “no authentication”.

Authentication Process – Shared-Key Shared-key authentication uses WEP (Wired Equivalent Privacy) and can only be used on products that support WEP. WEP is a Layer 2 encryption algorithm bsed on the RC4 algorithm requires any stations that support WEP to also support shared- key authentication. WEP will be examined more closely when we discuss security. For now both the client and the AP must have a shared-key, password.

Authentication Process We’ll look at the configuration of the client and AP later! Example of open-system authentication. Note: On “some” systems you can configure authentication (WEP) and WEP encryption separately. On the ACU you can have open-system authentication and also have WEP encryption. However, if you have Shared-key (WEP) authentication, you must use WEP encryption.

Authentication Process Authentication –Open-System –Shared-Key (WEP) Encryption –None –WEP or only

Association Process The association process is logically equivalent to plugging into a wired network. Once this process is completed, the wireless station can use the DS and connect to the network and beyond. A wireless station can only associate with one AP ( restriction) During the association process the AP maps a logical port known as the Association Identifier (AID) to the wireless station. –The AID is equivalent to a port on a switch and is used later in Power Save Options. The association process allows the DS to keep track of frames destined for the wireless station, so they can be forwarded. 1. Association Request 2. Association Response

Association Process –At this point the AP adds the source address of the wireless client to its Source Address Table. –This is how the AP knows to forward frames destined to the client out the wireless interface (802.11) and not the wired interface (802.3/Ethernet). –The AP usually learns the wireless client’s Source Address sooner, either in the Probe Request or Authentication Request frames, but this is where it “officially” adds the wireless client to it MAC table.